Hi, Rhys

  Thanks for your clarifications.
  I agree that the whole document SHOULD conforms with the same style. I 
appreciate your rewording work.

My comment is as follow.
=====

Accessing Applications from Devices on a Mobile Telecoms Infrastructure
Yinxing#1> Shall the use case be limted in Mobile Telecoms Infrastructure? 
The mobile access is just one specific example, some other access types 
(e.g. fixed-line access such as ADSL access) may need to be considered. 
My suggestion is to remove "Mobile" in the title.

Mobile telecom operators typically have the following properties:

    * A large collection of registered users, many of whom may have 
identities registered to a fairly high level of assurance (often for 
payment purposes). However, not all users will have this property - for 
example, non-contract customers in countries with low levels of identity 
registration requirements.

    * An existing network infrastructure capable of authenticating a 
mobile device, and by inference, its owner.

    * A large collection of applications (both web-based and non 
web-based) that its users wish to access using their mobile device. These 
applications could be hosted by the mobile telecoms operator directly, or 
could be any application or system on the internet - for example, network 
messaging services, VoIP, email, etc.

At present, authentication to these applications will be typically 
configured manually by the user on their mobile device but inputting their 
(usually pre-provisioned out-of-band) credentials for that application - 
one per application.

The use of ABFAB technologies in this case, via a mechanism dubbed 
"federated cross-layer access" (see [ref]) would enhance the user 
experience of using these applications on mobile devices greatly. 
Federated cross-layer access would make use of the initial mutual 
authentication between device and network to enable subsequent 
authentication and authorisation to happen in a seamless manner for the 
user of that device authenticating to applications.

=====

-------------
Best Regards!
Yinxing Wei
 



Rhys Smith <[email protected]> 
发件人:  [email protected]
2011/11/02 07:06

收件人
[email protected]
抄送
[email protected], [email protected], [email protected], [email protected]
主题
Re: Please review the use case "4.x Federated Cross-Layer Access"






Hi Yinxing, (cc:ed to abfab list for discussion),

Some answers to your answers below, followed by some suggested rewording. 


For the text "but that's not the purpose of this document", the 
clarification is as follows: 
(1), Federated identity is in the scope of abfab wg,and the case also 
supports non-web application. 
(2), in the section 3. Context of Use Cases in this document 
(draft-ietf-usecases-01), it says: 
In the interest of promoting the development of technology of broad 
applicability, the present authors welcome use cases and requirements 
from other sectors and communities. 

1 - Yes, federated identity is in the scope of the WG. But the purpose of 
the working group is not to explain why federated identity in general is a 
good thing.

2 - Absolutely, please don't misunderstand, I'm happy to accept all valid 
use cases that people come up with...



Yinxing#2>The point is that the mobile network infrastructure has already 
had security capabilities (e.g. authentication, integrity and 
confidentiality ) which is mandatory for user equipment attacked to 
network. 
Application can make use of this capability without duplicating the 
similar task done in network layer. As to desktop or laptop, when they 
connect to the network, the authentication is performed in other way 
provided by network operators. 


OK, yes, I see that in your particular use case the process would be 
slightly different than in normal use cases, and so therefore might well 
be worthy of including in the use case doc - if your separate I-D gains 
consensus.

If it is to go in the use case doc, however, the current text doesn't 
really fit in the document as it stands (both in terms of style and 
content). It really does say a lot of unnecessary things (e.g. federated 
access is good because it means users don't have to remember multiple 
credentials) and things that I'm sure people (including myself) would 
argue with (e.g. do all telecom operators always provide trusted identity? 
I think not!).

So I've had a go at writing my own version of this use case trying to draw 
out the main points that you're arguing for. Does this capture what is 
trying to be said sufficiently well? (It still needs tidying up, but I'm 
just trying to get the gist of your use case first).

=====

Accessing Applications from Devices on a Mobile Telecoms Infrastructure

Mobile telecom operators typically have the following properties:

    * A large collection of registered users, many of whom may have 
identities registered to a fairly high level of assurance (often for 
payment purposes). However, not all users will have this property - for 
example, non-contract customers in countries with low levels of identity 
registration requirements.

    * An existing network infrastructure capable of authenticating a 
mobile device, and by inference, its owner.

    * A large collection of applications (both web-based and non 
web-based) that its users wish to access using their mobile device. These 
applications could be hosted by the mobile telecoms operator directly, or 
could be any application or system on the internet - for example, network 
messaging services, VoIP, email, etc.

At present, authentication to these applications will be typically 
configured manually by the user on their mobile device but inputting their 
(usually pre-provisioned out-of-band) credentials for that application - 
one per application.

The use of ABFAB technologies in this case, via a mechanism dubbed 
"federated cross-layer access" (see [ref]) would enhance the user 
experience of using these applications on mobile devices greatly. 
Federated cross-layer access would make use of the initial mutual 
authentication between device and network to enable subsequent 
authentication and authorisation to happen in a seamless manner for the 
user of that device authenticating to applications.

=====

Rhys.
--
Dr Rhys Smith: Identity, Access, and Middleware Specialist
Cardiff University & JANET(UK)

email: [email protected] / [email protected]
GPG: 0xDE2F024C




--------------------------------------------------------
ZTE Information Security Notice: The information contained in this mail is 
solely property of the sender's organization. This mail communication is 
confidential. Recipients named above are obligated to maintain secrecy and are 
not permitted to disclose the contents of this communication to others.
This email and any files transmitted with it are confidential and intended 
solely for the use of the individual or entity to whom they are addressed. If 
you have received this email in error please notify the originator of the 
message. Any views expressed in this message are those of the individual sender.
This message has been scanned for viruses and Spam by ZTE Anti-Spam system.
_______________________________________________
abfab mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/abfab

Reply via email to