[ietf-enroll] Proposed use cases

Paul Hoffman / VPNC paul.hoffman at vpnc.org
Mon Nov 17 20:21:55 EST 2003


Greetings again. At the BOF, there was a request to include proposed 
use cases in the charter. This part of the BOF discussion got a bit 
unclear, but it is important to remember that we are talking about 
using or generating three things:

     1. An identifier, within a namespace controlled by the service
        provider, for the service consumer.
     2. Keying information to be used for identity confirmation.
     3. A set of service consumer permissions. These permissions
        describe to the provider the services that the consumer
        wants to access, and they describe to the consumer what
        services offered by the provider will be accessible.

We started talking about "person to person", "person to machine", and 
"machine to machine", but I think these distinctions break down 
because it isn't clear when the person or machine is simply relaying 
established information or is creating it themselves.

A different way to look at the typical use cases is:

- Bringing a new device into a network. Examples are enrolling a 
newly-purchased cell phone and buying temporary access to wireless 
Internet connection.

- Getting a certificate from a certificate authority based on a 
pre-established shared secret. For example, a VPN administrator might 
have told a corporate CA that anyone who uses a specific nonce should 
be given a certificate for any identity within a certain range, or a 
mail administrator has told a CA that anyone who is reachable on a 
particular mail server can get a certificate for mail usage.

Do these usages make sense? Are there other significant ones that we 
want to include in the charter?

--Paul Hoffman, Director
--VPN Consortium


More information about the ietf-enroll mailing list