At the last IETF meeting early March in London I had the pleasure to co-chair the Authentication and Authorization for Constrained Environments (ace) BOF with Kepeng.
The picture of the flyer we distributed during the meeting should give you a rough idea what the topic is about.
Here is my high-level summary of the BOF, which went pretty well (IMHO).
In a nutshell, we are trying to standardize an authentication and authorization protocol for use with constraint devices that makes use of a trusted third party.
In preparation for the BOF we scheduled a few tutorials about relevant technologies. Slides and recordings of the presentations are available.
- Kerberos (by Thomas Hardjono): Slides and recordings in ARF and MP4 format.
- OAuth (by Justin Richer): Slides and recordings in ARF and MP4 format.
- “PKI/Certificate Model” (by Sean Turner): Slides and recordings in ARF and MP4 format.
- AAA (by Lionel Morand during the IETF EDU session): Slides
Note: .arf files are Webex recordings. You might need to use a Webex player. See http://www.webex.com/play-webex-recording.html