Alan DeKok [mailto:al...@deployingradius.com] writes:
> Glen Zorn wrote: > > No. Please don't confuse authentication with authorization. The > parameters > > you mention above are policy-related, not related to authentication. > > You are making arbitrary distinctions between pieces of information. > Ones you like are deemed "authentication". Ones you don't like are > deemed "authorization". The distinctions may be arbitrary but I'm hardly inventing them; these are pretty standard. And for the record, I love both Authentication and Authorization equally; it does annoy me when people can't tell them apart, though ;-). > > > What authentication server is that? Not RADIUS: the semantics of the > > Access-Reject message don't distinguish between failed authentication > and > > failed authorization. > > This is the EMU WG, not RADIUS. Oh, yeah, thanks for reminding me. > EAP has an "EAP-Failure" code. It seems that here in EMU it is habitual to quote others extremely selectively. I guess I'll just have to get used to that; for the time being, though, here's a little context: <Alan DeKok> Authentication decisions have traditionally involved more than just username / password checking. Authentication decisions are also commonly based on "pre-authorization" data, such as: * time of day * location * physical * network * account balance * past behavior * machine used to authenticate And so on. An authentication server may use any of that information to return a "failed authentication" status to the client, even if the username / password is superficially correct. </Alan DeKok> So I guess that what you are saying is that _EAP_ servers (as opposed to AAA servers) typically use such data in making authentication decisions (not access-control decisions or authorization decisions). Is that correct? > > > A server can tell me that I'm not authorized without knowing who I > am? > > Yes. A policy could state that all logins between 5pm and 9am are to > be rejected. In that case, it can reject you without knowing (or > caring) who you are. This process can't be "authorization", because it > can happen *before* authentication. OK. So, if authentication is irrelevant to the enforcement of this policy, how is the policy relevant to EAP? > > >> If we restrict EAP to solely "authentication", then I would ask > what > >> that means. An authentication protocol that is incapable of > >> transporting the data required to make authentication decisions > would > >> be > >> perfectly secure: No one would ever be authenticated. > > > > I have no idea what you're talking about. > > Explain what criteria you use to distinguish between "authentication" > data and "authorization" data. Pretty obviously, authentication data is used for authentication & authorization data are used for authorization. Maybe I don't understand the question: are you looking for definitions of authentication and authorization? ? Give a name to the policies that get > processed *before* a user is authenticated. I don't know; what do you call it when you turn off the ringer on your phone (to use an example similar to the one you gave above)? The fact that you don't answer the phone has nothing to do with who's calling (authentication) nor whether you want to talk to them (authorization). > > Such policies exist, and are in wide use. The NEA use of EAP falls > within this use. Again, since authentication is irrelevant to the policies, how are the policies relevant to EAP (aside from the fact that it's just so darn convenient)? > > Alan DeKok. _______________________________________________ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu