




下載本文檔
版權說明:本文檔由用戶提供并上傳,收益歸屬內容提供方,若內容存在侵權,請進行舉報或認領
文檔簡介
1、application bridging for federated access beyond web (abfab)problem statementfederated identity facilitates the controlled sharing of information about principals, commonly across organisational boundaries. this avoids redundant registration of principals who operate in multiple domains, reducing ad
2、ministrative overheads and improving usability while addressing privacy-related concerns and regulatory and statutory requirements of some jurisdictions. a number of such mechanisms are in use for the web. this working group will specify a federated identity mechanism for use by other internet proto
3、cols not based on html/http, such as for instance imap, xmpp, ssh and nfs. the design will combine existing protocols, specifically the extensible authentication protocol (eap - rfc 3748), authentication, authorization and account protocols (radius - rfc 2865 and diameter - rfc 3588), and the securi
4、ty assertion markup language (saml).specifically eap will be used to authenticate the subject to a trusted party, aaa (radius and diameter) will be used to authenticate and convey information from that party to a relying party and saml and saml message formats are used to carry subject information t
5、hat can be used for authorization and personalization by a relying party. any change in the choices for these three technical roles is out of scope for this charter.documenttitledatestatusiprarea directoractive internet-draftsdraft-ietf-abfab-aaa-saml-03 a radius attribute, binding and profiles for
6、saml2012-03-12 i-d exists wg document draft-ietf-abfab-arch-02 application bridging for federated access beyond web (abfab) architecture2012-05-24 i-d exists wg document draft-ietf-abfab-gss-eap-07 a gss-api mechanism for the extensible authentication protocol2012-05-24 publication requested (for2da
7、ys) submitted to iesg for publication stephen farrelldraft-ietf-abfab-gss-eap-naming-02 name attributes for the gss-api eap mechanism2012-03-12 i-d exists wg document draft-ietf-abfab-usecases-03 application bridging for federated access beyond web (abfab) use cases2012-05-30 i-d exists wg document
8、related documentstitledatestatusiprarea directoractive internet-draftsdraft-howlett-abfab-trust-router-ps-02 trust router problem statement2012-03-26 i-d exists ietf draft-perez-abfab-eap-gss-preauth-01 gss-eap pre-authentication for kerberos2012-03-08 i-d exists draft-perez-abfab-kerberos-preauth-o
9、ptions-01 options for abfab-based kerberos pre-authentication2012-03-12 i-d exists draft-smith-abfab-usability-ui-considerations-01 application bridging for federated access beyond web (abfab) usability and user interface considerations2012-03-29 i-d exists draft-wei-abfab-fcla-02 federated cross-la
10、yer access2012-03-12 i-d exists dns-based authentication of named entities (dane)objective:specify mechanisms and techniques that allow internet applications toestablish cryptographically secured communications by using informationdistributed through dnssec for discovering and authenticating public
11、keys which are associated with a service located at a domain name.problem statement:entities on the internet are usually identified using domain names andforming a cryptographically secured connection to the entity requiresthe entity to authenticate its name. for instance, in https, a serverrespondi
12、ng to a query for is expected toauthenticate as . security protocols such as tls andipsec accomplish this authentication by allowing an endpoint to proveownership of a private key whose corresponding public key is somehowbound to the name being authenticated. as a pre-requisite forauthentication, th
13、en, these protocols require a mechanism for bindingsto be asserted between public keys and domain names.dnssec provides a mechanism for a zone operator to sign dnsinformation directly, using keys that are bound to the domain by theparent domain; relying parties can continue this chain up to any trus
14、tanchor that they accept. in this way, bindings of keys to domains areasserted not by external entities, but by the entities that operate thedns. in addition, this technique inherently limits the scope of anygiven entity to the names in zones he controls.this working group will develop mechanisms fo
15、r zone operators topresent bindings between names within their control and public keys, insuch a way that these bindings can be integrity-protected (and thusshown to be authentically from the zone operator) using dnssec andused as a basis for authentication in protocols that use domain names asident
16、ifiers. possible starting points for these deliverables includedraft-hallambaker-certhash, draft-hoffman-keys-linkage-from-dns, anddraft-josefsson-keyassure-tls.the mechanisms developed by this group will address bindings betweendomain names and keys, allowing flexibility for all key-transportmechan
17、isms supported by the application protocols addressed (e.g., bothself-signed and ca-issued certificates for use in tls).the solutions specified by this working group rely upon the security ofthe dns to provide source authentication for public keys. the decisionwhether the chain of trust provided by
18、dnssec is sufficient to trust thekey, or whether additional mechanisms are required to determine theacceptability of a key, is left to the entity that uses the key material. in addition to the protections afforded by dnssec, the protocols and mechanisms designed by this working group require securin
19、g the last hop by operating a local dns resolver or securing the connection to remote resolver - this wg will not specify new mechanisms to secure that hop, but will reference existing specifications or document existing methods in order to allow implementations to interoperate securely.initial deli
20、verables for this working group are limited to distribution of bindings between names within the zone operators control and public keys. more general statements of policy for a domain are out of scope, and new tasks in this area may only be adopted through a re-chartering.the group may also create d
21、ocuments that describe how protocol entitiescan discover and validate these bindings in the execution of specificapplications. this work would be done in coordination with the ietfworking groups responsible for the protocols.documenttitledatestatusiprarea directoractive internet-draftsdraft-ietf-dan
22、e-protocol-23 the dns-based authentication of named entities (dane) transport layer security (tls) protocol: tlsa2012-06-14 new rfc ed queue (for1day) rfc editor state: edit wg consensus: waiting for write-up stephen farrellrfcsrfc 6394 (draft-ietf-dane-use-cases) use cases and requirements for dns-
23、based authentication of named entities (dane)2011-10 rfc 6394 (informational) 待添加的隱藏文字內容2stephen farrellrelated documentstitledatestatusiprarea directoractive internet-draftsdraft-fanf-dane-smtp-03 secure smtp with tls, dnssec and tlsa records.2012-06-06 new i-d exists draft-hoffman-dane-smime-03 us
24、ing secure dns to associate certificates with domain names for s/mime2012-03-09 i-d exists eap method update (emu)description of working groupthe extensible authentication protocol (eap) rfc 3748 is a networkaccess authentication framework used in the ppp, 802.11, 802.16, vpn,pana, and in some funct
25、ions in 3g networks. eap itself is a simpleprotocol and actual authentication happens in eap methods.over 40 different eap methods exist. most of these methods areproprietary methods, but some are documented in informational rfcs. inthe past the lack of documented, open specifications has been adepl
26、oyment and interoperability problem. there are currently only twoeap methods in the standards track that implement features such as keyderivation that are required for many modern applications.authentication types and credentials continue to evolve as dorequirements for eap methods.this group is cha
27、rtered to work on the following types of mechanismsto meet requirements relevant to eap methods in rfc 3748, rfc 4017,rfc 4962 and eap keying:- a mechanism based on strong shared secrets. this mechanism shouldstrive to be simple and compact for implementation in resourceconstrained environments.- a
28、document that defines eap channel bindings and provides guidancefor establishing eap channel bindings within eap methods.- enable tls-based eap methods to support channel bindings. this itemwill not generate a new method; rather, it will focus on addingsupport for eap channel bindings to the tunnele
29、d method (describedbelow), and if possible, other tls-based eap methods. potentialmechanisms for adding channel binding support will be investigated,including tunneling of channel binding parameters, or a tls extension,or other standard tls mechanism- a mechanism to support extensible communication
30、within a tlsprotected tunnel. this mechanism will support meeting the requirementsof an enhanced tls mechanism, a password based authenticationmechanism, and additional inner authentication mechanisms. it willalso support channel bindings (as described above) in order to meetrfc 4962 requirements.- a mechanism that makes use of existing password databases such as aaadatabases. this item will be based on the above tunnel method.documenttitledatestatusiprarea directoractive internet-draftsdraft-ietf-emu-
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯系上傳者。文件的所有權益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網頁內容里面會有圖紙預覽,若沒有圖紙預覽就沒有圖紙。
- 4. 未經權益所有人同意不得將文件中的內容挪作商業或盈利用途。
- 5. 人人文庫網僅提供信息存儲空間,僅對用戶上傳內容的表現方式做保護處理,對用戶上傳分享的文檔內容本身不做任何修改或編輯,并不能對任何下載內容負責。
- 6. 下載文件中如有侵權或不適當內容,請與我們聯系,我們立即糾正。
- 7. 本站不保證下載資源的準確性、安全性和完整性, 同時也不承擔用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- 一榀框架結構設計畢業答辯
- 動脈疾病診療指南解讀
- 呼吸機使用的臨床指征
- 如何讓孩子在群體壓力中成長
- 歷史2024-2025學年統編版七年級下冊歷史知識點 專題總結
- 葡萄酒產區特色品牌國際化研究報告:2025年市場趨勢預測
- 音樂流媒體行業用戶付費模式與版權運營商業模式策略報告
- 【高中語文】《紅樓夢》閱讀中“薛寶釵情節”闡釋與訓練++統編版高一語文必修下冊+
- 藝術市場數字化交易平臺與藝術品市場文化產業發展趨勢報告
- 金融行業消費升級報告:年輕一代的金融需求與偏好分析
- 負責人安全生產責任清單
- 民事起訴狀范文下載
- 醫護崗位職責與權限制度
- 【8歷期末】安徽省合肥市包河區2022-2023學年八年級下學期期末歷史試題(含解析)
- 八年級歷史下冊核心知識點、難點、重點總結
- 人工智能智慧樹知到期末考試答案章節答案2024年復旦大學
- (高清版)JTGT D81-2017 公路交通安全設施設計細則
- 2023-2024全國初中物理競賽試題-杠桿(解析版)
- 新概念馬學智慧樹知到期末考試答案章節答案2024年內蒙古農業大學
- (正式版)SHT 3551-2024 石油化工儀表工程施工及驗收規范
- 乳腺癌患者術后心理護理
評論
0/150
提交評論