Datagram Transport Layer Security (DTLS) Profile for Authentication and Authorization for Constrained Environments (ACE)
draft-gerdes-ace-dtls-authorize-01

Document Type Replaced Internet-Draft (individual)
Last updated 2017-03-13
Replaced by draft-ietf-ace-dtls-authorize
Stream (None)
Intended RFC status (None)
Formats
Expired & archived
plain text pdf html bibtex
Stream Stream state (No stream defined)
Consensus Boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Replaced by draft-ietf-ace-dtls-authorize
Telechat date
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found at
https://www.ietf.org/archive/id/draft-gerdes-ace-dtls-authorize-01.txt

Abstract

This specification defines a profile for delegating client authentication and authorization in a constrained environment by establishing a Datagram Transport Layer Security (DTLS) channel between resource-constrained nodes. The protocol relies on DTLS for communication security between entities in a constrained network. A resource-constrained node can use this protocol to delegate management of authorization information to a trusted host with less severe limitations regarding processing power and memory.

Authors

Stefanie Gerdes (gerdes@tzi.org)
Olaf Bergmann (bergmann@tzi.org)
Carsten Bormann (cabo@tzi.org)
Göran Selander (goran.selander@ericsson.com)
Ludwig Seitz (ludwig.seitz@ri.se)

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)