Cablelabs Specification
Total Page:16
File Type:pdf, Size:1020Kb
CableLabs® Specifications Online Content Access Authentication and Authorization Interface 1.0 Specification CL-SP-AUTH1.0-C01-160616 CLOSED Notice This OLCA specification is the result of a cooperative effort undertaken at the direction of Cable Television Laboratories, Inc. for the benefit of the cable industry and its customers. This document may contain references to other documents not owned or controlled by CableLabs. Use and understanding of this document may require access to such other documents. Designing, manufacturing, distributing, using, selling, or servicing products, or providing services, based on this document may require intellectual property licenses from third parties for technology referenced in this document. Neither CableLabs nor any member company is responsible to any party for any liability of any nature whatsoever resulting from or arising out of use or reliance upon this document, or any document referenced herein. This document is furnished on an "AS IS" basis and neither CableLabs nor its members provides any representation or warranty, express or implied, regarding the accuracy, completeness, noninfringement, or fitness for a particular purpose of this document, or any document referenced herein. Cable Television Laboratories, Inc., 2010-2016 CL-SP-AUTH1.0-C01-160616 Online Content Access Document Status Sheet Document Control Number: CL-SP-AUTH1.0-C01-160616 Document Title: Authentication and Authorization Interface 1.0 Specification Revision History: I01 - Released 10/24/2010 I02 - Released 03/24/2011 I03 – Released 01/18/2012 I04 - Released 06/21/2012 C01 - Released 06/16/2016 Date: June 16, 2016 Status: Work in Draft Issued Closed Progress Distribution Restrictions: Author Only CL/Member CL/ Member/ Public Vendor Key to Document Status Codes: Work in Progress An incomplete document, designed to guide discussion and generate feedback that may include several alternative requirements for consideration. Draft A document in specification format considered largely complete, but lacking review by Members and vendors. Drafts are susceptible to substantial change during the review process. Issued A stable document, which has undergone rigorous member and vendor review and is suitable for product design and development, cross-vendor interoperability, and for certification testing. Closed A static document, reviewed, tested, validated, and closed to further engineering change requests to the specification through CableLabs. Trademarks CableCARD™, CableHome®, CableLabs®, CableNET®, CableOffice™, CablePC™, DCAS™, DOCSIS®, DPoE™, EBIF™, eDOCSIS™, EuroDOCSIS™, EuroPacketCable™, Go2BroadbandSM, M- Card™, M-CMTS™, OCAP™, OpenCable™, PacketCable™, PCMM™, PeerConnect™, and tru2way® are marks of Cable Television Laboratories, Inc. All other marks are the property of their respective owners ii CableLabs 6/16/16 Authentication and Authorization Interface 1.0 Specification CL-SP-AUTH1.0-C01-160616 Contents 1 INTRODUCTION ............................................................................................................................................... 1 1.1 Overview ....................................................................................................................................................... 1 1.2 Principal Objectives ....................................................................................................................................... 1 1.3 Scope ............................................................................................................................................................. 2 1.3.1 Actors ..................................................................................................................................................... 3 1.3.2 Roles ...................................................................................................................................................... 3 1.3.3 Subscriber .............................................................................................................................................. 3 1.3.4 Actor/Role Mappings ............................................................................................................................. 4 1.3.5 User Experience Task Flow ................................................................................................................... 5 1.4 Requirements (Conformance Notation) ......................................................................................................... 7 2 REFERENCES .................................................................................................................................................... 8 2.1 Normative References.................................................................................................................................... 8 2.2 Informative References .................................................................................................................................. 8 2.3 Reference Acquisition.................................................................................................................................... 8 3 TERMS AND DEFINITIONS ............................................................................................................................ 9 4 ABBREVIATIONS, ACRONYMS, SYMBOLS ............................................................................................. 11 5 ONLINE CONTENT ACCESS SCENARIOS ................................................................................................ 13 5.1 Scenario 1 .................................................................................................................................................... 13 5.1.1 Actors and Roles .................................................................................................................................. 13 5.1.2 Architecture ......................................................................................................................................... 14 5.1.3 Pre-conditions ...................................................................................................................................... 15 5.1.4 Use Cases ............................................................................................................................................ 15 5.2 Scenario 2 .................................................................................................................................................... 17 5.2.1 Actors and Roles .................................................................................................................................. 17 5.2.2 Architecture ......................................................................................................................................... 17 5.2.3 Pre-conditions ...................................................................................................................................... 18 5.2.4 Use Cases ............................................................................................................................................ 19 5.3 Scenario 3 .................................................................................................................................................... 20 5.3.1 Actors and Roles .................................................................................................................................. 20 5.3.2 Architecture ......................................................................................................................................... 21 5.3.3 Pre-conditions ...................................................................................................................................... 22 5.3.4 Use Cases ............................................................................................................................................ 23 5.4 Scenario 4 .................................................................................................................................................... 24 5.4.1 Actors and Roles .................................................................................................................................. 24 5.4.2 Architecture ......................................................................................................................................... 25 5.4.3 Pre-conditions ...................................................................................................................................... 26 5.4.4 Use Cases ............................................................................................................................................ 26 6 AUTHENTICATION REQUIREMENTS ...................................................................................................... 28 6.1 Overview ..................................................................................................................................................... 28 6.2 Authentication Architecture ......................................................................................................................... 28 6.3 Assumptions ................................................................................................................................................ 29 6.4 System Security requirements ....................................................................................................................