Skip to content

Commit

Permalink
Michaels comments
Browse files Browse the repository at this point in the history
  • Loading branch information
gselander committed Jul 24, 2023
1 parent 3949e90 commit 048c37d
Showing 1 changed file with 6 additions and 5 deletions.
11 changes: 6 additions & 5 deletions draft-selander-lake-authz.md
Original file line number Diff line number Diff line change
Expand Up @@ -47,6 +47,7 @@ author:

normative:

RFC8366:
RFC8392:
RFC8949:
RFC9052:
Expand Down Expand Up @@ -137,6 +138,7 @@ Appendix C.1 of {{I-D.ietf-lake-edhoc}} contains some basic info about CBOR.

The (potentially constrained) device (U) wants to enroll into a domain over a constrained link.
The device authenticates and enforces authorization of the (non-constrained) domain authenticator (V) with the help of a voucher conveying authorization information.
The voucher has a similar role as in {{RFC8366}} but should be considerably more compact.
The domain authenticator, in turn, authenticates the device and authorizes its enrollment into the domain.

The procedure is assisted by a (non-constrained) enrollment server (W) located in a non-constrained network behind the domain authenticator, e.g. on the Internet, providing information to the device (the voucher) and to the domain authenticator as part of the protocol.
Expand Down Expand Up @@ -180,10 +182,10 @@ Each of the three parties have protected communication with the other two during
| <---------------------------------------------------> |
| |
+----+-----+ +---------------+ +-------+-------+
| | | | non- | |
| Device | con- | Domain | con- | Enrollment |
| | stra- | Authenticator | stra- | Server |
| (U) | ined | (V) | ined | (W) |
| | | | | |
| Device | con- | Domain | not con- | Enrollment |
| | strained | Authenticator | strained | Server |
| (U) | network | (V) | network | (W) |
| | | | | |
+----+-----+ +-------+-------+ +-------+-------+
| | |
Expand All @@ -194,7 +196,6 @@ Each of the three parties have protected communication with the other two during
{: #fig-trust title="Overview of pre-existing relations." artwork-align="center"}



## Device (U) {#device}

To authenticate to V, the device (U) runs EDHOC in the role of Initiator with authentication credential CRED_U, for example, an X.509 certificate or a CBOR Web Token (CWT, {{RFC8392}}). CRED_U may, for example, be carried in ID_CRED_I of EDHOC message_3 or be provisioned to V over a non-constrained network, see bottom of {{fig-protocol}}.
Expand Down

0 comments on commit 048c37d

Please sign in to comment.