testing_dl.txt | testing_dl.prepped.txt | |||
---|---|---|---|---|
skipping to change at line 58 ¶ | skipping to change at line 58 ¶ | |||
modifications of such material outside the IETF Standards Process. | modifications of such material outside the IETF Standards Process. | |||
Without obtaining an adequate license from the person(s) controlling | Without obtaining an adequate license from the person(s) controlling | |||
the copyright in such materials, this document may not be modified | the copyright in such materials, this document may not be modified | |||
outside the IETF Standards Process, and derivative works of it may | outside the IETF Standards Process, and derivative works of it may | |||
not be created outside the IETF Standards Process, except to format | not be created outside the IETF Standards Process, except to format | |||
it for publication as an RFC or to translate it into languages other | it for publication as an RFC or to translate it into languages other | |||
than English. | than English. | |||
Table of Contents | Table of Contents | |||
1. Introduction | 1. Introduction (name-introduction) | |||
2. Terminology | 2. Terminology (name-terminology) | |||
3. Trust Model | 3. Trust Model (name-trust-model) | |||
3.1. Authenticated Entities | 3.1. Authenticated Entities (name-authenticated-entities) | |||
3.2. Unauthenticated Entities | 3.2. Unauthenticated Entities | |||
4. Overview | (name-unauthenticated-entities) | |||
4.1. Initial Signaling | 4. Overview (name-overview) | |||
4.1. Initial Signaling (name-initial-signaling) | ||||
4.2. Media Consent Verification | 4.2. Media Consent Verification | |||
4.3. DTLS Handshake | (name-media-consent-verification) | |||
4.3. DTLS Handshake (name-dtls-handshake) | ||||
4.4. Communications and Consent Freshness | 4.4. Communications and Consent Freshness | |||
5. SDP Identity Attribute | (name-communications-and-consent-) | |||
5. SDP Identity Attribute (name-sdp-identity-attribute) | ||||
5.1. Offer/Answer Considerations | 5.1. Offer/Answer Considerations | |||
(name-offer-answer-considerations) | ||||
5.1.1. Generating the Initial SDP Offer | 5.1.1. Generating the Initial SDP Offer | |||
(name-generating-the-initial-sdp-) | ||||
5.1.2. Generating of SDP Answer | 5.1.2. Generating of SDP Answer | |||
(name-generating-of-sdp-answer) | ||||
5.1.3. Processing an SDP Offer or Answer | 5.1.3. Processing an SDP Offer or Answer | |||
(name-processing-an-sdp-offer-or-) | ||||
5.1.4. Modifying the Session | 5.1.4. Modifying the Session | |||
(name-modifying-the-session) | ||||
6. Detailed Technical Description | 6. Detailed Technical Description | |||
(name-detailed-technical-descript) | ||||
6.1. Origin and Web Security Issues | 6.1. Origin and Web Security Issues | |||
(name-origin-and-web-security-iss) | ||||
6.2. Device Permissions Model | 6.2. Device Permissions Model | |||
6.3. Communications Consent | (name-device-permissions-model) | |||
6.4. IP Location Privacy | 6.3. Communications Consent (name-communications-consent) | |||
6.5. Communications Security | 6.4. IP Location Privacy (name-ip-location-privacy) | |||
6.5. Communications Security (name-communications-security) | ||||
7. Web-Based Peer Authentication | 7. Web-Based Peer Authentication | |||
(name-web-based-peer-authenticati) | ||||
7.1. Trust Relationships: IdPs, APs, and RPs | 7.1. Trust Relationships: IdPs, APs, and RPs | |||
7.2. Overview of Operation | (name-trust-relationships-idps-ap) | |||
7.2. Overview of Operation (name-overview-of-operation) | ||||
7.3. Items for Standardization | 7.3. Items for Standardization | |||
(name-items-for-standardization) | ||||
7.4. Binding Identity Assertions to JSEP Offer/Answer | 7.4. Binding Identity Assertions to JSEP Offer/Answer | |||
Transactions | Transactions (name-binding-identity-assertions) | |||
7.4.1. Carrying Identity Assertions | 7.4.1. Carrying Identity Assertions | |||
7.5. Determining the IdP URI | (name-carrying-identity-assertion) | |||
7.5.1. Authenticating Party | 7.5. Determining the IdP URI (name-determining-the-idp-uri) | |||
7.5.2. Relying Party | 7.5.1. Authenticating Party (name-authenticating-party) | |||
7.6. Requesting Assertions | 7.5.2. Relying Party (name-relying-party) | |||
7.7. Managing User Login | 7.6. Requesting Assertions (name-requesting-assertions) | |||
8. Verifying Assertions | 7.7. Managing User Login (name-managing-user-login) | |||
8.1. Identity Formats | 8. Verifying Assertions (name-verifying-assertions) | |||
9. Security Considerations | 8.1. Identity Formats (name-identity-formats) | |||
9. Security Considerations (name-security-considerations) | ||||
9.1. Communications Security | 9.1. Communications Security | |||
9.2. Privacy | (name-communications-security-2) | |||
9.3. Denial of Service | 9.2. Privacy (name-privacy) | |||
9.3. Denial of Service (name-denial-of-service) | ||||
9.4. IdP Authentication Mechanism | 9.4. IdP Authentication Mechanism | |||
(name-idp-authentication-mechanis) | ||||
9.4.1. PeerConnection Origin Check | 9.4.1. PeerConnection Origin Check | |||
9.4.2. IdP Well-known URI | (name-peerconnection-origin-check) | |||
9.4.2. IdP Well-known URI (name-idp-well-known-uri) | ||||
9.4.3. Privacy of IdP-generated identities and the | 9.4.3. Privacy of IdP-generated identities and the | |||
hosting site | hosting site (name-privacy-of-idp-generated-id) | |||
9.4.4. Security of Third-Party IdPs | 9.4.4. Security of Third-Party IdPs | |||
(name-security-of-third-party-idp) | ||||
9.4.5. Web Security Feature Interactions | 9.4.5. Web Security Feature Interactions | |||
10. IANA Considerations | (name-web-security-feature-intera) | |||
11. References | 10. IANA Considerations (name-iana-considerations) | |||
11.1. Normative References | 11. References (name-references) | |||
11.2. Informative References | 11.1. Normative References (name-normative-references) | |||
Acknowledgements | 11.2. Informative References (name-informative-references) | |||
Author's Address | A Acknowledgements (name-acknowledgements) | |||
B Author's Address (name-authors-address) | ||||
1. Introduction | 1. Introduction | |||
The Real-Time Communications on the Web (RTCWEB) working group | The Real-Time Communications on the Web (RTCWEB) working group | |||
standardized protocols for real-time communications between Web | standardized protocols for real-time communications between Web | |||
browsers, generally called "WebRTC" [RFC9995]. The major use cases | browsers, generally called "WebRTC" [RFC9995]. The major use cases | |||
for WebRTC technology are real-time audio and/or video calls, Web | for WebRTC technology are real-time audio and/or video calls, Web | |||
conferencing, and direct data transfer. Unlike most conventional | conferencing, and direct data transfer. Unlike most conventional | |||
real-time systems, (e.g., SIP-based [RFC3261] soft phones) WebRTC | real-time systems, (e.g., SIP-based [RFC3261] soft phones) WebRTC | |||
communications are directly controlled by some Web server, via a | communications are directly controlled by some Web server, via a | |||
End of changes. 23 change blocks. | ||||
31 lines changed or deleted | 51 lines changed or added | |||
This html diff was produced by rfcdiff 1.45. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ |