Secauth Usecases and Requirements
draft-rafiee-secauth-usecase-02
Document | Type |
Expired Internet-Draft
(individual)
Expired & archived
|
|
---|---|---|---|
Author | Hosnieh Rafiee | ||
Last updated | 2015-04-25 (Latest revision 2014-10-22) | ||
RFC stream | (None) | ||
Intended RFC status | (None) | ||
Formats | |||
Stream | Stream state | (No stream defined) | |
Consensus boilerplate | Unknown | ||
RFC Editor Note | (None) | ||
IESG | IESG state | Expired | |
Telechat date | (None) | ||
Responsible AD | (None) | ||
Send notices to | (None) |
This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:
Abstract
This document aims to explain the requirement and usecases for reducing reliability gaps in first point of contact during secure authentication of nodes without the need of any CA. It focuses on use of network layer security approaches for this purpose. Privacy requirement is also one of the important topic that will be addressed in this draft. It also discusses the requirements and use cases for having a common language (protocols) for authentication/authorization in visualization environments where Software Defined Network (SDN) or Network Function Visualization (NFV) approaches are in use.
Authors
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)