IEEE 802.1AR 2018
$52.54
IEEE Standard for Local and Metropolitan Area Networks – Secure Device Identity
Published By | Publication Date | Number of Pages |
IEEE | 2018 | 73 |
Revision Standard – Active. A Secure Device Identifier (DevID) is cryptographically bound to a device and supports authentication of the device’s identity. An Initial Device Identifier (IDevID) provide by the supplier of a device can be supplemented by Local Device Identifiers (LDevIDs) facilitating enrollment (provisioning of authentication and authorization credentials) by local network administrators. (The PDF of this standard is available at no cost compliments of the IEEE GET Program at https://ieeexplore.ieee.org/browse/standards/get-program/page)
PDF Catalog
PDF Pages | PDF Title |
---|---|
1 | IEEE Std 802.1AR-2018 Front Cover |
2 | Title page |
4 | Important Notices and Disclaimers Concerning IEEE Standards Documents |
7 | Participants |
9 | Introduction |
10 | Contents |
12 | Figures |
13 | Tables |
14 | 1. Overview |
15 | 1.1 Scope 1.2 Purpose 1.3 Relationship to other standards |
16 | 2. Normative references |
18 | 3. Definitions |
21 | 4. Acronyms and abbreviations |
23 | 5. Conformance 5.1 Requirements terminology 5.2 Protocol Implementation Conformance Statement 5.3 Required capabilities |
24 | 5.4 Optional capabilities 5.5 Supplier information |
26 | 6. Secure Device Identifiers (DevIDs) and their use |
27 | 6.1 DevID secrets 6.1.1 DevID secret creation 6.1.2 DevID secret insertion 6.2 DevID certificates 6.2.1 DevID certificate creation |
28 | 6.2.2 DevID certificate validation |
29 | 6.3 DevID certificate chains 6.4 DevID Trust Model |
31 | 6.5 Privacy considerations |
32 | 7. DevID Modules 7.1 DevID module functionality |
33 | 7.1.1 Storage |
34 | 7.1.2 Asymmetric cryptography 7.1.3 Random number generation 7.2 DevID Service Interface |
35 | 7.2.1 Initialization 7.2.2 DevID public key enumeration |
36 | 7.2.3 DevID certificate enumeration 7.2.4 DevID certificate chain enumeration 7.2.5 Signing 7.2.6 DevID certificate enable/disable 7.2.7 DevID key enable/disable |
37 | 7.2.8 LDevID key generate 7.2.9 LDevID key insert 7.2.10 LDevID key delete 7.2.11 LDevID certificate insert |
38 | 7.2.12 LDevID certificate chain insert 7.2.13 LDevID certificate delete 7.2.14 LDevID certificate chain delete 7.2.15 Addition of RNG entropy 7.3 DevID Management Interface |
39 | 8. DevID certificate fields and extensions |
40 | 8.1 version 8.2 serialNumber 8.3 signature 8.4 issuer 8.5 validity |
41 | 8.6 subject 8.7 subjectPublicKeyInfo 8.8 signatureAlgorithm 8.9 signatureValue 8.10 extensions |
42 | 8.10.1 authorityKeyIdentifier 8.10.2 subjectKeyIdentifier 8.10.3 keyUsage 8.10.4 subjectAltName |
43 | 9. DevID signature suites |
44 | 9.1 RSA-2048/SHA-256 9.1.1 Algorithms and parameters 9.1.2 Key generation 9.1.3 signatureAlgorithm 9.1.4 subjectPublicKeyInfo 9.1.5 signatureValue |
45 | 9.2 ECDSA P-256/SHA-256 9.2.1 Algorithms and parameters 9.2.2 Key generation 9.2.3 signatureAlgorithm 9.2.4 subjectPublicKeyInfo 9.2.5 signatureValue |
46 | 9.3 ECDSA P-384/SHA-384 9.3.1 Algorithms and parameters 9.3.2 Key generation 9.3.3 signatureAlgorithm 9.3.4 subjectPublicKeyInfo 9.3.5 signatureValue |
47 | 10. DevID MIB 10.1 Internet-Standard Management Framework 10.2 Relationship to other MIB modules 10.2.1 Relationship to the Entity MIB 10.3 Structure of the MIB module |
48 | 10.4 Security considerations |
49 | 10.5 Definitions for Secure Device Identifier MIB |
61 | Annex A (normative) PICS proforma A.1 Introduction A.2 Abbreviations and special symbols A.2.1 Status symbols A.2.2 General abbreviations |
62 | A.3 Instructions for completing the PICS proforma A.3.1 General structure of the PICS proforma A.3.2 Additional Information A.3.3 Exception Information |
63 | A.3.4 Conditional status |
64 | A.4 PICS proforma for IEEE 802.1AR A.4.1 Implementation identification A.4.2 Protocol summary, IEEE Std 802.1AR-2018 |
65 | A.5 Major capabilities and options |
66 | A.6 DevID Service Interface A.7 DevID Random number generation |
67 | A.8 DevID Certificate fields and extensions A.9 DevID Supplier Information |
68 | A.10 RSA-2048/SHA-256 Signature Suite A.11 ECDSA P-256/SHA-256 Signature Suite A.12 ECDSA P-384/SHA-384 Signature Suite |
69 | Annex B (informative) Scenarios for DevID B.1 DevID use in EAP-TLS |
70 | B.2 DevID uses in consumer devices |
71 | B.3 DevID uses in enterprise devices |
72 | Annex C (informative) Bibliography |
73 | Back Cover |