|
2 | 2 | title: CAEP Interoperability Profile 1.0 - draft 02 |
3 | 3 | abbrev: caep-interop |
4 | 4 | docname: caep-interoperability-profile-1_0 |
5 | | -date: 2025-09-16 |
6 | 5 |
|
7 | 6 | ipr: none |
8 | 7 | cat: std |
@@ -30,6 +29,7 @@ author: |
30 | 29 | normative: |
31 | 30 | RFC2119: |
32 | 31 | RFC8174: |
| 32 | + RFC8417: |
33 | 33 | RFC9493: # Subject Identifier Formats for SETs |
34 | 34 | RFC8935: # Push delivery |
35 | 35 | RFC8936: # POLL delivery |
@@ -99,37 +99,34 @@ normative: |
99 | 99 |
|
100 | 100 | --- abstract |
101 | 101 | This document defines an interoperability profile for implementations of the |
102 | | -Shared Signals Framework (SSF) {{SSF}} and the Continuous Access Evaluation |
103 | | -Profile (CAEP) {{CAEP}}. This also profiles The OAuth 2.0 Authorization |
104 | | -Framework {{RFC6749}} usage in the context of the SSF framework. The |
105 | | -interoperability profile is organized around use-cases that improve security |
106 | | -of authenticated sessions. It specifies certain optional elements from within |
107 | | -the SSF and CAEP specifications as being required to be supported in order to |
108 | | -be considered as an interoperable implementation. |
109 | | - |
110 | | -Interoperability between SSF and CAEP, leveraging OAuth {{RFC6749}} provides |
111 | | -greater assurance to implementers that their implementations will work out of |
112 | | -the box with others. |
| 102 | +Shared Signals Framework ({{SSF}}) and the Continuous Access Evaluation |
| 103 | +Profile ({{CAEP}}). It specifies required attributes for SSF endpoints, how to |
| 104 | +use OAuth 2.0 {{RFC6749}} for their authorization, and the core use cases |
| 105 | +to improve security of authenticated sessions. When implemented, the profile |
| 106 | +enables seamless interoperability between SSF Transmitters and Receivers. |
113 | 107 |
|
114 | 108 | --- middle |
115 | 109 |
|
116 | 110 | # Introduction {#introduction} |
117 | 111 |
|
118 | | -SSF and CAEP together enable improved session security outcomes. This |
119 | | -specification defines the minimum required features from SSF and CAEP that an |
120 | | -implementation MUST offer in order to be considered as an interoperable |
121 | | -implementation. This document defines specific use cases. An implementation MAY |
122 | | -support only a subset of the use cases defined herein, and SHALL be considered |
123 | | -an interoperable implementation for the specific use-cases it supports. The |
124 | | -following use-cases are considered as a part of this specification: |
125 | | - |
126 | | -Session Revocation |
127 | | -: A SSF Transmitter or Receiver is able to respectively generate or respond to |
128 | | -the CAEP session-revoked event |
129 | | - |
130 | | -Credential Change |
131 | | -: A SSF Transmitter or Receiver is able to respectively generate or respond to |
132 | | -the CAEP credential-change event |
| 112 | +The Shared Signals Framework enables sharing of Security Event Tokens (SETs) |
| 113 | +{{RFC8417}} between cooperating peers. When combined with Continuous Access |
| 114 | +Evaluation Profile ({{CAEP}}) to share events such as Session Revocation and |
| 115 | +Credential Change, implementations can greatly improve their session and |
| 116 | +security outcomes. |
| 117 | + |
| 118 | +The CAEP Interoperability Profile outlines the minimum required features that |
| 119 | +implementations must offer in order to be considered compliant and to achieve |
| 120 | +interoperability. It describes specific use cases with CAEP session-revoked and |
| 121 | +credential-change events. Support for all use cases listed herein is not |
| 122 | +required in order to be considered compliant with this profile. An |
| 123 | +implementation can choose specific use cases to support. |
| 124 | + |
| 125 | +The following specifications are profiled in this document: |
| 126 | + |
| 127 | +* Shared Signals Framework {{SSF}} |
| 128 | +* Continuous Access Evaluation Profile ({{CAEP}}) |
| 129 | +* OAuth 2.0 {{RFC6749}} |
133 | 130 |
|
134 | 131 | ## Notational Conventions |
135 | 132 |
|
|
0 commit comments