summaryrefslogtreecommitdiff
path: root/doc/rfc/rfc4545.txt
diff options
context:
space:
mode:
authorThomas Voss <mail@thomasvoss.com> 2024-11-27 20:54:24 +0100
committerThomas Voss <mail@thomasvoss.com> 2024-11-27 20:54:24 +0100
commit4bfd864f10b68b71482b35c818559068ef8d5797 (patch)
treee3989f47a7994642eb325063d46e8f08ffa681dc /doc/rfc/rfc4545.txt
parentea76e11061bda059ae9f9ad130a9895cc85607db (diff)
doc: Add RFC documents
Diffstat (limited to 'doc/rfc/rfc4545.txt')
-rw-r--r--doc/rfc/rfc4545.txt2411
1 files changed, 2411 insertions, 0 deletions
diff --git a/doc/rfc/rfc4545.txt b/doc/rfc/rfc4545.txt
new file mode 100644
index 0000000..a829a3c
--- /dev/null
+++ b/doc/rfc/rfc4545.txt
@@ -0,0 +1,2411 @@
+
+
+
+
+
+
+Network Working Group M. Bakke
+Request for Comments: 4545 Cisco Systems
+Category: Standards Track J. Muchow
+ Qlogic Corp.
+ May 2006
+
+
+ Definitions of Managed Objects for
+ IP Storage User Identity Authorization
+
+Status of This Memo
+
+ This document specifies an Internet standards track protocol for the
+ Internet community, and requests discussion and suggestions for
+ improvements. Please refer to the current edition of the "Internet
+ Official Protocol Standards" (STD 1) for the standardization state
+ and status of this protocol. Distribution of this memo is unlimited.
+
+Copyright Notice
+
+ Copyright (C) The Internet Society (2006).
+
+Abstract
+
+ This memo defines a portion of the Management Information Base (MIB)
+ for use with network management protocols in TCP/IP-based internets.
+ In particular, it defines objects for managing user identities and
+ the names, addresses, and credentials required manage access control,
+ for use with various protocols. This document was motivated by the
+ need for the configuration of authorized user identities for the
+ iSCSI protocol, but has been extended to be useful for other
+ protocols that have similar requirements. It is important to note
+ that this MIB module provides only the set of identities to be used
+ within access lists; it is the responsibility of other MIB modules
+ making use of this one to tie them to their own access lists or other
+ authorization control methods.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Bakke & Muchow Standards Track [Page 1]
+
+RFC 4545 IPS Authorization MIB May 2006
+
+
+Table of Contents
+
+ 1. Introduction ....................................................3
+ 2. Specification of Requirements ...................................3
+ 3. The Internet-Standard Management Framework ......................3
+ 4. Relationship to Other MIB Modules ...............................3
+ 5. Relationship to the USM MIB Module ..............................4
+ 6. Relationship to SNMP Contexts ...................................5
+ 7. Discussion ......................................................5
+ 7.1. Authorization MIB Object Model .............................5
+ 7.2. ipsAuthInstance ............................................6
+ 7.3. ipsAuthIdentity ............................................7
+ 7.4. ipsAuthIdentityName ........................................7
+ 7.5. ipsAuthIdentityAddress .....................................8
+ 7.6. ipsAuthCredential ..........................................8
+ 7.7. IP, Fibre Channel, and Other Addresses .....................9
+ 7.8. Descriptors: Using OIDs in Place of Enumerated Types ......10
+ 7.9. Notifications .............................................10
+ 8. MIB Definitions ................................................11
+ 9. Security Considerations ........................................35
+ 9.1. MIB Security Considerations ...............................35
+ 9.2. Other Security Considerations .............................38
+ 10. IANA Considerations ...........................................40
+ 11. Normative References ..........................................40
+ 12. Informative References ........................................41
+ 13. Acknowledgements ..............................................41
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Bakke & Muchow Standards Track [Page 2]
+
+RFC 4545 IPS Authorization MIB May 2006
+
+
+1. Introduction
+
+ This MIB module will be used to configure and/or look at the
+ configuration of user identities and their credential information.
+ For the purposes of this MIB module, a "user" identity does not need
+ to be an actual person; a user can also be a host, an application, a
+ cluster of hosts, or any other identifiable entity that can be
+ authorized to access a resource.
+
+ Most objects in this MIB module have a MAX-ACCESS of read-create;
+ this module is intended to allow configuration of user identities and
+ their names, addresses, and credentials. MIN-ACCESS for all objects
+ is read-only for those implementations that configure through other
+ means, but require the ability to monitor user identities.
+
+2. Specification of Requirements
+
+ The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
+ "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
+ document are to be interpreted as described in RFC 2119 [RFC2119].
+
+3. The Internet-Standard Management Framework
+
+ For a detailed overview of the documents that describe the current
+ Internet-Standard Management Framework, please refer to section 7 of
+ RFC 3410 [RFC3410].
+
+ Managed objects are accessed via a virtual information store, termed
+ the Management Information Base or MIB. MIB objects are generally
+ accessed through the Simple Network Management Protocol (SNMP).
+ Objects in the MIB are defined using the mechanisms defined in the
+ Structure of Management Information (SMI). This memo specifies a MIB
+ module that is compliant to the SMIv2, which is described in STD 58,
+ RFC 2578 [RFC2578], STD 58, RFC 2579 [RFC2579] and STD 58, RFC 2580
+ [RFC2580].
+
+4. Relationship to Other MIB Modules
+
+ The IPS-AUTH-MIB module does not directly address objects within
+ other modules. The identity address objects contain IPv4, IPv6, or
+ other address types, and as such they may be indirectly related to
+ objects within the IP [RFC4293] MIB module.
+
+ This MIB module does not provide actual authorization or access
+ control lists; it provides a means to identify entities that can be
+ included in other authorization lists. This should generally be done
+ in MIB modules that reference identities in this one. It also does
+ not cover login or authentication failure statistics or
+
+
+
+Bakke & Muchow Standards Track [Page 3]
+
+RFC 4545 IPS Authorization MIB May 2006
+
+
+ notifications, as these are all fairly application specific and are
+ not generic enough to be included here.
+
+ The user identity objects within this module are typically referenced
+ from other modules by a RowPointer within that module. A module
+ containing resources for which it requires a list of authorized user
+ identities may create such a list, with a single RowPointer within
+ each list element pointing to a user identity within this module.
+ This is neither required nor restricted by this MIB module.
+
+5. Relationship to the USM MIB Module
+
+ The User-based Security Model (USM) [RFC3414] also defines the
+ concept of a user, defining authentication and privacy protocols and
+ their credentials. The definition of USM includes the SNMP-USER-
+ BASED-SM-MIB module allows configuration of SNMPv3 user credentials
+ to protect SNMPv3 messages. Although USM's users are not related to
+ the user identities managed by the IPS-AUTH-MIB module defined in
+ this document, USM will often be implemented on the same system as
+ the IPS-AUTH-MIB module, with the SNMP-USER-BASED-SM-MIB module used
+ to manage the security protecting SNMPv3 messages, including those
+ that access the IPS-AUTH-MIB module.
+
+ The term "user" in this document is distinct from an SNMPv3 user and
+ is intended to include, but is not limited to, users of IP storage
+ devices. A "user" in this document is a collection of user names
+ (unique identifiers), user addresses, and credentials that can be
+ used together to determine whether an entity should be allowed access
+ to a resource. Each user can have multiple names, addresses, and
+ credentials. As a result, this MIB module is particularly suited to
+ managing users of storage resources, which are typically given access
+ control lists consisting of potentially multiple identifiers,
+ addresses, and credentials. This MIB module provides for
+ authorization lists only and does not include setting of data privacy
+ parameters.
+
+ In contrast, an SNMPv3 user as defined in [RFC3414] has exactly one
+ user-name, one authentication protocol, and one privacy protocol,
+ along with their associated information and SNMP-specific
+ information, such as an engine ID. These objects are defined to
+ support exactly the information needed for SNMPv3 security.
+
+ For the remainder of this document, the term "user" means an IPS-
+ AUTH-MIB user identity.
+
+
+
+
+
+
+
+Bakke & Muchow Standards Track [Page 4]
+
+RFC 4545 IPS Authorization MIB May 2006
+
+
+6. Relationship to SNMP Contexts
+
+ Each non-scalar object in the IPS-AUTH-MIB module is indexed first by
+ an instance. Each instance is a collection of identities that can be
+ used to authorize access to a resource. The use of an instance works
+ well with partitionable or hierarchical devices and fits in logically
+ with other management schemes. Instances do not replace SNMP
+ contexts; however, they do provide a very simple way to assign a
+ collection of identities within a device to one or more SNMP
+ contexts, without having to do so for each identity's row.
+
+7. Discussion
+
+ This MIB module structure is intended to allow the configuration of a
+ list of user identities, each with a list of names, addresses,
+ credentials, and certificates that, when combined, will distinguish
+ that identity.
+
+ The IPS-AUTH-MIB module is structured around two primary "objects",
+ the authorization instance and the identity, which serve as
+ containers for the remainder of the objects. This section contains a
+ brief description of the "object" hierarchy and a description of each
+ object, followed by a discussion of the actual SNMP table structure
+ within the objects.
+
+7.1. Authorization MIB Object Model
+
+ The top-level object in this structure is the authorization instance,
+ which "contains" all of the other objects. The indexing hierarchy of
+ this module looks like:
+
+ ipsAuthInstance
+ -- A distinct authorization entity within the managed system.
+ -- Most implementations will have just one of these.
+ ipsAuthIdentity
+ -- A user identity, consisting of a set of identity names,
+ -- addresses, and credentials reflected in the following
+ -- objects:
+ ipsAuthIdentityName
+ -- A name for a user identity. A name should be globally
+ -- unique, and unchanging over time. Some protocols may
+ -- not require this one.
+ ipsAuthIdentityAddress
+ -- An address range, typically but not necessarily an
+ -- IPv4, IPv6, or Fibre Channel address range, at which
+ -- the identity is allowed to reside.
+ ipsAuthCredential
+ -- A single credential, such as a CHAP username,
+
+
+
+Bakke & Muchow Standards Track [Page 5]
+
+RFC 4545 IPS Authorization MIB May 2006
+
+
+ -- which can be used to verify the identity.
+ ipsAuthCredChap
+ -- CHAP-specific attributes for an ipsAuthCredential
+ ipsAuthCredSrp
+ -- SRP-specific attributes
+ ipsAuthCredKerberos
+ -- Kerberos-specific attributes
+
+ Each identity contains the information necessary to identify a
+ particular end-point that wishes to access a service, such as iSCSI.
+
+ An identity can contain multiple names, addresses, and credentials.
+ Each of these names, addresses, and credentials exists in its own
+ row. If multiple rows of one of these three types are present, they
+ are treated in an "OR" fashion; an entity to be authorized need only
+ match one of the rows. If rows of different types are present (e.g.,
+ a name and an address), these are treated in an "AND" fashion; an
+ entity to be authorized must match at least one row from each
+ category. If there are no rows present of a category, this category
+ is ignored.
+
+ For example, if an ipsAuthIdentity contains two rows of
+ ipsAuthIdentityAddress, one row of ipsAuthCredential, and no rows of
+ ipsAuthIdentityName, an entity must match the Credential row and at
+ least one of the two Address rows to match the identity.
+
+ Index values such as ipsAuthInstIndex and ipsAuthIdentIndex are
+ referenced in multiple tables, and rows can be added and deleted. An
+ implementation should therefore attempt to keep all index values
+ persistent across reboots; index values for rows that have been
+ deleted must not be reused before a reboot.
+
+7.2. ipsAuthInstance
+
+ The ipsAuthInstanceAttributesTable is the primary table of the IPS-
+ AUTH-MIB module. Every other table entry in this module includes the
+ index of an ipsAuthInstanceAttributesEntry as its primary index. An
+ authorization instance is basically a managed set of identities.
+
+ Many implementations will include just one authorization instance row
+ in this table. However, there will be cases where multiple rows in
+ this table may be used:
+
+ - A large system may be "partitioned" into multiple, distinct
+ virtual systems, perhaps sharing the SNMP agent but not their
+ lists of identities. Each virtual system would have its own
+ authorization instance.
+
+
+
+
+Bakke & Muchow Standards Track [Page 6]
+
+RFC 4545 IPS Authorization MIB May 2006
+
+
+ - A set of stackable systems, each with its own set of identities,
+ may be represented by a common SNMP agent. Each individual
+ system would have its own authorization instance.
+
+ - Multiple protocols, each with its own set of identities, may
+ exist within a single system and be represented by a single SNMP
+ agent. In this case, each protocol may have its own
+ authorization instance.
+
+ An entry in this table is often referenced by its name
+ (ipsAuthInstDescr), which should be displayed to the user by the
+ management station. When an implementation supports only one entry
+ in this table, the description may be returned as a zero-length
+ string.
+
+7.3. ipsAuthIdentity
+
+ The ipsAuthIdentAttributesTable contains one entry for each
+ configured user identity. The identity contains only a description
+ of what the identity is used for; its attributes are all contained in
+ other tables, since they can each have multiple values.
+
+ Other MIB modules containing lists of users authorized to access a
+ particular resource should generally contain a RowPointer to the
+ ipsAuthIdentAttributesEntry that will, if authenticated, be allowed
+ access to the resource.
+
+ All other table entries make use of the indices to this table as
+ their primary indices.
+
+7.4. ipsAuthIdentityName
+
+ The ipsAuthIdentNameAttributesTable contains a list of UTF-8 names,
+ each of which belongs to, and may be used to identify, a particular
+ identity in the authIdentity table.
+
+ Implementations making use of the IPS-AUTH-MIB module may identify
+ their resources by names, addresses, or both. A name is typically a
+ unique (within the required scope), unchanging identifier for a
+ resource. It will normally meet some or all of the requirements for
+ a Uniform Resource Name [RFC1737], although a name in the context of
+ this MIB module does not need to be a URN. Identifiers that
+ typically change over time should generally be placed into the
+ ipsAuthIdentityAddress table; names that have no uniqueness
+ properties should usually be placed into the description attribute
+ for the identity.
+
+
+
+
+
+Bakke & Muchow Standards Track [Page 7]
+
+RFC 4545 IPS Authorization MIB May 2006
+
+
+ An example of an identity name is the iSCSI Name, defined in
+ [RFC3720]. Any other MIB module defining names to be used as
+ ipsAuthIdentityName objects should specify how its names are unique,
+ and the domain within which they are unique.
+
+ If this table contains no entries associated with a particular user
+ identity, the implementation does not need to check any name
+ parameters when verifying that identity. If the table contains
+ multiple entries associated with a particular user identity, the
+ implementation should consider a match with any one of these entries
+ to be valid.
+
+7.5. ipsAuthIdentityAddress
+
+ The ipsAuthIdentAddrAttributesTable contains a list of addresses at
+ which the identity may reside. For example, an identity may be
+ allowed access to a resource only from a certain IP address, or only
+ if its address is in a certain range or set of ranges.
+
+ Each entry contains a starting and ending address. If a single
+ address is desired in the list, both starting and ending addresses
+ must be identical.
+
+ Each entry contains an AddrType attribute. This attribute contains
+ an enumeration registered as an IANA Address Family type [IANA-AF].
+ Although many implementations will use IPv4 or IPv6 address types for
+ these entries, any IANA-registered type may be used, as long as it
+ makes sense to the application.
+
+ Matching any address within any range within the list associated with
+ a particular identity is considered a valid match. If no entries are
+ present in this list for a given identity, its address is
+ automatically assumed to match the identity.
+
+ Netmasks are not supported, since an address range can express the
+ same thing with more flexibility. An application specifying
+ addresses using network masks may do so, and convert to and from
+ address ranges when reading or writing this MIB module.
+
+7.6. ipsAuthCredential
+
+ The ipsAuthCredentialAttributesTable contains a list of credentials,
+ each of which may be used to verify a particular identity.
+
+
+
+
+
+
+
+
+Bakke & Muchow Standards Track [Page 8]
+
+RFC 4545 IPS Authorization MIB May 2006
+
+
+ Each credential contains an authentication method to be used, such as
+ CHAP [RFC1994], SRP [RFC2945], or Kerberos [RFC4120]. This attribute
+ contains an object identifier instead of an enumerated type, allowing
+ other MIB modules to add their own authentication methods, without
+ modifying this MIB module.
+
+ For each entry in this table, there will exist an entry in another
+ table containing its attributes. The table in which to place the
+ entry depends on the AuthMethod attribute:
+
+ CHAP If the AuthMethod is set to the CHAP OID, an entry using the
+ same indices as the ipsAuthCredential will exist in the
+ ipsAuthCredChap table, which contains the CHAP username.
+
+ SRP If the AuthMethod is set to the SRP OID, an entry using the
+ same indices as the ipsAuthCredential will exist in the
+ ipsAuthCredSrp table, which contains the SRP username.
+
+ Kerberos If the AuthMethod is set to the Kerberos OID, an entry using
+ the same indices as the ipsAuthCredential will exist in the
+ ipsAuthCredKerberos table, which contains the Kerberos
+ principal.
+
+ Other If the AuthMethod is set to any OID not defined in this
+ module, an entry using the same indices as the
+ ipsAuthCredential entry should be placed in the other module
+ that define whatever attributes are needed for that type of
+ credential.
+
+ An additional credential type can be added to this MIB module by
+ defining a new OID in the ipsAuthMethodTypes subtree, and defining a
+ new table specific to that credential type.
+
+7.7. IP, Fibre Channel, and Other Addresses
+
+ The IP addresses in this MIB module are represented by two
+ attributes, one of type AddressFamilyNumbers, and the other of type
+ AuthAddress. Each address can take on any of the types within the
+ list of address family numbers; the most likely being IPv4, IPv6, or
+ one of the Fibre Channel address types.
+
+ The type AuthAddress is an octet string. If the address family is
+ IPv4 or IPv6, the format is taken from the InetAddress specified in
+ [RFC4001]. If the address family is one of the Fibre Channel types,
+ the format is identical to the FcNameIdOrZero type defined in
+ [RFC4044].
+
+
+
+
+
+Bakke & Muchow Standards Track [Page 9]
+
+RFC 4545 IPS Authorization MIB May 2006
+
+
+7.8. Descriptors: Using OIDs in Place of Enumerated Types
+
+ Some attributes, particularly the authentication method attribute,
+ would normally require an enumerated type. However, implementations
+ will likely need to add new authentication method types of their own,
+ without extending this MIB module. To make this work, this module
+ defines a set of object identities within ipsAuthDescriptors. Each
+ of these object identities is basically an enumerated type.
+
+ Attributes that make use of these object identities have a value that
+ is an OID instead of an enumerated type. These OIDs can either
+ indicate the object identities defined in this module, or object
+ identities defined elsewhere, such as in an enterprise MIB module.
+ Those implementations that add their own authentication methods
+ should also define a corresponding object identity for each of these
+ methods within their own enterprise MIB module, and return its OID
+ whenever one of these attributes is using that method.
+
+7.9. Notifications
+
+ Monitoring of authentication failures and other notification events
+ are outside the scope of this MIB module, as they are generally
+ application specific. No notifications are provided or required.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Bakke & Muchow Standards Track [Page 10]
+
+RFC 4545 IPS Authorization MIB May 2006
+
+
+8. MIB Definitions
+
+ IPS-AUTH-MIB DEFINITIONS ::= BEGIN
+
+ IMPORTS
+ MODULE-IDENTITY, OBJECT-TYPE, OBJECT-IDENTITY, Unsigned32,
+ mib-2
+ FROM SNMPv2-SMI
+
+ TEXTUAL-CONVENTION, RowStatus, AutonomousType, StorageType
+ FROM SNMPv2-TC
+
+ MODULE-COMPLIANCE, OBJECT-GROUP
+ FROM SNMPv2-CONF
+
+ SnmpAdminString
+ FROM SNMP-FRAMEWORK-MIB -- RFC 3411
+
+ AddressFamilyNumbers
+ FROM IANA-ADDRESS-FAMILY-NUMBERS-MIB
+ ;
+
+ ipsAuthMibModule MODULE-IDENTITY
+ LAST-UPDATED "200605220000Z" -- May 22, 2006
+ ORGANIZATION "IETF IPS Working Group"
+ CONTACT-INFO
+ "
+ Mark Bakke
+ Postal: Cisco Systems, Inc
+ 7900 International Drive, Suite 400
+ Bloomington, MN
+ USA 55425
+
+ E-mail: mbakke@cisco.com
+
+ James Muchow
+ Postal: Qlogic Corp.
+ 6321 Bury Dr.
+ Eden Prairie, MN
+ USA 55346
+
+ E-Mail: james.muchow@qlogic.com"
+
+ DESCRIPTION
+ "The IP Storage Authorization MIB module.
+ Copyright (C) The Internet Society (2006). This version of
+ this MIB module is part of RFC 4545; see the RFC itself for
+ full legal notices."
+
+
+
+Bakke & Muchow Standards Track [Page 11]
+
+RFC 4545 IPS Authorization MIB May 2006
+
+
+ REVISION "200605220000Z" -- May 22, 2006
+ DESCRIPTION
+ "Initial version of the IP Storage Authentication MIB module,
+ published as RFC 4545"
+
+ ::= { mib-2 141 }
+
+ ipsAuthNotifications OBJECT IDENTIFIER ::= { ipsAuthMibModule 0 }
+ ipsAuthObjects OBJECT IDENTIFIER ::= { ipsAuthMibModule 1 }
+ ipsAuthConformance OBJECT IDENTIFIER ::= { ipsAuthMibModule 2 }
+
+ -- Textual Conventions
+
+ IpsAuthAddress ::= TEXTUAL-CONVENTION
+ STATUS current
+ DESCRIPTION
+ "IP Storage requires the use of address information
+ that uses not only the InetAddress type defined in the
+ INET-ADDRESS-MIB, but also Fibre Channel type defined
+ in the Fibre Channel Management MIB. Although these
+ address types are recognized in the IANA Address Family
+ Numbers MIB, the addressing mechanisms have not been
+ merged into a well-known, common type. This data type,
+ the IpsAuthAddress, performs the merging for this MIB
+ module.
+
+ The formats of objects of this type are determined by
+ a corresponding object with syntax AddressFamilyNumbers,
+ and thus every object defined using this TC must
+ identify the object with syntax AddressFamilyNumbers
+ that specifies its type.
+
+ The syntax and semantics of this object depend on the
+ identified AddressFamilyNumbers object as follows:
+
+ AddressFamilyNumbers this object
+ ==================== ===========
+ ipV4(1) restricted to the same syntax and
+ semantics as the InetAddressIPv4 TC.
+
+ ipV6(2) restricted to the same syntax and
+ semantics as the InetAddressIPv6 TC.
+
+ fibreChannelWWPN (22)
+ & fibreChannelWWNN(23) restricted to the same syntax and
+ semantics as the FcNameIdOrZero TC.
+
+ Types other than the above should not be used unless
+
+
+
+Bakke & Muchow Standards Track [Page 12]
+
+RFC 4545 IPS Authorization MIB May 2006
+
+
+ the corresponding format of the IpsAuthAddress object is
+ further specified (e.g., in a future revision of this TC)."
+ REFERENCE
+ "IANA-ADDRESS-FAMILY-NUMBERS-MIB;
+ INET-ADDRESS-MIB (RFC 4001);
+ FC-MGMT-MIB (RFC 4044)."
+ SYNTAX OCTET STRING (SIZE(0..255))
+
+ --******************************************************************
+
+ ipsAuthDescriptors OBJECT IDENTIFIER ::= { ipsAuthObjects 1 }
+
+ ipsAuthMethodTypes OBJECT-IDENTITY
+ STATUS current
+ DESCRIPTION
+ "Registration point for Authentication Method Types."
+ REFERENCE "RFC 3720, iSCSI Protocol Specification."
+ ::= { ipsAuthDescriptors 1 }
+
+ ipsAuthMethodNone OBJECT-IDENTITY
+ STATUS current
+ DESCRIPTION
+ "The authoritative identifier when no authentication
+ method is used."
+ REFERENCE "RFC 3720, iSCSI Protocol Specification."
+ ::= { ipsAuthMethodTypes 1 }
+
+ ipsAuthMethodSrp OBJECT-IDENTITY
+ STATUS current
+ DESCRIPTION
+ "The authoritative identifier when the authentication
+ method is SRP."
+ REFERENCE "RFC 3720, iSCSI Protocol Specification."
+ ::= { ipsAuthMethodTypes 2 }
+
+ ipsAuthMethodChap OBJECT-IDENTITY
+ STATUS current
+ DESCRIPTION
+ "The authoritative identifier when the authentication
+ method is CHAP."
+ REFERENCE "RFC 3720, iSCSI Protocol Specification."
+ ::= { ipsAuthMethodTypes 3 }
+
+ ipsAuthMethodKerberos OBJECT-IDENTITY
+ STATUS current
+ DESCRIPTION
+ "The authoritative identifier when the authentication
+ method is Kerberos."
+
+
+
+Bakke & Muchow Standards Track [Page 13]
+
+RFC 4545 IPS Authorization MIB May 2006
+
+
+ REFERENCE "RFC 3720, iSCSI Protocol Specification."
+ ::= { ipsAuthMethodTypes 4 }
+
+ --******************************************************************
+
+ ipsAuthInstance OBJECT IDENTIFIER ::= { ipsAuthObjects 2 }
+
+ -- Instance Attributes Table
+
+ ipsAuthInstanceAttributesTable OBJECT-TYPE
+ SYNTAX SEQUENCE OF IpsAuthInstanceAttributesEntry
+ MAX-ACCESS not-accessible
+ STATUS current
+ DESCRIPTION
+ "A list of Authorization instances present on the system."
+ ::= { ipsAuthInstance 2 }
+
+ ipsAuthInstanceAttributesEntry OBJECT-TYPE
+ SYNTAX IpsAuthInstanceAttributesEntry
+ MAX-ACCESS not-accessible
+ STATUS current
+ DESCRIPTION
+ "An entry (row) containing management information
+ applicable to a particular Authorization instance."
+ INDEX { ipsAuthInstIndex }
+ ::= { ipsAuthInstanceAttributesTable 1 }
+
+ IpsAuthInstanceAttributesEntry ::= SEQUENCE {
+ ipsAuthInstIndex Unsigned32,
+ ipsAuthInstDescr SnmpAdminString,
+ ipsAuthInstStorageType StorageType
+ }
+
+ ipsAuthInstIndex OBJECT-TYPE
+ SYNTAX Unsigned32 (1..4294967295)
+ MAX-ACCESS not-accessible
+ STATUS current
+ DESCRIPTION
+ "An arbitrary integer used to uniquely identify a
+ particular authorization instance. This index value
+ must not be modified or reused by an agent unless
+ a reboot has occurred. An agent should attempt to
+ keep this value persistent across reboots."
+ ::= { ipsAuthInstanceAttributesEntry 1 }
+
+ ipsAuthInstDescr OBJECT-TYPE
+ SYNTAX SnmpAdminString
+ MAX-ACCESS read-write
+
+
+
+Bakke & Muchow Standards Track [Page 14]
+
+RFC 4545 IPS Authorization MIB May 2006
+
+
+ STATUS current
+ DESCRIPTION
+ "A character string, determined by the implementation to
+ describe the authorization instance. When only a single
+ instance is present, this object may be set to the
+ zero-length string; with multiple authorization
+ instances, it must be set to a unique value in an
+ implementation-dependent manner to describe the purpose
+ of the respective instance. If this is deployed in a
+ master agent with more than one subagent implementing
+ this MIB module, the master agent is responsible for
+ ensuring that this object is unique across all
+ subagents."
+ ::= { ipsAuthInstanceAttributesEntry 2 }
+
+ ipsAuthInstStorageType OBJECT-TYPE
+ SYNTAX StorageType
+ MAX-ACCESS read-write
+ STATUS current
+ DESCRIPTION
+ "The storage type for all read-write objects within this
+ row. Rows in this table are always created via an
+ external process, and may have a storage type of readOnly
+ or permanent. Conceptual rows having the value 'permanent'
+ need not allow write access to any columnar objects in
+ the row.
+
+ If this object has the value 'volatile', modifications
+ to read-write objects in this row are not persistent
+ across reboots. If this object has the value
+ 'nonVolatile', modifications to objects in this row
+ are persistent.
+
+ An implementation may choose to allow this object
+ to be set to either 'nonVolatile' or 'volatile',
+ allowing the management application to choose this
+ behavior."
+ DEFVAL { volatile }
+ ::= { ipsAuthInstanceAttributesEntry 3 }
+
+ ipsAuthIdentity OBJECT IDENTIFIER ::= { ipsAuthObjects 3 }
+
+ -- User Identity Attributes Table
+
+ ipsAuthIdentAttributesTable OBJECT-TYPE
+ SYNTAX SEQUENCE OF IpsAuthIdentAttributesEntry
+ MAX-ACCESS not-accessible
+ STATUS current
+
+
+
+Bakke & Muchow Standards Track [Page 15]
+
+RFC 4545 IPS Authorization MIB May 2006
+
+
+ DESCRIPTION
+ "A list of user identities, each belonging to a
+ particular ipsAuthInstance."
+ ::= { ipsAuthIdentity 1 }
+
+ ipsAuthIdentAttributesEntry OBJECT-TYPE
+ SYNTAX IpsAuthIdentAttributesEntry
+ MAX-ACCESS not-accessible
+ STATUS current
+ DESCRIPTION
+ "An entry (row) containing management information
+ describing a user identity within an authorization
+ instance on this node."
+ INDEX { ipsAuthInstIndex, ipsAuthIdentIndex }
+ ::= { ipsAuthIdentAttributesTable 1 }
+
+ IpsAuthIdentAttributesEntry ::= SEQUENCE {
+ ipsAuthIdentIndex Unsigned32,
+ ipsAuthIdentDescription SnmpAdminString,
+ ipsAuthIdentRowStatus RowStatus,
+ ipsAuthIdentStorageType StorageType
+ }
+
+ ipsAuthIdentIndex OBJECT-TYPE
+ SYNTAX Unsigned32 (1..4294967295)
+ MAX-ACCESS not-accessible
+ STATUS current
+ DESCRIPTION
+ "An arbitrary integer used to uniquely identify a
+ particular identity instance within an authorization
+ instance present on the node. This index value
+ must not be modified or reused by an agent unless
+ a reboot has occurred. An agent should attempt to
+ keep this value persistent across reboots."
+ ::= { ipsAuthIdentAttributesEntry 1 }
+
+ ipsAuthIdentDescription OBJECT-TYPE
+ SYNTAX SnmpAdminString
+ MAX-ACCESS read-create
+ STATUS current
+ DESCRIPTION
+ "A character string describing this particular identity."
+ ::= { ipsAuthIdentAttributesEntry 2 }
+
+ ipsAuthIdentRowStatus OBJECT-TYPE
+ SYNTAX RowStatus
+ MAX-ACCESS read-create
+ STATUS current
+
+
+
+Bakke & Muchow Standards Track [Page 16]
+
+RFC 4545 IPS Authorization MIB May 2006
+
+
+ DESCRIPTION
+ "This field allows entries to be dynamically added and
+ removed from this table via SNMP. When adding a row to
+ this table, all non-Index/RowStatus objects must be set.
+ Rows may be discarded using RowStatus. The value of
+ ipsAuthIdentDescription may be set while
+ ipsAuthIdentRowStatus is 'active'."
+ ::= { ipsAuthIdentAttributesEntry 3 }
+
+ ipsAuthIdentStorageType OBJECT-TYPE
+ SYNTAX StorageType
+ MAX-ACCESS read-create
+ STATUS current
+ DESCRIPTION
+ "The storage type for all read-create objects in this row.
+ Rows in this table that were created through an external
+ process may have a storage type of readOnly or permanent.
+ Conceptual rows having the value 'permanent' need not
+ allow write access to any columnar objects in the row."
+ DEFVAL { nonVolatile }
+ ::= { ipsAuthIdentAttributesEntry 4 }
+
+ ipsAuthIdentityName OBJECT IDENTIFIER ::= { ipsAuthObjects 4 }
+
+ -- User Initiator Name Attributes Table
+
+ ipsAuthIdentNameAttributesTable OBJECT-TYPE
+ SYNTAX SEQUENCE OF IpsAuthIdentNameAttributesEntry
+ MAX-ACCESS not-accessible
+ STATUS current
+ DESCRIPTION
+ "A list of unique names that can be used to positively
+ identify a particular user identity."
+ ::= { ipsAuthIdentityName 1 }
+
+ ipsAuthIdentNameAttributesEntry OBJECT-TYPE
+ SYNTAX IpsAuthIdentNameAttributesEntry
+ MAX-ACCESS not-accessible
+ STATUS current
+ DESCRIPTION
+ "An entry (row) containing management information
+ applicable to a unique identity name, which can be used
+ to identify a user identity within a particular
+ authorization instance."
+ INDEX { ipsAuthInstIndex, ipsAuthIdentIndex,
+ ipsAuthIdentNameIndex }
+ ::= { ipsAuthIdentNameAttributesTable 1 }
+
+
+
+
+Bakke & Muchow Standards Track [Page 17]
+
+RFC 4545 IPS Authorization MIB May 2006
+
+
+ IpsAuthIdentNameAttributesEntry ::= SEQUENCE {
+ ipsAuthIdentNameIndex Unsigned32,
+ ipsAuthIdentName SnmpAdminString,
+ ipsAuthIdentNameRowStatus RowStatus,
+ ipsAuthIdentNameStorageType StorageType
+ }
+
+ ipsAuthIdentNameIndex OBJECT-TYPE
+ SYNTAX Unsigned32 (1..4294967295)
+ MAX-ACCESS not-accessible
+ STATUS current
+ DESCRIPTION
+ "An arbitrary integer used to uniquely identify a
+ particular identity name instance within an
+ ipsAuthIdentity within an authorization instance.
+ This index value must not be modified or reused by
+ an agent unless a reboot has occurred. An agent
+ should attempt to keep this value persistent across
+ reboots."
+ ::= { ipsAuthIdentNameAttributesEntry 1 }
+
+ ipsAuthIdentName OBJECT-TYPE
+ SYNTAX SnmpAdminString
+ MAX-ACCESS read-create
+ STATUS current
+ DESCRIPTION
+ "A character string that is the unique name of an
+ identity that may be used to identify this ipsAuthIdent
+ entry."
+ ::= { ipsAuthIdentNameAttributesEntry 2 }
+
+ ipsAuthIdentNameRowStatus OBJECT-TYPE
+ SYNTAX RowStatus
+ MAX-ACCESS read-create
+ STATUS current
+ DESCRIPTION
+ "This field allows entries to be dynamically added and
+ removed from this table via SNMP. When adding a row to
+ this table, all non-Index/RowStatus objects must be set.
+ Rows may be discarded using RowStatus. The value of
+ ipsAuthIdentName may be set when this value is 'active'."
+ ::= { ipsAuthIdentNameAttributesEntry 3 }
+
+ ipsAuthIdentNameStorageType OBJECT-TYPE
+ SYNTAX StorageType
+ MAX-ACCESS read-create
+ STATUS current
+ DESCRIPTION
+
+
+
+Bakke & Muchow Standards Track [Page 18]
+
+RFC 4545 IPS Authorization MIB May 2006
+
+
+ "The storage type for all read-create objects in this row.
+ Rows in this table that were created through an external
+ process may have a storage type of readOnly or permanent.
+ Conceptual rows having the value 'permanent' need not
+ allow write access to any columnar objects in the row."
+ DEFVAL { nonVolatile }
+ ::= { ipsAuthIdentNameAttributesEntry 4 }
+
+ ipsAuthIdentityAddress OBJECT IDENTIFIER ::= { ipsAuthObjects 5 }
+
+ -- User Initiator Address Attributes Table
+
+ ipsAuthIdentAddrAttributesTable OBJECT-TYPE
+ SYNTAX SEQUENCE OF IpsAuthIdentAddrAttributesEntry
+ MAX-ACCESS not-accessible
+ STATUS current
+ DESCRIPTION
+ "A list of address ranges that are allowed to serve
+ as the endpoint addresses of a particular identity.
+ An address range includes a starting and ending address
+ and an optional netmask, and an address type indicator,
+ which can specify whether the address is IPv4, IPv6,
+ FC-WWPN, or FC-WWNN."
+ ::= { ipsAuthIdentityAddress 1 }
+
+ ipsAuthIdentAddrAttributesEntry OBJECT-TYPE
+ SYNTAX IpsAuthIdentAddrAttributesEntry
+ MAX-ACCESS not-accessible
+ STATUS current
+ DESCRIPTION
+ "An entry (row) containing management information
+ applicable to an address range that is used as part
+ of the authorization of an identity
+ within an authorization instance on this node."
+ INDEX { ipsAuthInstIndex, ipsAuthIdentIndex,
+ ipsAuthIdentAddrIndex }
+ ::= { ipsAuthIdentAddrAttributesTable 1 }
+
+ IpsAuthIdentAddrAttributesEntry ::= SEQUENCE {
+ ipsAuthIdentAddrIndex Unsigned32,
+ ipsAuthIdentAddrType AddressFamilyNumbers,
+ ipsAuthIdentAddrStart IpsAuthAddress,
+ ipsAuthIdentAddrEnd IpsAuthAddress,
+ ipsAuthIdentAddrRowStatus RowStatus,
+ ipsAuthIdentAddrStorageType StorageType
+ }
+
+ ipsAuthIdentAddrIndex OBJECT-TYPE
+
+
+
+Bakke & Muchow Standards Track [Page 19]
+
+RFC 4545 IPS Authorization MIB May 2006
+
+
+ SYNTAX Unsigned32 (1..4294967295)
+ MAX-ACCESS not-accessible
+ STATUS current
+ DESCRIPTION
+ "An arbitrary integer used to uniquely identify a
+ particular ipsAuthIdentAddress instance within an
+ ipsAuthIdentity within an authorization instance
+ present on the node.
+ This index value must not be modified or reused by
+ an agent unless a reboot has occurred. An agent
+ should attempt to keep this value persistent across
+ reboots."
+ ::= { ipsAuthIdentAddrAttributesEntry 1 }
+
+ ipsAuthIdentAddrType OBJECT-TYPE
+ SYNTAX AddressFamilyNumbers
+ MAX-ACCESS read-create
+ STATUS current
+ DESCRIPTION
+ "The address types used in the ipsAuthIdentAddrStart
+ and ipsAuthAddrEnd objects. This type is taken
+ from the IANA address family types."
+ ::= { ipsAuthIdentAddrAttributesEntry 2 }
+
+ ipsAuthIdentAddrStart OBJECT-TYPE
+ SYNTAX IpsAuthAddress
+ MAX-ACCESS read-create
+ STATUS current
+ DESCRIPTION
+ "The starting address of the allowed address range.
+ The format of this object is determined by
+ ipsAuthIdentAddrType."
+ ::= { ipsAuthIdentAddrAttributesEntry 3 }
+
+ ipsAuthIdentAddrEnd OBJECT-TYPE
+ SYNTAX IpsAuthAddress
+ MAX-ACCESS read-create
+ STATUS current
+ DESCRIPTION
+ "The ending address of the allowed address range.
+ If the ipsAuthIdentAddrEntry specifies a single
+ address, this shall match the ipsAuthIdentAddrStart.
+ The format of this object is determined by
+ ipsAuthIdentAddrType."
+ ::= { ipsAuthIdentAddrAttributesEntry 4 }
+
+ ipsAuthIdentAddrRowStatus OBJECT-TYPE
+ SYNTAX RowStatus
+
+
+
+Bakke & Muchow Standards Track [Page 20]
+
+RFC 4545 IPS Authorization MIB May 2006
+
+
+ MAX-ACCESS read-create
+ STATUS current
+ DESCRIPTION
+ "This field allows entries to be dynamically added and
+ removed from this table via SNMP. When adding a row to
+ this table, all non-Index/RowStatus objects must be set.
+ Rows may be discarded using RowStatus. The values of
+ ipsAuthIdentAddrStart and ipsAuthIdentAddrEnd may be set
+ when this value is 'active'. The value of
+ ipsAuthIdentAddrType may not be set when this value is
+ 'active'."
+ ::= { ipsAuthIdentAddrAttributesEntry 5 }
+
+ ipsAuthIdentAddrStorageType OBJECT-TYPE
+ SYNTAX StorageType
+ MAX-ACCESS read-create
+ STATUS current
+ DESCRIPTION
+ "The storage type for all read-create objects in this row.
+ Rows in this table that were created through an external
+ process may have a storage type of readOnly or permanent.
+ Conceptual rows having the value 'permanent' need not
+ allow write access to any columnar objects in the row."
+ DEFVAL { nonVolatile }
+ ::= { ipsAuthIdentAddrAttributesEntry 6 }
+
+ ipsAuthCredential OBJECT IDENTIFIER ::= { ipsAuthObjects 6 }
+
+ -- Credential Attributes Table
+
+ ipsAuthCredentialAttributesTable OBJECT-TYPE
+ SYNTAX SEQUENCE OF IpsAuthCredentialAttributesEntry
+ MAX-ACCESS not-accessible
+ STATUS current
+ DESCRIPTION
+ "A list of credentials related to user identities
+ that are allowed as valid authenticators of the
+ particular identity."
+ ::= { ipsAuthCredential 1 }
+
+ ipsAuthCredentialAttributesEntry OBJECT-TYPE
+ SYNTAX IpsAuthCredentialAttributesEntry
+ MAX-ACCESS not-accessible
+ STATUS current
+ DESCRIPTION
+ "An entry (row) containing management information
+ applicable to a credential that verifies a user
+ identity within an authorization instance.
+
+
+
+Bakke & Muchow Standards Track [Page 21]
+
+RFC 4545 IPS Authorization MIB May 2006
+
+
+ To provide complete information in this MIB for a credential,
+ the management station must not only create the row in this
+ table but must also create a row in another table, where the
+ other table is determined by the value of
+ ipsAuthCredAuthMethod, e.g., if ipsAuthCredAuthMethod has the
+ value ipsAuthMethodChap, a row must be created in the
+ ipsAuthCredChapAttributesTable."
+ INDEX { ipsAuthInstIndex, ipsAuthIdentIndex, ipsAuthCredIndex }
+ ::= { ipsAuthCredentialAttributesTable 1 }
+
+ IpsAuthCredentialAttributesEntry ::= SEQUENCE {
+ ipsAuthCredIndex Unsigned32,
+ ipsAuthCredAuthMethod AutonomousType,
+ ipsAuthCredRowStatus RowStatus,
+ ipsAuthCredStorageType StorageType
+ }
+
+ ipsAuthCredIndex OBJECT-TYPE
+ SYNTAX Unsigned32 (1..4294967295)
+ MAX-ACCESS not-accessible
+ STATUS current
+ DESCRIPTION
+ "An arbitrary integer used to uniquely identify a
+ particular Credential instance within an instance
+ present on the node.
+ This index value must not be modified or reused by
+ an agent unless a reboot has occurred. An agent
+ should attempt to keep this value persistent across
+ reboots."
+ ::= { ipsAuthCredentialAttributesEntry 1 }
+
+ ipsAuthCredAuthMethod OBJECT-TYPE
+ SYNTAX AutonomousType
+ MAX-ACCESS read-create
+ STATUS current
+ DESCRIPTION
+ "This object contains an OBJECT IDENTIFIER
+ that identifies the authentication method
+ used with this credential.
+
+ When a row is created in this table, a corresponding
+ row must be created by the management station
+ in a corresponding table specified by this value.
+
+ When a row is deleted from this table, the corresponding
+ row must be automatically deleted by the agent in
+ the corresponding table specified by this value.
+
+
+
+
+Bakke & Muchow Standards Track [Page 22]
+
+RFC 4545 IPS Authorization MIB May 2006
+
+
+ If the value of this object is ipsAuthMethodNone, no
+ corresponding rows are created or deleted from other
+ tables.
+
+ Some standardized values for this object are defined
+ within the ipsAuthMethodTypes subtree."
+ ::= { ipsAuthCredentialAttributesEntry 2 }
+
+ ipsAuthCredRowStatus OBJECT-TYPE
+ SYNTAX RowStatus
+ MAX-ACCESS read-create
+ STATUS current
+ DESCRIPTION
+ "This field allows entries to be dynamically added and
+ removed from this table via SNMP. When adding a row to
+ this table, all non-Index/RowStatus objects must be set.
+ Rows may be discarded using RowStatus. The value of
+ ipsAuthCredAuthMethod must not be changed while this row
+ is 'active'."
+ ::= { ipsAuthCredentialAttributesEntry 3 }
+
+ ipsAuthCredStorageType OBJECT-TYPE
+ SYNTAX StorageType
+ MAX-ACCESS read-create
+ STATUS current
+ DESCRIPTION
+ "The storage type for all read-create objects in this row.
+ Rows in this table that were created through an external
+ process may have a storage type of readOnly or permanent.
+ Conceptual rows having the value 'permanent' need not
+ allow write access to any columnar objects in the row."
+ DEFVAL { nonVolatile }
+ ::= { ipsAuthCredentialAttributesEntry 4 }
+
+ ipsAuthCredChap OBJECT IDENTIFIER ::= { ipsAuthObjects 7 }
+
+ -- Credential Chap-Specific Attributes Table
+
+ ipsAuthCredChapAttributesTable OBJECT-TYPE
+ SYNTAX SEQUENCE OF IpsAuthCredChapAttributesEntry
+ MAX-ACCESS not-accessible
+ STATUS current
+ DESCRIPTION
+ "A list of CHAP attributes for credentials that
+ use ipsAuthMethodChap as their ipsAuthCredAuthMethod.
+
+ A row in this table can only exist when an instance of
+ the ipsAuthCredAuthMethod object exists (or is created
+
+
+
+Bakke & Muchow Standards Track [Page 23]
+
+RFC 4545 IPS Authorization MIB May 2006
+
+
+ simultaneously) having the same instance identifiers
+ and a value of 'ipsAuthMethodChap'."
+ ::= { ipsAuthCredChap 1 }
+
+ ipsAuthCredChapAttributesEntry OBJECT-TYPE
+ SYNTAX IpsAuthCredChapAttributesEntry
+ MAX-ACCESS not-accessible
+ STATUS current
+ DESCRIPTION
+ "An entry (row) containing management information
+ applicable to a credential that uses
+ ipsAuthMethodChap as their ipsAuthCredAuthMethod.
+
+ When a row is created in ipsAuthCredentialAttributesTable
+ with ipsAuthCredAuthMethod = ipsAuthCredChap, the
+ management station must create a corresponding row
+ in this table.
+
+ When a row is deleted from ipsAuthCredentialAttributesTable
+ with ipsAuthCredAuthMethod = ipsAuthCredChap, the
+ agent must delete the corresponding row (if any) in
+ this table."
+ INDEX { ipsAuthInstIndex, ipsAuthIdentIndex, ipsAuthCredIndex }
+ ::= { ipsAuthCredChapAttributesTable 1 }
+
+ IpsAuthCredChapAttributesEntry ::= SEQUENCE {
+ ipsAuthCredChapUserName SnmpAdminString,
+ ipsAuthCredChapRowStatus RowStatus,
+ ipsAuthCredChapStorageType StorageType
+ }
+
+ ipsAuthCredChapUserName OBJECT-TYPE
+ SYNTAX SnmpAdminString
+ MAX-ACCESS read-create
+ STATUS current
+ DESCRIPTION
+ "A character string containing the CHAP user name for this
+ credential."
+ REFERENCE
+ "W. Simpson, RFC 1994: PPP Challenge Handshake
+ Authentication Protocol (CHAP), August 1996"
+ ::= { ipsAuthCredChapAttributesEntry 1 }
+
+ ipsAuthCredChapRowStatus OBJECT-TYPE
+ SYNTAX RowStatus
+ MAX-ACCESS read-create
+ STATUS current
+ DESCRIPTION
+
+
+
+Bakke & Muchow Standards Track [Page 24]
+
+RFC 4545 IPS Authorization MIB May 2006
+
+
+ "This field allows entries to be dynamically added and
+ removed from this table via SNMP. When adding a row to
+ this table, all non-Index/RowStatus objects must be set.
+ Rows may be discarded using RowStatus. The value of
+ ipsAuthCredChapUserName may be changed while this row
+ is 'active'."
+ ::= { ipsAuthCredChapAttributesEntry 2 }
+
+ ipsAuthCredChapStorageType OBJECT-TYPE
+ SYNTAX StorageType
+ MAX-ACCESS read-create
+ STATUS current
+ DESCRIPTION
+ "The storage type for all read-create objects in this row.
+ Rows in this table that were created through an external
+ process may have a storage type of readOnly or permanent.
+ Conceptual rows having the value 'permanent' need not
+ allow write access to any columnar objects in the row."
+ DEFVAL { nonVolatile }
+ ::= { ipsAuthCredChapAttributesEntry 3 }
+
+ ipsAuthCredSrp OBJECT IDENTIFIER ::= { ipsAuthObjects 8 }
+
+ -- Credential Srp-Specific Attributes Table
+
+ ipsAuthCredSrpAttributesTable OBJECT-TYPE
+ SYNTAX SEQUENCE OF IpsAuthCredSrpAttributesEntry
+ MAX-ACCESS not-accessible
+ STATUS current
+ DESCRIPTION
+ "A list of SRP attributes for credentials that
+ use ipsAuthMethodSrp as its ipsAuthCredAuthMethod.
+
+ A row in this table can only exist when an instance of
+ the ipsAuthCredAuthMethod object exists (or is created
+ simultaneously) having the same instance identifiers
+ and a value of 'ipsAuthMethodSrp'."
+ ::= { ipsAuthCredSrp 1 }
+
+ ipsAuthCredSrpAttributesEntry OBJECT-TYPE
+ SYNTAX IpsAuthCredSrpAttributesEntry
+ MAX-ACCESS not-accessible
+ STATUS current
+ DESCRIPTION
+ "An entry (row) containing management information
+ applicable to a credential that uses
+ ipsAuthMethodSrp as their ipsAuthCredAuthMethod.
+
+
+
+
+Bakke & Muchow Standards Track [Page 25]
+
+RFC 4545 IPS Authorization MIB May 2006
+
+
+ When a row is created in ipsAuthCredentialAttributesTable
+ with ipsAuthCredAuthMethod = ipsAuthCredSrp, the
+ management station must create a corresponding row
+ in this table.
+
+ When a row is deleted from ipsAuthCredentialAttributesTable
+ with ipsAuthCredAuthMethod = ipsAuthCredSrp, the
+ agent must delete the corresponding row (if any) in
+ this table."
+ INDEX { ipsAuthInstIndex, ipsAuthIdentIndex, ipsAuthCredIndex }
+ ::= { ipsAuthCredSrpAttributesTable 1 }
+
+ IpsAuthCredSrpAttributesEntry ::= SEQUENCE {
+ ipsAuthCredSrpUserName SnmpAdminString,
+ ipsAuthCredSrpRowStatus RowStatus,
+ ipsAuthCredSrpStorageType StorageType
+ }
+
+ ipsAuthCredSrpUserName OBJECT-TYPE
+ SYNTAX SnmpAdminString
+ MAX-ACCESS read-create
+ STATUS current
+ DESCRIPTION
+ "A character string containing the SRP user name for this
+ credential."
+ REFERENCE
+ "T. Wu, RFC 2945: The SRP Authentication and Key
+ Exchange System, September 2000"
+ ::= { ipsAuthCredSrpAttributesEntry 1 }
+
+ ipsAuthCredSrpRowStatus OBJECT-TYPE
+ SYNTAX RowStatus
+ MAX-ACCESS read-create
+ STATUS current
+ DESCRIPTION
+ "This field allows entries to be dynamically added and
+ removed from this table via SNMP. When adding a row to
+ this table, all non-Index/RowStatus objects must be set.
+ Rows may be discarded using RowStatus. The value of
+ ipsAuthCredSrpUserName may be changed while the status
+ of this row is 'active'."
+ ::= { ipsAuthCredSrpAttributesEntry 2 }
+
+ ipsAuthCredSrpStorageType OBJECT-TYPE
+ SYNTAX StorageType
+ MAX-ACCESS read-create
+ STATUS current
+ DESCRIPTION
+
+
+
+Bakke & Muchow Standards Track [Page 26]
+
+RFC 4545 IPS Authorization MIB May 2006
+
+
+ "The storage type for all read-create objects in this row.
+ Rows in this table that were created through an external
+ process may have a storage type of readOnly or permanent.
+ Conceptual rows having the value 'permanent' need not
+ allow write access to any columnar objects in the row."
+ DEFVAL { nonVolatile }
+ ::= { ipsAuthCredSrpAttributesEntry 3 }
+
+ ipsAuthCredKerberos OBJECT IDENTIFIER ::= { ipsAuthObjects 9 }
+
+ -- Credential Kerberos-Specific Attributes Table
+
+ ipsAuthCredKerbAttributesTable OBJECT-TYPE
+ SYNTAX SEQUENCE OF IpsAuthCredKerbAttributesEntry
+ MAX-ACCESS not-accessible
+ STATUS current
+ DESCRIPTION
+ "A list of Kerberos attributes for credentials that
+ use ipsAuthMethodKerberos as their ipsAuthCredAuthMethod.
+
+ A row in this table can only exist when an instance of
+ the ipsAuthCredAuthMethod object exists (or is created
+ simultaneously) having the same instance identifiers
+ and a value of 'ipsAuthMethodKerb'."
+ ::= { ipsAuthCredKerberos 1 }
+
+ ipsAuthCredKerbAttributesEntry OBJECT-TYPE
+ SYNTAX IpsAuthCredKerbAttributesEntry
+ MAX-ACCESS not-accessible
+ STATUS current
+ DESCRIPTION
+ "An entry (row) containing management information
+ applicable to a credential that uses
+ ipsAuthMethodKerberos as its ipsAuthCredAuthMethod.
+
+ When a row is created in ipsAuthCredentialAttributesTable
+ with ipsAuthCredAuthMethod = ipsAuthCredKerberos, the
+ management station must create a corresponding row
+ in this table.
+
+ When a row is deleted from ipsAuthCredentialAttributesTable
+ with ipsAuthCredAuthMethod = ipsAuthCredKerberos, the
+ agent must delete the corresponding row (if any) in
+ this table."
+ INDEX { ipsAuthInstIndex, ipsAuthIdentIndex, ipsAuthCredIndex }
+ ::= { ipsAuthCredKerbAttributesTable 1 }
+
+ IpsAuthCredKerbAttributesEntry ::= SEQUENCE {
+
+
+
+Bakke & Muchow Standards Track [Page 27]
+
+RFC 4545 IPS Authorization MIB May 2006
+
+
+ ipsAuthCredKerbPrincipal SnmpAdminString,
+ ipsAuthCredKerbRowStatus RowStatus,
+ ipsAuthCredKerbStorageType StorageType
+ }
+
+ ipsAuthCredKerbPrincipal OBJECT-TYPE
+ SYNTAX SnmpAdminString
+ MAX-ACCESS read-create
+ STATUS current
+ DESCRIPTION
+ "A character string containing a Kerberos principal
+ for this credential."
+ REFERENCE
+ "C. Neuman, S. Hartman, and K. Raeburn, RFC 4120:
+ The Kerberos Network Authentication Service (V5),
+ July 2005"
+ ::= { ipsAuthCredKerbAttributesEntry 1 }
+
+ ipsAuthCredKerbRowStatus OBJECT-TYPE
+ SYNTAX RowStatus
+ MAX-ACCESS read-create
+ STATUS current
+ DESCRIPTION
+ "This field allows entries to be dynamically added and
+ removed from this table via SNMP. When adding a row to
+ this table, all non-Index/RowStatus objects must be set.
+ Rows may be discarded using RowStatus. The value of
+ ipsAuthCredKerbPrincipal may be changed while this row
+ is 'active'."
+ ::= { ipsAuthCredKerbAttributesEntry 2 }
+
+ ipsAuthCredKerbStorageType OBJECT-TYPE
+ SYNTAX StorageType
+ MAX-ACCESS read-create
+ STATUS current
+ DESCRIPTION
+ "The storage type for all read-create objects in this row.
+ Rows in this table that were created through an external
+ process may have a storage type of readOnly or permanent.
+ Conceptual rows having the value 'permanent' need not
+ allow write access to any columnar objects in the row."
+ DEFVAL { nonVolatile }
+ ::= { ipsAuthCredKerbAttributesEntry 3 }
+
+ --******************************************************************
+ -- Notifications
+
+ -- There are no notifications necessary in this MIB module.
+
+
+
+Bakke & Muchow Standards Track [Page 28]
+
+RFC 4545 IPS Authorization MIB May 2006
+
+
+ --******************************************************************
+
+ -- Conformance Statements
+
+ ipsAuthCompliances OBJECT IDENTIFIER ::= { ipsAuthConformance 1 }
+ ipsAuthGroups OBJECT IDENTIFIER ::= { ipsAuthConformance 2 }
+
+ ipsAuthInstanceAttributesGroup OBJECT-GROUP
+ OBJECTS {
+ ipsAuthInstDescr,
+ ipsAuthInstStorageType
+ }
+ STATUS current
+ DESCRIPTION
+ "A collection of objects providing information about
+ authorization instances."
+ ::= { ipsAuthGroups 1 }
+
+ ipsAuthIdentAttributesGroup OBJECT-GROUP
+ OBJECTS {
+ ipsAuthIdentDescription,
+ ipsAuthIdentRowStatus,
+ ipsAuthIdentStorageType
+ }
+ STATUS current
+ DESCRIPTION
+ "A collection of objects providing information about
+ user identities within an authorization instance."
+ ::= { ipsAuthGroups 2 }
+
+ ipsAuthIdentNameAttributesGroup OBJECT-GROUP
+ OBJECTS {
+ ipsAuthIdentName,
+ ipsAuthIdentNameRowStatus,
+ ipsAuthIdentNameStorageType
+ }
+ STATUS current
+ DESCRIPTION
+ "A collection of objects providing information about
+ user names within user identities within an authorization
+ instance."
+ ::= { ipsAuthGroups 3 }
+
+ ipsAuthIdentAddrAttributesGroup OBJECT-GROUP
+ OBJECTS {
+ ipsAuthIdentAddrType,
+ ipsAuthIdentAddrStart,
+ ipsAuthIdentAddrEnd,
+
+
+
+Bakke & Muchow Standards Track [Page 29]
+
+RFC 4545 IPS Authorization MIB May 2006
+
+
+ ipsAuthIdentAddrRowStatus,
+ ipsAuthIdentAddrStorageType
+ }
+ STATUS current
+ DESCRIPTION
+ "A collection of objects providing information about
+ address ranges within user identities within an
+ authorization instance."
+ ::= { ipsAuthGroups 4 }
+
+ ipsAuthIdentCredAttributesGroup OBJECT-GROUP
+ OBJECTS {
+ ipsAuthCredAuthMethod,
+ ipsAuthCredRowStatus,
+ ipsAuthCredStorageType
+ }
+ STATUS current
+ DESCRIPTION
+ "A collection of objects providing information about
+ credentials within user identities within an authorization
+ instance."
+ ::= { ipsAuthGroups 5 }
+
+ ipsAuthIdentChapAttrGroup OBJECT-GROUP
+ OBJECTS {
+ ipsAuthCredChapUserName,
+ ipsAuthCredChapRowStatus,
+ ipsAuthCredChapStorageType
+ }
+ STATUS current
+ DESCRIPTION
+ "A collection of objects providing information about
+ CHAP credentials within user identities within an
+ authorization instance."
+ ::= { ipsAuthGroups 6 }
+
+ ipsAuthIdentSrpAttrGroup OBJECT-GROUP
+ OBJECTS {
+ ipsAuthCredSrpUserName,
+ ipsAuthCredSrpRowStatus,
+ ipsAuthCredSrpStorageType
+ }
+ STATUS current
+ DESCRIPTION
+ "A collection of objects providing information about
+ SRP credentials within user identities within an
+ authorization instance."
+ ::= { ipsAuthGroups 7 }
+
+
+
+Bakke & Muchow Standards Track [Page 30]
+
+RFC 4545 IPS Authorization MIB May 2006
+
+
+ ipsAuthIdentKerberosAttrGroup OBJECT-GROUP
+ OBJECTS {
+ ipsAuthCredKerbPrincipal,
+ ipsAuthCredKerbRowStatus,
+ ipsAuthCredKerbStorageType
+ }
+ STATUS current
+ DESCRIPTION
+ "A collection of objects providing information about
+ Kerberos credentials within user identities within an
+ authorization instance."
+ ::= { ipsAuthGroups 8 }
+
+ --******************************************************************
+
+ ipsAuthComplianceV1 MODULE-COMPLIANCE
+ STATUS current
+ DESCRIPTION
+ "Initial version of compliance statement based on
+ initial version of this MIB module.
+
+ The Instance and Identity groups are mandatory;
+ at least one of the other groups (Name, Address,
+ Credential, Certificate) is also mandatory for
+ any given implementation."
+ MODULE -- this module
+ MANDATORY-GROUPS {
+ ipsAuthInstanceAttributesGroup,
+ ipsAuthIdentAttributesGroup
+ }
+
+ -- Conditionally mandatory groups to be included with
+ -- the mandatory groups when necessary.
+
+ GROUP ipsAuthIdentNameAttributesGroup
+ DESCRIPTION
+ "This group is mandatory for all implementations
+ that make use of unique identity names."
+
+ GROUP ipsAuthIdentAddrAttributesGroup
+ DESCRIPTION
+ "This group is mandatory for all implementations
+ that use addresses to help verify identities."
+
+ GROUP ipsAuthIdentCredAttributesGroup
+ DESCRIPTION
+ "This group is mandatory for all implementations
+ that use credentials to help verify identities."
+
+
+
+Bakke & Muchow Standards Track [Page 31]
+
+RFC 4545 IPS Authorization MIB May 2006
+
+
+ GROUP ipsAuthIdentChapAttrGroup
+ DESCRIPTION
+ "This group is mandatory for all implementations
+ that use CHAP to help verify identities.
+
+ The ipsAuthIdentCredAttributesGroup must be
+ implemented if this group is implemented."
+
+ GROUP ipsAuthIdentSrpAttrGroup
+ DESCRIPTION
+ "This group is mandatory for all implementations
+ that use SRP to help verify identities.
+
+ The ipsAuthIdentCredAttributesGroup must be
+ implemented if this group is implemented."
+
+ GROUP ipsAuthIdentKerberosAttrGroup
+ DESCRIPTION
+ "This group is mandatory for all implementations
+ that use Kerberos to help verify identities.
+
+ The ipsAuthIdentCredAttributesGroup must be
+ implemented if this group is implemented."
+
+ OBJECT ipsAuthInstDescr
+ MIN-ACCESS read-only
+ DESCRIPTION
+ "Write access is not required."
+
+ OBJECT ipsAuthInstStorageType
+ MIN-ACCESS read-only
+ DESCRIPTION
+ "Write access is not required."
+
+ OBJECT ipsAuthIdentDescription
+ MIN-ACCESS read-only
+ DESCRIPTION
+ "Write access is not required."
+
+ OBJECT ipsAuthIdentRowStatus
+ SYNTAX INTEGER { active(1) } -- subset of RowStatus
+ MIN-ACCESS read-only
+ DESCRIPTION
+ "Write access is not required, and only one of the
+ six enumerated values for the RowStatus textual
+ convention need be supported, specifically:
+ active(1)."
+
+
+
+
+Bakke & Muchow Standards Track [Page 32]
+
+RFC 4545 IPS Authorization MIB May 2006
+
+
+ OBJECT ipsAuthIdentName
+ MIN-ACCESS read-only
+ DESCRIPTION
+ "Write access is not required."
+
+ OBJECT ipsAuthIdentNameRowStatus
+ SYNTAX INTEGER { active(1) } -- subset of RowStatus
+ MIN-ACCESS read-only
+ DESCRIPTION
+ "Write access is not required, and only one of the
+ six enumerated values for the RowStatus textual
+ convention need be supported, specifically:
+ active(1)."
+
+ OBJECT ipsAuthIdentAddrType
+ MIN-ACCESS read-only
+ DESCRIPTION
+ "Write access is not required."
+
+ OBJECT ipsAuthIdentAddrStart
+ MIN-ACCESS read-only
+ DESCRIPTION
+ "Write access is not required."
+
+ OBJECT ipsAuthIdentAddrEnd
+ MIN-ACCESS read-only
+ DESCRIPTION
+ "Write access is not required."
+
+ OBJECT ipsAuthIdentAddrRowStatus
+ SYNTAX INTEGER { active(1) } -- subset of RowStatus
+ MIN-ACCESS read-only
+ DESCRIPTION
+ "Write access is not required, and only one of the
+ six enumerated values for the RowStatus textual
+ convention need be supported, specifically:
+ active(1)."
+
+ OBJECT ipsAuthCredAuthMethod
+ MIN-ACCESS read-only
+ DESCRIPTION
+ "Write access is not required."
+
+ OBJECT ipsAuthCredRowStatus
+ SYNTAX INTEGER { active(1) } -- subset of RowStatus
+ MIN-ACCESS read-only
+ DESCRIPTION
+ "Write access is not required, and only one of the
+
+
+
+Bakke & Muchow Standards Track [Page 33]
+
+RFC 4545 IPS Authorization MIB May 2006
+
+
+ six enumerated values for the RowStatus textual
+ convention need be supported, specifically:
+ active(1)."
+
+ OBJECT ipsAuthCredChapUserName
+ MIN-ACCESS read-only
+ DESCRIPTION
+ "Write access is not required."
+
+ OBJECT ipsAuthCredChapRowStatus
+ SYNTAX INTEGER { active(1) } -- subset of RowStatus
+ MIN-ACCESS read-only
+ DESCRIPTION
+ "Write access is not required, and only one of the
+ six enumerated values for the RowStatus textual
+ convention need be supported, specifically:
+ active(1)."
+
+ OBJECT ipsAuthCredSrpUserName
+ MIN-ACCESS read-only
+ DESCRIPTION
+ "Write access is not required."
+
+ OBJECT ipsAuthCredSrpRowStatus
+ SYNTAX INTEGER { active(1) } -- subset of RowStatus
+ MIN-ACCESS read-only
+ DESCRIPTION
+ "Write access is not required, and only one of the
+ six enumerated values for the RowStatus textual
+ convention need be supported, specifically:
+ active(1)."
+
+ OBJECT ipsAuthCredKerbPrincipal
+ MIN-ACCESS read-only
+ DESCRIPTION
+ "Write access is not required."
+
+ OBJECT ipsAuthCredKerbRowStatus
+ SYNTAX INTEGER { active(1) } -- subset of RowStatus
+ MIN-ACCESS read-only
+ DESCRIPTION
+ "Write access is not required, and only one of the six
+ enumerated values for the RowStatus textual convention need
+ be supported, specifically: active(1)."
+
+ ::= { ipsAuthCompliances 1 }
+
+ END
+
+
+
+Bakke & Muchow Standards Track [Page 34]
+
+RFC 4545 IPS Authorization MIB May 2006
+
+
+9. Security Considerations
+
+9.1. MIB Security Considerations
+
+ There are a number of management objects defined in this MIB module
+ with a MAX-ACCESS clause of read-write and/or read-create. Such
+ objects may be considered sensitive or vulnerable in some network
+ environments. The support for SET operations in a non-secure
+ environment without proper protection can have a negative effect on
+ network operations. These are the tables and objects and their
+ sensitivity/vulnerability:
+
+ o in the ipsAuthInstanceAttributesTable:
+
+ - ipsAuthInstDescr could be modified to camouflage the existence
+ of a rogue authorization instance;
+
+ o in the ipsAuthIdentAttributesTable:
+
+ - ipsAuthIdentDescription could be modified to camouflage the
+ existence of a rogue identity;
+
+ - ipsAuthIdentRowStatus could be modified to add or delete a rogue
+ identity;
+
+ - ipsAuthIdentStorageType could be modified to make temporary rows
+ permanent, or permanent rows temporary;
+
+ o in the ipsAuthIdentNameAttributesTable:
+
+ - ipsAuthIdentName could be modified to change the name of an
+ existing identity;
+
+ - ipsAuthIdentNameRowStatus could be modified to add or delete a
+ name of an existing identity;
+
+ - ipsAuthIdentNameStorageType could be modified to make temporary
+ rows permanent, or permanent rows temporary;
+
+ o in the ipsAuthIdentAddrAttributesTable:
+
+ - ipsAuthIdentAddrType could be modified to change the type of
+ address checking performed;
+
+ - ipsAuthIdentAddrStart could be modified to change the start of
+ the allowed range;
+
+
+
+
+
+Bakke & Muchow Standards Track [Page 35]
+
+RFC 4545 IPS Authorization MIB May 2006
+
+
+ - ipsAuthIdentAddrEnd could be modified to change the end of the
+ allowed range;
+
+ - ipsAuthIdentAddrRowStatus could be modified to add or delete the
+ checking of an address range;
+
+ - ipsAuthIdentAddrStorageType could be modified to make temporary
+ rows permanent, or permanent rows temporary;
+
+ o in the ipsAuthCredentialAttributesTable:
+
+ - ipsAuthCredAuthMethod could be modified to change the type of
+ authentication to be used;
+
+ - ipsAuthCredRowStatus could be modified to add or delete checking
+ of credentials;
+
+ - ipsAuthCredStorageType could be modified to make temporary rows
+ permanent, or permanent rows temporary;
+
+ o in the ipsAuthCredChapAttributesTable:
+
+ - ipsAuthCredChapUserName could be modified to change the CHAP
+ user name for a credential;
+
+ - ipsAuthCredChapRowStatus could be modified to add or delete CHAP
+ attributes for credentials;
+
+ - ipsAuthCredChapStorageType could be modified to make temporary
+ rows permanent, or permanent rows temporary;
+
+ o in the ipsAuthCredSrpAttributesTable:
+
+ - ipsAuthCredSrpUserName could be modified to change the SRP user
+ name for a credential;
+
+ - ipsAuthCredSrpRowStatus could be modified to add or delete SRP
+ attributes for credentials;
+
+ - ipsAuthCredSrpStorageType could be modified to make temporary
+ rows permanent, or permanent rows temporary;
+
+ o in the ipsAuthCredKerbAttributesTable:
+
+ - ipsAuthCredKerbPrincipal could be modified to change the
+ Kerberos principal for a credential;
+
+
+
+
+
+Bakke & Muchow Standards Track [Page 36]
+
+RFC 4545 IPS Authorization MIB May 2006
+
+
+ - ipsAuthCredKerbRowStatus could be modified to add or delete
+ Kerberos attributes for credentials;
+
+ - ipsAuthCredKerbStorageType could be modified to make temporary
+ rows permanent, or permanent rows temporary;
+
+ Note that removal of legitimate credentials can result in either
+ denial of service or weakening the requirements for access of a
+ particular service. Note also that some types of credentials, such
+ as CHAP or SRP, also require passwords or verifiers to be associated
+ with the credential. These are managed outside this MIB module.
+
+ Some of the readable objects in this MIB module (i.e., objects with a
+ MAX-ACCESS other than not-accessible) may be considered sensitive or
+ vulnerable in some network environments. It is thus important to
+ control even GET and/or NOTIFY access to these objects and possibly
+ to even encrypt the values of these objects when sending them over
+ the network via SNMP. These are the tables and objects and their
+ sensitivity/vulnerability:
+
+ o All tables (specifically: ipsAuthInstanceAttributesTable,
+ ipsAuthIdentAttributesTable, ipsAuthIdentNameAttributesTable,
+ ipsAuthIdentAddrAttributesTable, ipsAuthCredentialAttributesTable,
+ ipsAuthCredChapAttributesTable, ipsAuthCredSrpAttributesTable, and
+ ipsAuthCredKerbAttributesTable) provide the ability to find out
+ which names, addresses, and credentials would be required to
+ access services on the managed system. If these credentials are
+ easily spoofed (particularly the name or address), read access to
+ this MIB module must be tightly controlled. When used with
+ pointers from another MIB module to rows in the
+ ipsAuthIdentAttributesTable, this MIB module provides information
+ about which entities are authorized to connect to which entities.
+
+ SNMP versions prior to SNMPv3 did not include adequate security.
+ Even if the network itself is secure (for example by using IPsec),
+ even then, there is no control as to who on the secure network is
+ allowed to access and GET/SET (read/change/create/delete) the objects
+ in this MIB module.
+
+ It is RECOMMENDED that implementors consider the security features as
+ provided by the SNMPv3 framework (see [RFC3410], section 8),
+ including full support for the SNMPv3 cryptographic mechanisms (for
+ authentication and privacy).
+
+ Further, deployment of SNMP versions prior to SNMPv3 is NOT
+ RECOMMENDED. Instead, it is RECOMMENDED to deploy SNMPv3 and to
+ enable cryptographic security. It is then a customer/operator
+ responsibility to ensure that the SNMP entity giving access to an
+
+
+
+Bakke & Muchow Standards Track [Page 37]
+
+RFC 4545 IPS Authorization MIB May 2006
+
+
+ instance of this MIB module is properly configured to give access to
+ the objects only to those principals (users) that have legitimate
+ rights to indeed GET or SET (change/create/delete) them.
+
+ In many implementations, the objects in this MIB module can be read
+ and modified via other mechanisms or protocols in addition to this
+ MIB module. For the system to be secure, other mechanisms that can
+ read and modify the contents of this MIB module must also address the
+ above issues, and handle the threats outlined in [RFC3411], section
+ 1.4.
+
+ Given the sensitivity of information contained in this MIB module, it
+ is strongly recommended that encryption (SNMPv3 with a securityLevel
+ of authPriv [RFC3411]) be used for all access to objects in this MIB
+ module.
+
+9.2. Other Security Considerations
+
+ An identity consists of a set of names (e.g., an iSCSI Initiator
+ Name), addresses (e.g., an IP address or Fibre Channel World Wide
+ Name (WWN)), and credentials (e.g., a CHAP user name).
+
+ To match an identity, one must match:
+
+ o One of the IdentNames belonging to the IdentIndex, unless there
+ are no IdentNames for the IdentIndex, and
+
+ o One of the IdentAddrs belonging to the IdentIndex, unless there
+ are no IdentAddrs for the IdentIndex, and
+
+ o One of the IdentCreds belonging to the IdentIndex, unless there
+ are no Creds for the IdentIndex.
+
+ Note that if any of the above lists are empty for a given IdentIndex,
+ any identifier of that type is considered to match the identity. The
+ non-empty lists will still be checked. For example, if the
+ IdentAddrs list is empty for the IndentIndex, but there are entries
+ in IdentNames and IdentCreds, any address will be considered a match,
+ as long as the offered name and credential match one of the
+ IdentNames and IdentCreds, respectively.
+
+ This leaves a possible security window while adding and removing
+ entries from one of these lists. For example, an identity could
+ consist of no IdentNames, no IdentAddrs, and exactly one IdentCred.
+ If that IdentCred was to be updated, several methods could be used:
+
+
+
+
+
+
+Bakke & Muchow Standards Track [Page 38]
+
+RFC 4545 IPS Authorization MIB May 2006
+
+
+ o The UserName or Principal could be simply written in the
+ appropriate table, if the credential's type remained the same
+ (recommended).
+
+ o The new credential could be added, then the old deleted
+ (recommended).
+
+ o The new credential could be added, and the old deleted in the same
+ SNMP request (recommended, but do the add first).
+
+ o The old credential could be deleted, then the new added (Don't
+ use!).
+
+ Of the above methods, the last leaves a window in which the list is
+ empty, possibly allowing unconstrained access to the resource making
+ use of this MIB. This method should never be used for Names, Addrs,
+ or Creds.
+
+ The use of the third method, adding and deleting within the same
+ request, should be used with care. It is recommended that within the
+ request, the add be done first. Otherwise, an implementation may
+ attempt to perform these operations in order, potentially leaving a
+ window.
+
+ The first two methods are recommended.
+
+ Care must also be taken when updating the IdentAddrs for an identity.
+ Each IdentAddr specifies a range of addresses that match the
+ identity, and has an address type, starting address, and ending
+ address. Modifying these one at a time can open a temporary window
+ where a larger range of addresses are allowed. For example, a single
+ address is specified using IdentAddrType = ipv4, IdentAddrStart =
+ IdentAddrEnd = 192.0.2.5. We want to update this to specify the
+ single address 192.0.2.34. If the end address is updated first, we
+ temporarily allow the range 192.0.2.5 .. 192.0.2.34, which is not
+ what we want. Similarly, if we change from 192.0.2.34 back to
+ 192.0.2.5, and we update IdentAddrStart first, we end up with the
+ range again. To handle this, an application must either:
+
+ o update both IdentAddrStart and IdentAddrEnd in the same SNMP set
+ request, or
+
+ o add the new IdentAddrStart and IdentAddrEnd with a new
+ IdentAddrIndex, then delete the old one, using the methods shown
+ before.
+
+
+
+
+
+
+Bakke & Muchow Standards Track [Page 39]
+
+RFC 4545 IPS Authorization MIB May 2006
+
+
+ Since the value of IdentAddrType specifies the formats of
+ IdentAddrStart and IdentAddrEnd, modification of IdentAddrType is not
+ allowed for an existing row.
+
+10. IANA Considerations
+
+ The IANA has assigned a MIB OID number under the mib-2 branch for the
+ IPS-AUTH-MIB.
+
+11. Normative References
+
+ [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
+ Requirement Levels", BCP 14, RFC 2119, March 1997.
+
+ [RFC2578] McCloghrie, K., Perkins, D., Schoenwaelder, J., Case, J. ,
+ Rose, M., and S. Waldbusser, "Structure of Management
+ Information Version 2 (SMIv2)", STD 58, RFC 2578, April
+ 1999.
+
+ [RFC2579] McCloghrie, K., Perkins, D., Schoenwaelder, J., Case, J.,
+ Rose, M., and S. Waldbusser, "Textual Conventions for
+ SMIv2", STD 58, RFC 2579, April 1999.
+
+ [RFC2580] McCloghrie, K., Perkins, D., Schoenwaelder, J., Case, J.,
+ Rose, M., and S. Waldbusser, "Conformance Statements for
+ SMIv2", STD 58, RFC 2580, April 1999.
+
+ [RFC3411] Harrington, D., Presuhn, R., and B. Wijnen, "An
+ Architecture for Describing Simple Network Management
+ Protocol (SNMP) Management Frameworks", RFC 3411, December
+ 2002.
+
+ [RFC4001] Daniele, M., Haberman, B., Routhier, S., and J.
+ Schoenwaelder, "Textual Conventions for Internet Network
+ Addresses", RFC 4001, February 2005.
+
+ [IANA-AF] IANA, "IANA Address Family Numbers MIB",
+ http://www.iana.org/assignments/
+ ianaaddressfamilynumbers-mib.
+
+ [RFC4293] Routhier, S., "Management Information Base for the
+ Internet Protocol (IP)", RFC 4293, April 2006.
+
+ [RFC1994] Simpson, W., "PPP Challenge Handshake Authentication
+ Protocol (CHAP)", RFC 1994, August 1996.
+
+
+
+
+
+
+Bakke & Muchow Standards Track [Page 40]
+
+RFC 4545 IPS Authorization MIB May 2006
+
+
+ [RFC4120] Neuman, C., Yu, T., Hartman, S., and K. Raeburn, "The
+ Kerberos Network Authentication Service (V5)", RFC 4120,
+ July 2005.
+
+ [RFC2945] Wu, T., "The SRP Authentication and Key Exchange System",
+ RFC 2945, September 2000.
+
+12. Informative References
+
+ [RFC3410] Case, J., Mundy, R., Partain, D., and B. Stewart,
+ "Introduction and Applicability Statements for Internet-
+ Standard Management Framework", RFC 3410, December 2002.
+
+ [RFC3414] Blumenthal, U. and B. Wijnen, "User-based Security Model
+ (USM) for version 3 of the Simple Network Management
+ Protocol (SNMPv3)", RFC 3414, December 2002.
+
+ [RFC3720] Satran, J., Meth, K., Sapuntzakis, C., Chadalapaka, M.,
+ and E. Zeidner, "Internet Small Computer Systems Interface
+ (iSCSI)", RFC 3720, March 2004.
+
+ [RFC1737] Sollins, K. and L. Masinter, "Functional Requirements for
+ Uniform Resource Names", RFC 1737, December 1994.
+
+ [RFC4044] McCloghrie, K., "Fibre Channel Management MIB", RFC 4044,
+ May 2005.
+
+13. Acknowledgements
+
+ In addition to the authors, several people contributed to the
+ development of this MIB module through discussions of authentication,
+ authorization, and access within the iSCSI MIB module and security
+ teams, including John Hufferd, Marjorie Krueger, Keith McCloghrie,
+ Tom McSweeney, Steve Senum, and Josh Tseng. Thanks also to Bill
+ Studenmund (Wasabi Systems) for adding the Kerberos method, and to
+ Ayman Ghanem for finding and suggesting changes to several problems
+ found in the MIB module.
+
+ Thanks especially to Keith McCloghrie for serving as advisor for this
+ MIB module.
+
+
+
+
+
+
+
+
+
+
+
+Bakke & Muchow Standards Track [Page 41]
+
+RFC 4545 IPS Authorization MIB May 2006
+
+
+Authors' Addresses
+
+ Mark Bakke
+ Postal: Cisco Systems, Inc
+ 7900 International Drive, Suite 400
+ Bloomington, MN
+ USA 55425
+
+ EMail: mbakke@cisco.com
+
+
+ James Muchow
+ Postal: Qlogic Corp.
+ 6321 Bury Drive
+ Eden Prairie, MN
+ USA 55346
+
+ EMail: james.muchow@qlogic.com
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Bakke & Muchow Standards Track [Page 42]
+
+RFC 4545 IPS Authorization MIB May 2006
+
+
+Full Copyright Statement
+
+ Copyright (C) The Internet Society (2006).
+
+ This document is subject to the rights, licenses and restrictions
+ contained in BCP 78, and except as set forth therein, the authors
+ retain all their rights.
+
+ This document and the information contained herein are provided on an
+ "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
+ OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
+ ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
+ INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
+ INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
+ WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
+
+Intellectual Property
+
+ The IETF takes no position regarding the validity or scope of any
+ Intellectual Property Rights or other rights that might be claimed to
+ pertain to the implementation or use of the technology described in
+ this document or the extent to which any license under such rights
+ might or might not be available; nor does it represent that it has
+ made any independent effort to identify any such rights. Information
+ on the procedures with respect to rights in RFC documents can be
+ found in BCP 78 and BCP 79.
+
+ Copies of IPR disclosures made to the IETF Secretariat and any
+ assurances of licenses to be made available, or the result of an
+ attempt made to obtain a general license or permission for the use of
+ such proprietary rights by implementers or users of this
+ specification can be obtained from the IETF on-line IPR repository at
+ http://www.ietf.org/ipr.
+
+ The IETF invites any interested party to bring to its attention any
+ copyrights, patents or patent applications, or other proprietary
+ rights that may cover technology that may be required to implement
+ this standard. Please address the information to the IETF at
+ ietf-ipr@ietf.org.
+
+Acknowledgement
+
+ Funding for the RFC Editor function is provided by the IETF
+ Administrative Support Activity (IASA).
+
+
+
+
+
+
+
+Bakke & Muchow Standards Track [Page 43]
+