<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.21 (Ruby 2.6.10) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-tomas-openroaming-05" category="info" submissionType="independent" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="WBA OpenRoaming">WBA OpenRoaming Wireless Federation</title>

    <author initials="B." surname="Tomas" fullname="Bruno Tomas">
      <organization>Wireless Broadband Alliance, Inc.</organization>
      <address>
        <postal>
          <street>5000 Executive Parkway, Suite 302</street>
          <city>San Ramon</city>
          <code>94583</code>
          <country>US</country>
        </postal>
        <email>bruno@wballiance.com</email>
      </address>
    </author>
    <author initials="M." surname="Grayson" fullname="Mark Grayson">
      <organization>Cisco Systems</organization>
      <address>
        <postal>
          <street>10 New Square Park</street>
          <city>Feltham</city>
          <code>TW14 8HA</code>
          <country>UK</country>
        </postal>
        <email>mgrayson@cisco.com</email>
      </address>
    </author>
    <author initials="N." surname="Canpolat" fullname="Necati Canpolat">
      <organization>Intel Corporation</organization>
      <address>
        <postal>
          <street>2111 NE. 25th Ave</street>
          <city>Hillsboro</city>
          <code>97124</code>
          <country>US</country>
        </postal>
        <email>necati.canpolat@intel.com</email>
      </address>
    </author>
    <author initials="B. A." surname="Cockrell" fullname="Betty A. Cockrell">
      <organization>SingleDigits</organization>
      <address>
        <postal>
          <city>San Antonio</city>
          <country>US</country>
        </postal>
        <email>bcockrell@singledigits.com</email>
      </address>
    </author>
    <author initials="S." surname="Gundavelli" fullname="Sri Gundavelli">
      <organization>Cisco Systems</organization>
      <address>
        <postal>
          <street>170 West Tasman Drive</street>
          <city>San Jose</city>
          <code>95134</code>
          <country>US</country>
        </postal>
        <email>sgundave@cisco.com</email>
      </address>
    </author>

    <date year="2025" month="April" day="15"/>

    <area>general</area>
    <workgroup>Independent Submission</workgroup>
    <keyword>Internet-Draft</keyword> <keyword>OpenRoaming</keyword> <keyword>Federation</keyword>

    <abstract>


<?line 172?>

<t>This document describes the Wireless Broadband Alliance's
OpenRoaming system. The OpenRoaming architectures enables a seamless
onboarding experience for devices connecting to access networks
that are part of the federation of access networks and identity providers.
The primary objective of this document is to describe the protocols that
form the foundation for this architecture, enabling providers to correctly configure
their equipment to support interoperable OpenRoaming signalling exchanges.
In addition, the topic of OpenRoaming has been raised in different IETF working
groups, and therefore a secondary objective is to assist those discussions by
describing the federation organization and framework.</t>



    </abstract>



  </front>

  <middle>


<?line 185?>

<section anchor="intro"><name>Introduction</name>

<t>WBA OpenRoaming is a roaming federation service of Access Network Providers (ANPs)
and Identity Providers (IDPs), enabling an automatic and secure
Wi-Fi experience globally. WBA OpenRoaming creates the framework to seamlessly
connect billions of users and things to millions of Wi-Fi networks.</t>

<figure title="OpenRoaming Federation" anchor="figfedarch"><artwork><![CDATA[
ANP-1 --\                    _----_                     /-- IDP-1
         \     Access      _( Open )_      Identity    /
ANP-2  ---<==  Network ---(  Roaming )---  Providers <==-- IDP-2
         /     Providers   (_      _)                  \
ANP-3 --/                    '----'                     \-- IDP-3

]]></artwork></figure>

<t>WBA OpenRoaming recognizes the benefits that the likes of eduroam <xref target="RFC7593"/> provide to the
education and research community. WBA OpenRoaming defines a global federation that is targeted at serving
all communities, while supporting both settlement-free use cases where "free" Wi-Fi is being offered to
end-users in order to support some
alternative value proposition, as well as traditional settled "paid" for Wi-Fi offered by some
cellular providers.</t>

<t>OpenRoaming is designed to deliver end-to-end security between a Network Access Server deployed by an
OpenRoaming Access Network Provider and an EAP Server <xref target="RFC3748"/> deployed by an OpenRoaming
Identity Provider. The security of the solution is based on mTLS using certificates
issued under Wireless Broadband Alliance's Public Key Infrastructure <xref target="RFC5280"/>.</t>

<section anchor="Requirements"><name>Requirements Language</name>
<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL",
"SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT
RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be
interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/>
when, and only when, they appear in all capitals, as shown here.</t>

</section>
<section anchor="Terminology"><name>Terminology</name>

<t>Access Network Query Protocol (ANQP):</t>

<ul empty="true"><li>
  <t>An IEEE 802.11 defined protocol that allows for access network information retrieval
in a pre-association state. ANQP has been further extended by the
Wi-Fi Alliance (WFA) as part of its Passpoint program <xref target="PASSPOINT"/>.</t>
</li></ul>

<t>Access Network Provider (ANP):</t>

<ul empty="true"><li>
  <t>An entity that has joined the federation and serves OpenRoaming end-users by configuring the OpenRoaming RCOI(s) on its Wi-Fi equipment.</t>
</li></ul>

<t>Broker:</t>

<ul empty="true"><li>
  <t>An entity that has joined the federation and performs certain specific roles to help scale the operation of the federation. The separate roles of a broker can include:</t>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t><list style="numbers" type="1">
      <t>Assigning WBA identities to ANPs and IDPs.</t>
      <t>Operating an issuing intermediate certificate authority under the WBA's PKI and issuing certificates to ANPs and IDPs.</t>
      <t>Operating a registration authority to a third party operated issuing intermediate certificate authority under WBA's PKI to enable certificates to be issued to ANPs and IDPs.</t>
    </list></t>
  </li></ul>
</li></ul>

<t>Closed Access Group (CAG):</t>

<ul empty="true"><li>
  <t>The definition of the 12 most significant bits of an OUI-36 RCOI to indicate OpenRoaming policy controls that
can be enforced by ANPs and IDPs.</t>
</li></ul>

<t>Identity Provider (IDP):</t>

<ul empty="true"><li>
  <t>An entity that has joined the federation and
includes the OpenRoaming RCOI(s) in the Passpoint profile of its end-user devices and
authenticates end-user devices on OpenRoaming ANP networks.</t>
</li></ul>

<t>Level of Assurance (LoA):</t>

<ul empty="true"><li>
  <t>An ISO/IEC 29115 term that is used to define equivalent levels for handling of end-user enrollment, credential management
and authentication amongst different IDPs.</t>
</li></ul>

<t>OpenRoaming-Settled:</t>

<ul empty="true"><li>
  <t>The "base RCOI" of BA-A2-D0 that is used to indicate that the ANP expects to receive payment for
providing OpenRoaming service to end-users.</t>
</li></ul>

<t>OpenRoaming-Settlement-Free:</t>

<ul empty="true"><li>
  <t>The "base RCOI" of 5A-03-BA that is used to indicate that the ANP provides the OpenRoaming service to end-users at
no cost to the IDP.</t>
</li></ul>

<t>Passpoint Profile:</t>

<ul empty="true"><li>
  <t>Passpoint is a Wi-Fi Alliance (WFA) certification program that defines the use a Passpoint profile, that includes the user's credentials
and the access network identifiers, to enables Wi-Fi devices to automatically discover and authenticate to Wi-Fi hotspots
that provide Internet access <xref target="PASSPOINT"/>.</t>
</li></ul>

<t>PLMN Id:</t>

<ul empty="true"><li>
  <t>A unique identifier for a mobile network operator. The identifier consists of a MCC (Mobile Country Code) and a MNC (Mobile Network Code). ITU-T Recommendation <xref target="E212"/> defines both MCC and MNC. The ITU allocates MCC values to national regulators who are then responsible for allocating MNC values to individual mobile network operators.  <xref target="PASSPOINT"/> defines how the PLMN Id can be sent in ANQP messages.</t>
</li></ul>

<t>Roaming Consortium Identifier (RCOI):</t>

<ul empty="true"><li>
  <t>RCOI identifies the groups of identity providers that are supported by the network.
It is a 3-octet, or a 5-octet value carried in the 802.11 beacon information element (IE).
It is also sent in the ANQP messages. Based on the access technologies, the specific link-layer
protocols will be used for carrying the RCOI. RCOI is also part of the Passpoint profile.</t>
</li></ul>

<ul empty="true"><li>
  <t>NOTE: OpenRoaming only uses 5-octet RCOIs.</t>
</li></ul>

<t>Subscriber Identity Module (SIM):</t>

<ul empty="true"><li>
  <t>The SIM is traditionally a smart card distributed by a mobile operator.</t>
</li></ul>

<t>WBA Identity (WBAID):</t>

<ul empty="true"><li>
  <t>A hierarchical namespace that is used to uniquely identify every OpenRoaming entity.</t>
</li></ul>

<t>Wireless Roaming Intermediary eXchange:</t>

<ul empty="true"><li>
  <t>A framework, aimed at facilitating
  interconnectivity between operators and the Wi-Fi roaming hub services.</t>
</li></ul>

</section>
</section>
<section anchor="wireless-broadband-alliance"><name>Wireless Broadband Alliance</name>

<t>The Wireless Broadband Alliance (WBA) defines the Wireless
Roaming Intermediary eXchange (WRIX) framework, aimed at facilitating
interconnectivity between Wi-Fi operators and the Wi-Fi roaming hub services,
as well as the Carrier Wi-Fi Services program that provides guidelines to
improve customer experience on Carrier Wi-Fi networks. Both of these
programs leverage the Wi-Fi Alliance specified Passpoint functionality
<xref target="PASSPOINT"/> to enable automatic and secure connectivity to Wi-Fi networks, allowing devices
to be provisioned with network access credentials with minimal user interaction.</t>

<t>WBA programs have traditionally focussed on "offloading"
cell phone data from cellular networks onto Wi-Fi networks.
Deployments of such systems have seen uneven
adoption across geographies, with cellular operators frequently limiting
their engagement to premier locations that have deployed Wi-Fi and experience
a significant footfall of operator's customers.</t>

<t>Whereas conventional Carrier Wi-Fi has focused on premier locations, the
last decade has seen a continued increase in the requirements of private Wi-Fi
networks to be able to serve visitors, contractors and guest users. Moreover, in
most of these scenarios, the Wi-Fi network is primarily being used to support some
alternative value proposition; an improved retail experience in a shopping
mall, a more efficient meeting in a carpeted office, a superior stay in a
hospitality venue, or a better fan experience in a sporting arena. Traditionally,
this segment has made wide-scale use of captive portals and unencrypted Wi-Fi links
to onboard end-users onto their networks <xref target="RFC8952"/>. However, the decreasing costs for cellular data means
end-users are less motivated to search out and attach to such "free" Wi-Fi
networks, and as a consequence, captive portal conversion rates continue to decrease.</t>

<t>As a consequence, in 2020 WBA launched its OpenRoaming federation,
designed to provide a better on-boarding experience to end-users, that is seamless, scalable and secure.</t>

</section>
<section anchor="orarch"><name>OpenRoaming Architecture</name>

<t><xref target="figwifiarch"/> contrasts a conventional carrier Wi-Fi roaming system with OpenRoaming.
As illustrated, conventional Wi-Fi roaming has typically been based on:</t>

<t><list style="numbers" type="1">
  <t>IPSec <xref target="RFC6071"/> tunnels established between access networks, hub providers and identity providers used to protect exchanged signalling.</t>
  <t>Static routing of RADIUS signalling <xref target="RFC2865"/> based on realm routing tables populated according to agreements between access networks and hub providers.</t>
  <t>Passpoint primarily used with SIM based identifiers, where individual PLMN Ids are configured on the access networks WLAN equipment enabling them to be sent in ANQP messages, and cellular providers enable Passpoint based SIM authentication in end-user devices.</t>
  <t>EAP-AKA <xref target="RFC4187"/> based Passpoint authentication exchanged between the Supplicant in the end-user device and the EAP Server in the cellular provider's network.</t>
  <t>A primary focus on carrier based identities where the end-user has a billing relationship with the carrier.</t>
</list></t>

<t>In contrast, OpenRoaming is based on:</t>

<t><list style="numbers" type="1">
  <t>RadSec signalling <xref target="RFC6614"/> secured using mTLS with certificates issued under WBA's private certificate authority.</t>
  <t>Dynamic routing of RADIUS based on DNS-based discovery of signalling peers <xref target="RFC7585"/></t>
  <t>Passpoint based network selection based on 36-bit Roaming Consortium Organization Identifiers (RCOIs), where WBA defines the use of the 12 most significant bits of the 36-bit RCOI to embed closed access group policies.</t>
  <t>Passpoint authentication that can use any suitable EAP method.</t>
  <t>Encompassing new identity providers who do not have a billing relationship with their end-users.</t>
</list></t>

<t>Example EAP methods used with Passpoint include EAP-TLS, EAP-SIM, EAP-AKA, EAP-AKA' and EAP-TTLS with MS-CHAP-V2 that are included in Table 4 of the Passpoint specification <xref target="PASSPOINT"/>. In addition to these 5 EAP methods, Wi-Fi devices are available that can be configured to use different EAP type with Passpoint, including Passpoint with Protected EAP (PEAP) <xref target="PEAP"/>, EAP-TEAP <xref target="RFC7170"/> and EAP-FAST <xref target="RFC4851"/> outer methods, together with alternative inner methods to MS-CHAP-V2 used inside EAP-TTLS, including EAP-TLS.
Because OpenRoaming ANPs have no direct relationship with OpenRoaming IDPs that decide the credential type and EAP method to use when authenticating End-User devices, OpenRoaming ANPs SHOULD ensure that all EAP Methods compatible with Passpoint can be used to authenticate End-User devices.</t>

<figure title="Contrasting Carrier Wi-Fi and OpenRoaming Architectures" anchor="figwifiarch"><artwork><![CDATA[
+---------+        +--------+        +--------+        +--------+              
| Visited |        | Wi-Fi  |        | Wi-Fi  |        |Cellular|              
|  Wi-Fi  |        |  Hub   |        |  Hub   |        |Provider|              
| Network |<------>|Provider|<------>|Provider|<------>|Network |              
|         | RADIUS |        | RADIUS |        | RADIUS |        |              
|   NAS   |        | RADIUS |        | RADIUS |        | RADIUS |              
|         |<------>| proxy  |<------>| proxy  |<------>| Server |              
|Passpoint| IPSec  +--------+ IPSec  +--------+ IPSec  +--------+              
|PLMNId(s)|                                                                    
+---------+                                                                    
    /|\                                                                        
     |                                                                         
    \|/                                                                        
+---------+         A) Conventional Carrier Wi-Fi                              
|Passpoint|                                                                    
| device  |                                                                    
|  with   |                                                                    
| PLMN-Id |                                                                    
| profile |                                                                    
+---------+                                                                    


+---------+                   +---+                    +--------+              
| Visited |<----------------->|DNS|<------------------>|Identity|              
|  Wi-Fi  |   DNS based peer  +---+  Configure NAPTR,  |Provider|              
| Network |      discovery            SRV and A/AAAA   |Network |              
|         |                              records       |        |              
|   NAS   |                                            | RADIUS |              
|         |<------------------------------------------>| Server |              
|Passpoint|        RadSec/TLS secured using mTLS       +--------+              
| RCOI(s) |               and WBA PKI                                          
+---------+                                                                    
    /|\                                                                        
     |                                                                         
    \|/                                                                        
+---------+              B) OpenRoaming                                        
|Passpoint|                                                                    
| device  |                                                                    
|  with   |                                                                    
| RCOI(s) |                                                                    
| profile |                                                                    
+---------+                                                                    

]]></artwork></figure>

</section>
<section anchor="wbaid"><name>Identifying OpenRoaming Entities</name>

<t>All OpenRoaming providers and OpenRoaming brokers are allocated a WBA Identity (WBAID). The
WBAID is defined to be transported in the RADIUS Operator-Name attribute (#126) <xref target="RFC5580"/>.
WBA has been allocated the Operator Namespace identifier 0x34 "4" to identify
an Operator-Name attribute carrying a WBAID.</t>

<t>The WBAID is a hierarchical namespace that comprises at its top level the
identity allocated by WBA to a WBA Member and is of the form shown in <xref target="figwbaid"/>
where the optional 2 upper case characters represent an ISO-3166 Alpha-2 country code <xref target="ISO3166"/> e.g.,
"WBAMEMBER:US".</t>

<figure title="ABNF definition of Primary WBAID Structure" anchor="figwbaid"><artwork><![CDATA[
upper-case-char = %x41-5a
member-id       = 1*upper-case-char
wbaid           = member-id [ %x3a 2*2upper-case-char]

]]></artwork></figure>

<t>When operating as an OpenRoaming broker, the WBA Member
is able to allocate subordinate identities to OpenRoaming providers
who are not WBA members by pre-pending a subordinate identity ,
plus "." (%x2e) to the Member's WBAID, e.g., "OPENROAMINGPROVIDER.WBAMEMBER:US".
In this way, any receiving entity of a WBAID can identify the WBA Member who
is acting as an OpenRoaming broker to the provider by assigning it an identity.</t>

</section>
<section anchor="sss"><name>Scaling Secured Signalling</name>

<t>As described in <xref target="legal"/>, the OpenRoaming legal framework does not assume
any direct relationship between ANP and IDP. In order to scale the
secured signalling between providers, the federation makes use of a
Public Key Infrastructure using a private Certificate Authority specifically
designed to secure the operations of the roaming federation. WBA
and its members have published the WBA Certificate Policy <xref target="WBAPKICP"/> that defines the
policies which govern the operations of the PKI components by all
individuals and entities within the infrastructure. The OID for Wireless
Broadband Alliance is:</t>

<t>{ iso(1) identified-organization(3) dod(6) internet(1) private(4) enterprise(1) The Wireless Broadband Alliance(14122) }</t>

<t>The Wireless Broadband Alliance organizes its OID arcs for the Certificates
Policy Documents using the object identifier 1.3.6.1.4.1.14122.1.1. At the time of writing,
the current certificate policy is 1.3.6.1.4.1.14122.1.1.7.</t>

<t>This Certificate Policy is based on a 4-level hierarchy, as illustrated in <xref target="figpki"/>.</t>

<figure title="OpenRoaming PKI Hierarchy" anchor="figpki"><artwork><![CDATA[
+---------+---------------------------+----------------------------+
|         |                           |                            |
| Level   | Description               |  Comment                   |
|         |                           |                            |
+---------+---------------------------+----------------------------+
| Level 1 | OpenRoaming Root          | Operation managed by WBA   |
|         | Certificate Authority     |                            |
+---------+---------------------------+----------------------------+
| Level 2 | OpenRoaming Policy        | Operation managed by WBA.  |
|         | Intermediate Certificate  | Instantiates WBA policy OID|
|         | Authority                 |                            |
+---------+---------------------------+----------------------------+
| Level 3 | OpenRoaming Issuing       | Operated by an OpenRoaming |
|         | Intermediate Certificate  | broker                     |
|         | Authority                 |                            |
+---------+---------------------------+----------------------------+
| Level 3 | OpenRoaming Registration  | Optional and when used,    |
|         | Authority                 | operated by an OpenRoaming |
|         |                           | broker                     |
+---------+---------------------------+----------------------------+
| Level 4 | OpenRoaming Entity        | A WBA member or non-member.|
|         |                           | WBA's Certificate Policy   |
|         |                           | requires the Entity's      |
|         |                           | WBAID is included in the   |
|         |                           | Subject UID field in the   |
|         |                           | certificate.               |
+---------+---------------------------+----------------------------+

]]></artwork></figure>

<t>Certificates issued under the WBA PKI are used by Entities to perform mutual
authentication with other Entities and to secure RadSec
signalling <xref target="RFC6614"/> that carries EAP-based Passpoint authentication. This is typically between a
RadSec client in the OpenRoaming ANPs network and an RadSec Server in the OpenRoaming
IDPs network, although a provider can decide to outsource the operation of the RadSec
endpoint to a third party provider.</t>

<t>OpenRoaming is a distributed federation that lacks a centralized RADIUS element for identifying
and troubleshooting signalling issues. Instead, the WBA operates cloud-based systems capable of verifying
the correct configuration of DNS and TLS endpoints for OpenRoaming IDPs that have registered their realms with the WBA.
This baseline testing by the WBA ensures that ANPs and IDPs can establish a TLS connection,
such as when an end-user from an IDP roams into the coverage area of Wi-Fi networks operated by an ANP.</t>

<t>To provide a scalable system that enables access and identity providers to collaboratively troubleshoot and resolve issues, the WBA Certificate Practice Statement mandates that the Subject Alternative Name (SAN) attribute in
issued end-entity certificates includes a contact email address responsible for handling issues raised by third-party providers. The OpenRoaming legal framework requires ANPs and IDPs to make reasonable efforts to support troubleshooting procedures. This includes monitoring the email address listed in the SAN attribute of the certificate and responding to any issues raised by legitimate third parties.</t>

</section>
<section anchor="dpd"><name>IDP Discovery</name>

<section anchor="dynamic-discovery"><name>Dynamic Discovery</name>

<t>OpenRoaming defines the use of dynamic discover <xref target="RFC7585"/> by which an ANP discovers the
IP address of the IDP's RadSec server.</t>

</section>
<section anchor="discovery-of-eap-akaaka-servers"><name>Discovery of EAP-AKA/AKA' Servers</name>

<t>Passpoint defines the use of EAP-AKA' based authentication <xref target="RFC5448"/> which uses the
3GPP 23.003 <xref target="TS23003"/> defined realm of wlan.mnc&lt;mnc&gt;.mcc&lt;mcc&gt;.3gppnetwork.org, where
&lt;mcc&gt; represent an E.212 Mobile Country Code and &lt;mnc&gt; represents the E.212
Mobile Network Code allocated to the IDP. GSMA is responsible for
operating the 3gppnetwork.org domain and GSMA IR.67 <xref target="GSMAIR67"/> limits access to
the DNS systems supporting such records to those systems connected to the inter-PLMN IP
backbone (known as "GRX/IPX"). As OpenRoaming ANPs do not connect to this inter-PLMN backbone,
then conventional realm based lookup cannot be used over the Internet to discover the RadSec server
supporting EAP-AKA' authentication.</t>

<t>GSMA IR.67 does allow systems to be discoverable
from the public Internet, specifically calling out the use of the
pub.3gppnetwork.org domain name for such procedures. In order for ANPs
to dynamically discover the RadSec server supporting EAP-AKA' authentication,
GSMA has defined the use of the wlan.mnc&lt;mnc&gt;.mcc&lt;mcc&gt;.pub.3gppnetwork.org by
OpenRoaming systems. This means that whenever a RadSec client receives a user-name
containing an NAI formatted as user@wlan.mnc&lt;mnc&gt;.mcc&lt;mcc&gt;.3gppnetwork.org, the dynamic
peer detection functionality MUST insert ".pub" into the realm and perform
DNS based dynamic discovery using the wlan.mnc&lt;mnc&gt;.mcc&lt;mcc&gt;.pub.3gppnetwork.org
domain name. The RADIUS user-name attribute MUST NOT be similarly modified.</t>

<t>IR.67 defines the procedure by which a cellular operator can request the delegation
of their mnc&lt;mnc&gt;.mcc&lt;mcc&gt;.pub.3gppnetwork.org sub-domain.  GSMA PRD IR.67 also allows an MNO
to delegate the entire mnc&lt;MNC&gt;.mcc&lt;MCC&gt;.pub.3gppnetwork.org sub-domain
which could have already occurred, e.g., to enable use of the
epdg.mnc&lt;MNC&gt;.mcc&lt;MCC&gt;.pub.3gppnetwork.org used with 3GPP's Wi-Fi calling service. Using this approach,
a cellular operator operating as an OpenRoaming IDP can authenticate their end-users on
third party ANP Wi-Fi networks.</t>

</section>
<section anchor="proving-a-discovered-radsec-server-is-authoritative-for-a-realm"><name>Proving a discovered RadSec server is authoritative for a realm</name>

<t>The OpenRoaming preferred approach to dynamically discover the RadSec server
IP address serving a particular realm or set of realms is to
use DNS records that are protected with DNSSEC <xref target="RFC9364"/>. However, GSMA
has not enabled DNSSEC on its 3gppnetwork.org domain, meaning that DNSSEC
cannot be applied on the publicly resolvable domains under pub.3gppnetwork.org.
Because of this situation, OpenRoaming does not currently mandate operation of DNSSEC.</t>

<t>If the DNS records for a realm are not protected with DNSSEC, because the realm
has been provided directly by the OpenRoaming End-User, the
IDP SHOULD ensure that the discovered RadSec server(s) supporting its realm(s)
is/are configured with a WBA-PKI server certificate that includes the realm(s)
used in the dynamic peer detection in the certificate SubjectAltName.</t>

<t>Where the DNS records are protected with DNSSEC, the IDP SHOULD ensure that
the discovered RadSec server(s) supporting its realm(s)
is/are configured with a WBA-PKI server certificate that includes the
derived name(s) from the secured DNS NAPTR/SRV query in the
certificate SubjectAltName.</t>

<t>Where the OpenRoaming IDP has offloaded the operation of RadSec termination to a
third party hub-provider that is responsible for supporting a number of independent realms,
the hub-provider SHOULD ensure that the discovered RadSec server(s) supporting
the independent realms from its partner IDPs
is/are configured with a WBA-PKI server certificate that includes the
derived name(s) from the DNS NAPTR/SRV query in the
certificate SubjectAltName.</t>

</section>
<section anchor="co-existence-with-other-federations"><name>Co-existence with other Federations</name>

<t>Other federations which want to interface to the OpenRoaming federation may use
dynamic discovery with distinct NAPTR application service tags to facilitate integration.
For example, an eduroam service provider can use the use the "x-eduroam"
application service tag, specified in <xref target="RFC7593"/>, to discover the home institution's
RadSec peer for authentication, and OpenRoaming ANPs can use the "aaa+auth" tag to discover
a separate RadSec peer that can be defined for handling all inter-domain authentications.</t>

<t>Where a separate inter-federation RadSec peer is not used, the other federation AAA operating
as an OpenRoaming IDP needs to determine which certificate chain to return in its ServerHello message.
An OpenRoaming ANP operating with TLS 1.3 SHOULD use the "certificate_authorities" extension <xref target="RFC8446"/>
in its ClientHello message to indicate that the ANP supports the WBA PKI Certificate Authority trust anchor.
Similarly, an OpenRoaming ANP operating using TLS 1.2 SHOULD use the "trusted_ca_keys" extension <xref target="RFC6066"/> in its ClientHello message to indicate the DistinguishedName of the WBA PKI Certificate Authority whose root keys the ANP possesses. The federation AAA operating as an OpenRoaming IDP MAY use information in the ClientHello extension to guide its certificate selection.</t>

</section>
</section>
<section anchor="PASSPOINT-SEC"><name>OpenRoaming Passpoint Profile</name>

<section anchor="openroaming-policy-controls"><name>OpenRoaming Policy Controls</name>

<t>In order to avoid possible fragmentation of roaming federations, OpenRoaming recognizes
that there is a need to permit OpenRoaming to be integrated into a variety of
different use-cases and value propositions. These use-cases include scenarios where
providers are able to enforce policy controls of which end-users are authorized to access the service.
The realization of authorization policy controls in the OpenRoaming federation is a balance
between the requirements for fine grain policy enforcement versus the potential
impact of policy enforcement on the user experience.</t>

<t>Such a level of control is realized using Closed Access Group (CAG) based policies.
A Closed Access Group identifies a group of OpenRoaming users who are permitted
to access one or more OpenRoaming access networks configured with a particular CAG policy.
These Closed Access Group policies are encoded using one or more
Roaming Consortium Organization Identifiers (RCOIs), first defined
in Passpoint Release 1.0, and well supported
across the smartphone device ecosystem.</t>

<t>Note, encoding CAG policies in OpenRoaming using one or more RCOIs is aimed at
delivering an equivalent functionality to the CAG policies encoded in 3GPP using one or more CAG-IDs.</t>

</section>
<section anchor="CAG"><name>OpenRoaming Closed Access Group Policies</name>

<t>OpenRoaming defines the use of multiple RCOIs to facilitate the implementation of
closed access group policies across the federation. The currently defined RCOIs are:</t>

<t><list style="symbols">
  <t>OpenRoaming-Settled:  BA-A2-D0-xx-x</t>
  <t>OpenRoaming-Settlement-Free:  5A-03-BA-xx-x</t>
</list></t>

<t><xref target="figrcoi"/> shows how the 24-bit length OpenRoaming RCOIs are further extended into 36-bit length OUI-36s
with additional context dependent identifiers used to encode specific closed access group
policies. Following Passpoint Release 1.0 specification, only when there is a bitwise match of
all 36 bits of the configured RCOI in the WLAN equipment and the Passpoint profile configured in the
end-user device will an EAP authentication be triggered.</t>

<t>The encoding of closed access group policies is defined so that the "no-restrictions" policy is
encoded using the 12-bit value "00-0", i.e., 54-03-BA-00-0 represents a policy
that accepts all OpenRoaming settlement-free users onto a particular ANP installation.</t>

<figure title="Extension of Octets 4 and 5 for OpenRoaming Context Dependent RCOI Field " anchor="figrcoi"><artwork><![CDATA[
+---------------------------------------+-------------------+
|               OUI-36 Octet 4          |  OUI-36 Octet 5   |
+---------------------------------------+-------------------+
| B7 | B6 | B5 | B4 | B3 | B2 | B1 | B0 | B7 | B6 | B5 | B4 |
+----+---------+----+-------------------+-------------------+
| LoA|   QoS   |PID |     ID-Type       |On-b|  Reserved -  |
|    |         |    |                   |oard|   set to 0   |
+----+---------+----+-------------------+-------------------+

]]></artwork></figure>

<section anchor="level-of-assurance-policies"><name>Level of Assurance Policies</name>

<t>The format of the Level of Assurance (LoA) field is as shown in <xref target="figloa"/>.</t>

<figure title="OpenRoaming CAG LoA Field " anchor="figloa"><artwork><![CDATA[
+------------------------------------------------------------+
|  LoA Field  |           Description                        |
+------------------------------------------------------------+
|     B7      |                                              |
+------------------------------------------------------------+
|     0       |   Baseline Identity Proofing                 |
+------------------------------------------------------------+
|     1       |   Enhanced Identity Proofing                 |
+------------------------------------------------------------+

]]></artwork></figure>

<t>The baseline identity proofing requirement on IDPs ensures that all
OpenRoaming identities are managed with at least a medium level of
assurance (LoA level 2) for end-user enrollment, credential management
and authentication, as specified in ISO/IEC 29115 <xref target="ISO29115"/>.</t>

<t>Any IDP that manages its identities according to ISO/IEC 29115 LoA level 2
MUST NOT configure any RCOI in their end-users' Passpoint profile
with the LoA field set to "1". Conversely, an IDP that manages its identities
according to ISO/IEC 29115 LoA level 3 MAY configure multiple RCOIs
in their end-users' Passpoint profile, including RCOIs with the LoA field
set to "0" and RCOIs with the LoA field set to "1".</t>

<t>The LoA field is used to support ANPs which operate in regulatory
regimes that require enhanced identity proofing to be used in the
provision of credentials on OpenRoaming devices, equivalent to LoA level
3 in ISO/IEC29115 <xref target="ISO29115"/>. In such a scenario, the ANP can set the LoA bit
field to 1 in all configured RCOIs to ensure that only identities
provisioned using enhanced LoA 3 procedures can access via the ANP's network.</t>

</section>
<section anchor="quality-of-service-policies"><name>Quality of Service Policies</name>

<t>One of the challenges faced by users of Wi-Fi hotspots is when the Wi-Fi network
is configured sub-optimally and results in a poor user experience. Often the only
remedy open to a user it to disable the Wi-Fi interface on their smartphone and
continue to use cellular data. This is especially the case where the Wi-Fi hotspot
has been automatically selected with no user intervention. As a consequence, OpenRoaming defines specific
service tiers across the federation and uses the QoS field to differentiate between different tiers.
The format of the QoS field is shown in <xref target="figqos"/>.</t>

<figure title="OpenRoaming CAG QoS Field " anchor="figqos"><artwork><![CDATA[
+------------------------------------------------------------+
|            QoS Field              |      Description       |
+------------------------------------------------------------+
|        B6       |        B5       |                        |
+------------------------------------------------------------+
|        0        |        0        |        Bronze          |
+------------------------------------------------------------+
|        0        |        1        |        Silver          |
+------------------------------------------------------------+
|        1        |        0        |       Reserved         |
+------------------------------------------------------------+
|        1        |        1        |       Reserved         |
+------------------------------------------------------------+
]]></artwork></figure>

<t>The "Bronze" and "Silver" values of QoS field are used to identify
specific quality of service policy aspects.</t>

<t>The bronze service tier corresponds to the following:</t>

<t><list style="numbers" type="1">
  <t>The availability of OpenRoaming service
when used to access the Internet measured during scheduled operations
across the ANP's network exceeds 90% over any one month period.</t>
  <t>The aggregate bandwidth used to receive
Internet service on the ANP's network is sufficient to enable
each and every authenticated and authorized OpenRoaming end-user to simultaneously receive a
sustained 256 kilobits per second connection.</t>
</list></t>

<t>The silver service tier corresponds to the following:</t>

<t><list style="numbers" type="1">
  <t>The availability of OpenRoaming service
when used to access the Internet measured during scheduled operations
across the ANP's network exceeds 95% over any one month period.</t>
  <t>The aggregate bandwidth used to receive
Internet service on the ANP's network is be sufficient to enable
each and every authenticated and authorized end-user to receive a
sustained 512 kilobits per second connection.</t>
  <t>At least 10% of authenticated and authorized users are able
to stream video content at a downlink rate of at least 5 megabits per
second (when measured over a one-minute interval) over all of the ANP's
OpenRoaming enabled Wi-Fi networks.</t>
  <t>The authenticated and authorized end-users are
able to stream video from one or more third party content distribution
networks with an end-to-end latency of less than 150ms from all of the
ANP's OpenRoaming enabled Wi-Fi networks.</t>
</list></t>

<t>The QoS field can be used by those IDPs that are only interested in providing
their end-users with a higher quality service level when automatically authenticated
onto an OpenRoaming network. For example, an IDP configures the QoS field
as bronze in a Passpoint profile that uses the "5A-03-BA" settlement free RCOI and
configures the QoS field as silver in a Passpoint profile that uses the
"BA-A2-D0" OpenRoaming-settled paid service.</t>

<t>ANPs that only support the bronze service tier MUST set the QoS Field to "00" in
all RCOIs configured on their WLAN equipment. ANPs that support the silver service
tier MAY configure multiple RCOIs on their WLAN equipment that include values where
the QoS field is set to "01" and values where the QoS field is set to "00".</t>

<t>Exceptionally, ANPs that operate OpenRoaming installations on moving platforms
are permitted to deviate from normal OpenRoaming service level requirements. This is
because such installations may necessitate use of cellular-based backhaul and/or
backhaul via Non-Terrestrial Networks (NTN) which may not be able to meet the
OpenRoaming minimum "bronze" service level requirements.
If an ANP wants to benefit from such deviations, it MUST signal using the WLAN-Venue-Info
attribute <xref target="RFC7268"/> that it is operating in a venue category identified using
a Venue Group value of "10", which is defined in Section 8.4.1.34 of <xref target="IEEE80211"/>
as being used for vehicular installations. In such cases, the OpenRoaming ANP MAY
signal one or more WBA-Custom-SLA vendor specific attributes <xref target="WBAVSA"/> to indicate
one or more (availability, per-user sustained bandwidth) tuples to the IDP.</t>

<t>IDP availability requirements:</t>

<t>Irrespective of the service-levels supported by their users, the IDP shall ensure
that the availability of their authentication service measured during scheduled
operations shall exceed 99% over any one month period.</t>

</section>
<section anchor="privacy-policies"><name>Privacy Policies</name>

<t>The baseline privacy policy of OpenRoaming ensures
the identities of end-users remain anonymous when using the
service. The WBA WRIX specification specifies that where supplicants use EAP methods
that support user-name privacy, i.e., which are compatible with the "@realm" (or "anonymous@realm") (outer) EAP-Identifier,
then the supplicant SHOULD use the anonymized outer EAP identifier. Supplicants supporting
other EAP methods SHOULD support EAP method specific techniques for masking the
end-user's permanent identifier, for example pseudonym support in EAP-AKA/AKA' <xref target="RFC4187"/>
and/or enhanced IMSI privacy protection <xref target="WBAEIPP"/>. OpenRoaming IDPs SHOULD support and
enable the corresponding server-side functionality to ensure end-user privacy is protected.</t>

<t>The WBA WRIX specification also recognizes that the privacy of end-users can be
unintentionally weakened by the use of correlation identifiers signalled using the
Chargeable-User-Identity attribute (#89) <xref target="RFC4372"/> and/or the Class attribute (#25) <xref target="RFC2865"/>
in the RADIUS Access-Accept packet. The WBA WRIX Specification recommends that the
default IDP policy SHOULD ensure that, when used, such correlation identifiers are unique for
each combination of end-user/ANP and that the keys and/or initialization vectors
used in creating such correlation identifiers SHOULD be refreshed at least every 48 hours,
but not more frequently than every 2 hours.</t>

<t>This 2 hour limit is designed to assist the ANP in performing autonomous troubleshooting
of connectivity issues from authentic users/devices that are repeatedly re-initiating
connectivity to the ANP's network and/or to assist the ANP in identifying a new session
originated by an authentic user/device that has previously been identified by the ANP as having violated the OpenRoaming
end-user terms and conditions. When using typical public Wi-Fi session durations, it is
estimated that, with this 2 hour restriction, the ANP will be able to correlate an
Access-Request/Access-Accept exchange that immediately follows an Accounting-Request
stop message in over 50% of the sessions.</t>

<t>In contrast to this default policy, there can be scenarios where the ANP
desires to derive value from its OpenRoaming settlement-free service by analysing
aggregate end-user behaviour. Whereas the use of aggregated end-user information does not
violate the OpenRoaming privacy policy, the derivation of such can benefit from the
ANP being able to uniquely identify end-users. In order to support such scenarios, the
OpenRoaming closed access group policies include the PID field.</t>

<t>The PID field can be used to support scenarios where the user has consented
with their IDP that an immutable end-user identifier can be signalled to the
ANP in the RADIUS Access-Accept. The format of the PID field is
illustrated in <xref target="figpid"/>. The PID
field can be configured to "1" in the RCOIs used by those ANPs that
want to be be able to account for unique OpenRoaming end-users.</t>

<t>The OpenRoaming IDP terms ensure subscribers MUST
explicitly give their permission before an immutable end-user identity
is shared with a third party ANP. When such permission has
not been granted, an IDP MUST NOT set the PID field to "1" in any
of the RCOIs in its end-user Passpoint profiles. When such permission has
been granted, an IDP MAY configure multiple RCOIs
in their end-users' Passpoint profile, including RCOIs with the PID field
set to "0" and RCOIs with the PID field set to "1".</t>

<figure title="OpenRoaming CAG PID Field " anchor="figpid"><artwork><![CDATA[
+------------------------------------------------------------+
|  PID Field  |                 Description                  |
+------------------------------------------------------------+
|     B4      |                                              |
+------------------------------------------------------------+
|     0       |   Baseline ID Policy applies, i.e., users    |
|             |   remain anonymous whilst using the service. |
+------------------------------------------------------------+
|     1       |   An immutable end-user ID will be returned  |
|             |   by the IDP in the Access-Accept packet.    |
+------------------------------------------------------------+

]]></artwork></figure>

</section>
<section anchor="id-type-policies"><name>ID-Type Policies</name>

<t>The ID-Type field can be used to realize policies which are based
on the business sector associated with the identity used by the IDP.
The format of the ID-Type
field is illustrated in <xref target="figidtype"/>.</t>

<t>All IDPs configure at least one RCOI in their end-user's
Passpoint profile with ID-Type set to "0000" (Any identity type is permitted).
An IDP MAY configure additional RCOIs in their end-users' Passpoint profile
with an ID-Type representing the sector type of IDP.</t>

<t>An ANP what wants to serve all end-users, irrespective of sector,
configures RCOIs in the WLAN equipment with ID-Type set to "0000".
Alternatively, an ANP which operates a sector specific business that
only desires to serve a subset of OpenRoaming end-users MAY set the ID-Type
to their desired sector in all configured RCOIs.</t>

<figure title="OpenRoaming CAG ID-Type Field " anchor="figidtype"><artwork><![CDATA[
+------------------------------------------------------------+
|       ID-Type Field       |           Description          |
+------------------------------------------------------------+
|  B3  |  B2  |  B1  |  B0  |                                |
+------------------------------------------------------------+
|  0   |  0   |  0   |  0   | Any identity type is permitted |
+------------------------------------------------------------+
|  0   |  0   |  0   |  1   | A service provider identity    |
+------------------------------------------------------------+
|  0   |  0   |  1   |  0   | A cloud provider identity      |
+------------------------------------------------------------+
|  0   |  0   |  1   |  1   | A generic enterprise identity  |
+------------------------------------------------------------+
|  0   |  1   |  0   |  0   | A government identity, e.g.,   |
|      |      |      |      | including city                 |
+------------------------------------------------------------+
|  0   |  1   |  0   |  1   | An automotive identity         |
+------------------------------------------------------------+
|  0   |  1   |  1   |  0   | A hospitality identity         |
+------------------------------------------------------------+
|  0   |  1   |  1   |  1   | An aviation industry identity  |
+------------------------------------------------------------+
|  1   |  0   |  0   |  0   | An education or research       |
|      |      |      |      | identity                       |
+------------------------------------------------------------+
|  1   |  0   |  0   |  1   | A cable industry identity      |
+------------------------------------------------------------+
|  1   |  0   |  1   |  0   | A manufacturer identity(note 1)|
+------------------------------------------------------------+
|  1   |  0   |  1   |  1   | A retail identity              |
+------------------------------------------------------------+
|        other values       | Reserved                       |
+------------------------------------------------------------+
| NOTE 1: A manufacturer identity closed access group policy |
| applies to IoT credentials corresponding to manufacturer   |
| installed identities as well as IoT credentials            |
| corresponding to owner installed identities.               |
+------------------------------------------------------------+

]]></artwork></figure>

</section>
<section anchor="on-boarding-credential-policies"><name>On-boarding Credential Policies</name>

<t>The format of the on-boarding credential policy (On-board) field is as shown in <xref target="figonboard"/>.</t>

<figure title="OpenRoaming CAG On-board Field " anchor="figonboard"><artwork><![CDATA[
+------------------------------------------------------------+
| On-board Field  |               Description                |
+------------------------------------------------------------+
|  B7 Octet 5     |                                          |
+------------------------------------------------------------+
|     0           |   A long-lived identity                  |
+------------------------------------------------------------+
|     1           |   A short-lived identity                 |
+------------------------------------------------------------+

]]></artwork></figure>

<t>The On-board field is used to identify closed access group
policy aspects related to whether the identity/profile is
long-lived, or whether the identity/profile is short-lived.
Short-lived profiles are intended to only be used to provide
connectivity such that the procedure for configuring a
long-lived identity/profile can be performed.</t>

<t>Sessions authorized with short-lived credentials MUST have a
session-timeout value of less than 300 seconds.</t>

</section>
</section>
<section anchor="prioritizing-policies"><name>Prioritizing Policies</name>

<t>The  definition of OpenRoaming closed access group policies assumes
the configuration of multiple RCOIs in ANP WLAN equipment and IDP end-user devices.</t>

<t>When a device has multiple Passpoint profiles matching the ANP's RCOI policy,
an OpenRoaming ANP may want to prefer OpenRoaming subscribers use a particular IDP's
profile when attaching to its access network. Such a preference can be because
the OpenRoaming ANP has a preferential relationship with certain OpenRoaming IDPs.</t>

<t>The OpenRoaming ANP is able to use the Home SP preference functionality defined in
Passpoint <xref target="PASSPOINT"/> to prioritize the use of a particular profile by a Passpoint enabled device.
In such a scenario, the ANP configures the Domain Name list to include the
FQDN(s) associated with the profile(s) to be prioritized.</t>

</section>
</section>
<section anchor="RADIUS"><name>OpenRoaming RADIUS Profile</name>

<t>The OpenRoaming RADIUS profile is based on the WBA WRIX Specification which in turn
are derived from <xref target="RFC3580"/> and <xref target="RFC3579"/>. All ANPs MUST support RADIUS Accounting
for all OpenRoaming sessions, irrespective of which RCOIs are supported, i.e., for both
settled and settlement free service. All IDPs MUST respond to any RADIUS Access-Request
and Accounting-Request packet received.</t>

<t>Additionally, OpenRoaming defines the use of the following RADIUS attributes.</t>

<section anchor="operator-name"><name>Operator-Name</name>

<t>As described in <xref target="wbaid"/>, OpenRoaming uses the Operator-Name (#126) <xref target="RFC5580"/> attribute to signal
the WBAID of the OpenRoaming ANP. All ANPs MUST support the Operator-Name attribute and use it to signal the
WBAID of the OpenRoaming ANP.</t>

</section>
<section anchor="chargeable-user-identity"><name>Chargeable-User-Identity</name>

<t>All OpenRoaming ANPs MUST support the Chargeable-User-Identity attribute (#89) <xref target="RFC4372"/> and
indicate such by including a CUI attribute in all RADIUS Access-Request packets. An ANP that has configured the OpenRoaming-Context PID Field set to "1" MAY treat a RADIUS Access-Accept received without a CUI attribute as an Access-Reject. An ANP that has configured the OpenRoaming-Context PID Field set to "0" MUST NOT treat any RADIUS Access-Accept received without a CUI attribute as an Access-Reject.</t>

<t>When an end-user has explicitly given their permission to share an immutable end-user identifier
with third party ANPs, the CUI returned by the IDP is invariant over subsequent
end-user authentication exchanges between the IDP and the ANP.</t>

</section>
<section anchor="location-datalocation-information"><name>Location-Data/Location-Information</name>

<t>All OpenRoaming ANPs MUST support signalling of location information using <xref target="RFC5580"/>.
As a minimum, all OpenRoaming IDPs need to be able to determine the country in which the
OpenRoaming ANP operates. The OpenRoaming legal framework described in <xref target="legal"/> serves as an "out-of-band agreement" as
specified in clause 3.1 of <xref target="RFC5580"/>. Hence, all OpenRoaming ANPs MUST include the Location-Data
attribute (#128) in the RADIUS Access-Request packet, where the location profile is the civic location profile
that includes the country code where the ANP is located <xref target="RFC5580"/>.</t>

<t>When the OpenRoaming ANP supports the OpenRoaming-Settled RCOI ("BA-A2-D0"),
the RADIUS Access-Request packet MUST include the Location-Data attribute (#128) where the location profile
is the civic location profile containing Civic Address Type information that
is sufficient to identify the financial regulatory regime that defines the
taxable rates associated with consumption of the ANP's service.</t>

<t>OpenRoaming also defines the optional use the geospatial location profile as specified in
<xref target="RFC5580"/>. ANPs MAY signal coordinate-based geographic location of
the NAS or end-user device.</t>

<t>The OpenRoaming Privacy Policy <xref target="ORPRIVACY"/> restricts the use of all location information signalled to an IDP for either:</t>

<t><list style="numbers" type="1">
  <t>Making service authorization decisions based on the location of the ANP's wireless network; or</t>
  <t>Compliance with applicable law, or law enforcement requests.</t>
</list></t>

</section>
<section anchor="session-timeout"><name>Session-Timeout</name>

<t>An OpenRoaming ANP receiving a RADIUS Access Accept message including a
Session-Timeout attribute MUST operate according to <xref target="RFC3580"/>.</t>

</section>
<section anchor="enhanced-reply-message"><name>Enhanced Reply-Message</name>
<t>Reply-Message was originally defined in <xref target="RFC3579"/> as being forbidden from being
included in any RADIUS message containing an EAP-Message attribute. This was to prevent
earlier systems from attempting to interwork the Reply-Message text into an
EAP Notification packet.</t>

<t>In contrast to using Reply-Message to signal a displayable
text string to authenticating users, WBA's WRIX framework defines the re-use of
the attribute in WRIX-based Passpoint networks to signal additional
information from the IDP to the ANP, specifically regarding why a connection has been rejected.
The message received MUST NOT be shown to end users.</t>

<t>The enhanced reply-message is encoded using UTF-8 characters. The WBA defines additional
information is appended after the NUL ASCII character (0x00). The ABNF syntax of the
Reply-Message is shown in <xref target="figreply"/>.</t>

<figure title="WBA Enhanced Reply-Message Syntax" anchor="figreply"><artwork><![CDATA[
Reply-message      = [ displayable-string ] %x00 [ wba-info ]
displayable-string = *CHAR
wba-info           =  "Reject-Reason=" cause-code

cause-code =  "10" ; failed user authentication
cause-code =/ "11" ; invalid user identity
cause-code =/ "12" ; expired client certificate
cause-code =/ "20" ; generic AAA failure
cause-code =/ "21" ; backend failure
cause-code =/ "22" ; protocol timeout
cause-code =/ "30" ; failure due to badly formatted request
cause-code =/ "31" ; rejected - missing charging model
cause-code =/ "32" ; rejected - missing geospatial location
cause-code =/ "40" ; failure due to subscription - permanent
cause-code =/ "41" ; authorization rejected -
                   ; no service subscription
cause-code =/ "42" ; authorization rejected -
                   ; roaming not allowed in this network
cause-code =/ "43" ; authorization rejected -
                   ; offered charging model not acceptable
cause-code =/ "44" ; authorization rejected -
                   ; roaming to this location not allowed
cause-code =/ "50" ; failure due to subscription -
                   ; temporary
cause-code =/ "51" ; authorization rejected -
                   ; offered charging model not acceptable at this time
cause-code =/ "52" ; authorization rejected -
                   ; roaming to this location not allowed at this time
cause-code =/ "53" ; authorization rejected -
                   ; concurrency limits exceeded
cause-code =/ "54" ; authorization rejected - insufficient credit

]]></artwork></figure>

</section>
<section anchor="wba-identity-provider"><name>WBA-Identity-Provider</name>

<t>The Operator-Name attribute allows the WBAID of the ANP to be signalled to the IDP.
In the reverse direction, the IDP MUST use the WBA-Identity-Provider vendor
specific attribute <xref target="WBAVSA"/> to signal the WBAID of the IDP back to the ANP.</t>

</section>
<section anchor="wba-offered-service"><name>WBA-Offered-Service</name>

<t>The ANP MAY use the WBA-Offered-Service vendor specific attribute to signal the
highest OpenRoaming service tier supported on its network <xref target="WBAVSA"/>.</t>

</section>
<section anchor="wlan-venue-info"><name>WLAN-Venue-Info</name>

<t>The ANP MAY use the WLAN-Venue-Info attribute <xref target="RFC7268"/> to signal the
category of venue hosting the WLAN.</t>

</section>
<section anchor="wba-custom-sla"><name>WBA-Custom-SLA</name>

<t>When the ANP uses the WLAN-Venue-Info attribute to signal that the venue
hosting the WLAN is a vehicular installation, the  ANP MAY use the
WBA-Custom-SLA vendor specific attribute <xref target="WBAVSA"/> to indicate
one or more (availability, per-user sustained bandwidth) tuples to the IDP.</t>

</section>
<section anchor="additional-attributes-related-to-openroaming-settled"><name>Additional attributes related to OpenRoaming settled</name>

<t>OpenRoaming settled defines the use of additional RADIUS attributes.</t>

<section anchor="wba-financial-clearing-provider"><name>WBA-Financial-Clearing-Provider</name>

<t>All OpenRoaming ANPs and IDPs that support the OpenRoaming settled service
MUST use the WBA-Financial-Clearing-Provider vendor specific attribute to signal
the  identity of the provider of financial clearing services <xref target="WBAVSA"/>.</t>

</section>
<section anchor="wba-data-clearing-provider"><name>WBA-Data-Clearing-Provider</name>

<t>All OpenRoaming ANPs and IDPs that support the OpenRoaming settled service MAY
use the WBA-Data-Clearing-Provider vendor specific attribute to signal
the  identity of the provider of data clearing services <xref target="WBAVSA"/>.</t>

</section>
<section anchor="wba-linear-volume-rate"><name>WBA-Linear-Volume-Rate</name>

<t>In cellular roaming, inter-operator tariff information is exchanged in
the roaming agreements between operators. In OpenRoaming, as there is no
direct agreement between ANPs and IDPs, the tariff information is
exchanged in RADIUS messages. All OpenRoaming ANPs that support
the OpenRoaming settled service MUST use the WBA-Linear-Volume-Rate
vendor specific attribute to signal the charging model being offered
by the ANP <xref target="WBAVSA"/>. An IDP that authorizes an offered charging model MUST include
the agreed WBA-Linear-Volume-Rate in the Access-Accept packet.</t>

</section>
</section>
</section>
<section anchor="Security"><name>Security Considerations</name>

<section anchor="network-selection-and-triggering-authentication"><name>Network Selection and Triggering Authentication</name>

<t>OpenRoaming defines the use of Passpoint with Roaming Consortium Organization Identifiers.
A bit-wise match between an RCOI configured in the Passpoint profile of an end-user's device and the RCOI signalled
by WLAN equipment will trigger a Passpoint defined EAP-based authentication exchange.
The security associated with the Passpoint RCOI
information element is identical to other PLMN Id and Realm information elements, allowing an
unauthorized system to configure the OpenRoaming RCOI with the aim of triggering a Passpoint authentication.
Because such an unauthorized system will not have been issued with a certificate using WBA's PKI, the
unauthorized system is unable to communicate with any other OpenRoaming provider.
In such a scenario, after successive multiple failed authentications, the device's supplicant
SHOULD add the Access Point's BSSID to a deny list
to avoid future triggering of an authentication exchange with the unauthorized system.</t>

</section>
<section anchor="dynamic-discovery-of-radsec-peers"><name>Dynamic Discovery of RadSec Peers</name>

<t>OpenRoaming recommends the use of DNSSEC to ensure a dynamically discovered RadSec server
is authoritative for a particular realm or set of realms. Where this is not possible, e.g.,
when using dynamic resolution with the pub.3gppnetwork.org sub-domain, the OpenRoaming
certificate policy permits the configuration of supported realm(s) in the SubjectAltName
of the certificate(s) issued to the IDP.</t>

<t>An ANP can decide to continue with the RadSec establishment, even if a server cannot prove it is
authoritative for a realm. As the ANP's RadSec client uses a dedicated trust store corresponding to the WBA's private Certificate
Authority, if DNS is hijacked by a third-party non-federation member
who has not been issued a certificate under WBA's PKI, the subsequent TLS establishment will fail.</t>

</section>
<section anchor="end-user-traffic"><name>End-User Traffic</name>

<t>The OpenRoaming federation ensures RADIUS traffic is secured between ANP and IDP and ensures Wi-Fi traffic is protected
between the end-user device and the WLAN equipment of the ANP. The ANP is therefore able to observe IP
traffic to/from end-users who have performed a successful authentication with their IDP. The OpenRoaming legal framework (see <xref target="legal"/>) ensures that the ANP has agreed to the OpenRoaming Privacy Policy <xref target="ORPRIVACY"/> to correctly handle the personally identifiable information collected
as part of providing the ANP service.</t>

<t>The Open-Roaming end-user terms and conditions <xref target="ORTERMS"/> ensure that end-users are aware that the federation does not provide a
secure end-to-end service. The end-user MUST NOT rely on the encryption delivered by OpenRoaming for providing security of services accessed using the ANP's Wi-Fi network.</t>

</section>
<section anchor="end-user-location"><name>End-User Location</name>

<t>The OpenRoaming legal framework (see <xref target="legal"/>) ensures that the IDP has agreed to the OpenRoaming Privacy Policy <xref target="ORPRIVACY"/> to correctly handle the location-based personally identifiable information collected
as part of providing the IDP service. Unless the IDP has agreed a separate privacy policy with the End-User, the IDP is only permitted to use location information signalled by an ANP for either:</t>

<t><list style="numbers" type="1">
  <t>Making service authorization decisions based on the location of the ANP's wireless network; or</t>
  <t>Compliance with applicable law, or law enforcement requests.</t>
</list></t>

</section>
</section>
<section anchor="future-enhancements"><name>Future Enhancements</name>

<t>WBA announced the launch of its OpenRoaming Federation in June 2020. Since then, WBA members have continued to enhance the technical framework to address new market requirements that are reflected in the Closed Access Group policies described in <xref target="CAG"/> and the RADIUS profile described in <xref target="RADIUS"/>. WBA encourages those parties interested in adapting OpenRoaming to address new requirements to join the Alliance and help drive the definition of OpenRoaming forward.</t>

</section>
<section anchor="IANA"><name>IANA Considerations</name>

<t>This document has no IANA actions.</t>

</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>
<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>



    </references>

    <references title='Informative References' anchor="sec-informative-references">



<reference anchor="RFC2865">
  <front>
    <title>Remote Authentication Dial In User Service (RADIUS)</title>
    <author fullname="C. Rigney" initials="C." surname="Rigney"/>
    <author fullname="S. Willens" initials="S." surname="Willens"/>
    <author fullname="A. Rubens" initials="A." surname="Rubens"/>
    <author fullname="W. Simpson" initials="W." surname="Simpson"/>
    <date month="June" year="2000"/>
    <abstract>
      <t>This document describes a protocol for carrying authentication, authorization, and configuration information between a Network Access Server which desires to authenticate its links and a shared Authentication Server. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="2865"/>
  <seriesInfo name="DOI" value="10.17487/RFC2865"/>
</reference>
<reference anchor="RFC3579">
  <front>
    <title>RADIUS (Remote Authentication Dial In User Service) Support For Extensible Authentication Protocol (EAP)</title>
    <author fullname="B. Aboba" initials="B." surname="Aboba"/>
    <author fullname="P. Calhoun" initials="P." surname="Calhoun"/>
    <date month="September" year="2003"/>
    <abstract>
      <t>This document defines Remote Authentication Dial In User Service (RADIUS) support for the Extensible Authentication Protocol (EAP), an authentication framework which supports multiple authentication mechanisms. In the proposed scheme, the Network Access Server (NAS) forwards EAP packets to and from the RADIUS server, encapsulated within EAP-Message attributes. This has the advantage of allowing the NAS to support any EAP authentication method, without the need for method- specific code, which resides on the RADIUS server. While EAP was originally developed for use with PPP, it is now also in use with IEEE 802. This memo provides information for the Internet community.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="3579"/>
  <seriesInfo name="DOI" value="10.17487/RFC3579"/>
</reference>
<reference anchor="RFC3580">
  <front>
    <title>IEEE 802.1X Remote Authentication Dial In User Service (RADIUS) Usage Guidelines</title>
    <author fullname="P. Congdon" initials="P." surname="Congdon"/>
    <author fullname="B. Aboba" initials="B." surname="Aboba"/>
    <author fullname="A. Smith" initials="A." surname="Smith"/>
    <author fullname="G. Zorn" initials="G." surname="Zorn"/>
    <author fullname="J. Roese" initials="J." surname="Roese"/>
    <date month="September" year="2003"/>
    <abstract>
      <t>This document provides suggestions on Remote Authentication Dial In User Service (RADIUS) usage by IEEE 802.1X Authenticators. The material in this document is also included within a non-normative Appendix within the IEEE 802.1X specification, and is being presented as an IETF RFC for informational purposes. This memo provides information for the Internet community.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="3580"/>
  <seriesInfo name="DOI" value="10.17487/RFC3580"/>
</reference>
<reference anchor="RFC3748">
  <front>
    <title>Extensible Authentication Protocol (EAP)</title>
    <author fullname="B. Aboba" initials="B." surname="Aboba"/>
    <author fullname="L. Blunk" initials="L." surname="Blunk"/>
    <author fullname="J. Vollbrecht" initials="J." surname="Vollbrecht"/>
    <author fullname="J. Carlson" initials="J." surname="Carlson"/>
    <author fullname="H. Levkowetz" initials="H." role="editor" surname="Levkowetz"/>
    <date month="June" year="2004"/>
    <abstract>
      <t>This document defines the Extensible Authentication Protocol (EAP), an authentication framework which supports multiple authentication methods. EAP typically runs directly over data link layers such as Point-to-Point Protocol (PPP) or IEEE 802, without requiring IP. EAP provides its own support for duplicate elimination and retransmission, but is reliant on lower layer ordering guarantees. Fragmentation is not supported within EAP itself; however, individual EAP methods may support this. This document obsoletes RFC 2284. A summary of the changes between this document and RFC 2284 is available in Appendix A. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="3748"/>
  <seriesInfo name="DOI" value="10.17487/RFC3748"/>
</reference>
<reference anchor="RFC4187">
  <front>
    <title>Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA)</title>
    <author fullname="J. Arkko" initials="J." surname="Arkko"/>
    <author fullname="H. Haverinen" initials="H." surname="Haverinen"/>
    <date month="January" year="2006"/>
    <abstract>
      <t>This document specifies an Extensible Authentication Protocol (EAP) mechanism for authentication and session key distribution that uses the Authentication and Key Agreement (AKA) mechanism. AKA is used in the 3rd generation mobile networks Universal Mobile Telecommunications System (UMTS) and CDMA2000. AKA is based on symmetric keys, and typically runs in a Subscriber Identity Module, which is a UMTS Subscriber Identity Module, USIM, or a (Removable) User Identity Module, (R)UIM, similar to a smart card.</t>
      <t>EAP-AKA includes optional identity privacy support, optional result indications, and an optional fast re-authentication procedure. This memo provides information for the Internet community.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4187"/>
  <seriesInfo name="DOI" value="10.17487/RFC4187"/>
</reference>
<reference anchor="RFC4372">
  <front>
    <title>Chargeable User Identity</title>
    <author fullname="F. Adrangi" initials="F." surname="Adrangi"/>
    <author fullname="A. Lior" initials="A." surname="Lior"/>
    <author fullname="J. Korhonen" initials="J." surname="Korhonen"/>
    <author fullname="J. Loughney" initials="J." surname="Loughney"/>
    <date month="January" year="2006"/>
    <abstract>
      <t>This document describes a new Remote Authentication Dial-In User Service (RADIUS) attribute, Chargeable-User-Identity. This attribute can be used by a home network to identify a user for the purpose of roaming transactions that occur outside of the home network. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4372"/>
  <seriesInfo name="DOI" value="10.17487/RFC4372"/>
</reference>
<reference anchor="RFC4851">
  <front>
    <title>The Flexible Authentication via Secure Tunneling Extensible Authentication Protocol Method (EAP-FAST)</title>
    <author fullname="N. Cam-Winget" initials="N." surname="Cam-Winget"/>
    <author fullname="D. McGrew" initials="D." surname="McGrew"/>
    <author fullname="J. Salowey" initials="J." surname="Salowey"/>
    <author fullname="H. Zhou" initials="H." surname="Zhou"/>
    <date month="May" year="2007"/>
    <abstract>
      <t>This document defines the Extensible Authentication Protocol (EAP) based Flexible Authentication via Secure Tunneling (EAP-FAST) protocol. EAP-FAST is an EAP method that enables secure communication between a peer and a server by using the Transport Layer Security (TLS) to establish a mutually authenticated tunnel. Within the tunnel, Type-Length-Value (TLV) objects are used to convey authentication related data between the peer and the EAP server. This memo provides information for the Internet community.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4851"/>
  <seriesInfo name="DOI" value="10.17487/RFC4851"/>
</reference>
<reference anchor="RFC5448">
  <front>
    <title>Improved Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA')</title>
    <author fullname="J. Arkko" initials="J." surname="Arkko"/>
    <author fullname="V. Lehtovirta" initials="V." surname="Lehtovirta"/>
    <author fullname="P. Eronen" initials="P." surname="Eronen"/>
    <date month="May" year="2009"/>
    <abstract>
      <t>This specification defines a new EAP method, EAP-AKA', which is a small revision of the EAP-AKA (Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement) method. The change is a new key derivation function that binds the keys derived within the method to the name of the access network. The new key derivation mechanism has been defined in the 3rd Generation Partnership Project (3GPP). This specification allows its use in EAP in an interoperable manner. In addition, EAP-AKA' employs SHA-256 instead of SHA-1.</t>
      <t>This specification also updates RFC 4187, EAP-AKA, to prevent bidding down attacks from EAP-AKA'. This memo provides information for the Internet community.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5448"/>
  <seriesInfo name="DOI" value="10.17487/RFC5448"/>
</reference>
<reference anchor="RFC5280">
  <front>
    <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
    <author fullname="D. Cooper" initials="D." surname="Cooper"/>
    <author fullname="S. Santesson" initials="S." surname="Santesson"/>
    <author fullname="S. Farrell" initials="S." surname="Farrell"/>
    <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
    <author fullname="R. Housley" initials="R." surname="Housley"/>
    <author fullname="W. Polk" initials="W." surname="Polk"/>
    <date month="May" year="2008"/>
    <abstract>
      <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5280"/>
  <seriesInfo name="DOI" value="10.17487/RFC5280"/>
</reference>
<reference anchor="RFC5580">
  <front>
    <title>Carrying Location Objects in RADIUS and Diameter</title>
    <author fullname="H. Tschofenig" initials="H." role="editor" surname="Tschofenig"/>
    <author fullname="F. Adrangi" initials="F." surname="Adrangi"/>
    <author fullname="M. Jones" initials="M." surname="Jones"/>
    <author fullname="A. Lior" initials="A." surname="Lior"/>
    <author fullname="B. Aboba" initials="B." surname="Aboba"/>
    <date month="August" year="2009"/>
    <abstract>
      <t>This document describes procedures for conveying access-network ownership and location information based on civic and geospatial location formats in Remote Authentication Dial-In User Service (RADIUS) and Diameter.</t>
      <t>The distribution of location information is a privacy-sensitive task. Dealing with mechanisms to preserve the user's privacy is important and is addressed in this document. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5580"/>
  <seriesInfo name="DOI" value="10.17487/RFC5580"/>
</reference>
<reference anchor="RFC6066">
  <front>
    <title>Transport Layer Security (TLS) Extensions: Extension Definitions</title>
    <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd"/>
    <date month="January" year="2011"/>
    <abstract>
      <t>This document provides specifications for existing TLS extensions. It is a companion document for RFC 5246, "The Transport Layer Security (TLS) Protocol Version 1.2". The extensions specified are server_name, max_fragment_length, client_certificate_url, trusted_ca_keys, truncated_hmac, and status_request. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6066"/>
  <seriesInfo name="DOI" value="10.17487/RFC6066"/>
</reference>
<reference anchor="RFC6071">
  <front>
    <title>IP Security (IPsec) and Internet Key Exchange (IKE) Document Roadmap</title>
    <author fullname="S. Frankel" initials="S." surname="Frankel"/>
    <author fullname="S. Krishnan" initials="S." surname="Krishnan"/>
    <date month="February" year="2011"/>
    <abstract>
      <t>Over the past few years, the number of RFCs that define and use IPsec and Internet Key Exchange (IKE) has greatly proliferated. This is complicated by the fact that these RFCs originate from numerous IETF working groups: the original IPsec WG, its various spin-offs, and other WGs that use IPsec and/or IKE to protect their protocols' traffic.</t>
      <t>This document is a snapshot of IPsec- and IKE-related RFCs. It includes a brief description of each RFC, along with background information explaining the motivation and context of IPsec's outgrowths and extensions. It obsoletes RFC 2411, the previous "IP Security Document Roadmap."</t>
      <t>The obsoleted IPsec roadmap (RFC 2411) briefly described the interrelationship of the various classes of base IPsec documents. The major focus of RFC 2411 was to specify the recommended contents of documents specifying additional encryption and authentication algorithms. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6071"/>
  <seriesInfo name="DOI" value="10.17487/RFC6071"/>
</reference>
<reference anchor="RFC6614">
  <front>
    <title>Transport Layer Security (TLS) Encryption for RADIUS</title>
    <author fullname="S. Winter" initials="S." surname="Winter"/>
    <author fullname="M. McCauley" initials="M." surname="McCauley"/>
    <author fullname="S. Venaas" initials="S." surname="Venaas"/>
    <author fullname="K. Wierenga" initials="K." surname="Wierenga"/>
    <date month="May" year="2012"/>
    <abstract>
      <t>This document specifies a transport profile for RADIUS using Transport Layer Security (TLS) over TCP as the transport protocol. This enables dynamic trust relationships between RADIUS servers. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6614"/>
  <seriesInfo name="DOI" value="10.17487/RFC6614"/>
</reference>
<reference anchor="RFC7268">
  <front>
    <title>RADIUS Attributes for IEEE 802 Networks</title>
    <author fullname="B. Aboba" initials="B." surname="Aboba"/>
    <author fullname="J. Malinen" initials="J." surname="Malinen"/>
    <author fullname="P. Congdon" initials="P." surname="Congdon"/>
    <author fullname="J. Salowey" initials="J." surname="Salowey"/>
    <author fullname="M. Jones" initials="M." surname="Jones"/>
    <date month="July" year="2014"/>
    <abstract>
      <t>RFC 3580 provides guidelines for the use of the Remote Authentication Dial-In User Service (RADIUS) within IEEE 802 local area networks (LANs). This document defines additional attributes for use within IEEE 802 networks and clarifies the usage of the EAP-Key-Name Attribute and the Called-Station-Id Attribute. This document updates RFCs 3580 and 4072.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7268"/>
  <seriesInfo name="DOI" value="10.17487/RFC7268"/>
</reference>
<reference anchor="RFC7585">
  <front>
    <title>Dynamic Peer Discovery for RADIUS/TLS and RADIUS/DTLS Based on the Network Access Identifier (NAI)</title>
    <author fullname="S. Winter" initials="S." surname="Winter"/>
    <author fullname="M. McCauley" initials="M." surname="McCauley"/>
    <date month="October" year="2015"/>
    <abstract>
      <t>This document specifies a means to find authoritative RADIUS servers for a given realm. It is used in conjunction with either RADIUS over Transport Layer Security (RADIUS/TLS) or RADIUS over Datagram Transport Layer Security (RADIUS/DTLS).</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7585"/>
  <seriesInfo name="DOI" value="10.17487/RFC7585"/>
</reference>
<reference anchor="RFC7593">
  <front>
    <title>The eduroam Architecture for Network Roaming</title>
    <author fullname="K. Wierenga" initials="K." surname="Wierenga"/>
    <author fullname="S. Winter" initials="S." surname="Winter"/>
    <author fullname="T. Wolniewicz" initials="T." surname="Wolniewicz"/>
    <date month="September" year="2015"/>
    <abstract>
      <t>This document describes the architecture of the eduroam service for federated (wireless) network access in academia. The combination of IEEE 802.1X, the Extensible Authentication Protocol (EAP), and RADIUS that is used in eduroam provides a secure, scalable, and deployable service for roaming network access. The successful deployment of eduroam over the last decade in the educational sector may serve as an example for other sectors, hence this document. In particular, the initial architectural choices and selection of standards are described, along with the changes that were prompted by operational experience.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7593"/>
  <seriesInfo name="DOI" value="10.17487/RFC7593"/>
</reference>
<reference anchor="RFC7170">
  <front>
    <title>Tunnel Extensible Authentication Protocol (TEAP) Version 1</title>
    <author fullname="H. Zhou" initials="H." surname="Zhou"/>
    <author fullname="N. Cam-Winget" initials="N." surname="Cam-Winget"/>
    <author fullname="J. Salowey" initials="J." surname="Salowey"/>
    <author fullname="S. Hanna" initials="S." surname="Hanna"/>
    <date month="May" year="2014"/>
    <abstract>
      <t>This document defines the Tunnel Extensible Authentication Protocol (TEAP) version 1. TEAP is a tunnel-based EAP method that enables secure communication between a peer and a server by using the Transport Layer Security (TLS) protocol to establish a mutually authenticated tunnel. Within the tunnel, TLV objects are used to convey authentication-related data between the EAP peer and the EAP server.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7170"/>
  <seriesInfo name="DOI" value="10.17487/RFC7170"/>
</reference>
<reference anchor="RFC8446">
  <front>
    <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
    <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
    <date month="August" year="2018"/>
    <abstract>
      <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
      <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8446"/>
  <seriesInfo name="DOI" value="10.17487/RFC8446"/>
</reference>
<reference anchor="RFC8952">
  <front>
    <title>Captive Portal Architecture</title>
    <author fullname="K. Larose" initials="K." surname="Larose"/>
    <author fullname="D. Dolson" initials="D." surname="Dolson"/>
    <author fullname="H. Liu" initials="H." surname="Liu"/>
    <date month="November" year="2020"/>
    <abstract>
      <t>This document describes a captive portal architecture. Network provisioning protocols such as DHCP or Router Advertisements (RAs), an optional signaling protocol, and an HTTP API are used to provide the solution.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8952"/>
  <seriesInfo name="DOI" value="10.17487/RFC8952"/>
</reference>
<reference anchor="RFC9364">
  <front>
    <title>DNS Security Extensions (DNSSEC)</title>
    <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
    <date month="February" year="2023"/>
    <abstract>
      <t>This document describes the DNS Security Extensions (commonly called "DNSSEC") that are specified in RFCs 4033, 4034, and 4035, as well as a handful of others. One purpose is to introduce all of the RFCs in one place so that the reader can understand the many aspects of DNSSEC. This document does not update any of those RFCs. A second purpose is to state that using DNSSEC for origin authentication of DNS data is the best current practice. A third purpose is to provide a single reference for other documents that want to refer to DNSSEC.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="237"/>
  <seriesInfo name="RFC" value="9364"/>
  <seriesInfo name="DOI" value="10.17487/RFC9364"/>
</reference>

<reference anchor="TS23003" target="https://www.3gpp.org/ftp/Specs/archive/23_series/23.003/23003-i10.zip">
  <front>
    <title>3GPP 23.003: Numbering, addressing and identification v18.1.0</title>
    <author initials="" surname="3GPP">
      <organization></organization>
    </author>
    <date year="2023" month="March" day="28"/>
  </front>
</reference>
<reference anchor="GSMAIR67" target="https://www.gsma.com/newsroom/wp-content/uploads//IR.67-v21.0.pdf">
  <front>
    <title>GSMA IR.67: DNS Guidelines for Service Providers and GRX and IPX Providers</title>
    <author initials="" surname="GSMA">
      <organization></organization>
    </author>
    <date year="2022" month="November" day="25"/>
  </front>
</reference>
<reference anchor="PASSPOINT" target="https://www.wi-fi.org/discover-wi-fi/passpoint">
  <front>
    <title>Wi-Fi Alliance Passpoint</title>
    <author initials="" surname="Wi-Fi Alliance">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="ISO3166" target="https://www.iso.org/standard/72483.html">
  <front>
    <title>Codes for the representation of names of countries and their subdivisions</title>
    <author initials="" surname="ISO 3166-2:2020">
      <organization></organization>
    </author>
    <date year="2020" month="August"/>
  </front>
</reference>
<reference anchor="ISO29115" >
  <front>
    <title>Information technology - Security techniques: Entity authentication assurance framework</title>
    <author initials="" surname="ISO/IEC 29115">
      <organization></organization>
    </author>
    <date year="2013" month="April"/>
  </front>
</reference>
<reference anchor="ORPRIVACY" target="https://wballiance.com/openroaming/privacy-policy/">
  <front>
    <title>OpenRoaming End-User Privacy Policy</title>
    <author initials="" surname="Wireless Broadband Alliance">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="ORTERMS" target="https://wballiance.com/openroaming/toc/">
  <front>
    <title>OpenRoaming End User Terms and Conditions</title>
    <author initials="" surname="Wireless Broadband Alliance">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="PEAP" target="https://winprotocoldocs-bhdugrdyduf5h2e4.b02.azurefd.net/MS-PEAP/%5bMS-PEAP%5d.pdf">
  <front>
    <title>Protected Extensible Authentication Protocol (PEAP)</title>
    <author initials="" surname="Microsoft Corporation">
      <organization></organization>
    </author>
    <date year="2024" month="April"/>
  </front>
</reference>
<reference anchor="WBAVSA" target="https://github.com/wireless-broadband-alliance/RADIUS-VSA">
  <front>
    <title>Vendor Specific Attributes</title>
    <author initials="" surname="Wireless Broadband Alliance">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="IEEE80211" target="https://standards.ieee.org/ieee/802.11/5536/">
  <front>
    <title>Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications</title>
    <author initials="" surname="IEEE">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="WBAEIPP" target="https://wballiancec.wpenginepowered.com/wp-content/uploads/2021/02/IMSI_Privacy_Protection_for_Wi-Fi_Technical_Specification_v1.1.0_Revision_FINAL.pdf">
  <front>
    <title>WBA Enhanced IMSI Privacy Protection</title>
    <author initials="" surname="Wireless Broadband Alliance">
      <organization></organization>
    </author>
    <date year="2022" month="August"/>
  </front>
</reference>
<reference anchor="E212" target="https://www.itu.int/itu-t/recommendations/rec.aspx?rec=E.212">
  <front>
    <title>The international identification plan for public networks and subscriptions</title>
    <author initials="" surname="ITU-T Study Group 2">
      <organization></organization>
    </author>
    <date year="2024" month="June"/>
  </front>
</reference>
<reference anchor="WBAPKICP" target="https://wballiance.com/openroaming/pki-repository/">
  <front>
    <title>WBA PKI Certificate Policy v4.0.0</title>
    <author initials="" surname="Wireless Broadband Alliance">
      <organization></organization>
    </author>
    <date year="2024" month="April"/>
  </front>
</reference>


    </references>

</references>


<?line 1215?>

<section anchor="sig"><name>Example OpenRoaming Signalling Flow</name>

<t>An example signalling flow for OpenRoaming is illustrated in <xref target="figsigflow"/>.</t>

<t><list style="numbers" type="1">
  <t>In step 1, the WLAN is configured with Passpoint information and includes
configured RCOIs in its beacon.</t>
  <t>The beacon can only contain 3 RCOIs and so if none of the RCOIs match a
profile provisioned in the device, the device queries for the list of RCOIs supported.</t>
  <t>If the list includes an RCOI that matches a configured profile in the device, then device
sends an EAPOL Start message to the authenticator.</t>
  <t>The authenticator in the AP/WLC requests the EAP-Identity of the device.</t>
  <t>The device responds with its EAP-Identity, which is a user@realm Network Access Identifier (NAI)</t>
  <t>The NAS in the WLC/AP embeds the NAI in the user-name attribute in a RADIUS Access-Request packet and forwards to the configured RadSec client.</t>
  <t>The RadSec client recovers the realm from the NAI/user-name attribute and performs a DNS-based dynamic peer discovery.</t>
  <t>The RadSec client established an mTLS authenticated TLS session with the discovered peer using certificates issued by the WBA PKI.</t>
  <t>Once TLS is established, the RadSec client forwards the Access-Request to the RadSec server.</t>
  <t>If the EAP Server is not co-located with the RadSec server, the RadSec server proxies the Access-Request to the EAP-Server.</t>
  <t>The EAP-Server continues the EAP dialogue with the EAP Supplicant in the device using a Passpoint defined EAP method.</t>
  <t>Following successful authentication, the EAP-Server responds with an Access-Accept packet containing the EAP-SUCCESS message and the keying material generated through the EAP method to secure the Wi-Fi session.</t>
  <t>The Access-Accept packet is forwarded back to the RadSec client.</t>
  <t>The RadSec client forwards the Access-Accept packet to the NAS in the AP/WLC.</t>
  <t>The AP/WLC recovers the keying material from the Access-Accept packet and forwards the EAP-SUCCESS message to the device.</t>
  <t>The keying material is used to secure the Wi-Fi interface between the device and AP/WLC.</t>
  <t>The AP/WLC generates a RADIUS Accounting-Request packet with Acct-Status-Type Start which is forwarded to the RadSec client.</t>
  <t>The RadSec client forwards the Accounting-Request packet over the TLS tunnel to the RadSec server.</t>
  <t>The RadSec server can forward the Accounting-Request packet to the EAP-Server.</t>
</list></t>

<ul empty="true"><li>
  <t>20-22. After the Wi-Fi session terminates, an Accounting-Request message with Acct-Status-Type Stop is proxied towards the RadSec Server.</t>
</li></ul>

<figure title="Example OpenRoaming Signalling Flow" anchor="figsigflow"><artwork><![CDATA[
+------+    +------+    +------+    +------+    +------+    +------+
|      |    |Wi-Fi |    |RadSec|    |      |    |RadSec|    |  EAP |
|Device|    |AP/WLC|    |Client|    | DNS  |    |Server|    |Server|
+------+    +------+    +------+    +------+    +------+    +------+
   | 1) Beacon |           |           |           |           |
   |<----------|           |           |           |           |
   | 2) ANQP   |           |           |           |           |   
   | Query     |           |           |           |           |   
   |<--------->|           |           |           |           |   
   | 3) EAPOL  |           |           |           |           |
   | Start     |           |           |           |           |
   |---------->|           |           |           |           |
   | 4) EAP-ID |           |           |           |           |
   | Request   |           |           |           |           |
   |<----------|           |           |           |           |
   | 5) EAP-ID | 6) RADIUS |           |           |           |
   | Response  | Access-   | 7) DNS    |           |           |
   |---------->| Request   | Query     |           |           |
   |           |---------->| NAPTR,SRV,|           |           |
   |           |           | A/AAAA    |           |           |
   |           |           | Records   |           |           |
   |           |           |<--------->|           |           |
   |           |           | 8) mTLS   |           |           |
   |           |           |<--------------------->|           |
   |           |           | 9) RadSec |           |           |
   |           |           | Access-Request        |           |
   |           |           |---------------------->|           |
   |           |           |           |           | 10) RADIUS|
   |           |           |           |           | Access-   |
   |           |           |           |           | Request   |
   |           |           |           |           |---------->|
   |           |         11) EAP Dialogue          |           |
   |<--------------------------------------------------------->|
   |           |           |           |           | 12) RADIUS|
   |           |           |           |           | Access-   |
   |           | 14) RADIUS|           |           | Accept    |
   |           | Access-   |           |           | (EAP-     |
   |           | Accept    | 13) RadSec Access-    | SUCCESS)  |   
   |           | (EAP-     | Accept (EAP-SUCCESS)  |<----------|
   | 15) EAP-  | SUCCESS)  |<----------------------|           |
   | SUCCESS   |<----------|           |           |           |
   |<----------|           |           |           |           |
 +---------------+         |           |           |           |
 | 16) Secured   |         |           |           |           |
 |  OpenRoaming  17) RADIUS|           |           |           |
 |    Service    Accounting|           |           |           |
 |               Request   |           |           | 19) RADIUS|
 |               (Start)   | 18) RadSec Accounting | Accounting|
 |               |-------->| -Request (Start)      | Request   |
 |               |         |---------------------->| (Start)   |
 |               |         |           |           |---------->|
 +---------------+         |           |           |           |
   |           | 20) RADIUS|           |           |           |
   |           | Accounting|           |           |           |
   |           | Request   |           |           | 22) RADIUS|
   |           | (Stop)    | 21) RadSec Accounting | Accounting|
   |           |---------->| -Request (Stop)       | Request   |
   |           |           |---------------------->| (Stop)    |
   |           |           |           |           |---------->|   
+------+    +------+    +------+    +------+    +------+    +------+
|Device|    |Wi-Fi |    |RadSec|    | DNS  |    |RadSec|    |  EAP |
|      |    |AP/WLC|    |Client|    |      |    |Server|    |Server|
+------+    +------+    +------+    +------+    +------+    +------+
]]></artwork></figure>

</section>
<section anchor="rcoi"><name>Example OpenRoaming RCOI Usage</name>

<t>This Annex illustrates the use of OpenRoaming RCOIs to enforce different policies
in the OpenRoaming federation, ensuring that when there is a policy mismatch
between the device and access network, that the device will avoid triggering
an authentication exchange that would subsequently have to be rejected because
of policy enforcement decisions.</t>

<section anchor="openroaming-rcoi-based-policy-for-supporting-qos-tiers"><name>OpenRoaming RCOI based policy for supporting QoS tiers</name>

<t><xref target="figqosrcoi"/> illustrates the use of OpenRoaming RCOIs for
supporting the standard (bronze) and silver QoS tiers across the federation.
The figure shows two different devices:</t>

<t><list style="symbols">
  <t>Device 1 has been provisioned by its IDP to require the basic bronze QoS policy.</t>
  <t>Device 2 has been provisioned by its IDP to require the silver tier of QoS handling.</t>
</list></t>

<t>The figure also shows illustrates the RCOI configuration of two ANP Access Networks:</t>

<t><list style="symbols">
  <t>ANP#1 is configured to support the silver tier of QoS handling corresponding to the silver RCOI. Because the network requirements associated with the silver tier are a superset of the bronze QoS tier, the ANP also configures the bronze RCOI on its Wi-Fi access network.</t>
  <t>ANP#2 is only configured to support the standard (bronze) QoS tier and as such only configures the RCOI corresponding to the bronze QoS tier on its Wi-Fi access network.</t>
</list></t>

<t>The figure shows how normal Passpoint RCOI matching rules can be used to ensure that devices only trigger authentication with ANP access networks which support the required QoS tier according to the device's policy.</t>

<figure title="Use of OpenRoaming RCOIs to realize QoS policies" anchor="figqosrcoi"><artwork><![CDATA[

+----------------------+      +----------------------+  
|OpenRoaming Device #1 |      |OpenRoaming Device #2 |  
| Bronze Service Level |      | Silver Service Level |   
| +------------------+ |      | +------------------+ |      
| |Passpoint Profile | |      | |Passpoint Profile | |     
| |   Bronze RCOI    | |      | |   Silver RCOI    | |              
| +------------------+ |      | +------------------+ |           
|     /|\        /|\   |      |           /|\        |      
+------|----------|----+      +------------|---------+         
       |          |                        |                   
       |          |                        |                    
       |          |                        | RCOI                
       |          |                        | Match                 
       |     +-----------------------------+                 
  RCOI |     |    |                                          
 Match |     |    |                                              
       |     |    |                                        
       |     |    +------------------------+                  
       |     |                             | RCOI           
       |     |                             | Match         
       |     |                             |              
      \|/   \|/                           \|/           
+----------------------+       +----------------------+   
|  OpenRoaming ANP#1   |       |  OpenRoaming ANP#2   |  
|      Silver QoS      |       |      Bronze QoS      |     
|   +--------------+   |       |   +--------------+   |   
|   |     WLAN     |   |       |   |     WLAN     |   |   
|   | Bronze RCOI  |   |       |   | Bronze RCOI  |   |    
|   | Silver RCOI  |   |       |   |              |   |   
|   +--------------+   |       |   +--------------+   |  
+----------------------+       +----------------------+

]]></artwork></figure>

</section>
<section anchor="openroaming-rcoi-based-policy-for-supporting-identity-type-policies"><name>OpenRoaming RCOI based policy for supporting identity type policies</name>

<t><xref target="figidtypercoi"/> illustrates the use of OpenRoaming RCOIs for supporting different identity type policies across the federation. The figure shows two different devices:</t>

<t><list style="symbols">
  <t>Device#1 has been provisioned by an IDP corresponding to a service provider. It provisions the device's Passpoint profile with the RCOI policy identifying the service provider ID-type policy as well as the "any ID-type"  RCOI policy.</t>
  <t>Device 2 has been provisioned by a IDP corresponding to a hospitality provider. It provisions the device's Passpoint profile with the RCOI policy identifying the hospitality ID-type policy as well as the "any ID-type" RCOI policy.</t>
</list></t>

<t>The figure also shows the RCOI configuration of three different ANP Access Networks:</t>

<t><list style="symbols">
  <t>ANP#1 only supports access using service provider type-IDs and so has configured the service provider ID-type policy RCOI.</t>
  <t>ANP#2 supports access from all identity types and so has configured the any ID-type policy RCOI.</t>
  <t>ANP#3 only supports access using hospitality type IDs and so has configured the hospitality ID-type policy RCOI.</t>
</list></t>

<t>The figure shows how normal Passpoint RCOI matching rules can be used to ensure that devices only trigger authentication with ANP access networks which support the required identity types according to the ANP's policy.</t>

<figure title="Use of OpenRoaming RCOIs to realize ID-Type policies" anchor="figidtypercoi"><artwork><![CDATA[


+----------------------------+   +-----------------------------+                                                 
|   OpenRoaming Device #1    |   |    OpenRoaming Device #2    |                                                 
|  IDP is Service Provider   |   | IDP is Hospitality Provider |                                                 
|+------------++------------+|   |+------------++------------+ |                                                 
|| Passpoint  || Passpoint  ||   || Passpoint  || Passpoint  | |                                                 
||  Profile   ||  Profile   ||   ||  Profile   ||  Profile   | |                                                 
||     SP     ||Any ID-Type ||   ||Any ID-Type || Hospitality| |                                                 
||ID-Type RCOI||    RCOI    ||   ||   RCOI     ||ID-Type RCOI| |                                                 
|+------------++------------+|   |+------------++------------+ |                                                 
|      /|\          /|\      |   |       /|\        /|\        |                                                 
+-------|------------|-------+   +-------------------|---------+                                                 
        |            |                    |          |                                                           
        |            |                    |          |                                                           
        |            |                    |          |                                                           
        |            |                    |          |                                                           
        | RCOI       | RCOI               | RCOI     | RCOI                                                      
        | Match      | Match              | Match    | Match                                                     
        |            |                    |          |                                                           
        |            +-----+        +-----+          |                                                           
        |                  |        |                |                                                           
        |                  |        |                |                                                           
        |                  |        |                |                                                           
        |                  |        |                |                                                           
        |                  |        |                |                                                           
       \|/                \|/      \|/              \|/                                                          
+------------------+  +------------------+  +------------------+                                                 
|OpenRoaming ANP#1 |  |OpenRoaming ANP#2 |  |OpenRoaming ANP#3 |                                                 
|  Only accepts    |  |    Accepts all   |  |   Only accepts   |                                                 
| Service Provider |  |     ID-Types     |  |    Hospitality   |                                                 
|     ID-Types     |  |                  |  |     ID-Types     |                                                 
| +--------------+ |  | +--------------+ |  | +--------------+ |                                                 
| |     WLAN     | |  | |     WLAN     | |  | |     WLAN     | |                                                 
| |  SP ID-Type  | |  | | Any ID-Type  | |  | |  Hospitality | |                                                 
| |     RCOI     | |  | |     RCOI     | |  | | ID-Type RCOI | |                                                 
| +--------------+ |  | +--------------+ |  | +--------------+ |                                                 
+------------------+  +------------------+  +------------------+    


]]></artwork></figure>

</section>
<section anchor="openroaming-rcoi-based-policy-for-supporting-different-identity-proofing-policies"><name>OpenRoaming RCOI based policy for supporting different identity proofing policies</name>

<t><xref target="figidproofrcoi"/> illustrates the use of OpenRoaming RCOIs for supporting different
identity proofing policies across the federation. The figure shows two different devices:</t>

<t><list style="symbols">
  <t>Device 1 has been provisioned by an IDP that uses enhanced identity proofing controls that meet the enhanced OpenRoaming requirements, equivalent to LoA 3 in <xref target="ISO29115"/>. Because the enhanced identity proofing requirements are a superset of the requirements of the baseline identity proofing policy, the IDP also configures the use of the RCOI with baseline identity proofing.</t>
  <t>Device 2 has been provisioned by an IDP that uses identity proofing with controls that meet the baseline OpenRoaming requirements.</t>
</list></t>

<t>The figure also shows the RCOI configuration of two ANP Access Networks:</t>

<t><list style="symbols">
  <t>ANP#1 is operated in a geography where regulations require support of enhanced identity proofing.</t>
  <t>ANP#2 is operated in a geography where regulations permit support of authentications with identities managed using the OpenRoaming baseline identity proofing requirements.</t>
</list></t>

<t>The figure shows how normal Passpoint RCOI matching rules can be used to ensure that devices only trigger authentication with ANP access networks which support the required identity proofing according to the ANP's policy.</t>

<figure title="Use of OpenRoaming RCOIs to realize identity proofing policies" anchor="figidproofrcoi"><artwork><![CDATA[

+----------------------------+   +-----------------------------+                                                 
|    OpenRoaming Device #1   |   |    OpenRoaming Device #2    |                                                 
|     IDP uses enhanced      |   |     IDP uses baseline       |                                                 
|     identity proofing      |   |     identity proofing       |                                                 
|+------------++------------+|   |       +------------+        |                                                 
|| Passpoint  ||  Passpoint ||   |       |  Passpoint |        |                                                 
||  Profile   ||   Profile  ||   |       |   Profile  |        |                                                 
||Enhanced LoA||Baseline LoA||   |       |Baseline LoA|        |                                                 
||    RCOI    ||    RCOI    ||   |       |    RCOI    |        |                                                 
|+------------++------------+|   |       +------------+        |                                                 
|      /|\          /|\      |   |             /|\             |                                                 
+-------|------------|-------+   +--------------|--------------+                                                 
        |            |                          |                                                                
        |            |                          |                                                                
        |            |                          |                                                                
        | RCOI       | RCOI                     | RCOI                                                           
        | Match      | Match                    | Match                                                          
        |            |                          |                                                                
        |            |                          |                                                                
        |            +--------------------+     +-----+                                                          
        |                                 |           |                                                          
        |                                 |           |                                                          
        |                                 |           |                                                          
        |                                 |           |                                                          
        |                                 |           |                                                          
       \|/                               \|/         \|/                                                         
   +------------------------+       +------------------------+                                                   
   |   OpenRoaming ANP#1    |       |   OpenRoaming ANP#2    |                                                   
   | Operates in a country  |       | Operates in a country  |                                                   
   |  where the regulator   |       |  where the regulator   |                                                   
   |   requires enhanced    |       |   permits baseline     |                                                   
   |   identity proofing    |       |   identity proofing    |                                                   
   |    +--------------+    |       |    +--------------+    |                                                   
   |    |     WLAN     |    |       |    |     WLAN     |    |                                                   
   |    | Enhanced LoA |    |       |    | Baseline LoA |    |                                                   
   |    |     RCOI     |    |       |    |     RCOI     |    |                                                   
   |    +--------------+    |       |    +--------------+    |                                                   
   +------------------------+       +------------------------+                                                     


]]></artwork></figure>

</section>
</section>
<section anchor="legal"><name>OpenRoaming legal framework</name>

<section anchor="seamless-experience"><name>Seamless experience</name>

<t>In order for OpenRoaming to avoid the need for end-users to
be presented with and accept legal terms and conditions covering their
use of the Wi-Fi hotspot service, there needs to be a legal framework in place.</t>

</section>
<section anchor="openroaming-organization"><name>OpenRoaming Organization</name>

<t>The federation is based on a legal framework that comprises a set of policies,
templated agreements and immutable terms as agreed to by the WBA and its membership.
The framework defines a hierarchy of roles, responsibilities and relationships that
are designed to enable the federation to scale to millions of Wi-Fi access networks.</t>

<t><xref target="figorg"/> shows the
relationships between WBA, OpenRoaming Brokers, who are members of the WBA that
have agreed terms with WBA to perform the OpenRoaming broker role and the OpenRoaming providers.
OpenRoaming brokers agree terms with OpenRoaming Providers that can act as Access Network
Providers (ANPs) and/or Identity Providers (IDPs). OpenRoaming providers do not have
to be members of the WBA to provide OpenRoaming services. Finally, OpenRoaming IDPs
agree terms with OpenRoaming end-users who then benefit from seamless authentication onto
the Wi-Fi networks deployed by the different OpenRoaming ANPs.</t>

<figure title="Organization of the OpenRoaming Federation" anchor="figorg"><artwork><![CDATA[
                            +----------+                   
                            | Wireless |                      
                            | Broadband|                        
                            | Alliance |                         
                            +----------+                       
                              /|\  /|\                        
                               |    |                         
                          Agrees terms with                    
                               |    |                              
          +-----------+        |    |        +-----------+        
          |OpenRoaming|<-------+    +------->|OpenRoaming|       
          |Broker     |                      |Broker     |      
          +-----------+                      +-----------+       
             /|\  /|\                           /|\  /|\         
              |    |                             |    |        
         Agrees terms with                  Agrees terms with     
              |    |                             |    |           
        +-----+    +-----+                 +-----+    +-----+     
        |                |                 |                |    
       \|/              \|/               \|/              \|/     
+-----------+     +-----------+     +-----------+     +-----------+
|OpenRoaming|     |OpenRoaming|     |OpenRoaming|     |OpenRoaming|
|Access     |     |Identity   |     |Identity   |     |Access     |
|Network    |     |Provider   |     |Provider   |     |Network    |
|Provider   |     |           |     |           |     |Provider   |
+-----------+     +-----------+     +-----------+     +-----------+
                   /|\  /|\            /|\  /|\      
                    |    |              |    |       
               Agrees terms with   Agrees terms with
                    |    |              |    |       
      +-------------+    |              |    +-------------+       
      |                  |              |                  |       
     \|/                \|/            \|/                \|/      
+-----------+     +-----------+     +-----------+      +-----------+
|OpenRoaming|     |OpenRoaming|     |OpenRoaming|      |OpenRoaming|
|End-User   |     |End-User   |     |End-User   |      |End-User   |
+-----------+     +-----------+     +-----------+      +-----------+

]]></artwork></figure>

</section>
<section anchor="openroaming-legal-terms"><name>OpenRoaming legal terms</name>

<t>In OpenRoaming there is no direct agreement between individual ANPs and individual
IDPs or between end-users and ANPs. As a consequence, OpenRoaming brokers
agree to use certain federation-specific terms in their agreements with
OpenRoaming providers.</t>

<t>This arrangement ensures that all ANPs agree to abide by the OpenRoaming
privacy policy <xref target="ORPRIVACY"/> and all end-users agree to abide by the
OpenRoaming end-user Terms and Conditions <xref target="ORTERMS"/>.</t>

</section>
</section>
<section numbered="false" anchor="Changelog"><name>Changelog</name>
<t><list style="symbols">
  <t>01 - added details of WBA-Custom-SLA for OpenRoaming ANP networks that signal using
<xref target="RFC7268"/> that they operate on a vehicular platform. Added clarifications regarding use
of direct and indirect names in certificate validation.</t>
  <t>02 - added details of OpenRoaming protection of end-user privacy, including WRIX recommendations
on use of correlation identifiers in RADIUS Access-Accept packet that may unintentionally weaken
end-user privacy.</t>
  <t>03 - updated DNSsec reference. Added section on interworking with other federations.</t>
  <t>04 - updated PKI Policy OID to reflect new certificate chain. Added IDP availability requirements.
Added session-timeout requirements. Added new onboarding capabilities for short lived credentials. Added text concerning OpenRoaming Privacy Policy and restrictions on location usage.</t>
  <t>05 - added new section on use of Reply-Message, added new text on troubleshooting, clarified RADIUS accounting handling, clarified CUI usage in Access-Accept, clarified use of EAP types.</t>
</list></t>

</section>
<section numbered="false" anchor="Acknowledgements"><name>Acknowledgements</name>

<t>The authors would like to thank all the members of the WBA's OpenRoaming Workgroup
who help define the OpenRoaming specifications.</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

