summaryrefslogtreecommitdiff
path: root/doc/rfc/rfc7832.txt
diff options
context:
space:
mode:
authorThomas Voss <mail@thomasvoss.com> 2024-11-27 20:54:24 +0100
committerThomas Voss <mail@thomasvoss.com> 2024-11-27 20:54:24 +0100
commit4bfd864f10b68b71482b35c818559068ef8d5797 (patch)
treee3989f47a7994642eb325063d46e8f08ffa681dc /doc/rfc/rfc7832.txt
parentea76e11061bda059ae9f9ad130a9895cc85607db (diff)
doc: Add RFC documents
Diffstat (limited to 'doc/rfc/rfc7832.txt')
-rw-r--r--doc/rfc/rfc7832.txt731
1 files changed, 731 insertions, 0 deletions
diff --git a/doc/rfc/rfc7832.txt b/doc/rfc/rfc7832.txt
new file mode 100644
index 0000000..490697a
--- /dev/null
+++ b/doc/rfc/rfc7832.txt
@@ -0,0 +1,731 @@
+
+
+
+
+
+
+Internet Engineering Task Force (IETF) R. Smith, Ed.
+Request for Comments: 7832 Jisc
+Category: Informational May 2016
+ISSN: 2070-1721
+
+
+ Application Bridging for Federated Access Beyond Web (ABFAB) Use Cases
+
+Abstract
+
+ Federated identity is typically associated with web-based services at
+ present, but there is growing interest in its application in non-web-
+ based contexts. The goal of this memo is to document a selection of
+ the wide variety of these contexts whose user experience could be
+ improved through the use of technologies based on the Application
+ Bridging for Federated Access Beyond web (ABFAB) architecture and
+ specifications.
+
+Status of This Memo
+
+ This document is not an Internet Standards Track specification; it is
+ published for informational purposes.
+
+ This document is a product of the Internet Engineering Task Force
+ (IETF). It represents the consensus of the IETF community. It has
+ received public review and has been approved for publication by the
+ Internet Engineering Steering Group (IESG). Not all documents
+ approved by the IESG are a candidate for any level of Internet
+ Standard; see Section 2 of RFC 5741.
+
+ Information about the current status of this document, any errata,
+ and how to provide feedback on it may be obtained at
+ http://www.rfc-editor.org/info/rfc7832.
+
+Copyright Notice
+
+ Copyright (c) 2016 IETF Trust and the persons identified as the
+ document authors. All rights reserved.
+
+ This document is subject to BCP 78 and the IETF Trust's Legal
+ Provisions Relating to IETF Documents
+ (http://trustee.ietf.org/license-info) in effect on the date of
+ publication of this document. Please review these documents
+ carefully, as they describe your rights and restrictions with respect
+ to this document. Code Components extracted from this document must
+ include Simplified BSD License text as described in Section 4.e of
+ the Trust Legal Provisions and are provided without warranty as
+ described in the Simplified BSD License.
+
+
+
+Smith Informational [Page 1]
+
+RFC 7832 ABFAB Use Cases May 2016
+
+
+Table of Contents
+
+ 1. Introduction ....................................................2
+ 2. Context of Use Cases ............................................3
+ 3. Use Cases .......................................................3
+ 3.1. Cloud Services .............................................3
+ 3.1.1. Cloud-Based Application Services ....................4
+ 3.1.2. Cloud-Based Infrastructure Services .................5
+ 3.2. High-Performance Computing .................................6
+ 3.3. Grid Infrastructure ........................................6
+ 3.4. Databases and Directories ..................................7
+ 3.5. Media Streaming ............................................8
+ 3.6. Printing ...................................................9
+ 3.7. Accessing Applications from Devices on a Telecoms
+ Infrastructure .............................................9
+ 3.8. Enhanced Security Services for S/MIME .....................10
+ 3.9. Smart Objects .............................................11
+ 4. Security Considerations ........................................11
+ 5. References .....................................................12
+ 5.1. Normative References ......................................12
+ 5.2. Informative References ....................................12
+ Acknowledgments ...................................................13
+ Contributors ......................................................13
+ Author's Address ..................................................13
+
+1. Introduction
+
+ Federated identity facilitates the controlled sharing of information
+ about people (a.k.a. "principals"), commonly across organizational
+ boundaries. This avoids redundant registration of principals who
+ operate in and across multiple domains, both reducing the
+ administrative overhead for the organizations involved and improving
+ the usability of systems for the principal. Simultaneously, it can
+ also help address privacy-related concerns, along with the regulatory
+ and statutory requirements of some jurisdictions.
+
+ The information that is passed between organizations may include
+ authentication state and identity information that can be used for
+ many purposes, including making access management decisions. A
+ number of mechanisms support the transmission of this information for
+ web-based scenarios in particular (e.g., the Security Assertion
+ Markup Language (SAML) [OASIS.saml-profiles-2.0-os]), but there is
+ significant interest in the more general application of federated
+ identity to include non-web use cases. This document enumerates some
+ of these use cases, describing how technologies based on the ABFAB
+ architecture [RFC7831] and specifications could be used.
+
+
+
+
+
+Smith Informational [Page 2]
+
+RFC 7832 ABFAB Use Cases May 2016
+
+
+2. Context of Use Cases
+
+ The use cases described in this document are a result of work led by
+ Jisc, the operator of the United Kingdom's education and research
+ network, responding to requirements from its community. These use
+ cases have also been augmented by various inputs from the IETF
+ community.
+
+ The ABFAB architecture and specifications enables authentication and
+ authorization to occur across organizational boundaries. For many
+ applications, principals need not have pre-instantiated accounts that
+ their federated identity maps to before their first visit to that
+ application; the application can perform this process on the fly. In
+ cases where such accounts are required for particular applications,
+ the pre-provisioning process is out of scope; the ABFAB technology
+ assumes that any such requirements have already been fulfilled.
+ Standards-based work of note that would assist with this
+ pre-provisioning of accounts includes the standards and
+ specifications produced by the IETF SCIM working group.
+
+3. Use Cases
+
+ This section describes some of the various potential use cases where
+ technologies based on the ABFAB architecture and specifications could
+ help improve the user experience; each includes a brief description
+ of how current technologies attempt to solve the use cases and how
+ this could be improved upon by ABFAB implementations.
+
+3.1. Cloud Services
+
+ Cloud computing is emerging as a common way of provisioning
+ infrastructure services in an on-demand manner. These services are
+ typically offered as one of three models:
+
+ o General infrastructure services such as computing power, networks,
+ storage, and utilities ("Infrastructure as a Service", or IaaS);
+
+ o Software stacks or platforms such as database servers, web
+ servers, and application runtime environments ("Platform as a
+ Service", or PaaS);
+
+ o Common application software such as email, shared storage,
+ business applications such as Customer Relationship Management
+ (CRM), or scientific applications ("Software as a Service",
+ or SaaS).
+
+
+
+
+
+
+Smith Informational [Page 3]
+
+RFC 7832 ABFAB Use Cases May 2016
+
+
+ In many cases, the provisioned cloud infrastructures and applications
+ need to be integrated with existing infrastructure of the
+ organization, and it is of course desirable if this could be achieved
+ in a way that allows business or scientific workflows to act across
+ infrastructure -- both across the cloud and in the local
+ infrastructure -- in as seamless a manner as possible.
+
+ There are two main areas where federated access fits in cloud
+ computing:
+
+ o Using federation to help mediate access to cloud-based application
+ services (e.g., cloud-provided email or CRM systems);
+
+ o Using federation to help mediate access to the management of
+ cloud-based infrastructure services.
+
+3.1.1. Cloud-Based Application Services
+
+ Many organizations are seeking to deliver services to their users
+ through the use of providers based in the "cloud". This is typically
+ motivated by a desire to avoid management and operation of commodity
+ services that, through economies of scale and so forth, can often be
+ delivered more efficiently by such providers.
+
+ Many providers already provide web-based access using conventional
+ federated authentication mechanisms -- for example, outsourced email
+ provision where federated access is enabled using "webmail"
+ applications where access is mediated through the use of SAML
+ [OASIS.saml-profiles-2.0-os]. This use of federated authentication
+ enables organizations that consume cloud services to more efficiently
+ orchestrate the delivery of these services to their users and also
+ enables single sign-on to the services for these users.
+
+ Frequently, however, users will prefer to use desktop applications
+ that do not use web (i.e., based on HTTP) protocols. For example, a
+ desktop email client may use a variety of non-web protocols,
+ including SMTP [RFC5321], IMAP [RFC3501], and the Post Office
+ Protocol (POP) [RFC1939]. Some cloud providers support access to
+ their services using non-web protocols; however, the authentication
+ mechanisms used by these protocols will typically require that the
+ provider has access to the user's credentials -- i.e., non-federated.
+ Consequently, the provider will require that users' credentials are
+ regularly synchronized from the user organization to the provider,
+ with the obvious overhead this imparts on the organization along with
+ the obvious implications for security and privacy, or else be
+ provisioned directly by the provider to the user.
+
+
+
+
+
+Smith Informational [Page 4]
+
+RFC 7832 ABFAB Use Cases May 2016
+
+
+ The latter approach of directly provisioning accounts may be
+ acceptable in the case where an organization has relationships with
+ only a small number of providers, but this approach may become
+ untenable if an organization obtains services from many providers.
+ Consequently, any organization with a requirement to use non-web
+ protocols would prefer to make use of the credentials that they have
+ already provisioned their users with, and to utilize federated
+ authentication with non-web protocols to obtain access to cloud-based
+ providers.
+
+ ABFAB could help in this context, as its specifications would enable
+ federated authentication for a variety of non-web protocols, thus
+ gaining the benefits of federated authentication without any of the
+ drawbacks that are currently experienced.
+
+3.1.2. Cloud-Based Infrastructure Services
+
+ Typical IaaS or PaaS cloud use cases deal with provisioning on-demand
+ cloud-based infrastructure services that may include infrastructure
+ components such as computing and storage resources, network
+ infrastructure, and other utilities. Cloud-based virtualized
+ applications should ideally operate in the same way as regular
+ non-virtualized applications whilst allowing management of the
+ virtual computing resources (scaling, migration, reconfiguration)
+ without changing the management applications.
+
+ In many cases, moving applications or platforms to the cloud may
+ require their redesigning/refactoring to support dynamic deployment
+ and configuration, including their security services, and
+ authentication and authorization services. These will typically
+ today be extensively based on manual setup and configuration of such
+ components and features as trusted certificates and trust anchors,
+ authorities and trusted services (both their location and
+ certificates), attribute namespaces, and policies.
+
+ ABFAB could help in this context as a way of moving from the model of
+ manually configured authentication and authorization towards a more
+ easily managed system involving federated trust and identity, and
+ ABFAB will be applicable for a wide range of existing features (e.g.,
+ connecting to a newly provisioned Virtual Machine through
+ ABFAB-enabled Secure Shell (SSH) [RFC4251] instead of having to
+ manually manage an administrative login to that machine).
+
+
+
+
+
+
+
+
+
+Smith Informational [Page 5]
+
+RFC 7832 ABFAB Use Cases May 2016
+
+
+3.2. High-Performance Computing
+
+ High-Performance Computing (HPC) is a discipline that uses
+ supercomputers and computer clusters to solve complex computation
+ problems; it is most commonly associated with scientific research or
+ computational science.
+
+ Access to HPC resources, often mediated through technologies such as
+ SSH, is typically managed through the use of user digital
+ certificates [RFC5280] or through manually provisioned credentials
+ and accounts. This requires HPC operators to issue certificates or
+ accounts to users using a registration process that often duplicates
+ identity management processes that already exist within most user
+ organizations. The HPC community would like to utilize federated
+ identity to perform both the user registration and authentication
+ functions required to use HPC resources, and so reduce costs by
+ avoiding this duplication of effort.
+
+ The HPC community also have the following additional requirements:
+
+ o Improve business continuity: In the event of operational issues at
+ an HPC system at one organization (for example, a power failure),
+ users and jobs could be transparently moved to other HPC systems
+ without the overhead of having to manage user credentials for
+ multiple organizations;
+
+ o Establish "HPC as a service": Many organizations who have invested
+ in HPC systems want to make their systems easily available to
+ external customers. Federated authentication facilitates this by
+ enabling these customers to use their existing identity
+ management, user credentialing, and support processes;
+
+ o Improve the user experience: Authentication to HPC systems is
+ normally performed using user digital certificates, which some
+ users find difficult to use. Federated authentication can provide
+ a better user experience by allowing the use of other types of
+ credentials, without requiring technical modifications to the HPC
+ system to support these.
+
+ ABFAB could help in this context, as it could enable federated
+ authentication for many of the protocols and technologies currently
+ in use by HPC providers, such as SSH.
+
+3.3. Grid Infrastructure
+
+ Grids are large-scale distributed infrastructures, consisting of many
+ loosely coupled, independently managed, and geographically
+ distributed resources managed by organizationally independent
+
+
+
+Smith Informational [Page 6]
+
+RFC 7832 ABFAB Use Cases May 2016
+
+
+ providers. Users of grids utilize these resources using grid
+ middleware that allows them to submit and control computing jobs,
+ manipulate datasets, communicate with other users, etc. These users
+ are organized into Virtual Organizations (VOs); each VO represents a
+ group of people working collaboratively on a common project. VOs
+ facilitate both the management of their users and the meditation of
+ agreements between their users and resource providers.
+
+ Authentication and authorization within most grids are performed
+ using a Public Key Infrastructure, requiring each user to have an
+ X.509 public-key certificate [RFC5280]. Authentication is performed
+ through ownership of a particular certificate, while authorization
+ decisions are made based on the user's identity (derived from their
+ X.509 certificate), membership of a particular VO, or additional
+ information assigned to a user by a VO. While efficient and
+ scalable, this approach has been found wanting in terms of usability
+ -- many users find certificates difficult to manage, for various
+ reasons.
+
+ One approach to ameliorating this issue, adopted to some extent by
+ some grid communities already, is to abstract away direct access to
+ certificates from users, instead using alternative authentication
+ mechanisms and then converting the credential provided by these into
+ standard grid certificates. Some implementations of this idea use
+ existing federated authentication techniques. However, current
+ implementations of this approach suffer from a number of problems,
+ not the least of which is the inability to use the federated
+ credentials used to authenticate to a credential-conversion portal to
+ also directly authenticate to non-web resources such as SSH daemons.
+
+ The ability to use federated authentication directly through ABFAB,
+ without the use of a credential-conversion service, would allow users
+ to authenticate to a grid and its associated services, allowing them
+ to directly launch and control computing jobs, all without having to
+ manage, or even see, an X.509 public-key certificate at any point in
+ the process. Authorization within the grid would still be performed
+ using VO membership as asserted by the user's Identity Provider (IdP)
+ through the federated transport.
+
+3.4. Databases and Directories
+
+ Databases (e.g., MySQL, PostgreSQL, Oracle) and directory
+ technologies (e.g., OpenLDAP (http://www.openldap.org/), Microsoft
+ Active Directory, Novell eDirectory) are very commonly used within
+ many organizations for a variety of purposes. Such purposes can
+ include core administrative functions, such as hosting identity
+ information for its users, as well as business functions (e.g.,
+ student records systems at educational organizations).
+
+
+
+Smith Informational [Page 7]
+
+RFC 7832 ABFAB Use Cases May 2016
+
+
+ Access to such database and directory systems is usually provided for
+ internal users only; however, users external to the organizations
+ sometimes require access to these systems directly -- for example,
+ external examiners in educational organizations requiring access to
+ student records systems, members of cross-organizational project
+ teams who store information in a particular organization's systems,
+ and external auditors.
+
+ Credentials for users either internal or external to the organization
+ that allow access to these databases and directories are usually
+ provisioned manually within an organization, either using identity
+ management technologies or through more manual processes. For the
+ internal users, this situation is fine -- this is one of the
+ mainstays of identity management. However, for external users who
+ require access, this represents more of a problem for organizational
+ processes. The organization has to either (1) add these external
+ users to its internal identity management systems or (2) provision
+ these credentials directly within the database/directory systems and
+ continue to manage them, including appropriate access controls
+ associated with each credential, for the lifetime of that credential.
+
+ Federated authentication to databases or directories, via ABFAB
+ technologies, would improve upon this situation, as it would remove
+ the need to provision and de-provision credentials to access these
+ systems. Organizations may still wish to manually manage access
+ control of federated identities; however, even this could be provided
+ through federated means, if the trust relationship between
+ organizations was strong enough for the organization providing the
+ service to rely upon it for this purpose.
+
+3.5. Media Streaming
+
+ Media streaming services (audio or audio/video) are often provided
+ publicly to anonymous users, but authentication is important for a
+ protected subset of streams where rights management and access
+ control must be applied.
+
+ Streams can be delivered via protocols that already include
+ authentication, such as the Real Time Streaming Protocol (RTSP)
+ [RFC2326] or RTP [RFC3550], or can be published in an encrypted form
+ with keys only being distributed to trusted users. Federated
+ authentication is applicable to both of these cases.
+
+ Alternative mechanisms to managing access exist -- for example, an
+ approach where a unique stream URI is minted for each user. However,
+ this relies on preserving the secrecy of the stream URI and also
+ requires a communication channel between the web page used for
+ authentication and the streaming service itself. Federated
+
+
+
+Smith Informational [Page 8]
+
+RFC 7832 ABFAB Use Cases May 2016
+
+
+ authentication would be a better fit for this kind of access control.
+ Thus, ABFAB technologies that allow federated authentication directly
+ within (inherently non-web) media streaming protocols would represent
+ an enhancement to this area.
+
+3.6. Printing
+
+ A visitor from one organization to the premises of another often
+ requires the use of print services. Their home organization may of
+ course offer printing, but the output could be a long way away, so
+ the home service is not useful. The user will typically want to
+ print from within a desktop or mobile application.
+
+ Where this service is currently offered, it would usually be achieved
+ through the use of "open" printers (i.e., printers that allow
+ anonymous print requests), where printer availability is advertised
+ through the use of Bonjour or other similar protocols. If the
+ organization requires authenticated print requests (usually for
+ accounting purposes), the visitor would usually have to be given
+ credentials that allow this, often supplemented with pay-as-you-go
+ style payment systems.
+
+ Adding federated authentication to the Internet Printing Protocol
+ (IPP) [RFC2911] (and other relevant protocols) would enable this kind
+ of remote printing service without the administrative overhead of
+ credentialing these visitors (who, of course, may well be one-time
+ visitors to the organization). This would be immediately applicable
+ to higher education, where this use case is increasingly important
+ thanks to the success of federated network authentication systems
+ such as eduroam (https://www.eduroam.org), but could also be used in
+ other contexts such as commercial print kiosks, or in large
+ heterogeneous organizations.
+
+3.7. Accessing Applications from Devices on a Telecoms Infrastructure
+
+ Telecom operators typically have the following properties:
+
+ o A large collection of registered users, many of whom may have
+ identities registered to a fairly high level of assurance (often
+ for payment purposes). However, not all users will have this
+ property -- for example, non-contract customers on mobile telecoms
+ infrastructures in countries with low levels of identity
+ registration requirements.
+
+ o An existing network infrastructure capable of authenticating a
+ device (e.g., a cellphone or an Asymmetric Digital Subscriber Line
+ (ADSL) router) and, by inference, its owner.
+
+
+
+
+Smith Informational [Page 9]
+
+RFC 7832 ABFAB Use Cases May 2016
+
+
+ o A large collection of applications (both web-based and
+ non-web-based) that its users wish to access using their devices.
+ These applications could be hosted by the telecom operator
+ directly, or they could be any application or system on the
+ internet -- for example, network messaging services, VoIP,
+ or email.
+
+ At present, authentication to these applications will be typically
+ configured manually by the user on the device (or on a different
+ device connected to that device) by inputting their (usually
+ pre-provisioned out of band) credentials for that application -- one
+ per application.
+
+ The use of ABFAB technologies in this case, via a mechanism dubbed
+ "federated cross-layer access" (see [FCLA]) would greatly enhance the
+ user experience of using these applications through devices.
+ Federated cross-layer access would make use of the initial mutual
+ authentication between device and network, to allow subsequent
+ authentication and authorization to happen in a seamless manner for
+ the user of that device authenticating to applications.
+
+3.8. Enhanced Security Services for S/MIME
+
+ There are many situations where organizations want to protect
+ information with robust access control, either for implementation of
+ intellectual property right protections, for enforcement of
+ contractual confidentiality agreements, or because of legal
+ regulations. The Enhanced Security Services (ESS) for S/MIME defines
+ an access control mechanism that is enforced by the recipient's
+ client after decryption of the message (see [MSG-AC-REQ]). The data
+ model used makes use of Policy Decision Points (PDPs), which make the
+ policy decisions; Policy Enforcement Points (PEPs), which make
+ decision requests to the PDP; and Policy Information Points (PIPs),
+ which issue attributes about subjects. The decisions themselves are
+ based on the policies and on the subject attributes.
+
+ The use of ABFAB technologies in this case would enable both the
+ front-end and back-end attribute exchange required to provide subject
+ attributes. When the PEP contacts the PDP, it would initiate an
+ ABFAB authentication in order to authenticate to the PDP and allow it
+ to obtain these required subject attributes. Once authenticated, the
+ PDP would return a token to the subject PEP that could then be used
+ for subsequent authentications to the PDP.
+
+
+
+
+
+
+
+
+Smith Informational [Page 10]
+
+RFC 7832 ABFAB Use Cases May 2016
+
+
+3.9. Smart Objects
+
+ Many smart device deployments involve multiple organizations that do
+ not directly share security infrastructure. For example, in smart
+ power deployments, devices (e.g., appliances) and infrastructure
+ (e.g., electric car chargers) will wish to connect to an energy
+ management system. The energy management system is provided by a
+ utility company in some deployments. The utility company may wish to
+ grant access only to authorized devices; for example, a consortium of
+ utility companies and device manufacturers may certify devices to
+ connect to power networks.
+
+ In another example, consumer devices may be used to access cloud
+ services. For example, a camera could be bound to a photo processing
+ site. Authentication and authorization for uploading pictures or
+ ordering prints are required. Sensors could be used to provide data
+ to services run by organizations other than the sensor manufacturer.
+ Authorization and authentication can become very tricky when sensors
+ have no user interface. Cellular devices may want to access services
+ provided by a third party, regardless of whether the cellular network
+ or Wi-Fi is used. This becomes difficult when authorization and
+ billing are coordinated by the cellular provider.
+
+ The use of ABFAB technologies in this case would provide
+ authentication between one entity, such as a smart device, and its
+ IdP. Only two parties are involved in this exchange; this means that
+ the smart device need not participate in any complicated public-key
+ infrastructure even if it is authenticating against many cloud
+ services. Instead, the device can delegate the process of
+ authenticating the service, and even deciding whether the device
+ should be permitted to access the service, to the IdP. This has
+ several advantages. A wide variety of revenue-sharing models are
+ enabled. Because device authentication is only with a single IdP,
+ phishing of device credentials can be avoided. Authorization and
+ decisions about what personal information to release are made by the
+ IdP. The device owner can use a rich interface such as a website to
+ configure authorization and privacy policy even if the device has no
+ user interface. This model works well with pre-provisioning of
+ device credentials.
+
+4. Security Considerations
+
+ This document contains only use cases and defines no protocol
+ operations for ABFAB. Security considerations for the ABFAB
+ architecture are documented in [RFC7831], and security considerations
+ for ABFAB technologies and protocols that are discussed in these use
+ cases are documented in the corresponding protocol specifications.
+
+
+
+
+Smith Informational [Page 11]
+
+RFC 7832 ABFAB Use Cases May 2016
+
+
+5. References
+
+5.1. Normative References
+
+ [RFC7831] Howlett, J., Hartman, S., Tschofenig, H., and J. Schaad,
+ "Application Bridging for Federated Access Beyond Web
+ (ABFAB) Architecture", RFC 7831, DOI 10.17487/RFC7831,
+ May 2016, <http://www.rfc-editor.org/info/rfc7831>.
+
+5.2. Informative References
+
+ [FCLA] Wei, Y., Ed., "Federated Cross-Layer Access", Work in
+ Progress, draft-wei-abfab-fcla-02, March 2012.
+
+ [MSG-AC-REQ]
+ Freeman, T., Schaad, J., and P. Patterson, "Requirements
+ for Message Access Control", Work in Progress,
+ draft-freeman-plasma-requirements-11, March 2015.
+
+ [OASIS.saml-profiles-2.0-os]
+ Hughes, J., Cantor, S., Hodges, J., Hirsch, F., Mishra,
+ P., Philpott, R., and E. Maler, "Profiles for the OASIS
+ Security Assertion Markup Language (SAML) V2.0", OASIS
+ Standard OASIS.saml-profiles-2.0-os, March 2005,
+ <http://docs.oasis-open.org/security/saml/v2.0/
+ saml-profiles-2.0-os.pdf>.
+
+ [RFC1939] Myers, J. and M. Rose, "Post Office Protocol - Version 3",
+ STD 53, RFC 1939, DOI 10.17487/RFC1939, May 1996,
+ <http://www.rfc-editor.org/info/rfc1939>.
+
+ [RFC2326] Schulzrinne, H., Rao, A., and R. Lanphier, "Real Time
+ Streaming Protocol (RTSP)", RFC 2326,
+ DOI 10.17487/RFC2326, April 1998,
+ <http://www.rfc-editor.org/info/rfc2326>.
+
+ [RFC2911] Hastings, T., Ed., Herriot, R., deBry, R., Isaacson, S.,
+ and P. Powell, "Internet Printing Protocol/1.1: Model and
+ Semantics", RFC 2911, DOI 10.17487/RFC2911,
+ September 2000, <http://www.rfc-editor.org/info/rfc2911>.
+
+ [RFC3501] Crispin, M., "INTERNET MESSAGE ACCESS PROTOCOL -
+ VERSION 4rev1", RFC 3501, DOI 10.17487/RFC3501,
+ March 2003, <http://www.rfc-editor.org/info/rfc3501>.
+
+
+
+
+
+
+
+Smith Informational [Page 12]
+
+RFC 7832 ABFAB Use Cases May 2016
+
+
+ [RFC3550] Schulzrinne, H., Casner, S., Frederick, R., and V.
+ Jacobson, "RTP: A Transport Protocol for Real-Time
+ Applications", STD 64, RFC 3550, DOI 10.17487/RFC3550,
+ July 2003, <http://www.rfc-editor.org/info/rfc3550>.
+
+ [RFC4251] Ylonen, T. and C. Lonvick, Ed., "The Secure Shell (SSH)
+ Protocol Architecture", RFC 4251, DOI 10.17487/RFC4251,
+ January 2006, <http://www.rfc-editor.org/info/rfc4251>.
+
+ [RFC5280] Cooper, D., Santesson, S., Farrell, S., Boeyen, S.,
+ Housley, R., and W. Polk, "Internet X.509 Public Key
+ Infrastructure Certificate and Certificate Revocation List
+ (CRL) Profile", RFC 5280, DOI 10.17487/RFC5280, May 2008,
+ <http://www.rfc-editor.org/info/rfc5280>.
+
+ [RFC5321] Klensin, J., "Simple Mail Transfer Protocol", RFC 5321,
+ DOI 10.17487/RFC5321, October 2008,
+ <http://www.rfc-editor.org/info/rfc5321>.
+
+Acknowledgments
+
+ These use cases have been developed and documented using significant
+ input from Jens Jensen (STFC Rutherford Appleton Laboratory), Daniel
+ Kouril (CESNET), Michal Prochazka (CESNET), Ian Stewart (University
+ of Edinburgh), Stephen Booth (Edinburgh Parallel Computing Centre),
+ Eefje van der Harst (SURFnet), Joost van Dijk (SURFnet), Robin
+ Breathe (Oxford Brookes University), Yinxing Wei (ZTE Corporation),
+ Trevor Freeman (Microsoft Corporation), Sam Hartman (Painless
+ Security, LLC), and Yuri Demchenko (University of Amsterdam).
+
+Contributors
+
+ The following individuals made important contributions to the text of
+ this document: Tim Bannister (Manchester University), Simon Cooper
+ (Jisc), Josh Howlett (Jisc), and Mark Tysom (Jisc).
+
+Author's Address
+
+ Dr. Rhys Smith (editor)
+ Jisc
+ Lumen House, Library Avenue, Harwell
+ Oxford OX11 0SG
+ United Kingdom
+
+ Phone: +44 1235 822145
+ Email: rhys.smith@jisc.ac.uk
+
+
+
+
+
+Smith Informational [Page 13]
+