C3DC -- Constrained Client/Cross-Domain Capable Authorization Profile for Authentication and Authorization for Constrained Environments (ACE)
draft-gerdes-ace-c3dc-00

Document Type Expired Internet-Draft (individual)
Last updated 2019-04-26 (latest revision 2018-10-23)
Stream (None)
Intended RFC status (None)
Formats
Expired & archived
plain text pdf html bibtex
Stream Stream state (No stream defined)
Consensus Boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Expired
Telechat date
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found at
https://www.ietf.org/archive/id/draft-gerdes-ace-c3dc-00.txt

Abstract

Resource-constrained nodes come in various sizes and shapes and often have constraints on code size, state memory, processing capabilities, user interface, power and communication bandwidth (RFC 7228). This document specifies a profile that describes how two autonomous resource-constrained devices, a client and a server, obtain the required keying material and authorization information to securely communicate with each other. Each of the devices is coupled with a less-constrained device, the authorization manager, that helps with difficult authentication and authorization tasks. The constrained devices do not need to register with authorization managers from other security domains. The profile specifically targets constrained clients and servers. It is designed to consider the security objectives of the owners on the server and the client side.

Authors

Stefanie Gerdes (gerdes@tzi.org)
Olaf Bergmann (bergmann@tzi.org)
Carsten Bormann (cabo@tzi.org)

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)