




免费预览已结束,剩余1页可下载查看
下载本文档
版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
application bridging for federated access beyond web (abfab)problem statementfederated identity facilitates the controlled sharing of information about principals, commonly across organisational boundaries. this avoids redundant registration of principals who operate in multiple domains, reducing administrative overheads and improving usability while addressing privacy-related concerns and regulatory and statutory requirements of some jurisdictions. a number of such mechanisms are in use for the web. this working group will specify a federated identity mechanism for use by other internet protocols not based on html/http, such as for instance imap, xmpp, ssh and nfs. the design will combine existing protocols, specifically the extensible authentication protocol (eap - rfc 3748), authentication, authorization and account protocols (radius - rfc 2865 and diameter - rfc 3588), and the security assertion markup language (saml).specifically eap will be used to authenticate the subject to a trusted party, aaa (radius and diameter) will be used to authenticate and convey information from that party to a relying party and saml and saml message formats are used to carry subject information that can be used for authorization and personalization by a relying party. any change in the choices for these three technical roles is out of scope for this charter.documenttitledatestatusiprarea directoractive internet-draftsdraft-ietf-abfab-aaa-saml-03 a radius attribute, binding and profiles for saml2012-03-12 i-d exists wg document draft-ietf-abfab-arch-02 application bridging for federated access beyond web (abfab) architecture2012-05-24 i-d exists wg document draft-ietf-abfab-gss-eap-07 a gss-api mechanism for the extensible authentication protocol2012-05-24 publication requested (for2days) submitted to iesg for publication stephen farrelldraft-ietf-abfab-gss-eap-naming-02 name attributes for the gss-api eap mechanism2012-03-12 i-d exists wg document draft-ietf-abfab-usecases-03 application bridging for federated access beyond web (abfab) use cases2012-05-30 i-d exists wg document related documentstitledatestatusiprarea directoractive internet-draftsdraft-howlett-abfab-trust-router-ps-02 trust router problem statement2012-03-26 i-d exists ietf draft-perez-abfab-eap-gss-preauth-01 gss-eap pre-authentication for kerberos2012-03-08 i-d exists draft-perez-abfab-kerberos-preauth-options-01 options for abfab-based kerberos pre-authentication2012-03-12 i-d exists draft-smith-abfab-usability-ui-considerations-01 application bridging for federated access beyond web (abfab) usability and user interface considerations2012-03-29 i-d exists draft-wei-abfab-fcla-02 federated cross-layer access2012-03-12 i-d exists dns-based authentication of named entities (dane)objective:specify mechanisms and techniques that allow internet applications toestablish cryptographically secured communications by using informationdistributed through dnssec for discovering and authenticating public keys which are associated with a service located at a domain name.problem statement:entities on the internet are usually identified using domain names andforming a cryptographically secured connection to the entity requiresthe entity to authenticate its name. for instance, in https, a serverresponding to a query for is expected toauthenticate as . security protocols such as tls andipsec accomplish this authentication by allowing an endpoint to proveownership of a private key whose corresponding public key is somehowbound to the name being authenticated. as a pre-requisite forauthentication, then, these protocols require a mechanism for bindingsto be asserted between public keys and domain names.dnssec provides a mechanism for a zone operator to sign dnsinformation directly, using keys that are bound to the domain by theparent domain; relying parties can continue this chain up to any trustanchor that they accept. in this way, bindings of keys to domains areasserted not by external entities, but by the entities that operate thedns. in addition, this technique inherently limits the scope of anygiven entity to the names in zones he controls.this working group will develop mechanisms for zone operators topresent bindings between names within their control and public keys, insuch a way that these bindings can be integrity-protected (and thusshown to be authentically from the zone operator) using dnssec andused as a basis for authentication in protocols that use domain names asidentifiers. possible starting points for these deliverables includedraft-hallambaker-certhash, draft-hoffman-keys-linkage-from-dns, anddraft-josefsson-keyassure-tls.the mechanisms developed by this group will address bindings betweendomain names and keys, allowing flexibility for all key-transportmechanisms supported by the application protocols addressed (e.g., bothself-signed and ca-issued certificates for use in tls).the solutions specified by this working group rely upon the security ofthe dns to provide source authentication for public keys. the decisionwhether the chain of trust provided by dnssec is sufficient to trust thekey, or whether additional mechanisms are required to determine theacceptability of a key, is left to the entity that uses the key material. in addition to the protections afforded by dnssec, the protocols and mechanisms designed by this working group require securing the last hop by operating a local dns resolver or securing the connection to remote resolver - this wg will not specify new mechanisms to secure that hop, but will reference existing specifications or document existing methods in order to allow implementations to interoperate securely.initial deliverables for this working group are limited to distribution of bindings between names within the zone operators control and public keys. more general statements of policy for a domain are out of scope, and new tasks in this area may only be adopted through a re-chartering.the group may also create documents that describe how protocol entitiescan discover and validate these bindings in the execution of specificapplications. this work would be done in coordination with the ietfworking groups responsible for the protocols.documenttitledatestatusiprarea directoractive internet-draftsdraft-ietf-dane-protocol-23 the dns-based authentication of named entities (dane) transport layer security (tls) protocol: tlsa2012-06-14 new rfc ed queue (for1day) rfc editor state: edit wg consensus: waiting for write-up stephen farrellrfcsrfc 6394 (draft-ietf-dane-use-cases) use cases and requirements for dns-based authentication of named entities (dane)2011-10 rfc 6394 (informational) stephen farrellrelated documentstitledatestatusiprarea directoractive internet-draftsdraft-fanf-dane-smtp-03 secure smtp with tls, dnssec and tlsa records.2012-06-06 new i-d exists draft-hoffman-dane-smime-03 using secure dns to associate certificates with domain names for s/mime2012-03-09 i-d exists eap method update (emu)description of working groupthe extensible authentication protocol (eap) rfc 3748 is a networkaccess authentication framework used in the ppp, 802.11, 802.16, vpn,pana, and in some functions in 3g networks. eap itself is a simpleprotocol and actual authentication happens in eap methods.over 40 different eap methods exist. most of these methods areproprietary methods, but some are documented in informational rfcs. inthe past the lack of documented, open specifications has been adeployment and interoperability problem. there are currently only twoeap methods in the standards track that implement features such as keyderivation that are required for many modern applications.authentication types and credentials continue to evolve as dorequirements for eap methods.this group is chartered to work on the following types of mechanismsto meet requirements relevant to eap methods in rfc 3748, rfc 4017,rfc 4962 and eap keying:- a mechanism based on strong shared secrets. this mechanism shouldstrive to be simple and compact for implementation in resourceconstrained environments.- a document that defines eap channel bindings and provides guidancefor establishing eap channel bindings within eap methods.- enable tls-based eap methods to support channel bindings. this itemwill not generate a new method; rather, it will focus on addingsupport for eap channel bindings to the tunneled method (describedbelow), and if possible, other tls-based eap methods. potentialmechanisms for adding channel binding support will be investigated,including tunneling of channel binding parameters, or a tls extension,or other standard tls mechanism- a mechanism to support extensible communication within a tlsprotected tunnel. this mechanism will support meeting the requirementsof an enhanced tls mechanism, a password based authenticationmechanism, and additional inner authentication mechanisms. it willalso support channel bindings (as described above) in order to meetrfc 4962 requirements.- a mechanism that makes use of existing password databases such as aaadatabases. this item will be based on the above tunnel method.documenttitledatestatusiprarea directoractive internet-draftsdraft-ietf-emu-
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 江苏射阳中学2024~2025学年高二下册6月期末考试数学试题含解析
- 消费者信任建立与维护考核试卷
- 中药药效评价与临床用药个体化研究考核试卷
- 印刷机精度提升在标签印刷中的应用分析考核试卷
- 物联网与智能设备的边缘计算优势考核试卷
- 财经大学-经济管理专业-2017级《现代企业管理》试卷
- 丝织品在户外运动服装色彩与心理影响研究考核试卷
- 部编语文一年级上册拼音拼读练习册
- 2025年中国HID手电筒数据监测研究报告
- 2025年中国C型组合角尺数据监测研究报告
- 风动凿岩机操作规程(4篇)
- 自助餐的服务流程培训
- 联塑管材检验报告模板
- 部编版五年级上册课内、课外阅读训练(教师+学生)+根据课文内容填空
- 浙江省杭州市(2024年-2025年小学四年级语文)部编版质量测试((上下)学期)试卷及答案
- 【建筑专业】16J914-1公用建筑卫生间(完整)
- DL∕T 1098-2016 间隔捧技术条件和试验方法
- 化学-福建省泉州市2023~2024学年高一下学期期末教学质量监测试题和答案
- AQ/T 2059-2016 磷石膏库安全技术规程(正式版)
- AQ 1011-2005 煤矿在用主通风机系统安全检测检验规范(正式版)
- 2021年广东省深圳实验学校自主招生数学模拟试卷
评论
0/150
提交评论