Standard

IEEE 802.1AR-2018

Current
Preview Preview is not available

Existing or new amendments and versions must be purchased separately.

Language
Services

Abstract

Revision Standard - Active. A Secure Device Identifier (DevID) is cryptographically bound to a device and supports authentication of the device’s identity. An Initial Device Identifier (IDevID) provide by the supplier of a device can be supplemented by Local Device Identifiers (LDevIDs) facilitating enrollment (provisioning of authentication and authorization credentials) by local network administrators. (The PDF of this standard is available at no cost compliments of the IEEE GET Program at https://ieeexplore.ieee.org/browse/standards/get-program/page)

Products specifications

  • Standard from IEEE
  • Published:
  • Document type: IS
  • Pages
  • Publisher: IEEE
  • Distributor: IEEE
  • ICS: 35.110
  • National Committee: IEEE Computer Society / LAN/MAN Standards Committee

Product Relations

  • Referred by: IEEE 3801-2022
  • Referred by: IEEE 8802-1X-2021
  • Referred by: IEEE 802.1X-2020
  • Referred by: IEEE 2030.5-2018
  • Refers: IEEE 802.1AC-2016
  • Revises: IEEE 802.1AR-2009
  • Refers: IETF RFC 3279, Algorithms and Identifiers for the Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile, Polk, W., Housley, R., Bassham, L., April 2002.
  • Refers: IETF RFC 5280, Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile, Cooper, D., Santesson, S., Farrell, S., Boeyen, S., Housley, R., Polk, W., May 2008.
  • Refers: IETF RFC 5480, Elliptic Curve Cryptography Subject Public Key Information, Turner, S., Brown, D., Yiu, K., Housley, R., Polk, T., March 2009.
  • Refers: IETF RFC 4108, Using Cryptographic Message Syntax (CMS) to Protect Firmware Packages, R. Housley, August 2005.
  • Refers: IETF RFC 5289, TLS Elliptic Curve Cipher Suites with SHA-256/384 and AES Galois Counter Mode (GCM), Rescorla, E., August 2008.
  • Refers: ANSI X9.62-2005, Public Key Cryptography for the Financial Services Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA).4
  • Refers: IETF RFC 3647, Internet X.509 Public Key Infrastructure Certificate Policy and Certification Practices Framework, Chokhani, S., Ford, W., Sabett, R., Merrill, C., Wu, S., November 2003.
  • Refers: IETF RFC 6353, Transport Layer Security (TLS) Transport Model for the Simple Network Management Protocol (SNMP), Hardaker, W., July 2011.
  • Refers: IETF RFC 2580, STD 58, Conformance Statements for SMIv2, McCloghrie, K., Perkins, D., Schoenwaelder, J., Case, J., Rose, M., Waldbusser, S., April 1999.
  • Refers: IETF RFC 4055, Additional Algorithms and Identifiers for RSA Cryptography for use in the Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile, Schaad, J., Kaliski, B., Housley, R., June 2005.
  • Refers: IETF RFC 2579, STD 58, Textual Conventions for SMIv2, McCloghrie, K., Perkins, D., Schoenwaelder, J., Case, J., Rose, M., Waldbusser, S., April 1999.
  • Refers: IETF RFC 2578, STD 58, Structure of Management Information for Version 2 (SMIv2), McCloghrie, K., Perkins, D., Schoenwaelder, J., Case, J., Rose, M., Waldbusser, S., April 1999.5