Jian Jie, 

Will your "User Group Based Policy" also use the  "Event - Condition - Action" 
paradigm which I2NSF WG agreed to use from the Buenos Aires meeting?

If your answer is "Yes", can you add the Information model for your "User Group 
Based Policy"? 

For example, 
- The information (and data) model for "Event"
- The information (and data) model for "Condition"
- The information (and data) model for "Action".

It would be helpful if you post your detailed description for each category 
above on the mailing list to get some discussion before asking for WG adoption. 

Thanks, Linda

-----Original Message-----
From: I2nsf [mailto:[email protected]] On Behalf Of Youjianjie
Sent: Monday, June 13, 2016 3:38 AM
To: [email protected]
Subject: [I2nsf] User Group based policy

Hi,

We are working on the User-group Aware Policy Control (UAPC) framework, which 
facilitates consistent enforcement of security policies based on user group 
identity. 
https://tools.ietf.org/html/draft-you-i2nsf-user-group-based-policy-01 

Use cases for UAPC:
With the increased popularity of enterprise wireless networks and remote access 
technologies such as Virtual Private Networks (VPN), enterprise networks have 
become borderless, and employees' locations can be anywhere. Enabling 
large-scale employee mobility across many access locations improves enterprise 
production efficiency but also introduces challenges related to enterprise 
network management and security. The IP address of the user can change 
frequently when the user is in motion. Consequently, IP address-based policies 
(such as forwarding, routing, QoS and security policies) may not be flexible 
enough to accommodate users in motion.

User-group ID represents the collective identity of a group of users, and is 
determined by a set of one or more matching criteria (e.g., roles, 4-, 5-, and 
6-tuples, VLAN ID, etc.) that disambiguates this user-group entity from other 
entities.

The UAPC framework consists of four main components: (1) Policy Server, (2) 
Authentication Server, (3) Security Controller, (4) Network Security Functions.

Within the UAPC framework, inter-group policy enforcement requires two key 
components: (1) user-group-to-user-group access policies, and (2) sets of NSFs 
that are managed by sets of policies.

Some requirements are proposed in the last section. 

Any comments or suggestions are welcome.

Thanks,
Jianjie

_______________________________________________
I2nsf mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/i2nsf

_______________________________________________
I2nsf mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/i2nsf

Reply via email to