Last Call Review of draft-ietf-ace-usecases-09
review-ietf-ace-usecases-09-opsdir-lc-jethanandani-2015-10-26-00

Request Review of draft-ietf-ace-usecases
Requested rev. no specific revision (document currently at 10)
Type Last Call Review
Team Ops Directorate (opsdir)
Deadline 2015-10-20
Requested 2015-10-09
Authors Ludwig Seitz, Stefanie Gerdes, Göran Selander, Mehdi Mani, Sandeep Kumar
Draft last updated 2015-10-26
Completed reviews Genart Last Call review of -09 by Joel Halpern (diff)
Secdir Last Call review of -09 by Adam Montville (diff)
Opsdir Last Call review of -09 by Mahesh Jethanandani (diff)
Assignment Reviewer Mahesh Jethanandani
State Completed
Review review-ietf-ace-usecases-09-opsdir-lc-jethanandani-2015-10-26
Reviewed rev. 09 (document currently at 10)
Review result Ready
Review completed: 2015-10-26

Review
review-ietf-ace-usecases-09-opsdir-lc-jethanandani-2015-10-26

I have reviewed this document as part of the Operational directorate’s ongoing effort to review all IETF documents being processed by the IESG.  These comments were written with the intent of improving the operational aspects of the IETF drafts. Comments that are not addressed in last call may be included in AD reviews during the IESG review.  Document editors and WG chairs should treat these comments just like any other last call comments.

Document reviewed:  draft-ietf-ace-usecases-09

Status:

Ready

Summary:

This document includes a collection of representative use cases for authentication and authorization in constrained environments.  These use cases aim at identifying authorization problems that arise during the lifecycle of a constrained device and are intended to provide a guideline for developing a comprehensive authentication and authorization solution for this class of scenarios.

The document is informational and does not define something that needs an operational or management review. 







Mahesh Jethanandani

mjethanandani at gmail.com