Skip to main content

Last Call Review of draft-ietf-ace-usecases-09
review-ietf-ace-usecases-09-opsdir-lc-jethanandani-2015-10-26-00

Request Review of draft-ietf-ace-usecases
Requested revision No specific revision (document currently at 10)
Type Last Call Review
Team Ops Directorate (opsdir)
Deadline 2015-10-20
Requested 2015-10-09
Authors Ludwig Seitz , Stefanie Gerdes , Göran Selander , Mehdi Mani , Sandeep Kumar
I-D last updated 2015-10-26
Completed reviews Genart Last Call review of -09 by Joel M. Halpern (diff)
Secdir Last Call review of -09 by Adam W. Montville (diff)
Opsdir Last Call review of -09 by Mahesh Jethanandani (diff)
Assignment Reviewer Mahesh Jethanandani
State Completed
Request Last Call review on draft-ietf-ace-usecases by Ops Directorate Assigned
Reviewed revision 09 (document currently at 10)
Result Ready
Completed 2015-10-26
review-ietf-ace-usecases-09-opsdir-lc-jethanandani-2015-10-26-00
I have reviewed this document as part of the Operational directorate’s ongoing
effort to review all IETF documents being processed by the IESG.
 These comments were written with the intent of improving the
operational aspects of the IETF drafts. Comments that are not addressed in last
call may be included in AD reviews during the IESG review.  Document editors
and WG chairs should treat these comments just like any other last
call comments.

Document reviewed:  draft-ietf-ace-usecases-09

Status:

Ready

Summary:

This document includes a collection of representative use cases for
authentication and authorization in constrained environments.  These use cases
aim at identifying authorization problems that arise during the lifecycle of a
constrained device and are intended to provide a guideline for developing a
comprehensive authentication and authorization solution for this class of
scenarios.

The document is informational and does not define something that needs an
operational or management review.

Mahesh Jethanandani

mjethanandani at gmail.com