Issue regarding authentication at MN-CSE Group Name: ARC & SEC Source: FUJITSU Meeting Date: Agenda Item: Security Admin API
Introduction Mca and Mcc of Rel-1 specification does not distinguish between user and administrator There are several reasons for separating APIs for administrator from Mca/Mcc. One example is authentication at the MN-CSE which work as registrar.
Security procedure Figure High Level Procedures on Mcc or Mca without MAF Figure MAF assisted High Level Procedures on Mcc or Mca Since credential information is managed on IN-CSE, registrar MN-CSE has to communicate with IN-CSE or MAF to authenticate Registree node.
Bypassing topology may be needed MN-CSE (registrar) ADN-AE (registree) MN-CSE (registrar) IN-CSE Register ADN-AE (registree) Register MAF
API to authenticate Input from registree – AE-ID-Stem or CSE-ID – credential – App-ID (+ Role-ID ?) to request Output for registrar – Result of authentication (grant or reject) – Assigned App-ID and/or Role-ID – Access Token to attach on request(optional)
ServiceSubscriptionProfile has to collate with credential information for specific AE/CSE ID Authentication procedure for PSK based and public-key based mutual authentication between CSEs, must be specified as part of Rel-2 specification.