Bert Greevenbosch, bert.greevenbosch@huawei.com ACE comparison Bert Greevenbosch, bert.greevenbosch@huawei.com draft-greevenbosch-ace-comparison.

Slides:



Advertisements
Similar presentations
Oct, 26 th, 2010 OGF 29, FVGA-WG: Firewall Virtualization for Grid Applications Firewall Virtualization for Grid Applications - Status update
Advertisements

External User Security Model (EUSM) for SNMPv3 draft-kaushik-snmp-external-usm-00.txt November, 2004.
Revision Week 13 – Lecture 2. The exam 5 questions Multiple parts Read the question carefully Look at the marks as an indication of how much thought and.
A Heterogeneous Network Access Service based on PERMIS and SAML Gabriel López Millán University of Murcia EuroPKI Workshop 2005.
ACE – Design Considerations Corinna Schmitt IETF ACE WG meeting July 23,
Internetworking Fundamentals (Lecture #2) Andres Rengifo Copyright 2008.
Session Policy Framework using EAP draft-mccann-session-policy-framework-using-eap-00.doc IETF 76 – Hiroshima Stephen McCann, Mike Montemurro.
OAuth/UMA for ACE 24 th March 2015 draft-maler-ace-oauth-uma-00.txt Eve Maler, Erik Wahlström, Samuel Erdtman, Hannes Tschofenig.
Authorization architecture sketches draft-selander-core-access-control-02 draft-gerdes-core-dcaf-authorize-02 draft-seitz-ace-design-considerations-00.
ACE BOF, IETF-89 London Authentication and Authorization for Constrained Environments (ACE) BOF Wed 09:00-11:30, Balmoral BOF Chairs: Kepeng Li, Hannes.
IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: Problem Statement for Authentication Signaling Optimization Date.
(Preliminary) Gap Analysis Hannes Tschofenig. Goal of this Presentation The IETF has developed a number of security technologies that are applicable to.
July 16, Diameter EAP Application (draft-ietf-aaa-eap-02.txt) on behalf of...
PAWS: Security Considerations Yizhuang WU, Yang CUI PAWS WG
Applicability and Tradeoffs of ICN for Efficient IoT draft-lindgren-icnrg-efficientiot-00 presented by Olov Schelén IRTF ICNRG IETF 90, Toronto.
Overview of analysis of existing SDO M2M architectures Group Name: REQ ARC#2 Source: Alcatel-Lucent.
Authorization GGF-6 Grid Authorization Concepts Proposed work item of Authorization WG Chicago, IL - Oct 15 th 2002 Leon Gommans Advanced Internet.
Santhosh Rajathayalan ( ) Senthil Kumar Sevugan ( )
SAML for SIP Hannes Tschofenig, Jon Peterson, James Polk, Douglas Sicker, Marcus Tegnander.
Using SAML for SIP H. Tschofenig, J. Peterson, J. Polk, D. Sicker, M. Tegnander.
Interworking with an External Dynamic Authorization System Group Name: SEC WG Source: Qualcomm Inc., Wolfgang Granzow & Phil Hawkes Meeting Date: SEC#20.2,
Washinton D.C., November 2004 IETF 61 st – mip6 WG MIPv6 authorization and configuration based on EAP (draft-giaretta-mip6-authorization-eap-02) Gerardo.
Extended QoS Authorization for the QoS NSLP Hannes Tschofenig, Joachim Kross.
DECADE Requirements draft-gu-decade-reqs-05 Yingjie Gu, David A. Bryan, Y. Richard Yang, Richard Alimi IETF-78 Maastricht, DECADE Session.
SOURCE:2014 IEEE 17TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING AUTHER: MINGLIU LIU, DESHI LI, HAILI MAO SPEAKER: JIAN-MING HONG.
CLASSe PROJECT: IMPROVING SSO IN THE CLOUD Alejandro Pérez Rafael Marín Gabriel López
OAuth2 and UMA for ACE draft-maler-ace-oauth-uma-00.txt Eve Maler, Erik Wahlström, Samuel Erdtman, Hannes Tschofenig.
MOBILE IP & IP MICRO-MOBILITY SUPPORT Presented by Maheshwarnath Behary Assisted by Vishwanee Raghoonundun Koti Choudary MSc Computer Networks Middlesex.
Relationship between peer link and physical link
Gijeong Kim ,Junho Kim ,Sungwon Lee Kyunghee University
MQTT-255 Support alternate authenticaion mechanisms
Informing AAA about what lower layer protocol is carrying EAP
OGF PGI – EDGI Security Use Case and Requirements
CSE Retargeting to AE, IPE, and NoDN Hosted Resources
CSE Retargeting to AE, IPE, and NoDN Hosted Resources
OAuth WG Conference Call, 11th Jan. 2013
Phil Hunt, Hannes Tschofenig
WMarket For Developers API && Authorization.
Trust Anchor Management Problem Statement
draft-lemonade-imap-submit-01.txt “Forward without Download”
Carrying Location Objects in RADIUS
EA C451 Vishal Gupta.
PAA-EP protocol considerations PANA wg - IETF 57 Vienna
Considering issues regarding handling token
NETLMM Applicability Draft (Summary)
Charles Clancy Katrin Hoeper IETF 73 Minneapolis, USA 17 November 2008
Demand of Being Woken Up While Moving Follow-up
KMIP Entity Object and Client Registration
Debashish Purkayastha, Dirk Trossen, Akbar Rahman
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
IEEE MEDIA INDEPENDENT HANDOVER DCN:
IEEE MEDIA INDEPENDENT HANDOVER
3GPP and SIP-AAA requirements
Web Authorization Protocol (oauth)
TGr Authentication Framework
PAA-2-EP protocol PANA wg - IETF 58 Minneapolis
TG1 Draft Topics Date: Authors: September 2012 Month Year
Relationship between peer link and physical link
IEEE MEDIA INDEPENDENT HANDOVER DCN: xx-00-0sec
TG1 Draft Topics Date: Authors: September 2012 Month Year
IEEE MEDIA INDEPENDENT HANDOVER DCN:
IEEE MEDIA INDEPENDENT HANDOVER DCN: xx-00-sec
TGr Authentication Framework
Neighbor Management Policy for 6LoWPAN Signaling and Policy guidelines
OpenID Enhanced Authentication Profile (EAP) Working Group
Subscription to Multiple Stream Originators
IEEE MEDIA INDEPENDENT HANDOVER
Lin Xiao David A. Bryan Yingjie Gu Xuan Tai
Authentication and Authorization for Constrained Environments (ACE)
Presentation transcript:

Bert Greevenbosch, bert.greevenbosch@huawei.com ACE comparison Bert Greevenbosch, bert.greevenbosch@huawei.com draft-greevenbosch-ace-comparison

Introduction draft-greevenbosch-ace-comparison compares the currently proposed solutions for ACE. It compares: DCAF draft-gerdes-ace-dcaf-authorize, draft-gerdes-ace-actors OAuth draft-tschofenig-ace-oauth-bt, draft-tschofening-ace-oauth-iot, draft-wahlstroem-ace- oauth-iot EAP draft-marin-ace-wg-coap-eap 2-way authentication for the Internet of Things (TWAI) draft-schmitt-ace-twowayauth-for-iot Pull Model draft-greevenbosch-ace-pull-model https://datatracker.ietf.org/doc/draft-greevenbosch-ace-comparison/ draft-greevenbosch-ace-comparison

Architectural models Currently, there are three architectural models on the table: Push Indirect push Pull draft-greevenbosch-ace-comparison

Push model AS 1 Client 2 3 RS 4 draft-greevenbosch-ace-comparison Advantages: Message transmission and processing workload for Resource Server is low but message transmission and processing workload for client is higher. Since Resource Server is usually the most constrained, this model is suitable for constrained environment. Disadvantages: Client may not have direct connection with Authorization Server. Ticket revocation mechanism may be needed, e.g. in case of security breach or policy modification. Without such mechanism, client is still able to access resource in accordance to old policy. draft-greevenbosch-ace-comparison

Indirect push model AS 1 Client 4 2 3 5 RS 6 Advantages: Does not require client to receive Access Ticket from Authorization Server and send it to Resource Server. Efficient if Access Ticket is large and the client is resource constrained. Disadvantages: More processes in the whole authorization flow. Adds a burden to Resource Server to cache Access Ticket. draft-greevenbosch-ace-comparison

Pull model AS Client 1 2 3 RS 4 Advantages: Still works when client cannot have direct connection with Resource Server. Disadvantages: Authorization Server works as agent, and is involved in resource access process. Logically, Authorization Server should just take care of authentication/authorization, and should not mix other functionalities. draft-greevenbosch-ace-comparison

Models in the proposals DCAF: pull model OAuth: pull model or indirect push model EAP: pull model (AAA acts as AS) TWAI: indirect push PULL: push model draft-greevenbosch-ace-comparison

Number of parties ACE: 3 or 4 (AM may be combined with client) OAuth: 3 EAP: 2 or 3 (depending on usage of AAA server) TWAI: 4/5 (gateway and access control server could be combined) PULL: 3 draft-greevenbosch-ace-comparison

Ticket format DCAF: defined for CoAP OAuth: needs definition EAP: n.a. TWAI: needs definition PULL: same as ACE draft-greevenbosch-ace-comparison

Protocol for exchange of authorisation information: DCAF: between C and AM, and between C and RS: DTLS; between AM and AS: proprietary. OAuth: between C and AS: CoAP+DTLS. Between C and RS: DTLS? EAP: CoAP TWAI: to be defined PULL: CoAP + DTLS draft-greevenbosch-ace-comparison

Client credentials DCAF: through AM (possibly AM's X.509 certificate) OAuth: out of scope EAP: out of scope TWAI: X.509 certificates PULL: out of scope draft-greevenbosch-ace-comparison

Definition of new CoAP options DCAF: no OAuth: yes, "Bearer" and "Error" EAP: maybe, "AUTH" TWAI: no PULL: re-uses new "Node-Id" option draft-greevenbosch-ace-comparison

Further considerations DCAF, TWAI and PULL were originally designed with Internet of Things applications in mind. EAP and OAuth are trying to tweak a solution that was not designed for IoT towards IoT. draft-greevenbosch-ace-comparison

Discussion material Which model do we like? How many entities do we like? What kind of access permission granuality do we want? How do we want to move forward? draft-greevenbosch-ace-comparison

Thank you! draft-greevenbosch-ace-comparison