testing_dl.txt   testing_dl.prepped.txt 
skipping to change at line 58 skipping to change at line 58
modifications of such material outside the IETF Standards Process. modifications of such material outside the IETF Standards Process.
Without obtaining an adequate license from the person(s) controlling Without obtaining an adequate license from the person(s) controlling
the copyright in such materials, this document may not be modified the copyright in such materials, this document may not be modified
outside the IETF Standards Process, and derivative works of it may outside the IETF Standards Process, and derivative works of it may
not be created outside the IETF Standards Process, except to format not be created outside the IETF Standards Process, except to format
it for publication as an RFC or to translate it into languages other it for publication as an RFC or to translate it into languages other
than English. than English.
Table of Contents Table of Contents
1. Introduction 1. Introduction (name-introduction)
2. Terminology 2. Terminology (name-terminology)
3. Trust Model 3. Trust Model (name-trust-model)
3.1. Authenticated Entities 3.1. Authenticated Entities (name-authenticated-entities)
3.2. Unauthenticated Entities 3.2. Unauthenticated Entities
4. Overview (name-unauthenticated-entities)
4.1. Initial Signaling 4. Overview (name-overview)
4.1. Initial Signaling (name-initial-signaling)
4.2. Media Consent Verification 4.2. Media Consent Verification
4.3. DTLS Handshake (name-media-consent-verification)
4.3. DTLS Handshake (name-dtls-handshake)
4.4. Communications and Consent Freshness 4.4. Communications and Consent Freshness
5. SDP Identity Attribute (name-communications-and-consent-)
5. SDP Identity Attribute (name-sdp-identity-attribute)
5.1. Offer/Answer Considerations 5.1. Offer/Answer Considerations
(name-offer-answer-considerations)
5.1.1. Generating the Initial SDP Offer 5.1.1. Generating the Initial SDP Offer
(name-generating-the-initial-sdp-)
5.1.2. Generating of SDP Answer 5.1.2. Generating of SDP Answer
(name-generating-of-sdp-answer)
5.1.3. Processing an SDP Offer or Answer 5.1.3. Processing an SDP Offer or Answer
(name-processing-an-sdp-offer-or-)
5.1.4. Modifying the Session 5.1.4. Modifying the Session
(name-modifying-the-session)
6. Detailed Technical Description 6. Detailed Technical Description
(name-detailed-technical-descript)
6.1. Origin and Web Security Issues 6.1. Origin and Web Security Issues
(name-origin-and-web-security-iss)
6.2. Device Permissions Model 6.2. Device Permissions Model
6.3. Communications Consent (name-device-permissions-model)
6.4. IP Location Privacy 6.3. Communications Consent (name-communications-consent)
6.5. Communications Security 6.4. IP Location Privacy (name-ip-location-privacy)
6.5. Communications Security (name-communications-security)
7. Web-Based Peer Authentication 7. Web-Based Peer Authentication
(name-web-based-peer-authenticati)
7.1. Trust Relationships: IdPs, APs, and RPs 7.1. Trust Relationships: IdPs, APs, and RPs
7.2. Overview of Operation (name-trust-relationships-idps-ap)
7.2. Overview of Operation (name-overview-of-operation)
7.3. Items for Standardization 7.3. Items for Standardization
(name-items-for-standardization)
7.4. Binding Identity Assertions to JSEP Offer/Answer 7.4. Binding Identity Assertions to JSEP Offer/Answer
Transactions Transactions (name-binding-identity-assertions)
7.4.1. Carrying Identity Assertions 7.4.1. Carrying Identity Assertions
7.5. Determining the IdP URI (name-carrying-identity-assertion)
7.5.1. Authenticating Party 7.5. Determining the IdP URI (name-determining-the-idp-uri)
7.5.2. Relying Party 7.5.1. Authenticating Party (name-authenticating-party)
7.6. Requesting Assertions 7.5.2. Relying Party (name-relying-party)
7.7. Managing User Login 7.6. Requesting Assertions (name-requesting-assertions)
8. Verifying Assertions 7.7. Managing User Login (name-managing-user-login)
8.1. Identity Formats 8. Verifying Assertions (name-verifying-assertions)
9. Security Considerations 8.1. Identity Formats (name-identity-formats)
9. Security Considerations (name-security-considerations)
9.1. Communications Security 9.1. Communications Security
9.2. Privacy (name-communications-security-2)
9.3. Denial of Service 9.2. Privacy (name-privacy)
9.3. Denial of Service (name-denial-of-service)
9.4. IdP Authentication Mechanism 9.4. IdP Authentication Mechanism
(name-idp-authentication-mechanis)
9.4.1. PeerConnection Origin Check 9.4.1. PeerConnection Origin Check
9.4.2. IdP Well-known URI (name-peerconnection-origin-check)
9.4.2. IdP Well-known URI (name-idp-well-known-uri)
9.4.3. Privacy of IdP-generated identities and the 9.4.3. Privacy of IdP-generated identities and the
hosting site hosting site (name-privacy-of-idp-generated-id)
9.4.4. Security of Third-Party IdPs 9.4.4. Security of Third-Party IdPs
(name-security-of-third-party-idp)
9.4.5. Web Security Feature Interactions 9.4.5. Web Security Feature Interactions
10. IANA Considerations (name-web-security-feature-intera)
11. References 10. IANA Considerations (name-iana-considerations)
11.1. Normative References 11. References (name-references)
11.2. Informative References 11.1. Normative References (name-normative-references)
Acknowledgements 11.2. Informative References (name-informative-references)
Author's Address A Acknowledgements (name-acknowledgements)
B Author's Address (name-authors-address)
1. Introduction 1. Introduction
The Real-Time Communications on the Web (RTCWEB) working group The Real-Time Communications on the Web (RTCWEB) working group
standardized protocols for real-time communications between Web standardized protocols for real-time communications between Web
browsers, generally called "WebRTC" [RFC9995]. The major use cases browsers, generally called "WebRTC" [RFC9995]. The major use cases
for WebRTC technology are real-time audio and/or video calls, Web for WebRTC technology are real-time audio and/or video calls, Web
conferencing, and direct data transfer. Unlike most conventional conferencing, and direct data transfer. Unlike most conventional
real-time systems, (e.g., SIP-based [RFC3261] soft phones) WebRTC real-time systems, (e.g., SIP-based [RFC3261] soft phones) WebRTC
communications are directly controlled by some Web server, via a communications are directly controlled by some Web server, via a
 End of changes. 23 change blocks. 
31 lines changed or deleted 51 lines changed or added

This html diff was produced by rfcdiff 1.45. The latest version is available from http://tools.ietf.org/tools/rfcdiff/