1 | 1. Summary |
---|
2 | |
---|
3 | Document: draft-ietf-httpbis-p7-auth-24 |
---|
4 | Document Shepherd: Mark Nottingham |
---|
5 | Responsible Area Director: Barry Leiba |
---|
6 | Publication Type: Proposed Standard |
---|
7 | |
---|
8 | The Hypertext Transfer Protocol (HTTP) is an application-level protocol for |
---|
9 | distributed, collaborative, hypermedia information systems. This document |
---|
10 | defines the HTTP Authentication framework. |
---|
11 | |
---|
12 | Note that this document is part of a set, which should be reviewed together: |
---|
13 | |
---|
14 | * draft-ietf-httpbis-p1-messaging |
---|
15 | * draft-ietf-httpbis-p2-semantics |
---|
16 | * draft-ietf-httpbis-p4-conditional |
---|
17 | * draft-ietf-httpbis-p5-range |
---|
18 | * draft-ietf-httpbis-p6-cache |
---|
19 | * draft-ietf-httpbis-p7-auth |
---|
20 | * draft-ietf-httpbis-method-registrations |
---|
21 | * draft-ietf-httpbis-authscheme-registrations |
---|
22 | |
---|
23 | 2. Review and Consensus |
---|
24 | |
---|
25 | As chartered, this work was very constrained; the WG sought only to clarify |
---|
26 | RFC2616, making significant technical changes only where there were |
---|
27 | considerably interoperability or security issues. |
---|
28 | |
---|
29 | While the bulk of the work was done by a core team of editors, it has been |
---|
30 | reviewed by a substantial number of implementers, and design issues enjoyed |
---|
31 | input from many of them. |
---|
32 | |
---|
33 | It has been through two Working Group Last Calls, with multiple reviewers each |
---|
34 | time. We have also discussed this work with external groups (e.g., the W3C TAG). |
---|
35 | |
---|
36 | 3. Intellectual Property |
---|
37 | |
---|
38 | There are no IPR disclosures against this document (one was previously made, |
---|
39 | but "removed at the submitter's request"). The authors have confirmed that they |
---|
40 | have no direct, personal knowledge of IPR related to this document that has not |
---|
41 | been disclosed. |
---|
42 | |
---|
43 | 4. Other Points |
---|
44 | |
---|
45 | Downward references: None. |
---|
46 | |
---|
47 | New registries created: |
---|
48 | |
---|
49 | * The Authentication Scheme Registry policy is IETF Review. This policy was |
---|
50 | chosen to ensure adequate security review. |
---|
51 | |
---|
52 | Updated registries: None. |
---|