<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.21 (Ruby 2.6.10) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-tomas-openroaming-06" category="info" submissionType="independent" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="WBA OpenRoaming">WBA OpenRoaming Wireless Federation</title>

    <author initials="B." surname="Tomas" fullname="Bruno Tomas">
      <organization>Wireless Broadband Alliance, Inc.</organization>
      <address>
        <postal>
          <street>5000 Executive Parkway, Suite 302</street>
          <city>San Ramon</city>
          <code>94583</code>
          <country>US</country>
        </postal>
        <email>bruno@wballiance.com</email>
      </address>
    </author>
    <author initials="M." surname="Grayson" fullname="Mark Grayson">
      <organization>Cisco Systems</organization>
      <address>
        <postal>
          <street>10 New Square Park</street>
          <city>Feltham</city>
          <code>TW14 8HA</code>
          <country>UK</country>
        </postal>
        <email>mgrayson@cisco.com</email>
      </address>
    </author>
    <author initials="N." surname="Canpolat" fullname="Necati Canpolat">
      <organization>Intel Corporation</organization>
      <address>
        <postal>
          <street>2111 NE. 25th Ave</street>
          <city>Hillsboro</city>
          <code>97124</code>
          <country>US</country>
        </postal>
        <email>necati.canpolat@intel.com</email>
      </address>
    </author>
    <author initials="B. A." surname="Cockrell" fullname="Betty A. Cockrell">
      <organization>SingleDigits</organization>
      <address>
        <postal>
          <city>San Antonio</city>
          <country>US</country>
        </postal>
        <email>bcockrell@singledigits.com</email>
      </address>
    </author>
    <author initials="S." surname="Gundavelli" fullname="Sri Gundavelli">
      <organization>Cisco Systems</organization>
      <address>
        <postal>
          <street>170 West Tasman Drive</street>
          <city>San Jose</city>
          <code>95134</code>
          <country>US</country>
        </postal>
        <email>sgundave@cisco.com</email>
      </address>
    </author>

    <date year="2025" month="September" day="16"/>

    <area>general</area>
    <workgroup>Independent Submission</workgroup>
    <keyword>Internet-Draft</keyword> <keyword>OpenRoaming</keyword> <keyword>Federation</keyword>

    <abstract>


<?line 173?>

<t>This document describes the Wireless Broadband Alliance's
OpenRoaming system. The OpenRoaming architectures enables a seamless
onboarding experience for devices connecting to access networks
that are part of the federation of access networks and identity providers.
The primary objective of this document is to describe the protocols that
form the foundation for this architecture, enabling providers to correctly configure
their equipment to support interoperable OpenRoaming signalling exchanges.
In addition, the topic of OpenRoaming has been raised in different IETF working
groups, and therefore a secondary objective is to assist those discussions by
describing the federation organization and framework.</t>



    </abstract>



  </front>

  <middle>


<?line 186?>

<section anchor="intro"><name>Introduction</name>

<t>WBA OpenRoaming is a roaming federation service of Access Network Providers (ANPs)
and Identity Providers (IDPs), enabling an automatic and secure
Wi-Fi experience globally. WBA OpenRoaming creates the framework to seamlessly
connect billions of users and things to millions of Wi-Fi networks.</t>

<figure title="OpenRoaming Federation" anchor="figfedarch"><artwork><![CDATA[
ANP-1 --\                    _----_                     /-- IDP-1
         \     Access      _( Open )_      Identity    /
ANP-2  ---<==  Network ---(  Roaming )---  Providers <==-- IDP-2
         /     Providers   (_      _)                  \
ANP-3 --/                    '----'                     \-- IDP-3

]]></artwork></figure>

<t>WBA OpenRoaming recognizes the benefits that the likes of eduroam <xref target="RFC7593"/> provide to the
education and research community. WBA OpenRoaming defines a global federation that is targeted at serving
all communities, while supporting both settlement-free use cases where "free" Wi-Fi is being offered to
end-users in order to support some
alternative value proposition, as well as traditional settled "paid" for Wi-Fi offered by some
cellular providers.</t>

<t>OpenRoaming is designed to deliver end-to-end security between a Network Access Server deployed by an
OpenRoaming Access Network Provider and an EAP Server <xref target="RFC3748"/> deployed by an OpenRoaming
Identity Provider. The security of the solution is based on mTLS using certificates
issued under Wireless Broadband Alliance's Public Key Infrastructure <xref target="RFC5280"/>.</t>

<section anchor="Requirements"><name>Requirements Language</name>
<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL",
"SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT
RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be
interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/>
when, and only when, they appear in all capitals, as shown here.</t>

</section>
<section anchor="Terminology"><name>Terminology</name>

<t>Access Network Query Protocol (ANQP):</t>

<ul empty="true"><li>
  <t>An IEEE 802.11 defined protocol that allows for access network information retrieval
in a pre-association state. ANQP has been further extended by the
Wi-Fi Alliance (WFA) as part of its Passpoint program <xref target="PASSPOINT"/>.</t>
</li></ul>

<t>Access Network Provider (ANP):</t>

<ul empty="true"><li>
  <t>An entity that has joined the federation and serves OpenRoaming end-users by configuring the OpenRoaming RCOI(s) on its Wi-Fi equipment.</t>
</li></ul>

<t>Broker:</t>

<ul empty="true"><li>
  <t>An entity that has joined the federation and performs certain specific roles to help scale the operation of the federation. The separate roles of a broker can include:</t>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t><list style="numbers" type="1">
      <t>Assigning WBA identities to ANPs and IDPs.</t>
      <t>Operating an issuing intermediate certificate authority under the WBA's PKI and issuing certificates to ANPs and IDPs.</t>
      <t>Operating a registration authority to a third party operated issuing intermediate certificate authority under WBA's PKI to enable certificates to be issued to ANPs and IDPs.</t>
    </list></t>
  </li></ul>
</li></ul>

<t>Closed Access Group (CAG):</t>

<ul empty="true"><li>
  <t>The definition of the 12 most significant bits of an OUI-36 RCOI to indicate OpenRoaming policy controls that
can be enforced by ANPs and IDPs.</t>
</li></ul>

<t>Identity Provider (IDP):</t>

<ul empty="true"><li>
  <t>An entity that has joined the federation and
includes the OpenRoaming RCOI(s) in the Passpoint profile of its end-user devices and
authenticates end-user devices on OpenRoaming ANP networks.</t>
</li></ul>

<t>Level of Assurance (LoA):</t>

<ul empty="true"><li>
  <t>An ISO/IEC 29115 term that is used to define equivalent levels for handling of end-user enrollment, credential management
and authentication amongst different IDPs.</t>
</li></ul>

<t>OpenRoaming-Settled:</t>

<ul empty="true"><li>
  <t>The "base RCOI" of BA-A2-D0 that is used to indicate that the ANP expects to receive payment for
providing OpenRoaming service to end-users.</t>
</li></ul>

<t>OpenRoaming-Settlement-Free:</t>

<ul empty="true"><li>
  <t>The "base RCOI" of 5A-03-BA that is used to indicate that the ANP provides the OpenRoaming service to end-users at
no cost to the IDP.</t>
</li></ul>

<t>Passpoint Profile:</t>

<ul empty="true"><li>
  <t>Passpoint is a Wi-Fi Alliance (WFA) certification program that defines the use a Passpoint profile, that includes the user's credentials
and the access network identifiers, to enables Wi-Fi devices to automatically discover and authenticate to Wi-Fi hotspots
that provide Internet access <xref target="PASSPOINT"/>.</t>
</li></ul>

<t>PLMN Id:</t>

<ul empty="true"><li>
  <t>A unique identifier for a mobile network operator. The identifier consists of a MCC (Mobile Country Code) and a MNC (Mobile Network Code). ITU-T Recommendation <xref target="E212"/> defines both MCC and MNC. The ITU allocates MCC values to national regulators who are then responsible for allocating MNC values to individual mobile network operators.  <xref target="PASSPOINT"/> defines how the PLMN Id can be sent in ANQP messages.</t>
</li></ul>

<t>Roaming Consortium Identifier (RCOI):</t>

<ul empty="true"><li>
  <t>RCOI identifies the groups of identity providers that are supported by the network.
It is a 3-octet, or a 5-octet value carried in the 802.11 beacon information element (IE).
It is also sent in the ANQP messages. Based on the access technologies, the specific link-layer
protocols will be used for carrying the RCOI. RCOI is also part of the Passpoint profile.</t>
</li></ul>

<ul empty="true"><li>
  <t>NOTE: OpenRoaming only uses 5-octet RCOIs.</t>
</li></ul>

<t>Subscriber Identity Module (SIM):</t>

<ul empty="true"><li>
  <t>The SIM is traditionally a smart card distributed by a mobile operator.</t>
</li></ul>

<t>WBA Identity (WBAID):</t>

<ul empty="true"><li>
  <t>A hierarchical namespace that is used to uniquely identify every OpenRoaming entity.</t>
</li></ul>

<t>Wireless Roaming Intermediary eXchange:</t>

<ul empty="true"><li>
  <t>A framework, aimed at facilitating
  interconnectivity between operators and the Wi-Fi roaming hub services.</t>
</li></ul>

</section>
</section>
<section anchor="wireless-broadband-alliance"><name>Wireless Broadband Alliance</name>

<t>The Wireless Broadband Alliance (WBA) defines the Wireless
Roaming Intermediary eXchange (WRIX) framework, aimed at facilitating
interconnectivity between Wi-Fi operators and the Wi-Fi roaming hub services,
as well as the Carrier Wi-Fi Services program that provides guidelines to
improve customer experience on Carrier Wi-Fi networks. Both of these
programs leverage the Wi-Fi Alliance specified Passpoint functionality
<xref target="PASSPOINT"/> to enable automatic and secure connectivity to Wi-Fi networks, allowing devices
to be provisioned with network access credentials with minimal user interaction.</t>

<t>WBA programs have traditionally focussed on "offloading"
cell phone data from cellular networks onto Wi-Fi networks.
Deployments of such systems have seen uneven
adoption across geographies, with cellular operators frequently limiting
their engagement to premier locations that have deployed Wi-Fi and experience
a significant footfall of operator's customers.</t>

<t>Whereas conventional Carrier Wi-Fi has focused on premier locations, the
last decade has seen a continued increase in the requirements of private Wi-Fi
networks to be able to serve visitors, contractors and guest users. Moreover, in
most of these scenarios, the Wi-Fi network is primarily being used to support some
alternative value proposition; an improved retail experience in a shopping
mall, a more efficient meeting in a carpeted office, a superior stay in a
hospitality venue, or a better fan experience in a sporting arena. Traditionally,
this segment has made wide-scale use of captive portals and unencrypted Wi-Fi links
to onboard end-users onto their networks <xref target="RFC8952"/>. However, the decreasing costs for cellular data means
end-users are less motivated to search out and attach to such "free" Wi-Fi
networks, and as a consequence, captive portal conversion rates continue to decrease.</t>

<t>As a consequence, in 2020 WBA launched its OpenRoaming federation,
designed to provide a better on-boarding experience to end-users, that is seamless, scalable and secure.</t>

</section>
<section anchor="orarch"><name>OpenRoaming Architecture</name>

<t><xref target="figwifiarch"/> contrasts a conventional carrier Wi-Fi roaming system with OpenRoaming.
As illustrated, conventional Wi-Fi roaming has typically been based on:</t>

<t><list style="numbers" type="1">
  <t>IPSec <xref target="RFC6071"/> tunnels established between access networks, hub providers and identity providers used to protect exchanged signalling.</t>
  <t>Static routing of RADIUS signalling <xref target="RFC2865"/> based on realm routing tables populated according to agreements between access networks and hub providers.</t>
  <t>Passpoint primarily used with SIM based identifiers, where individual PLMN Ids are configured on the access networks WLAN equipment enabling them to be sent in ANQP messages, and cellular providers enable Passpoint based SIM authentication in end-user devices.</t>
  <t>EAP-AKA <xref target="RFC4187"/> based Passpoint authentication exchanged between the Supplicant in the end-user device and the EAP Server in the cellular provider's network.</t>
  <t>A primary focus on carrier based identities where the end-user has a billing relationship with the carrier.</t>
</list></t>

<t>In contrast, OpenRoaming is based on:</t>

<t><list style="numbers" type="1">
  <t>RadSec signalling <xref target="RFC6614"/> secured using mTLS with certificates issued under WBA's private certificate authority.</t>
  <t>Dynamic routing of RADIUS based on DNS-based discovery of signalling peers <xref target="RFC7585"/></t>
  <t>Passpoint based network selection based on 36-bit Roaming Consortium Organization Identifiers (RCOIs), where WBA defines the use of the 12 most significant bits of the 36-bit RCOI to embed closed access group policies.</t>
  <t>Passpoint authentication that can use any suitable EAP method.</t>
  <t>Encompassing new identity providers who do not have a billing relationship with their end-users.</t>
</list></t>

<t>Example EAP methods used with Passpoint include EAP-TLS, EAP-SIM, EAP-AKA, EAP-AKA' and EAP-TTLS with MS-CHAP-V2 that are included in Table 4 of the Passpoint specification <xref target="PASSPOINT"/>. In addition to these 5 EAP methods, Wi-Fi devices are available that can be configured to use different EAP type with Passpoint, including Passpoint with Protected EAP (PEAP) <xref target="PEAP"/>, EAP-TEAP <xref target="RFC7170"/> and EAP-FAST <xref target="RFC4851"/> outer methods, together with alternative inner methods to MS-CHAP-V2 used inside EAP-TTLS, including EAP-TLS.
Because OpenRoaming ANPs have no direct relationship with OpenRoaming IDPs that decide the credential type and EAP method to use when authenticating End-User devices, OpenRoaming ANPs SHOULD ensure that all EAP Methods compatible with Passpoint can be used to authenticate End-User devices.</t>

<figure title="Contrasting Carrier Wi-Fi and OpenRoaming Architectures" anchor="figwifiarch"><artwork><![CDATA[
+---------+        +--------+        +--------+        +--------+              
| Visited |        | Wi-Fi  |        | Wi-Fi  |        |Cellular|              
|  Wi-Fi  |        |  Hub   |        |  Hub   |        |Provider|              
| Network |<------>|Provider|<------>|Provider|<------>|Network |              
|         | RADIUS |        | RADIUS |        | RADIUS |        |              
|   NAS   |        | RADIUS |        | RADIUS |        | RADIUS |              
|         |<------>| proxy  |<------>| proxy  |<------>| Server |              
|Passpoint| IPSec  +--------+ IPSec  +--------+ IPSec  +--------+              
|PLMNId(s)|                                                                    
+---------+                                                                    
    /|\                                                                        
     |                                                                         
    \|/                                                                        
+---------+         A) Conventional Carrier Wi-Fi                              
|Passpoint|                                                                    
| device  |                                                                    
|  with   |                                                                    
| PLMN-Id |                                                                    
| profile |                                                                    
+---------+                                                                    


+---------+                   +---+                    +--------+              
| Visited |<----------------->|DNS|<------------------>|Identity|              
|  Wi-Fi  |   DNS based peer  +---+  Configure NAPTR,  |Provider|              
| Network |      discovery            SRV and A/AAAA   |Network |              
|         |                              records       |        |              
|   NAS   |                                            | RADIUS |              
|         |<------------------------------------------>| Server |              
|Passpoint|        RadSec/TLS secured using mTLS       +--------+              
| RCOI(s) |               and WBA PKI                                          
+---------+                                                                    
    /|\                                                                        
     |                                                                         
    \|/                                                                        
+---------+              B) OpenRoaming                                        
|Passpoint|                                                                    
| device  |                                                                    
|  with   |                                                                    
| RCOI(s) |                                                                    
| profile |                                                                    
+---------+                                                                    

]]></artwork></figure>

</section>
<section anchor="wbaid"><name>Identifying OpenRoaming Entities</name>

<t>All OpenRoaming providers and OpenRoaming brokers are allocated a WBA Identity (WBAID). The
WBAID is defined to be transported in the RADIUS Operator-Name attribute (#126) <xref target="RFC5580"/>.
WBA has been allocated the Operator Namespace identifier 0x34 "4" to identify
an Operator-Name attribute carrying a WBAID.</t>

<t>The WBAID is a hierarchical namespace that comprises at its top level the
identity allocated by WBA to a WBA Member and is of the form shown in <xref target="figwbaid"/>
where the optional 2 upper case characters represent an ISO-3166 Alpha-2 country code <xref target="ISO3166"/> e.g.,
"WBAMEMBER:US".</t>

<figure title="ABNF definition of Primary WBAID Structure" anchor="figwbaid"><artwork><![CDATA[
upper-case-char = %x41-5a
member-id       = 1*upper-case-char
wbaid           = member-id [ %x3a 2*2upper-case-char]

]]></artwork></figure>

<t>When operating as an OpenRoaming broker, the WBA Member
is able to allocate subordinate identities to OpenRoaming providers
who are not WBA members by pre-pending a subordinate identity ,
plus "." (%x2e) to the Member's WBAID, e.g., "OPENROAMINGPROVIDER.WBAMEMBER:US".
In this way, any receiving entity of a WBAID can identify the WBA Member who
is acting as an OpenRoaming broker to the provider by assigning it an identity.</t>

</section>
<section anchor="sss"><name>Scaling Secured Signalling</name>

<t>As described in <xref target="legal"/>, the OpenRoaming legal framework does not assume
any direct relationship between ANP and IDP. In order to scale the
secured signalling between providers, the federation makes use of a
Public Key Infrastructure using a private Certificate Authority specifically
designed to secure the operations of the roaming federation. WBA
and its members have published the WBA Certificate Policy <xref target="WBAPKICP"/> that defines the
policies which govern the operations of the PKI components by all
individuals and entities within the infrastructure. The OID for Wireless
Broadband Alliance is:</t>

<t>{ iso(1) identified-organization(3) dod(6) internet(1) private(4) enterprise(1) The Wireless Broadband Alliance(14122) }</t>

<t>The Wireless Broadband Alliance organizes its OID arcs for the Certificates
Policy Documents using the object identifier 1.3.6.1.4.1.14122.1.1. At the time of writing,
the current certificate policy is 1.3.6.1.4.1.14122.1.1.7.</t>

<t>This Certificate Policy is based on a 4-level hierarchy, as illustrated in <xref target="figpki"/>.</t>

<figure title="OpenRoaming PKI Hierarchy" anchor="figpki"><artwork><![CDATA[
+---------+---------------------------+----------------------------+
|         |                           |                            |
| Level   | Description               |  Comment                   |
|         |                           |                            |
+---------+---------------------------+----------------------------+
| Level 1 | OpenRoaming Root          | Operation managed by WBA   |
|         | Certificate Authority     |                            |
+---------+---------------------------+----------------------------+
| Level 2 | OpenRoaming Policy        | Operation managed by WBA.  |
|         | Intermediate Certificate  | Instantiates WBA policy OID|
|         | Authority                 |                            |
+---------+---------------------------+----------------------------+
| Level 3 | OpenRoaming Issuing       | Operated by an OpenRoaming |
|         | Intermediate Certificate  | broker                     |
|         | Authority                 |                            |
+---------+---------------------------+----------------------------+
| Level 3 | OpenRoaming Registration  | Optional and when used,    |
|         | Authority                 | operated by an OpenRoaming |
|         |                           | broker                     |
+---------+---------------------------+----------------------------+
| Level 4 | OpenRoaming Entity        | A WBA member or non-member.|
|         |                           | WBA's Certificate Policy   |
|         |                           | requires the Entity's      |
|         |                           | WBAID is included in the   |
|         |                           | Subject UID field in the   |
|         |                           | certificate.               |
+---------+---------------------------+----------------------------+

]]></artwork></figure>

<t>Certificates issued under the WBA PKI are used by Entities to perform mutual
authentication with other Entities and to secure RadSec
signalling <xref target="RFC6614"/> that carries EAP-based Passpoint authentication. This is typically between a
RadSec client in the OpenRoaming ANPs network and an RadSec Server in the OpenRoaming
IDPs network, although a provider can decide to outsource the operation of the RadSec
endpoint to a third party provider.</t>

<t>OpenRoaming is a distributed federation that lacks a centralized RADIUS element for identifying
and troubleshooting signalling issues. Instead, the WBA operates cloud-based systems capable of verifying
the correct configuration of DNS and TLS endpoints for OpenRoaming IDPs that have registered their realms with the WBA.
This baseline testing by the WBA ensures that ANPs and IDPs can establish a TLS connection,
such as when an end-user from an IDP roams into the coverage area of Wi-Fi networks operated by an ANP.</t>

<t>To provide a scalable system that enables access and identity providers to collaboratively troubleshoot and resolve issues, the WBA Certificate Practice Statement mandates that the Subject Alternative Name (SAN) attribute in
issued end-entity certificates includes a contact email address responsible for handling issues raised by third-party providers. The OpenRoaming legal framework requires ANPs and IDPs to make reasonable efforts to support troubleshooting procedures. This includes monitoring the email address listed in the SAN attribute of the certificate and responding to any issues raised by legitimate third parties.</t>

</section>
<section anchor="dpd"><name>IDP Discovery</name>

<section anchor="dynamic-discovery"><name>Dynamic Discovery</name>

<t>OpenRoaming defines the use of dynamic discover <xref target="RFC7585"/> by which an ANP discovers the
IP address of the IDP's RadSec server.</t>

</section>
<section anchor="discovery-of-eap-akaaka-servers"><name>Discovery of EAP-AKA/AKA' Servers</name>

<t>Passpoint defines the use of EAP-AKA' based authentication <xref target="RFC5448"/> which uses the
3GPP 23.003 <xref target="TS23003"/> defined realm of wlan.mnc&lt;mnc&gt;.mcc&lt;mcc&gt;.3gppnetwork.org, where
&lt;mcc&gt; represent an E.212 Mobile Country Code and &lt;mnc&gt; represents the E.212
Mobile Network Code allocated to the IDP. GSMA is responsible for
operating the 3gppnetwork.org domain and GSMA IR.67 <xref target="GSMAIR67"/> limits access to
the DNS systems supporting such records to those systems connected to the inter-PLMN IP
backbone (known as "GRX/IPX"). As OpenRoaming ANPs do not connect to this inter-PLMN backbone,
then conventional realm based lookup cannot be used over the Internet to discover the RadSec server
supporting EAP-AKA' authentication.</t>

<t>GSMA IR.67 does allow systems to be discoverable
from the public Internet, specifically calling out the use of the
pub.3gppnetwork.org domain name for such procedures. In order for ANPs
to dynamically discover the RadSec server supporting EAP-AKA' authentication,
GSMA has defined the use of the wlan.mnc&lt;mnc&gt;.mcc&lt;mcc&gt;.pub.3gppnetwork.org by
OpenRoaming systems. This means that whenever a RadSec client receives a user-name
containing an NAI formatted as user@wlan.mnc&lt;mnc&gt;.mcc&lt;mcc&gt;.3gppnetwork.org, the dynamic
peer detection functionality MUST insert ".pub" into the realm and perform
DNS based dynamic discovery using the wlan.mnc&lt;mnc&gt;.mcc&lt;mcc&gt;.pub.3gppnetwork.org
domain name. The RADIUS user-name attribute MUST NOT be similarly modified.</t>

<t>IR.67 defines the procedure by which a cellular operator can request the delegation
of their mnc&lt;mnc&gt;.mcc&lt;mcc&gt;.pub.3gppnetwork.org sub-domain.  GSMA PRD IR.67 also allows an MNO
to delegate the entire mnc&lt;MNC&gt;.mcc&lt;MCC&gt;.pub.3gppnetwork.org sub-domain
which could have already occurred, e.g., to enable use of the
epdg.epc.mnc&lt;MNC&gt;.mcc&lt;MCC&gt;.pub.3gppnetwork.org used with 3GPP's Wi-Fi calling service. Using this approach,
a cellular operator operating as an OpenRoaming IDP can authenticate their end-users on
third party ANP Wi-Fi networks.</t>

</section>
<section anchor="proving-a-discovered-radsec-server-is-authoritative-for-a-realm"><name>Proving a discovered RadSec server is authoritative for a realm</name>

<t>The OpenRoaming preferred approach to dynamically discover the RadSec server
IP address serving a particular realm or set of realms is to
use DNS records that are protected with DNSSEC <xref target="RFC9364"/>. However, GSMA
has not enabled DNSSEC on its 3gppnetwork.org domain, meaning that DNSSEC
cannot be applied on the publicly resolvable domains under pub.3gppnetwork.org.
Because of this situation, OpenRoaming does not currently mandate operation of DNSSEC.</t>

<t>If the DNS records for a realm are not protected with DNSSEC, because the realm
has been provided directly by the OpenRoaming End-User, the
IDP SHOULD ensure that the discovered RadSec server(s) supporting its realm(s)
is/are configured with a WBA-PKI server certificate that includes the realm(s)
used in the dynamic peer detection in the certificate SubjectAltName.</t>

<t>Where the DNS records are protected with DNSSEC, the IDP SHOULD ensure that
the discovered RadSec server(s) supporting its realm(s)
is/are configured with a WBA-PKI server certificate that includes the
derived name(s) from the secured DNS NAPTR/SRV query in the
certificate SubjectAltName.</t>

<t>Where the OpenRoaming IDP has offloaded the operation of RadSec termination to a
third party hub-provider that is responsible for supporting a number of independent realms,
the hub-provider SHOULD ensure that the discovered RadSec server(s) supporting
the independent realms from its partner IDPs
is/are configured with a WBA-PKI server certificate that includes the
derived name(s) from the DNS NAPTR/SRV query in the
certificate SubjectAltName.</t>

</section>
<section anchor="co-existence-with-other-federations"><name>Co-existence with other Federations</name>

<t>Other federations which want to interface to the OpenRoaming federation may use
dynamic discovery with distinct NAPTR application service tags to facilitate integration.
For example, an eduroam service provider can use the use the "x-eduroam"
application service tag, specified in <xref target="RFC7593"/>, to discover the home institution's
RadSec peer for authentication, and OpenRoaming ANPs can use the "aaa+auth" tag to discover
a separate RadSec peer that can be defined for handling all inter-domain authentications.</t>

<t>Where a separate inter-federation RadSec peer is not used, the other federation AAA operating
as an OpenRoaming IDP needs to determine which certificate chain to return in its ServerHello message.
An OpenRoaming ANP operating with TLS 1.3 SHOULD use the "certificate_authorities" extension <xref target="RFC8446"/>
in its ClientHello message to indicate that the ANP supports the WBA PKI Certificate Authority trust anchor.
Similarly, an OpenRoaming ANP operating using TLS 1.2 SHOULD use the "trusted_ca_keys" extension <xref target="RFC6066"/> in its ClientHello message to indicate the DistinguishedName of the WBA PKI Certificate Authority whose root keys the ANP possesses. The federation AAA operating as an OpenRoaming IDP MAY use information in the ClientHello extension to guide its certificate selection.</t>

</section>
</section>
<section anchor="PASSPOINT-SEC"><name>OpenRoaming Passpoint Profile</name>

<section anchor="openroaming-policy-controls"><name>OpenRoaming Policy Controls</name>

<t>In order to avoid possible fragmentation of roaming federations, OpenRoaming recognizes
that there is a need to permit OpenRoaming to be integrated into a variety of
different use-cases and value propositions. These use-cases include scenarios where
providers are able to enforce policy controls of which end-users are authorized to access the service.
The realization of authorization policy controls in the OpenRoaming federation is a balance
between the requirements for fine grain policy enforcement versus the potential
impact of policy enforcement on the user experience.</t>

<t>Such a level of control is realized using Closed Access Group (CAG) based policies.
A Closed Access Group identifies a group of OpenRoaming users who are permitted
to access one or more OpenRoaming access networks configured with a particular CAG policy.
These Closed Access Group policies are encoded using one or more
Roaming Consortium Organization Identifiers (RCOIs), first defined
in Passpoint Release 1.0, and well supported
across the smartphone device ecosystem.</t>

<t>Note, encoding CAG policies in OpenRoaming using one or more RCOIs is aimed at
delivering an equivalent functionality to the CAG policies encoded in 3GPP using one or more CAG-IDs.</t>

</section>
<section anchor="CAG"><name>OpenRoaming Closed Access Group Policies</name>

<t>OpenRoaming defines the use of multiple RCOIs to facilitate the implementation of
closed access group policies across the federation. The currently defined RCOIs are:</t>

<t><list style="symbols">
  <t>OpenRoaming-Settled:  BA-A2-D0-xx-x</t>
  <t>OpenRoaming-Settlement-Free:  5A-03-BA-xx-x</t>
</list></t>

<t><xref target="figrcoi"/> shows how the 24-bit length OpenRoaming RCOIs are further extended into 36-bit length OUI-36s
with additional context dependent identifiers used to encode specific closed access group
policies. Following Passpoint Release 1.0 specification, only when there is a bitwise match of
all 36 bits of the configured RCOI in the WLAN equipment and the Passpoint profile configured in the
end-user device will an EAP authentication be triggered.</t>

<t>The encoding of closed access group policies is defined so that the "no-restrictions" policy is
encoded using the 12-bit value "00-0", i.e., 54-03-BA-00-0 represents a policy
that accepts all OpenRoaming settlement-free users onto a particular ANP installation.</t>

<figure title="Extension of Octets 4 and 5 for OpenRoaming Context Dependent RCOI Field " anchor="figrcoi"><artwork><![CDATA[
+---------------------------------------+-------------------+
|               OUI-36 Octet 4          |  OUI-36 Octet 5   |
+---------------------------------------+-------------------+
| B7 | B6 | B5 | B4 | B3 | B2 | B1 | B0 | B7 | B6 | B5 | B4 |
+----+---------+----+-------------------+-------------------+
| LoA|   QoS   |PID |     ID-Type       |On-b|  Reserved -  |
|    |         |    |                   |oard|   set to 0   |
+----+---------+----+-------------------+-------------------+

]]></artwork></figure>

<section anchor="level-of-assurance-policies"><name>Level of Assurance Policies</name>

<t>The format of the Level of Assurance (LoA) field is as shown in <xref target="figloa"/>.</t>

<figure title="OpenRoaming CAG LoA Field " anchor="figloa"><artwork><![CDATA[
+------------------------------------------------------------+
|  LoA Field  |           Description                        |
+------------------------------------------------------------+
|     B7      |                                              |
+------------------------------------------------------------+
|     0       |   Baseline Identity Proofing                 |
+------------------------------------------------------------+
|     1       |   Enhanced Identity Proofing                 |
+------------------------------------------------------------+

]]></artwork></figure>

<t>The baseline identity proofing requirement on IDPs ensures that all
OpenRoaming identities are managed with at least a medium level of
assurance (LoA level 2) for end-user enrollment, credential management
and authentication, as specified in ISO/IEC 29115 <xref target="ISO29115"/>.</t>

<t>Any IDP that manages its identities according to ISO/IEC 29115 LoA level 2
MUST NOT configure any RCOI in their end-users' Passpoint profile
with the LoA field set to "1". Conversely, an IDP that manages its identities
according to ISO/IEC 29115 LoA level 3 MAY configure multiple RCOIs
in their end-users' Passpoint profile, including RCOIs with the LoA field
set to "0" and RCOIs with the LoA field set to "1".</t>

<t>The LoA field is used to support ANPs which operate in regulatory
regimes that require enhanced identity proofing to be used in the
provision of credentials on OpenRoaming devices, equivalent to LoA level
3 in ISO/IEC29115 <xref target="ISO29115"/>. In such a scenario, the ANP can set the LoA bit
field to 1 in all configured RCOIs to ensure that only identities
provisioned using enhanced LoA 3 procedures can access via the ANP's network.</t>

</section>
<section anchor="quality-of-service-policies"><name>Quality of Service Policies</name>

<t>One of the challenges faced by users of Wi-Fi hotspots is when the Wi-Fi network
is configured sub-optimally and results in a poor user experience. Often the only
remedy open to a user it to disable the Wi-Fi interface on their smartphone and
continue to use cellular data. This is especially the case where the Wi-Fi hotspot
has been automatically selected with no user intervention. As a consequence, OpenRoaming defines specific
service tiers across the federation and uses the QoS field to differentiate between different tiers.
The format of the QoS field is shown in <xref target="figqos"/>.</t>

<figure title="OpenRoaming CAG QoS Field " anchor="figqos"><artwork><![CDATA[
+------------------------------------------------------------+
|            QoS Field              |      Description       |
+------------------------------------------------------------+
|        B6       |        B5       |                        |
+------------------------------------------------------------+
|        0        |        0        |        Bronze          |
+------------------------------------------------------------+
|        0        |        1        |        Silver          |
+------------------------------------------------------------+
|        1        |        0        |       Reserved         |
+------------------------------------------------------------+
|        1        |        1        |       Reserved         |
+------------------------------------------------------------+
]]></artwork></figure>

<t>The "Bronze" and "Silver" values of QoS field are used to identify
specific quality of service policy aspects.</t>

<t>The bronze service tier corresponds to the following:</t>

<t><list style="numbers" type="1">
  <t>The availability of OpenRoaming service
when used to access the Internet measured during scheduled operations
across the ANP's network exceeds 90% over any one month period.</t>
  <t>The aggregate bandwidth used to receive
Internet service on the ANP's network is sufficient to enable
each and every authenticated and authorized OpenRoaming end-user to simultaneously receive a
sustained 256 kilobits per second connection.</t>
</list></t>

<t>The silver service tier corresponds to the following:</t>

<t><list style="numbers" type="1">
  <t>The availability of OpenRoaming service
when used to access the Internet measured during scheduled operations
across the ANP's network exceeds 95% over any one month period.</t>
  <t>The aggregate bandwidth used to receive
Internet service on the ANP's network is be sufficient to enable
each and every authenticated and authorized end-user to receive a
sustained 512 kilobits per second connection.</t>
  <t>At least 10% of authenticated and authorized users are able
to stream video content at a downlink rate of at least 5 megabits per
second (when measured over a one-minute interval) over all of the ANP's
OpenRoaming enabled Wi-Fi networks.</t>
  <t>The authenticated and authorized end-users are
able to stream video from one or more third party content distribution
networks with an end-to-end latency of less than 150ms from all of the
ANP's OpenRoaming enabled Wi-Fi networks.</t>
</list></t>

<t>The QoS field can be used by those IDPs that are only interested in providing
their end-users with a higher quality service level when automatically authenticated
onto an OpenRoaming network. For example, an IDP configures the QoS field
as bronze in a Passpoint profile that uses the "5A-03-BA" settlement free RCOI and
configures the QoS field as silver in a Passpoint profile that uses the
"BA-A2-D0" OpenRoaming-settled paid service.</t>

<t>ANPs that only support the bronze service tier MUST set the QoS Field to "00" in
all RCOIs configured on their WLAN equipment. ANPs that support the silver service
tier MAY configure multiple RCOIs on their WLAN equipment that include values where
the QoS field is set to "01" and values where the QoS field is set to "00".</t>

<t>Exceptionally, ANPs that operate OpenRoaming installations on moving platforms
are permitted to deviate from normal OpenRoaming service level requirements. This is
because such installations may necessitate use of cellular-based backhaul and/or
backhaul via Non-Terrestrial Networks (NTN) which may not be able to meet the
OpenRoaming minimum "bronze" service level requirements.
If an ANP wants to benefit from such deviations, it MUST signal using the WLAN-Venue-Info
attribute <xref target="RFC7268"/> that it is operating in a venue category identified using
a Venue Group value of "10", which is defined in Section 8.4.1.34 of <xref target="IEEE80211"/>
as being used for vehicular installations. In such cases, the OpenRoaming ANP MAY
signal one or more WBA-Custom-SLA vendor specific attributes <xref target="WBAVSA"/> to indicate
one or more (availability, per-user sustained bandwidth) tuples to the IDP.</t>

<t>IDP availability requirements:</t>

<t>Irrespective of the service-levels supported by their users, the IDP shall ensure
that the availability of their authentication service measured during scheduled
operations shall exceed 99% over any one month period.</t>

</section>
<section anchor="privacy-policies"><name>Privacy Policies</name>

<t>The baseline privacy policy of OpenRoaming ensures
the identities of end-users remain anonymous when using the
service. The WBA WRIX specification specifies that where supplicants use EAP methods
that support user-name privacy, i.e., which are compatible with the "@realm" (or "anonymous@realm") (outer) EAP-Identifier,
then the supplicant SHOULD use the anonymized outer EAP identifier. Supplicants supporting
other EAP methods SHOULD support EAP method specific techniques for masking the
end-user's permanent identifier, for example pseudonym support in EAP-AKA/AKA' <xref target="RFC4187"/>
and/or enhanced IMSI privacy protection <xref target="WBAEIPP"/>. OpenRoaming IDPs SHOULD support and
enable the corresponding server-side functionality to ensure end-user privacy is protected.</t>

<t>The WBA WRIX specification also recognizes that the privacy of end-users can be
unintentionally weakened by the use of correlation identifiers signalled using the
Chargeable-User-Identity attribute (#89) <xref target="RFC4372"/> and/or the Class attribute (#25) <xref target="RFC2865"/>
in the RADIUS Access-Accept packet. The WBA WRIX Specification recommends that the
default IDP policy SHOULD ensure that, when used, such correlation identifiers are unique for
each combination of end-user/ANP and that the keys and/or initialization vectors
used in creating such correlation identifiers SHOULD be refreshed at least every 48 hours,
but not more frequently than every 2 hours.</t>

<t>This 2 hour limit is designed to assist the ANP in performing autonomous troubleshooting
of connectivity issues from authentic users/devices that are repeatedly re-initiating
connectivity to the ANP's network and/or to assist the ANP in identifying a new session
originated by an authentic user/device that has previously been identified by the ANP as having violated the OpenRoaming
end-user terms and conditions. When using typical public Wi-Fi session durations, it is
estimated that, with this 2 hour restriction, the ANP will be able to correlate an
Access-Request/Access-Accept exchange that immediately follows an Accounting-Request
stop message in over 50% of the sessions.</t>

<t>In contrast to this default policy, there can be scenarios where the ANP
desires to derive value from its OpenRoaming settlement-free service by analysing
aggregate end-user behaviour. Whereas the use of aggregated end-user information does not
violate the OpenRoaming privacy policy, the derivation of such can benefit from the
ANP being able to uniquely identify end-users. In order to support such scenarios, the
OpenRoaming closed access group policies include the PID field.</t>

<t>The PID field can be used to support scenarios where the user has consented
with their IDP that an immutable end-user identifier can be signalled to the
ANP in the RADIUS Access-Accept. The format of the PID field is
illustrated in <xref target="figpid"/>. The PID
field can be configured to "1" in the RCOIs used by those ANPs that
want to be be able to account for unique OpenRoaming end-users.</t>

<t>The OpenRoaming IDP terms ensure subscribers MUST
explicitly give their permission before an immutable end-user identity
is shared with a third party ANP. When such permission has
not been granted, an IDP MUST NOT set the PID field to "1" in any
of the RCOIs in its end-user Passpoint profiles. When such permission has
been granted, an IDP MAY configure multiple RCOIs
in their end-users' Passpoint profile, including RCOIs with the PID field
set to "0" and RCOIs with the PID field set to "1".</t>

<figure title="OpenRoaming CAG PID Field " anchor="figpid"><artwork><![CDATA[
+------------------------------------------------------------+
|  PID Field  |                 Description                  |
+------------------------------------------------------------+
|     B4      |                                              |
+------------------------------------------------------------+
|     0       |   Baseline ID Policy applies, i.e., users    |
|             |   remain anonymous whilst using the service. |
+------------------------------------------------------------+
|     1       |   An immutable end-user ID will be returned  |
|             |   by the IDP in the Access-Accept packet.    |
+------------------------------------------------------------+

]]></artwork></figure>

</section>
<section anchor="id-type-policies"><name>ID-Type Policies</name>

<t>The ID-Type field can be used to realize policies which are based
on the business sector associated with the identity used by the IDP.
The format of the ID-Type
field is illustrated in <xref target="figidtype"/>.</t>

<t>All IDPs configure at least one RCOI in their end-user's
Passpoint profile with ID-Type set to "0000" (Any identity type is permitted).
An IDP MAY configure additional RCOIs in their end-users' Passpoint profile
with an ID-Type representing the sector type of IDP.</t>

<t>An ANP what wants to serve all end-users, irrespective of sector,
configures RCOIs in the WLAN equipment with ID-Type set to "0000".
Alternatively, an ANP which operates a sector specific business that
only desires to serve a subset of OpenRoaming end-users MAY set the ID-Type
to their desired sector in all configured RCOIs.</t>

<figure title="OpenRoaming CAG ID-Type Field " anchor="figidtype"><artwork><![CDATA[
+------------------------------------------------------------+
|       ID-Type Field       |           Description          |
+------------------------------------------------------------+
|  B3  |  B2  |  B1  |  B0  |                                |
+------------------------------------------------------------+
|  0   |  0   |  0   |  0   | Any identity type is permitted |
+------------------------------------------------------------+
|  0   |  0   |  0   |  1   | A service provider identity    |
+------------------------------------------------------------+
|  0   |  0   |  1   |  0   | A cloud provider identity      |
+------------------------------------------------------------+
|  0   |  0   |  1   |  1   | A generic enterprise identity  |
+------------------------------------------------------------+
|  0   |  1   |  0   |  0   | A government identity, e.g.,   |
|      |      |      |      | including city                 |
+------------------------------------------------------------+
|  0   |  1   |  0   |  1   | An automotive identity         |
+------------------------------------------------------------+
|  0   |  1   |  1   |  0   | A hospitality identity         |
+------------------------------------------------------------+
|  0   |  1   |  1   |  1   | An aviation industry identity  |
+------------------------------------------------------------+
|  1   |  0   |  0   |  0   | An education or research       |
|      |      |      |      | identity                       |
+------------------------------------------------------------+
|  1   |  0   |  0   |  1   | A cable industry identity      |
+------------------------------------------------------------+
|  1   |  0   |  1   |  0   | A manufacturer identity(note 1)|
+------------------------------------------------------------+
|  1   |  0   |  1   |  1   | A retail identity              |
+------------------------------------------------------------+
|        other values       | Reserved                       |
+------------------------------------------------------------+
| NOTE 1: A manufacturer identity closed access group policy |
| applies to IoT credentials corresponding to manufacturer   |
| installed identities as well as IoT credentials            |
| corresponding to owner installed identities.               |
+------------------------------------------------------------+

]]></artwork></figure>

</section>
<section anchor="on-boarding-credential-policies"><name>On-boarding Credential Policies</name>

<t>The format of the on-boarding credential policy (On-board) field is as shown in <xref target="figonboard"/>.</t>

<figure title="OpenRoaming CAG On-board Field " anchor="figonboard"><artwork><![CDATA[
+------------------------------------------------------------+
| On-board Field  |               Description                |
+------------------------------------------------------------+
|  B7 Octet 5     |                                          |
+------------------------------------------------------------+
|     0           |   A long-lived identity                  |
+------------------------------------------------------------+
|     1           |   A short-lived identity                 |
+------------------------------------------------------------+

]]></artwork></figure>

<t>The On-board field is used to identify closed access group
policy aspects related to whether the identity/profile is
long-lived, or whether the identity/profile is short-lived.
Short-lived profiles are intended to only be used to provide
connectivity such that the procedure for configuring a
long-lived identity/profile can be performed.</t>

<t>Sessions authorized with short-lived credentials MUST have a
session-timeout value of less than 300 seconds.</t>

</section>
</section>
<section anchor="prioritizing-policies"><name>Prioritizing Policies</name>

<t>The  definition of OpenRoaming closed access group policies assumes
the configuration of multiple RCOIs in ANP WLAN equipment and IDP end-user devices.</t>

<t>When a device has multiple Passpoint profiles matching the ANP's RCOI policy,
an OpenRoaming ANP may want to prefer OpenRoaming subscribers use a particular IDP's
profile when attaching to its access network. Such a preference can be because
the OpenRoaming ANP has a preferential relationship with certain OpenRoaming IDPs.</t>

<t>The OpenRoaming ANP is able to use the Home SP preference functionality defined in
Passpoint <xref target="PASSPOINT"/> to prioritize the use of a particular profile by a Passpoint enabled device.
In such a scenario, the ANP configures the Domain Name list to include the
FQDN(s) associated with the profile(s) to be prioritized.</t>

</section>
</section>
<section anchor="RADIUS"><name>OpenRoaming RADIUS Profile</name>

<t>The OpenRoaming RADIUS profile is based on the WBA WRIX Specification which in turn
are derived from <xref target="RFC3580"/> and <xref target="RFC3579"/>. All ANPs MUST support RADIUS Accounting
for all OpenRoaming sessions, irrespective of which RCOIs are supported, i.e., for both
settled and settlement free service. All IDPs MUST respond to any RADIUS Access-Request
and Accounting-Request packet received.</t>

<t>Additionally, OpenRoaming defines the use of the following RADIUS attributes.</t>

<section anchor="operator-name"><name>Operator-Name</name>

<t>As described in <xref target="wbaid"/>, OpenRoaming uses the Operator-Name (#126) <xref target="RFC5580"/> attribute to signal
the WBAID of the OpenRoaming ANP. All ANPs MUST support the Operator-Name attribute and use it to signal the
WBAID of the OpenRoaming ANP.</t>

</section>
<section anchor="chargeable-user-identity"><name>Chargeable-User-Identity</name>

<t>All OpenRoaming ANPs MUST support the Chargeable-User-Identity attribute (#89) <xref target="RFC4372"/> and
indicate such by including a CUI attribute in all RADIUS Access-Request packets. An ANP that has configured the OpenRoaming-Context PID Field set to "1" MAY treat a RADIUS Access-Accept received without a CUI attribute as an Access-Reject. An ANP that has configured the OpenRoaming-Context PID Field set to "0" MUST NOT treat any RADIUS Access-Accept received without a CUI attribute as an Access-Reject.</t>

<t>When an end-user has explicitly given their permission to share an immutable end-user identifier
with third party ANPs, the CUI returned by the IDP is invariant over subsequent
end-user authentication exchanges between the IDP and the ANP.</t>

</section>
<section anchor="location-datalocation-information"><name>Location-Data/Location-Information</name>

<t>All OpenRoaming ANPs MUST support signalling of location information using <xref target="RFC5580"/>.
As a minimum, all OpenRoaming IDPs need to be able to determine the country in which the
OpenRoaming ANP operates. The OpenRoaming legal framework described in <xref target="legal"/> serves as an "out-of-band agreement" as
specified in clause 3.1 of <xref target="RFC5580"/>. Hence, all OpenRoaming ANPs MUST include the Location-Data
attribute (#128) in the RADIUS Access-Request packet, where the location profile is the civic location profile
that includes the country code where the ANP is located <xref target="RFC5580"/>.</t>

<t>When the OpenRoaming ANP supports the OpenRoaming-Settled RCOI ("BA-A2-D0"),
the RADIUS Access-Request packet MUST include the Location-Data attribute (#128) where the location profile
is the civic location profile containing Civic Address Type information that
is sufficient to identify the financial regulatory regime that defines the
taxable rates associated with consumption of the ANP's service.</t>

<t>OpenRoaming also defines the optional use the geospatial location profile as specified in
<xref target="RFC5580"/>. ANPs MAY signal coordinate-based geographic location of
the NAS or end-user device.</t>

<t>The OpenRoaming Privacy Policy <xref target="ORPRIVACY"/> restricts the use of all location information signalled to an IDP for either:</t>

<t><list style="numbers" type="1">
  <t>Making service authorization decisions based on the location of the ANP's wireless network; or</t>
  <t>Compliance with applicable law, or law enforcement requests.</t>
</list></t>

</section>
<section anchor="session-timeout"><name>Session-Timeout</name>

<t>An OpenRoaming ANP receiving a RADIUS Access Accept message including a
Session-Timeout attribute MUST operate according to <xref target="RFC3580"/>.</t>

</section>
<section anchor="enhanced-reply-message"><name>Enhanced Reply-Message</name>
<t>Reply-Message was originally defined in <xref target="RFC3579"/> as being forbidden from being
included in any RADIUS message containing an EAP-Message attribute. This was to prevent
earlier systems from attempting to interwork the Reply-Message text into an
EAP Notification packet.</t>

<t>In contrast to using Reply-Message to signal a displayable
text string to authenticating users, WBA's WRIX framework defines the re-use of
the attribute in WRIX-based Passpoint networks to signal additional
information from the IDP to the ANP, specifically regarding why a connection has been rejected.
The message received MUST NOT be shown to end users.</t>

<t>The enhanced reply-message is encoded using UTF-8 characters. The WBA defines additional
information is appended after the NUL ASCII character (0x00). The ABNF syntax of the
Reply-Message is shown in <xref target="figreply"/>.</t>

<figure title="WBA Enhanced Reply-Message Syntax" anchor="figreply"><artwork><![CDATA[
Reply-message      = [ displayable-string ] %x00 [ wba-info ]
displayable-string = *CHAR
wba-info           =  "Reject-Reason=" cause-code

cause-code =  "10" ; failed user authentication
cause-code =/ "11" ; invalid user identity
cause-code =/ "12" ; expired client certificate
cause-code =/ "20" ; generic AAA failure
cause-code =/ "21" ; backend failure
cause-code =/ "22" ; protocol timeout
cause-code =/ "30" ; failure due to badly formatted request
cause-code =/ "31" ; rejected - missing charging model
cause-code =/ "32" ; rejected - missing geospatial location
cause-code =/ "40" ; failure due to subscription - permanent
cause-code =/ "41" ; authorization rejected -
                   ; no service subscription
cause-code =/ "42" ; authorization rejected -
                   ; roaming not allowed in this network
cause-code =/ "43" ; authorization rejected -
                   ; offered charging model not acceptable
cause-code =/ "44" ; authorization rejected -
                   ; roaming to this location not allowed
cause-code =/ "45" ; authorization rejected -
                   ; offered service level not acceptable                 
cause-code =/ "50" ; failure due to subscription -
                   ; temporary
cause-code =/ "51" ; authorization rejected -
                   ; offered charging model not acceptable at this time
cause-code =/ "52" ; authorization rejected -
                   ; roaming to this location not allowed at this time
cause-code =/ "53" ; authorization rejected -
                   ; concurrency limits exceeded
cause-code =/ "54" ; authorization rejected - insufficient credit

]]></artwork></figure>

</section>
<section anchor="wba-identity-provider"><name>WBA-Identity-Provider</name>

<t>The Operator-Name attribute allows the WBAID of the ANP to be signalled to the IDP.
In the reverse direction, the IDP MUST use the WBA-Identity-Provider vendor
specific attribute <xref target="WBAVSA"/> to signal the WBAID of the IDP back to the ANP.</t>

</section>
<section anchor="wba-offered-service"><name>WBA-Offered-Service</name>

<t>The ANP MAY use the WBA-Offered-Service vendor specific attribute to signal the
highest OpenRoaming service tier supported on its network <xref target="WBAVSA"/>.</t>

</section>
<section anchor="wlan-venue-info"><name>WLAN-Venue-Info</name>

<t>The ANP MAY use the WLAN-Venue-Info attribute <xref target="RFC7268"/> to signal the
category of venue hosting the WLAN.</t>

</section>
<section anchor="wba-custom-sla"><name>WBA-Custom-SLA</name>

<t>When the ANP uses the WLAN-Venue-Info attribute to signal that the venue
hosting the WLAN is a vehicular installation, the  ANP MAY use the
WBA-Custom-SLA vendor specific attribute <xref target="WBAVSA"/> to indicate
one or more (availability, per-user sustained bandwidth) tuples to the IDP.</t>

</section>
<section anchor="additional-attributes-related-to-openroaming-settled"><name>Additional attributes related to OpenRoaming settled</name>

<t>OpenRoaming settled defines the use of additional RADIUS attributes.</t>

<section anchor="wba-financial-clearing-provider"><name>WBA-Financial-Clearing-Provider</name>

<t>All OpenRoaming ANPs and IDPs that support the OpenRoaming settled service
MUST use the WBA-Financial-Clearing-Provider vendor specific attribute to signal
the  identity of the provider of financial clearing services <xref target="WBAVSA"/>.</t>

</section>
<section anchor="wba-data-clearing-provider"><name>WBA-Data-Clearing-Provider</name>

<t>All OpenRoaming ANPs and IDPs that support the OpenRoaming settled service MAY
use the WBA-Data-Clearing-Provider vendor specific attribute to signal
the  identity of the provider of data clearing services <xref target="WBAVSA"/>.</t>

</section>
<section anchor="wba-linear-volume-rate"><name>WBA-Linear-Volume-Rate</name>

<t>In cellular roaming, inter-operator tariff information is exchanged in
the roaming agreements between operators. In OpenRoaming, as there is no
direct agreement between ANPs and IDPs, the tariff information is
exchanged in RADIUS messages. All OpenRoaming ANPs that support
the OpenRoaming settled service MUST use the WBA-Linear-Volume-Rate
vendor specific attribute to signal the charging model being offered
by the ANP <xref target="WBAVSA"/>. An IDP that authorizes an offered charging model MUST include
the agreed WBA-Linear-Volume-Rate in the Access-Accept packet.</t>

</section>
</section>
</section>
<section anchor="Security"><name>Security Considerations</name>

<section anchor="network-selection-and-triggering-authentication"><name>Network Selection and Triggering Authentication</name>

<t>OpenRoaming defines the use of Passpoint with Roaming Consortium Organization Identifiers.
A bit-wise match between an RCOI configured in the Passpoint profile of an end-user's device and the RCOI signalled
by WLAN equipment will trigger a Passpoint defined EAP-based authentication exchange.
The security associated with the Passpoint RCOI
information element is identical to other PLMN Id and Realm information elements, allowing an
unauthorized system to configure the OpenRoaming RCOI with the aim of triggering a Passpoint authentication.
Because such an unauthorized system will not have been issued with a certificate using WBA's PKI, the
unauthorized system is unable to communicate with any other OpenRoaming provider.
In such a scenario, after successive multiple failed authentications, the device's supplicant
SHOULD add the Access Point's BSSID to a deny list
to avoid future triggering of an authentication exchange with the unauthorized system.</t>

</section>
<section anchor="anp-radsec-connectivity"><name>ANP RadSec Connectivity</name>

<t>The ANP's RadSec client connects to the IDP's RadSec server over the public Internet.
Recommended best practice for firewall deployment on public Internet facing interfaces
should be followed. Firewall rules should permit outbound RadSec traffic (TCP destination port 2083)
and allow return traffic for the same TCP connections while denying any TCP socket initiation from outside of the ANP's network.</t>

</section>
<section anchor="dynamic-discovery-of-radsec-peers"><name>Dynamic Discovery of RadSec Peers</name>

<t>Whereas the dynamic discovery
mechanisms specified in <xref target="RFC7585"/> permit the IDP to use their DNS SRV record to indicate a non-standard TCP
port to be used in a RadSec connection, IDPs should recognize that ANP systems
may only be configured to permit outbound connections on the standardized RadSec port of 2083.</t>

<t>OpenRoaming recommends the use of DNSSEC to ensure a dynamically discovered RadSec server
is authoritative for a particular realm or set of realms. Where this is not possible, e.g.,
when using dynamic resolution with the pub.3gppnetwork.org sub-domain, the OpenRoaming
certificate policy permits the configuration of supported realm(s) in the SubjectAltName
of the certificate(s) issued to the IDP.</t>

<t>An ANP can decide to continue with the RadSec establishment, even if a server cannot prove it is
authoritative for a realm. As the ANP's RadSec client uses a dedicated trust store corresponding to the WBA's private Certificate
Authority, if DNS is hijacked by a third-party non-federation member
who has not been issued a certificate under WBA's PKI, the subsequent TLS establishment will fail.</t>

<t>In order to prevent denial of service/brute force attacks, IDPs should implement intrusion prevention
functionality that monitors systems to identify TLS mutual authentication failures and temporarily
block source IP addresses that are the source of TLS authentication failures using firewall functionality.</t>

</section>
<section anchor="end-user-traffic"><name>End-User Traffic</name>

<t>The OpenRoaming federation ensures RADIUS traffic is secured between ANP and IDP and ensures Wi-Fi traffic is protected
between the end-user device and the WLAN equipment of the ANP. The ANP is therefore able to observe IP
traffic to/from end-users who have performed a successful authentication with their IDP. The OpenRoaming legal framework (see <xref target="legal"/>) ensures that the ANP has agreed to the OpenRoaming Privacy Policy <xref target="ORPRIVACY"/> to correctly handle the personally identifiable information collected
as part of providing the ANP service.</t>

<t>The Open-Roaming end-user terms and conditions <xref target="ORTERMS"/> ensure that end-users are aware that the federation does not provide a
secure end-to-end service. The end-user MUST NOT rely on the encryption delivered by OpenRoaming for providing security of services accessed using the ANP's Wi-Fi network.</t>

</section>
<section anchor="anp-inspection-of-end-user-traffic"><name>ANP Inspection of End-User Traffic</name>

<t>All OpenRoaming ANPs shall implement layer 2 traffic inspection and filtering,
as specified in clause 5.1 of the <xref target="PASSPOINT"/> specification. ANPs shall
prohibit the delivery of any packet received from an OpenRoaming device
directly to another OpenRoaming device.</t>

<t>All ANPs shall use traffic inspection and filtering to help protect
OpenRoaming users from malicious activity on the Internet as well as possible
malicious activity by other authenticated OpenRoaming users. ANP traffic
filtering function should not block ports associated with Wi-Fi calling,
including UDP ports 500 and 4500 used by Internet Key Exchange (IKE),
Internet Security Association and Key Management Protocol (ISAKMP) and IPSec <xref target="RFC7296"/>.
Recommended best practice for firewall deployment on public Internet facing interfaces
should be followed, including configuring the traffic inspection and filtering using
information derived from reliable sources of threat intelligence.</t>

</section>
<section anchor="end-user-location"><name>End-User Location</name>

<t>The OpenRoaming legal framework (see <xref target="legal"/>) ensures that the IDP has agreed to the OpenRoaming Privacy Policy <xref target="ORPRIVACY"/> to correctly handle the location-based personally identifiable information collected
as part of providing the IDP service. Unless the IDP has agreed a separate privacy policy with the End-User, the IDP is only permitted to use location information signalled by an ANP for either:</t>

<t><list style="numbers" type="1">
  <t>Making service authorization decisions based on the location of the ANP's wireless network; or</t>
  <t>Compliance with applicable law, or law enforcement requests.</t>
</list></t>

</section>
</section>
<section anchor="future-enhancements"><name>Future Enhancements</name>

<t>WBA announced the launch of its OpenRoaming Federation in June 2020. Since then, WBA members have continued to enhance the technical framework to address new market requirements that are reflected in the Closed Access Group policies described in <xref target="CAG"/> and the RADIUS profile described in <xref target="RADIUS"/>. WBA encourages those parties interested in adapting OpenRoaming to address new requirements to join the Alliance and help drive the definition of OpenRoaming forward.</t>

</section>
<section anchor="IANA"><name>IANA Considerations</name>

<t>This document has no IANA actions.</t>

</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>
<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>



    </references>

    <references title='Informative References' anchor="sec-informative-references">



<reference anchor="RFC2865">
  <front>
    <title>Remote Authentication Dial In User Service (RADIUS)</title>
    <author fullname="C. Rigney" initials="C." surname="Rigney"/>
    <author fullname="S. Willens" initials="S." surname="Willens"/>
    <author fullname="A. Rubens" initials="A." surname="Rubens"/>
    <author fullname="W. Simpson" initials="W." surname="Simpson"/>
    <date month="June" year="2000"/>
    <abstract>
      <t>This document describes a protocol for carrying authentication, authorization, and configuration information between a Network Access Server which desires to authenticate its links and a shared Authentication Server. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="2865"/>
  <seriesInfo name="DOI" value="10.17487/RFC2865"/>
</reference>
<reference anchor="RFC3579">
  <front>
    <title>RADIUS (Remote Authentication Dial In User Service) Support For Extensible Authentication Protocol (EAP)</title>
    <author fullname="B. Aboba" initials="B." surname="Aboba"/>
    <author fullname="P. Calhoun" initials="P." surname="Calhoun"/>
    <date month="September" year="2003"/>
    <abstract>
      <t>This document defines Remote Authentication Dial In User Service (RADIUS) support for the Extensible Authentication Protocol (EAP), an authentication framework which supports multiple authentication mechanisms. In the proposed scheme, the Network Access Server (NAS) forwards EAP packets to and from the RADIUS server, encapsulated within EAP-Message attributes. This has the advantage of allowing the NAS to support any EAP authentication method, without the need for method- specific code, which resides on the RADIUS server. While EAP was originally developed for use with PPP, it is now also in use with IEEE 802. This memo provides information for the Internet community.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="3579"/>
  <seriesInfo name="DOI" value="10.17487/RFC3579"/>
</reference>
<reference anchor="RFC3580">
  <front>
    <title>IEEE 802.1X Remote Authentication Dial In User Service (RADIUS) Usage Guidelines</title>
    <author fullname="P. Congdon" initials="P." surname="Congdon"/>
    <author fullname="B. Aboba" initials="B." surname="Aboba"/>
    <author fullname="A. Smith" initials="A." surname="Smith"/>
    <author fullname="G. Zorn" initials="G." surname="Zorn"/>
    <author fullname="J. Roese" initials="J." surname="Roese"/>
    <date month="September" year="2003"/>
    <abstract>
      <t>This document provides suggestions on Remote Authentication Dial In User Service (RADIUS) usage by IEEE 802.1X Authenticators. The material in this document is also included within a non-normative Appendix within the IEEE 802.1X specification, and is being presented as an IETF RFC for informational purposes. This memo provides information for the Internet community.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="3580"/>
  <seriesInfo name="DOI" value="10.17487/RFC3580"/>
</reference>
<reference anchor="RFC3748">
  <front>
    <title>Extensible Authentication Protocol (EAP)</title>
    <author fullname="B. Aboba" initials="B." surname="Aboba"/>
    <author fullname="L. Blunk" initials="L." surname="Blunk"/>
    <author fullname="J. Vollbrecht" initials="J." surname="Vollbrecht"/>
    <author fullname="J. Carlson" initials="J." surname="Carlson"/>
    <author fullname="H. Levkowetz" initials="H." role="editor" surname="Levkowetz"/>
    <date month="June" year="2004"/>
    <abstract>
      <t>This document defines the Extensible Authentication Protocol (EAP), an authentication framework which supports multiple authentication methods. EAP typically runs directly over data link layers such as Point-to-Point Protocol (PPP) or IEEE 802, without requiring IP. EAP provides its own support for duplicate elimination and retransmission, but is reliant on lower layer ordering guarantees. Fragmentation is not supported within EAP itself; however, individual EAP methods may support this. This document obsoletes RFC 2284. A summary of the changes between this document and RFC 2284 is available in Appendix A. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="3748"/>
  <seriesInfo name="DOI" value="10.17487/RFC3748"/>
</reference>
<reference anchor="RFC4187">
  <front>
    <title>Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA)</title>
    <author fullname="J. Arkko" initials="J." surname="Arkko"/>
    <author fullname="H. Haverinen" initials="H." surname="Haverinen"/>
    <date month="January" year="2006"/>
    <abstract>
      <t>This document specifies an Extensible Authentication Protocol (EAP) mechanism for authentication and session key distribution that uses the Authentication and Key Agreement (AKA) mechanism. AKA is used in the 3rd generation mobile networks Universal Mobile Telecommunications System (UMTS) and CDMA2000. AKA is based on symmetric keys, and typically runs in a Subscriber Identity Module, which is a UMTS Subscriber Identity Module, USIM, or a (Removable) User Identity Module, (R)UIM, similar to a smart card.</t>
      <t>EAP-AKA includes optional identity privacy support, optional result indications, and an optional fast re-authentication procedure. This memo provides information for the Internet community.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4187"/>
  <seriesInfo name="DOI" value="10.17487/RFC4187"/>
</reference>
<reference anchor="RFC4372">
  <front>
    <title>Chargeable User Identity</title>
    <author fullname="F. Adrangi" initials="F." surname="Adrangi"/>
    <author fullname="A. Lior" initials="A." surname="Lior"/>
    <author fullname="J. Korhonen" initials="J." surname="Korhonen"/>
    <author fullname="J. Loughney" initials="J." surname="Loughney"/>
    <date month="January" year="2006"/>
    <abstract>
      <t>This document describes a new Remote Authentication Dial-In User Service (RADIUS) attribute, Chargeable-User-Identity. This attribute can be used by a home network to identify a user for the purpose of roaming transactions that occur outside of the home network. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4372"/>
  <seriesInfo name="DOI" value="10.17487/RFC4372"/>
</reference>
<reference anchor="RFC4851">
  <front>
    <title>The Flexible Authentication via Secure Tunneling Extensible Authentication Protocol Method (EAP-FAST)</title>
    <author fullname="N. Cam-Winget" initials="N." surname="Cam-Winget"/>
    <author fullname="D. McGrew" initials="D." surname="McGrew"/>
    <author fullname="J. Salowey" initials="J." surname="Salowey"/>
    <author fullname="H. Zhou" initials="H." surname="Zhou"/>
    <date month="May" year="2007"/>
    <abstract>
      <t>This document defines the Extensible Authentication Protocol (EAP) based Flexible Authentication via Secure Tunneling (EAP-FAST) protocol. EAP-FAST is an EAP method that enables secure communication between a peer and a server by using the Transport Layer Security (TLS) to establish a mutually authenticated tunnel. Within the tunnel, Type-Length-Value (TLV) objects are used to convey authentication related data between the peer and the EAP server. This memo provides information for the Internet community.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4851"/>
  <seriesInfo name="DOI" value="10.17487/RFC4851"/>
</reference>
<reference anchor="RFC5448">
  <front>
    <title>Improved Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA')</title>
    <author fullname="J. Arkko" initials="J." surname="Arkko"/>
    <author fullname="V. Lehtovirta" initials="V." surname="Lehtovirta"/>
    <author fullname="P. Eronen" initials="P." surname="Eronen"/>
    <date month="May" year="2009"/>
    <abstract>
      <t>This specification defines a new EAP method, EAP-AKA', which is a small revision of the EAP-AKA (Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement) method. The change is a new key derivation function that binds the keys derived within the method to the name of the access network. The new key derivation mechanism has been defined in the 3rd Generation Partnership Project (3GPP). This specification allows its use in EAP in an interoperable manner. In addition, EAP-AKA' employs SHA-256 instead of SHA-1.</t>
      <t>This specification also updates RFC 4187, EAP-AKA, to prevent bidding down attacks from EAP-AKA'. This memo provides information for the Internet community.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5448"/>
  <seriesInfo name="DOI" value="10.17487/RFC5448"/>
</reference>
<reference anchor="RFC5280">
  <front>
    <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
    <author fullname="D. Cooper" initials="D." surname="Cooper"/>
    <author fullname="S. Santesson" initials="S." surname="Santesson"/>
    <author fullname="S. Farrell" initials="S." surname="Farrell"/>
    <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
    <author fullname="R. Housley" initials="R." surname="Housley"/>
    <author fullname="W. Polk" initials="W." surname="Polk"/>
    <date month="May" year="2008"/>
    <abstract>
      <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5280"/>
  <seriesInfo name="DOI" value="10.17487/RFC5280"/>
</reference>
<reference anchor="RFC5580">
  <front>
    <title>Carrying Location Objects in RADIUS and Diameter</title>
    <author fullname="H. Tschofenig" initials="H." role="editor" surname="Tschofenig"/>
    <author fullname="F. Adrangi" initials="F." surname="Adrangi"/>
    <author fullname="M. Jones" initials="M." surname="Jones"/>
    <author fullname="A. Lior" initials="A." surname="Lior"/>
    <author fullname="B. Aboba" initials="B." surname="Aboba"/>
    <date month="August" year="2009"/>
    <abstract>
      <t>This document describes procedures for conveying access-network ownership and location information based on civic and geospatial location formats in Remote Authentication Dial-In User Service (RADIUS) and Diameter.</t>
      <t>The distribution of location information is a privacy-sensitive task. Dealing with mechanisms to preserve the user's privacy is important and is addressed in this document. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5580"/>
  <seriesInfo name="DOI" value="10.17487/RFC5580"/>
</reference>
<reference anchor="RFC6066">
  <front>
    <title>Transport Layer Security (TLS) Extensions: Extension Definitions</title>
    <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd"/>
    <date month="January" year="2011"/>
    <abstract>
      <t>This document provides specifications for existing TLS extensions. It is a companion document for RFC 5246, "The Transport Layer Security (TLS) Protocol Version 1.2". The extensions specified are server_name, max_fragment_length, client_certificate_url, trusted_ca_keys, truncated_hmac, and status_request. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6066"/>
  <seriesInfo name="DOI" value="10.17487/RFC6066"/>
</reference>
<reference anchor="RFC6071">
  <front>
    <title>IP Security (IPsec) and Internet Key Exchange (IKE) Document Roadmap</title>
    <author fullname="S. Frankel" initials="S." surname="Frankel"/>
    <author fullname="S. Krishnan" initials="S." surname="Krishnan"/>
    <date month="February" year="2011"/>
    <abstract>
      <t>Over the past few years, the number of RFCs that define and use IPsec and Internet Key Exchange (IKE) has greatly proliferated. This is complicated by the fact that these RFCs originate from numerous IETF working groups: the original IPsec WG, its various spin-offs, and other WGs that use IPsec and/or IKE to protect their protocols' traffic.</t>
      <t>This document is a snapshot of IPsec- and IKE-related RFCs. It includes a brief description of each RFC, along with background information explaining the motivation and context of IPsec's outgrowths and extensions. It obsoletes RFC 2411, the previous "IP Security Document Roadmap."</t>
      <t>The obsoleted IPsec roadmap (RFC 2411) briefly described the interrelationship of the various classes of base IPsec documents. The major focus of RFC 2411 was to specify the recommended contents of documents specifying additional encryption and authentication algorithms. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6071"/>
  <seriesInfo name="DOI" value="10.17487/RFC6071"/>
</reference>
<reference anchor="RFC6614">
  <front>
    <title>Transport Layer Security (TLS) Encryption for RADIUS</title>
    <author fullname="S. Winter" initials="S." surname="Winter"/>
    <author fullname="M. McCauley" initials="M." surname="McCauley"/>
    <author fullname="S. Venaas" initials="S." surname="Venaas"/>
    <author fullname="K. Wierenga" initials="K." surname="Wierenga"/>
    <date month="May" year="2012"/>
    <abstract>
      <t>This document specifies a transport profile for RADIUS using Transport Layer Security (TLS) over TCP as the transport protocol. This enables dynamic trust relationships between RADIUS servers. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6614"/>
  <seriesInfo name="DOI" value="10.17487/RFC6614"/>
</reference>
<reference anchor="RFC7268">
  <front>
    <title>RADIUS Attributes for IEEE 802 Networks</title>
    <author fullname="B. Aboba" initials="B." surname="Aboba"/>
    <author fullname="J. Malinen" initials="J." surname="Malinen"/>
    <author fullname="P. Congdon" initials="P." surname="Congdon"/>
    <author fullname="J. Salowey" initials="J." surname="Salowey"/>
    <author fullname="M. Jones" initials="M." surname="Jones"/>
    <date month="July" year="2014"/>
    <abstract>
      <t>RFC 3580 provides guidelines for the use of the Remote Authentication Dial-In User Service (RADIUS) within IEEE 802 local area networks (LANs). This document defines additional attributes for use within IEEE 802 networks and clarifies the usage of the EAP-Key-Name Attribute and the Called-Station-Id Attribute. This document updates RFCs 3580 and 4072.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7268"/>
  <seriesInfo name="DOI" value="10.17487/RFC7268"/>
</reference>
<reference anchor="RFC7296">
  <front>
    <title>Internet Key Exchange Protocol Version 2 (IKEv2)</title>
    <author fullname="C. Kaufman" initials="C." surname="Kaufman"/>
    <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
    <author fullname="Y. Nir" initials="Y." surname="Nir"/>
    <author fullname="P. Eronen" initials="P." surname="Eronen"/>
    <author fullname="T. Kivinen" initials="T." surname="Kivinen"/>
    <date month="October" year="2014"/>
    <abstract>
      <t>This document describes version 2 of the Internet Key Exchange (IKE) protocol. IKE is a component of IPsec used for performing mutual authentication and establishing and maintaining Security Associations (SAs). This document obsoletes RFC 5996, and includes all of the errata for it. It advances IKEv2 to be an Internet Standard.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="79"/>
  <seriesInfo name="RFC" value="7296"/>
  <seriesInfo name="DOI" value="10.17487/RFC7296"/>
</reference>
<reference anchor="RFC7585">
  <front>
    <title>Dynamic Peer Discovery for RADIUS/TLS and RADIUS/DTLS Based on the Network Access Identifier (NAI)</title>
    <author fullname="S. Winter" initials="S." surname="Winter"/>
    <author fullname="M. McCauley" initials="M." surname="McCauley"/>
    <date month="October" year="2015"/>
    <abstract>
      <t>This document specifies a means to find authoritative RADIUS servers for a given realm. It is used in conjunction with either RADIUS over Transport Layer Security (RADIUS/TLS) or RADIUS over Datagram Transport Layer Security (RADIUS/DTLS).</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7585"/>
  <seriesInfo name="DOI" value="10.17487/RFC7585"/>
</reference>
<reference anchor="RFC7593">
  <front>
    <title>The eduroam Architecture for Network Roaming</title>
    <author fullname="K. Wierenga" initials="K." surname="Wierenga"/>
    <author fullname="S. Winter" initials="S." surname="Winter"/>
    <author fullname="T. Wolniewicz" initials="T." surname="Wolniewicz"/>
    <date month="September" year="2015"/>
    <abstract>
      <t>This document describes the architecture of the eduroam service for federated (wireless) network access in academia. The combination of IEEE 802.1X, the Extensible Authentication Protocol (EAP), and RADIUS that is used in eduroam provides a secure, scalable, and deployable service for roaming network access. The successful deployment of eduroam over the last decade in the educational sector may serve as an example for other sectors, hence this document. In particular, the initial architectural choices and selection of standards are described, along with the changes that were prompted by operational experience.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7593"/>
  <seriesInfo name="DOI" value="10.17487/RFC7593"/>
</reference>
<reference anchor="RFC7170">
  <front>
    <title>Tunnel Extensible Authentication Protocol (TEAP) Version 1</title>
    <author fullname="H. Zhou" initials="H." surname="Zhou"/>
    <author fullname="N. Cam-Winget" initials="N." surname="Cam-Winget"/>
    <author fullname="J. Salowey" initials="J." surname="Salowey"/>
    <author fullname="S. Hanna" initials="S." surname="Hanna"/>
    <date month="May" year="2014"/>
    <abstract>
      <t>This document defines the Tunnel Extensible Authentication Protocol (TEAP) version 1. TEAP is a tunnel-based EAP method that enables secure communication between a peer and a server by using the Transport Layer Security (TLS) protocol to establish a mutually authenticated tunnel. Within the tunnel, TLV objects are used to convey authentication-related data between the EAP peer and the EAP server.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7170"/>
  <seriesInfo name="DOI" value="10.17487/RFC7170"/>
</reference>
<reference anchor="RFC8446">
  <front>
    <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
    <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
    <date month="August" year="2018"/>
    <abstract>
      <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
      <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8446"/>
  <seriesInfo name="DOI" value="10.17487/RFC8446"/>
</reference>
<reference anchor="RFC8952">
  <front>
    <title>Captive Portal Architecture</title>
    <author fullname="K. Larose" initials="K." surname="Larose"/>
    <author fullname="D. Dolson" initials="D." surname="Dolson"/>
    <author fullname="H. Liu" initials="H." surname="Liu"/>
    <date month="November" year="2020"/>
    <abstract>
      <t>This document describes a captive portal architecture. Network provisioning protocols such as DHCP or Router Advertisements (RAs), an optional signaling protocol, and an HTTP API are used to provide the solution.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8952"/>
  <seriesInfo name="DOI" value="10.17487/RFC8952"/>
</reference>
<reference anchor="RFC9364">
  <front>
    <title>DNS Security Extensions (DNSSEC)</title>
    <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
    <date month="February" year="2023"/>
    <abstract>
      <t>This document describes the DNS Security Extensions (commonly called "DNSSEC") that are specified in RFCs 4033, 4034, and 4035, as well as a handful of others. One purpose is to introduce all of the RFCs in one place so that the reader can understand the many aspects of DNSSEC. This document does not update any of those RFCs. A second purpose is to state that using DNSSEC for origin authentication of DNS data is the best current practice. A third purpose is to provide a single reference for other documents that want to refer to DNSSEC.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="237"/>
  <seriesInfo name="RFC" value="9364"/>
  <seriesInfo name="DOI" value="10.17487/RFC9364"/>
</reference>

<reference anchor="TS23003" target="https://www.3gpp.org/ftp/Specs/archive/23_series/23.003/23003-i10.zip">
  <front>
    <title>3GPP 23.003: Numbering, addressing and identification v18.1.0</title>
    <author initials="" surname="3GPP">
      <organization></organization>
    </author>
    <date year="2023" month="March" day="28"/>
  </front>
</reference>
<reference anchor="GSMAIR67" target="https://www.gsma.com/newsroom/wp-content/uploads//IR.67-v21.0.pdf">
  <front>
    <title>GSMA IR.67: DNS Guidelines for Service Providers and GRX and IPX Providers</title>
    <author initials="" surname="GSMA">
      <organization></organization>
    </author>
    <date year="2022" month="November" day="25"/>
  </front>
</reference>
<reference anchor="PASSPOINT" target="https://www.wi-fi.org/discover-wi-fi/passpoint">
  <front>
    <title>Wi-Fi Alliance Passpoint</title>
    <author initials="" surname="Wi-Fi Alliance">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="ISO3166" target="https://www.iso.org/standard/72483.html">
  <front>
    <title>Codes for the representation of names of countries and their subdivisions</title>
    <author initials="" surname="ISO 3166-2:2020">
      <organization></organization>
    </author>
    <date year="2020" month="August"/>
  </front>
</reference>
<reference anchor="ISO29115" >
  <front>
    <title>Information technology - Security techniques: Entity authentication assurance framework</title>
    <author initials="" surname="ISO/IEC 29115">
      <organization></organization>
    </author>
    <date year="2013" month="April"/>
  </front>
</reference>
<reference anchor="ORPRIVACY" target="https://wballiance.com/openroaming/privacy-policy/">
  <front>
    <title>OpenRoaming End-User Privacy Policy</title>
    <author initials="" surname="Wireless Broadband Alliance">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="ORTERMS" target="https://wballiance.com/openroaming/toc/">
  <front>
    <title>OpenRoaming End User Terms and Conditions</title>
    <author initials="" surname="Wireless Broadband Alliance">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="PEAP" target="https://winprotocoldocs-bhdugrdyduf5h2e4.b02.azurefd.net/MS-PEAP/%5bMS-PEAP%5d.pdf">
  <front>
    <title>Protected Extensible Authentication Protocol (PEAP)</title>
    <author initials="" surname="Microsoft Corporation">
      <organization></organization>
    </author>
    <date year="2024" month="April"/>
  </front>
</reference>
<reference anchor="WBAVSA" target="https://github.com/wireless-broadband-alliance/RADIUS-VSA">
  <front>
    <title>Vendor Specific Attributes</title>
    <author initials="" surname="Wireless Broadband Alliance">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="IEEE80211" target="https://standards.ieee.org/ieee/802.11/5536/">
  <front>
    <title>Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications</title>
    <author initials="" surname="IEEE">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="WBAEIPP" target="https://wballiancec.wpenginepowered.com/wp-content/uploads/2021/02/IMSI_Privacy_Protection_for_Wi-Fi_Technical_Specification_v1.1.0_Revision_FINAL.pdf">
  <front>
    <title>WBA Enhanced IMSI Privacy Protection</title>
    <author initials="" surname="Wireless Broadband Alliance">
      <organization></organization>
    </author>
    <date year="2022" month="August"/>
  </front>
</reference>
<reference anchor="E212" target="https://www.itu.int/itu-t/recommendations/rec.aspx?rec=E.212">
  <front>
    <title>The international identification plan for public networks and subscriptions</title>
    <author initials="" surname="ITU-T Study Group 2">
      <organization></organization>
    </author>
    <date year="2024" month="June"/>
  </front>
</reference>
<reference anchor="WBAPKICP" target="https://wballiance.com/openroaming/pki-repository/">
  <front>
    <title>WBA PKI Certificate Policy v4.0.0</title>
    <author initials="" surname="Wireless Broadband Alliance">
      <organization></organization>
    </author>
    <date year="2024" month="April"/>
  </front>
</reference>


    </references>

</references>


<?line 1254?>

<section anchor="sig"><name>Example OpenRoaming Signalling Flow</name>

<t>An example signalling flow for OpenRoaming is illustrated in <xref target="figsigflow"/>.</t>

<t><list style="numbers" type="1">
  <t>In step 1, the WLAN is configured with Passpoint information and includes
configured RCOIs in its beacon.</t>
  <t>The beacon can only contain 3 RCOIs and so if none of the RCOIs match a
profile provisioned in the device, the device queries for the list of RCOIs supported.</t>
  <t>If the list includes an RCOI that matches a configured profile in the device, then device
sends an EAPOL Start message to the authenticator.</t>
  <t>The authenticator in the AP/WLC requests the EAP-Identity of the device.</t>
  <t>The device responds with its EAP-Identity, which is a user@realm Network Access Identifier (NAI)</t>
  <t>The NAS in the WLC/AP embeds the NAI in the user-name attribute in a RADIUS Access-Request packet and forwards to the configured RadSec client.</t>
  <t>The RadSec client recovers the realm from the NAI/user-name attribute and performs a DNS-based dynamic peer discovery.</t>
  <t>The RadSec client established an mTLS authenticated TLS session with the discovered peer using certificates issued by the WBA PKI.</t>
  <t>Once TLS is established, the RadSec client forwards the Access-Request to the RadSec server.</t>
  <t>If the EAP Server is not co-located with the RadSec server, the RadSec server proxies the Access-Request to the EAP-Server.</t>
  <t>The EAP-Server continues the EAP dialogue with the EAP Supplicant in the device using a Passpoint defined EAP method.</t>
  <t>Following successful authentication, the EAP-Server responds with an Access-Accept packet containing the EAP-SUCCESS message and the keying material generated through the EAP method to secure the Wi-Fi session.</t>
  <t>The Access-Accept packet is forwarded back to the RadSec client.</t>
  <t>The RadSec client forwards the Access-Accept packet to the NAS in the AP/WLC.</t>
  <t>The AP/WLC recovers the keying material from the Access-Accept packet and forwards the EAP-SUCCESS message to the device.</t>
  <t>The keying material is used to secure the Wi-Fi interface between the device and AP/WLC.</t>
  <t>The AP/WLC generates a RADIUS Accounting-Request packet with Acct-Status-Type Start which is forwarded to the RadSec client.</t>
  <t>The RadSec client forwards the Accounting-Request packet over the TLS tunnel to the RadSec server.</t>
  <t>The RadSec server can forward the Accounting-Request packet to the EAP-Server.</t>
</list></t>

<ul empty="true"><li>
  <t>20-22. After the Wi-Fi session terminates, an Accounting-Request message with Acct-Status-Type Stop is proxied towards the RadSec Server.</t>
</li></ul>

<figure title="Example OpenRoaming Signalling Flow" anchor="figsigflow"><artwork><![CDATA[
+------+    +------+    +------+    +------+    +------+    +------+
|      |    |Wi-Fi |    |RadSec|    |      |    |RadSec|    |  EAP |
|Device|    |AP/WLC|    |Client|    | DNS  |    |Server|    |Server|
+------+    +------+    +------+    +------+    +------+    +------+
   | 1) Beacon |           |           |           |           |
   |<----------|           |           |           |           |
   | 2) ANQP   |           |           |           |           |   
   | Query     |           |           |           |           |   
   |<--------->|           |           |           |           |   
   | 3) EAPOL  |           |           |           |           |
   | Start     |           |           |           |           |
   |---------->|           |           |           |           |
   | 4) EAP-ID |           |           |           |           |
   | Request   |           |           |           |           |
   |<----------|           |           |           |           |
   | 5) EAP-ID | 6) RADIUS |           |           |           |
   | Response  | Access-   | 7) DNS    |           |           |
   |---------->| Request   | Query     |           |           |
   |           |---------->| NAPTR,SRV,|           |           |
   |           |           | A/AAAA    |           |           |
   |           |           | Records   |           |           |
   |           |           |<--------->|           |           |
   |           |           | 8) mTLS   |           |           |
   |           |           |<--------------------->|           |
   |           |           | 9) RadSec |           |           |
   |           |           | Access-Request        |           |
   |           |           |---------------------->|           |
   |           |           |           |           | 10) RADIUS|
   |           |           |           |           | Access-   |
   |           |           |           |           | Request   |
   |           |           |           |           |---------->|
   |           |         11) EAP Dialogue          |           |
   |<--------------------------------------------------------->|
   |           |           |           |           | 12) RADIUS|
   |           |           |           |           | Access-   |
   |           | 14) RADIUS|           |           | Accept    |
   |           | Access-   |           |           | (EAP-     |
   |           | Accept    | 13) RadSec Access-    | SUCCESS)  |   
   |           | (EAP-     | Accept (EAP-SUCCESS)  |<----------|
   | 15) EAP-  | SUCCESS)  |<----------------------|           |
   | SUCCESS   |<----------|           |           |           |
   |<----------|           |           |           |           |
 +---------------+         |           |           |           |
 | 16) Secured   |         |           |           |           |
 |  OpenRoaming  17) RADIUS|           |           |           |
 |    Service    Accounting|           |           |           |
 |               Request   |           |           | 19) RADIUS|
 |               (Start)   | 18) RadSec Accounting | Accounting|
 |               |-------->| -Request (Start)      | Request   |
 |               |         |---------------------->| (Start)   |
 |               |         |           |           |---------->|
 +---------------+         |           |           |           |
   |           | 20) RADIUS|           |           |           |
   |           | Accounting|           |           |           |
   |           | Request   |           |           | 22) RADIUS|
   |           | (Stop)    | 21) RadSec Accounting | Accounting|
   |           |---------->| -Request (Stop)       | Request   |
   |           |           |---------------------->| (Stop)    |
   |           |           |           |           |---------->|   
+------+    +------+    +------+    +------+    +------+    +------+
|Device|    |Wi-Fi |    |RadSec|    | DNS  |    |RadSec|    |  EAP |
|      |    |AP/WLC|    |Client|    |      |    |Server|    |Server|
+------+    +------+    +------+    +------+    +------+    +------+
]]></artwork></figure>

</section>
<section anchor="rcoi"><name>Example OpenRoaming RCOI Usage</name>

<t>This Annex illustrates the use of OpenRoaming RCOIs to enforce different policies
in the OpenRoaming federation, ensuring that when there is a policy mismatch
between the device and access network, that the device will avoid triggering
an authentication exchange that would subsequently have to be rejected because
of policy enforcement decisions.</t>

<section anchor="openroaming-rcoi-based-policy-for-supporting-qos-tiers"><name>OpenRoaming RCOI based policy for supporting QoS tiers</name>

<t><xref target="figqosrcoi"/> illustrates the use of OpenRoaming RCOIs for
supporting the standard (bronze) and silver QoS tiers across the federation.
The figure shows two different devices:</t>

<t><list style="symbols">
  <t>Device 1 has been provisioned by its IDP to require the basic bronze QoS policy.</t>
  <t>Device 2 has been provisioned by its IDP to require the silver tier of QoS handling.</t>
</list></t>

<t>The figure also shows illustrates the RCOI configuration of two ANP Access Networks:</t>

<t><list style="symbols">
  <t>ANP#1 is configured to support the silver tier of QoS handling corresponding to the silver RCOI. Because the network requirements associated with the silver tier are a superset of the bronze QoS tier, the ANP also configures the bronze RCOI on its Wi-Fi access network.</t>
  <t>ANP#2 is only configured to support the standard (bronze) QoS tier and as such only configures the RCOI corresponding to the bronze QoS tier on its Wi-Fi access network.</t>
</list></t>

<t>The figure shows how normal Passpoint RCOI matching rules can be used to ensure that devices only trigger authentication with ANP access networks which support the required QoS tier according to the device's policy.</t>

<figure title="Use of OpenRoaming RCOIs to realize QoS policies" anchor="figqosrcoi"><artwork><![CDATA[

+----------------------+      +----------------------+  
|OpenRoaming Device #1 |      |OpenRoaming Device #2 |  
| Bronze Service Level |      | Silver Service Level |   
| +------------------+ |      | +------------------+ |      
| |Passpoint Profile | |      | |Passpoint Profile | |     
| |   Bronze RCOI    | |      | |   Silver RCOI    | |              
| +------------------+ |      | +------------------+ |           
|     /|\        /|\   |      |           /|\        |      
+------|----------|----+      +------------|---------+         
       |          |                        |                   
       |          |                        |                    
       |          |                        | RCOI                
       |          |                        | Match                 
       |     +-----------------------------+                 
  RCOI |     |    |                                          
 Match |     |    |                                              
       |     |    |                                        
       |     |    +------------------------+                  
       |     |                             | RCOI           
       |     |                             | Match         
       |     |                             |              
      \|/   \|/                           \|/           
+----------------------+       +----------------------+   
|  OpenRoaming ANP#1   |       |  OpenRoaming ANP#2   |  
|      Silver QoS      |       |      Bronze QoS      |     
|   +--------------+   |       |   +--------------+   |   
|   |     WLAN     |   |       |   |     WLAN     |   |   
|   | Bronze RCOI  |   |       |   | Bronze RCOI  |   |    
|   | Silver RCOI  |   |       |   |              |   |   
|   +--------------+   |       |   +--------------+   |  
+----------------------+       +----------------------+

]]></artwork></figure>

</section>
<section anchor="openroaming-rcoi-based-policy-for-supporting-identity-type-policies"><name>OpenRoaming RCOI based policy for supporting identity type policies</name>

<t><xref target="figidtypercoi"/> illustrates the use of OpenRoaming RCOIs for supporting different identity type policies across the federation. The figure shows two different devices:</t>

<t><list style="symbols">
  <t>Device#1 has been provisioned by an IDP corresponding to a service provider. It provisions the device's Passpoint profile with the RCOI policy identifying the service provider ID-type policy as well as the "any ID-type"  RCOI policy.</t>
  <t>Device 2 has been provisioned by a IDP corresponding to a hospitality provider. It provisions the device's Passpoint profile with the RCOI policy identifying the hospitality ID-type policy as well as the "any ID-type" RCOI policy.</t>
</list></t>

<t>The figure also shows the RCOI configuration of three different ANP Access Networks:</t>

<t><list style="symbols">
  <t>ANP#1 only supports access using service provider type-IDs and so has configured the service provider ID-type policy RCOI.</t>
  <t>ANP#2 supports access from all identity types and so has configured the any ID-type policy RCOI.</t>
  <t>ANP#3 only supports access using hospitality type IDs and so has configured the hospitality ID-type policy RCOI.</t>
</list></t>

<t>The figure shows how normal Passpoint RCOI matching rules can be used to ensure that devices only trigger authentication with ANP access networks which support the required identity types according to the ANP's policy.</t>

<figure title="Use of OpenRoaming RCOIs to realize ID-Type policies" anchor="figidtypercoi"><artwork><![CDATA[


+----------------------------+   +-----------------------------+                                                 
|   OpenRoaming Device #1    |   |    OpenRoaming Device #2    |                                                 
|  IDP is Service Provider   |   | IDP is Hospitality Provider |                                                 
|+------------++------------+|   |+------------++------------+ |                                                 
|| Passpoint  || Passpoint  ||   || Passpoint  || Passpoint  | |                                                 
||  Profile   ||  Profile   ||   ||  Profile   ||  Profile   | |                                                 
||     SP     ||Any ID-Type ||   ||Any ID-Type || Hospitality| |                                                 
||ID-Type RCOI||    RCOI    ||   ||   RCOI     ||ID-Type RCOI| |                                                 
|+------------++------------+|   |+------------++------------+ |                                                 
|      /|\          /|\      |   |       /|\        /|\        |                                                 
+-------|------------|-------+   +-------------------|---------+                                                 
        |            |                    |          |                                                           
        |            |                    |          |                                                           
        |            |                    |          |                                                           
        |            |                    |          |                                                           
        | RCOI       | RCOI               | RCOI     | RCOI                                                      
        | Match      | Match              | Match    | Match                                                     
        |            |                    |          |                                                           
        |            +-----+        +-----+          |                                                           
        |                  |        |                |                                                           
        |                  |        |                |                                                           
        |                  |        |                |                                                           
        |                  |        |                |                                                           
        |                  |        |                |                                                           
       \|/                \|/      \|/              \|/                                                          
+------------------+  +------------------+  +------------------+                                                 
|OpenRoaming ANP#1 |  |OpenRoaming ANP#2 |  |OpenRoaming ANP#3 |                                                 
|  Only accepts    |  |    Accepts all   |  |   Only accepts   |                                                 
| Service Provider |  |     ID-Types     |  |    Hospitality   |                                                 
|     ID-Types     |  |                  |  |     ID-Types     |                                                 
| +--------------+ |  | +--------------+ |  | +--------------+ |                                                 
| |     WLAN     | |  | |     WLAN     | |  | |     WLAN     | |                                                 
| |  SP ID-Type  | |  | | Any ID-Type  | |  | |  Hospitality | |                                                 
| |     RCOI     | |  | |     RCOI     | |  | | ID-Type RCOI | |                                                 
| +--------------+ |  | +--------------+ |  | +--------------+ |                                                 
+------------------+  +------------------+  +------------------+    


]]></artwork></figure>

</section>
<section anchor="openroaming-rcoi-based-policy-for-supporting-different-identity-proofing-policies"><name>OpenRoaming RCOI based policy for supporting different identity proofing policies</name>

<t><xref target="figidproofrcoi"/> illustrates the use of OpenRoaming RCOIs for supporting different
identity proofing policies across the federation. The figure shows two different devices:</t>

<t><list style="symbols">
  <t>Device 1 has been provisioned by an IDP that uses enhanced identity proofing controls that meet the enhanced OpenRoaming requirements, equivalent to LoA 3 in <xref target="ISO29115"/>. Because the enhanced identity proofing requirements are a superset of the requirements of the baseline identity proofing policy, the IDP also configures the use of the RCOI with baseline identity proofing.</t>
  <t>Device 2 has been provisioned by an IDP that uses identity proofing with controls that meet the baseline OpenRoaming requirements.</t>
</list></t>

<t>The figure also shows the RCOI configuration of two ANP Access Networks:</t>

<t><list style="symbols">
  <t>ANP#1 is operated in a geography where regulations require support of enhanced identity proofing.</t>
  <t>ANP#2 is operated in a geography where regulations permit support of authentications with identities managed using the OpenRoaming baseline identity proofing requirements.</t>
</list></t>

<t>The figure shows how normal Passpoint RCOI matching rules can be used to ensure that devices only trigger authentication with ANP access networks which support the required identity proofing according to the ANP's policy.</t>

<figure title="Use of OpenRoaming RCOIs to realize identity proofing policies" anchor="figidproofrcoi"><artwork><![CDATA[

+----------------------------+   +-----------------------------+                                                 
|    OpenRoaming Device #1   |   |    OpenRoaming Device #2    |                                                 
|     IDP uses enhanced      |   |     IDP uses baseline       |                                                 
|     identity proofing      |   |     identity proofing       |                                                 
|+------------++------------+|   |       +------------+        |                                                 
|| Passpoint  ||  Passpoint ||   |       |  Passpoint |        |                                                 
||  Profile   ||   Profile  ||   |       |   Profile  |        |                                                 
||Enhanced LoA||Baseline LoA||   |       |Baseline LoA|        |                                                 
||    RCOI    ||    RCOI    ||   |       |    RCOI    |        |                                                 
|+------------++------------+|   |       +------------+        |                                                 
|      /|\          /|\      |   |             /|\             |                                                 
+-------|------------|-------+   +--------------|--------------+                                                 
        |            |                          |                                                                
        |            |                          |                                                                
        |            |                          |                                                                
        | RCOI       | RCOI                     | RCOI                                                           
        | Match      | Match                    | Match                                                          
        |            |                          |                                                                
        |            |                          |                                                                
        |            +--------------------+     +-----+                                                          
        |                                 |           |                                                          
        |                                 |           |                                                          
        |                                 |           |                                                          
        |                                 |           |                                                          
        |                                 |           |                                                          
       \|/                               \|/         \|/                                                         
   +------------------------+       +------------------------+                                                   
   |   OpenRoaming ANP#1    |       |   OpenRoaming ANP#2    |                                                   
   | Operates in a country  |       | Operates in a country  |                                                   
   |  where the regulator   |       |  where the regulator   |                                                   
   |   requires enhanced    |       |   permits baseline     |                                                   
   |   identity proofing    |       |   identity proofing    |                                                   
   |    +--------------+    |       |    +--------------+    |                                                   
   |    |     WLAN     |    |       |    |     WLAN     |    |                                                   
   |    | Enhanced LoA |    |       |    | Baseline LoA |    |                                                   
   |    |     RCOI     |    |       |    |     RCOI     |    |                                                   
   |    +--------------+    |       |    +--------------+    |                                                   
   +------------------------+       +------------------------+                                                     


]]></artwork></figure>

</section>
</section>
<section anchor="legal"><name>OpenRoaming legal framework</name>

<section anchor="seamless-experience"><name>Seamless experience</name>

<t>In order for OpenRoaming to avoid the need for end-users to
be presented with and accept legal terms and conditions covering their
use of the Wi-Fi hotspot service, there needs to be a legal framework in place.</t>

</section>
<section anchor="openroaming-organization"><name>OpenRoaming Organization</name>

<t>The federation is based on a legal framework that comprises a set of policies,
templated agreements and immutable terms as agreed to by the WBA and its membership.
The framework defines a hierarchy of roles, responsibilities and relationships that
are designed to enable the federation to scale to millions of Wi-Fi access networks.</t>

<t><xref target="figorg"/> shows the
relationships between WBA, OpenRoaming Brokers, who are members of the WBA that
have agreed terms with WBA to perform the OpenRoaming broker role and the OpenRoaming providers.
OpenRoaming brokers agree terms with OpenRoaming Providers that can act as Access Network
Providers (ANPs) and/or Identity Providers (IDPs). OpenRoaming providers do not have
to be members of the WBA to provide OpenRoaming services. Finally, OpenRoaming IDPs
agree terms with OpenRoaming end-users who then benefit from seamless authentication onto
the Wi-Fi networks deployed by the different OpenRoaming ANPs.</t>

<figure title="Organization of the OpenRoaming Federation" anchor="figorg"><artwork><![CDATA[
                            +----------+                   
                            | Wireless |                      
                            | Broadband|                        
                            | Alliance |                         
                            +----------+                       
                              /|\  /|\                        
                               |    |                         
                          Agrees terms with                    
                               |    |                              
          +-----------+        |    |        +-----------+        
          |OpenRoaming|<-------+    +------->|OpenRoaming|       
          |Broker     |                      |Broker     |      
          +-----------+                      +-----------+       
             /|\  /|\                           /|\  /|\         
              |    |                             |    |        
         Agrees terms with                  Agrees terms with     
              |    |                             |    |           
        +-----+    +-----+                 +-----+    +-----+     
        |                |                 |                |    
       \|/              \|/               \|/              \|/     
+-----------+     +-----------+     +-----------+     +-----------+
|OpenRoaming|     |OpenRoaming|     |OpenRoaming|     |OpenRoaming|
|Access     |     |Identity   |     |Identity   |     |Access     |
|Network    |     |Provider   |     |Provider   |     |Network    |
|Provider   |     |           |     |           |     |Provider   |
+-----------+     +-----------+     +-----------+     +-----------+
                   /|\  /|\            /|\  /|\      
                    |    |              |    |       
               Agrees terms with   Agrees terms with
                    |    |              |    |       
      +-------------+    |              |    +-------------+       
      |                  |              |                  |       
     \|/                \|/            \|/                \|/      
+-----------+     +-----------+     +-----------+      +-----------+
|OpenRoaming|     |OpenRoaming|     |OpenRoaming|      |OpenRoaming|
|End-User   |     |End-User   |     |End-User   |      |End-User   |
+-----------+     +-----------+     +-----------+      +-----------+

]]></artwork></figure>

</section>
<section anchor="openroaming-legal-terms"><name>OpenRoaming legal terms</name>

<t>In OpenRoaming there is no direct agreement between individual ANPs and individual
IDPs or between end-users and ANPs. As a consequence, OpenRoaming brokers
agree to use certain federation-specific terms in their agreements with
OpenRoaming providers.</t>

<t>This arrangement ensures that all ANPs agree to abide by the OpenRoaming
privacy policy <xref target="ORPRIVACY"/> and all end-users agree to abide by the
OpenRoaming end-user Terms and Conditions <xref target="ORTERMS"/>.</t>

</section>
</section>
<section numbered="false" anchor="Changelog"><name>Changelog</name>
<t><list style="symbols">
  <t>01 - added details of WBA-Custom-SLA for OpenRoaming ANP networks that signal using
<xref target="RFC7268"/> that they operate on a vehicular platform. Added clarifications regarding use
of direct and indirect names in certificate validation.</t>
  <t>02 - added details of OpenRoaming protection of end-user privacy, including WRIX recommendations
on use of correlation identifiers in RADIUS Access-Accept packet that may unintentionally weaken
end-user privacy.</t>
  <t>03 - updated DNSsec reference. Added section on interworking with other federations.</t>
  <t>04 - updated PKI Policy OID to reflect new certificate chain. Added IDP availability requirements.
Added session-timeout requirements. Added new onboarding capabilities for short lived credentials. Added text concerning OpenRoaming Privacy Policy and restrictions on location usage.</t>
  <t>05 - added new section on use of Reply-Message, added new text on troubleshooting, clarified RADIUS accounting handling, clarified CUI usage in Access-Accept, clarified use of EAP types.</t>
  <t>06 - corrected ePDG FQDN. Added missing enhanced Reply-Message for cause-code = 45. Added new text regarding recommended best practice for firewall deployment on public Internet facing interfaces should be followed for ANP RADSEC connections and for protecting End-Users.</t>
</list></t>

</section>
<section numbered="false" anchor="Acknowledgements"><name>Acknowledgements</name>

<t>The authors would like to thank all the members of the WBA's OpenRoaming Workgroup
who help define the OpenRoaming specifications.</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

