1 / 4

H.   Schulzrinne ,  S.  McCann,  G.   Bajko ,     H.  Tschofenig,  D.   Kroeselberg

Extensions to the Emergency Services Architecture for dealing with Unauthenticated and Unauthorized Devices. H.   Schulzrinne ,  S.  McCann,  G.   Bajko ,     H.  Tschofenig,  D.   Kroeselberg. Status. http://tools.ietf.org/html/draft-ietf-ecrit-unauthenticated-access-05

vin
Download Presentation

H.   Schulzrinne ,  S.  McCann,  G.   Bajko ,     H.  Tschofenig,  D.   Kroeselberg

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Extensions to the Emergency Services Architecture for dealing with Unauthenticated and Unauthorized Devices H.  Schulzrinne,  S.  McCann,  G.  Bajko,     H.  Tschofenig,  D.  Kroeselberg

  2. Status • http://tools.ietf.org/html/draft-ietf-ecrit-unauthenticated-access-05 • Scope  of  the  draft: • No  Access  Authentication (NAA) • No  ASP  (NASP) • Zero­balance ASP  (ZBP)

  3. Deployment Challenge • Today’s  networks  suffer  from  many   limitations. • Traffic inception  (e.g.,  HTTP  redirect) • Lots  of  userinteraction  for  network  access • Claim: • Described  solution  cannot  be  deployed  with   today’s  network.

  4. Lack  of  network  access   authorization • The  NAA  case  only  focuses  on  the  lack  of   credentials  but  does  not  consider  the  case   where  credentials  are  available  but  network   access  authorization  fails  nevertheless.   • Lack  of  authorization  at  the  application  layer  is   covered.

More Related