2000
DOI: 10.17487/rfc2989
|View full text |Cite
|
Sign up to set email alerts
|

Criteria for Evaluating AAA Protocols for Network Access

Abstract: This document summarizes the requirements collected from those sources, separating requirements for authentication, authorization and accounting. Details on the requirements are available in the original documents. Aboba, et al.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0
7

Year Published

2004
2004
2019
2019

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 24 publications
(15 citation statements)
references
References 17 publications
0
8
0
7
Order By: Relevance
“…The examples users listed above reflect one degree of freedom. How the instructor "stages" the wiki is another, and finally the authentication, authorization and accounting (AAA) troika from information security is another degree of freedom [Aboba et al, 2000;Egan and Mather, 2005] The instructor can stage the wiki in a number of ways. This pedagogical choice should be based on the objectives of the assignment.…”
Section: Wiki Setupmentioning
confidence: 99%
“…The examples users listed above reflect one degree of freedom. How the instructor "stages" the wiki is another, and finally the authentication, authorization and accounting (AAA) troika from information security is another degree of freedom [Aboba et al, 2000;Egan and Mather, 2005] The instructor can stage the wiki in a number of ways. This pedagogical choice should be based on the objectives of the assignment.…”
Section: Wiki Setupmentioning
confidence: 99%
“…Corporate security policies was therefore expressed in terms of access-control policies as applied to subjects in certain roles seeking access to objects residing within a given administrative domain. This problem was often referred to as Authentication, Authorization and Audit (AAA) in the 1990s [21]. Part of the AAA model developed during the 1990s was an abstraction of functions pertaining to deciding access rules, from functions pertaining to enforcing them.…”
Section: Policy-based Access Control and Authorizationmentioning
confidence: 99%
“…Moreover its architecture should be redundant and failsafe. AAA protocol requirements have been defined in (Aboba et al, 2000). The basic requirements are: (1) Scalability, (2) Fail-over, (3) Mutual authentication between the client and the server, (4) Transmission level security, (5) Data object Confidentiality, (6) Data object Integrity, (7) Certificate transport, (8) Reliable AAA transport mechanism, (9) Run Over IPv4 and IPv6, (10) Auditability, (11) Ability to carry service-specific attributes.…”
Section: Aaa Architecturesmentioning
confidence: 99%