Hi,

At the last TSC a question was raised that in principle was whether we could 
regarding the secure network design and only exposed ports as sufficient 
mechanism for secure communication between the ONAP components.

This was discussed today in the security sub-committee, and the conclusions 
were:

     *   AAF can provide certificates to the users (projects). The implication 
is that AAF has to be configured to route to a CA.
     *   Regarding relying on network design the means of security; It was not 
considered as an appropriate assumption for secure communication in general. It 
maybe a deployment option.  Instead it was stated that the project should 
support the capability to be configured to use TLS (either with their own 
configured certificate or requesting it via AAF.  Ideally it would be using 
AAF).

Best Regards,

Steve.


[Ericsson]<http://www.ericsson.com/>

STEPHEN TERRILL
Technology Specialist
POA Architecture and Solutions
Business Unit Digital Services

Ericsson
Ericsson R&D Center, via de los Poblados 13
28033, Madrid, Spain
Phone +34 339 3005
Mobile +34 609 168 515
[email protected]
www.ericsson.com


[http://www.ericsson.com/current_campaign]<http://www.ericsson.com/current_campaign>

Legal entity: Ericsson EspaƱa S.A, compay registration number ESA288568603. 
This Communication is Confidential. We only send and receive email on the basis 
of the terms set out at 
www.ericsson.com/email_disclaimer<http://www.ericsson.com/email_disclaimer>

_______________________________________________
ONAP-TSC mailing list
[email protected]
https://lists.onap.org/mailman/listinfo/onap-tsc

Reply via email to