Key Management Interoperability Protocol Tape Library Profile Version 1.0

Size: px
Start display at page:

Download "Key Management Interoperability Protocol Tape Library Profile Version 1.0"

Transcription

1 Key Management Interoperability Protocol Tape Library Profile Version 1.0 Working Draft April 2013 Technical Committee: OASIS Key Management Interoperability Protocol (KMIP) TC Chairs: Robert Griffin EMC Corporation Subhash Sankuratripati NetApp Editors: Tim Hudson Cryptsoft Stan Feather Hewlett-Packard Rod Wideman Quantum Related work: This specification is related to: Key Management Interoperability Protocol Profiles Version October OASIS Standard. Key Management Interoperability Protocol Specification Version January OASIS Standard. Abstract: Describes a profile for Tape Libraries as KMIP clients interacting with KMIP servers Status: This Working Draft (WD) has been produced by one or more TC Members; it has not yet been voted on by the TC or approved as a Committee Draft (Committee Specification Draft or a Committee Note Draft). The OASIS document Approval Process begins officially with a TC vote to approve a WD as a Committee Draft. A TC may approve a Working Draft, revise it, and reapprove it any number of times as a Committee Draft. Copyright OASIS Open All Rights Reserved. All capitalized terms in the following text have the meanings assigned to them in the OASIS Intellectual Property Rights Policy (the "OASIS IPR Policy"). The full Policy may be found at the OASIS website. This document and translations of it may be copied and furnished to others, and derivative works that comment on or otherwise explain it or assist in its implementation may be prepared, copied, published, and distributed, in whole or in part, without restriction of any kind, provided that the above copyright notice and this section are included on all such copies and derivative works. However, this document itself may not be modified in any way, including by removing the copyright notice or references to OASIS, except as needed for the purpose of developing any document or deliverable produced by an OASIS Technical Committee (in which case the rules applicable to copyrights, as set forth in the OASIS IPR Policy, must be followed) or as required to translate it into languages other than English. The limited permissions granted above are perpetual and will not be revoked by OASIS or its successors or assigns. This document and the information contained herein is provided on an "AS IS" basis and OASIS DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY OWNERSHIP RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Standards Track Draft Copyright OASIS Open All Rights Reserved. Page 1 of 17

2 Table of Contents 1 Introduction Terminology Normative References Non-Normative References Tape Library Profile Authentication Suite Baseline Tape Library Using Application Specific Information for Key Identifiers Tape Library Profile Test Cases Mandatory Test Cases... 8 TL-M-1 - Configuration... 8 TL-M-2 - Write with new (Created) Key... 9 TL-M-3 - Read from Tape TL-M-4 Appended Write Optional Test Cases Appendix A. Acknowledgments Standards Track Draft Copyright OASIS Open All Rights Reserved. Page 2 of 17

3 1 Introduction For normative definition of the elements of KMIP see the KMIP Specification ([KMIP-SPEC-1_0 and KMIP-SPEC-1_1]) and the KMIP Profiles ([KMIP-PROF-1_0 and KMIP-PROF-1_1]). Illustrative guidance for the implementation of KMIP clients and servers is provided in the KMIP Usage Guide ([KMIP-UG]) and KMIP Use Cases ([KMIP-UC]) and KMIP Test Cases ([KMIP-TC]). This profile defines the necessary KMIP functionality that a Tape Library operating as a KMIP client SHALL use and a KMIP server conforming to this profile SHALL support in order to interoperate in conformance with this profile. 1.1 Terminology The key words MUST, MUST NOT, REQUIRED, SHALL, SHALL NOT, SHOULD, SHOULD NOT, RECOMMENDED, MAY, and OPTIONAL in this document are to be interpreted as described in [RFC2119]. Key Associated Data (KAD) Hexadecimal Numeric Characters N(a) N(u) Part of the tape format. May be segmented into authenticated and unauthenticated fields. KAD usage is detailed in the SCSI SSC-3 standard from the T10 organization available as ANSI INCITS Case-sensitive, printable, single byte ASCII characters representing the numbers 0 through 9 and uppercase alpha A through F. (US-ASCII characters 30h-39h and 41h-46h). Each byte (single 8-bit numeric value) is represented as two hexadecimal numeric characters with the highnibble represented by the first (left-most) hexadecimal numeric character and the low-nibble represented by the second (right-most) hexadecimal numeric character. The maximum number of bytes in the tape authenticated KAD field. For LTO4, N(a) is 12 bytes. For LTO5, N(a) is 60 bytes. The maximum number of bytes in the tape unauthenticated KAD field. For LTO4, N(u) is 32 bytes. For LTO5, N(u) is 32 bytes. N(k) The maximum number of bytes in the tape format KAD fields i.e. N(a) + N(u). For LTO4, N(k) is 44 bytes. For LTO5, N(k) is 92 bytes. 1.2 Normative References [RFC2119] S. Bradner, Key words for use in RFCs to Indicate Requirement Levels, IETF RFC 2119, March [RFC2246] T. Dierks and C. Allen, The TLS Protocol, Version 1.0, IETF RFC 2246, Jan 1999, [KMIP-SPEC-1_0] Key Management Interoperability Protocol Specification Version OASIS Standard, October Standards Track Draft Copyright OASIS Open All Rights Reserved. Page 3 of 17

4 [KMIP-SPEC-1_1] Key Management Interoperability Protocol Specification Version Candidate OASIS Standard September [KMIP-PROF-1_0] Key Management Interoperability Protocol Usage Guide Version OASIS Standard. 1 October [KMIP-PROF-1_1] Key Management Interoperability Protocol Usage Guide Version Candidate OASIS Standard September Non-Normative References [KMIP-UG] Key Management Interoperability Protocol Usage Guide Version Committee Note Draft, 1 December 2011, [KMIP-TC] Key Management Interoperability Protocol Test Cases Version Committee Note Draft, 1 December [KMIP-UC] Key Management Interoperability Protocol Use Cases Version doc, Committee Specification, 15 June Standards Track Draft Copyright OASIS Open All Rights Reserved. Page 4 of 17

5 2 Tape Library Profile The Tape Library Profile is a tape library operating as a KMIP client interacting with a KMIP server. 2.1 Authentication Suite Implementations conformant to this profile SHALL support at least one of the Authentication Suites defined within section 3 of KMIP Profiles ([KMIP-PROF-1_0] and/or [KMIP-PROF-1_1]). The establishment of the trust relationship between the KMIP client and the KMIP server is the same as the defined base profiles for the version of the profile supported. 2.2 Baseline Tape Library KMIP clients conformant to this profile: 1. SHALL conform to the KMIP Baseline Client profile in KMIP Profiles ([KMIP-PROF-1_0] and/or [KMIP-PROF-1_1]) and the KMIP Specification [KMIP-SPEC-1_0] and/or [KMIP-SPEC-1_1] 2. SHALL support Application Specific Information with Application Data provided by the client in accordance with the algorithm specified in this profile. 3. SHOULD NOT use custom attributes that duplicate information that is already in standard KMIP attributes 4. MAY use x-barcode as the custom attribute of type Textstring to store the barcode KMIP servers conformant to this profile SHALL: 1. Conform to the KMIP Baseline Server profile in KMIP Profiles ([KMIP-PROF-1_0] and/or [KMIP- PROF-1_1]) and the KMIP Specification [KMIP-SPEC-1_0] and/or [KMIP-SPEC-1_1] 2. Support the following additional objects a. Symmetric Key ([KMIP-SPEC-1_0] and/or [KMIP-SPEC-1_1] 2.2.2) 3. Support the following client-to-server operations: a. Create ([KMIP-SPEC-1_0] and/or [KMIP-SPEC-1_1] 4.1) 4. Support the following subsets of enumerated attributes: a. Cryptographic Algorithm Enumeration ([KMIP-SPEC-1_0] and/or [KMIP-SPEC- 1_1] ) i. AES b. Object Type Enumeration ([KMIP-SPEC-1_0] and/or [KMIP-SPEC-1_1] ) i. Symmetric Key c. Key Format Type Enumeration ([KMIP-SPEC-1_0] and/or [KMIP-SPEC-1_1] ) i. Raw d. Cryptographic Length ([KMIP-SPEC-1_0] and/or [KMIP-SPEC-1_1] 3.5) i. 256-bit 5. Support the following subsets of Name Types ([KMIP-SPEC-1_0] 3.2 and and/or [KMIP-SPEC-1_1] 3.2 and ) a. Uninterpreted Text String 6. Support custom attributes (client specified x-customattributename) with the following data types and properties: a. TextString Standards Track Draft Copyright OASIS Open All Rights Reserved. Page 5 of 17

6 b. Integer c. DateTime 7. Support a minimum length of 256 characters for custom attribute values where the custom attribute type is of variable length. 8. Support a minimum of 30 custom attributes per managed object 9. Support a minimum of 64 characters in customer attribute names 10. Support a Batch Order Option ([KMIP-SPEC-1_0] and/or [KMIP-SPEC-1_1] 6.12) setting of True. 11. Support a Batch Count ([KMIP-SPEC-1_0] and/or [KMIP-SPEC-1_1] 6.14) setting of at least Support the Test Library Profile Test Cases returning results consistent with the test cases. 13. Optionally support any clause within [KMIP-SPEC-1_0] and/or [KMIP-SPEC-1_1] that is not listed above 14. Optionally support extensions outside the scope of this standard (e.g., vendor extensions, conformance clauses) that do not contradict any KMIP requirements. 2.3 Using Application Specific Information for Key Identifiers This information applies to Tape Libraries that support usage of the Application Specific Information attribute to store key identifiers. The Application Specific Information (ASI) attribute SHALL be used to store data that is specific to the application (tape library) using the object. The following Application Namespaces are recommended and SHOULD be used in the Application Namespace field of the Application Specific Information attribute: LIBRARY-LTO, LIBRARY-LTO4, LIBRARY-LTO5, and LIBRARY-LTO6 For backwards compatibility with deployed Tape Library implementations servers MAY elect to support VENDOR-LIBRARY-LTO as an Application Namespace where VENDOR is an ASCII string that SHALL not be further interpreted and SHALL be handled by the server as if the Application Namespace was set to LIBRARY-LTO. ASI supports key identifiers being created either on the Server or on the Client (Tape Library), but not both. The ASI method of key identification relies on the ability to uniquely identify a key based (preferably) only on its Application Data, or (alternatively) on some combination of Application Data and custom attributes, which the key creator guarantees to be unique within the Application Namespace. Claiming support for non-vendor-specific namespaces SHALL therefore ensure uniqueness across any LTO implementation, and is preferred for maximum interoperability. Key identifiers stored in the KMIP server's ASI attribute are always in ASCII format. Key identifiers stored in the KMIP client's tape format KAD fields are always numeric format. The method provides a specific algorithm for converting between text and numeric formats. All information contained in the tape format s KAD fields is converted to an ASCII string consisting of hexadecimal numeric character pairs. First, the unauthenticated KAD is converted to text. Second, the authenticated KAD is converted to text and is then concatenated to the end of the converted unauthenticated KAD text. For KMIP clients and servers conforming to this profile, Application Specific Information data SHALL be sent by the tape library KMIP client based on the tape format's KAD fields as follows: 1. Define an empty output buffer sufficient to contain a string with a maximum length of 2*N(k) bytes. 2. Copy the tape format s unauthenticated KAD (if present) to the output buffer converting each byte value to exactly two Hexadecimal Numeric Characters. Effectively, the first byte (byte 0) of the input buffer is the first byte of unauthenticated KAD. 3. Concatenate the tape format s authenticated KAD to the output buffer converting each byte value to exactly two Hexadecimal Numeric Characters. Standards Track Draft Copyright OASIS Open All Rights Reserved. Page 6 of 17

7 Note: the contents of unauthenticated KAD and authenticated KAD fields may be less than the maximum permitted lengths; the implementation provides the correct length values to use in the algorithm rather than using fixed maximum length fields. Standards Track Draft Copyright OASIS Open All Rights Reserved. Page 7 of 17

8 3 Tape Library Profile Test Cases This section documents the test cases that a client or server conformant to the Tape Library Profile SHALL support. Note: the values for the returned items and the custom attributes are illustrative. Actual values from a real client system will vary. These test cases demonstrate usage of all of the mandatory types that are required to be supported in a server implementation. 3.1 Mandatory Test Cases This section documents the test cases that a client or server conformant to the Tape Library Profile SHALL support. TL-M-1 - Configuration Determine server configuration details including operations supported (only the mandatory operations are listed in the response example), objects supported (only the mandatory objects types are listed in the response example), optional server information, and optional list of application name spaces. Time Request/Response messages 0 <RequestMessage> <RequestHeader> <BatchOrderOption type="boolean" value="true"/> <BatchCount type="integer" value="1"/> </RequestHeader> <Operation type="enumeration" value="query"/> <QueryFunction type="enumeration" value="queryoperations"/> <QueryFunction type="enumeration" value="queryobjects"/> <QueryFunction type="enumeration" value="queryserverinformation"/> <QueryFunction type="enumeration" value="queryapplicationnamespaces"/> </RequestMessage> <ResponseMessage> <ResponseHeader> <TimeStamp type="datetime" value=" t21:35:17+00:00"/> <BatchCount type="integer" value="1"/> </ResponseHeader> <Operation type="enumeration" value="query"/> <Operation type="enumeration" value="query"/> <Operation type="enumeration" value="destroy"/> <Operation type="enumeration" value="get"/> <Operation type="enumeration" value="create"/> <Operation type="enumeration" value="register"/> <Operation type="enumeration" value="getattributes"/> <Operation type="enumeration" value="getattributelist"/> <Operation type="enumeration" value="addattribute"/> <Operation type="enumeration" value="modifyattribute"/> Standards Track Draft Copyright OASIS Open All Rights Reserved. Page 8 of 17

9 <Operation type="enumeration" value="deleteattribute"/> <Operation type="enumeration" value="activate"/> <Operation type="enumeration" value="revoke"/> <Operation type="enumeration" value="check"/> <ObjectType type="enumeration" value="symmetrickey"/> <ObjectType type="enumeration" value="template"/> <VendorIdentification type="textstring" value="server-vendor.com"/> <ApplicationNamespace type="textstring" value="lto"/> <ApplicationNamespace type="textstring" value="library-lto"/> </ResponseMessage> TL-M-2 - Write with new (Created) Key This case could occur when the Write operation starts with the first block on a tape. The implementation may choose which Write operations qualify for a creation of a new key. Regardless of the initiating circumstances, the Tape Library requests the server to create a new AES-256 symmetric key with appropriate identifying information which is unique within the Application Namespace. Additional custom attributes MAY be specified in order to: - ensure uniqueness of the key identifier when later Locating the key via ASI - provide human-readable information (such as the tape Barcode value) - information to support client-specific purposes Time Request/Response messages 0 <RequestMessage> <RequestHeader> <BatchOrderOption type="boolean" value="true"/> <BatchCount type="integer" value="2"/> </RequestHeader>o <Operation type="enumeration" value="create"/> <ObjectType type="enumeration" value="symmetrickey"/> <TemplateAttribute> <AttributeName type="textstring" value="name"/> <NameValue type="textstring" value="aaaaaaa1a1aa "/> <NameType type="enumeration" value="uninterpretedtextstring"/> <AttributeName type="textstring" value="cryptographic Algorithm"/> <AttributeValue type="enumeration" value="aes"/> <AttributeName type="textstring" value="cryptographic Length"/> <AttributeValue type="integer" value="256"/> <AttributeName type="textstring" value="cryptographic Usage Mask"/> <AttributeValue type="integer" value="decrypt Encrypt"/> <AttributeName type="textstring" value="application Specific Information"/> <ApplicationNamespace type="textstring" value="library-lto"/> <ApplicationData type="textstring" Standards Track Draft Copyright OASIS Open All Rights Reserved. Page 9 of 17

10 value=" abcdef abcdef abcdef "/> <AttributeName type="textstring" value="x-vendorattribute1"/> <AttributeValue type="textstring" value="xxa012a1"/> <AttributeName type="textstring" value="x-vendorattribute2"/> <AttributeValue type="integer" value="0"/> <AttributeName type="textstring" value="x-vendorattribute3"/> <AttributeValue type="datetime" value=" t22:08:19+00:00"/> </TemplateAttribute> <Operation type="enumeration" value="get"/> </RequestMessage> <ResponseMessage> <ResponseHeader> <TimeStamp type="datetime" value=" t21:41:46+00:00"/> <BatchCount type="integer" value="2"/> </ResponseHeader> <Operation type="enumeration" value="create"/> <ObjectType type="enumeration" value="symmetrickey"/> <Operation type="enumeration" value="get"/> <ObjectType type="enumeration" value="symmetrickey"/> <SymmetricKey> <KeyBlock> <KeyFormatType type="enumeration" value="raw"/> <KeyValue> <KeyMaterial type="bytestring" value="2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a"/> </KeyValue> <CryptographicAlgorithm type="enumeration" value="aes"/> <CryptographicLength type="integer" value="256"/> </KeyBlock> </SymmetricKey> </ResponseMessage> Standards Track Draft Copyright OASIS Open All Rights Reserved. Page 10 of 17

11 TL-M-3 - Read from Tape Read an encrypted tape. The Tape Library constructs an identifier string based on the method in 2.3, then requests the server to Locate that string via ASI. A Get is then requested based on the key s unique identifier. The Tape Library MAY update attributes associated with the Symmetric Key Managed Object. The following example shows extensive use of custom attributes. Custom attributes are not required if the Application Name is unique within the Application Namespace. An implementation may also use custom attributes for vendor-unique purposes, or to improve usability. Time Request/Response messages 0 <RequestMessage> <RequestHeader> <BatchOrderOption type="boolean" value="true"/> <BatchCount type="integer" value="2"/> </RequestHeader> <AttributeName type="textstring" value="object Type"/> <AttributeValue type="enumeration" value="symmetrickey"/> <AttributeName type="textstring" value="application Specific Information"/> <ApplicationNamespace type="textstring" value="library-lto"/> <ApplicationData type="textstring" value=" abcdef abcdef abcdef "/> <Operation type="enumeration" value="get"/> </RequestMessage> <ResponseMessage> <ResponseHeader> <TimeStamp type="datetime" value=" t22:00:32+00:00"/> <BatchCount type="integer" value="2"/> </ResponseHeader> <Operation type="enumeration" value="get"/> Standards Track Draft Copyright OASIS Open All Rights Reserved. Page 11 of 17

12 <ObjectType type="enumeration" value="symmetrickey"/> <SymmetricKey> <KeyBlock> <KeyFormatType type="enumeration" value="raw"/> <KeyValue> <KeyMaterial type="bytestring" value="2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a"/> </KeyValue> <CryptographicAlgorithm type="enumeration" value="aes"/> <CryptographicLength type="integer" value="256"/> </KeyBlock> </SymmetricKey> </ResponseMessage 1 <RequestMessage> <RequestHeader> <BatchOrderOption type="boolean" value="true"/> <BatchCount type="integer" value="2"/> </RequestHeader> <AttributeName type="textstring" value="object Type"/> <AttributeValue type="enumeration" value="symmetrickey"/> <AttributeName type="textstring" value="application Specific Information"/> <ApplicationNamespace type="textstring" value="library-lto"/> <ApplicationData type="textstring" value=" abcdef abcdef abcdef "/> <Operation type="enumeration" value="getattributelist"/> </RequestMessage> <ResponseMessage> <ResponseHeader> <TimeStamp type="datetime" value=" t22:00:33+00:00"/> <BatchCount type="integer" value="2"/> </ResponseHeader> Standards Track Draft Copyright OASIS Open All Rights Reserved. Page 12 of 17

13 <Operation type="enumeration" value="getattributelist"/> <AttributeName type="textstring" value="x-barcode"/> <AttributeName type="textstring" value="x-vendorattribute1"/> <AttributeName type="textstring" value="x-vendorattribute2"/> <AttributeName type="textstring" value="x-vendorattribute3"/> <AttributeName type="textstring" value="unique Identifier"/> <AttributeName type="textstring" value="object Type"/> <AttributeName type="textstring" value="cryptographic Algorithm"/> <AttributeName type="textstring" value="cryptographic Length"/> <AttributeName type="textstring" value="application Specific Information"/> <AttributeName type="textstring" value="cryptographic Usage Mask"/> <AttributeName type="textstring" value="digest"/> <AttributeName type="textstring" value="initial Date"/> <AttributeName type="textstring" value="last Change Date"/> <AttributeName type="textstring" value="lease Time"/> <AttributeName type="textstring" value="name"/> <AttributeName type="textstring" value="state"/> </ResponseMessage> 2 <RequestMessage> <RequestHeader> <BatchOrderOption type="boolean" value="true"/> <BatchCount type="integer" value="2"/> </RequestHeader> <AttributeName type="textstring" value="object Type"/> <AttributeValue type="enumeration" value="symmetrickey"/> <AttributeName type="textstring" value="application Specific Information"/> <ApplicationNamespace type="textstring" value="library-lto"/> <ApplicationData type="textstring" value=" abcdef abcdef abcdef "/> <Operation type="enumeration" value="getattributes"/> </RequestMessage <ResponseMessage> <ResponseHeader> <TimeStamp type="datetime" value=" t22:00:32+00:00"/> <BatchCount type="integer" value="2"/> </ResponseHeader> Standards Track Draft Copyright OASIS Open All Rights Reserved. Page 13 of 17

14 <Operation type="enumeration" value="getattributes"/> <AttributeName type="textstring" value="x-vendorattribute1"/> <AttributeValue type="textstring" value="xxa012a1"/> <AttributeName type="textstring" value="x-vendorattribute2"/> <AttributeValue type="datetime" value=" t22:08:19+00:00"/> <AttributeName type="textstring" value="x-vendorattribute3"/> <AttributeValue type="integer" value="0"/> <AttributeName type="textstring" value="unique Identifier"/> <AttributeValue type="textstring" value="12345abc d-be9c- <AttributeName type="textstring" value="object Type"/> <AttributeValue type="enumeration" value="symmetrickey"/> <AttributeName type="textstring" value="cryptographic Algorithm"/> <AttributeValue type="enumeration" value="aes"/> <AttributeName type="textstring" value="cryptographic Length"/> <AttributeValue type="integer" value="256"/> <AttributeName type="textstring" value="application Specific Information"/> <ApplicationNamespace type="textstring" value="library-lto"/> <ApplicationData type="textstring" value=" abcdef abcdef abcdef "/> <AttributeName type="textstring" value="cryptographic Usage Mask"/> <AttributeValue type="integer" value="decrypt Encrypt"/> <AttributeName type="textstring" value="digest"/> <HashingAlgorithm type="enumeration" value="sha_256"/> <DigestValue type="bytestring" value="0bd3d7ada745e4eb34cc9d26cc84d4852a15906b2f77f80d01fc31c28108c49b"/> <AttributeName type="textstring" value="initial Date"/> <AttributeValue type="datetime" value=" t21:41:46+00:00"/> <AttributeName type="textstring" value="last Change Date"/> <AttributeValue type="datetime" value=" t21:41:46+00:00"/> Standards Track Draft Copyright OASIS Open All Rights Reserved. Page 14 of 17

15 <AttributeName type="textstring" value="lease Time"/> <AttributeValue type="interval" value="3600"/> <AttributeName type="textstring" value="name"/> <NameValue type="textstring" value="aaaaaaa1a1aa "/> <NameType type="enumeration" value="uninterpretedtextstring"/> <AttributeName type="textstring" value="state"/> <AttributeValue type="enumeration" value="preactive"/> </ResponseMessage> 3 <RequestMessage> <RequestHeader> <BatchOrderOption type="boolean" value="true"/> <BatchCount type="integer" value="3"/> </RequestHeader> <AttributeName type="textstring" value="object Type"/> <AttributeValue type="enumeration" value="symmetrickey"/> <AttributeName type="textstring" value="application Specific Information"/> <ApplicationNamespace type="textstring" value="library-lto"/> <ApplicationData type="textstring" value=" abcdef abcdef abcdef "/> <Operation type="enumeration" value="modifyattribute"/> <AttributeName type="textstring" value="x-vendorattribute2"/> <AttributeValue type="datetime" value=" t22:27:06+00:00"/> <Operation type="enumeration" value="modifyattribute"/> <UniqueBatchItemID type="bytestring" value="03"/> <AttributeName type="textstring" value="x-vendorattribute3"/> <AttributeValue type="integer" value="1"/> </RequestMessage> Standards Track Draft Copyright OASIS Open All Rights Reserved. Page 15 of 17

16 <ResponseMessage> <ResponseHeader> <TimeStamp type="datetime" value=" t22:00:33+00:00"/> <BatchCount type="integer" value="3"/> </ResponseHeader> <Operation type="enumeration" value="modifyattribute"/> <AttributeName type="textstring" value="x-vendorattribute2"/> <AttributeValue type="datetime" value=" t22:27:06+00:00"/> <Operation type="enumeration" value="modifyattribute"/> <UniqueBatchItemID type="bytestring" value="03"/> <AttributeName type="textstring" value="x-vendorattribute3"/> <AttributeValue type="integer" value="1"/> </ResponseMessage> TL-M-4 Appended Write his operation appends data to existing data on a tape. It does not introduce new KMIP operations beyond those noted in TL-M-2 and/or TL-M-3. Time 0 Request/Response messages 3.2 Optional Test Cases This section documents the test cases that a client or server conformant to the Tape Library Profile MAY support. [[ TO BE ADDED IF REQUIRED OR REMOVED AS A SECTION]] Standards Track Draft Copyright OASIS Open All Rights Reserved. Page 16 of 17

17 Appendix A. Acknowledgments The following individuals have participated in the creation of this specification and are gratefully acknowledged: TBD Standards Track Draft Copyright OASIS Open All Rights Reserved. Page 17 of 17

KMIP Tape Library Profile Version 1.0

KMIP Tape Library Profile Version 1.0 KMIP Tape Library Profile Version 1.0 Committee Specification Draft 01 / Public Review Draft 01 09 January 2014 Specification URIs This version: http://docs.oasis-open.org/kmip/kmip-tape-lib-profile/v1.0/csprd01/kmip-tape-lib-profile-v1.0-

More information

KMIP Tape Library Profile Version 1.0

KMIP Tape Library Profile Version 1.0 KMIP Tape Library Profile Version 1.0 Committee Specification Draft 02 / Public Review Draft 02 19 June 2014 Specification URIs This version: http://docs.oasis-open.org/kmip/kmip-tape-lib-profile/v1.0/csprd02/kmip-tape-lib-profile-v1.0-

More information

KMIP Opaque Managed Object Store Profile Version 1.0

KMIP Opaque Managed Object Store Profile Version 1.0 KMIP Opaque Managed Object Store Profile Version 1.0 Committee Specification Draft 01 / Public Review Draft 01 09 January 2014 Specification URIs This version: http://docs.oasis-open.org/kmip/kmip-opaque-obj-profile/v1.0/csprd01/kmip-opaque-obj-profilev1.0-csprd01.doc

More information

KMIP Storage Array with Self-Encrypting Drives Profile Version 1.0

KMIP Storage Array with Self-Encrypting Drives Profile Version 1.0 KMIP Storage Array with Self-Encrypting Drives Profile Version 1.0 Committee Specification Draft 02 / Public Review Draft 02 19 June 2014 Specification URIs This version: http://docs.oasis-open.org/kmip/kmip-sa-sed-profile/v1.0/csprd02/kmip-sa-sed-profile-v1.0-

More information

KMIP Symmetric Key Lifecycle Profile Version 1.0

KMIP Symmetric Key Lifecycle Profile Version 1.0 KMIP Symmetric Key Lifecycle Profile Version 1.0 OASIS Standard 19 May 2015 Specification URIs This version: http://docs.oasis-open.org/kmip/kmip-sym-key-profile/v1.0/os/kmip-sym-key-profile-v1.0-os.doc

More information

KMIP Opaque Managed Object Store Profile Version 1.0

KMIP Opaque Managed Object Store Profile Version 1.0 KMIP Opaque Managed Object Store Profile Version 1.0 OASIS Standard 19 May 2015 Specification URIs This version: http://docs.oasis-open.org/kmip/kmip-opaque-obj-profile/v1.0/os/kmip-opaque-obj-profile-v1.0-

More information

Key Management Interoperability Protocol HTTPS Profile Version 1.0

Key Management Interoperability Protocol HTTPS Profile Version 1.0 Key Management Interoperability Protocol HTTPS Profile Version 1.0 Working Draft 04 27 June 2012 Technical Committee: OASIS Key Management Interoperability Protocol (KMIP) TC Chairs: Robert Griffin (robert.griffin@rsa.com),

More information

Key Management Interoperability Protocol Crypto Profile Version 1.0

Key Management Interoperability Protocol Crypto Profile Version 1.0 Key Management Interoperability Protocol Crypto Profile Version 1.0 Working Draft 0708 25 7 NovemberOctober 2012 Technical Committee: OASIS Key Management Interoperability Protocol (KMIP) TC Chairs: Robert

More information

KMIP Additional Message Encodings Version 1.0

KMIP Additional Message Encodings Version 1.0 KMIP Additional Message Encodings Version 1.0 Committee Specification Draft 01 / Public Review Draft 01 09 January 2014 Specification URIs This version: http://docs.oasis-open.org/kmip/kmip-addtl-msg-enc/v1.0/csprd01/kmip-addtl-msg-enc-v1.0-

More information

KMIP Post-Quantum Cryptography Profile Working Draft 02

KMIP Post-Quantum Cryptography Profile Working Draft 02 KMIP Post-Quantum Cryptography Profile Working Draft 02 OASIS Working Draft 9 May 2017 Specification URIs This version: Latest version: Technical Committee: OASIS Key Management Interoperability

More information

XML Message Encoding Examples

XML Message Encoding Examples XML Message Encoding Examples Hal Lockhart - Oracle Tim Hudson Cryptsoft Hal Lockhart - hal.lockhart@oracle.com Tim Hudson tjh@cryptsoft.com Goals TTLV -> XML and XML -> TTLV round tripping Simple automated

More information

KMIP Additional Message Encodings Version 1.0

KMIP Additional Message Encodings Version 1.0 KMIP Additional Message Encodings Version 1.0 OASIS Standard 19 May 2015 Specification URIs This version: http://docs.oasis-open.org/kmip/kmip-addtl-msg-enc/v1.0/os/kmip-addtl-msg-enc-v1.0-os.doc (Authoritative)

More information

Key Management Interoperability Protocol Use Cases Version 1.0

Key Management Interoperability Protocol Use Cases Version 1.0 Key Management Interoperability Protocol Use Cases Version 1.0 Committee Draft 09 / Public Review 02 18 March 2010 Specification URIs: This Version: http://docs.oasis-open.org/kmip/usecases/v1.0/cd09/kmip-usecases-1.0-cd-09.html

More information

Open Command and Control (OpenC2) Language Specification. Version 0.0.2

Open Command and Control (OpenC2) Language Specification. Version 0.0.2 Open Command and Control (OpenC2) Language Specification Version 0.0.2 OpenC2 Language Specification Working Draft 0.0.2 09 Oct 2017 Technical Committee: OASIS OpenC2 Technical Committee Chair: Editors:

More information

SAML v2.0 Protocol Extension for Requesting Attributes per Request Version 1.0

SAML v2.0 Protocol Extension for Requesting Attributes per Request Version 1.0 SAML v2.0 Protocol Extension for Requesting Attributes per Request Version 1.0 Working Draft 03 9 December 2016 Technical Committee: OASIS Security Services (SAML) TC Chairs: Thomas Hardjono (hardjono@mit.edu),

More information

Advanced Message Queuing Protocol (AMQP) WebSocket Binding (WSB) Version 1.0

Advanced Message Queuing Protocol (AMQP) WebSocket Binding (WSB) Version 1.0 Advanced Message Queuing Protocol (AMQP) WebSocket Binding (WSB) Version 1.0 Working Draft 05 2 April 2014 Technical Committee: OASIS Advanced Message Queuing Protocol (AMQP) Bindings and Mappings (AMQP-

More information

SAML v2.0 Protocol Extension for Requesting Attributes per Request Version 1.0

SAML v2.0 Protocol Extension for Requesting Attributes per Request Version 1.0 SAML v2.0 Protocol Extension for Requesting Attributes per Request Version 1.0 Working Draft 01 23 November 2016 Technical Committee: OASIS Security Services (SAML) TC Chairs: Thomas Hardjono ( hardjono@mit.edu

More information

Using the AMQP Anonymous Terminus for Message Routing Version 1.0

Using the AMQP Anonymous Terminus for Message Routing Version 1.0 Using the AMQP Anonymous Terminus for Message Routing Version 1.0 Committee Specification 01 Specification URIs This version: http://docs.oasis-open.org/amqp/anonterm/v1.0/cs01/.xml (Authoritative) http://docs.oasis-open.org/amqp/anonterm/v1.0/cs01/.html

More information

OASIS - Artifact naming guidelines

OASIS - Artifact naming guidelines OASIS - Artifact naming guidelines Working Draft 06, 9 July 2004 Document identifier: Location: http://www.oasis-open.org/apps/org/workgroup/tab/documents.php Editor: Tim Moses Contributors: William Cox

More information

SAML v2.0 Protocol Extension for Requesting Attributes per Request Version 1.0

SAML v2.0 Protocol Extension for Requesting Attributes per Request Version 1.0 SAML v2.0 Protocol Extension for Requesting Attributes per Request Version 1.0 Working Draft 01 23 November 2016 Technical Committee: OASIS Security Services (SAML) TC Chairs: Thomas Hardjono ( hardjono@mit.edu

More information

Deployment Profile Template Version 1.0 for WS-Reliability 1.1

Deployment Profile Template Version 1.0 for WS-Reliability 1.1 Deployment Profile Template Version 1.0 for WS-Reliability 1.1 Committee Draft 11 April 2007 URIs: This Version: http://docs.oasis-open.org/wsrm/profile/wsr-deployment-profile-template-cd.pdf Latest Version:

More information

Abstract Code-Signing Profile of the OASIS Digital Signature Services

Abstract Code-Signing Profile of the OASIS Digital Signature Services 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 Abstract Code-Signing Profile of the OASIS Digital Signature Services OASIS Standard 11 April 2007 Specification

More information

Level of Assurance Authentication Context Profiles for SAML 2.0

Level of Assurance Authentication Context Profiles for SAML 2.0 2 3 4 5 Level of Assurance Authentication Context Profiles for SAML 2.0 Draft 01 01 April 2008 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 Specification URIs: This

More information

Advanced Message Queuing Protocol (AMQP) WebSocket Binding (WSB) Version 1.0

Advanced Message Queuing Protocol (AMQP) WebSocket Binding (WSB) Version 1.0 Advanced Message Queuing Protocol (AMQP) WebSocket Binding (WSB) Version 1.0 Working Draft 08 7 March 2016 Technical Committee: OASIS Advanced Message Queuing Protocol (AMQP) Bindings and Mappings (AMQP-

More information

Test Assertions for the SCA Web Service Binding Version 1.1 Specification

Test Assertions for the SCA Web Service Binding Version 1.1 Specification Test Assertions for the SCA Web Service Binding Version 1.1 Specification Working Draft 02 7 October 2009 Specification URIs: This Version: http://docs.oasis-open.org/sca-bindings/sca-wsbinding-1.1-test-assertions-cd01.html

More information

TestCases for the SCA Assembly Model Version 1.1

TestCases for the SCA Assembly Model Version 1.1 TestCases for the SCA Assembly Model Version 1.1 Committee Specification Draft 04 / Public Review Draft 03 21 June 2011 Specification URIs This version: http://docs.oasis-open.org/opencsa/sca-assembly/sca-assembly-1.1-testcases-csprd03.pdf

More information

SAML V2.0 Profile for Token Correlation

SAML V2.0 Profile for Token Correlation SAML V2.0 Profile for Token Correlation Committee Draft 01 28 June 2010 Specification URIs: This Version: 0.1 Previous Version: 0 Latest Version: Technical Committee: OASIS Security Services TC Chair(s):

More information

Interoperable Key Management for Storage. PRESENTATION TITLE GOES HERE Subhash Sankuratripa8, NetApp (Co- Chair KMIP) Tim Hudson, CryptsoD

Interoperable Key Management for Storage. PRESENTATION TITLE GOES HERE Subhash Sankuratripa8, NetApp (Co- Chair KMIP) Tim Hudson, CryptsoD Interoperable Key Management for Storage PRESENTATION TITLE GOES HERE Subhash Sankuratripa8, NetApp (Co- Chair KMIP) Tim Hudson, CryptsoD Abstract! A standard for interoperable key management exists but

More information

OASIS Specification Document Template Usage

OASIS Specification Document Template Usage OASIS Specification Document Template Usage Working Draft, October 18, 2004 Document Identifier: oasis-spectools-1.0-word-sample-draft-01.doc OASIS Identifier: [OASIS document number] Location: Persistent:

More information

SCA JMS Binding v1.1 TestCases Version 1.0

SCA JMS Binding v1.1 TestCases Version 1.0 SCA JMS Binding v1.1 TestCases Version 1.0 Committee Specification Draft 01 / Public Review Draft 01 8 November 2010 Specification URIs: This Version: http://docs.oasis-open.org/opencsa/sca-bindings/sca-jmsbinding-1.1-testcases-1.0-csprd01.html

More information

Key Management Interoperability Protocol Profiles Version 1.4

Key Management Interoperability Protocol Profiles Version 1.4 Key Management Interoperability Protocol Profiles Version 1.4 OASIS Standard 22 November 2017 Specification URIs This version: http://docs.oasis-open.org/kmip/profiles/v1.4/os/kmip-profiles-v1.4-os.docx

More information

XDI Requirements and Use Cases

XDI Requirements and Use Cases 1 2 3 XDI Requirements and Use Cases Working Draft 01, April 19 th 2004 4 5 6 7 8 9 10 11 12 13 14 Document identifier: xdi-requirements-and-use-cases-document-04 Location: Editors: [Editors listed here]

More information

Test Assertions for the SCA Assembly Model Version 1.1 Specification

Test Assertions for the SCA Assembly Model Version 1.1 Specification Test Assertions for the SCA Assembly Model Version 1.1 Specification Committee Draft 03 10 August 2010 Specification URIs: This Version: http://docs.oasis-open.org/opencsa/sca-assembly/sca-assembly-1.1-test-assertions-cd03.html

More information

SAML V2.0 EAP GSS SSO Profile Version 1.0

SAML V2.0 EAP GSS SSO Profile Version 1.0 SAML V2.0 EAP GSS SSO Profile Version 1.0 Committee Draft 00 March 18, 2010 Specification URIs: This Version: http://docs.oasis-open.org/[tc-short-name]/[additional path/filename].html http://docs.oasis-open.org/[tc-short-name]/[additional

More information

SCA-J POJO Component Implementation v1.1 TestCases Version 1.0

SCA-J POJO Component Implementation v1.1 TestCases Version 1.0 SCA-J POJO Component Implementation v1.1 TestCases Version 1.0 Committee Specification Draft 01 / Public Review Draft 01 8 November 2010 Specification URIs: This Version: http://docs.oasis-open.org/opencsa/sca-j/sca-j-pojo-ci-1.1-testcases-1.0-csprd01.html

More information

SAML V2.0 Profile for Mandator Credentials

SAML V2.0 Profile for Mandator Credentials 2 SAML V2.0 Profile for Mandator Credentials 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 Specification URIs: This Version: Previous Version: Latest Version: Technical

More information

Service Component Architecture Client and Implementation Model for C++ Test Cases Version 1.1

Service Component Architecture Client and Implementation Model for C++ Test Cases Version 1.1 Service Component Architecture Client and Implementation Model for C++ Test Cases Version 1.1 Committee Draft 02 14 October 2010 Specification URIs: This Version: http://docs.oasis-open.org/opencsa/sca-c-cpp/sca-cppcni-1.1-testcases-cd02.html

More information

Identity in the Cloud PaaS Profile Version 1.0

Identity in the Cloud PaaS Profile Version 1.0 Identity in the Cloud PaaS Profile Version 1.0 Committee Note Draft 01 / Public Review Draft 01 29 April 2013 Work Product URIs This is a Non-Standards Track Work Product. The patent provisions of the

More information

OpenOffice Specification Sample

OpenOffice Specification Sample 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 OpenOffice Specification Sample Working Draft 02, 14 April 2004 Document identifier: spectools-openoffice-sample-draft-02

More information

XACML Profile for Requests for Multiple Resources

XACML Profile for Requests for Multiple Resources 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 XACML Profile for Requests for Multiple Resources Working Draft 03, 3 August 2004 Document identifier: oasis-xacml-profile-multiple-resources-wd-03

More information

TestCases for the SCA POJO Component Implementation Specification Version 1.1

TestCases for the SCA POJO Component Implementation Specification Version 1.1 TestCases for the SCA POJO Component Implementation Specification Version 1.1 Committee Specification Draft 02 / Public Review Draft 02 15 August 2011 Specification URIs This version: http://docs.oasis-open.org/opencsa/sca-j/sca-j-pojo-ci-1.1-testcases-csprd02.pdf

More information

Multi-Vendor Key Management with KMIP

Multi-Vendor Key Management with KMIP Multi-Vendor Key Management with KMIP Tim Hudson CTO & Technical Director tjh@cryptsoft.com 1 Abstract Practical experience from implementing KMIP and from deploying and interoperability testing multiple

More information

Identity in the Cloud PaaS Profile Version 1.0

Identity in the Cloud PaaS Profile Version 1.0 Identity in the Cloud PaaS Profile Version 1.0 Committee Note Draft 02 / Public Review Draft 02 16 September 2013 Work Product URIs This is a Non-Standards Track Work Product. The patent provisions of

More information

XACML v3.0 XML Digital Signature Profile Version 1.0

XACML v3.0 XML Digital Signature Profile Version 1.0 XACML v3.0 XML Digital Signature Profile Version 1.0 Committee Specification 01 10 August 2010 Specification URIs: This Version: http://docs.oasis-open.org/xacml/3.0/xacml-3.0-dsig-v1-spec-cs-01-en.html

More information

Using SRP for TLS Authentication

Using SRP for TLS Authentication Using SRP for TLS Authentication Internet Draft Transport Layer Security Working Group D. Taylor Forge Research Pty Ltd Expires: March 5, 2003 September 4, 2002 Using SRP for TLS Authentication draft-ietf-tls-srp-03

More information

J. Basney, NCSA Category: Experimental October 10, MyProxy Protocol

J. Basney, NCSA Category: Experimental October 10, MyProxy Protocol GWD-E J. Basney, NCSA Category: Experimental October 10, 2005 MyProxy Protocol Status of This Memo This memo provides information to the Grid community. Distribution is unlimited. Copyright Notice Copyright

More information

Asynchronous Processing Abstract Profile of the OASIS Digital Signature Services Version 1.0

Asynchronous Processing Abstract Profile of the OASIS Digital Signature Services Version 1.0 Asynchronous Processing Abstract Profile of the OASIS Digital Signature Services Version 1.0 OASIS Standard 11 April 2007 Specification URIs: This Version: http://docs.oasis-open.org/dss/v1.0/oasis-dss-profiles-asynchronous_processing-spec-v1.0-

More information

PPS (Production Planning and Scheduling) Part 3: Profile Specifications, Version 1.0

PPS (Production Planning and Scheduling) Part 3: Profile Specifications, Version 1.0 PPS (Production Planning and Scheduling) Part 3: Profile Specifications, Version 1.0 Committee Specification 01 Revision 01 21 Sep 2009 Specification URIs: http://docs.oasis-open.org/pps/v1.0/pps-profile-specifications-1.0-cs01-r01.doc

More information

SCA JMS Binding Specification v1.1 Test Assertions Version 1.0

SCA JMS Binding Specification v1.1 Test Assertions Version 1.0 SCA JMS Binding Specification v1.1 Test Assertions Version 1.0 Committee Specification Draft 01 8 November 2010 Specification URIs: This Version: http://docs.oasis-open.org/opencsa/sca-bindings/sca-jmsbinding-1.1-test-assertions-1.0-

More information

This document is a preview generated by EVS

This document is a preview generated by EVS INTERNATIONAL STANDARD ISO 21720 First edition 2017-11 XLIFF (XML Localisation interchange file format) XLIFF (Format de fichier XML pour l'échange de données de localisation) Reference number ISO 21720:2017(E)

More information

TOSCA Test Assertions Version 1.0

TOSCA Test Assertions Version 1.0 TOSCA Test Assertions Version 1.0 Committee Note Draft 01 08 December 2016 Specification URIs This version: http://docs.oasis-open.org/tosca/tosca-test-assertions/v1.0/cnd01/tosca-test- Assertions-v1.0-cnd01.pdf

More information

Identity in the Cloud Outsourcing Profile Version 1.0

Identity in the Cloud Outsourcing Profile Version 1.0 Identity in the Cloud Outsourcing Profile Version 1.0 Committee Note 01 05 August 2013 Specification URIs This version: http://docs.oasis-open.org/id-cloud/idcloudoutsourcing/v1.0/cn01/idcloud-outsourcing-v1.0-cn01.doc

More information

Category: Standards Track September MIB Textual Conventions for Uniform Resource Identifiers (URIs)

Category: Standards Track September MIB Textual Conventions for Uniform Resource Identifiers (URIs) Network Working Group D. McWalter, Ed. Request for Comments: 5017 Data Connection Ltd Category: Standards Track September 2007 MIB Textual Conventions for Uniform Resource Identifiers (URIs) Status of

More information

Network Working Group Request for Comments: Category: Standards Track April 2001

Network Working Group Request for Comments: Category: Standards Track April 2001 Network Working Group Request for Comments: 3097 Updates: 2747 Category: Standards Track R. Braden ISI L. Zhang UCLA April 2001 Status of this Memo RSVP Cryptographic Authentication -- Updated Message

More information

Kerberos SAML Profiles

Kerberos SAML Profiles 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 Kerberos SAML Profiles Working Draft 03, 10 th February 2004 Document identifier: draft-sstc-solution-profile-kerberos-03

More information

Network Working Group. February 2005

Network Working Group. February 2005 Network Working Group Request for Comments: 4014 Category: Standards Track R. Droms J. Schnizlein Cisco Systems February 2005 Status of This Memo Remote Authentication Dial-In User Service (RADIUS) Attributes

More information

saml requesting attributes v1.1 wd01 Working Draft January 2016 Standards Track Draft Copyright OASIS Open All Rights Reserved.

saml requesting attributes v1.1 wd01 Working Draft January 2016 Standards Track Draft Copyright OASIS Open All Rights Reserved. Standards Track Draft Copyright OASIS Open 2015. All Rights Reserved. Page 1 of 10 SAML v2.0 Protocol Extension for Requesting Attributes in AuthnRequest Version 1.1 Working Draft 02 19 January 2016 Technical

More information

Network Working Group. Category: Standards Track <draft-aboba-radius-iana-03.txt> 30 March 2003 Updates: RFC IANA Considerations for RADIUS

Network Working Group. Category: Standards Track <draft-aboba-radius-iana-03.txt> 30 March 2003 Updates: RFC IANA Considerations for RADIUS Network Working Group INTERNET-DRAFT Category: Standards Track 30 March 2003 Updates: RFC 2865 B. Aboba Microsoft IANA Considerations for RADIUS This document is an Internet-Draft

More information

Category: Standards Track March Extensible Provisioning Protocol (EPP) Transport Over TCP

Category: Standards Track March Extensible Provisioning Protocol (EPP) Transport Over TCP Network Working Group S. Hollenbeck Request for Comments: 3734 VeriSign, Inc. Category: Standards Track March 2004 Extensible Provisioning Protocol (EPP) Transport Over TCP Status of this Memo This document

More information

Test Assertions for the SCA_J Common Annotations and APIs Version 1.1 Specification

Test Assertions for the SCA_J Common Annotations and APIs Version 1.1 Specification Test Assertions for the SCA_J Common Annotations and APIs Version 1.1 Specification Working Draft 6 27 June 2009 Specification URIs: This Version: http://docs.oasis-open.org/sca-assembly/sca-j-caa-1.1-test-assertions-wd5.html

More information

TestCases for the SCA_J Common Annotations and APIs Version 1.1 Specification

TestCases for the SCA_J Common Annotations and APIs Version 1.1 Specification TestCases for the SCA_J Common Annotations and APIs Version 1.1 Specification Committee Draft 01 - rev21 21 OctoberNovember 2010 Specification URIs: This Version: http://docs.oasis-open.org/opencsa/sca-j/sca-j-caa-1.1-testcases-cd01.html

More information

Updates: 2710 September 2003 Category: Standards Track. Source Address Selection for the Multicast Listener Discovery (MLD) Protocol

Updates: 2710 September 2003 Category: Standards Track. Source Address Selection for the Multicast Listener Discovery (MLD) Protocol Network Working Group B. Haberman Request for Comments: 3590 Caspian Networks Updates: 2710 September 2003 Category: Standards Track Status of this Memo Source Address Selection for the Multicast Listener

More information

February T11 Network Address Authority (NAA) Naming Format for iscsi Node Names

February T11 Network Address Authority (NAA) Naming Format for iscsi Node Names Network Working Group Request for Comments: 3980 Updates: 3720 Category: Standards Track M. Krueger M. Chadalapaka R. Elliott Hewlett-Packard Corp. February 2005 Status of this Memo T11 Network Address

More information

Metadata for SAML 1.0 Web Browser Profiles

Metadata for SAML 1.0 Web Browser Profiles 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 Metadata for SAML 1.0 Web Browser Profiles Working Draft 00, 12 November 2002 Document identifier: draft-sstc-saml-meta-data-00 Location:

More information

DITA 1.2 Whitepaper: Tools and DITA-Awareness

DITA 1.2 Whitepaper: Tools and DITA-Awareness An OASIS DITA Adoption Technical Committee Publication DITA 1.2 Whitepaper: Tools and DITA-Awareness Su-Laine Yeo On behalf of the OASIS DITA Adoption Technical Committee Date: 14 October 2010 OASIS (Organization

More information

TestCases for the SCA Web Service Binding Specification Version 1.1

TestCases for the SCA Web Service Binding Specification Version 1.1 TestCases for the SCA Web Service Binding Specification Version 1.1 Committee Specification Draft 01 revision 1 + Issue 152 1 April 2011 Specification URIs: This Version: http://docs.oasis-open.org/opencsa/sca-bindings/sca-wsbinding-1.1-testcases-csd01-rev1.html

More information

ISO/IEC JTC 1/SC 40/WG 1

ISO/IEC JTC 1/SC 40/WG 1 ISO/IEC JTC 1/SC 40/WG 1 N 33 ISO/IEC JTC 1/SC 40/WG 1 Governance of InformationTechnology Convenorship: BSI (United Kingdom) Document type: Title: Status: Liaison Organization Contribution Mapping OASIS

More information

TestCases for the SCA Web Service Binding Specification Version 1.1

TestCases for the SCA Web Service Binding Specification Version 1.1 TestCases for the SCA Web Service Binding Specification Version 1.1 Committee Specification Draft 02 / Public Review Draft 02 14 July 2011 Specification URIs: This version: http://docs.oasis-open.org/opencsa/sca-bindings/sca-wsbinding-1.1-testcases-csprd02.pdf

More information

Network Working Group Request for Comments: 3397 Category: Standards Track Apple Computer, Inc. November 2002

Network Working Group Request for Comments: 3397 Category: Standards Track Apple Computer, Inc. November 2002 Network Working Group Request for Comments: 3397 Category: Standards Track B. Aboba Microsoft S. Cheshire Apple Computer, Inc. November 2002 Dynamic Host Configuration Protocol (DHCP) Domain Search Option

More information

OASIS - Artifact Naming Guidelines

OASIS - Artifact Naming Guidelines OASIS - Artifact Naming Guidelines Working Draft 08, 4 October 2004 Artifact identifier: tab-artifact_naming_guidelines-1.0-spec-wd-06 Location: http://www.oasis-open.org/apps/org/workgroup/tab/documents.php

More information

TAXII Version Part 5: Default Query

TAXII Version Part 5: Default Query TAXII Version 1.1.1. Part 5: Default Query Committee Specification 01 05 May 2016 Specification URIs This version: http://docs.oasis-open.org/cti/taxii/v1.1.1/cs01/part5-query/taxii-v1.1.1-cs01-part5-query.docx

More information

Updates: 2409 May 2005 Category: Standards Track. Algorithms for Internet Key Exchange version 1 (IKEv1)

Updates: 2409 May 2005 Category: Standards Track. Algorithms for Internet Key Exchange version 1 (IKEv1) Network Working Group P. Hoffman Request for Comments: 4109 VPN Consortium Updates: 2409 May 2005 Category: Standards Track Algorithms for Internet Key Exchange version 1 (IKEv1) Status of This Memo This

More information

Network Working Group. November Encoding Long Options in the Dynamic Host Configuration Protocol (DHCPv4)

Network Working Group. November Encoding Long Options in the Dynamic Host Configuration Protocol (DHCPv4) Network Working Group Request for Comments: 3396 Updates: 2131 Category: Standards Track T. Lemon Nominum, Inc. S. Cheshire Apple Computer, Inc. November 2002 Status of this Memo Encoding Long Options

More information

Category: Standards Track October 2006

Category: Standards Track October 2006 Network Working Group Request for Comments: 4681 Updates: 4346 Category: Standards Track S. Santesson A. Medvinsky J. Ball Microsoft October 2006 TLS User Mapping Extension Status of This Memo This document

More information

Cloud Application Management for Platforms (CAMP) Test Assertions Version 1.1

Cloud Application Management for Platforms (CAMP) Test Assertions Version 1.1 Cloud Application Management for Platforms (CAMP) Test Assertions Version 1.1 Committee Specification 01 09 November 2014 Specification URIs This version: http://docs.oasis-open.org/camp/camp-ta/v1.1/cs01/camp-ta-v1.1-cs01.pdf

More information

Request for Comments: 3934 Updates: 2418 October 2004 BCP: 94 Category: Best Current Practice

Request for Comments: 3934 Updates: 2418 October 2004 BCP: 94 Category: Best Current Practice Network Working Group M. Wasserman Request for Comments: 3934 ThingMagic Updates: 2418 October 2004 BCP: 94 Category: Best Current Practice Updates to RFC 2418 Regarding the Management of IETF Mailing

More information

Category: Standards Track October Vendor-Identifying Vendor Options for Dynamic Host Configuration Protocol version 4 (DHCPv4)

Category: Standards Track October Vendor-Identifying Vendor Options for Dynamic Host Configuration Protocol version 4 (DHCPv4) Network Working Group J. Littlefield Request for Comments: 3925 Cisco Systems, Inc. Category: Standards Track October 2004 Vendor-Identifying Vendor Options for Dynamic Host Configuration Protocol version

More information

Category: Standards Track October 2006

Category: Standards Track October 2006 Network Working Group C. Perkins Request for Comments: 4636 Nokia Research Center Category: Standards Track October 2006 Status of This Memo Foreign Agent Error Extension for Mobile IPv4 This document

More information

Metadata for SAML 1.0 Web Browser Profiles

Metadata for SAML 1.0 Web Browser Profiles 1 2 3 4 Metadata for SAML 1.0 Web Browser Profiles Working Draft 01, 1 February 2003 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 Document identifier: draft-sstc-saml-meta-data-01

More information

Test Assertions Part 1 - Test Assertions Model Version 1.0

Test Assertions Part 1 - Test Assertions Model Version 1.0 Test Assertions Part 1 - Test Assertions Model Version 1.0 Draft 1.0.3 20 January 2010 Specification URIs: This Version: Previous Version: [N/A] Latest Version: http://docs.oasis-open.org/tag/model/v1.0/testassertionsmodel-1.0.html

More information

XACML 3.0 Export Compliance-US (EC- US) Profile Version 1.0

XACML 3.0 Export Compliance-US (EC- US) Profile Version 1.0 XACML 3.0 Export Compliance-US (EC- US) Profile Version 1.0 Committee Draft 03 17 June 2010 Specification URIs: This Version: http://docs.oasis-open.org/xacml/3.0/xacml-3.0-ec-us-v1-spec-cd-03-en.html

More information

Test Assertions for the SCA Policy Framework 1.1 Specification

Test Assertions for the SCA Policy Framework 1.1 Specification Test Assertions for the SCA Policy Framework 1.1 Specification Committee Draft 02 28 September 2010 Specification URIs: This Version: http://docs.oasis-open.org/opencsa/sca-policy/sca-policy-1.1-test-assertions-cd02.html

More information

Network Working Group Request for Comments: 4869 Category: Informational May Suite B Cryptographic Suites for IPsec. Status of This Memo

Network Working Group Request for Comments: 4869 Category: Informational May Suite B Cryptographic Suites for IPsec. Status of This Memo Network Working Group Request for Comments: 4869 Category: Informational L. Law J. Solinas NSA May 2007 Status of This Memo Suite B Cryptographic Suites for IPsec This memo provides information for the

More information

SOA-EERP Business Service Level Agreement Version 1.0

SOA-EERP Business Service Level Agreement Version 1.0 SOA-EERP Business Service Level Agreement Version 1.0 Working Draft 08 10 May 2010 Specification URIs: This Version: http://docs.oasis-open.org/soa-eerp/sla/v1.0/soa-eerp-bsla-spec-wd08.html http://docs.oasis-open.org/soa-eerp/sla/v1.0/soa-eerp-bsla-spec-wd08.doc

More information

OSLC Change Management Version 3.0. Part 2: Vocabulary

OSLC Change Management Version 3.0. Part 2: Vocabulary OSLC Change Management Version 3.0. Part 2: Vocabulary Committee Specification 01 08 June 2018 Specification URIs This version: http://docs.oasis-open.org/oslc-domains/cm/v3.0/cs01/part2-change-mgt-vocab/.html

More information

{Describe the status and stability of the specification here.}

{Describe the status and stability of the specification here.} {Document Title} Working Draft 02, {date} Document identifier: wd-spectools-docbook-template-02 Location: http://www.oasis-open.org/spectools/docs Editor: {Jane} {Doe}, {Example Corporation}

More information

Category: Standards Track May Transport Layer Security Protocol Compression Methods

Category: Standards Track May Transport Layer Security Protocol Compression Methods Network Working Group S. Hollenbeck Request for Comments: 3749 VeriSign, Inc. Category: Standards Track May 2004 Transport Layer Security Protocol Compression Methods Status of this Memo This document

More information

Network Working Group Request for Comments: 4162 Category: Standards Track KISA August 2005

Network Working Group Request for Comments: 4162 Category: Standards Track KISA August 2005 Network Working Group Request for Comments: 4162 Category: Standards Track H.J. Lee J.H. Yoon J.I. Lee KISA August 2005 Addition of SEED Cipher Suites to Transport Layer Security (TLS) Status of This Memo

More information

Request for Comments: 4680 Updates: 4346 September 2006 Category: Standards Track

Request for Comments: 4680 Updates: 4346 September 2006 Category: Standards Track Network Working Group S. Santesson Request for Comments: 4680 Microsoft Updates: 4346 September 2006 Category: Standards Track Status of This Memo TLS Handshake Message for Supplemental Data This document

More information

PPS (Production Planning and Scheduling) Part 1: Core Elements, Version 1.0

PPS (Production Planning and Scheduling) Part 1: Core Elements, Version 1.0 PPS (Production Planning and Scheduling) Part 1: Core Elements, Version 1.0 Committee Specification 01 Revision 01 21 Sep 2009 Specification URIs: http://docs.oasis-open.org/pps/v1.0/pps-core-elements-1.0-cs01-r01.doc

More information

Enabler Release Definition for Smartcard-Web-Server

Enabler Release Definition for Smartcard-Web-Server Enabler Release Definition for Smartcard-Web-Server Candidate Version 1.0 09 Feb 2007 Open Mobile Alliance OMA-ERELD-Smartcard_Web_Server-V1_0-20070209-C OMA-ERELD-Smartcard_Web_Server-V1_0-20070209-C

More information

Search Web Services - searchretrieve Operation: Abstract Protocol Definition Version 1.0

Search Web Services - searchretrieve Operation: Abstract Protocol Definition Version 1.0 Search Web Services - searchretrieve Operation: Abstract Protocol Definition Version 1.0 Committee Draft 01 30 June 2008 Specification URIs: This Version: http://docs.oasis-open.org/search-ws/june08releases/apd-v1.0-cd-01.doc

More information

ECMA-405. Data Interchange on Parallel Write/Read Disk Format for 5 Optical Disks. 1 st Edition / December Reference number ECMA-123:2009

ECMA-405. Data Interchange on Parallel Write/Read Disk Format for 5 Optical Disks. 1 st Edition / December Reference number ECMA-123:2009 ECMA-405 1 st Edition / December 2013 Data Interchange on Parallel Write/Read Disk Format for 5 Optical Disks Reference number ECMA-123:2009 Ecma International 2009 COPYRIGHT PROTECTED DOCUMENT Ecma International

More information

Expires: 20 May December 2000 Obsoletes: 1779, 2253

Expires: 20 May December 2000 Obsoletes: 1779, 2253 INTERNET-DRAFT Editor: Kurt D. Zeilenga Intended Category: Standard Track OpenLDAP Foundation Expires: 20 May 2001 20 December 2000 Obsoletes: 1779, 2253 Lightweight Directory Access Protocol (v3): UTF-8

More information

Request for Comments: 3548 July 2003 Category: Informational

Request for Comments: 3548 July 2003 Category: Informational Network Working Group S. Josefsson, Ed. Request for Comments: 3548 July 2003 Category: Informational Status of this Memo The Base16, Base32, and Base64 Data Encodings This memo provides information for

More information

Network Working Group. Obsoletes: draft-ietf-dhc-new-opt-msg-00.txt June 2000 Expires December 2000

Network Working Group. Obsoletes: draft-ietf-dhc-new-opt-msg-00.txt June 2000 Expires December 2000 Network Working Group R. Droms INTERNET-DRAFT Bucknell University Obsoletes: draft-ietf-dhc-new-opt-msg-00.txt June 2000 Expires December 2000 Procedure for Defining New DHCP Options and Message Types

More information

J2ME Code-Signing Profile of the OASIS Digital Signature Services

J2ME Code-Signing Profile of the OASIS Digital Signature Services 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 J2ME Code-Signing Profile of the OASIS Digital Signature Services Committee Specification 13 February

More information

Request for Comments: 4633 Category: Experimental August 2006

Request for Comments: 4633 Category: Experimental August 2006 Network Working Group S. Hartman Request for Comments: 4633 MIT Category: Experimental August 2006 Status of This Memo Experiment in Long-Term Suspensions From Internet Engineering Task Force (IETF) Mailing

More information

Network Working Group Request for Comments: Cisco Systems, Inc. December 2005

Network Working Group Request for Comments: Cisco Systems, Inc. December 2005 Network Working Group Request for Comments: 4243 Category: Standards Track M. Stapp R. Johnson T. Palaniappan December 2005 Vendor-Specific Information Suboption for the Dynamic Host Configuration Protocol

More information

Category: Standards Track August 2002

Category: Standards Track August 2002 Network Working Group G. Parsons Request for Comments: 3362 Nortel Networks Category: Standards Track August 2002 Status of this Memo Real-time Facsimile (T.38) - image/t38 MIME Sub-type Registration This

More information