<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.17 (Ruby 2.6.10) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-tomas-openroaming-00" category="info" submissionType="independent" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="WBA OpenRoaming">WBA OpenRoaming Wireless Federation</title>

    <author initials="B." surname="Tomas" fullname="Bruno Tomas">
      <organization>Wireless Broadband Alliance, Inc.</organization>
      <address>
        <postal>
          <street>5000 Executive Parkway, Suite 302</street>
          <city>San Ramon</city>
          <code>94583</code>
          <country>US</country>
        </postal>
        <email>bruno@wballiance.com</email>
      </address>
    </author>
    <author initials="M." surname="Grayson" fullname="Mark Grayson">
      <organization>Cisco Systems</organization>
      <address>
        <postal>
          <street>10 New Square Park</street>
          <city>Feltham</city>
          <code>TW14 8HA</code>
          <country>UK</country>
        </postal>
        <email>mgrayson@cisco.com</email>
      </address>
    </author>
    <author initials="N." surname="Canpolat" fullname="Necati Canpolat">
      <organization>Intel Corporation</organization>
      <address>
        <postal>
          <street>2111 NE. 25th Ave</street>
          <city>Hillsboro</city>
          <code>97124</code>
          <country>US</country>
        </postal>
        <email>necati.canpolat@intel.com</email>
      </address>
    </author>
    <author initials="B. A." surname="Cockrell" fullname="Betty A. Cockrell">
      <organization>SingleDigits</organization>
      <address>
        <postal>
          <city>San Antonio</city>
          <country>US</country>
        </postal>
        <email>bcockrell@singledigits.com</email>
      </address>
    </author>
    <author initials="S." surname="Gundavelli" fullname="Sri Gundavelli">
      <organization>Cisco Systems</organization>
      <address>
        <postal>
          <street>170 West Tasman Drive</street>
          <city>San Jose</city>
          <code>95134</code>
          <country>US</country>
        </postal>
        <email>sgundave@cisco.com</email>
      </address>
    </author>

    <date year="2023" month="June" day="13"/>

    <area>general</area>
    <workgroup>Independent Submission</workgroup>
    <keyword>Internet-Draft</keyword> <keyword>OpenRoaming</keyword> <keyword>Federation</keyword>

    <abstract>


<t>This document describes the Wireless Broadband Alliance's
OpenRoaming system. The OpenRoaming architectures enables a seamless
onboarding experience for devices connecting to access networks
that are part of the federation of access networks and identity providers.
The primary objective of this document is to describe the protocols that
form the foundation for this architecture, enabling providers to correctly configure
their equipment to support interoperable OpenRoaming signalling exchanges.
In addition, the topic of OpenRoaming has been raised in different IETF working
groups, and therefore a secondary objective is to assist those discussions by
describing the federation organization and framework.</t>



    </abstract>



  </front>

  <middle>


<section anchor="intro"><name>Introduction</name>

<t>WBA OpenRoaming is a roaming federation service of Access Network Providers (ANPs)
and Identity Providers (IDPs), enabling an automatic and secure
Wi-Fi experience globally. WBA OpenRoaming creates the framework to seamlessly
connect billions of users and things to millions of Wi-Fi networks.</t>

<figure title="OpenRoaming Federation" anchor="figfedarch"><artwork><![CDATA[
ANP-1 --\                    _----_                     /-- IDP-1
         \     Access      _( Open )_      Identity    /
ANP-2  ---<==  Network ---(  Roaming )---  Providers <==-- IDP-2
         /     Providers   (_      _)                  \
ANP-3 --/                    '----'                     \-- IDP-3

]]></artwork></figure>

<t>WBA Openroaming was inspired by eduroam <xref target="RFC7593"/>, the roaming federation that has become the
standard for secure access in research and education and which performs over half a billion
roaming authentications per month. WBA OpenRoaming leverages the same capabilities defined to
be used across the eduroam community, including the RadSec protocol <xref target="RFC6614"/> which has
allowed eduroam to replace static routing of RADIUS signalling <xref target="RFC2865"/> based on
realm routing tables with <xref target="RFC7585"/> based DNS based dynamic discovery of RADIUS endpoints and
mutual authentication of RADIUS peers using TLS.</t>

<t>WBA OpenRoaming builds on these same foundations and defines a global federation that is targeted at serving
all communities, while supporting both settlement-free use cases where "free" Wi-Fi is being offered to
end-users in order to support some
alternative value proposition, as well as traditional settled "paid" for Wi-Fi offered by some
cellular providers.</t>

<t>OpenRoaming is designed to deliver end-to-end security between a Network Access Server deployed by an
OpenRoaming Access Network Provider and an EAP Server <xref target="RFC3748"/> deployed by an OpenRoaming
Identity Provider. The security of the solution is based on mTLS using certificates
issued under Wireless Broadband Alliance's Public Key Infrastructure <xref target="RFC5280"/>.</t>

<section anchor="Requirements"><name>Requirements Language</name>
<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL",
"SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT
RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be
interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/>
when, and only when, they appear in all capitals, as shown here.</t>

</section>
<section anchor="Terminology"><name>Terminology</name>

<t>Access Network Query Protocol (ANQP):</t>

<ul empty="true"><li>
  <t>An IEEE 802.11 defined protocol that allows for access network information retrieval
in a pre-association state. ANQP has been further extended by the
Wi-Fi Alliance (WFA) as part of its Passpoint program <xref target="PASSPOINT"/>.</t>
</li></ul>

<t>Access Network Provider (ANP):</t>

<ul empty="true"><li>
  <t>An entity that has joined the federation and serves OpenRoaming end-users by configuring the OpenRoaming RCOI(s) in its Wi-Fi equipment.</t>
</li></ul>

<t>Broker:</t>

<ul empty="true"><li>
  <t>An entity that has joined the federation and performs certain specific roles to help scale the operation of the federation. The separate roles of a broker can include:</t>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t><list style="numbers">
      <t>Assigning WBA identities to ANPs and IDPs.</t>
      <t>Operating an issuing intermediate certificate authority under the WBA's PKI and issuing certificates to ANPs and IDPs.</t>
      <t>Operating a registration authority to a third party operated issuing intermediate certificate authority under WBA's PKI to enable certificates to be issued to ANPs and IDPs.</t>
    </list></t>
  </li></ul>
</li></ul>

<t>Closed Access Group (CAG):</t>

<ul empty="true"><li>
  <t>The definition of the 12 most significant bits of an OUI-36 RCOI to indicate OpenRoaming policy controls that
can be enforced by ANPs and IDPs.</t>
</li></ul>

<t>Identity Provider (IDP):</t>

<ul empty="true"><li>
  <t>An entity that has joined the federation and
includes the OpenRoaming RCOI(s) in the Passpoint profile of its end-user devices and
authenticates end-user devices on OpenRoaming ANP networks.</t>
</li></ul>

<t>Level of Assurance (LoA):</t>

<ul empty="true"><li>
  <t>An ISO/IEC 29115 term that is used to define equivalent levels for handling of end-user enrollment, credential management
and authentication amongst different IDPs.</t>
</li></ul>

<t>OpenRoaming-Settled:</t>

<ul empty="true"><li>
  <t>The "base RCOI" of BA-A2-D0 that is used to indicate that the ANP expects to receive payment for
providing OpenRoaming service to end-users.</t>
</li></ul>

<t>OpenRoaming-Settlement-Free:</t>

<ul empty="true"><li>
  <t>The "base RCOI" of 5A-03-BA that is used to indicate that the ANP provides the OpenRoaming service to end-users at
no cost to the IDP.</t>
</li></ul>

<t>Passpoint Profile:</t>

<ul empty="true"><li>
  <t>Passpoint is a Wi-Fi Alliance (WFA) certification program that defines the use a Passpoint profile, that includes the user's credentials
and the access network identifiers, to enables mobile devices to discover and authenticate to Wi-Fi hotspots
that provide Internet access <xref target="PASSPOINT"/>.</t>
</li></ul>

<t>PLMN Id:</t>

<ul empty="true"><li>
  <t>It is a unique identifier for a mobile network operator. The identifier consists of a MCC (Mobile Country Code) and MNC (Mobile Network Code).</t>
</li></ul>

<t>Roaming Consortium Identifier (RCOI):</t>

<ul empty="true"><li>
  <t>RCOI identifies the groups of identity providers that are supported by the network.
It is a 3-octet, or a 5-octet value carried in the 802.11 beacon information element (IE).
It is also sent in the ANQP messages. Based on the access technologies, the specific link-layer
protocols will be used for carrying the RCOI. RCOI is also part of the Passpoint profile.</t>
</li></ul>

<t>Subscriber Identity Module (SIM):</t>

<ul empty="true"><li>
  <t>The SIM is traditionally a smart card distributed by a mobile operator.</t>
</li></ul>

<t>WBA Identity (WBAID):</t>

<ul empty="true"><li>
  <t>A hierarchical namespace that is used to uniquely identify every OpenRoaming entity.</t>
</li></ul>

<t>Wireless Roaming Intermediary eXchange:</t>

<ul empty="true"><li>
  <t>A framework, aimed at facilitating
  interconnectivity between operators and the Wi-Fi roaming hub services.</t>
</li></ul>

</section>
</section>
<section anchor="wireless-broadband-alliance"><name>Wireless Broadband Alliance</name>

<t>The Wireless Broadband Alliance (WBA) defines the Wireless
Roaming Intermediary eXchange (WRIX) framework, aimed at facilitating
interconnectivity between Wi-Fi operators and the Wi-Fi roaming hub services,
as well as the Carrier Wi-Fi Services program that provides guidelines to
improve customer experience on Carrier Wi-Fi networks. Both of these
programs leverage the Wi-Fi Alliance specified Passpoint functionality
<xref target="PASSPOINT"/> to enable automatic and secure connectivity to Wi-Fi networks, allowing devices
to be provisioned with network access credentials with minimal user interaction.</t>

<t>WBA programs have traditionally focussed on "offloading"
cell phone data from cellular networks onto Wi-Fi networks.
Deployments of such systems have seen uneven
adoption across geographies, with cellular operators frequently limiting
their engagement to premier locations that have deployed Wi-Fi and experience
a significant footfall of operator's customers.</t>

<t>Whereas conventional Carrier Wi-Fi has focused on premier locations, the
last decade has seen a continued increase in the requirements of private Wi-Fi
networks to be able to serve visitors, contractors and guest users. Moreover, in
most of these scenarios, the Wi-Fi network is primarily being used to support some
alternative value proposition; an improved retail experience in a shopping
mall, a more efficient meeting in a carpeted office, a superior stay in a
hospitality venue, or a better fan experience in a sporting arena. Traditionally,
this segment has made wide-scale use of captive portals and unencrypted Wi-Fi links
to onboard end-users onto their networks <xref target="RFC8952"/>. However, the decreasing costs for cellular data means
end-users are less motivated to search out and attach to such "free" Wi-Fi
networks, and as a consequence, captive portal conversion rates continue to decrease.</t>

<t>As a consequence, in 2020 WBA launched its OpenRoaming federation,
designed to provide a better on-boarding experience to end-users, that is seamless, scalable and secure.</t>

</section>
<section anchor="orarch"><name>OpenRoaming Architecture</name>

<t><xref target="figwifiarch"/> contrasts a conventional carrier Wi-Fi roaming system with OpenRoaming.
As illustrated, conventional Wi-Fi roaming is typically based on:</t>

<t><list style="numbers">
  <t>IPSec <xref target="RFC6071"/> tunnels established between access networks, hub providers and identity providers used to protect exchanged signalling.</t>
  <t>Static routing of RADIUS signalling <xref target="RFC2865"/> based on realm routing tables populated according to agreements between access networks and hub providers.</t>
  <t>Passpoint primarily used with SIM based identifiers, where individual PLMN-IDs are configured in the access networks WLAN equipment and cellular providers enable Passpoint based SIM authentication in end-user devices.</t>
  <t>EAP-AKA <xref target="RFC4187"/> based passpoint authentication exchanged between the Supplicant in the end-user device and the EAP Server in the cellular provider's network.</t>
  <t>A primary focus on carrier based identities where the end-user has a billing relationship with the carrier.</t>
</list></t>

<t>In contrast, OpenRoaming is based on:</t>

<t><list style="numbers">
  <t>RadSec signalling <xref target="RFC6614"/> secured using mTLS with certificates issued under WBA's private certificate authority.</t>
  <t>Dynamic routing of RADIUS based on DNS-based discovery of signalling peers <xref target="RFC7585"/></t>
  <t>Passpoint based network selection based on 36-bit Roaming Consortium Organization Identifiers (RCOIs), where WBA defines the use of 12-bits of the RCOI to embed closed access group policies.</t>
  <t>Passpoint authentication that can use any of the Passpoint defined EAP methods.</t>
  <t>Encompassing new identity providers who do not have a billing relationship with their end-users.</t>
</list></t>

<figure title="Contrasting Carrier Wi-Fi and OpenRoaming Architectures" anchor="figwifiarch"><artwork><![CDATA[
+---------+        +--------+        +--------+        +--------+              
| Visited |        | Wi-Fi  |        | Wi-Fi  |        |Cellular|              
|  Wi-Fi  |        |  Hub   |        |  Hub   |        |Provider|              
| Network |<------>|Provider|<------>|Provider|<------>|Network |              
|         | RADIUS |        | RADIUS |        | RADIUS |        |              
|   NAS   |        | RADIUS |        | RADIUS |        | RADIUS |              
|         |<------>| proxy  |<------>| proxy  |<------>| Server |              
|Passpoint| IPSec  +--------+ IPSec  +--------+ IPSec  +--------+              
|PLMNID(s)|                                                                    
+---------+                                                                    
    /|\                                                                        
     |                                                                         
    \|/                                                                        
+---------+         A) Conventional Carrier Wi-Fi                              
|Passpoint|                                                                    
| device  |                                                                    
|  with   |                                                                    
| PLMNID  |                                                                    
| profile |                                                                    
+---------+                                                                    


+---------+                   +---+                    +--------+              
| Visited |<----------------->|DNS|<------------------>|Identity|              
|  Wi-Fi  |   DNS based peer  +---+  Configure NAPTR,  |Provider|              
| Network |      discovery           SRV and A Records |Network |              
|         |                                            |        |              
|   NAS   |                                            | RADIUS |              
|         |<------------------------------------------>| Server |              
|Passpoint|        RadSec/TLS secured using mTLS       +--------+              
| RCOI(s) |               and WBA PKI                                          
+---------+                                                                    
    /|\                                                                        
     |                                                                         
    \|/                                                                        
+---------+              B) OpenRoaming                                        
|Passpoint|                                                                    
| device  |                                                                    
|  with   |                                                                    
| RCOI(s) |                                                                    
| profile |                                                                    
+---------+                                                                    

]]></artwork></figure>

</section>
<section anchor="wbaid"><name>Identifying OpenRoaming Entities</name>

<t>All OpenRoaming providers and OpenRoaming brokers are allocated a WBA Identity (WBAID). The
WBAID is defined to be transported in the RADIUS Operator-Name attribute (#126) <xref target="RFC5580"/>.
WBA has been allocated the Operator Namespace identifier 0x34 "4" to identify
an Operator-Name attribute carrying a WBAID.</t>

<t>The WBAID is a hierarchical namespace that comprises at its top level the
identity allocated by WBA to a WBA Member and is of the form shown in <xref target="figwbaid"/>
where the optional 2 upper case characters represent an ISO-3166 Alpha-2 country code <xref target="ISO3166"/> e.g.,
"WBAMEMBER:US".</t>

<figure title="ABNF definition of Primary WBAID Structure" anchor="figwbaid"><artwork><![CDATA[
upper-case-char = %x41-5a
member-id       = 1*upper-case-char
wbaid           = member-id [ %x3a 2*2upper-case-char]

]]></artwork></figure>

<t>Operating as an OpenRoaming broker, the WBA Member
is able to allocate subordinate identities to OpenRoaming providers
who are not WBA members by pre-pending a subordinate identity ,
plus "." (%x2e) to the Member's WBAID, e.g., OPENROAMINGPROVIDER.WBAMEMBER:US.
In this way, any receiving entity of a WBAID can identify the WBA Member who
is acting as an OpenRoaming broker to the provider by assigning it an identity.</t>

</section>
<section anchor="sss"><name>Scaling Secured Signalling</name>

<t>As described in <xref target="legal"/>, the OpenRoaming legal framework does not assume
any direct relationship between ANP and IDP. In order to scale the
secured signalling between providers, the federation makes use of
Public Key Infrastructure using a private Certificate Authority specifically
designed to secure the operations of the roaming federation. WBA
and its members have published the WBA Certificate Policy that defines the
policies which govern the operations of the PKI components by all
individuals and entities within the infrastructure. The OID for Wireless
Broadband Alliance is:</t>

<t>{ iso(1) identified-organization(3) dod(6) internet(1) private(4) enterprise(1) The Wireless Broadband Alliance(14122) }</t>

<t>The Wireless Broadband Alliance organizes its OID arcs for the Certificates
Policy Documents using the object identifier 1.3.6.1.4.1.14122.1.1. At the time of writing,
the current certificate policy is 1.3.6.1.4.1.14122.1.1.6.</t>

<t>This Certificate Policy is based on a 4-level hierarchy, as illustrated below.</t>

<figure title="OpenRoaming PKI Hierarchy" anchor="figpki"><artwork><![CDATA[
+---------+---------------------------+----------------------------+
|         |                           |                            |
| Level   | Description               |  Comment                   |
|         |                           |                            |
+---------+---------------------------+----------------------------+
| Level 1 | OpenRoaming Root          | Operation managed by WBA   |
|         | Certificate Authority     |                            |
+---------+---------------------------+----------------------------+
| Level 2 | OpenRoaming Policy        | Operation managed by WBA.  |
|         | Intermediate Certificate  | Instantiates WBA policy OID|
|         | Authority                 |                            |
+---------+---------------------------+----------------------------+
| Level 3 | OpenRoaming Issuing       | Operated by an OpenRoaming |
|         | Intermediate Certificate  | broker                     |
|         | Authority                 |                            |
+---------+---------------------------+----------------------------+
| Level 3 | OpenRoaming Registration  | Optional and when used,    |
|         | Authority                 | operated by an OpenRoaming |
|         |                           | broker                     |
+---------+---------------------------+----------------------------+
| Level 4 | OpenRoaming Entity        | A WBA member or non-member.|
|         |                           | WBA's Certificate Policy   |
|         |                           | requires the Entity's      |
|         |                           | WBAID is included in the   |
|         |                           | Subject UID field in the   |
|         |                           | certificate.               |
+---------+---------------------------+----------------------------+

]]></artwork></figure>

<t>Certificates issued under the WBA PKI are used by Entities to perform mutual
authentication with other Entities and to secure RadSec
signalling <xref target="RFC6614"/> that carries EAP-based Passpoint authentication. This is typically between a
RadSec client in the OpenRoaming ANPs network and an RadSec Server in the OpenRoaming
IDPs network, although a provider can decide to outsource the operation of the RadSec
endpoint to a third party provider.</t>

</section>
<section anchor="dpd"><name>IDP Discovery</name>

<section anchor="dynamic-discovery"><name>Dynamic Discovery</name>

<t>OpenRoaming defines the use of dynamic discover <xref target="RFC7585"/> by which an ANP discovers the
IP address of the IDP's RadSec server.</t>

</section>
<section anchor="discovery-of-eap-aka-servers"><name>Discovery of EAP-AKA Servers</name>

<t>Passpoint defines the use of EAP-AKA' based authentication <xref target="RFC5448"/> which uses the
3GPP 23.003 <xref target="TS23003"/> defined realm of wlan.mnc&lt;mnc&gt;.mcc&lt;mcc&gt;.3gppnetwork.org, where
&lt;mcc&gt; represent an E.212 Mobile Country Code and &lt;mnc&gt; represents the E.212
Mobile Network Code allocated to the IDP. GSMA is responsible for
operating the 3gppnetwork.org domain and GSMA IR.67 <xref target="GSMAIR67"/> limits access to
the DNS systems supporting such records to those systems on the inter-PLMN IP
backbone (known as "GRX/IPX"). As OpenRoaming ANPs do not connect to this inter-PLMN backbone,
then conventional realm based lookup cannot be used to discover the RadSec server
supporting EAP-AKA' authentication.</t>

<t>GSMA IR.67 does allow systems to be discoverable
from the public Internet, specifically calling out the use of the
pub.3gppnetwork.org domain name for such procedures. In order for ANPs
to dynamically discover the RadSec server supporting EAP-AKA' authentication,
GSMA has defined the use of the wlan.mnc&lt;mnc&gt;.mcc&lt;mcc&gt;.pub.3gppnetwork.org by
OpenRoaming systems. This means that whenever a RadSec client receives a user-name
containing an NAI formatted as user@wlan.mnc&lt;mnc&gt;.mcc&lt;mcc&gt;.3gppnetwork.org, the dynamic
peer detection functionality MUST insert "pub" into the realm and perform
DNS based dynamic discovery using the wlan.mnc&lt;mnc&gt;.mcc&lt;mcc&gt;.pub.3gppnetwork.org
domain name. The RADIUS user-name attribute MUST NOT be similarly modified.</t>

<t>IR.67 defines the procedure by which a cellular operator can request the delegation
of their wlan.mnc&lt;mnc&gt;.mcc&lt;mcc&gt;.pub.3gppnetwork.org domain.  GSMA PRD IR.67 also allows an MNO
to delegate the entire mnc&lt;MNC&gt;.mcc&lt;MCC&gt;.pub.3gppnetwork.org sub-domain
which could have already occurred, e.g., to enable use of the
epdg.epc.mnc&lt;MNC&gt;.mcc&lt;MCC&gt;.pub.3gppnetwork.org for Wi-Fi calling service. Using this approach,
a cellular operator operating as an OpenRoaming IDP can authenticate their end-users on
third party ANP Wi-Fi networks.</t>

</section>
<section anchor="proving-a-server-is-authoritative-for-a-realm"><name>Proving a server is authoritative for a realm</name>

<t>The OpenRoaming preferred approach by which a dynamically discovered RadSec server
can prove that it is authoritative for a particular realm or set of realms is to
use DNS records that are protected with DNSSEC <xref target="RFC4035"/>. However, GSMA
have not enabled DNSSEC on their 3gppnetwork.org domain, meaning that DNSSEC
cannot be applied on the publicly resolvable domains under pub.3gppnetwork.org.
Because of this situation, OpenRoaming does not currently mandate operation of DNSSEC.</t>

<t>If the DNS records are not protected with DNSSEC, the
IDP SHOULD ensure that the discovered RadSec server(s) supporting its realm(s)
is/are configured with a WBA-PKI server certificate that includes the realm(s)
in the certificate SubjectAltName. The SubjectAltName field(s) is/are
used to prove that the RadSec server is authoritative for a particular realm,
or set of realms.</t>

</section>
</section>
<section anchor="PASSPOINT-SEC"><name>OpenRoaming Passpoint Profile</name>

<section anchor="openroaming-policy-controls"><name>OpenRoaming Policy Controls</name>

<t>In order to avoid possible fragmentation of roaming federations, OpenRoaming recognizes
that there is a need to permit OpenRoaming to be integrated into a variety of
different use-cases and value propositions. These use-cases include scenarios where
providers are able to enforce policy controls of end-users accessing the service.
The realization of policy controls in the OpenRoaming federation is a balance
between the requirements for fine grain policy enforcement versus the potential
impact of policy enforcement on the user experience.</t>

<t>Such a level of control is realized using Closed Access Group (CAG) based policies.
A Closed Access Group identifies a group of OpenRoaming users who are permitted
to access one or more OpenRoaming access networks configured with a particular CAG policy.
These Closed Access Group policies are encoded using one or more
Roaming Consortium Organization Identifiers (RCOIs), first defined
in Passpoint Release 1.0, and well supported
across the smartphone device ecosystem.</t>

<t>Note, encoding CAG policies in OpenRoaming using one or more RCOIs is aimed at
delivering an equivalent functionality to the CAG policies encoded in 3GPP using one or more CAG-IDs.</t>

</section>
<section anchor="CAG"><name>OpenRoaming Closed Access Group Policies</name>

<t>OpenRoaming defines the use of multiple RCOIs to facilitate the implementation of
closed access group policies across the federation. The currently defined RCOIs are:</t>

<t><list style="symbols">
  <t>OpenRoaming-Settled:  BA-A2-D0-xx-x</t>
  <t>OpenRoaming-Settlement-Free:  5A-03-BA-xx-x</t>
</list></t>

<t><xref target="figrcoi"/> shows how the 24-bit length OpenRoaming RCOIs are further extended into 36-bit length OUI-36s
with additional context dependent identifiers used to encode specific closed access group
policies. Following Passpoint Release 1.0 specification, only when there is a bitwise match of
all 36 bits of the configured RCOI in the WLAN equipment and the Passpoint profile configured in the
end-user device will an EAP authentication be triggered.</t>

<t>The encoding of closed access group policies is defined so that the "no-restrictions" policy is
encoded using the 12-bit value "00-0", i.e., 54-03-BA-00-0 represents a policy
that accepts all OpenRoaming settlement-free users onto a particular ANP installation.</t>

<figure title="Extension of Octets 4 and 5 for OpenRoaming Context Dependent RCOI Field " anchor="figrcoi"><artwork><![CDATA[
+---------------------------------------+-------------------+
|               OUI-36 Octet 4          |  OUI-36 Octet 5   |
+---------------------------------------+-------------------+
| B7 | B6 | B5 | B4 | B3 | B2 | B1 | B0 | B7 | B6 | B5 | B4 |
+----+---------+----+-------------------+-------------------+
| LoA|   QoS   |PID |     ID-Type       |Reserved - set to 0|
+----+---------+----+-------------------+-------------------+

]]></artwork></figure>

<section anchor="level-of-assurance-policies"><name>Level of Assurance Policies</name>

<t>The format of the Level of Assurance (LoA) field is as shown in <xref target="figloa"/>.</t>

<figure title="OpenRoaming CAG LoA Field " anchor="figloa"><artwork><![CDATA[
+------------------------------------------------------------+
|  LoA Field  |           Description                        |
+------------------------------------------------------------+
|     B7      |                                              |
+------------------------------------------------------------+
|     0       |   Baseline Identity Proofing                 |
+------------------------------------------------------------+
|     1       |   Enhanced Identity Proofing                 |
+------------------------------------------------------------+

]]></artwork></figure>

<t>The baseline identity proofing requirement on IDPs ensures that all
OpenRoaming identities are managed with at least a medium level of
assurance (LoA level 2) for end-user enrollment, credential management
and authentication, as specified in ISO/IEC 29115 <xref target="ISO29115"/>.</t>

<t>Any IDP that manages its identities according to ISO/IEC 29115 LoA level 2
MUST NOT configure any RCOI in their end-users' Passpoint profile
with the LoA field set to "1". Conversely, an IDP that manages its identities
according to ISO/IEC 29115 LoA level 3 MAY configure multiple RCOIs
in their end-users' Passpoint profile, including RCOIs with the LoA field
set to "0" and RCOIs with the LoA field set to "1".</t>

<t>The LoA field is used to support ANPs which operate in regulatory
regimes that require enhanced identity proofing to be used in the
provision of credentials on OpenRoaming devices, equivalent to LoA level
3 in ISO/IEC29115 <xref target="ISO29115"/>. In such a scenario, the ANP can set the LoA bit
field to 1 in all configured RCOIs to ensure that only identities
provisioned using enhanced LoA 3 procedures can access via the ANP's network.</t>

</section>
<section anchor="quality-of-service-policies"><name>Quality of Service Policies</name>

<t>One of the challenges faced by users of Wi-Fi hotspots is when the Wi-Fi network
is configured sub-optimally and results in a poor user experience. Often the only
remedy open to a user it to disable the Wi-Fi interface on their smartphone and
continue to use cellular data. As a consequence, OpenRoaming defines specific
service tiers across the federation using the QoS field.
The format of the QoS field is shown in <xref target="figqos"/>.</t>

<figure title="OpenRoaming CAG QoS Field " anchor="figqos"><artwork><![CDATA[
+------------------------------------------------------------+
|            QoS Field              |      Description       |
+------------------------------------------------------------+
|        B6       |        B5       |                        |
+------------------------------------------------------------+
|        0        |        0        |        Bronze          |
+------------------------------------------------------------+
|        0        |        1        |        Silver          |
+------------------------------------------------------------+
|        1        |        0        |       Reserved         |
+------------------------------------------------------------+
|        1        |        1        |       Reserved         |
+------------------------------------------------------------+
]]></artwork></figure>

<t>The "Bronze" and "Silver" values of QoS field are used to identify
specific quality of service policy aspects.</t>

<t>The bronze service tier corresponds to the following:</t>

<t><list style="numbers">
  <t>The availability of OpenRoaming service
when used to access the Internet measured during scheduled operations
across the ANP's network exceeds 90% over any one month period.</t>
  <t>The aggregate bandwidth used to receive
Internet service on the ANP's network is sufficient to enable
each and every authenticated and authorized OpenRoaming end-user to simultaneously receive a
sustained 256 kilobits per second connection.</t>
</list></t>

<t>The silver service tier corresponds to the following:</t>

<t><list style="numbers">
  <t>The availability of OpenRoaming service
when used to access the Internet measured during scheduled operations
across the ANP's network exceeds 95% over any one month period.</t>
  <t>The aggregate bandwidth used to receive
Internet service on the ANP's network is be sufficient to enable
each and every authenticated and authorized end-user to receive a
sustained 512 kilobits per second connection.</t>
  <t>At least 10% of authenticated and authorized users are able
to stream video content at a downlink rate of at least 5 megabits per
second (when measured over a one-minute interval) over all of the ANP's
OpenRoaming enabled Wi-Fi networks.</t>
  <t>The authenticated and authorized end-users are
able to stream video from one or more third party content distribution
networks with an end-to-end latency of less than 150ms from all of the
ANP's OpenRoaming enabled Wi-Fi networks.</t>
</list></t>

<t>The QoS field can be used by those IDPs that are only interested in providing
their end-users with a higher quality service level when automatically authenticated
onto an OpenRoaming network. For example, an IDP configures the QoS field
as bronze in a Passpoint profile that uses the "5A-03-BA" settlement free RCOI and
configure the QoS field as silver in a Passpoint profile that uses the
"BA-A2-D0" OpenRoaming-settled paid service.</t>

<t>ANPs that only support the bronze service tier MUST set the QoS Field to "00" in
all RCOIs configured on their WLAN equipment. ANPs that support the silver service
tier MAY configure multiple RCOIs on their WLAN equipment that include values where
the QoS field is set to "01" and values where the QoS field is set to "00".</t>

</section>
<section anchor="privacy-policies"><name>Privacy Policies</name>

<t>The baseline privacy policy of OpenRoaming ensures
the identities of end-users remain anonymous when using the
service. The PID field can be used to support scenarios where the user has consented
with their IDP that their permanent ID can be signalled to the
ANP in the RADIUS Access-Accept. The format of the PID field is
illustrated in <xref target="figpid"/>. The PID
field can be configured to "1" in the RCOIs used by those ANPs that
want to be be able to account for unique OpenRoaming end-users.</t>

<t>The OpenRoaming IDP terms ensure subscribers
explicitly give their permission for their permanent identity
to be shared with a third party ANP. When such permission has
not been granted, an IDP MUST NOT set the PID field to "1" in any
of the RCOIs in its end-user Passpoint profiles. When such permission has
been granted, an IDP MAY configure multiple RCOIs
in their end-users' Passpoint profile, including RCOIs with the PID field
set to "0" and RCOIs with the PID field set to "1".</t>

<figure title="OpenRoaming CAG PID Field " anchor="figpid"><artwork><![CDATA[
+------------------------------------------------------------+
|  PID Field  |           Description                        |
+------------------------------------------------------------+
|     B4      |                                              |
+------------------------------------------------------------+
|     0       |   Baseline ID Policy applies, i.e., users    |
|             |   remain anonymous whilst using the service  |
+------------------------------------------------------------+
|     1       |   A Permanent ID will be returned by the IDP |
+------------------------------------------------------------+

]]></artwork></figure>

</section>
<section anchor="id-type-policies"><name>ID-Type Policies</name>

<t>The ID-Type field can be used to realize policies which are based
on the business sector associated with the identity used by the IDP.
The format of the ID-Type
field is illustrated in <xref target="figidtype"/>.</t>

<t>All IDPs configure at least one RCOI in their end-user's
Passpoint profile with ID-Type set to "0000" (Any identity type is permitted).
An IDP MAY configure additional RCOIs in their end-users' Passpoint profile
with an ID-Type representing the sector type of IDP.</t>

<t>An ANP what wants to serve all end-users, irrespective of sector,
configures RCOIs in the WLAN equipment with ID-Type set to "0000".
Alternatively, an ANP which operates a sector specific business that
only desires to serve a subset of OpenRoaming end-users MAY set the ID-Type
to their desired sector in all configured RCOIs.</t>

<figure title="OpenRoaming CAG ID-Type Field " anchor="figidtype"><artwork><![CDATA[
+------------------------------------------------------------+
|       ID-Type Field       |              Description       |
+------------------------------------------------------------+
|  B3  |  B2  |  B1  |  B0  |                                |
+------------------------------------------------------------+
|  0   |  0   |  0   |  0   | Any identity type is permitted |
+------------------------------------------------------------+
|  0   |  0   |  0   |  1   | A service provider identity    |
+------------------------------------------------------------+
|  0   |  0   |  1   |  0   | A cloud provider identity      |
+------------------------------------------------------------+
|  0   |  0   |  1   |  1   | A generic enterprise identity  |
+------------------------------------------------------------+
|  0   |  1   |  0   |  0   | A government identity, e.g.,   |
|      |      |      |      | including city                 |
+------------------------------------------------------------+
|  0   |  1   |  0   |  1   | An automotive identity         |
+------------------------------------------------------------+
|  0   |  1   |  1   |  0   | A hospitality identity         |
+------------------------------------------------------------+
|  0   |  1   |  1   |  1   | An aviation industry identity  |
+------------------------------------------------------------+
|  1   |  0   |  0   |  0   | An education or research       |
|      |      |      |      | identity                       |
+------------------------------------------------------------+
|  1   |  0   |  0   |  1   | A cable industry identity      |
+------------------------------------------------------------+
|  1   |  0   |  1   |  0   | A manufacturer identity        |
+------------------------------------------------------------+
|  1   |  0   |  1   |  1   | A retail identity              |
+------------------------------------------------------------+
|        other values       | Reserved                       |
+------------------------------------------------------------+
]]></artwork></figure>

</section>
</section>
<section anchor="prioritizing-policies"><name>Prioritizing Policies</name>

<t>The  definition of OpenRoaming closed access group policies assumes
the configuration of multiple RCOIs in ANP WLAN equipment and IDP end-user devices.</t>

<t>When a device has multiple Passpoint profiles matching the ANP's RCOI policy,
an OpenRoaming ANP may want to prefer OpenRoaming subscribers use a particular IDP's
profile when attaching to its access network. Such a preference can be because
the OpenRoaming ANP has a preferential relationship with certain OpenRoaming IDPs.</t>

<t>The OpenRoaming ANP is able to use the Home SP preference functionality defined in
Passpoint <xref target="PASSPOINT"/> to prioritize the use of a particular profile by a Passpoint enabled device.
In such a scenario, the ANP configures the Domain Name list to include the
FQDN(s) associated with the profile(s) to be prioritized.</t>

</section>
</section>
<section anchor="RADIUS"><name>OpenRoaming RADIUS Profile</name>

<t>The OpenRoaming RADIUS profile is based on WBA WRIX Specifications which in turn
are derived from <xref target="RFC3580"/> and <xref target="RFC3579"/>.</t>

<t>Additionally, OpenRoaming defines the use of the following RADIUS attributes.</t>

<section anchor="operator-name"><name>Operator-Name</name>

<t>As described in <xref target="wbaid"/>, OpenRoaming uses the Operator-Name (#126) <xref target="RFC5580"/> attribute to signal
the WBAID of the OpenRoaming ANP. All ANPs MUST support the Operator-Name attribute and use it to signal the
WBAID of the OpenRoaming ANP.</t>

</section>
<section anchor="chargeable-user-identity"><name>Chargeable-User-Identity</name>

<t>All OpenRoaming ANPs MUST support the Chargeable-User-Identity attribute (#89) <xref target="RFC4372"/>.
When an end-user has consented to sharing a permanent identity with the ANP, the
CUI returned by the IDP is invariant over subsequent end-user authentication exchanges between
the IDP and the ANP.</t>

</section>
<section anchor="location-datalocation-information"><name>Location-Data/Location-Information</name>

<t>All OpenRoaming ANPs MUST support signalling of location information using <xref target="RFC5580"/>.
As a minimum, all OpenRoaming IDPs need to be able to determine the country in which the
OpenRoaming ANP operates. The OpenRoaming legal framework described in <xref target="legal"/> serves as an "out-of-band agreement" as
specified in clause 3.1 of <xref target="RFC5580"/>. Hence, all OpenRoaming ANPs MUST include the Location-Data
attribute (#128) in RADIUS Access-Request messages where the location profile is the civic location profile
that includes the country code where the ANP is located in all Access-Request messages
<xref target="RFC5580"/>.</t>

<t>When the OpenRoaming ANP supports the OpenRoaming-Settled RCOI ("BA-A2-D0"),
the Location-Data attribute (#128) MUST be included where the location profile
is the civic location profile containing Civic Address Type information that
is sufficient to identify the financial regulatory regime that defines the
taxable rates associated with consumption of the ANP's service.</t>

<t>OpenRoaming also defines the optional use the geospatial location profile as specified in
<xref target="RFC5580"/>. ANPs MAY signal coordinate-based geographic location of
the NAS or end-user device and this information MAY be used by IDPs, e.g.,
in their authorization decisions.</t>

</section>
<section anchor="wba-identity-provider"><name>WBA-Identity-Provider</name>

<t>The Operator-Name attribute allows the WBAID of the ANP to be signalled to the IDP.
In the reverse direction, the IDP MUST use the WBA-Identity-Provider vendor
specific attribute <xref target="WBAVSA"/> to signal the WBAID of the IDP back to the ANP.</t>

</section>
<section anchor="wba-offered-service"><name>WBA-Offered-Service</name>

<t>The ANP MAY use the WBA-Offered-Service vendor specific attribute to signal the
highest OpenRoaming service tier supported on its network <xref target="WBAVSA"/>.</t>

</section>
<section anchor="additional-attributes-related-to-openroaming-settled"><name>Additional attributes related to OpenRoaming settled</name>

<t>OpenRoaming settled defines the use of additional RADIUS attributes.</t>

<section anchor="wba-financial-clearing-provider"><name>WBA-Financial-Clearing-Provider</name>

<t>All OpenRoaming ANPs and IDPs that support the OpenRoaming settled service
MUST use the WBA-Financial-Clearing-Provider vendor specific attribute to signal
the  identity of the provider of financial clearing services <xref target="WBAVSA"/>.</t>

</section>
<section anchor="wba-data-clearing-provider"><name>WBA-Data-Clearing-Provider</name>

<t>All OpenRoaming ANPs and IDPs that support the OpenRoaming settled service MAY
use the WBA-Data-Clearing-Provider vendor specific attribute to signal
the  identity of the provider of data clearing services <xref target="WBAVSA"/>.</t>

</section>
<section anchor="wba-linear-volume-rate"><name>WBA-Linear-Volume-Rate</name>

<t>In cellular roaming, inter-operator tariff information is exchanged in
the roaming agreements between operators. In OpenRoaming, as there is no
direct agreement between ANPs and IDPs, the tariff information is
exchanged in RADIUS messages. All OpenRoaming ANPs that support
the OpenRoaming settled service MUST use the WBA-Linear-Volume-Rate
vendor specific attribute to signal the charging model being offered
by the ANP <xref target="WBAVSA"/>. An IDP that authorizes an offered charging model MUST include
the agreed WBA-Linear-Volume-Rate in the Access-Accept message.</t>

</section>
</section>
</section>
<section anchor="Security"><name>Security Considerations</name>

<section anchor="network-selection-and-triggering-authentication"><name>Network Selection and Triggering Authentication</name>

<t>OpenRoaming defines the use of Passpoint with Roaming Consortium Organization Identifiers.
A bit-wise match between an RCOI configured in the Passpoint profile of an end-user's device and the RCOI signalled
by WLAN equipment will trigger a Passpoint defined EAP-based authentication exchange.
The security associated with the Passpoint RCOI
information element is identical to other PLMN-ID and Realm information elements, allowing an
unauthorized system to configure the OpenRoaming RCOI with the aim of triggering a Passpoint authentication.
Because such unauthorized system will not have been issued with a certificate using WBA's PKI, the
unauthorized system is unable to communicate with any other OpenRoaming provider.
In such a scenario, after repeated failed authentication attempts, the device's supplicant can add the
Access Point's BSSID to a deny list
to avoid future triggering of an authentication with the unauthorized system.</t>

</section>
<section anchor="dynamic-discovery-of-radsec-peers"><name>Dynamic Discovery of RadSec Peers</name>

<t>OpenRoaming recommends the use of DNSSEC to ensure a dynamically discovered RadSec server
is authoritative for a particular realm or set of realms. Where this is not possible, e.g.,
when using dynamic resolution with the pub.3gppnetwork.org sub-domain, the OpenRoaming
certificate policy permits the configuration of supported realm(s) in the SubjectAltName
of the certificate(s) issued to the IDP.</t>

<t>An ANP can decide to continue with the RadSec establishment, even if a server cannot prove it is
authoritative for a realm. As the ANP's RadSec client uses a dedicated trust anchor corresponding to the WBA's private Certificate
Authority, if DNS is hijacked by a third-party non-federation member
who has not been issued a certificate under WBA's PKI, the subsequent TLS establishment will fail.</t>

</section>
<section anchor="end-user-traffic"><name>End-User Traffic</name>

<t>The OpenRoaming federation ensures RADIUS traffic is secured between ANP and IDP and ensures Wi-Fi traffic is protected
between the end-user device and the WLAN equipment of the ANP. The ANP is therefore able to observe IP
traffic to/from end-users who have performed a successful authentication with their IDP. The OpenRoaming legal framework (see <xref target="legal"/>) ensures that the ANP has agreed to the OpenRoaming Privacy Policy <xref target="ORPRIVACY"/> to correctly handle the personally identifiable information collected
as part of providing the ANP service.</t>

<t>The Open-Roaming end-user terms and conditions <xref target="ORTERMS"/> ensure that users are aware that the federation does not provide a
secure end-to-end service. The end-user should not rely on the encryption delivered by OpenRoaming for providing security of services accessed using the ANP's Wi-Fi network.</t>

</section>
</section>
<section anchor="future-enhancements"><name>Future Enhancements</name>

<t>WBA announced the launch of its OpenRoaming Federation in June 2020. Since then, WBA members have continued to enhance the technical framework to address new market requirements that are reflected in the Closed Access Group policies described in <xref target="CAG"/> and the RADIUS profile described in <xref target="RADIUS"/>. WBA encourages those parties interested in adapting OpenRoaming to address new requirements to join the Alliance and help drive the definition of OpenRoaming forward.</t>

</section>
<section anchor="IANA"><name>IANA Considerations</name>

<t>This document has no IANA actions.</t>

</section>


  </middle>

  <back>


    <references title='Normative References'>





<reference anchor='RFC2119' target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author fullname='S. Bradner' initials='S.' surname='Bradner'><organization/></author>
<date month='March' year='1997'/>
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference anchor='RFC8174' target='https://www.rfc-editor.org/info/rfc8174'>
<front>
<title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
<author fullname='B. Leiba' initials='B.' surname='Leiba'><organization/></author>
<date month='May' year='2017'/>
<abstract><t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='8174'/>
<seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>




    </references>

    <references title='Informative References'>





<reference anchor='RFC2865' target='https://www.rfc-editor.org/info/rfc2865'>
<front>
<title>Remote Authentication Dial In User Service (RADIUS)</title>
<author fullname='C. Rigney' initials='C.' surname='Rigney'><organization/></author>
<author fullname='S. Willens' initials='S.' surname='Willens'><organization/></author>
<author fullname='A. Rubens' initials='A.' surname='Rubens'><organization/></author>
<author fullname='W. Simpson' initials='W.' surname='Simpson'><organization/></author>
<date month='June' year='2000'/>
<abstract><t>This document describes a protocol for carrying authentication, authorization, and configuration information between a Network Access Server which desires to authenticate its links and a shared Authentication Server.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='2865'/>
<seriesInfo name='DOI' value='10.17487/RFC2865'/>
</reference>



<reference anchor='RFC3579' target='https://www.rfc-editor.org/info/rfc3579'>
<front>
<title>RADIUS (Remote Authentication Dial In User Service) Support For Extensible Authentication Protocol (EAP)</title>
<author fullname='B. Aboba' initials='B.' surname='Aboba'><organization/></author>
<author fullname='P. Calhoun' initials='P.' surname='Calhoun'><organization/></author>
<date month='September' year='2003'/>
<abstract><t>This document defines Remote Authentication Dial In User Service (RADIUS) support for the Extensible Authentication Protocol (EAP), an authentication framework which supports multiple authentication mechanisms.  In the proposed scheme, the Network Access Server (NAS) forwards EAP packets to and from the RADIUS server, encapsulated within EAP-Message attributes.  This has the advantage of allowing the NAS to support any EAP authentication method, without the need for method- specific code, which resides on the RADIUS server.  While EAP was originally developed for use with PPP, it is now also in use with IEEE 802.  This memo provides information for the Internet community.</t></abstract>
</front>
<seriesInfo name='RFC' value='3579'/>
<seriesInfo name='DOI' value='10.17487/RFC3579'/>
</reference>



<reference anchor='RFC3580' target='https://www.rfc-editor.org/info/rfc3580'>
<front>
<title>IEEE 802.1X Remote Authentication Dial In User Service (RADIUS) Usage Guidelines</title>
<author fullname='P. Congdon' initials='P.' surname='Congdon'><organization/></author>
<author fullname='B. Aboba' initials='B.' surname='Aboba'><organization/></author>
<author fullname='A. Smith' initials='A.' surname='Smith'><organization/></author>
<author fullname='G. Zorn' initials='G.' surname='Zorn'><organization/></author>
<author fullname='J. Roese' initials='J.' surname='Roese'><organization/></author>
<date month='September' year='2003'/>
<abstract><t>This document provides suggestions on Remote Authentication Dial In User Service (RADIUS) usage by IEEE 802.1X Authenticators.  The material in this document is also included within a non-normative Appendix within the IEEE 802.1X specification, and is being presented as an IETF RFC for informational purposes.  This memo provides information for the Internet community.</t></abstract>
</front>
<seriesInfo name='RFC' value='3580'/>
<seriesInfo name='DOI' value='10.17487/RFC3580'/>
</reference>



<reference anchor='RFC3748' target='https://www.rfc-editor.org/info/rfc3748'>
<front>
<title>Extensible Authentication Protocol (EAP)</title>
<author fullname='B. Aboba' initials='B.' surname='Aboba'><organization/></author>
<author fullname='L. Blunk' initials='L.' surname='Blunk'><organization/></author>
<author fullname='J. Vollbrecht' initials='J.' surname='Vollbrecht'><organization/></author>
<author fullname='J. Carlson' initials='J.' surname='Carlson'><organization/></author>
<author fullname='H. Levkowetz' initials='H.' role='editor' surname='Levkowetz'><organization/></author>
<date month='June' year='2004'/>
<abstract><t>This document defines the Extensible Authentication Protocol (EAP), an authentication framework which supports multiple authentication methods.  EAP typically runs directly over data link layers such as Point-to-Point Protocol (PPP) or IEEE 802, without requiring IP.  EAP provides its own support for duplicate elimination and retransmission, but is reliant on lower layer ordering guarantees.  Fragmentation is not supported within EAP itself; however, individual EAP methods may support this.  This document obsoletes RFC 2284.  A summary of the changes between this document and RFC 2284 is available in Appendix A.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='3748'/>
<seriesInfo name='DOI' value='10.17487/RFC3748'/>
</reference>



<reference anchor='RFC4035' target='https://www.rfc-editor.org/info/rfc4035'>
<front>
<title>Protocol Modifications for the DNS Security Extensions</title>
<author fullname='R. Arends' initials='R.' surname='Arends'><organization/></author>
<author fullname='R. Austein' initials='R.' surname='Austein'><organization/></author>
<author fullname='M. Larson' initials='M.' surname='Larson'><organization/></author>
<author fullname='D. Massey' initials='D.' surname='Massey'><organization/></author>
<author fullname='S. Rose' initials='S.' surname='Rose'><organization/></author>
<date month='March' year='2005'/>
<abstract><t>This document is part of a family of documents that describe the DNS Security Extensions (DNSSEC).  The DNS Security Extensions are a collection of new resource records and protocol modifications that add data origin authentication and data integrity to the DNS.  This document describes the DNSSEC protocol modifications.  This document defines the concept of a signed zone, along with the requirements for serving and resolving by using DNSSEC.  These techniques allow a security-aware resolver to authenticate both DNS resource records and authoritative DNS error indications. </t><t> This document obsoletes RFC 2535 and incorporates changes from all updates to RFC 2535.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4035'/>
<seriesInfo name='DOI' value='10.17487/RFC4035'/>
</reference>



<reference anchor='RFC4187' target='https://www.rfc-editor.org/info/rfc4187'>
<front>
<title>Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA)</title>
<author fullname='J. Arkko' initials='J.' surname='Arkko'><organization/></author>
<author fullname='H. Haverinen' initials='H.' surname='Haverinen'><organization/></author>
<date month='January' year='2006'/>
<abstract><t>This document specifies an Extensible Authentication Protocol (EAP) mechanism for authentication and session key distribution that uses the Authentication and Key Agreement (AKA) mechanism.  AKA is used in the 3rd generation mobile networks Universal Mobile Telecommunications System (UMTS) and CDMA2000.  AKA is based on symmetric keys, and typically runs in a Subscriber Identity Module, which is a UMTS Subscriber Identity Module, USIM, or a (Removable) User Identity Module, (R)UIM, similar to a smart card.</t><t>EAP-AKA includes optional identity privacy support, optional result indications, and an optional fast re-authentication procedure.  This memo provides information for the Internet community.</t></abstract>
</front>
<seriesInfo name='RFC' value='4187'/>
<seriesInfo name='DOI' value='10.17487/RFC4187'/>
</reference>



<reference anchor='RFC4372' target='https://www.rfc-editor.org/info/rfc4372'>
<front>
<title>Chargeable User Identity</title>
<author fullname='F. Adrangi' initials='F.' surname='Adrangi'><organization/></author>
<author fullname='A. Lior' initials='A.' surname='Lior'><organization/></author>
<author fullname='J. Korhonen' initials='J.' surname='Korhonen'><organization/></author>
<author fullname='J. Loughney' initials='J.' surname='Loughney'><organization/></author>
<date month='January' year='2006'/>
<abstract><t>This document describes a new Remote Authentication Dial-In User Service (RADIUS) attribute, Chargeable-User-Identity.  This attribute can be used by a home network to identify a user for the purpose of roaming transactions that occur outside of the home network.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4372'/>
<seriesInfo name='DOI' value='10.17487/RFC4372'/>
</reference>



<reference anchor='RFC5448' target='https://www.rfc-editor.org/info/rfc5448'>
<front>
<title>Improved Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA')</title>
<author fullname='J. Arkko' initials='J.' surname='Arkko'><organization/></author>
<author fullname='V. Lehtovirta' initials='V.' surname='Lehtovirta'><organization/></author>
<author fullname='P. Eronen' initials='P.' surname='Eronen'><organization/></author>
<date month='May' year='2009'/>
<abstract><t>This specification defines a new EAP method, EAP-AKA', which is a small revision of the EAP-AKA (Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement) method. The change is a new key derivation function that binds the keys derived within the method to the name of the access network.  The new key derivation mechanism has been defined in the 3rd Generation Partnership Project (3GPP).  This specification allows its use in EAP in an interoperable manner.  In addition, EAP-AKA' employs SHA-256 instead of SHA-1.</t><t>This specification also updates RFC 4187, EAP-AKA, to prevent bidding down attacks from EAP-AKA'.  This memo provides information for the  Internet community.</t></abstract>
</front>
<seriesInfo name='RFC' value='5448'/>
<seriesInfo name='DOI' value='10.17487/RFC5448'/>
</reference>



<reference anchor='RFC5280' target='https://www.rfc-editor.org/info/rfc5280'>
<front>
<title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
<author fullname='D. Cooper' initials='D.' surname='Cooper'><organization/></author>
<author fullname='S. Santesson' initials='S.' surname='Santesson'><organization/></author>
<author fullname='S. Farrell' initials='S.' surname='Farrell'><organization/></author>
<author fullname='S. Boeyen' initials='S.' surname='Boeyen'><organization/></author>
<author fullname='R. Housley' initials='R.' surname='Housley'><organization/></author>
<author fullname='W. Polk' initials='W.' surname='Polk'><organization/></author>
<date month='May' year='2008'/>
<abstract><t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet.  An overview of this approach and model is provided as an introduction.  The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms.  Standard certificate extensions are described and two Internet-specific extensions are defined.  A set of required certificate extensions is specified.  The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions.  An algorithm for X.509 certification path validation is described.  An ASN.1 module and examples are provided in the appendices.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5280'/>
<seriesInfo name='DOI' value='10.17487/RFC5280'/>
</reference>



<reference anchor='RFC5580' target='https://www.rfc-editor.org/info/rfc5580'>
<front>
<title>Carrying Location Objects in RADIUS and Diameter</title>
<author fullname='H. Tschofenig' initials='H.' role='editor' surname='Tschofenig'><organization/></author>
<author fullname='F. Adrangi' initials='F.' surname='Adrangi'><organization/></author>
<author fullname='M. Jones' initials='M.' surname='Jones'><organization/></author>
<author fullname='A. Lior' initials='A.' surname='Lior'><organization/></author>
<author fullname='B. Aboba' initials='B.' surname='Aboba'><organization/></author>
<date month='August' year='2009'/>
<abstract><t>This document describes procedures for conveying access-network ownership and location information based on civic and geospatial location formats in Remote Authentication Dial-In User Service (RADIUS) and Diameter.</t><t>The distribution of location information is a privacy-sensitive task. Dealing with mechanisms to preserve the user's privacy is important and is addressed in this document.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5580'/>
<seriesInfo name='DOI' value='10.17487/RFC5580'/>
</reference>



<reference anchor='RFC6071' target='https://www.rfc-editor.org/info/rfc6071'>
<front>
<title>IP Security (IPsec) and Internet Key Exchange (IKE) Document Roadmap</title>
<author fullname='S. Frankel' initials='S.' surname='Frankel'><organization/></author>
<author fullname='S. Krishnan' initials='S.' surname='Krishnan'><organization/></author>
<date month='February' year='2011'/>
<abstract><t>Over the past few years, the number of RFCs that define and use IPsec and Internet Key Exchange (IKE) has greatly proliferated.  This is complicated by the fact that these RFCs originate from numerous IETF working groups: the original IPsec WG, its various spin-offs, and other WGs that use IPsec and/or IKE to protect their protocols' traffic.</t><t>This document is a snapshot of IPsec- and IKE-related RFCs.  It includes a brief description of each RFC, along with background information explaining the motivation and context of IPsec's outgrowths and extensions.  It obsoletes RFC 2411, the previous  &quot;IP Security Document Roadmap.&quot;</t><t>The obsoleted IPsec roadmap (RFC 2411) briefly described the interrelationship of the various classes of base IPsec documents. The major focus of RFC 2411 was to specify the recommended contents of documents specifying additional encryption and authentication algorithms.  This document is not an Internet Standards Track  specification; it is published for informational purposes.</t></abstract>
</front>
<seriesInfo name='RFC' value='6071'/>
<seriesInfo name='DOI' value='10.17487/RFC6071'/>
</reference>



<reference anchor='RFC6614' target='https://www.rfc-editor.org/info/rfc6614'>
<front>
<title>Transport Layer Security (TLS) Encryption for RADIUS</title>
<author fullname='S. Winter' initials='S.' surname='Winter'><organization/></author>
<author fullname='M. McCauley' initials='M.' surname='McCauley'><organization/></author>
<author fullname='S. Venaas' initials='S.' surname='Venaas'><organization/></author>
<author fullname='K. Wierenga' initials='K.' surname='Wierenga'><organization/></author>
<date month='May' year='2012'/>
<abstract><t>This document specifies a transport profile for RADIUS using Transport Layer Security (TLS) over TCP as the transport protocol. This enables dynamic trust relationships between RADIUS servers.   [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='6614'/>
<seriesInfo name='DOI' value='10.17487/RFC6614'/>
</reference>



<reference anchor='RFC7585' target='https://www.rfc-editor.org/info/rfc7585'>
<front>
<title>Dynamic Peer Discovery for RADIUS/TLS and RADIUS/DTLS Based on the Network Access Identifier (NAI)</title>
<author fullname='S. Winter' initials='S.' surname='Winter'><organization/></author>
<author fullname='M. McCauley' initials='M.' surname='McCauley'><organization/></author>
<date month='October' year='2015'/>
<abstract><t>This document specifies a means to find authoritative RADIUS servers for a given realm.  It is used in conjunction with either RADIUS over Transport Layer Security (RADIUS/TLS) or RADIUS over Datagram Transport Layer Security (RADIUS/DTLS).</t></abstract>
</front>
<seriesInfo name='RFC' value='7585'/>
<seriesInfo name='DOI' value='10.17487/RFC7585'/>
</reference>



<reference anchor='RFC7593' target='https://www.rfc-editor.org/info/rfc7593'>
<front>
<title>The eduroam Architecture for Network Roaming</title>
<author fullname='K. Wierenga' initials='K.' surname='Wierenga'><organization/></author>
<author fullname='S. Winter' initials='S.' surname='Winter'><organization/></author>
<author fullname='T. Wolniewicz' initials='T.' surname='Wolniewicz'><organization/></author>
<date month='September' year='2015'/>
<abstract><t>This document describes the architecture of the eduroam service for federated (wireless) network access in academia.  The combination of IEEE 802.1X, the Extensible Authentication Protocol (EAP), and RADIUS that is used in eduroam provides a secure, scalable, and deployable service for roaming network access.  The successful deployment of eduroam over the last decade in the educational sector may serve as an example for other sectors, hence this document.  In particular, the initial architectural choices and selection of standards are described, along with the changes that were prompted by operational experience.</t></abstract>
</front>
<seriesInfo name='RFC' value='7593'/>
<seriesInfo name='DOI' value='10.17487/RFC7593'/>
</reference>



<reference anchor='RFC8952' target='https://www.rfc-editor.org/info/rfc8952'>
<front>
<title>Captive Portal Architecture</title>
<author fullname='K. Larose' initials='K.' surname='Larose'><organization/></author>
<author fullname='D. Dolson' initials='D.' surname='Dolson'><organization/></author>
<author fullname='H. Liu' initials='H.' surname='Liu'><organization/></author>
<date month='November' year='2020'/>
<abstract><t>This document describes a captive portal architecture. Network provisioning protocols such as DHCP or Router Advertisements (RAs), an optional signaling protocol, and an HTTP API are used to provide the solution.</t></abstract>
</front>
<seriesInfo name='RFC' value='8952'/>
<seriesInfo name='DOI' value='10.17487/RFC8952'/>
</reference>


<reference anchor="TS23003" target="https://www.3gpp.org/ftp/Specs/archive/23_series/23.003/23003-i10.zip">
  <front>
    <title>3GPP 23.003: Numbering, addressing and identification v18.1.0</title>
    <author initials="" surname="3GPP">
      <organization></organization>
    </author>
    <date year="2023" month="March" day="28"/>
  </front>
</reference>
<reference anchor="GSMAIR67" target="https://www.gsma.com/newsroom/wp-content/uploads//IR.67-v21.0.pdf">
  <front>
    <title>GSMA IR.67: DNS Guidelines for Service Providers and GRX and IPX Providers</title>
    <author initials="" surname="GSMA">
      <organization></organization>
    </author>
    <date year="2022" month="November" day="25"/>
  </front>
</reference>
<reference anchor="PASSPOINT" target="https://www.wi-fi.org/discover-wi-fi/passpoint">
  <front>
    <title>Wi-Fi Alliance Passpoint</title>
    <author initials="" surname="Wi-Fi Alliance">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="ISO3166" target="https://www.iso.org/standard/72483.html">
  <front>
    <title>Codes for the representation of names of countries and their subdivisions</title>
    <author initials="" surname="ISO 3166-2:2020">
      <organization></organization>
    </author>
    <date year="2020" month="August"/>
  </front>
</reference>
<reference anchor="ISO29115" >
  <front>
    <title>Information technology - Security techniques: Entity authentication assurance framework</title>
    <author initials="" surname="ISO/IEC 29115">
      <organization></organization>
    </author>
    <date year="2013" month="April"/>
  </front>
</reference>
<reference anchor="ORPRIVACY" target="https://wballiance.com/openroaming/privacy-policy/">
  <front>
    <title>OpenRoaming End-User Privacy Policy</title>
    <author initials="" surname="Wireless Broadband Alliance">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="ORTERMS" target="https://wballiance.com/openroaming/toc/">
  <front>
    <title>OpenRoaming End User Terms and Conditions</title>
    <author initials="" surname="Wireless Broadband Alliance">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="WBAVSA" target="https://github.com/wireless-broadband-alliance/RADIUS-VSA">
  <front>
    <title>Vendor Specific Attributes</title>
    <author initials="" surname="Wireless Broadband Alliance">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>


    </references>


<section anchor="sig"><name>Example OpenRoaming Signalling Flow</name>

<t>An example signalling flow for OpenRoaming is illustrated in <xref target="figsigflow"/>.</t>

<t><list style="numbers">
  <t>In step 1, the WLAN is configured with Passpoint information and includes
configured RCOIs in its beacon.</t>
  <t>The beacon can only contain 3 RCOIs and so if none of the RCOIs match a
profile provisioned in the device, the device queries for the list of RCOIs supported.</t>
  <t>If the list includes an RCOI that matches a configured profile in the device, then device
sends an EAPOL Start message to the authenticator.</t>
  <t>The authenticator in the AP/WLC requests the EAP-Identity of the device.</t>
  <t>The device responds with its EAP-Identity, which is a user@realm Network Access Identifier (NAI)</t>
  <t>The NAS in the WLC/AP embeds the NAI in the user-name attribute in a RADIUS Access-Request message and forwards to the configured RadSec client.</t>
  <t>The RadSec client recovers the realm from the NAI/user-name attribute and performs a DNS-based dynamic peer discovery.</t>
  <t>The RadSec client established an mTLS authenticated TLS session with the discovered peer using certificates issued by the WBA PKI.</t>
  <t>Once TLS is established, the RadSec client forwards the Access-Request to the RadSec server.</t>
  <t>If the EAP Server is not co-located with the RadSec server, the RadSec server proxies the Access-Request to the EAP-Server.</t>
  <t>The EAP-Server continues the EAP dialogue with the EAP Supplicant in the device using a Passpoint defined EAP method.</t>
  <t>Following successful authentication, the EAP-Server responds with an Access-Accept packet containing the EAP-SUCCESS message and the keying material generated through the EAP method to secure the Wi-Fi session.</t>
  <t>The Access-Accept packet is forwarded back to the RadSec client.</t>
  <t>The RadSec client forwards the Access-Accept packet to the NAS in the AP/WLC.</t>
  <t>The AP/WLC recovers the keying material from the Access-Accept packet and forwards the EAP-SUCCESS message to the device.</t>
  <t>The keying material is used to secure the Wi-Fi interface between the device and AP/WLC.</t>
  <t>The AP/WLC generates a RADIUS Accounting-Request message with Acct-Status-Type Start which is forwarded to the RadSec client.</t>
  <t>The RadSec client forwards the Accounting-Request message over the TLS tunnel to the RadSec server.</t>
  <t>The RadSec server can forward the Accounting-Request message to the EAP-Server.</t>
</list></t>

<ul empty="true"><li>
  <t>20-22. After the Wi-Fi session terminates, an Accounting-Request message with Acct-Status-Type Stop is proxied towards the RadSec Server.</t>
</li></ul>

<figure title="Example OpenRoaming Signalling Flow" anchor="figsigflow"><artwork><![CDATA[
+------+    +------+    +------+    +------+    +------+    +------+
|      |    |Wi-Fi |    |RadSec|    |      |    |RadSec|    |  EAP |
|Device|    |AP/WLC|    |Client|    | DNS  |    |Server|    |Server|
+------+    +------+    +------+    +------+    +------+    +------+
   | 1) Beacon |           |           |           |           |
   |<----------|           |           |           |           |
   | 2) ANQP   |           |           |           |           |   
   | Query     |           |           |           |           |   
   |<--------->|           |           |           |           |   
   | 3) EAPOL  |           |           |           |           |
   | Start     |           |           |           |           |
   |---------->|           |           |           |           |
   | 4) EAP-ID |           |           |           |           |
   | Request   |           |           |           |           |
   |<----------|           |           |           |           |
   | 5) EAP-ID | 6) RADIUS |           |           |           |
   | Response  | Access-   | 7) DNS    |           |           |
   |---------->| Request   | Query     |           |           |
   |           |---------->| NAPTR,SRV,|           |           |
   |           |           | A Records |           |           |
   |           |           |<--------->|           |           |
   |           |           | 8) mTLS   |           |           |
   |           |           |<--------------------->|           |
   |           |           | 9) RadSec |           |           |
   |           |           | Access-Request        |           |
   |           |           |---------------------->|           |
   |           |           |           |           | 10) RADIUS|
   |           |           |           |           | Access-   |
   |           |           |           |           | Request   |
   |           |           |           |           |---------->|
   |           |         11) EAP Dialogue          |           |
   |<--------------------------------------------------------->|
   |           |           |           |           | 12) RADIUS|
   |           |           |           |           | Access-   |
   |           | 14) RADIUS|           |           | Accept    |
   |           | Access-   |           |           | (EAP-     |
   |           | Accept    | 13) RadSec Access-    | SUCCESS)  |   
   |           | (EAP-     | Accept (EAP-SUCCESS)  |<----------|
   | 15) EAP-  | SUCCESS)  |<----------------------|           |
   | SUCCESS   |<----------|           |           |           |
   |<----------|           |           |           |           |
 +---------------+         |           |           |           |
 | 16) Secured   |         |           |           |           |
 |  OpenRoaming  17) RADIUS|           |           |           |
 |    Service    Accounting|           |           |           |
 |               Request   |           |           | 19) RADIUS|
 |               (Start)   | 18) RadSec Accounting | Accounting|
 |               |-------->| -Request (Start)      | Request   |
 |               |         |---------------------->| (Start)   |
 |               |         |           |           |---------->|
 +---------------+         |           |           |           |
   |           | 20) RADIUS|           |           |           |
   |           | Accounting|           |           |           |
   |           | Request   |           |           | 22) RADIUS|
   |           | (Stop)    | 21) RadSec Accounting | Accounting|
   |           |---------->| -Request (Stop)       | Request   |
   |           |           |---------------------->| (Stop)    |
   |           |           |           |           |---------->|   
+------+    +------+    +------+    +------+    +------+    +------+
|Device|    |Wi-Fi |    |RadSec|    | DNS  |    |RadSec|    |  EAP |
|      |    |AP/WLC|    |Client|    |      |    |Server|    |Server|
+------+    +------+    +------+    +------+    +------+    +------+
]]></artwork></figure>

</section>
<section anchor="rcoi"><name>Example OpenRoaming RCOI Usage</name>

<t>This Annex illustrates the use of OpenRoaming RCOIs to enforce different policies
across the OpenRoaming federation, ensuring that when there is a policy mismatch
between the device and access network, that the device will avoid triggering
an authentication exchange that would subsequently have to be rejected because
of a policy enforcement decision.</t>

<section anchor="openroaming-rcoi-based-policy-for-supporting-qos-tiers"><name>OpenRoaming RCOI based policy for supporting QoS tiers</name>

<t><xref target="figqosrcoi"/> illustrates the use of OpenRoaming RCOIs for
supporting the standard (bronze) and silver QoS tiers across the federation.
The figure shows two different devices:</t>

<t><list style="symbols">
  <t>Device 1 has been provisioned by its IDP to require the basic bronze QoS policy.</t>
  <t>Device 2 has been provisioned by its IDP to require the silver tier of QoS handling.</t>
</list></t>

<t>The figure also shows illustrates the RCOI configuration of two ANP Access Networks:</t>

<t><list style="symbols">
  <t>ANP#1 is configured to support the silver tier of QoS handling corresponding to the silver RCOI. Because the network requirements associated with the silver tier are a superset of the bronze QoS tier, the ANP also configures the bronze RCOI on its Wi-Fi access network.</t>
  <t>ANP#2 is only configured to support the standard (bronze) QoS tier and as such only configures the RCOI corresponding to the bronze QoS tier on its Wi-Fi access network.</t>
</list></t>

<t>The figure shows how normal Passpoint RCOI matching rules can be used to ensure that devices only trigger authentication with ANP access networks which support the required QoS tier according to the device's policy.</t>

<figure title="Use of OpenRoaming RCOIs to realize QoS policies" anchor="figqosrcoi"><artwork><![CDATA[

+----------------------+      +----------------------+  
|OpenRoaming Device #1 |      |OpenRoaming Device #2 |  
| Bronze Service Level |      | Silver Service Level |   
| +------------------+ |      | +------------------+ |      
| |Passpoint Profile | |      | |Passpoint Profile | |     
| |   Bronze RCOI    | |      | |   Silver RCOI    | |              
| +------------------+ |      | +------------------+ |           
|     /|\        /|\   |      |           /|\        |      
+------|----------|----+      +------------|---------+         
       |          |                        |                   
       |          |                        |                    
       |          |                        | RCOI                
       |          |                        | Match                 
       |     +-----------------------------+                 
  RCOI |     |    |                                          
 Match |     |    |                                              
       |     |    |                                        
       |     |    +------------------------+                  
       |     |                             | RCOI           
       |     |                             | Match         
       |     |                             |              
      \|/   \|/                           \|/           
+----------------------+       +----------------------+   
|  OpenRoaming ANP#1   |       |  OpenRoaming ANP#2   |  
|      Silver QoS      |       |      Bronze QoS      |     
|   +--------------+   |       |   +--------------+   |   
|   |     WLAN     |   |       |   |     WLAN     |   |   
|   | Bronze RCOI  |   |       |   | Bronze RCOI  |   |    
|   | Silver RCOI  |   |       |   |              |   |   
|   +--------------+   |       |   +--------------+   |  
+----------------------+       +----------------------+

]]></artwork></figure>

</section>
<section anchor="openroaming-rcoi-based-policy-for-supporting-identity-type-policies"><name>OpenRoaming RCOI based policy for supporting identity type policies</name>

<t><xref target="figidtypercoi"/> illustrates the use of OpenRoaming RCOIs for supporting different identity type policies across the federation. The figure shows two different devices:</t>

<t><list style="symbols">
  <t>Device#1 has been provisioned by an IDP corresponding to a service provider. It provisions the device's Passpoint profile with the RCOI policy identifying the service provider ID-type policy as well as the "any ID-type"  RCOI policy.</t>
  <t>Device 2 has been provisioned by a IDP corresponding to a hospitality provider. It provisions the device's Passpoint profile with the RCOI policy identifying the hospitality ID-type policy as well as the "any ID-type" RCOI policy.</t>
</list></t>

<t>The figure also shows the RCOI configuration of three different ANP Access Networks:</t>

<t><list style="symbols">
  <t>ANP#1 only supports access using service provider type-IDs and so has configured the service provider ID-type policy RCOI.</t>
  <t>ANP#2 supports access from all identity types and so has configured the any ID-type policy RCOI.</t>
  <t>ANP#3 only supports access using hospitality type IDs and so has configured the hospitality ID-type policy RCOI.</t>
</list></t>

<t>The figure shows how normal Passpoint RCOI matching rules can be used to ensure that devices only trigger authentication with ANP access networks which support the required identity types according to the ANP's policy.</t>

<figure title="Use of OpenRoaming RCOIs to realize ID-Type policies" anchor="figidtypercoi"><artwork><![CDATA[


+----------------------------+   +-----------------------------+                                                 
|   OpenRoaming Device #1    |   |    OpenRoaming Device #2    |                                                 
|  IDP is Service Provider   |   | IDP is Hospitality Provider |                                                 
|+------------++------------+|   |+------------++------------+ |                                                 
|| Passpoint  || Passpoint  ||   || Passpoint  || Passpoint  | |                                                 
||  Profile   ||  Profile   ||   ||  Profile   ||  Profile   | |                                                 
||     SP     ||Any ID-Type ||   ||Any ID-Type || Hospitality| |                                                 
||ID-Type RCOI||    RCOI    ||   ||   RCOI     ||ID-Type RCOI| |                                                 
|+------------++------------+|   |+------------++------------+ |                                                 
|      /|\          /|\      |   |       /|\        /|\        |                                                 
+-------|------------|-------+   +-------------------|---------+                                                 
        |            |                    |          |                                                           
        |            |                    |          |                                                           
        |            |                    |          |                                                           
        |            |                    |          |                                                           
        | RCOI       | RCOI               | RCOI     | RCOI                                                      
        | Match      | Match              | Match    | Match                                                     
        |            |                    |          |                                                           
        |            +-----+        +-----+          |                                                           
        |                  |        |                |                                                           
        |                  |        |                |                                                           
        |                  |        |                |                                                           
        |                  |        |                |                                                           
        |                  |        |                |                                                           
       \|/                \|/      \|/              \|/                                                          
+------------------+  +------------------+  +------------------+                                                 
|OpenRoaming ANP#1 |  |OpenRoaming ANP#2 |  |OpenRoaming ANP#3 |                                                 
|  Only accepts    |  |    Accepts all   |  |   Only accepts   |                                                 
| Service Provider |  |     ID-Types     |  |    Hospitality   |                                                 
|     ID-Types     |  |                  |  |     ID-Types     |                                                 
| +--------------+ |  | +--------------+ |  | +--------------+ |                                                 
| |     WLAN     | |  | |     WLAN     | |  | |     WLAN     | |                                                 
| |  SP ID-Type  | |  | | Any ID-Type  | |  | |  Hospitality | |                                                 
| |     RCOI     | |  | |     RCOI     | |  | | ID-Type RCOI | |                                                 
| +--------------+ |  | +--------------+ |  | +--------------+ |                                                 
+------------------+  +------------------+  +------------------+    


]]></artwork></figure>

</section>
<section anchor="openroaming-rcoi-based-policy-for-supporting-different-identity-proofing-policies"><name>OpenRoaming RCOI based policy for supporting different identity proofing policies</name>

<t><xref target="figidproofrcoi"/> illustrates the use of OpenRoaming RCOIs for supporting different
identity proofing policies across the federation. The figure shows two different devices:</t>

<t><list style="symbols">
  <t>Device 1 has been provisioned by an IDP that uses enhanced identity proofing controls that meet the enhanced OpenRoaming requirements, equivalent to LoA 3 in <xref target="ISO29115"/>. Because the enhanced identity proofing requirements are a superset of the requirements of the baseline identity proofing policy, the IDP also configures the use of the RCOI with baseline identity proofing.</t>
  <t>Device 2 has been provisioned by an IDP that uses identity proofing with controls that meet the baseline OpenRoaming requirements. It provisions the device's Passpoint profile with the RCOI policy identifying the baelien identity-proofing policy.</t>
</list></t>

<t>The figure also shows the RCOI configuration of two ANP Access Networks:</t>

<t><list style="symbols">
  <t>ANP#1 is operated in a geography where regulations require support of enhanced identity proofing and so has configured its RCOI(s) with the enhanced identity-proofing policy.</t>
  <t>ANP#2 is operated in a geography where regulations permit support of authentications with identities managed using the OpenRoaming baseline identity proofing requirements and so has configured its RCOI(s) with the baseline identity-proofing policy.</t>
</list></t>

<t>The figure shows how normal Passpoint RCOI matching rules can be used to ensure that devices only trigger authentication with ANP access networks which support the required identity proofing according to the ANP's policy.</t>

<figure title="Use of OpenRoaming RCOIs to realize identity proofing policies" anchor="figidproofrcoi"><artwork><![CDATA[

+----------------------------+   +-----------------------------+                                                 
|    OpenRoaming Device #1   |   |    OpenRoaming Device #2    |                                                 
|     IDP uses enhanced      |   |     IDP uses baseline       |                                                 
|     identity proofing      |   |     identity proofing       |                                                 
|+------------++------------+|   |       +------------+        |                                                 
|| Passpoint  ||  Passpoint ||   |       |  Passpoint |        |                                                 
||  Profile   ||   Profile  ||   |       |   Profile  |        |                                                 
||Enhanced LoA||Baseline LoA||   |       |Baseline LoA|        |                                                 
||    RCOI    ||    RCOI    ||   |       |    RCOI    |        |                                                 
|+------------++------------+|   |       +------------+        |                                                 
|      /|\          /|\      |   |             /|\             |                                                 
+-------|------------|-------+   +--------------|--------------+                                                 
        |            |                          |                                                                
        |            |                          |                                                                
        |            |                          |                                                                
        | RCOI       | RCOI                     | RCOI                                                           
        | Match      | Match                    | Match                                                          
        |            |                          |                                                                
        |            |                          |                                                                
        |            +--------------------+     +-----+                                                          
        |                                 |           |                                                          
        |                                 |           |                                                          
        |                                 |           |                                                          
        |                                 |           |                                                          
        |                                 |           |                                                          
       \|/                               \|/         \|/                                                         
   +------------------------+       +------------------------+                                                   
   |   OpenRoaming ANP#1    |       |   OpenRoaming ANP#2    |                                                   
   | Operates in a country  |       | Operates in a country  |                                                   
   |  where the regulator   |       |  where the regulator   |                                                   
   |   requires enhanced    |       |   permits baseline     |                                                   
   |   identity proofing    |       |   identity proofing    |                                                   
   |    +--------------+    |       |    +--------------+    |                                                   
   |    |     WLAN     |    |       |    |     WLAN     |    |                                                   
   |    | Enhanced LoA |    |       |    | Baseline LoA |    |                                                   
   |    |     RCOI     |    |       |    |     RCOI     |    |                                                   
   |    +--------------+    |       |    +--------------+    |                                                   
   +------------------------+       +------------------------+                                                     


]]></artwork></figure>

</section>
</section>
<section anchor="legal"><name>OpenRoaming legal framework</name>

<section anchor="seamless-experience"><name>Seamless experience</name>

<t>In order for OpenRoaming to avoid the need for end-users to
be presented with and accept legal terms and conditions covering their
use of the Wi-Fi hotspot service, there needs to be a legal framework in place.</t>

</section>
<section anchor="openroaming-organization"><name>OpenRoaming Organization</name>

<t>The federation is based on a legal framework that comprises a set of policies,
templated agreements and immutable terms as agreed to by the WBA and its membership.
The framework defines a hierarchy of roles, responsibilities and relationships that
are designed to enable the federation to scale to millions of Wi-Fi access networks.</t>

<t><xref target="figorg"/> shows the
relationships between WBA, OpenRoaming Brokers, who are members of the WBA that
have agreed terms with WBA to perform the OpenRoaming broker role and the OpenRoaming providers.
OpenRoaming brokers agree terms with OpenRoaming Providers that can act as Access Network
Providers (ANPs) and/or Identity Providers (IDPs). OpenRoaming providers do not have
to be members of the WBA to provide OpenRoaming services. Finally, OpenRoaming IDPs
agree terms with OpenRoaming end-users who then benefit from seamless authentication onto
the Wi-Fi networks deployed by the different OpenRoaming ANPs.</t>

<figure title="Organization of the OpenRoaming Federation" anchor="figorg"><artwork><![CDATA[
                            +----------+                   
                            | Wireless |                      
                            | Broadband|                        
                            | Alliance |                         
                            +----------+                       
                              /|\  /|\                        
                               |    |                         
                          Agrees terms with                    
                               |    |                              
          +-----------+        |    |        +-----------+        
          |OpenRoaming|<-------+    +------->|OpenRoaming|       
          |Broker     |                      |Broker     |      
          +-----------+                      +-----------+       
             /|\  /|\                           /|\  /|\         
              |    |                             |    |        
         Agrees terms with                  Agrees terms with     
              |    |                             |    |           
        +-----+    +-----+                 +-----+    +-----+     
        |                |                 |                |    
       \|/              \|/               \|/              \|/     
+-----------+     +-----------+     +-----------+     +-----------+
|OpenRoaming|     |OpenRoaming|     |OpenRoaming|     |OpenRoaming|
|Access     |     |Identity   |     |Identity   |     |Access     |
|Network    |     |Provider   |     |Provider   |     |Network    |
|Provider   |     |           |     |           |     |Provider   |
+-----------+     +-----------+     +-----------+     +-----------+
                   /|\  /|\            /|\  /|\      
                    |    |              |    |       
               Agrees terms with   Agrees terms with
                    |    |              |    |       
      +-------------+    |              |    +-------------+       
      |                  |              |                  |       
     \|/                \|/            \|/                \|/      
+-----------+     +-----------+     +-----------+      +-----------+
|OpenRoaming|     |OpenRoaming|     |OpenRoaming|      |OpenRoaming|
|End-User   |     |End-User   |     |End-User   |      |End-User   |
+-----------+     +-----------+     +-----------+      +-----------+

]]></artwork></figure>

</section>
<section anchor="openroaming-legal-terms"><name>OpenRoaming legal terms</name>

<t>In OpenRoaming there is no direct agreement between individual ANPs and individual
IDPs or between end-users and ANPs. As a consequence, OpenRoaming brokers
agree to use certain federation-specific terms in their agreements with
OpenRoaming providers.</t>

<t>This arrangement ensures that all ANPs agree to abide by the OpenRoaming
privacy policy <xref target="ORPRIVACY"/> and all end-users agree to abide by the
OpenRoaming end-user Terms and Conditions <xref target="ORTERMS"/>.</t>

</section>
</section>
<section numbered="false" anchor="Acknowledgements"><name>Acknowledgements</name>

<t>The authors would like to thank all the members of the WBA's OpenRoaming Workgroup
who help define the OpenRoaming specifications.</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

