Skip to content

Commit 0b3dee2

Browse files
Early mentioning of the notation REQx / OPTx for profile requirements
1 parent 12463de commit 0b3dee2

File tree

1 file changed

+5
-3
lines changed

1 file changed

+5
-3
lines changed

draft-ietf-ace-key-groupcomm.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -122,7 +122,9 @@ Candidate group members acting as ACE Clients and authorized to join a group can
122122

123123
In particular, this document defines the operations and interface available at the KDC, as well as general message formats for the interactions between Clients and KDC. At the same time, communications in the group can rely on different approaches, e.g., based on multicast {{I-D.ietf-core-groupcomm-bis}} or on publish-subscribe messaging {{I-D.ietf-core-coap-pubsub}}, and can be protected in different ways.
124124

125-
Therefore, this document delegates details on the communication and security approaches used in a group to separate application profiles. These are specialized instances of this document, targeting a particular group communication approach and defining how communications in the group are protected, as well as the specific keying material and configuration parameters provided to group members. In order to ensure consistency and aid the development of such application profiles, this document defines a number of related compliance requirements (see {{req}}).
125+
Therefore, this document delegates details on the communication and security approaches used in a group to separate application profiles. These are specialized instances of this document, targeting a particular group communication approach and defining how communications in the group are protected, as well as the specific keying material and configuration parameters provided to group members.
126+
127+
In order to ensure consistency and aid the development of such application profiles, {{req}} of this document defines a number of related compliance requirements. In particular, {{req-mandatory}} compiles the requirements that application profiles are REQUIRED to fulfill; these are referred to by an identifier that starts with "REQ". Instead, {{req-optional}} compiles the requirements that application profiles MAY fulfill; these are referred to by an identifier that starts with "OPT".
126128

127129
New keying material is generated and distributed to the group upon membership changes (rekeying), if the application requires backward security (i.e., new group members must be prevented from accessing communications in the group prior to their joining) and forward security (i.e., former group members must be prevented from accessing communications in the group after their leaving).
128130

@@ -2434,7 +2436,7 @@ Expert reviewers should take into consideration the following points:
24342436

24352437
This section lists the requirements on application profiles of this specification, for the convenience of application profile designers.
24362438

2437-
## Mandatory-to-Address Requirements
2439+
## Mandatory-to-Address Requirements {#req-mandatory}
24382440

24392441
* REQ1: Specify the format and encoding of 'scope'. This includes defining the set of possible roles and their identifiers, as well as the corresponding encoding to use in the scope entries according to the used scope format (see {{ssec-authorization-request}}).
24402442

@@ -2496,7 +2498,7 @@ This section lists the requirements on application profiles of this specificatio
24962498

24972499
* REQ30: Define whether Clients must, should, or may support the conditional parameters defined in {{params}}, and under which circumstances.
24982500

2499-
## Optional-to-Address Requirements
2501+
## Optional-to-Address Requirements {#req-optional}
25002502

25012503
* OPT1: Optionally, if the textual format of 'scope' is used, specify CBOR values to use for abbreviating the role identifiers in the group (see {{ssec-authorization-request}}).
25022504

0 commit comments

Comments
 (0)