MAF&MEF Interface Specification discussion of the next steps

Slides:



Advertisements
Similar presentations
CMDH Refinement Contribution: oneM2M-ARC-0397
Advertisements

SEC Clarification Group Name: WG4 (SEC-2014-xxxx) Decision  Meeting Date: Discussion  Source: OBERTHUR Technologies Information  Contact:
Summary on the M2M CMDH Policies Management Object (MCMDHMO)
Is a Node or not Node? ARC Node_resolution Group Name: ARC Source: Barbara Pareglio, NEC, Meeting Date: ARC#9.1 Agenda.
Credential Identifiers Group Name: SEC#14.2 Source: Phil Hawkes, Qualcomm Inc, Meeting Date:
On Persistent AE Identifiers Group Name: SEC#12.2 Source: Phil Hawkes, Qualcomm Inc (TIA), Francois Ennesser,
App-ID Use Cases, Syntax and Attributes SEC App-ID_Use_Cases,_Syntax_and_Attributes Group Name: Architecture Source: Darold Hemphill, iconectiv,
In-Band Access Control Framework Group Name: WG4 SEC Source: Qualcomm Meeting Date: Agenda Item:
Certificate Enrolment STEs Group Name: SEC#17.2 Source: Phil Hawkes, Qualcomm Inc, Meeting Date:
Announcement Resources ARC Announcement_Issues Group Name: WG2 Source: Barbara Pareglio, NEC Meeting Date: Agenda Item: Input Contribution.
Introduction of PRO WG activities Group Name: TP Source: Shingo Fujimoto, FUJITSU, Meeting Date: Agenda Item:
End-to-End security definition Group Name: SEC WG4 Source: Phil Hawkes, Qualcomm, Meeting Date:
In-Band Access Control Framework Group Name: WG4 SEC Source: Qualcomm Meeting Date: Agenda Item:
Management of CMDH Policies Group Name: WG5-MAS Source: Wolfgang Granzow, Qualcomm, Meeting Date: Agenda Item: Management.
Response Status Codes Concepts for oneM2M Group Name: WG3 Source: Philip Jacobs, Cisco, Meeting Date: Agenda Item: TS-0004.
Fuctional Procedure for oiC interworking
Certificate Enrolment STEs Group Name: SEC#17.3 Source: Phil Hawkes, Qualcomm Inc, Meeting Date:
Customized Resource Types MAS Group Name: MAS + ARC + PRO WGs Source: Wolfgang Granzow, Qualcomm Inc., Meeting Date:
Status Report on Access TP8 Group Name: WG2 Decision  Meeting Date: Discussion  Source: OBERTHUR Technologies Information  Contact:
Primitive End-to-End Security Requirements Group Name: SEC WG4 Source: Phil Hawkes, Qualcomm, Meeting.
App-ID Use Cases, Syntax and Attributes ARC R01-App-ID_Use_Cases,_Syntax_and_Attributes Group Name: Architecture Source: Darold Hemphill, iconectiv,
Interworking with an External Dynamic Authorization System Group Name: SEC WG Source: Qualcomm Inc., Wolfgang Granzow & Phil Hawkes Meeting Date: SEC#20.2,
Issues pertaining to IOP test Group Name: TST Source: Jiaxin Yin, Huawei Technologies Co., Ltd. Meeting Date: Agenda Item: TBD.
M2M Service Session Management (SSM) CSF
E2EKey Resource Group Name: SEC WG Source: Qualcomm Inc., Wolfgang Granzow & Phil Hawkes Meeting Date: SEC#20.3, Agenda Item: End-to-End Security.
Routing Problem of the Current Architecture Group Name: ARC Source: Hongbeom Ahn, LG Electronics, Meeting Date: Agenda.
Realizing Ms Interface with OMA DM Group Name: MAS WG Source: Seungkyu Park, LG Meeting Date:
Security API discussion Group Name: SEC Source: Shingo Fujimoto, FUJITSU Meeting Date: Agenda Item: Security API.
Protocol Issues related to Plugtest Group Name: TST Source: Wolfgang Granzow, Qualcomm Inc., Meeting Date: Agenda.
SEC #11 WG4 Status & Release 1 Outlook Group Name: Source:,, Meeting Date: Agenda Item:
End-to-End Primitive Security: Challenges and Suggestions Group Name: SEC WG Source: Qualcomm Inc., Phil Hawkes, Wolfgang Granzow, Josef Blanz Meeting.
Clarification of Access Control Mechanism on Rel-1 & Rel-2 Group Name: SEC ( ARC & PRO for information) Source: FUJITSU Meeting Date: Agenda.
Adding Non-blocking Requests Contribution: oneM2M-ARC-0441R01R01 Source: Josef Blanz, Qualcomm UK, Meeting Date: ARC 7.0,
Authorization Architecture Discussion Group Name: SEC WG Source: Seongyoon Kim, LG Electronics, Meeting Date: 28 MAY, 2014 Agenda.
Protocol Issues related to Plugtest Group Name: TST Source: Wolfgang Granzow, Qualcomm Inc., Meeting Date: Agenda.
Consideration Security Issues on Registration Group Name: WG4 (SEC) Source: Shingo Fujimoto, FUJITSU, Meeting Date:
On-Boarding and Enrolment Group Name: SEC WG Source: Qualcomm Inc., Phil Hawkes, Wolfgang Granzow, Josef Blanz Meeting Date: SEC#22, Agenda.
Reasons for CSF Clean-up (Issues & Next Steps) Group Name: WG2 Source: Syed Husain – NTT DOCOMO Meeting Date: (ARC_9.3) Agenda Item: 6 DOC#:
Possible Solution of Interworking between oneM2M and OSGi
Possible options of using DDS in oneM2M Group Name: ARC Source: KETI, Huawei, Hitachi, China Unicom Meeting Date: Agenda Item: DDS binding.
Specifying the Address of Management Client of Managed Entity Group Name: ARC Source: Hongbeom Ahn, SK Telecom, Meeting Date: TP#21 Agenda.
Interworking with an External Dynamic Authorization System Group Name: SEC WG Source: Qualcomm Inc., Wolfgang Granzow & Phil Hawkes Meeting Date: SEC#20.1,
[authenticationProfile] <mgmtObj> specialization
Discussion on DDS protocol binding
3GPP MBMS protocol stack
CSE Retargeting to AE, IPE, and NoDN Hosted Resources
CSE Retargeting to AE, IPE, and NoDN Hosted Resources
Service Enabled AE (SAE)
End-to-End Security for Primitives
2nd Interoperability testing issues
3GPP interworking in R3 Group Name: ARC
Possible options of using DDS in oneM2M
Discussion about Use Case and Architecture in Developer Guide
NIDD Discussion Points
oneM2M Service Layer Protocol Version Handling
Allow tool-specific code in TTCN-3 as well in conformance test suite
3GPP Rel-13 Interworking discussions
WPM ad-hoc group report TP#25
Proximal IoT Interworking solution discussion
Discussion to clarify online/offline behavior
3GPP Interworking Abstraction
Considering issues regarding handling token
Overview of E2E Security CRs
CMDH Refinement Contribution: oneM2M-ARC-0397R01
Discussion on XSD open issues
Service Layer Dynamic Authorization [SLDA]
May 2018 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Discussion on Suitable Parameters for SCHC]
3GPP V2X Interworking Potential Impact
May 2018 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Discussion on Suitable Parameters for SCHC]
Summary of the MAF and MEF Interface Specification TS-0032
Presentation transcript:

MAF&MEF Interface Specification discussion of the next steps SEC-2016-0193 MAF&MEF Interface Specification discussion of the next steps Group Name: SEC WG Source: Qualcomm Inc., Phil Hawkes, Wolfgang Granzow Meeting Date: SEC#26, 2016-12-02 Agenda Item: WI-0057-TEF_interface

Objective At TP#24 the WI-0057 “TEF Interface” was agreed From this WI, the stage-3 details of the interface between AEs and CSEs with M2M Authentication Function (MAF) and M2M Enrolment Function (MEF) shall result Trust Enabling Function (TEF) is a generic term used for MAF and MEF Discussion paper SEC-2016-0165R01 was presented at TP#25 3 reference architecture options were proposed: separate reference points for MAF and MEF single new reference point for TEF define TEF as a new CSF, then MAF and MEF become CSEs and new reference point is not required, i.e. Mca/Mcc applies No agreement on the way forward was achieved at TP#25

Proposal Let‘s begin developing MAF and MEF interfaces separately, i.e. Mmef and Mmaf, and independent of Mca and Mcc Even if MAF and MEF would be regarded as special types of CSEs, it would still make sense to use a distinct name for the reference points We also use different names Mca and Mcc although the protocols used on these reference points are essentially identical Alternatively we could use notation Ma and Me There was discussion on using a one- or two-character index

Title of the new specification When avoiding the term “TEF”, what should be the title of the new specification to be developed under WI-0057 “TEF Interface”? New working title could be one of the following: MAF and MEF Interface Specification (suggested here) Credential Management Specification Trust Enabling Architecture

Technical assumptions for MAF The procedures already specified in TS-0003 assume that a MAF communicates with a MAF Client which is associated with a oneM2M entity (AE or CSE) The MAF itself represents the server in this client-server model (we however do not use the term “MAF server“) MAF Mmaf Mmaf M2M Entity A M2M Entity B MAF Client MAF Client

Use of MAF Interface as defined in TS-0003

Extension of present concept MAF Clients could be associated with oneM2M (field) nodes (i.e. ASN, ADN, MN) rather than with AE or CSE entities In this case a single MAF Client can act on behalf of all entities implemented on the node We propose supporting both approaches MAF Mmaf Mmaf M2M Node MAF Client AE CSE Mcc IN-CSE MAF Client

Resulting Reference Architecture

Definitions (to be included into the new spec) MAF Client: functionality for performing MAF procedures on behalf of an associated CSE or AE, or on behalf of CSE or AE(s) present on an associated Node. Note: the existing definition in TS-0003 needs to be updated accordingly MEF Client: functionality for performing MEF procedures on behalf of an associated CSE or AE, or on behalf of CSE or AE(s) present on an associated Node. MAF interface: Communication interface between a MAF and a MAF Client identified by reference point Mmaf MEF interface: Communication interface between a MEF and a MEF Client identified by reference point Mmef

Proposed communication scheme on Mmaf Reusing oneM2M RESTful protocol as applied on Mca and Mcc reference points Reusing existing request and response primitives many optional Mcc/Mca primitive parameters/features not required on Mmaf andMmef (not eliminating future extensions) Blocking-mode access to server only (non-blocking may be defined in future release)

Request Primitive parameters Data Type Multiplicity Presence on Mmaf Notes Operation m2m:operation 1 M To xs:anyURI From m2m:ID 0..1 O AE-ID, CSE-ID, M2M-Node-ID or Device-ID, if available Request Identifier m2m:requestID Resource Type m2m:resourceType resource types applicable to Mmaf or Mmef, tbd. Content m2m:primitiveContent Role IDs List of m2m:roleID NA Originating Timestamp m2m:timestamp Request Expiration Timestamp m2m:absRelTimestamp Result Expiration Timestamp Operation Execution Time Response Type m2m:responseTypeInfo Default: Use 'blockingRequest' Result Persistence Result Content m2m:resultContent New enumeration values tbd Event Category m2m:eventCat Delivery Aggregation xs:boolean Group Request Identifier xs:string Filter Criteria m2m:filterCriteria New filter criteria tbd. Discovery Result Type m2m:discResType Tokens List of m2m:dynAuthJWT Token IDs List of m2m:tokenID   LocalTokenIDs List of xs:NCName Token Request Indicator

Response Primitive parameters Data Type Multiplicity Presence on Maf Notes Response Status Code m2m:responseStatusCode 1 M Possibly additional response status codes required tbd Request Identifier m2m:requestID Content m2m:primitiveContent 0..1 O To m2m:ID NA From Originating Timestamp m2m:timestamp Result Expiration Timestamp m2m:absRelTimestamp Event Category m2m:eventCat Assigned Token Identifiers m2m:dynAuthLocalTokenIdAssignments Token Request Information m2m:dynAuthTokenReqInfo

MAF Interface Stage 3 Details in the new spec Use similar specification approach as currently applied for specification of Mcc/Mca stage 3 details: Define request and response primitives with parameters applicable on Mmaf Define new resource types hosted by the MAF, structure and data types as defined in TS-0004 Describe generic procedures at the MAF and MAF Client Describe procedures specific to new resource types Reuse bindings to application layer transport protocols TS-0008/9/20 (HTTP/1.1, CoAP, WebSocket; MQTT not suitable) Specify “delta” relative to TS-0008/9/20 (if there is any)

MAF and MEF Procedures defined in TS-0003 Remote Security Provisioning Frameworks (RSPF) Clause 8.3 in TS-0003 Certificate Enrolment currently part of this functionality but only partly specified right now MAF-based security frameworks Clause 8.8 in TS-0003 Clause 8.2.2.3 for MAF-based SAEF Clause 8.4.2 for MAF-based ESPrim Currently no text for MAF-based ESData Remote security frameworks for E2E security Clause 8.6 in TS-0003 Referenced on Clause 8.5.2.2.3 for ESData

Summary of proposed way forward Start development of the new specification under the working title “MAF and MEF Interface Specification” at TP#26: Proposed skeleton: SEC-2016-0166R01 Proposed scope: SEC-2016-0167R01 Proposed main body: SEC-2016-0168R01 (addressing MAF interface only) Add parts which were dropped from SEC-2016-0138 (short names) into the new specification (can be postponed to SEC#26.x telcos) More details on procedures need to be added in TS-0003 Mapping between MAF/MEF procedures to CRUD procedures defined in the new MAF and MEF Interface Specification (i.e. follow-up on SEC-2016-0137) Add definition of new reference points to TS-0001 when the new specification has become stable