RFC 7744

Use Cases for Authentication and Authorization in Constrained Environments, January 2016

File formats:
icon for text file icon for PDF icon for HTML
Status:
INFORMATIONAL
Authors:
L. Seitz, Ed.
S. Gerdes, Ed.
G. Selander
M. Mani
S. Kumar
Stream:
IETF
Source:
ace (sec)

Cite this RFC: TXT  |  XML  |   BibTeX

DOI:  https://doi.org/10.17487/RFC7744

Discuss this RFC: Send questions or comments to the mailing list ace@ietf.org

Other actions: Submit Errata  |  Find IPR Disclosures from the IETF  |  View History of RFC 7744


Abstract

Constrained devices are nodes with limited processing power, storage space, and transmission capacities. In many cases, these devices do not provide user interfaces, and they are often intended to interact without human intervention.

This document includes a collection of representative use cases for authentication and authorization in constrained environments. These use cases aim at identifying authorization problems that arise during the life cycle of a constrained device and are intended to provide a guideline for developing a comprehensive authentication and authorization solution for this class of scenarios.

Where specific details are relevant, it is assumed that the devices use the Constrained Application Protocol (CoAP) as a communication protocol. However, most conclusions apply generally.


For the definition of Status, see RFC 2026.

For the definition of Stream, see RFC 8729.




Advanced Search