<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.17 (Ruby 2.6.10) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-tomas-openroaming-01" category="info" submissionType="independent" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="WBA OpenRoaming">WBA OpenRoaming Wireless Federation</title>

    <author initials="B." surname="Tomas" fullname="Bruno Tomas">
      <organization>Wireless Broadband Alliance, Inc.</organization>
      <address>
        <postal>
          <street>5000 Executive Parkway, Suite 302</street>
          <city>San Ramon</city>
          <code>94583</code>
          <country>US</country>
        </postal>
        <email>bruno@wballiance.com</email>
      </address>
    </author>
    <author initials="M." surname="Grayson" fullname="Mark Grayson">
      <organization>Cisco Systems</organization>
      <address>
        <postal>
          <street>10 New Square Park</street>
          <city>Feltham</city>
          <code>TW14 8HA</code>
          <country>UK</country>
        </postal>
        <email>mgrayson@cisco.com</email>
      </address>
    </author>
    <author initials="N." surname="Canpolat" fullname="Necati Canpolat">
      <organization>Intel Corporation</organization>
      <address>
        <postal>
          <street>2111 NE. 25th Ave</street>
          <city>Hillsboro</city>
          <code>97124</code>
          <country>US</country>
        </postal>
        <email>necati.canpolat@intel.com</email>
      </address>
    </author>
    <author initials="B. A." surname="Cockrell" fullname="Betty A. Cockrell">
      <organization>SingleDigits</organization>
      <address>
        <postal>
          <city>San Antonio</city>
          <country>US</country>
        </postal>
        <email>bcockrell@singledigits.com</email>
      </address>
    </author>
    <author initials="S." surname="Gundavelli" fullname="Sri Gundavelli">
      <organization>Cisco Systems</organization>
      <address>
        <postal>
          <street>170 West Tasman Drive</street>
          <city>San Jose</city>
          <code>95134</code>
          <country>US</country>
        </postal>
        <email>sgundave@cisco.com</email>
      </address>
    </author>

    <date year="2023" month="December" day="07"/>

    <area>general</area>
    <workgroup>Independent Submission</workgroup>
    <keyword>Internet-Draft</keyword> <keyword>OpenRoaming</keyword> <keyword>Federation</keyword>

    <abstract>


<t>This document describes the Wireless Broadband Alliance's
OpenRoaming system. The OpenRoaming architectures enables a seamless
onboarding experience for devices connecting to access networks
that are part of the federation of access networks and identity providers.
The primary objective of this document is to describe the protocols that
form the foundation for this architecture, enabling providers to correctly configure
their equipment to support interoperable OpenRoaming signalling exchanges.
In addition, the topic of OpenRoaming has been raised in different IETF working
groups, and therefore a secondary objective is to assist those discussions by
describing the federation organization and framework.</t>



    </abstract>



  </front>

  <middle>


<section anchor="intro"><name>Introduction</name>

<t>WBA OpenRoaming is a roaming federation service of Access Network Providers (ANPs)
and Identity Providers (IDPs), enabling an automatic and secure
Wi-Fi experience globally. WBA OpenRoaming creates the framework to seamlessly
connect billions of users and things to millions of Wi-Fi networks.</t>

<figure title="OpenRoaming Federation" anchor="figfedarch"><artwork><![CDATA[
ANP-1 --\                    _----_                     /-- IDP-1
         \     Access      _( Open )_      Identity    /
ANP-2  ---<==  Network ---(  Roaming )---  Providers <==-- IDP-2
         /     Providers   (_      _)                  \
ANP-3 --/                    '----'                     \-- IDP-3

]]></artwork></figure>

<t>WBA OpenRoaming recognizes the benefits that the likes of eduroam <xref target="RFC7593"/> provide to the
education and research community. WBA OpenRoaming defines a global federation that is targeted at serving
all communities, while supporting both settlement-free use cases where "free" Wi-Fi is being offered to
end-users in order to support some
alternative value proposition, as well as traditional settled "paid" for Wi-Fi offered by some
cellular providers.</t>

<t>OpenRoaming is designed to deliver end-to-end security between a Network Access Server deployed by an
OpenRoaming Access Network Provider and an EAP Server <xref target="RFC3748"/> deployed by an OpenRoaming
Identity Provider. The security of the solution is based on mTLS using certificates
issued under Wireless Broadband Alliance's Public Key Infrastructure <xref target="RFC5280"/>.</t>

<section anchor="Requirements"><name>Requirements Language</name>
<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL",
"SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT
RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be
interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/>
when, and only when, they appear in all capitals, as shown here.</t>

</section>
<section anchor="Terminology"><name>Terminology</name>

<t>Access Network Query Protocol (ANQP):</t>

<ul empty="true"><li>
  <t>An IEEE 802.11 defined protocol that allows for access network information retrieval
in a pre-association state. ANQP has been further extended by the
Wi-Fi Alliance (WFA) as part of its Passpoint program <xref target="PASSPOINT"/>.</t>
</li></ul>

<t>Access Network Provider (ANP):</t>

<ul empty="true"><li>
  <t>An entity that has joined the federation and serves OpenRoaming end-users by configuring the OpenRoaming RCOI(s) in its Wi-Fi equipment.</t>
</li></ul>

<t>Broker:</t>

<ul empty="true"><li>
  <t>An entity that has joined the federation and performs certain specific roles to help scale the operation of the federation. The separate roles of a broker can include:</t>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t><list style="numbers">
      <t>Assigning WBA identities to ANPs and IDPs.</t>
      <t>Operating an issuing intermediate certificate authority under the WBA's PKI and issuing certificates to ANPs and IDPs.</t>
      <t>Operating a registration authority to a third party operated issuing intermediate certificate authority under WBA's PKI to enable certificates to be issued to ANPs and IDPs.</t>
    </list></t>
  </li></ul>
</li></ul>

<t>Closed Access Group (CAG):</t>

<ul empty="true"><li>
  <t>The definition of the 12 most significant bits of an OUI-36 RCOI to indicate OpenRoaming policy controls that
can be enforced by ANPs and IDPs.</t>
</li></ul>

<t>Identity Provider (IDP):</t>

<ul empty="true"><li>
  <t>An entity that has joined the federation and
includes the OpenRoaming RCOI(s) in the Passpoint profile of its end-user devices and
authenticates end-user devices on OpenRoaming ANP networks.</t>
</li></ul>

<t>Level of Assurance (LoA):</t>

<ul empty="true"><li>
  <t>An ISO/IEC 29115 term that is used to define equivalent levels for handling of end-user enrollment, credential management
and authentication amongst different IDPs.</t>
</li></ul>

<t>OpenRoaming-Settled:</t>

<ul empty="true"><li>
  <t>The "base RCOI" of BA-A2-D0 that is used to indicate that the ANP expects to receive payment for
providing OpenRoaming service to end-users.</t>
</li></ul>

<t>OpenRoaming-Settlement-Free:</t>

<ul empty="true"><li>
  <t>The "base RCOI" of 5A-03-BA that is used to indicate that the ANP provides the OpenRoaming service to end-users at
no cost to the IDP.</t>
</li></ul>

<t>Passpoint Profile:</t>

<ul empty="true"><li>
  <t>Passpoint is a Wi-Fi Alliance (WFA) certification program that defines the use a Passpoint profile, that includes the user's credentials
and the access network identifiers, to enables mobile devices to discover and authenticate to Wi-Fi hotspots
that provide Internet access <xref target="PASSPOINT"/>.</t>
</li></ul>

<t>PLMN Id:</t>

<ul empty="true"><li>
  <t>It is a unique identifier for a mobile network operator. The identifier consists of a MCC (Mobile Country Code) and MNC (Mobile Network Code).</t>
</li></ul>

<t>Roaming Consortium Identifier (RCOI):</t>

<ul empty="true"><li>
  <t>RCOI identifies the groups of identity providers that are supported by the network.
It is a 3-octet, or a 5-octet value carried in the 802.11 beacon information element (IE).
It is also sent in the ANQP messages. Based on the access technologies, the specific link-layer
protocols will be used for carrying the RCOI. RCOI is also part of the Passpoint profile.</t>
</li></ul>

<t>Subscriber Identity Module (SIM):</t>

<ul empty="true"><li>
  <t>The SIM is traditionally a smart card distributed by a mobile operator.</t>
</li></ul>

<t>WBA Identity (WBAID):</t>

<ul empty="true"><li>
  <t>A hierarchical namespace that is used to uniquely identify every OpenRoaming entity.</t>
</li></ul>

<t>Wireless Roaming Intermediary eXchange:</t>

<ul empty="true"><li>
  <t>A framework, aimed at facilitating
  interconnectivity between operators and the Wi-Fi roaming hub services.</t>
</li></ul>

</section>
</section>
<section anchor="wireless-broadband-alliance"><name>Wireless Broadband Alliance</name>

<t>The Wireless Broadband Alliance (WBA) defines the Wireless
Roaming Intermediary eXchange (WRIX) framework, aimed at facilitating
interconnectivity between Wi-Fi operators and the Wi-Fi roaming hub services,
as well as the Carrier Wi-Fi Services program that provides guidelines to
improve customer experience on Carrier Wi-Fi networks. Both of these
programs leverage the Wi-Fi Alliance specified Passpoint functionality
<xref target="PASSPOINT"/> to enable automatic and secure connectivity to Wi-Fi networks, allowing devices
to be provisioned with network access credentials with minimal user interaction.</t>

<t>WBA programs have traditionally focussed on "offloading"
cell phone data from cellular networks onto Wi-Fi networks.
Deployments of such systems have seen uneven
adoption across geographies, with cellular operators frequently limiting
their engagement to premier locations that have deployed Wi-Fi and experience
a significant footfall of operator's customers.</t>

<t>Whereas conventional Carrier Wi-Fi has focused on premier locations, the
last decade has seen a continued increase in the requirements of private Wi-Fi
networks to be able to serve visitors, contractors and guest users. Moreover, in
most of these scenarios, the Wi-Fi network is primarily being used to support some
alternative value proposition; an improved retail experience in a shopping
mall, a more efficient meeting in a carpeted office, a superior stay in a
hospitality venue, or a better fan experience in a sporting arena. Traditionally,
this segment has made wide-scale use of captive portals and unencrypted Wi-Fi links
to onboard end-users onto their networks <xref target="RFC8952"/>. However, the decreasing costs for cellular data means
end-users are less motivated to search out and attach to such "free" Wi-Fi
networks, and as a consequence, captive portal conversion rates continue to decrease.</t>

<t>As a consequence, in 2020 WBA launched its OpenRoaming federation,
designed to provide a better on-boarding experience to end-users, that is seamless, scalable and secure.</t>

</section>
<section anchor="orarch"><name>OpenRoaming Architecture</name>

<t><xref target="figwifiarch"/> contrasts a conventional carrier Wi-Fi roaming system with OpenRoaming.
As illustrated, conventional Wi-Fi roaming is typically based on:</t>

<t><list style="numbers">
  <t>IPSec <xref target="RFC6071"/> tunnels established between access networks, hub providers and identity providers used to protect exchanged signalling.</t>
  <t>Static routing of RADIUS signalling <xref target="RFC2865"/> based on realm routing tables populated according to agreements between access networks and hub providers.</t>
  <t>Passpoint primarily used with SIM based identifiers, where individual PLMN-IDs are configured in the access networks WLAN equipment and cellular providers enable Passpoint based SIM authentication in end-user devices.</t>
  <t>EAP-AKA <xref target="RFC4187"/> based passpoint authentication exchanged between the Supplicant in the end-user device and the EAP Server in the cellular provider's network.</t>
  <t>A primary focus on carrier based identities where the end-user has a billing relationship with the carrier.</t>
</list></t>

<t>In contrast, OpenRoaming is based on:</t>

<t><list style="numbers">
  <t>RadSec signalling <xref target="RFC6614"/> secured using mTLS with certificates issued under WBA's private certificate authority.</t>
  <t>Dynamic routing of RADIUS based on DNS-based discovery of signalling peers <xref target="RFC7585"/></t>
  <t>Passpoint based network selection based on 36-bit Roaming Consortium Organization Identifiers (RCOIs), where WBA defines the use of 12-bits of the RCOI to embed closed access group policies.</t>
  <t>Passpoint authentication that can use any of the Passpoint defined EAP methods.</t>
  <t>Encompassing new identity providers who do not have a billing relationship with their end-users.</t>
</list></t>

<figure title="Contrasting Carrier Wi-Fi and OpenRoaming Architectures" anchor="figwifiarch"><artwork><![CDATA[
+---------+        +--------+        +--------+        +--------+              
| Visited |        | Wi-Fi  |        | Wi-Fi  |        |Cellular|              
|  Wi-Fi  |        |  Hub   |        |  Hub   |        |Provider|              
| Network |<------>|Provider|<------>|Provider|<------>|Network |              
|         | RADIUS |        | RADIUS |        | RADIUS |        |              
|   NAS   |        | RADIUS |        | RADIUS |        | RADIUS |              
|         |<------>| proxy  |<------>| proxy  |<------>| Server |              
|Passpoint| IPSec  +--------+ IPSec  +--------+ IPSec  +--------+              
|PLMNID(s)|                                                                    
+---------+                                                                    
    /|\                                                                        
     |                                                                         
    \|/                                                                        
+---------+         A) Conventional Carrier Wi-Fi                              
|Passpoint|                                                                    
| device  |                                                                    
|  with   |                                                                    
| PLMNID  |                                                                    
| profile |                                                                    
+---------+                                                                    


+---------+                   +---+                    +--------+              
| Visited |<----------------->|DNS|<------------------>|Identity|              
|  Wi-Fi  |   DNS based peer  +---+  Configure NAPTR,  |Provider|              
| Network |      discovery           SRV and A Records |Network |              
|         |                                            |        |              
|   NAS   |                                            | RADIUS |              
|         |<------------------------------------------>| Server |              
|Passpoint|        RadSec/TLS secured using mTLS       +--------+              
| RCOI(s) |               and WBA PKI                                          
+---------+                                                                    
    /|\                                                                        
     |                                                                         
    \|/                                                                        
+---------+              B) OpenRoaming                                        
|Passpoint|                                                                    
| device  |                                                                    
|  with   |                                                                    
| RCOI(s) |                                                                    
| profile |                                                                    
+---------+                                                                    

]]></artwork></figure>

</section>
<section anchor="wbaid"><name>Identifying OpenRoaming Entities</name>

<t>All OpenRoaming providers and OpenRoaming brokers are allocated a WBA Identity (WBAID). The
WBAID is defined to be transported in the RADIUS Operator-Name attribute (#126) <xref target="RFC5580"/>.
WBA has been allocated the Operator Namespace identifier 0x34 "4" to identify
an Operator-Name attribute carrying a WBAID.</t>

<t>The WBAID is a hierarchical namespace that comprises at its top level the
identity allocated by WBA to a WBA Member and is of the form shown in <xref target="figwbaid"/>
where the optional 2 upper case characters represent an ISO-3166 Alpha-2 country code <xref target="ISO3166"/> e.g.,
"WBAMEMBER:US".</t>

<figure title="ABNF definition of Primary WBAID Structure" anchor="figwbaid"><artwork><![CDATA[
upper-case-char = %x41-5a
member-id       = 1*upper-case-char
wbaid           = member-id [ %x3a 2*2upper-case-char]

]]></artwork></figure>

<t>Operating as an OpenRoaming broker, the WBA Member
is able to allocate subordinate identities to OpenRoaming providers
who are not WBA members by pre-pending a subordinate identity ,
plus "." (%x2e) to the Member's WBAID, e.g., OPENROAMINGPROVIDER.WBAMEMBER:US.
In this way, any receiving entity of a WBAID can identify the WBA Member who
is acting as an OpenRoaming broker to the provider by assigning it an identity.</t>

</section>
<section anchor="sss"><name>Scaling Secured Signalling</name>

<t>As described in <xref target="legal"/>, the OpenRoaming legal framework does not assume
any direct relationship between ANP and IDP. In order to scale the
secured signalling between providers, the federation makes use of
Public Key Infrastructure using a private Certificate Authority specifically
designed to secure the operations of the roaming federation. WBA
and its members have published the WBA Certificate Policy that defines the
policies which govern the operations of the PKI components by all
individuals and entities within the infrastructure. The OID for Wireless
Broadband Alliance is:</t>

<t>{ iso(1) identified-organization(3) dod(6) internet(1) private(4) enterprise(1) The Wireless Broadband Alliance(14122) }</t>

<t>The Wireless Broadband Alliance organizes its OID arcs for the Certificates
Policy Documents using the object identifier 1.3.6.1.4.1.14122.1.1. At the time of writing,
the current certificate policy is 1.3.6.1.4.1.14122.1.1.6.</t>

<t>This Certificate Policy is based on a 4-level hierarchy, as illustrated below.</t>

<figure title="OpenRoaming PKI Hierarchy" anchor="figpki"><artwork><![CDATA[
+---------+---------------------------+----------------------------+
|         |                           |                            |
| Level   | Description               |  Comment                   |
|         |                           |                            |
+---------+---------------------------+----------------------------+
| Level 1 | OpenRoaming Root          | Operation managed by WBA   |
|         | Certificate Authority     |                            |
+---------+---------------------------+----------------------------+
| Level 2 | OpenRoaming Policy        | Operation managed by WBA.  |
|         | Intermediate Certificate  | Instantiates WBA policy OID|
|         | Authority                 |                            |
+---------+---------------------------+----------------------------+
| Level 3 | OpenRoaming Issuing       | Operated by an OpenRoaming |
|         | Intermediate Certificate  | broker                     |
|         | Authority                 |                            |
+---------+---------------------------+----------------------------+
| Level 3 | OpenRoaming Registration  | Optional and when used,    |
|         | Authority                 | operated by an OpenRoaming |
|         |                           | broker                     |
+---------+---------------------------+----------------------------+
| Level 4 | OpenRoaming Entity        | A WBA member or non-member.|
|         |                           | WBA's Certificate Policy   |
|         |                           | requires the Entity's      |
|         |                           | WBAID is included in the   |
|         |                           | Subject UID field in the   |
|         |                           | certificate.               |
+---------+---------------------------+----------------------------+

]]></artwork></figure>

<t>Certificates issued under the WBA PKI are used by Entities to perform mutual
authentication with other Entities and to secure RadSec
signalling <xref target="RFC6614"/> that carries EAP-based Passpoint authentication. This is typically between a
RadSec client in the OpenRoaming ANPs network and an RadSec Server in the OpenRoaming
IDPs network, although a provider can decide to outsource the operation of the RadSec
endpoint to a third party provider.</t>

</section>
<section anchor="dpd"><name>IDP Discovery</name>

<section anchor="dynamic-discovery"><name>Dynamic Discovery</name>

<t>OpenRoaming defines the use of dynamic discover <xref target="RFC7585"/> by which an ANP discovers the
IP address of the IDP's RadSec server.</t>

</section>
<section anchor="discovery-of-eap-akaaka-servers"><name>Discovery of EAP-AKA/AKA' Servers</name>

<t>Passpoint defines the use of EAP-AKA' based authentication <xref target="RFC5448"/> which uses the
3GPP 23.003 <xref target="TS23003"/> defined realm of wlan.mnc&lt;mnc&gt;.mcc&lt;mcc&gt;.3gppnetwork.org, where
&lt;mcc&gt; represent an E.212 Mobile Country Code and &lt;mnc&gt; represents the E.212
Mobile Network Code allocated to the IDP. GSMA is responsible for
operating the 3gppnetwork.org domain and GSMA IR.67 <xref target="GSMAIR67"/> limits access to
the DNS systems supporting such records to those systems on the inter-PLMN IP
backbone (known as "GRX/IPX"). As OpenRoaming ANPs do not connect to this inter-PLMN backbone,
then conventional realm based lookup cannot be used to discover the RadSec server
supporting EAP-AKA' authentication.</t>

<t>GSMA IR.67 does allow systems to be discoverable
from the public Internet, specifically calling out the use of the
pub.3gppnetwork.org domain name for such procedures. In order for ANPs
to dynamically discover the RadSec server supporting EAP-AKA' authentication,
GSMA has defined the use of the wlan.mnc&lt;mnc&gt;.mcc&lt;mcc&gt;.pub.3gppnetwork.org by
OpenRoaming systems. This means that whenever a RadSec client receives a user-name
containing an NAI formatted as user@wlan.mnc&lt;mnc&gt;.mcc&lt;mcc&gt;.3gppnetwork.org, the dynamic
peer detection functionality MUST insert "pub" into the realm and perform
DNS based dynamic discovery using the wlan.mnc&lt;mnc&gt;.mcc&lt;mcc&gt;.pub.3gppnetwork.org
domain name. The RADIUS user-name attribute MUST NOT be similarly modified.</t>

<t>IR.67 defines the procedure by which a cellular operator can request the delegation
of their mnc&lt;mnc&gt;.mcc&lt;mcc&gt;.pub.3gppnetwork.org.  GSMA PRD IR.67 also allows an MNO
to delegate the entire mnc&lt;MNC&gt;.mcc&lt;MCC&gt;.pub.3gppnetwork.org sub-domain
which could have already occurred, e.g., to enable use of the
epdg.mnc&lt;MNC&gt;.mcc&lt;MCC&gt;.pub.3gppnetwork.org for Wi-Fi calling service. Using this approach,
a cellular operator operating as an OpenRoaming IDP can authenticate their end-users on
third party ANP Wi-Fi networks.</t>

</section>
<section anchor="proving-a-server-is-authoritative-for-a-realm"><name>Proving a server is authoritative for a realm</name>

<t>The OpenRoaming preferred approach to dynamically discover the RadSec server
IP address serving a particular realm or set of realms is to
use DNS records that are protected with DNSSEC <xref target="RFC4035"/>. However, GSMA
have not enabled DNSSEC on their 3gppnetwork.org domain, meaning that DNSSEC
cannot be applied on the publicly resolvable domains under pub.3gppnetwork.org.
Because of this situation, OpenRoaming does not currently mandate operation of DNSSEC.</t>

<t>If the DNS records for a realm are not protected with DNSSEC, because the realm
has been provided directly by the OpenRoaming End-User, the
IDP SHOULD ensure that the discovered RadSec server(s) supporting its realm(s)
is/are configured with a WBA-PKI server certificate that includes the realm(s)
used in the dynamic peer detection in the certificate SubjectAltName.</t>

<t>Where the DNS records are protected with DNSSEC, the IDP SHOULD ensure that
the discovered RadSec server(s) supporting its realm(s)
is/are configured with a WBA-PKI server certificate that includes the
derived name(s) from the secured DNS NAPTR/SRV query in the
certificate SubjectAltName.</t>

<t>Where the OpenRoaming IDP has offloaded the operation of RadSec termination to a
third party hub-provider that is responsible for supporting a number of independent realms,
the hub-provider SHOULD ensure that the discovered RadSec server(s) supporting
the independent realms from its partner IDPs
is/are configured with a WBA-PKI server certificate that includes the
derived name(s) from the DNS NAPTR/SRV query in the
certificate SubjectAltName.</t>

</section>
</section>
<section anchor="PASSPOINT-SEC"><name>OpenRoaming Passpoint Profile</name>

<section anchor="openroaming-policy-controls"><name>OpenRoaming Policy Controls</name>

<t>In order to avoid possible fragmentation of roaming federations, OpenRoaming recognizes
that there is a need to permit OpenRoaming to be integrated into a variety of
different use-cases and value propositions. These use-cases include scenarios where
providers are able to enforce policy controls of end-users accessing the service.
The realization of policy controls in the OpenRoaming federation is a balance
between the requirements for fine grain policy enforcement versus the potential
impact of policy enforcement on the user experience.</t>

<t>Such a level of control is realized using Closed Access Group (CAG) based policies.
A Closed Access Group identifies a group of OpenRoaming users who are permitted
to access one or more OpenRoaming access networks configured with a particular CAG policy.
These Closed Access Group policies are encoded using one or more
Roaming Consortium Organization Identifiers (RCOIs), first defined
in Passpoint Release 1.0, and well supported
across the smartphone device ecosystem.</t>

<t>Note, encoding CAG policies in OpenRoaming using one or more RCOIs is aimed at
delivering an equivalent functionality to the CAG policies encoded in 3GPP using one or more CAG-IDs.</t>

</section>
<section anchor="CAG"><name>OpenRoaming Closed Access Group Policies</name>

<t>OpenRoaming defines the use of multiple RCOIs to facilitate the implementation of
closed access group policies across the federation. The currently defined RCOIs are:</t>

<t><list style="symbols">
  <t>OpenRoaming-Settled:  BA-A2-D0-xx-x</t>
  <t>OpenRoaming-Settlement-Free:  5A-03-BA-xx-x</t>
</list></t>

<t><xref target="figrcoi"/> shows how the 24-bit length OpenRoaming RCOIs are further extended into 36-bit length OUI-36s
with additional context dependent identifiers used to encode specific closed access group
policies. Following Passpoint Release 1.0 specification, only when there is a bitwise match of
all 36 bits of the configured RCOI in the WLAN equipment and the Passpoint profile configured in the
end-user device will an EAP authentication be triggered.</t>

<t>The encoding of closed access group policies is defined so that the "no-restrictions" policy is
encoded using the 12-bit value "00-0", i.e., 54-03-BA-00-0 represents a policy
that accepts all OpenRoaming settlement-free users onto a particular ANP installation.</t>

<figure title="Extension of Octets 4 and 5 for OpenRoaming Context Dependent RCOI Field " anchor="figrcoi"><artwork><![CDATA[
+---------------------------------------+-------------------+
|               OUI-36 Octet 4          |  OUI-36 Octet 5   |
+---------------------------------------+-------------------+
| B7 | B6 | B5 | B4 | B3 | B2 | B1 | B0 | B7 | B6 | B5 | B4 |
+----+---------+----+-------------------+-------------------+
| LoA|   QoS   |PID |     ID-Type       |Reserved - set to 0|
+----+---------+----+-------------------+-------------------+

]]></artwork></figure>

<section anchor="level-of-assurance-policies"><name>Level of Assurance Policies</name>

<t>The format of the Level of Assurance (LoA) field is as shown in <xref target="figloa"/>.</t>

<figure title="OpenRoaming CAG LoA Field " anchor="figloa"><artwork><![CDATA[
+------------------------------------------------------------+
|  LoA Field  |           Description                        |
+------------------------------------------------------------+
|     B7      |                                              |
+------------------------------------------------------------+
|     0       |   Baseline Identity Proofing                 |
+------------------------------------------------------------+
|     1       |   Enhanced Identity Proofing                 |
+------------------------------------------------------------+

]]></artwork></figure>

<t>The baseline identity proofing requirement on IDPs ensures that all
OpenRoaming identities are managed with at least a medium level of
assurance (LoA level 2) for end-user enrollment, credential management
and authentication, as specified in ISO/IEC 29115 <xref target="ISO29115"/>.</t>

<t>Any IDP that manages its identities according to ISO/IEC 29115 LoA level 2
MUST NOT configure any RCOI in their end-users' Passpoint profile
with the LoA field set to "1". Conversely, an IDP that manages its identities
according to ISO/IEC 29115 LoA level 3 MAY configure multiple RCOIs
in their end-users' Passpoint profile, including RCOIs with the LoA field
set to "0" and RCOIs with the LoA field set to "1".</t>

<t>The LoA field is used to support ANPs which operate in regulatory
regimes that require enhanced identity proofing to be used in the
provision of credentials on OpenRoaming devices, equivalent to LoA level
3 in ISO/IEC29115 <xref target="ISO29115"/>. In such a scenario, the ANP can set the LoA bit
field to 1 in all configured RCOIs to ensure that only identities
provisioned using enhanced LoA 3 procedures can access via the ANP's network.</t>

</section>
<section anchor="quality-of-service-policies"><name>Quality of Service Policies</name>

<t>One of the challenges faced by users of Wi-Fi hotspots is when the Wi-Fi network
is configured sub-optimally and results in a poor user experience. Often the only
remedy open to a user it to disable the Wi-Fi interface on their smartphone and
continue to use cellular data. As a consequence, OpenRoaming defines specific
service tiers across the federation using the QoS field.
The format of the QoS field is shown in <xref target="figqos"/>.</t>

<figure title="OpenRoaming CAG QoS Field " anchor="figqos"><artwork><![CDATA[
+------------------------------------------------------------+
|            QoS Field              |      Description       |
+------------------------------------------------------------+
|        B6       |        B5       |                        |
+------------------------------------------------------------+
|        0        |        0        |        Bronze          |
+------------------------------------------------------------+
|        0        |        1        |        Silver          |
+------------------------------------------------------------+
|        1        |        0        |       Reserved         |
+------------------------------------------------------------+
|        1        |        1        |       Reserved         |
+------------------------------------------------------------+
]]></artwork></figure>

<t>The "Bronze" and "Silver" values of QoS field are used to identify
specific quality of service policy aspects.</t>

<t>The bronze service tier corresponds to the following:</t>

<t><list style="numbers">
  <t>The availability of OpenRoaming service
when used to access the Internet measured during scheduled operations
across the ANP's network exceeds 90% over any one month period.</t>
  <t>The aggregate bandwidth used to receive
Internet service on the ANP's network is sufficient to enable
each and every authenticated and authorized OpenRoaming end-user to simultaneously receive a
sustained 256 kilobits per second connection.</t>
</list></t>

<t>The silver service tier corresponds to the following:</t>

<t><list style="numbers">
  <t>The availability of OpenRoaming service
when used to access the Internet measured during scheduled operations
across the ANP's network exceeds 95% over any one month period.</t>
  <t>The aggregate bandwidth used to receive
Internet service on the ANP's network is be sufficient to enable
each and every authenticated and authorized end-user to receive a
sustained 512 kilobits per second connection.</t>
  <t>At least 10% of authenticated and authorized users are able
to stream video content at a downlink rate of at least 5 megabits per
second (when measured over a one-minute interval) over all of the ANP's
OpenRoaming enabled Wi-Fi networks.</t>
  <t>The authenticated and authorized end-users are
able to stream video from one or more third party content distribution
networks with an end-to-end latency of less than 150ms from all of the
ANP's OpenRoaming enabled Wi-Fi networks.</t>
</list></t>

<t>The QoS field can be used by those IDPs that are only interested in providing
their end-users with a higher quality service level when automatically authenticated
onto an OpenRoaming network. For example, an IDP configures the QoS field
as bronze in a Passpoint profile that uses the "5A-03-BA" settlement free RCOI and
configure the QoS field as silver in a Passpoint profile that uses the
"BA-A2-D0" OpenRoaming-settled paid service.</t>

<t>ANPs that only support the bronze service tier MUST set the QoS Field to "00" in
all RCOIs configured on their WLAN equipment. ANPs that support the silver service
tier MAY configure multiple RCOIs on their WLAN equipment that include values where
the QoS field is set to "01" and values where the QoS field is set to "00".-</t>

<t>Exceptionally, ANPs that operate OpenRoaming installations on moving platforms
are permitted to deviate from normal OpenRoaming service level requirements. This is
because such installations may necessitate use of cellular-based backhaul and/or
backhaul via Non-Terrestrial Networks (NTN) which may not be able to meet the
OpenRoaming baseline service level requirements.
If an ANP wants to benefit from such deviations, it MUST signal using the WLAN-Venue-Info
attribute <xref target="RFC7268"/> that it is operating in a venue category identified using
a Venue Group value of "10", which is defined in Section 8.4.1.34 of <xref target="IEEE80211"/>
as being used for vehicular installations. In such cases, the OpenRoaming ANP may
signal one or more WBA-Custom-SLA vendor specific attributes <xref target="WBAVSA"/> to indicate
one or more (availability, per-user sustained bandwidth) tuples to the IDP.</t>

</section>
<section anchor="privacy-policies"><name>Privacy Policies</name>

<t>The baseline privacy policy of OpenRoaming ensures
the identities of end-users remain anonymous when using the
service. The PID field can be used to support scenarios where the user has consented
with their IDP that their permanent ID can be signalled to the
ANP in the RADIUS Access-Accept. The format of the PID field is
illustrated in <xref target="figpid"/>. The PID
field can be configured to "1" in the RCOIs used by those ANPs that
want to be be able to account for unique OpenRoaming end-users.</t>

<t>The OpenRoaming IDP terms ensure subscribers
explicitly give their permission for their permanent identity
to be shared with a third party ANP. When such permission has
not been granted, an IDP MUST NOT set the PID field to "1" in any
of the RCOIs in its end-user Passpoint profiles. When such permission has
been granted, an IDP MAY configure multiple RCOIs
in their end-users' Passpoint profile, including RCOIs with the PID field
set to "0" and RCOIs with the PID field set to "1".</t>

<figure title="OpenRoaming CAG PID Field " anchor="figpid"><artwork><![CDATA[
+------------------------------------------------------------+
|  PID Field  |           Description                        |
+------------------------------------------------------------+
|     B4      |                                              |
+------------------------------------------------------------+
|     0       |   Baseline ID Policy applies, i.e., users    |
|             |   remain anonymous whilst using the service  |
+------------------------------------------------------------+
|     1       |   A Permanent ID will be returned by the IDP |
+------------------------------------------------------------+

]]></artwork></figure>

</section>
<section anchor="id-type-policies"><name>ID-Type Policies</name>

<t>The ID-Type field can be used to realize policies which are based
on the business sector associated with the identity used by the IDP.
The format of the ID-Type
field is illustrated in <xref target="figidtype"/>.</t>

<t>All IDPs configure at least one RCOI in their end-user's
Passpoint profile with ID-Type set to "0000" (Any identity type is permitted).
An IDP MAY configure additional RCOIs in their end-users' Passpoint profile
with an ID-Type representing the sector type of IDP.</t>

<t>An ANP what wants to serve all end-users, irrespective of sector,
configures RCOIs in the WLAN equipment with ID-Type set to "0000".
Alternatively, an ANP which operates a sector specific business that
only desires to serve a subset of OpenRoaming end-users MAY set the ID-Type
to their desired sector in all configured RCOIs.</t>

<figure title="OpenRoaming CAG ID-Type Field " anchor="figidtype"><artwork><![CDATA[
+------------------------------------------------------------+
|       ID-Type Field       |              Description       |
+------------------------------------------------------------+
|  B3  |  B2  |  B1  |  B0  |                                |
+------------------------------------------------------------+
|  0   |  0   |  0   |  0   | Any identity type is permitted |
+------------------------------------------------------------+
|  0   |  0   |  0   |  1   | A service provider identity    |
+------------------------------------------------------------+
|  0   |  0   |  1   |  0   | A cloud provider identity      |
+------------------------------------------------------------+
|  0   |  0   |  1   |  1   | A generic enterprise identity  |
+------------------------------------------------------------+
|  0   |  1   |  0   |  0   | A government identity, e.g.,   |
|      |      |      |      | including city                 |
+------------------------------------------------------------+
|  0   |  1   |  0   |  1   | An automotive identity         |
+------------------------------------------------------------+
|  0   |  1   |  1   |  0   | A hospitality identity         |
+------------------------------------------------------------+
|  0   |  1   |  1   |  1   | An aviation industry identity  |
+------------------------------------------------------------+
|  1   |  0   |  0   |  0   | An education or research       |
|      |      |      |      | identity                       |
+------------------------------------------------------------+
|  1   |  0   |  0   |  1   | A cable industry identity      |
+------------------------------------------------------------+
|  1   |  0   |  1   |  0   | A manufacturer identity        |
+------------------------------------------------------------+
|  1   |  0   |  1   |  1   | A retail identity              |
+------------------------------------------------------------+
|        other values       | Reserved                       |
+------------------------------------------------------------+
]]></artwork></figure>

</section>
</section>
<section anchor="prioritizing-policies"><name>Prioritizing Policies</name>

<t>The  definition of OpenRoaming closed access group policies assumes
the configuration of multiple RCOIs in ANP WLAN equipment and IDP end-user devices.</t>

<t>When a device has multiple Passpoint profiles matching the ANP's RCOI policy,
an OpenRoaming ANP may want to prefer OpenRoaming subscribers use a particular IDP's
profile when attaching to its access network. Such a preference can be because
the OpenRoaming ANP has a preferential relationship with certain OpenRoaming IDPs.</t>

<t>The OpenRoaming ANP is able to use the Home SP preference functionality defined in
Passpoint <xref target="PASSPOINT"/> to prioritize the use of a particular profile by a Passpoint enabled device.
In such a scenario, the ANP configures the Domain Name list to include the
FQDN(s) associated with the profile(s) to be prioritized.</t>

</section>
</section>
<section anchor="RADIUS"><name>OpenRoaming RADIUS Profile</name>

<t>The OpenRoaming RADIUS profile is based on WBA WRIX Specifications which in turn
are derived from <xref target="RFC3580"/> and <xref target="RFC3579"/>.</t>

<t>Additionally, OpenRoaming defines the use of the following RADIUS attributes.</t>

<section anchor="operator-name"><name>Operator-Name</name>

<t>As described in <xref target="wbaid"/>, OpenRoaming uses the Operator-Name (#126) <xref target="RFC5580"/> attribute to signal
the WBAID of the OpenRoaming ANP. All ANPs MUST support the Operator-Name attribute and use it to signal the
WBAID of the OpenRoaming ANP.</t>

</section>
<section anchor="chargeable-user-identity"><name>Chargeable-User-Identity</name>

<t>All OpenRoaming ANPs MUST support the Chargeable-User-Identity attribute (#89) <xref target="RFC4372"/>.
When an end-user has consented to sharing a permanent identity with the ANP, the
CUI returned by the IDP is invariant over subsequent end-user authentication exchanges between
the IDP and the ANP.</t>

</section>
<section anchor="location-datalocation-information"><name>Location-Data/Location-Information</name>

<t>All OpenRoaming ANPs MUST support signalling of location information using <xref target="RFC5580"/>.
As a minimum, all OpenRoaming IDPs need to be able to determine the country in which the
OpenRoaming ANP operates. The OpenRoaming legal framework described in <xref target="legal"/> serves as an "out-of-band agreement" as
specified in clause 3.1 of <xref target="RFC5580"/>. Hence, all OpenRoaming ANPs MUST include the Location-Data
attribute (#128) in RADIUS Access-Request messages where the location profile is the civic location profile
that includes the country code where the ANP is located in all Access-Request messages
<xref target="RFC5580"/>.</t>

<t>When the OpenRoaming ANP supports the OpenRoaming-Settled RCOI ("BA-A2-D0"),
the Location-Data attribute (#128) MUST be included where the location profile
is the civic location profile containing Civic Address Type information that
is sufficient to identify the financial regulatory regime that defines the
taxable rates associated with consumption of the ANP's service.</t>

<t>OpenRoaming also defines the optional use the geospatial location profile as specified in
<xref target="RFC5580"/>. ANPs MAY signal coordinate-based geographic location of
the NAS or end-user device and this information MAY be used by IDPs, e.g.,
in their authorization decisions.</t>

</section>
<section anchor="wba-identity-provider"><name>WBA-Identity-Provider</name>

<t>The Operator-Name attribute allows the WBAID of the ANP to be signalled to the IDP.
In the reverse direction, the IDP MUST use the WBA-Identity-Provider vendor
specific attribute <xref target="WBAVSA"/> to signal the WBAID of the IDP back to the ANP.</t>

</section>
<section anchor="wba-offered-service"><name>WBA-Offered-Service</name>

<t>The ANP MAY use the WBA-Offered-Service vendor specific attribute to signal the
highest OpenRoaming service tier supported on its network <xref target="WBAVSA"/>.</t>

</section>
<section anchor="wlan-venue-info"><name>WLAN-Venue-Info</name>

<t>The ANP MAY use the WLAN-Venue-Info attribute <xref target="RFC7268"/> to signal the
category of venue hosting the WLAN.</t>

</section>
<section anchor="wba-custom-sla"><name>WBA-Custom-SLA</name>

<t>When the ANP uses the WLAN-Venue-Info attribute to signal that is the venue
hosting the WLAN is a vehicular installation, the  ANP MAY use the
WBA-Custom-SLA vendor specific attribute <xref target="WBAVSA"/> to indicate
one or more (availability, per-user sustained bandwidth) tuples to the IDP.</t>

</section>
<section anchor="additional-attributes-related-to-openroaming-settled"><name>Additional attributes related to OpenRoaming settled</name>

<t>OpenRoaming settled defines the use of additional RADIUS attributes.</t>

<section anchor="wba-financial-clearing-provider"><name>WBA-Financial-Clearing-Provider</name>

<t>All OpenRoaming ANPs and IDPs that support the OpenRoaming settled service
MUST use the WBA-Financial-Clearing-Provider vendor specific attribute to signal
the  identity of the provider of financial clearing services <xref target="WBAVSA"/>.</t>

</section>
<section anchor="wba-data-clearing-provider"><name>WBA-Data-Clearing-Provider</name>

<t>All OpenRoaming ANPs and IDPs that support the OpenRoaming settled service MAY
use the WBA-Data-Clearing-Provider vendor specific attribute to signal
the  identity of the provider of data clearing services <xref target="WBAVSA"/>.</t>

</section>
<section anchor="wba-linear-volume-rate"><name>WBA-Linear-Volume-Rate</name>

<t>In cellular roaming, inter-operator tariff information is exchanged in
the roaming agreements between operators. In OpenRoaming, as there is no
direct agreement between ANPs and IDPs, the tariff information is
exchanged in RADIUS messages. All OpenRoaming ANPs that support
the OpenRoaming settled service MUST use the WBA-Linear-Volume-Rate
vendor specific attribute to signal the charging model being offered
by the ANP <xref target="WBAVSA"/>. An IDP that authorizes an offered charging model MUST include
the agreed WBA-Linear-Volume-Rate in the Access-Accept message.</t>

</section>
</section>
</section>
<section anchor="Security"><name>Security Considerations</name>

<section anchor="network-selection-and-triggering-authentication"><name>Network Selection and Triggering Authentication</name>

<t>OpenRoaming defines the use of Passpoint with Roaming Consortium Organization Identifiers.
A bit-wise match between an RCOI configured in the Passpoint profile of an end-user's device and the RCOI signalled
by WLAN equipment will trigger a Passpoint defined EAP-based authentication exchange.
The security associated with the Passpoint RCOI
information element is identical to other PLMN-ID and Realm information elements, allowing an
unauthorized system to configure the OpenRoaming RCOI with the aim of triggering a Passpoint authentication.
Because such unauthorized system will not have been issued with a certificate using WBA's PKI, the
unauthorized system is unable to communicate with any other OpenRoaming provider.
In such a scenario, the device's supplicant can add the Access Point's BSSID to a deny list
to avoid future triggering of an authentication with the unauthorized system.</t>

</section>
<section anchor="dynamic-discovery-of-radsec-peers"><name>Dynamic Discovery of RadSec Peers</name>

<t>OpenRoaming recommends the use of DNSSEC to ensure a dynamically discovered RadSec server
is authoritative for a particular realm or set of realms. Where this is not possible, e.g.,
when using dynamic resolution with the pub.3gppnetwork.org sub-domain, the OpenRoaming
certificate policy permits the configuration of supported realm(s) in the SubjectAltName
of the certificate(s) issued to the IDP.</t>

<t>An ANP can decide to continue with the RadSec establishment, even if a server cannot prove it is
authoritative for a realm. As the ANP's RadSec client uses a dedicated trust store corresponding to the WBA's private Certificate
Authority, if DNS is hijacked by a third-party non-federation member
who has not been issued a certificate under WBA's PKI, the subsequent TLS establishment will fail.</t>

</section>
<section anchor="end-user-traffic"><name>End-User Traffic</name>

<t>The OpenRoaming federation ensures RADIUS traffic is secured between ANP and IDP and ensures Wi-Fi traffic is protected
between the end-user device and the WLAN equipment of the ANP. The ANP is therefore able to observe IP
traffic to/from end-users who have performed a successful authentication with their IDP. The OpenRoaming legal framework (see <xref target="legal"/>) ensures that the ANP has agreed to the OpenRoaming Privacy Policy <xref target="ORPRIVACY"/> to correctly handle the personally identifiable information collected
as part of providing the ANP service.</t>

<t>The Open-Roaming end-user terms and conditions <xref target="ORTERMS"/> ensure that users are aware that the federation does not provide a
secure end-to-end service. The end-user should not rely on the encryption delivered by OpenRoaming for providing security of services accessed using the ANP's Wi-Fi network.</t>

</section>
</section>
<section anchor="future-enhancements"><name>Future Enhancements</name>

<t>WBA announced the launch of its OpenRoaming Federation in June 2020. Since then, WBA members have continued to enhance the technical framework to address new market requirements that are reflected in the Closed Access Group policies described in <xref target="CAG"/> and the RADIUS profile described in <xref target="RADIUS"/>. WBA encourages those parties interested in adapting OpenRoaming to address new requirements to join the Alliance and help drive the definition of OpenRoaming forward.</t>

</section>
<section anchor="IANA"><name>IANA Considerations</name>

<t>This document has no IANA actions.</t>

</section>


  </middle>

  <back>


    <references title='Normative References'>



<reference anchor='RFC2119' target='https://www.rfc-editor.org/info/rfc2119'>
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname='S. Bradner' initials='S.' surname='Bradner'/>
    <date month='March' year='1997'/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name='BCP' value='14'/>
  <seriesInfo name='RFC' value='2119'/>
  <seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>

<reference anchor='RFC8174' target='https://www.rfc-editor.org/info/rfc8174'>
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname='B. Leiba' initials='B.' surname='Leiba'/>
    <date month='May' year='2017'/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name='BCP' value='14'/>
  <seriesInfo name='RFC' value='8174'/>
  <seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>




    </references>

    <references title='Informative References'>



<reference anchor='RFC2865' target='https://www.rfc-editor.org/info/rfc2865'>
  <front>
    <title>Remote Authentication Dial In User Service (RADIUS)</title>
    <author fullname='C. Rigney' initials='C.' surname='Rigney'/>
    <author fullname='S. Willens' initials='S.' surname='Willens'/>
    <author fullname='A. Rubens' initials='A.' surname='Rubens'/>
    <author fullname='W. Simpson' initials='W.' surname='Simpson'/>
    <date month='June' year='2000'/>
    <abstract>
      <t>This document describes a protocol for carrying authentication, authorization, and configuration information between a Network Access Server which desires to authenticate its links and a shared Authentication Server. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='2865'/>
  <seriesInfo name='DOI' value='10.17487/RFC2865'/>
</reference>

<reference anchor='RFC3579' target='https://www.rfc-editor.org/info/rfc3579'>
  <front>
    <title>RADIUS (Remote Authentication Dial In User Service) Support For Extensible Authentication Protocol (EAP)</title>
    <author fullname='B. Aboba' initials='B.' surname='Aboba'/>
    <author fullname='P. Calhoun' initials='P.' surname='Calhoun'/>
    <date month='September' year='2003'/>
    <abstract>
      <t>This document defines Remote Authentication Dial In User Service (RADIUS) support for the Extensible Authentication Protocol (EAP), an authentication framework which supports multiple authentication mechanisms. In the proposed scheme, the Network Access Server (NAS) forwards EAP packets to and from the RADIUS server, encapsulated within EAP-Message attributes. This has the advantage of allowing the NAS to support any EAP authentication method, without the need for method- specific code, which resides on the RADIUS server. While EAP was originally developed for use with PPP, it is now also in use with IEEE 802. This memo provides information for the Internet community.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='3579'/>
  <seriesInfo name='DOI' value='10.17487/RFC3579'/>
</reference>

<reference anchor='RFC3580' target='https://www.rfc-editor.org/info/rfc3580'>
  <front>
    <title>IEEE 802.1X Remote Authentication Dial In User Service (RADIUS) Usage Guidelines</title>
    <author fullname='P. Congdon' initials='P.' surname='Congdon'/>
    <author fullname='B. Aboba' initials='B.' surname='Aboba'/>
    <author fullname='A. Smith' initials='A.' surname='Smith'/>
    <author fullname='G. Zorn' initials='G.' surname='Zorn'/>
    <author fullname='J. Roese' initials='J.' surname='Roese'/>
    <date month='September' year='2003'/>
    <abstract>
      <t>This document provides suggestions on Remote Authentication Dial In User Service (RADIUS) usage by IEEE 802.1X Authenticators. The material in this document is also included within a non-normative Appendix within the IEEE 802.1X specification, and is being presented as an IETF RFC for informational purposes. This memo provides information for the Internet community.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='3580'/>
  <seriesInfo name='DOI' value='10.17487/RFC3580'/>
</reference>

<reference anchor='RFC3748' target='https://www.rfc-editor.org/info/rfc3748'>
  <front>
    <title>Extensible Authentication Protocol (EAP)</title>
    <author fullname='B. Aboba' initials='B.' surname='Aboba'/>
    <author fullname='L. Blunk' initials='L.' surname='Blunk'/>
    <author fullname='J. Vollbrecht' initials='J.' surname='Vollbrecht'/>
    <author fullname='J. Carlson' initials='J.' surname='Carlson'/>
    <author fullname='H. Levkowetz' initials='H.' role='editor' surname='Levkowetz'/>
    <date month='June' year='2004'/>
    <abstract>
      <t>This document defines the Extensible Authentication Protocol (EAP), an authentication framework which supports multiple authentication methods. EAP typically runs directly over data link layers such as Point-to-Point Protocol (PPP) or IEEE 802, without requiring IP. EAP provides its own support for duplicate elimination and retransmission, but is reliant on lower layer ordering guarantees. Fragmentation is not supported within EAP itself; however, individual EAP methods may support this. This document obsoletes RFC 2284. A summary of the changes between this document and RFC 2284 is available in Appendix A. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='3748'/>
  <seriesInfo name='DOI' value='10.17487/RFC3748'/>
</reference>

<reference anchor='RFC4035' target='https://www.rfc-editor.org/info/rfc4035'>
  <front>
    <title>Protocol Modifications for the DNS Security Extensions</title>
    <author fullname='R. Arends' initials='R.' surname='Arends'/>
    <author fullname='R. Austein' initials='R.' surname='Austein'/>
    <author fullname='M. Larson' initials='M.' surname='Larson'/>
    <author fullname='D. Massey' initials='D.' surname='Massey'/>
    <author fullname='S. Rose' initials='S.' surname='Rose'/>
    <date month='March' year='2005'/>
    <abstract>
      <t>This document is part of a family of documents that describe the DNS Security Extensions (DNSSEC). The DNS Security Extensions are a collection of new resource records and protocol modifications that add data origin authentication and data integrity to the DNS. This document describes the DNSSEC protocol modifications. This document defines the concept of a signed zone, along with the requirements for serving and resolving by using DNSSEC. These techniques allow a security-aware resolver to authenticate both DNS resource records and authoritative DNS error indications.</t>
      <t>This document obsoletes RFC 2535 and incorporates changes from all updates to RFC 2535. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='4035'/>
  <seriesInfo name='DOI' value='10.17487/RFC4035'/>
</reference>

<reference anchor='RFC4187' target='https://www.rfc-editor.org/info/rfc4187'>
  <front>
    <title>Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA)</title>
    <author fullname='J. Arkko' initials='J.' surname='Arkko'/>
    <author fullname='H. Haverinen' initials='H.' surname='Haverinen'/>
    <date month='January' year='2006'/>
    <abstract>
      <t>This document specifies an Extensible Authentication Protocol (EAP) mechanism for authentication and session key distribution that uses the Authentication and Key Agreement (AKA) mechanism. AKA is used in the 3rd generation mobile networks Universal Mobile Telecommunications System (UMTS) and CDMA2000. AKA is based on symmetric keys, and typically runs in a Subscriber Identity Module, which is a UMTS Subscriber Identity Module, USIM, or a (Removable) User Identity Module, (R)UIM, similar to a smart card.</t>
      <t>EAP-AKA includes optional identity privacy support, optional result indications, and an optional fast re-authentication procedure. This memo provides information for the Internet community.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='4187'/>
  <seriesInfo name='DOI' value='10.17487/RFC4187'/>
</reference>

<reference anchor='RFC4372' target='https://www.rfc-editor.org/info/rfc4372'>
  <front>
    <title>Chargeable User Identity</title>
    <author fullname='F. Adrangi' initials='F.' surname='Adrangi'/>
    <author fullname='A. Lior' initials='A.' surname='Lior'/>
    <author fullname='J. Korhonen' initials='J.' surname='Korhonen'/>
    <author fullname='J. Loughney' initials='J.' surname='Loughney'/>
    <date month='January' year='2006'/>
    <abstract>
      <t>This document describes a new Remote Authentication Dial-In User Service (RADIUS) attribute, Chargeable-User-Identity. This attribute can be used by a home network to identify a user for the purpose of roaming transactions that occur outside of the home network. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='4372'/>
  <seriesInfo name='DOI' value='10.17487/RFC4372'/>
</reference>

<reference anchor='RFC5448' target='https://www.rfc-editor.org/info/rfc5448'>
  <front>
    <title>Improved Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA')</title>
    <author fullname='J. Arkko' initials='J.' surname='Arkko'/>
    <author fullname='V. Lehtovirta' initials='V.' surname='Lehtovirta'/>
    <author fullname='P. Eronen' initials='P.' surname='Eronen'/>
    <date month='May' year='2009'/>
    <abstract>
      <t>This specification defines a new EAP method, EAP-AKA', which is a small revision of the EAP-AKA (Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement) method. The change is a new key derivation function that binds the keys derived within the method to the name of the access network. The new key derivation mechanism has been defined in the 3rd Generation Partnership Project (3GPP). This specification allows its use in EAP in an interoperable manner. In addition, EAP-AKA' employs SHA-256 instead of SHA-1.</t>
      <t>This specification also updates RFC 4187, EAP-AKA, to prevent bidding down attacks from EAP-AKA'. This memo provides information for the Internet community.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='5448'/>
  <seriesInfo name='DOI' value='10.17487/RFC5448'/>
</reference>

<reference anchor='RFC5280' target='https://www.rfc-editor.org/info/rfc5280'>
  <front>
    <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
    <author fullname='D. Cooper' initials='D.' surname='Cooper'/>
    <author fullname='S. Santesson' initials='S.' surname='Santesson'/>
    <author fullname='S. Farrell' initials='S.' surname='Farrell'/>
    <author fullname='S. Boeyen' initials='S.' surname='Boeyen'/>
    <author fullname='R. Housley' initials='R.' surname='Housley'/>
    <author fullname='W. Polk' initials='W.' surname='Polk'/>
    <date month='May' year='2008'/>
    <abstract>
      <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='5280'/>
  <seriesInfo name='DOI' value='10.17487/RFC5280'/>
</reference>

<reference anchor='RFC5580' target='https://www.rfc-editor.org/info/rfc5580'>
  <front>
    <title>Carrying Location Objects in RADIUS and Diameter</title>
    <author fullname='H. Tschofenig' initials='H.' role='editor' surname='Tschofenig'/>
    <author fullname='F. Adrangi' initials='F.' surname='Adrangi'/>
    <author fullname='M. Jones' initials='M.' surname='Jones'/>
    <author fullname='A. Lior' initials='A.' surname='Lior'/>
    <author fullname='B. Aboba' initials='B.' surname='Aboba'/>
    <date month='August' year='2009'/>
    <abstract>
      <t>This document describes procedures for conveying access-network ownership and location information based on civic and geospatial location formats in Remote Authentication Dial-In User Service (RADIUS) and Diameter.</t>
      <t>The distribution of location information is a privacy-sensitive task. Dealing with mechanisms to preserve the user's privacy is important and is addressed in this document. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='5580'/>
  <seriesInfo name='DOI' value='10.17487/RFC5580'/>
</reference>

<reference anchor='RFC6071' target='https://www.rfc-editor.org/info/rfc6071'>
  <front>
    <title>IP Security (IPsec) and Internet Key Exchange (IKE) Document Roadmap</title>
    <author fullname='S. Frankel' initials='S.' surname='Frankel'/>
    <author fullname='S. Krishnan' initials='S.' surname='Krishnan'/>
    <date month='February' year='2011'/>
    <abstract>
      <t>Over the past few years, the number of RFCs that define and use IPsec and Internet Key Exchange (IKE) has greatly proliferated. This is complicated by the fact that these RFCs originate from numerous IETF working groups: the original IPsec WG, its various spin-offs, and other WGs that use IPsec and/or IKE to protect their protocols' traffic.</t>
      <t>This document is a snapshot of IPsec- and IKE-related RFCs. It includes a brief description of each RFC, along with background information explaining the motivation and context of IPsec's outgrowths and extensions. It obsoletes RFC 2411, the previous "IP Security Document Roadmap."</t>
      <t>The obsoleted IPsec roadmap (RFC 2411) briefly described the interrelationship of the various classes of base IPsec documents. The major focus of RFC 2411 was to specify the recommended contents of documents specifying additional encryption and authentication algorithms. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='6071'/>
  <seriesInfo name='DOI' value='10.17487/RFC6071'/>
</reference>

<reference anchor='RFC6614' target='https://www.rfc-editor.org/info/rfc6614'>
  <front>
    <title>Transport Layer Security (TLS) Encryption for RADIUS</title>
    <author fullname='S. Winter' initials='S.' surname='Winter'/>
    <author fullname='M. McCauley' initials='M.' surname='McCauley'/>
    <author fullname='S. Venaas' initials='S.' surname='Venaas'/>
    <author fullname='K. Wierenga' initials='K.' surname='Wierenga'/>
    <date month='May' year='2012'/>
    <abstract>
      <t>This document specifies a transport profile for RADIUS using Transport Layer Security (TLS) over TCP as the transport protocol. This enables dynamic trust relationships between RADIUS servers. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='6614'/>
  <seriesInfo name='DOI' value='10.17487/RFC6614'/>
</reference>

<reference anchor='RFC7268' target='https://www.rfc-editor.org/info/rfc7268'>
  <front>
    <title>RADIUS Attributes for IEEE 802 Networks</title>
    <author fullname='B. Aboba' initials='B.' surname='Aboba'/>
    <author fullname='J. Malinen' initials='J.' surname='Malinen'/>
    <author fullname='P. Congdon' initials='P.' surname='Congdon'/>
    <author fullname='J. Salowey' initials='J.' surname='Salowey'/>
    <author fullname='M. Jones' initials='M.' surname='Jones'/>
    <date month='July' year='2014'/>
    <abstract>
      <t>RFC 3580 provides guidelines for the use of the Remote Authentication Dial-In User Service (RADIUS) within IEEE 802 local area networks (LANs). This document defines additional attributes for use within IEEE 802 networks and clarifies the usage of the EAP-Key-Name Attribute and the Called-Station-Id Attribute. This document updates RFCs 3580 and 4072.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='7268'/>
  <seriesInfo name='DOI' value='10.17487/RFC7268'/>
</reference>

<reference anchor='RFC7585' target='https://www.rfc-editor.org/info/rfc7585'>
  <front>
    <title>Dynamic Peer Discovery for RADIUS/TLS and RADIUS/DTLS Based on the Network Access Identifier (NAI)</title>
    <author fullname='S. Winter' initials='S.' surname='Winter'/>
    <author fullname='M. McCauley' initials='M.' surname='McCauley'/>
    <date month='October' year='2015'/>
    <abstract>
      <t>This document specifies a means to find authoritative RADIUS servers for a given realm. It is used in conjunction with either RADIUS over Transport Layer Security (RADIUS/TLS) or RADIUS over Datagram Transport Layer Security (RADIUS/DTLS).</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='7585'/>
  <seriesInfo name='DOI' value='10.17487/RFC7585'/>
</reference>

<reference anchor='RFC7593' target='https://www.rfc-editor.org/info/rfc7593'>
  <front>
    <title>The eduroam Architecture for Network Roaming</title>
    <author fullname='K. Wierenga' initials='K.' surname='Wierenga'/>
    <author fullname='S. Winter' initials='S.' surname='Winter'/>
    <author fullname='T. Wolniewicz' initials='T.' surname='Wolniewicz'/>
    <date month='September' year='2015'/>
    <abstract>
      <t>This document describes the architecture of the eduroam service for federated (wireless) network access in academia. The combination of IEEE 802.1X, the Extensible Authentication Protocol (EAP), and RADIUS that is used in eduroam provides a secure, scalable, and deployable service for roaming network access. The successful deployment of eduroam over the last decade in the educational sector may serve as an example for other sectors, hence this document. In particular, the initial architectural choices and selection of standards are described, along with the changes that were prompted by operational experience.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='7593'/>
  <seriesInfo name='DOI' value='10.17487/RFC7593'/>
</reference>

<reference anchor='RFC8952' target='https://www.rfc-editor.org/info/rfc8952'>
  <front>
    <title>Captive Portal Architecture</title>
    <author fullname='K. Larose' initials='K.' surname='Larose'/>
    <author fullname='D. Dolson' initials='D.' surname='Dolson'/>
    <author fullname='H. Liu' initials='H.' surname='Liu'/>
    <date month='November' year='2020'/>
    <abstract>
      <t>This document describes a captive portal architecture. Network provisioning protocols such as DHCP or Router Advertisements (RAs), an optional signaling protocol, and an HTTP API are used to provide the solution.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8952'/>
  <seriesInfo name='DOI' value='10.17487/RFC8952'/>
</reference>


<reference anchor="TS23003" target="https://www.3gpp.org/ftp/Specs/archive/23_series/23.003/23003-i10.zip">
  <front>
    <title>3GPP 23.003: Numbering, addressing and identification v18.1.0</title>
    <author initials="" surname="3GPP">
      <organization></organization>
    </author>
    <date year="2023" month="March" day="28"/>
  </front>
</reference>
<reference anchor="GSMAIR67" target="https://www.gsma.com/newsroom/wp-content/uploads//IR.67-v21.0.pdf">
  <front>
    <title>GSMA IR.67: DNS Guidelines for Service Providers and GRX and IPX Providers</title>
    <author initials="" surname="GSMA">
      <organization></organization>
    </author>
    <date year="2022" month="November" day="25"/>
  </front>
</reference>
<reference anchor="PASSPOINT" target="https://www.wi-fi.org/discover-wi-fi/passpoint">
  <front>
    <title>Wi-Fi Alliance Passpoint</title>
    <author initials="" surname="Wi-Fi Alliance">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="ISO3166" target="https://www.iso.org/standard/72483.html">
  <front>
    <title>Codes for the representation of names of countries and their subdivisions</title>
    <author initials="" surname="ISO 3166-2:2020">
      <organization></organization>
    </author>
    <date year="2020" month="August"/>
  </front>
</reference>
<reference anchor="ISO29115" >
  <front>
    <title>Information technology - Security techniques: Entity authentication assurance framework</title>
    <author initials="" surname="ISO/IEC 29115">
      <organization></organization>
    </author>
    <date year="2013" month="April"/>
  </front>
</reference>
<reference anchor="ORPRIVACY" target="https://wballiance.com/openroaming/privacy-policy/">
  <front>
    <title>OpenRoaming End-User Privacy Policy</title>
    <author initials="" surname="Wireless Broadband Alliance">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="ORTERMS" target="https://wballiance.com/openroaming/toc/">
  <front>
    <title>OpenRoaming End User Terms and Conditions</title>
    <author initials="" surname="Wireless Broadband Alliance">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="WBAVSA" target="https://github.com/wireless-broadband-alliance/RADIUS-VSA">
  <front>
    <title>Vendor Specific Attributes</title>
    <author initials="" surname="Wireless Broadband Alliance">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="IEEE80211" target="https://standards.ieee.org/ieee/802.11/5536/">
  <front>
    <title>Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications</title>
    <author initials="" surname="IEEE">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>


    </references>


<section anchor="sig"><name>Example OpenRoaming Signalling Flow</name>

<t>An example signalling flow for OpenRoaming is illustrated in <xref target="figsigflow"/>.</t>

<t><list style="numbers">
  <t>In step 1, the WLAN is configured with Passpoint information and includes
configured RCOIs in its beacon.</t>
  <t>The beacon can only contain 3 RCOIs and so if none of the RCOIs match a
profile provisioned in the device, the device queries for the list of RCOIs supported.</t>
  <t>If the list includes an RCOI that matches a configured profile in the device, then device
sends an EAPOL Start message to the authenticator.</t>
  <t>The authenticator in the AP/WLC requests the EAP-Identity of the device.</t>
  <t>The device responds with its EAP-Identity, which is user@realm Network Access Identifier (NAI)</t>
  <t>The NAS in the WLC/AP embeds the NAI in the user-name attribute in a RADIUS Access-Request message and forwards to the configured RadSec client.</t>
  <t>The RadSec client recovers the realm from the NAI/user-name attribute and performs a DNS-based dynamic peer discovery.</t>
  <t>The RadSec client established an mTLS authenticated TLS session with the discovered peer using certificates issued by the WBA PKI.</t>
  <t>Once TLS is established, the RadSec client forwards the Access-Request to the RadSec server.</t>
  <t>If the EAP Server is not co-located with the RadSec server, the RadSec server proxies the Access-Request to the EAP-Server.</t>
  <t>The EAP-Server continues the EAP dialogue with the EAP Supplicant in the device using a Passpoint defined EAP method.</t>
  <t>Following successful authentication, the EAP-Server responds with an Access-Accept packet containing the EAP-SUCCESS message and the keying material generated through the EAP method to secure the Wi-Fi session.</t>
  <t>The Access-Accept packet is forwarded back to the RadSec client.</t>
  <t>The RadSec client forwards the Access-Accept packet to the NAS in the AP/WLC.</t>
  <t>The AP/WLC recovers the keying material from the Access-Accept packet and forwards the EAP-SUCCESS message to the device.</t>
  <t>The keying material is used to secure the Wi-Fi interface between the device and AP/WLC.</t>
  <t>The AP/WLC generates a RADIUS Accounting-Request message with Acct-Status-Type Start which is forwarded to the RadSec client.</t>
  <t>The RadSec client forwards the Accounting-Request message over the TLS tunnel to the RadSec server.</t>
  <t>The RadSec server can forward the Accounting-Request message to the EAP-Server.</t>
</list></t>

<ul empty="true"><li>
  <t>20-22. After the Wi-Fi session terminates, an Accounting-Request message with Acct-Status-Type Stop is proxied towards the RadSec Server.</t>
</li></ul>

<figure title="Example OpenRoaming Signalling Flow" anchor="figsigflow"><artwork><![CDATA[
+------+    +------+    +------+    +------+    +------+    +------+
|      |    |Wi-Fi |    |RadSec|    |      |    |RadSec|    |  EAP |
|Device|    |AP/WLC|    |Client|    | DNS  |    |Server|    |Server|
+------+    +------+    +------+    +------+    +------+    +------+
   | 1) Beacon |           |           |           |           |
   |<----------|           |           |           |           |
   | 2) ANQP   |           |           |           |           |   
   | Query     |           |           |           |           |   
   |<--------->|           |           |           |           |   
   | 3) EAPOL  |           |           |           |           |
   | Start     |           |           |           |           |
   |---------->|           |           |           |           |
   | 4) EAP-ID |           |           |           |           |
   | Request   |           |           |           |           |
   |<----------|           |           |           |           |
   | 5) EAP-ID | 6) RADIUS |           |           |           |
   | Response  | Access-   | 7) DNS    |           |           |
   |---------->| Request   | Query     |           |           |
   |           |---------->| NAPTR,SRV,|           |           |
   |           |           | A Records |           |           |
   |           |           |<--------->|           |           |
   |           |           | 8) mTLS   |           |           |
   |           |           |<--------------------->|           |
   |           |           | 9) RadSec |           |           |
   |           |           | Access-Request        |           |
   |           |           |---------------------->|           |
   |           |           |           |           | 10) RADIUS|
   |           |           |           |           | Access-   |
   |           |           |           |           | Request   |
   |           |           |           |           |---------->|
   |           |         11) EAP Dialogue          |           |
   |<--------------------------------------------------------->|
   |           |           |           |           | 12) RADIUS|
   |           |           |           |           | Access-   |
   |           | 14) RADIUS|           |           | Accept    |
   |           | Access-   |           |           | (EAP-     |
   |           | Accept    | 13) RadSec Access-    | SUCCESS)  |   
   |           | (EAP-     | Accept (EAP-SUCCESS)  |<----------|
   | 15) EAP-  | SUCCESS)  |<----------------------|           |
   | SUCCESS   |<----------|           |           |           |
   |<----------|           |           |           |           |
 +---------------+         |           |           |           |
 | 16) Secured   |         |           |           |           |
 |  OpenRoaming  17) RADIUS|           |           |           |
 |    Service    Accounting|           |           |           |
 |               Request   |           |           | 19) RADIUS|
 |               (Start)   | 18) RadSec Accounting | Accounting|
 |               |-------->| -Request (Start)      | Request   |
 |               |         |---------------------->| (Start)   |
 |               |         |           |           |---------->|
 +---------------+         |           |           |           |
   |           | 20) RADIUS|           |           |           |
   |           | Accounting|           |           |           |
   |           | Request   |           |           | 22) RADIUS|
   |           | (Stop)    | 21) RadSec Accounting | Accounting|
   |           |---------->| -Request (Stop)       | Request   |
   |           |           |---------------------->| (Stop)    |
   |           |           |           |           |---------->|   
+------+    +------+    +------+    +------+    +------+    +------+
|Device|    |Wi-Fi |    |RadSec|    | DNS  |    |RadSec|    |  EAP |
|      |    |AP/WLC|    |Client|    |      |    |Server|    |Server|
+------+    +------+    +------+    +------+    +------+    +------+
]]></artwork></figure>

</section>
<section anchor="rcoi"><name>Example OpenRoaming RCOI Usage</name>

<t>This Annex illustrates the use of OpenRoaming RCOIs to enforce different policies
in the OpenRoaming federation, ensuring that when there is a policy mismatch
between the device and access network, that the device will avoid triggering
an authentication exchange that would subsequently have to be rejected because
of policy enforcement decisions.</t>

<section anchor="openroaming-rcoi-based-policy-for-supporting-qos-tiers"><name>OpenRoaming RCOI based policy for supporting QoS tiers</name>

<t><xref target="figqosrcoi"/> illustrates the use of OpenRoaming RCOIs for
supporting the standard (bronze) and silver QoS tiers across the federation.
The figure shows two different devices:</t>

<t><list style="symbols">
  <t>Device 1 has been provisioned by its IDP to require the basic bronze QoS policy.</t>
  <t>Device 2 has been provisioned by its IDP to require the silver tier of QoS handling.</t>
</list></t>

<t>The figure also shows illustrates the RCOI configuration of two ANP Access Networks:</t>

<t><list style="symbols">
  <t>ANP#1 is configured to support the silver tier of QoS handling corresponding to the silver RCOI. Because the network requirements associated with the silver tier are a superset of the bronze QoS tier, the ANP also configures the bronze RCOI on its Wi-Fi access network.</t>
  <t>ANP#2 is only configured to support the standard (bronze) QoS tier and as such only configures the RCOI corresponding to the bronze QoS tier on its Wi-Fi access network.</t>
</list></t>

<t>The figure shows how normal Passpoint RCOI matching rules can be used to ensure that devices only trigger authentication with ANP access networks which support the required QoS tier according to the device's policy.</t>

<figure title="Use of OpenRoaming RCOIs to realize QoS policies" anchor="figqosrcoi"><artwork><![CDATA[

+----------------------+      +----------------------+  
|OpenRoaming Device #1 |      |OpenRoaming Device #2 |  
| Bronze Service Level |      | Silver Service Level |   
| +------------------+ |      | +------------------+ |      
| |Passpoint Profile | |      | |Passpoint Profile | |     
| |   Bronze RCOI    | |      | |   Silver RCOI    | |              
| +------------------+ |      | +------------------+ |           
|     /|\        /|\   |      |           /|\        |      
+------|----------|----+      +------------|---------+         
       |          |                        |                   
       |          |                        |                    
       |          |                        | RCOI                
       |          |                        | Match                 
       |     +-----------------------------+                 
  RCOI |     |    |                                          
 Match |     |    |                                              
       |     |    |                                        
       |     |    +------------------------+                  
       |     |                             | RCOI           
       |     |                             | Match         
       |     |                             |              
      \|/   \|/                           \|/           
+----------------------+       +----------------------+   
|  OpenRoaming ANP#1   |       |  OpenRoaming ANP#2   |  
|      Silver QoS      |       |      Bronze QoS      |     
|   +--------------+   |       |   +--------------+   |   
|   |     WLAN     |   |       |   |     WLAN     |   |   
|   | Bronze RCOI  |   |       |   | Bronze RCOI  |   |    
|   | Silver RCOI  |   |       |   |              |   |   
|   +--------------+   |       |   +--------------+   |  
+----------------------+       +----------------------+

]]></artwork></figure>

</section>
<section anchor="openroaming-rcoi-based-policy-for-supporting-identity-type-policies"><name>OpenRoaming RCOI based policy for supporting identity type policies</name>

<t><xref target="figidtypercoi"/> illustrates the use of OpenRoaming RCOIs for supporting different identity type policies across the federation. The figure shows two different devices:</t>

<t><list style="symbols">
  <t>Device#1 has been provisioned by an IDP corresponding to a service provider. It provisions the device's Passpoint profile with the RCOI policy identifying the service provider ID-type policy as well as the "any ID-type"  RCOI policy.</t>
  <t>Device 2 has been provisioned by a IDP corresponding to a hospitality provider. It provisions the device's Passpoint profile with the RCOI policy identifying the hospitality ID-type policy as well as the "any ID-type" RCOI policy.</t>
</list></t>

<t>The figure also shows the RCOI configuration of three different ANP Access Networks:</t>

<t><list style="symbols">
  <t>ANP#1 only supports access using service provider type-IDs and so has configured the service provider ID-type policy RCOI.</t>
  <t>ANP#2 supports access from all identity types and so has configured the any ID-type policy RCOI.</t>
  <t>ANP#3 only supports access using hospitality type IDs and so has configured the hospitality ID-type policy RCOI.</t>
</list></t>

<t>The figure shows how normal Passpoint RCOI matching rules can be used to ensure that devices only trigger authentication with ANP access networks which support the required identity types according to the ANP's policy.</t>

<figure title="Use of OpenRoaming RCOIs to realize ID-Type policies" anchor="figidtypercoi"><artwork><![CDATA[


+----------------------------+   +-----------------------------+                                                 
|   OpenRoaming Device #1    |   |    OpenRoaming Device #2    |                                                 
|  IDP is Service Provider   |   | IDP is Hospitality Provider |                                                 
|+------------++------------+|   |+------------++------------+ |                                                 
|| Passpoint  || Passpoint  ||   || Passpoint  || Passpoint  | |                                                 
||  Profile   ||  Profile   ||   ||  Profile   ||  Profile   | |                                                 
||     SP     ||Any ID-Type ||   ||Any ID-Type || Hospitality| |                                                 
||ID-Type RCOI||    RCOI    ||   ||   RCOI     ||ID-Type RCOI| |                                                 
|+------------++------------+|   |+------------++------------+ |                                                 
|      /|\          /|\      |   |       /|\        /|\        |                                                 
+-------|------------|-------+   +-------------------|---------+                                                 
        |            |                    |          |                                                           
        |            |                    |          |                                                           
        |            |                    |          |                                                           
        |            |                    |          |                                                           
        | RCOI       | RCOI               | RCOI     | RCOI                                                      
        | Match      | Match              | Match    | Match                                                     
        |            |                    |          |                                                           
        |            +-----+        +-----+          |                                                           
        |                  |        |                |                                                           
        |                  |        |                |                                                           
        |                  |        |                |                                                           
        |                  |        |                |                                                           
        |                  |        |                |                                                           
       \|/                \|/      \|/              \|/                                                          
+------------------+  +------------------+  +------------------+                                                 
|OpenRoaming ANP#1 |  |OpenRoaming ANP#2 |  |OpenRoaming ANP#3 |                                                 
|  Only accepts    |  |    Accepts all   |  |   Only accepts   |                                                 
| Service Provider |  |     ID-Types     |  |    Hospitality   |                                                 
|     ID-Types     |  |                  |  |     ID-Types     |                                                 
| +--------------+ |  | +--------------+ |  | +--------------+ |                                                 
| |     WLAN     | |  | |     WLAN     | |  | |     WLAN     | |                                                 
| |  SP ID-Type  | |  | | Any ID-Type  | |  | |  Hospitality | |                                                 
| |     RCOI     | |  | |     RCOI     | |  | | ID-Type RCOI | |                                                 
| +--------------+ |  | +--------------+ |  | +--------------+ |                                                 
+------------------+  +------------------+  +------------------+    


]]></artwork></figure>

</section>
<section anchor="openroaming-rcoi-based-policy-for-supporting-different-identity-proofing-policies"><name>OpenRoaming RCOI based policy for supporting different identity proofing policies</name>

<t><xref target="figidproofrcoi"/> illustrates the use of OpenRoaming RCOIs for supporting different
identity proofing policies across the federation. The figure shows two different devices:</t>

<t><list style="symbols">
  <t>Device 1 has been provisioned by an IDP that uses enhanced identity proofing controls that meet the enhanced OpenRoaming requirements, equivalent to LoA 3 in <xref target="ISO29115"/>. Because the enhanced identity proofing requirements are a superset of the requirements of the baseline identity proofing policy, the IDP also configures the use of the RCOI with baseline identity proofing.</t>
  <t>Device 2 has been provisioned by an IDP that uses identity proofing with controls that meet the baseline OpenRoaming requirements.</t>
</list></t>

<t>The figure also shows the RCOI configuration of two ANP Access Networks:</t>

<t><list style="symbols">
  <t>ANP#1 is operated in a geography where regulations require support of enhanced identity proofing.</t>
  <t>ANP#2 is operated in a geography where regulations permit support of authentications with identities managed using the OpenRoaming baseline identity proofing requirements.</t>
</list></t>

<t>The figure shows how normal Passpoint RCOI matching rules can be used to ensure that devices only trigger authentication with ANP access networks which support the required identity proofing according to the ANP's policy.</t>

<figure title="Use of OpenRoaming RCOIs to realize identity proofing policies" anchor="figidproofrcoi"><artwork><![CDATA[

+----------------------------+   +-----------------------------+                                                 
|    OpenRoaming Device #1   |   |    OpenRoaming Device #2    |                                                 
|     IDP uses enhanced      |   |     IDP uses baseline       |                                                 
|     identity proofing      |   |     identity proofing       |                                                 
|+------------++------------+|   |       +------------+        |                                                 
|| Passpoint  ||  Passpoint ||   |       |  Passpoint |        |                                                 
||  Profile   ||   Profile  ||   |       |   Profile  |        |                                                 
||Enhanced LoA||Baseline LoA||   |       |Baseline LoA|        |                                                 
||    RCOI    ||    RCOI    ||   |       |    RCOI    |        |                                                 
|+------------++------------+|   |       +------------+        |                                                 
|      /|\          /|\      |   |             /|\             |                                                 
+-------|------------|-------+   +--------------|--------------+                                                 
        |            |                          |                                                                
        |            |                          |                                                                
        |            |                          |                                                                
        | RCOI       | RCOI                     | RCOI                                                           
        | Match      | Match                    | Match                                                          
        |            |                          |                                                                
        |            |                          |                                                                
        |            +--------------------+     +-----+                                                          
        |                                 |           |                                                          
        |                                 |           |                                                          
        |                                 |           |                                                          
        |                                 |           |                                                          
        |                                 |           |                                                          
       \|/                               \|/         \|/                                                         
   +------------------------+       +------------------------+                                                   
   |   OpenRoaming ANP#1    |       |   OpenRoaming ANP#2    |                                                   
   | Operates in a country  |       | Operates in a country  |                                                   
   |  where the regulator   |       |  where the regulator   |                                                   
   |   requires enhanced    |       |   permits baseline     |                                                   
   |   identity proofing    |       |   identity proofing    |                                                   
   |    +--------------+    |       |    +--------------+    |                                                   
   |    |     WLAN     |    |       |    |     WLAN     |    |                                                   
   |    | Enhanced LoA |    |       |    | Baseline LoA |    |                                                   
   |    |     RCOI     |    |       |    |     RCOI     |    |                                                   
   |    +--------------+    |       |    +--------------+    |                                                   
   +------------------------+       +------------------------+                                                     


]]></artwork></figure>

</section>
</section>
<section anchor="legal"><name>OpenRoaming legal framework</name>

<section anchor="seamless-experience"><name>Seamless experience</name>

<t>In order for OpenRoaming to avoid the need for end-users to
be presented with and accept legal terms and conditions covering their
use of the Wi-Fi hotspot service, there needs to be a legal framework in place.</t>

</section>
<section anchor="openroaming-organization"><name>OpenRoaming Organization</name>

<t>The federation is based on a legal framework that comprises a set of policies,
templated agreements and immutable terms as agreed to by the WBA and its membership.
The framework defines a hierarchy of roles, responsibilities and relationships that
are designed to enable the federation to scale to millions of Wi-Fi access networks.</t>

<t><xref target="figorg"/> shows the
relationships between WBA, OpenRoaming Brokers, who are members of the WBA that
have agreed terms with WBA to perform the OpenRoaming broker role and the OpenRoaming providers.
OpenRoaming brokers agree terms with OpenRoaming Providers that can act as Access Network
Providers (ANPs) and/or Identity Providers (IDPs). OpenRoaming providers do not have
to be members of the WBA to provide OpenRoaming services. Finally, OpenRoaming IDPs
agree terms with OpenRoaming end-users who then benefit from seamless authentication onto
the Wi-Fi networks deployed by the different OpenRoaming ANPs.</t>

<figure title="Organization of the OpenRoaming Federation" anchor="figorg"><artwork><![CDATA[
                            +----------+                   
                            | Wireless |                      
                            | Broadband|                        
                            | Alliance |                         
                            +----------+                       
                              /|\  /|\                        
                               |    |                         
                          Agrees terms with                    
                               |    |                              
          +-----------+        |    |        +-----------+        
          |OpenRoaming|<-------+    +------->|OpenRoaming|       
          |Broker     |                      |Broker     |      
          +-----------+                      +-----------+       
             /|\  /|\                           /|\  /|\         
              |    |                             |    |        
         Agrees terms with                  Agrees terms with     
              |    |                             |    |           
        +-----+    +-----+                 +-----+    +-----+     
        |                |                 |                |    
       \|/              \|/               \|/              \|/     
+-----------+     +-----------+     +-----------+     +-----------+
|OpenRoaming|     |OpenRoaming|     |OpenRoaming|     |OpenRoaming|
|Access     |     |Identity   |     |Identity   |     |Access     |
|Network    |     |Provider   |     |Provider   |     |Network    |
|Provider   |     |           |     |           |     |Provider   |
+-----------+     +-----------+     +-----------+     +-----------+
                   /|\  /|\            /|\  /|\      
                    |    |              |    |       
               Agrees terms with   Agrees terms with
                    |    |              |    |       
      +-------------+    |              |    +-------------+       
      |                  |              |                  |       
     \|/                \|/            \|/                \|/      
+-----------+     +-----------+     +-----------+      +-----------+
|OpenRoaming|     |OpenRoaming|     |OpenRoaming|      |OpenRoaming|
|End-User   |     |End-User   |     |End-User   |      |End-User   |
+-----------+     +-----------+     +-----------+      +-----------+

]]></artwork></figure>

</section>
<section anchor="openroaming-legal-terms"><name>OpenRoaming legal terms</name>

<t>In OpenRoaming there is no direct agreement between individual ANPs and individual
IDPs or between end-users and ANPs. As a consequence, OpenRoaming brokers
agree to use certain federation-specific terms in their agreements with
OpenRoaming providers.</t>

<t>This arrangement ensures that all ANPs agree to abide by the OpenRoaming
privacy policy <xref target="ORPRIVACY"/> and all end-users agree to abide by the
OpenRoaming end-user Terms and Conditions <xref target="ORTERMS"/>.</t>

</section>
</section>
<section numbered="false" anchor="Changelog"><name>Changelog</name>
<t><list style="symbols">
  <t>01 - added details of WBA-Custom-SLA for OpenRoaming ANP networks that signal using
<xref target="RFC7268"/> that they operate on a vehicular platform. Added clarifications regarding use
of direct and indirect names in certificate validation.</t>
</list></t>

</section>
<section numbered="false" anchor="Acknowledgements"><name>Acknowledgements</name>

<t>The authors would like to thank all the members of the WBA's OpenRoaming Workgroup
who help define the OpenRoaming specifications.</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

