<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.21 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-tomas-openroaming-04" category="info" submissionType="independent" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.25.0 -->
  <front>
    <title abbrev="WBA OpenRoaming">WBA OpenRoaming Wireless Federation</title>
    <seriesInfo name="Internet-Draft" value="draft-tomas-openroaming-04"/>
    <author initials="B." surname="Tomas" fullname="Bruno Tomas">
      <organization>Wireless Broadband Alliance, Inc.</organization>
      <address>
        <postal>
          <street>5000 Executive Parkway, Suite 302</street>
          <city>San Ramon</city>
          <code>94583</code>
          <country>US</country>
        </postal>
        <email>bruno@wballiance.com</email>
      </address>
    </author>
    <author initials="M." surname="Grayson" fullname="Mark Grayson">
      <organization>Cisco Systems</organization>
      <address>
        <postal>
          <street>10 New Square Park</street>
          <city>Feltham</city>
          <code>TW14 8HA</code>
          <country>UK</country>
        </postal>
        <email>mgrayson@cisco.com</email>
      </address>
    </author>
    <author initials="N." surname="Canpolat" fullname="Necati Canpolat">
      <organization>Intel Corporation</organization>
      <address>
        <postal>
          <street>2111 NE. 25th Ave</street>
          <city>Hillsboro</city>
          <code>97124</code>
          <country>US</country>
        </postal>
        <email>necati.canpolat@intel.com</email>
      </address>
    </author>
    <author initials="B. A." surname="Cockrell" fullname="Betty A. Cockrell">
      <organization>SingleDigits</organization>
      <address>
        <postal>
          <city>San Antonio</city>
          <country>US</country>
        </postal>
        <email>bcockrell@singledigits.com</email>
      </address>
    </author>
    <author initials="S." surname="Gundavelli" fullname="Sri Gundavelli">
      <organization>Cisco Systems</organization>
      <address>
        <postal>
          <street>170 West Tasman Drive</street>
          <city>San Jose</city>
          <code>95134</code>
          <country>US</country>
        </postal>
        <email>sgundave@cisco.com</email>
      </address>
    </author>
    <date year="2025" month="January" day="02"/>
    <area>general</area>
    <workgroup>Independent Submission</workgroup>
    <keyword>Internet-Draft</keyword>
    <keyword>OpenRoaming</keyword>
    <keyword>Federation</keyword>
    <abstract>
      <?line 164?>

<t>This document describes the Wireless Broadband Alliance's
OpenRoaming system. The OpenRoaming architectures enables a seamless
onboarding experience for devices connecting to access networks
that are part of the federation of access networks and identity providers.
The primary objective of this document is to describe the protocols that
form the foundation for this architecture, enabling providers to correctly configure
their equipment to support interoperable OpenRoaming signalling exchanges.
In addition, the topic of OpenRoaming has been raised in different IETF working
groups, and therefore a secondary objective is to assist those discussions by
describing the federation organization and framework.</t>
    </abstract>
  </front>
  <middle>
    <?line 177?>

<section anchor="intro">
      <name>Introduction</name>
      <t>WBA OpenRoaming is a roaming federation service of Access Network Providers (ANPs)
and Identity Providers (IDPs), enabling an automatic and secure
Wi-Fi experience globally. WBA OpenRoaming creates the framework to seamlessly
connect billions of users and things to millions of Wi-Fi networks.</t>
      <figure anchor="figfedarch">
        <name>OpenRoaming Federation</name>
        <artwork><![CDATA[
ANP-1 --\                    _----_                     /-- IDP-1
         \     Access      _( Open )_      Identity    /
ANP-2  ---<==  Network ---(  Roaming )---  Providers <==-- IDP-2
         /     Providers   (_      _)                  \
ANP-3 --/                    '----'                     \-- IDP-3

]]></artwork>
      </figure>
      <t>WBA OpenRoaming recognizes the benefits that the likes of eduroam <xref target="RFC7593"/> provide to the
education and research community. WBA OpenRoaming defines a global federation that is targeted at serving
all communities, while supporting both settlement-free use cases where "free" Wi-Fi is being offered to
end-users in order to support some
alternative value proposition, as well as traditional settled "paid" for Wi-Fi offered by some
cellular providers.</t>
      <t>OpenRoaming is designed to deliver end-to-end security between a Network Access Server deployed by an
OpenRoaming Access Network Provider and an EAP Server <xref target="RFC3748"/> deployed by an OpenRoaming
Identity Provider. The security of the solution is based on mTLS using certificates
issued under Wireless Broadband Alliance's Public Key Infrastructure <xref target="RFC5280"/>.</t>
      <section anchor="Requirements">
        <name>Requirements Language</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL",
"SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT
RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be
interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/>
when, and only when, they appear in all capitals, as shown here.</t>
      </section>
      <section anchor="Terminology">
        <name>Terminology</name>
        <t>Access Network Query Protocol (ANQP):</t>
        <ul empty="true">
          <li>
            <t>An IEEE 802.11 defined protocol that allows for access network information retrieval
in a pre-association state. ANQP has been further extended by the
Wi-Fi Alliance (WFA) as part of its Passpoint program <xref target="PASSPOINT"/>.</t>
          </li>
        </ul>
        <t>Access Network Provider (ANP):</t>
        <ul empty="true">
          <li>
            <t>An entity that has joined the federation and serves OpenRoaming end-users by configuring the OpenRoaming RCOI(s) on its Wi-Fi equipment.</t>
          </li>
        </ul>
        <t>Broker:</t>
        <ul empty="true">
          <li>
            <t>An entity that has joined the federation and performs certain specific roles to help scale the operation of the federation. The separate roles of a broker can include:</t>
          </li>
        </ul>
        <ul empty="true">
          <li>
            <ul empty="true">
              <li>
                <ol spacing="normal" type="1"><li>
                    <t>Assigning WBA identities to ANPs and IDPs.</t>
                  </li>
                  <li>
                    <t>Operating an issuing intermediate certificate authority under the WBA's PKI and issuing certificates to ANPs and IDPs.</t>
                  </li>
                  <li>
                    <t>Operating a registration authority to a third party operated issuing intermediate certificate authority under WBA's PKI to enable certificates to be issued to ANPs and IDPs.</t>
                  </li>
                </ol>
              </li>
            </ul>
          </li>
        </ul>
        <t>Closed Access Group (CAG):</t>
        <ul empty="true">
          <li>
            <t>The definition of the 12 most significant bits of an OUI-36 RCOI to indicate OpenRoaming policy controls that
can be enforced by ANPs and IDPs.</t>
          </li>
        </ul>
        <t>Identity Provider (IDP):</t>
        <ul empty="true">
          <li>
            <t>An entity that has joined the federation and
includes the OpenRoaming RCOI(s) in the Passpoint profile of its end-user devices and
authenticates end-user devices on OpenRoaming ANP networks.</t>
          </li>
        </ul>
        <t>Level of Assurance (LoA):</t>
        <ul empty="true">
          <li>
            <t>An ISO/IEC 29115 term that is used to define equivalent levels for handling of end-user enrollment, credential management
and authentication amongst different IDPs.</t>
          </li>
        </ul>
        <t>OpenRoaming-Settled:</t>
        <ul empty="true">
          <li>
            <t>The "base RCOI" of BA-A2-D0 that is used to indicate that the ANP expects to receive payment for
providing OpenRoaming service to end-users.</t>
          </li>
        </ul>
        <t>OpenRoaming-Settlement-Free:</t>
        <ul empty="true">
          <li>
            <t>The "base RCOI" of 5A-03-BA that is used to indicate that the ANP provides the OpenRoaming service to end-users at
no cost to the IDP.</t>
          </li>
        </ul>
        <t>Passpoint Profile:</t>
        <ul empty="true">
          <li>
            <t>Passpoint is a Wi-Fi Alliance (WFA) certification program that defines the use a Passpoint profile, that includes the user's credentials
and the access network identifiers, to enables Wi-Fi devices to automatically discover and authenticate to Wi-Fi hotspots
that provide Internet access <xref target="PASSPOINT"/>.</t>
          </li>
        </ul>
        <t>PLMN Id:</t>
        <ul empty="true">
          <li>
            <t>A unique identifier for a mobile network operator. The identifier consists of a MCC (Mobile Country Code) and a MNC (Mobile Network Code). ITU-T Recommendation <xref target="E212"/> defines both MCC and MNC. The ITU allocates MCC values to national regulators who are then responsible for allocating MNC values to individual mobile network operators.  <xref target="PASSPOINT"/> defines how the PLMN Id can be sent in ANQP messages.</t>
          </li>
        </ul>
        <t>Roaming Consortium Identifier (RCOI):</t>
        <ul empty="true">
          <li>
            <t>RCOI identifies the groups of identity providers that are supported by the network.
It is a 3-octet, or a 5-octet value carried in the 802.11 beacon information element (IE).
It is also sent in the ANQP messages. Based on the access technologies, the specific link-layer
protocols will be used for carrying the RCOI. RCOI is also part of the Passpoint profile.</t>
          </li>
        </ul>
        <ul empty="true">
          <li>
            <t>NOTE: OpenRoaming only uses 5-octet RCOIs.</t>
          </li>
        </ul>
        <t>Subscriber Identity Module (SIM):</t>
        <ul empty="true">
          <li>
            <t>The SIM is traditionally a smart card distributed by a mobile operator.</t>
          </li>
        </ul>
        <t>WBA Identity (WBAID):</t>
        <ul empty="true">
          <li>
            <t>A hierarchical namespace that is used to uniquely identify every OpenRoaming entity.</t>
          </li>
        </ul>
        <t>Wireless Roaming Intermediary eXchange:</t>
        <ul empty="true">
          <li>
            <t>A framework, aimed at facilitating
  interconnectivity between operators and the Wi-Fi roaming hub services.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="wireless-broadband-alliance">
      <name>Wireless Broadband Alliance</name>
      <t>The Wireless Broadband Alliance (WBA) defines the Wireless
Roaming Intermediary eXchange (WRIX) framework, aimed at facilitating
interconnectivity between Wi-Fi operators and the Wi-Fi roaming hub services,
as well as the Carrier Wi-Fi Services program that provides guidelines to
improve customer experience on Carrier Wi-Fi networks. Both of these
programs leverage the Wi-Fi Alliance specified Passpoint functionality
<xref target="PASSPOINT"/> to enable automatic and secure connectivity to Wi-Fi networks, allowing devices
to be provisioned with network access credentials with minimal user interaction.</t>
      <t>WBA programs have traditionally focussed on "offloading"
cell phone data from cellular networks onto Wi-Fi networks.
Deployments of such systems have seen uneven
adoption across geographies, with cellular operators frequently limiting
their engagement to premier locations that have deployed Wi-Fi and experience
a significant footfall of operator's customers.</t>
      <t>Whereas conventional Carrier Wi-Fi has focused on premier locations, the
last decade has seen a continued increase in the requirements of private Wi-Fi
networks to be able to serve visitors, contractors and guest users. Moreover, in
most of these scenarios, the Wi-Fi network is primarily being used to support some
alternative value proposition; an improved retail experience in a shopping
mall, a more efficient meeting in a carpeted office, a superior stay in a
hospitality venue, or a better fan experience in a sporting arena. Traditionally,
this segment has made wide-scale use of captive portals and unencrypted Wi-Fi links
to onboard end-users onto their networks <xref target="RFC8952"/>. However, the decreasing costs for cellular data means
end-users are less motivated to search out and attach to such "free" Wi-Fi
networks, and as a consequence, captive portal conversion rates continue to decrease.</t>
      <t>As a consequence, in 2020 WBA launched its OpenRoaming federation,
designed to provide a better on-boarding experience to end-users, that is seamless, scalable and secure.</t>
    </section>
    <section anchor="orarch">
      <name>OpenRoaming Architecture</name>
      <t><xref target="figwifiarch"/> contrasts a conventional carrier Wi-Fi roaming system with OpenRoaming.
As illustrated, conventional Wi-Fi roaming has typically been based on:</t>
      <ol spacing="normal" type="1"><li>
          <t>IPSec <xref target="RFC6071"/> tunnels established between access networks, hub providers and identity providers used to protect exchanged signalling.</t>
        </li>
        <li>
          <t>Static routing of RADIUS signalling <xref target="RFC2865"/> based on realm routing tables populated according to agreements between access networks and hub providers.</t>
        </li>
        <li>
          <t>Passpoint primarily used with SIM based identifiers, where individual PLMN Ids are configured on the access networks WLAN equipment enabling them to be sent in ANQP messages, and cellular providers enable Passpoint based SIM authentication in end-user devices.</t>
        </li>
        <li>
          <t>EAP-AKA <xref target="RFC4187"/> based Passpoint authentication exchanged between the Supplicant in the end-user device and the EAP Server in the cellular provider's network.</t>
        </li>
        <li>
          <t>A primary focus on carrier based identities where the end-user has a billing relationship with the carrier.</t>
        </li>
      </ol>
      <t>In contrast, OpenRoaming is based on:</t>
      <ol spacing="normal" type="1"><li>
          <t>RadSec signalling <xref target="RFC6614"/> secured using mTLS with certificates issued under WBA's private certificate authority.</t>
        </li>
        <li>
          <t>Dynamic routing of RADIUS based on DNS-based discovery of signalling peers <xref target="RFC7585"/></t>
        </li>
        <li>
          <t>Passpoint based network selection based on 36-bit Roaming Consortium Organization Identifiers (RCOIs), where WBA defines the use of the 12 most significant bits of the 36-bit RCOI to embed closed access group policies.</t>
        </li>
        <li>
          <t>Passpoint authentication that can use any suitable EAP method.</t>
        </li>
        <li>
          <t>Encompassing new identity providers who do not have a billing relationship with their end-users.</t>
        </li>
      </ol>
      <figure anchor="figwifiarch">
        <name>Contrasting Carrier Wi-Fi and OpenRoaming Architectures</name>
        <artwork><![CDATA[
+---------+        +--------+        +--------+        +--------+
| Visited |        | Wi-Fi  |        | Wi-Fi  |        |Cellular|
|  Wi-Fi  |        |  Hub   |        |  Hub   |        |Provider|
| Network |<------>|Provider|<------>|Provider|<------>|Network |
|         | RADIUS |        | RADIUS |        | RADIUS |        |
|   NAS   |        | RADIUS |        | RADIUS |        | RADIUS |
|         |<------>| proxy  |<------>| proxy  |<------>| Server |
|Passpoint| IPSec  +--------+ IPSec  +--------+ IPSec  +--------+
|PLMNId(s)|
+---------+
    /|\
     |
    \|/
+---------+         A) Conventional Carrier Wi-Fi
|Passpoint|
| device  |
|  with   |
| PLMN-Id |
| profile |
+---------+


+---------+                   +---+                    +--------+
| Visited |<----------------->|DNS|<------------------>|Identity|
|  Wi-Fi  |   DNS based peer  +---+  Configure NAPTR,  |Provider|
| Network |      discovery            SRV and A/AAAA   |Network |
|         |                              records       |        |
|   NAS   |                                            | RADIUS |
|         |<------------------------------------------>| Server |
|Passpoint|        RadSec/TLS secured using mTLS       +--------+
| RCOI(s) |               and WBA PKI
+---------+
    /|\
     |
    \|/
+---------+              B) OpenRoaming
|Passpoint|
| device  |
|  with   |
| RCOI(s) |
| profile |
+---------+

]]></artwork>
      </figure>
    </section>
    <section anchor="wbaid">
      <name>Identifying OpenRoaming Entities</name>
      <t>All OpenRoaming providers and OpenRoaming brokers are allocated a WBA Identity (WBAID). The
WBAID is defined to be transported in the RADIUS Operator-Name attribute (#126) <xref target="RFC5580"/>.
WBA has been allocated the Operator Namespace identifier 0x34 "4" to identify
an Operator-Name attribute carrying a WBAID.</t>
      <t>The WBAID is a hierarchical namespace that comprises at its top level the
identity allocated by WBA to a WBA Member and is of the form shown in <xref target="figwbaid"/>
where the optional 2 upper case characters represent an ISO-3166 Alpha-2 country code <xref target="ISO3166"/> e.g.,
"WBAMEMBER:US".</t>
      <figure anchor="figwbaid">
        <name>ABNF definition of Primary WBAID Structure</name>
        <artwork><![CDATA[
upper-case-char = %x41-5a
member-id       = 1*upper-case-char
wbaid           = member-id [ %x3a 2*2upper-case-char]

]]></artwork>
      </figure>
      <t>When operating as an OpenRoaming broker, the WBA Member
is able to allocate subordinate identities to OpenRoaming providers
who are not WBA members by pre-pending a subordinate identity ,
plus "." (%x2e) to the Member's WBAID, e.g., "OPENROAMINGPROVIDER.WBAMEMBER:US".
In this way, any receiving entity of a WBAID can identify the WBA Member who
is acting as an OpenRoaming broker to the provider by assigning it an identity.</t>
    </section>
    <section anchor="sss">
      <name>Scaling Secured Signalling</name>
      <t>As described in <xref target="legal"/>, the OpenRoaming legal framework does not assume
any direct relationship between ANP and IDP. In order to scale the
secured signalling between providers, the federation makes use of a
Public Key Infrastructure using a private Certificate Authority specifically
designed to secure the operations of the roaming federation. WBA
and its members have published the WBA Certificate Policy <xref target="WBAPKICP"/> that defines the
policies which govern the operations of the PKI components by all
individuals and entities within the infrastructure. The OID for Wireless
Broadband Alliance is:</t>
      <t>{ iso(1) identified-organization(3) dod(6) internet(1) private(4) enterprise(1) The Wireless Broadband Alliance(14122) }</t>
      <t>The Wireless Broadband Alliance organizes its OID arcs for the Certificates
Policy Documents using the object identifier 1.3.6.1.4.1.14122.1.1. At the time of writing,
the current certificate policy is 1.3.6.1.4.1.14122.1.1.7.</t>
      <t>This Certificate Policy is based on a 4-level hierarchy, as illustrated in <xref target="figpki"/>.</t>
      <figure anchor="figpki">
        <name>OpenRoaming PKI Hierarchy</name>
        <artwork><![CDATA[
+---------+---------------------------+----------------------------+
|         |                           |                            |
| Level   | Description               |  Comment                   |
|         |                           |                            |
+---------+---------------------------+----------------------------+
| Level 1 | OpenRoaming Root          | Operation managed by WBA   |
|         | Certificate Authority     |                            |
+---------+---------------------------+----------------------------+
| Level 2 | OpenRoaming Policy        | Operation managed by WBA.  |
|         | Intermediate Certificate  | Instantiates WBA policy OID|
|         | Authority                 |                            |
+---------+---------------------------+----------------------------+
| Level 3 | OpenRoaming Issuing       | Operated by an OpenRoaming |
|         | Intermediate Certificate  | broker                     |
|         | Authority                 |                            |
+---------+---------------------------+----------------------------+
| Level 3 | OpenRoaming Registration  | Optional and when used,    |
|         | Authority                 | operated by an OpenRoaming |
|         |                           | broker                     |
+---------+---------------------------+----------------------------+
| Level 4 | OpenRoaming Entity        | A WBA member or non-member.|
|         |                           | WBA's Certificate Policy   |
|         |                           | requires the Entity's      |
|         |                           | WBAID is included in the   |
|         |                           | Subject UID field in the   |
|         |                           | certificate.               |
+---------+---------------------------+----------------------------+

]]></artwork>
      </figure>
      <t>Certificates issued under the WBA PKI are used by Entities to perform mutual
authentication with other Entities and to secure RadSec
signalling <xref target="RFC6614"/> that carries EAP-based Passpoint authentication. This is typically between a
RadSec client in the OpenRoaming ANPs network and an RadSec Server in the OpenRoaming
IDPs network, although a provider can decide to outsource the operation of the RadSec
endpoint to a third party provider.</t>
    </section>
    <section anchor="dpd">
      <name>IDP Discovery</name>
      <section anchor="dynamic-discovery">
        <name>Dynamic Discovery</name>
        <t>OpenRoaming defines the use of dynamic discover <xref target="RFC7585"/> by which an ANP discovers the
IP address of the IDP's RadSec server.</t>
      </section>
      <section anchor="discovery-of-eap-akaaka-servers">
        <name>Discovery of EAP-AKA/AKA' Servers</name>
        <t>Passpoint defines the use of EAP-AKA' based authentication <xref target="RFC5448"/> which uses the
3GPP 23.003 <xref target="TS23003"/> defined realm of wlan.mnc&lt;mnc&gt;.mcc&lt;mcc&gt;.3gppnetwork.org, where
&lt;mcc&gt; represent an E.212 Mobile Country Code and &lt;mnc&gt; represents the E.212
Mobile Network Code allocated to the IDP. GSMA is responsible for
operating the 3gppnetwork.org domain and GSMA IR.67 <xref target="GSMAIR67"/> limits access to
the DNS systems supporting such records to those systems connected to the inter-PLMN IP
backbone (known as "GRX/IPX"). As OpenRoaming ANPs do not connect to this inter-PLMN backbone,
then conventional realm based lookup cannot be used over the Internet to discover the RadSec server
supporting EAP-AKA' authentication.</t>
        <t>GSMA IR.67 does allow systems to be discoverable
from the public Internet, specifically calling out the use of the
pub.3gppnetwork.org domain name for such procedures. In order for ANPs
to dynamically discover the RadSec server supporting EAP-AKA' authentication,
GSMA has defined the use of the wlan.mnc&lt;mnc&gt;.mcc&lt;mcc&gt;.pub.3gppnetwork.org by
OpenRoaming systems. This means that whenever a RadSec client receives a user-name
containing an NAI formatted as user@wlan.mnc&lt;mnc&gt;.mcc&lt;mcc&gt;.3gppnetwork.org, the dynamic
peer detection functionality MUST insert ".pub" into the realm and perform
DNS based dynamic discovery using the wlan.mnc&lt;mnc&gt;.mcc&lt;mcc&gt;.pub.3gppnetwork.org
domain name. The RADIUS user-name attribute MUST NOT be similarly modified.</t>
        <t>IR.67 defines the procedure by which a cellular operator can request the delegation
of their mnc&lt;mnc&gt;.mcc&lt;mcc&gt;.pub.3gppnetwork.org sub-domain.  GSMA PRD IR.67 also allows an MNO
to delegate the entire mnc&lt;MNC&gt;.mcc&lt;MCC&gt;.pub.3gppnetwork.org sub-domain
which could have already occurred, e.g., to enable use of the
epdg.mnc&lt;MNC&gt;.mcc&lt;MCC&gt;.pub.3gppnetwork.org used with 3GPP's Wi-Fi calling service. Using this approach,
a cellular operator operating as an OpenRoaming IDP can authenticate their end-users on
third party ANP Wi-Fi networks.</t>
      </section>
      <section anchor="proving-a-discovered-radsec-server-is-authoritative-for-a-realm">
        <name>Proving a discovered RadSec server is authoritative for a realm</name>
        <t>The OpenRoaming preferred approach to dynamically discover the RadSec server
IP address serving a particular realm or set of realms is to
use DNS records that are protected with DNSSEC <xref target="RFC9364"/>. However, GSMA
has not enabled DNSSEC on its 3gppnetwork.org domain, meaning that DNSSEC
cannot be applied on the publicly resolvable domains under pub.3gppnetwork.org.
Because of this situation, OpenRoaming does not currently mandate operation of DNSSEC.</t>
        <t>If the DNS records for a realm are not protected with DNSSEC, because the realm
has been provided directly by the OpenRoaming End-User, the
IDP SHOULD ensure that the discovered RadSec server(s) supporting its realm(s)
is/are configured with a WBA-PKI server certificate that includes the realm(s)
used in the dynamic peer detection in the certificate SubjectAltName.</t>
        <t>Where the DNS records are protected with DNSSEC, the IDP SHOULD ensure that
the discovered RadSec server(s) supporting its realm(s)
is/are configured with a WBA-PKI server certificate that includes the
derived name(s) from the secured DNS NAPTR/SRV query in the
certificate SubjectAltName.</t>
        <t>Where the OpenRoaming IDP has offloaded the operation of RadSec termination to a
third party hub-provider that is responsible for supporting a number of independent realms,
the hub-provider SHOULD ensure that the discovered RadSec server(s) supporting
the independent realms from its partner IDPs
is/are configured with a WBA-PKI server certificate that includes the
derived name(s) from the DNS NAPTR/SRV query in the
certificate SubjectAltName.</t>
      </section>
      <section anchor="co-existence-with-other-federations">
        <name>Co-existence with other Federations</name>
        <t>Other federations which want to interface to the OpenRoaming federation may use
dynamic discovery with distinct NAPTR application service tags to facilitate integration.
For example, an eduroam service provider can use the use the "x-eduroam"
application service tag, specified in <xref target="RFC7593"/>, to discover the home institution's
RadSec peer for authentication, and OpenRoaming ANPs can use the "aaa+auth" tag to discover
a separate RadSec peer that can be defined for handling all inter-domain authentications.</t>
        <t>Where a separate inter-federation RadSec peer is not used, the other federation AAA operating
as an OpenRoaming IDP needs to determine which certificate chain to return in its ServerHello message.
An OpenRoaming ANP operating with TLS 1.3 SHOULD use the "certificate_authorities" extension <xref target="RFC8446"/>
in its ClientHello message to indicate that the ANP supports the WBA PKI Certificate Authority trust anchor.
Similarly, an OpenRoaming ANP operating using TLS 1.2 SHOULD use the "trusted_ca_keys" extension <xref target="RFC6066"/> in its ClientHello message to indicate the DistinguishedName of the WBA PKI Certificate Authority whose root keys the ANP possesses. The federation AAA operating as an OpenRoaming IDP MAY use information in the ClientHello extension to guide its certificate selection.</t>
      </section>
    </section>
    <section anchor="PASSPOINT-SEC">
      <name>OpenRoaming Passpoint Profile</name>
      <section anchor="openroaming-policy-controls">
        <name>OpenRoaming Policy Controls</name>
        <t>In order to avoid possible fragmentation of roaming federations, OpenRoaming recognizes
that there is a need to permit OpenRoaming to be integrated into a variety of
different use-cases and value propositions. These use-cases include scenarios where
providers are able to enforce policy controls of which end-users are authorized to access the service.
The realization of authorization policy controls in the OpenRoaming federation is a balance
between the requirements for fine grain policy enforcement versus the potential
impact of policy enforcement on the user experience.</t>
        <t>Such a level of control is realized using Closed Access Group (CAG) based policies.
A Closed Access Group identifies a group of OpenRoaming users who are permitted
to access one or more OpenRoaming access networks configured with a particular CAG policy.
These Closed Access Group policies are encoded using one or more
Roaming Consortium Organization Identifiers (RCOIs), first defined
in Passpoint Release 1.0, and well supported
across the smartphone device ecosystem.</t>
        <t>Note, encoding CAG policies in OpenRoaming using one or more RCOIs is aimed at
delivering an equivalent functionality to the CAG policies encoded in 3GPP using one or more CAG-IDs.</t>
      </section>
      <section anchor="CAG">
        <name>OpenRoaming Closed Access Group Policies</name>
        <t>OpenRoaming defines the use of multiple RCOIs to facilitate the implementation of
closed access group policies across the federation. The currently defined RCOIs are:</t>
        <ul spacing="normal">
          <li>
            <t>OpenRoaming-Settled:  BA-A2-D0-xx-x</t>
          </li>
          <li>
            <t>OpenRoaming-Settlement-Free:  5A-03-BA-xx-x</t>
          </li>
        </ul>
        <t><xref target="figrcoi"/> shows how the 24-bit length OpenRoaming RCOIs are further extended into 36-bit length OUI-36s
with additional context dependent identifiers used to encode specific closed access group
policies. Following Passpoint Release 1.0 specification, only when there is a bitwise match of
all 36 bits of the configured RCOI in the WLAN equipment and the Passpoint profile configured in the
end-user device will an EAP authentication be triggered.</t>
        <t>The encoding of closed access group policies is defined so that the "no-restrictions" policy is
encoded using the 12-bit value "00-0", i.e., 54-03-BA-00-0 represents a policy
that accepts all OpenRoaming settlement-free users onto a particular ANP installation.</t>
        <figure anchor="figrcoi">
          <name>Extension of Octets 4 and 5 for OpenRoaming Context Dependent RCOI Field</name>
          <artwork><![CDATA[
+---------------------------------------+-------------------+
|               OUI-36 Octet 4          |  OUI-36 Octet 5   |
+---------------------------------------+-------------------+
| B7 | B6 | B5 | B4 | B3 | B2 | B1 | B0 | B7 | B6 | B5 | B4 |
+----+---------+----+-------------------+-------------------+
| LoA|   QoS   |PID |     ID-Type       |On-b|  Reserved -  |
|    |         |    |                   |oard|   set to 0   |
+----+---------+----+-------------------+-------------------+

]]></artwork>
        </figure>
        <section anchor="level-of-assurance-policies">
          <name>Level of Assurance Policies</name>
          <t>The format of the Level of Assurance (LoA) field is as shown in <xref target="figloa"/>.</t>
          <figure anchor="figloa">
            <name>OpenRoaming CAG LoA Field</name>
            <artwork><![CDATA[
+------------------------------------------------------------+
|  LoA Field  |           Description                        |
+------------------------------------------------------------+
|     B7      |                                              |
+------------------------------------------------------------+
|     0       |   Baseline Identity Proofing                 |
+------------------------------------------------------------+
|     1       |   Enhanced Identity Proofing                 |
+------------------------------------------------------------+

]]></artwork>
          </figure>
          <t>The baseline identity proofing requirement on IDPs ensures that all
OpenRoaming identities are managed with at least a medium level of
assurance (LoA level 2) for end-user enrollment, credential management
and authentication, as specified in ISO/IEC 29115 <xref target="ISO29115"/>.</t>
          <t>Any IDP that manages its identities according to ISO/IEC 29115 LoA level 2
MUST NOT configure any RCOI in their end-users' Passpoint profile
with the LoA field set to "1". Conversely, an IDP that manages its identities
according to ISO/IEC 29115 LoA level 3 MAY configure multiple RCOIs
in their end-users' Passpoint profile, including RCOIs with the LoA field
set to "0" and RCOIs with the LoA field set to "1".</t>
          <t>The LoA field is used to support ANPs which operate in regulatory
regimes that require enhanced identity proofing to be used in the
provision of credentials on OpenRoaming devices, equivalent to LoA level
3 in ISO/IEC29115 <xref target="ISO29115"/>. In such a scenario, the ANP can set the LoA bit
field to 1 in all configured RCOIs to ensure that only identities
provisioned using enhanced LoA 3 procedures can access via the ANP's network.</t>
        </section>
        <section anchor="quality-of-service-policies">
          <name>Quality of Service Policies</name>
          <t>One of the challenges faced by users of Wi-Fi hotspots is when the Wi-Fi network
is configured sub-optimally and results in a poor user experience. Often the only
remedy open to a user it to disable the Wi-Fi interface on their smartphone and
continue to use cellular data. This is especially the case where the Wi-Fi hotspot
has been automatically selected with no user intervention. As a consequence, OpenRoaming defines specific
service tiers across the federation and uses the QoS field to differentiate between different tiers.
The format of the QoS field is shown in <xref target="figqos"/>.</t>
          <figure anchor="figqos">
            <name>OpenRoaming CAG QoS Field</name>
            <artwork><![CDATA[
+------------------------------------------------------------+
|            QoS Field              |      Description       |
+------------------------------------------------------------+
|        B6       |        B5       |                        |
+------------------------------------------------------------+
|        0        |        0        |        Bronze          |
+------------------------------------------------------------+
|        0        |        1        |        Silver          |
+------------------------------------------------------------+
|        1        |        0        |       Reserved         |
+------------------------------------------------------------+
|        1        |        1        |       Reserved         |
+------------------------------------------------------------+
]]></artwork>
          </figure>
          <t>The "Bronze" and "Silver" values of QoS field are used to identify
specific quality of service policy aspects.</t>
          <t>The bronze service tier corresponds to the following:</t>
          <ol spacing="normal" type="1"><li>
              <t>The availability of OpenRoaming service
when used to access the Internet measured during scheduled operations
across the ANP's network exceeds 90% over any one month period.</t>
            </li>
            <li>
              <t>The aggregate bandwidth used to receive
Internet service on the ANP's network is sufficient to enable
each and every authenticated and authorized OpenRoaming end-user to simultaneously receive a
sustained 256 kilobits per second connection.</t>
            </li>
          </ol>
          <t>The silver service tier corresponds to the following:</t>
          <ol spacing="normal" type="1"><li>
              <t>The availability of OpenRoaming service
when used to access the Internet measured during scheduled operations
across the ANP's network exceeds 95% over any one month period.</t>
            </li>
            <li>
              <t>The aggregate bandwidth used to receive
Internet service on the ANP's network is be sufficient to enable
each and every authenticated and authorized end-user to receive a
sustained 512 kilobits per second connection.</t>
            </li>
            <li>
              <t>At least 10% of authenticated and authorized users are able
to stream video content at a downlink rate of at least 5 megabits per
second (when measured over a one-minute interval) over all of the ANP's
OpenRoaming enabled Wi-Fi networks.</t>
            </li>
            <li>
              <t>The authenticated and authorized end-users are
able to stream video from one or more third party content distribution
networks with an end-to-end latency of less than 150ms from all of the
ANP's OpenRoaming enabled Wi-Fi networks.</t>
            </li>
          </ol>
          <t>The QoS field can be used by those IDPs that are only interested in providing
their end-users with a higher quality service level when automatically authenticated
onto an OpenRoaming network. For example, an IDP configures the QoS field
as bronze in a Passpoint profile that uses the "5A-03-BA" settlement free RCOI and
configures the QoS field as silver in a Passpoint profile that uses the
"BA-A2-D0" OpenRoaming-settled paid service.</t>
          <t>ANPs that only support the bronze service tier MUST set the QoS Field to "00" in
all RCOIs configured on their WLAN equipment. ANPs that support the silver service
tier MAY configure multiple RCOIs on their WLAN equipment that include values where
the QoS field is set to "01" and values where the QoS field is set to "00".</t>
          <t>Exceptionally, ANPs that operate OpenRoaming installations on moving platforms
are permitted to deviate from normal OpenRoaming service level requirements. This is
because such installations may necessitate use of cellular-based backhaul and/or
backhaul via Non-Terrestrial Networks (NTN) which may not be able to meet the
OpenRoaming minimum "bronze" service level requirements.
If an ANP wants to benefit from such deviations, it MUST signal using the WLAN-Venue-Info
attribute <xref target="RFC7268"/> that it is operating in a venue category identified using
a Venue Group value of "10", which is defined in Section 8.4.1.34 of <xref target="IEEE80211"/>
as being used for vehicular installations. In such cases, the OpenRoaming ANP MAY
signal one or more WBA-Custom-SLA vendor specific attributes <xref target="WBAVSA"/> to indicate
one or more (availability, per-user sustained bandwidth) tuples to the IDP.</t>
          <t>IDP availability requirements:</t>
          <t>Irrespective of the service-levels supported by their users, the IDP shall ensure
that the availability of their authentication service measured during scheduled
operations shall exceed 99% over any one month period.</t>
        </section>
        <section anchor="privacy-policies">
          <name>Privacy Policies</name>
          <t>The baseline privacy policy of OpenRoaming ensures
the identities of end-users remain anonymous when using the
service. The WBA WRIX specification specifies that where supplicants use EAP methods
that support user-name privacy, i.e., which are compatible with the "@realm" (or "anonymous@realm") (outer) EAP-Identifier,
then the supplicant SHOULD use the anonymized outer EAP identifier. Supplicants supporting
other EAP methods SHOULD support EAP method specific techniques for masking the
end-user's permanent identifier, for example pseudonym support in EAP-AKA/AKA' <xref target="RFC4187"/>
and/or enhanced IMSI privacy protection <xref target="WBAEIPP"/>. OpenRoaming IDPs SHOULD support and
enable the corresponding server-side functionality to ensure end-user privacy is protected.</t>
          <t>The WBA WRIX specification also recognizes that the privacy of end-users can be
unintentionally weakened by the use of correlation identifiers signalled using the
Chargeable-User-Identity attribute (#89) <xref target="RFC4372"/> and/or the Class attribute (#25) <xref target="RFC2865"/>
in the RADIUS Access-Accept packet. The WBA WRIX Specification recommends that the
default IDP policy SHOULD ensure that, when used, such correlation identifiers are unique for
each combination of end-user/ANP and that the keys and/or initialization vectors
used in creating such correlation identifiers SHOULD be refreshed at least every 48 hours,
but not more frequently than every 2 hours.</t>
          <t>This 2 hour limit is designed to assist the ANP in performing autonomous troubleshooting
of connectivity issues from authentic users/devices that are repeatedly re-initiating
connectivity to the ANP's network and/or to assist the ANP in identifying a new session
originated by an authentic user/device that has previously been identified by the ANP as having violated the OpenRoaming
end-user terms and conditions. When using typical public Wi-Fi session durations, it is
estimated that, with this 2 hour restriction, the ANP will be able to correlate an
Access-Request/Access-Accept exchange that immediately follows an Accounting-Request
stop message in over 50% of the sessions.</t>
          <t>In contrast to this default policy, there can be scenarios where the ANP
desires to derive value from its OpenRoaming settlement-free service by analysing
aggregate end-user behaviour. Whereas the use of aggregated end-user information does not
violate the OpenRoaming privacy policy, the derivation of such can benefit from the
ANP being able to uniquely identify end-users. In order to support such scenarios, the
OpenRoaming closed access group policies include the PID field.</t>
          <t>The PID field can be used to support scenarios where the user has consented
with their IDP that an immutable end-user identifier can be signalled to the
ANP in the RADIUS Access-Accept. The format of the PID field is
illustrated in <xref target="figpid"/>. The PID
field can be configured to "1" in the RCOIs used by those ANPs that
want to be be able to account for unique OpenRoaming end-users.</t>
          <t>The OpenRoaming IDP terms ensure subscribers MUST
explicitly give their permission before an immutable end-user identity
is shared with a third party ANP. When such permission has
not been granted, an IDP MUST NOT set the PID field to "1" in any
of the RCOIs in its end-user Passpoint profiles. When such permission has
been granted, an IDP MAY configure multiple RCOIs
in their end-users' Passpoint profile, including RCOIs with the PID field
set to "0" and RCOIs with the PID field set to "1".</t>
          <figure anchor="figpid">
            <name>OpenRoaming CAG PID Field</name>
            <artwork><![CDATA[
+------------------------------------------------------------+
|  PID Field  |                 Description                  |
+------------------------------------------------------------+
|     B4      |                                              |
+------------------------------------------------------------+
|     0       |   Baseline ID Policy applies, i.e., users    |
|             |   remain anonymous whilst using the service. |
+------------------------------------------------------------+
|     1       |   An immutable end-user ID will be returned  |
|             |   by the IDP in the Access-Accept packet.    |
+------------------------------------------------------------+

]]></artwork>
          </figure>
        </section>
        <section anchor="id-type-policies">
          <name>ID-Type Policies</name>
          <t>The ID-Type field can be used to realize policies which are based
on the business sector associated with the identity used by the IDP.
The format of the ID-Type
field is illustrated in <xref target="figidtype"/>.</t>
          <t>All IDPs configure at least one RCOI in their end-user's
Passpoint profile with ID-Type set to "0000" (Any identity type is permitted).
An IDP MAY configure additional RCOIs in their end-users' Passpoint profile
with an ID-Type representing the sector type of IDP.</t>
          <t>An ANP what wants to serve all end-users, irrespective of sector,
configures RCOIs in the WLAN equipment with ID-Type set to "0000".
Alternatively, an ANP which operates a sector specific business that
only desires to serve a subset of OpenRoaming end-users MAY set the ID-Type
to their desired sector in all configured RCOIs.</t>
          <figure anchor="figidtype">
            <name>OpenRoaming CAG ID-Type Field</name>
            <artwork><![CDATA[
+------------------------------------------------------------+
|       ID-Type Field       |           Description          |
+------------------------------------------------------------+
|  B3  |  B2  |  B1  |  B0  |                                |
+------------------------------------------------------------+
|  0   |  0   |  0   |  0   | Any identity type is permitted |
+------------------------------------------------------------+
|  0   |  0   |  0   |  1   | A service provider identity    |
+------------------------------------------------------------+
|  0   |  0   |  1   |  0   | A cloud provider identity      |
+------------------------------------------------------------+
|  0   |  0   |  1   |  1   | A generic enterprise identity  |
+------------------------------------------------------------+
|  0   |  1   |  0   |  0   | A government identity, e.g.,   |
|      |      |      |      | including city                 |
+------------------------------------------------------------+
|  0   |  1   |  0   |  1   | An automotive identity         |
+------------------------------------------------------------+
|  0   |  1   |  1   |  0   | A hospitality identity         |
+------------------------------------------------------------+
|  0   |  1   |  1   |  1   | An aviation industry identity  |
+------------------------------------------------------------+
|  1   |  0   |  0   |  0   | An education or research       |
|      |      |      |      | identity                       |
+------------------------------------------------------------+
|  1   |  0   |  0   |  1   | A cable industry identity      |
+------------------------------------------------------------+
|  1   |  0   |  1   |  0   | A manufacturer identity(note 1)|
+------------------------------------------------------------+
|  1   |  0   |  1   |  1   | A retail identity              |
+------------------------------------------------------------+
|        other values       | Reserved                       |
+------------------------------------------------------------+
| NOTE 1: A manufacturer identity closed access group policy |
| applies to IoT credentials corresponding to manufacturer   |
| installed identities as well as IoT credentials            |
| corresponding to owner installed identities.               |
+------------------------------------------------------------+

]]></artwork>
          </figure>
        </section>
        <section anchor="on-boarding-credential-policies">
          <name>On-boarding Credential Policies</name>
          <t>The format of the on-boarding credential policy (On-board) field is as shown in <xref target="figonboard"/>.</t>
          <figure anchor="figonboard">
            <name>OpenRoaming CAG On-board Field</name>
            <artwork><![CDATA[
+------------------------------------------------------------+
| On-board Field  |               Description                |
+------------------------------------------------------------+
|  B7 Octet 5     |                                          |
+------------------------------------------------------------+
|     0           |   A long-lived identity                  |
+------------------------------------------------------------+
|     1           |   A short-lived identity                 |
+------------------------------------------------------------+

]]></artwork>
          </figure>
          <t>The On-board field is used to identify closed access group
policy aspects related to whether the identity/profile is
long-lived, or whether the identity/profile is short-lived.
Short-lived profiles are intended to only be used to provide
connectivity such that the procedure for configuring a
long-lived identity/profile can be performed.</t>
          <t>Sessions authorized with short-lived credentials MUST have a
session-timeout value of less than 300 seconds.</t>
        </section>
      </section>
      <section anchor="prioritizing-policies">
        <name>Prioritizing Policies</name>
        <t>The  definition of OpenRoaming closed access group policies assumes
the configuration of multiple RCOIs in ANP WLAN equipment and IDP end-user devices.</t>
        <t>When a device has multiple Passpoint profiles matching the ANP's RCOI policy,
an OpenRoaming ANP may want to prefer OpenRoaming subscribers use a particular IDP's
profile when attaching to its access network. Such a preference can be because
the OpenRoaming ANP has a preferential relationship with certain OpenRoaming IDPs.</t>
        <t>The OpenRoaming ANP is able to use the Home SP preference functionality defined in
Passpoint <xref target="PASSPOINT"/> to prioritize the use of a particular profile by a Passpoint enabled device.
In such a scenario, the ANP configures the Domain Name list to include the
FQDN(s) associated with the profile(s) to be prioritized.</t>
      </section>
    </section>
    <section anchor="RADIUS">
      <name>OpenRoaming RADIUS Profile</name>
      <t>The OpenRoaming RADIUS profile is based on the WBA WRIX Specification which in turn
are derived from <xref target="RFC3580"/> and <xref target="RFC3579"/>.</t>
      <t>Additionally, OpenRoaming defines the use of the following RADIUS attributes.</t>
      <section anchor="operator-name">
        <name>Operator-Name</name>
        <t>As described in <xref target="wbaid"/>, OpenRoaming uses the Operator-Name (#126) <xref target="RFC5580"/> attribute to signal
the WBAID of the OpenRoaming ANP. All ANPs MUST support the Operator-Name attribute and use it to signal the
WBAID of the OpenRoaming ANP.</t>
      </section>
      <section anchor="chargeable-user-identity">
        <name>Chargeable-User-Identity</name>
        <t>All OpenRoaming ANPs MUST support the Chargeable-User-Identity attribute (#89) <xref target="RFC4372"/> and
indicate such by including a CUI attribute in all RADIUS Access-Request packets.</t>
        <t>When an end-user has explicitly given their permission to share an immutable end-user identifier
with third party ANPs, the CUI returned by the IDP is invariant over subsequent
end-user authentication exchanges between the IDP and the ANP.</t>
      </section>
      <section anchor="location-datalocation-information">
        <name>Location-Data/Location-Information</name>
        <t>All OpenRoaming ANPs MUST support signalling of location information using <xref target="RFC5580"/>.
As a minimum, all OpenRoaming IDPs need to be able to determine the country in which the
OpenRoaming ANP operates. The OpenRoaming legal framework described in <xref target="legal"/> serves as an "out-of-band agreement" as
specified in clause 3.1 of <xref target="RFC5580"/>. Hence, all OpenRoaming ANPs MUST include the Location-Data
attribute (#128) in the RADIUS Access-Request packet, where the location profile is the civic location profile
that includes the country code where the ANP is located <xref target="RFC5580"/>.</t>
        <t>When the OpenRoaming ANP supports the OpenRoaming-Settled RCOI ("BA-A2-D0"),
the RADIUS Access-Request packet MUST include the Location-Data attribute (#128) where the location profile
is the civic location profile containing Civic Address Type information that
is sufficient to identify the financial regulatory regime that defines the
taxable rates associated with consumption of the ANP's service.</t>
        <t>OpenRoaming also defines the optional use the geospatial location profile as specified in
<xref target="RFC5580"/>. ANPs MAY signal coordinate-based geographic location of
the NAS or end-user device.</t>
        <t>The OpenRoaming Privacy Policy <xref target="ORPRIVACY"/> restricts the use of all location information signalled to an IDP for either:</t>
        <ol spacing="normal" type="1"><li>
            <t>Making service authorization decisions based on the location of the ANP's wireless network; or</t>
          </li>
          <li>
            <t>Compliance with applicable law, or law enforcement requests.</t>
          </li>
        </ol>
      </section>
      <section anchor="session-timeout">
        <name>Session-Timeout</name>
        <t>An OpenRoaming ANP receiving a RADIUS Access Accept message including a
Session-Timeout attribute MUST operate according to <xref target="RFC3580"/>.</t>
      </section>
      <section anchor="wba-identity-provider">
        <name>WBA-Identity-Provider</name>
        <t>The Operator-Name attribute allows the WBAID of the ANP to be signalled to the IDP.
In the reverse direction, the IDP MUST use the WBA-Identity-Provider vendor
specific attribute <xref target="WBAVSA"/> to signal the WBAID of the IDP back to the ANP.</t>
      </section>
      <section anchor="wba-offered-service">
        <name>WBA-Offered-Service</name>
        <t>The ANP MAY use the WBA-Offered-Service vendor specific attribute to signal the
highest OpenRoaming service tier supported on its network <xref target="WBAVSA"/>.</t>
      </section>
      <section anchor="wlan-venue-info">
        <name>WLAN-Venue-Info</name>
        <t>The ANP MAY use the WLAN-Venue-Info attribute <xref target="RFC7268"/> to signal the
category of venue hosting the WLAN.</t>
      </section>
      <section anchor="wba-custom-sla">
        <name>WBA-Custom-SLA</name>
        <t>When the ANP uses the WLAN-Venue-Info attribute to signal that the venue
hosting the WLAN is a vehicular installation, the  ANP MAY use the
WBA-Custom-SLA vendor specific attribute <xref target="WBAVSA"/> to indicate
one or more (availability, per-user sustained bandwidth) tuples to the IDP.</t>
      </section>
      <section anchor="additional-attributes-related-to-openroaming-settled">
        <name>Additional attributes related to OpenRoaming settled</name>
        <t>OpenRoaming settled defines the use of additional RADIUS attributes.</t>
        <section anchor="wba-financial-clearing-provider">
          <name>WBA-Financial-Clearing-Provider</name>
          <t>All OpenRoaming ANPs and IDPs that support the OpenRoaming settled service
MUST use the WBA-Financial-Clearing-Provider vendor specific attribute to signal
the  identity of the provider of financial clearing services <xref target="WBAVSA"/>.</t>
        </section>
        <section anchor="wba-data-clearing-provider">
          <name>WBA-Data-Clearing-Provider</name>
          <t>All OpenRoaming ANPs and IDPs that support the OpenRoaming settled service MAY
use the WBA-Data-Clearing-Provider vendor specific attribute to signal
the  identity of the provider of data clearing services <xref target="WBAVSA"/>.</t>
        </section>
        <section anchor="wba-linear-volume-rate">
          <name>WBA-Linear-Volume-Rate</name>
          <t>In cellular roaming, inter-operator tariff information is exchanged in
the roaming agreements between operators. In OpenRoaming, as there is no
direct agreement between ANPs and IDPs, the tariff information is
exchanged in RADIUS messages. All OpenRoaming ANPs that support
the OpenRoaming settled service MUST use the WBA-Linear-Volume-Rate
vendor specific attribute to signal the charging model being offered
by the ANP <xref target="WBAVSA"/>. An IDP that authorizes an offered charging model MUST include
the agreed WBA-Linear-Volume-Rate in the Access-Accept packet.</t>
        </section>
      </section>
    </section>
    <section anchor="Security">
      <name>Security Considerations</name>
      <section anchor="network-selection-and-triggering-authentication">
        <name>Network Selection and Triggering Authentication</name>
        <t>OpenRoaming defines the use of Passpoint with Roaming Consortium Organization Identifiers.
A bit-wise match between an RCOI configured in the Passpoint profile of an end-user's device and the RCOI signalled
by WLAN equipment will trigger a Passpoint defined EAP-based authentication exchange.
The security associated with the Passpoint RCOI
information element is identical to other PLMN Id and Realm information elements, allowing an
unauthorized system to configure the OpenRoaming RCOI with the aim of triggering a Passpoint authentication.
Because such an unauthorized system will not have been issued with a certificate using WBA's PKI, the
unauthorized system is unable to communicate with any other OpenRoaming provider.
In such a scenario, after successive multiple failed authentications, the device's supplicant
SHOULD add the Access Point's BSSID to a deny list
to avoid future triggering of an authentication exchange with the unauthorized system.</t>
      </section>
      <section anchor="dynamic-discovery-of-radsec-peers">
        <name>Dynamic Discovery of RadSec Peers</name>
        <t>OpenRoaming recommends the use of DNSSEC to ensure a dynamically discovered RadSec server
is authoritative for a particular realm or set of realms. Where this is not possible, e.g.,
when using dynamic resolution with the pub.3gppnetwork.org sub-domain, the OpenRoaming
certificate policy permits the configuration of supported realm(s) in the SubjectAltName
of the certificate(s) issued to the IDP.</t>
        <t>An ANP can decide to continue with the RadSec establishment, even if a server cannot prove it is
authoritative for a realm. As the ANP's RadSec client uses a dedicated trust store corresponding to the WBA's private Certificate
Authority, if DNS is hijacked by a third-party non-federation member
who has not been issued a certificate under WBA's PKI, the subsequent TLS establishment will fail.</t>
      </section>
      <section anchor="end-user-traffic">
        <name>End-User Traffic</name>
        <t>The OpenRoaming federation ensures RADIUS traffic is secured between ANP and IDP and ensures Wi-Fi traffic is protected
between the end-user device and the WLAN equipment of the ANP. The ANP is therefore able to observe IP
traffic to/from end-users who have performed a successful authentication with their IDP. The OpenRoaming legal framework (see <xref target="legal"/>) ensures that the ANP has agreed to the OpenRoaming Privacy Policy <xref target="ORPRIVACY"/> to correctly handle the personally identifiable information collected
as part of providing the ANP service.</t>
        <t>The Open-Roaming end-user terms and conditions <xref target="ORTERMS"/> ensure that end-users are aware that the federation does not provide a
secure end-to-end service. The end-user MUST NOT rely on the encryption delivered by OpenRoaming for providing security of services accessed using the ANP's Wi-Fi network.</t>
      </section>
      <section anchor="end-user-location">
        <name>End-User Location</name>
        <t>The OpenRoaming legal framework (see <xref target="legal"/>) ensures that the IDP has agreed to the OpenRoaming Privacy Policy <xref target="ORPRIVACY"/> to correctly handle the location-based personally identifiable information collected
as part of providing the IDP service. Unless the IDP has agreed a separate privacy policy with the End-User, the IDP is only permitted to use location information signalled by an ANP for either:</t>
        <ol spacing="normal" type="1"><li>
            <t>Making service authorization decisions based on the location of the ANP's wireless network; or</t>
          </li>
          <li>
            <t>Compliance with applicable law, or law enforcement requests.</t>
          </li>
        </ol>
      </section>
    </section>
    <section anchor="future-enhancements">
      <name>Future Enhancements</name>
      <t>WBA announced the launch of its OpenRoaming Federation in June 2020. Since then, WBA members have continued to enhance the technical framework to address new market requirements that are reflected in the Closed Access Group policies described in <xref target="CAG"/> and the RADIUS profile described in <xref target="RADIUS"/>. WBA encourages those parties interested in adapting OpenRoaming to address new requirements to join the Alliance and help drive the definition of OpenRoaming forward.</t>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC2865">
          <front>
            <title>Remote Authentication Dial In User Service (RADIUS)</title>
            <author fullname="C. Rigney" initials="C." surname="Rigney"/>
            <author fullname="S. Willens" initials="S." surname="Willens"/>
            <author fullname="A. Rubens" initials="A." surname="Rubens"/>
            <author fullname="W. Simpson" initials="W." surname="Simpson"/>
            <date month="June" year="2000"/>
            <abstract>
              <t>This document describes a protocol for carrying authentication, authorization, and configuration information between a Network Access Server which desires to authenticate its links and a shared Authentication Server. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2865"/>
          <seriesInfo name="DOI" value="10.17487/RFC2865"/>
        </reference>
        <reference anchor="RFC3579">
          <front>
            <title>RADIUS (Remote Authentication Dial In User Service) Support For Extensible Authentication Protocol (EAP)</title>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <author fullname="P. Calhoun" initials="P." surname="Calhoun"/>
            <date month="September" year="2003"/>
            <abstract>
              <t>This document defines Remote Authentication Dial In User Service (RADIUS) support for the Extensible Authentication Protocol (EAP), an authentication framework which supports multiple authentication mechanisms. In the proposed scheme, the Network Access Server (NAS) forwards EAP packets to and from the RADIUS server, encapsulated within EAP-Message attributes. This has the advantage of allowing the NAS to support any EAP authentication method, without the need for method- specific code, which resides on the RADIUS server. While EAP was originally developed for use with PPP, it is now also in use with IEEE 802. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3579"/>
          <seriesInfo name="DOI" value="10.17487/RFC3579"/>
        </reference>
        <reference anchor="RFC3580">
          <front>
            <title>IEEE 802.1X Remote Authentication Dial In User Service (RADIUS) Usage Guidelines</title>
            <author fullname="P. Congdon" initials="P." surname="Congdon"/>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <author fullname="A. Smith" initials="A." surname="Smith"/>
            <author fullname="G. Zorn" initials="G." surname="Zorn"/>
            <author fullname="J. Roese" initials="J." surname="Roese"/>
            <date month="September" year="2003"/>
            <abstract>
              <t>This document provides suggestions on Remote Authentication Dial In User Service (RADIUS) usage by IEEE 802.1X Authenticators. The material in this document is also included within a non-normative Appendix within the IEEE 802.1X specification, and is being presented as an IETF RFC for informational purposes. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3580"/>
          <seriesInfo name="DOI" value="10.17487/RFC3580"/>
        </reference>
        <reference anchor="RFC3748">
          <front>
            <title>Extensible Authentication Protocol (EAP)</title>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <author fullname="L. Blunk" initials="L." surname="Blunk"/>
            <author fullname="J. Vollbrecht" initials="J." surname="Vollbrecht"/>
            <author fullname="J. Carlson" initials="J." surname="Carlson"/>
            <author fullname="H. Levkowetz" initials="H." role="editor" surname="Levkowetz"/>
            <date month="June" year="2004"/>
            <abstract>
              <t>This document defines the Extensible Authentication Protocol (EAP), an authentication framework which supports multiple authentication methods. EAP typically runs directly over data link layers such as Point-to-Point Protocol (PPP) or IEEE 802, without requiring IP. EAP provides its own support for duplicate elimination and retransmission, but is reliant on lower layer ordering guarantees. Fragmentation is not supported within EAP itself; however, individual EAP methods may support this. This document obsoletes RFC 2284. A summary of the changes between this document and RFC 2284 is available in Appendix A. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3748"/>
          <seriesInfo name="DOI" value="10.17487/RFC3748"/>
        </reference>
        <reference anchor="RFC4187">
          <front>
            <title>Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA)</title>
            <author fullname="J. Arkko" initials="J." surname="Arkko"/>
            <author fullname="H. Haverinen" initials="H." surname="Haverinen"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>This document specifies an Extensible Authentication Protocol (EAP) mechanism for authentication and session key distribution that uses the Authentication and Key Agreement (AKA) mechanism. AKA is used in the 3rd generation mobile networks Universal Mobile Telecommunications System (UMTS) and CDMA2000. AKA is based on symmetric keys, and typically runs in a Subscriber Identity Module, which is a UMTS Subscriber Identity Module, USIM, or a (Removable) User Identity Module, (R)UIM, similar to a smart card.</t>
              <t>EAP-AKA includes optional identity privacy support, optional result indications, and an optional fast re-authentication procedure. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4187"/>
          <seriesInfo name="DOI" value="10.17487/RFC4187"/>
        </reference>
        <reference anchor="RFC4372">
          <front>
            <title>Chargeable User Identity</title>
            <author fullname="F. Adrangi" initials="F." surname="Adrangi"/>
            <author fullname="A. Lior" initials="A." surname="Lior"/>
            <author fullname="J. Korhonen" initials="J." surname="Korhonen"/>
            <author fullname="J. Loughney" initials="J." surname="Loughney"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>This document describes a new Remote Authentication Dial-In User Service (RADIUS) attribute, Chargeable-User-Identity. This attribute can be used by a home network to identify a user for the purpose of roaming transactions that occur outside of the home network. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4372"/>
          <seriesInfo name="DOI" value="10.17487/RFC4372"/>
        </reference>
        <reference anchor="RFC5448">
          <front>
            <title>Improved Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA')</title>
            <author fullname="J. Arkko" initials="J." surname="Arkko"/>
            <author fullname="V. Lehtovirta" initials="V." surname="Lehtovirta"/>
            <author fullname="P. Eronen" initials="P." surname="Eronen"/>
            <date month="May" year="2009"/>
            <abstract>
              <t>This specification defines a new EAP method, EAP-AKA', which is a small revision of the EAP-AKA (Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement) method. The change is a new key derivation function that binds the keys derived within the method to the name of the access network. The new key derivation mechanism has been defined in the 3rd Generation Partnership Project (3GPP). This specification allows its use in EAP in an interoperable manner. In addition, EAP-AKA' employs SHA-256 instead of SHA-1.</t>
              <t>This specification also updates RFC 4187, EAP-AKA, to prevent bidding down attacks from EAP-AKA'. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5448"/>
          <seriesInfo name="DOI" value="10.17487/RFC5448"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC5580">
          <front>
            <title>Carrying Location Objects in RADIUS and Diameter</title>
            <author fullname="H. Tschofenig" initials="H." role="editor" surname="Tschofenig"/>
            <author fullname="F. Adrangi" initials="F." surname="Adrangi"/>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="A. Lior" initials="A." surname="Lior"/>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <date month="August" year="2009"/>
            <abstract>
              <t>This document describes procedures for conveying access-network ownership and location information based on civic and geospatial location formats in Remote Authentication Dial-In User Service (RADIUS) and Diameter.</t>
              <t>The distribution of location information is a privacy-sensitive task. Dealing with mechanisms to preserve the user's privacy is important and is addressed in this document. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5580"/>
          <seriesInfo name="DOI" value="10.17487/RFC5580"/>
        </reference>
        <reference anchor="RFC6066">
          <front>
            <title>Transport Layer Security (TLS) Extensions: Extension Definitions</title>
            <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd"/>
            <date month="January" year="2011"/>
            <abstract>
              <t>This document provides specifications for existing TLS extensions. It is a companion document for RFC 5246, "The Transport Layer Security (TLS) Protocol Version 1.2". The extensions specified are server_name, max_fragment_length, client_certificate_url, trusted_ca_keys, truncated_hmac, and status_request. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6066"/>
          <seriesInfo name="DOI" value="10.17487/RFC6066"/>
        </reference>
        <reference anchor="RFC6071">
          <front>
            <title>IP Security (IPsec) and Internet Key Exchange (IKE) Document Roadmap</title>
            <author fullname="S. Frankel" initials="S." surname="Frankel"/>
            <author fullname="S. Krishnan" initials="S." surname="Krishnan"/>
            <date month="February" year="2011"/>
            <abstract>
              <t>Over the past few years, the number of RFCs that define and use IPsec and Internet Key Exchange (IKE) has greatly proliferated. This is complicated by the fact that these RFCs originate from numerous IETF working groups: the original IPsec WG, its various spin-offs, and other WGs that use IPsec and/or IKE to protect their protocols' traffic.</t>
              <t>This document is a snapshot of IPsec- and IKE-related RFCs. It includes a brief description of each RFC, along with background information explaining the motivation and context of IPsec's outgrowths and extensions. It obsoletes RFC 2411, the previous "IP Security Document Roadmap."</t>
              <t>The obsoleted IPsec roadmap (RFC 2411) briefly described the interrelationship of the various classes of base IPsec documents. The major focus of RFC 2411 was to specify the recommended contents of documents specifying additional encryption and authentication algorithms. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6071"/>
          <seriesInfo name="DOI" value="10.17487/RFC6071"/>
        </reference>
        <reference anchor="RFC6614">
          <front>
            <title>Transport Layer Security (TLS) Encryption for RADIUS</title>
            <author fullname="S. Winter" initials="S." surname="Winter"/>
            <author fullname="M. McCauley" initials="M." surname="McCauley"/>
            <author fullname="S. Venaas" initials="S." surname="Venaas"/>
            <author fullname="K. Wierenga" initials="K." surname="Wierenga"/>
            <date month="May" year="2012"/>
            <abstract>
              <t>This document specifies a transport profile for RADIUS using Transport Layer Security (TLS) over TCP as the transport protocol. This enables dynamic trust relationships between RADIUS servers. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6614"/>
          <seriesInfo name="DOI" value="10.17487/RFC6614"/>
        </reference>
        <reference anchor="RFC7268">
          <front>
            <title>RADIUS Attributes for IEEE 802 Networks</title>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <author fullname="J. Malinen" initials="J." surname="Malinen"/>
            <author fullname="P. Congdon" initials="P." surname="Congdon"/>
            <author fullname="J. Salowey" initials="J." surname="Salowey"/>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <date month="July" year="2014"/>
            <abstract>
              <t>RFC 3580 provides guidelines for the use of the Remote Authentication Dial-In User Service (RADIUS) within IEEE 802 local area networks (LANs). This document defines additional attributes for use within IEEE 802 networks and clarifies the usage of the EAP-Key-Name Attribute and the Called-Station-Id Attribute. This document updates RFCs 3580 and 4072.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7268"/>
          <seriesInfo name="DOI" value="10.17487/RFC7268"/>
        </reference>
        <reference anchor="RFC7585">
          <front>
            <title>Dynamic Peer Discovery for RADIUS/TLS and RADIUS/DTLS Based on the Network Access Identifier (NAI)</title>
            <author fullname="S. Winter" initials="S." surname="Winter"/>
            <author fullname="M. McCauley" initials="M." surname="McCauley"/>
            <date month="October" year="2015"/>
            <abstract>
              <t>This document specifies a means to find authoritative RADIUS servers for a given realm. It is used in conjunction with either RADIUS over Transport Layer Security (RADIUS/TLS) or RADIUS over Datagram Transport Layer Security (RADIUS/DTLS).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7585"/>
          <seriesInfo name="DOI" value="10.17487/RFC7585"/>
        </reference>
        <reference anchor="RFC7593">
          <front>
            <title>The eduroam Architecture for Network Roaming</title>
            <author fullname="K. Wierenga" initials="K." surname="Wierenga"/>
            <author fullname="S. Winter" initials="S." surname="Winter"/>
            <author fullname="T. Wolniewicz" initials="T." surname="Wolniewicz"/>
            <date month="September" year="2015"/>
            <abstract>
              <t>This document describes the architecture of the eduroam service for federated (wireless) network access in academia. The combination of IEEE 802.1X, the Extensible Authentication Protocol (EAP), and RADIUS that is used in eduroam provides a secure, scalable, and deployable service for roaming network access. The successful deployment of eduroam over the last decade in the educational sector may serve as an example for other sectors, hence this document. In particular, the initial architectural choices and selection of standards are described, along with the changes that were prompted by operational experience.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7593"/>
          <seriesInfo name="DOI" value="10.17487/RFC7593"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC8952">
          <front>
            <title>Captive Portal Architecture</title>
            <author fullname="K. Larose" initials="K." surname="Larose"/>
            <author fullname="D. Dolson" initials="D." surname="Dolson"/>
            <author fullname="H. Liu" initials="H." surname="Liu"/>
            <date month="November" year="2020"/>
            <abstract>
              <t>This document describes a captive portal architecture. Network provisioning protocols such as DHCP or Router Advertisements (RAs), an optional signaling protocol, and an HTTP API are used to provide the solution.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8952"/>
          <seriesInfo name="DOI" value="10.17487/RFC8952"/>
        </reference>
        <reference anchor="RFC9364">
          <front>
            <title>DNS Security Extensions (DNSSEC)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="February" year="2023"/>
            <abstract>
              <t>This document describes the DNS Security Extensions (commonly called "DNSSEC") that are specified in RFCs 4033, 4034, and 4035, as well as a handful of others. One purpose is to introduce all of the RFCs in one place so that the reader can understand the many aspects of DNSSEC. This document does not update any of those RFCs. A second purpose is to state that using DNSSEC for origin authentication of DNS data is the best current practice. A third purpose is to provide a single reference for other documents that want to refer to DNSSEC.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="237"/>
          <seriesInfo name="RFC" value="9364"/>
          <seriesInfo name="DOI" value="10.17487/RFC9364"/>
        </reference>
        <reference anchor="TS23003" target="https://www.3gpp.org/ftp/Specs/archive/23_series/23.003/23003-i10.zip">
          <front>
            <title>3GPP 23.003: Numbering, addressing and identification v18.1.0</title>
            <author initials="" surname="3GPP">
              <organization/>
            </author>
            <date year="2023" month="March" day="28"/>
          </front>
        </reference>
        <reference anchor="GSMAIR67" target="https://www.gsma.com/newsroom/wp-content/uploads//IR.67-v21.0.pdf">
          <front>
            <title>GSMA IR.67: DNS Guidelines for Service Providers and GRX and IPX Providers</title>
            <author initials="" surname="GSMA">
              <organization/>
            </author>
            <date year="2022" month="November" day="25"/>
          </front>
        </reference>
        <reference anchor="PASSPOINT" target="https://www.wi-fi.org/discover-wi-fi/passpoint">
          <front>
            <title>Wi-Fi Alliance Passpoint</title>
            <author initials="" surname="Wi-Fi Alliance">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="ISO3166" target="https://www.iso.org/standard/72483.html">
          <front>
            <title>Codes for the representation of names of countries and their subdivisions</title>
            <author initials="" surname="ISO 3166-2:2020">
              <organization/>
            </author>
            <date year="2020" month="August"/>
          </front>
        </reference>
        <reference anchor="ISO29115">
          <front>
            <title>Information technology - Security techniques: Entity authentication assurance framework</title>
            <author initials="" surname="ISO/IEC 29115">
              <organization/>
            </author>
            <date year="2013" month="April"/>
          </front>
        </reference>
        <reference anchor="ORPRIVACY" target="https://wballiance.com/openroaming/privacy-policy/">
          <front>
            <title>OpenRoaming End-User Privacy Policy</title>
            <author initials="" surname="Wireless Broadband Alliance">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="ORTERMS" target="https://wballiance.com/openroaming/toc/">
          <front>
            <title>OpenRoaming End User Terms and Conditions</title>
            <author initials="" surname="Wireless Broadband Alliance">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="WBAVSA" target="https://github.com/wireless-broadband-alliance/RADIUS-VSA">
          <front>
            <title>Vendor Specific Attributes</title>
            <author initials="" surname="Wireless Broadband Alliance">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="IEEE80211" target="https://standards.ieee.org/ieee/802.11/5536/">
          <front>
            <title>Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications</title>
            <author initials="" surname="IEEE">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="WBAEIPP" target="https://wballiancec.wpenginepowered.com/wp-content/uploads/2021/02/IMSI_Privacy_Protection_for_Wi-Fi_Technical_Specification_v1.1.0_Revision_FINAL.pdf">
          <front>
            <title>WBA Enhanced IMSI Privacy Protection</title>
            <author initials="" surname="Wireless Broadband Alliance">
              <organization/>
            </author>
            <date year="2022" month="August"/>
          </front>
        </reference>
        <reference anchor="E212" target="https://www.itu.int/itu-t/recommendations/rec.aspx?rec=E.212">
          <front>
            <title>The international identification plan for public networks and subscriptions</title>
            <author initials="" surname="ITU-T Study Group 2">
              <organization/>
            </author>
            <date year="2024" month="June"/>
          </front>
        </reference>
        <reference anchor="WBAPKICP" target="https://wballiance.com/openroaming/pki-repository/">
          <front>
            <title>WBA PKI Certificate Policy v4.0.0</title>
            <author initials="" surname="Wireless Broadband Alliance">
              <organization/>
            </author>
            <date year="2024" month="April"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 1138?>

<section anchor="sig">
      <name>Example OpenRoaming Signalling Flow</name>
      <t>An example signalling flow for OpenRoaming is illustrated in <xref target="figsigflow"/>.</t>
      <ol spacing="normal" type="1"><li>
          <t>In step 1, the WLAN is configured with Passpoint information and includes
configured RCOIs in its beacon.</t>
        </li>
        <li>
          <t>The beacon can only contain 3 RCOIs and so if none of the RCOIs match a
profile provisioned in the device, the device queries for the list of RCOIs supported.</t>
        </li>
        <li>
          <t>If the list includes an RCOI that matches a configured profile in the device, then device
sends an EAPOL Start message to the authenticator.</t>
        </li>
        <li>
          <t>The authenticator in the AP/WLC requests the EAP-Identity of the device.</t>
        </li>
        <li>
          <t>The device responds with its EAP-Identity, which is a user@realm Network Access Identifier (NAI)</t>
        </li>
        <li>
          <t>The NAS in the WLC/AP embeds the NAI in the user-name attribute in a RADIUS Access-Request packet and forwards to the configured RadSec client.</t>
        </li>
        <li>
          <t>The RadSec client recovers the realm from the NAI/user-name attribute and performs a DNS-based dynamic peer discovery.</t>
        </li>
        <li>
          <t>The RadSec client established an mTLS authenticated TLS session with the discovered peer using certificates issued by the WBA PKI.</t>
        </li>
        <li>
          <t>Once TLS is established, the RadSec client forwards the Access-Request to the RadSec server.</t>
        </li>
        <li>
          <t>If the EAP Server is not co-located with the RadSec server, the RadSec server proxies the Access-Request to the EAP-Server.</t>
        </li>
        <li>
          <t>The EAP-Server continues the EAP dialogue with the EAP Supplicant in the device using a Passpoint defined EAP method.</t>
        </li>
        <li>
          <t>Following successful authentication, the EAP-Server responds with an Access-Accept packet containing the EAP-SUCCESS message and the keying material generated through the EAP method to secure the Wi-Fi session.</t>
        </li>
        <li>
          <t>The Access-Accept packet is forwarded back to the RadSec client.</t>
        </li>
        <li>
          <t>The RadSec client forwards the Access-Accept packet to the NAS in the AP/WLC.</t>
        </li>
        <li>
          <t>The AP/WLC recovers the keying material from the Access-Accept packet and forwards the EAP-SUCCESS message to the device.</t>
        </li>
        <li>
          <t>The keying material is used to secure the Wi-Fi interface between the device and AP/WLC.</t>
        </li>
        <li>
          <t>The AP/WLC generates a RADIUS Accounting-Request packet with Acct-Status-Type Start which is forwarded to the RadSec client.</t>
        </li>
        <li>
          <t>The RadSec client forwards the Accounting-Request packet over the TLS tunnel to the RadSec server.</t>
        </li>
        <li>
          <t>The RadSec server can forward the Accounting-Request packet to the EAP-Server.</t>
        </li>
      </ol>
      <ul empty="true">
        <li>
          <t>20-22. After the Wi-Fi session terminates, an Accounting-Request message with Acct-Status-Type Stop is proxied towards the RadSec Server.</t>
        </li>
      </ul>
      <figure anchor="figsigflow">
        <name>Example OpenRoaming Signalling Flow</name>
        <artwork><![CDATA[
+------+    +------+    +------+    +------+    +------+    +------+
|      |    |Wi-Fi |    |RadSec|    |      |    |RadSec|    |  EAP |
|Device|    |AP/WLC|    |Client|    | DNS  |    |Server|    |Server|
+------+    +------+    +------+    +------+    +------+    +------+
   | 1) Beacon |           |           |           |           |
   |<----------|           |           |           |           |
   | 2) ANQP   |           |           |           |           |
   | Query     |           |           |           |           |
   |<--------->|           |           |           |           |
   | 3) EAPOL  |           |           |           |           |
   | Start     |           |           |           |           |
   |---------->|           |           |           |           |
   | 4) EAP-ID |           |           |           |           |
   | Request   |           |           |           |           |
   |<----------|           |           |           |           |
   | 5) EAP-ID | 6) RADIUS |           |           |           |
   | Response  | Access-   | 7) DNS    |           |           |
   |---------->| Request   | Query     |           |           |
   |           |---------->| NAPTR,SRV,|           |           |
   |           |           | A/AAAA    |           |           |
   |           |           | Records   |           |           |
   |           |           |<--------->|           |           |
   |           |           | 8) mTLS   |           |           |
   |           |           |<--------------------->|           |
   |           |           | 9) RadSec |           |           |
   |           |           | Access-Request        |           |
   |           |           |---------------------->|           |
   |           |           |           |           | 10) RADIUS|
   |           |           |           |           | Access-   |
   |           |           |           |           | Request   |
   |           |           |           |           |---------->|
   |           |         11) EAP Dialogue          |           |
   |<--------------------------------------------------------->|
   |           |           |           |           | 12) RADIUS|
   |           |           |           |           | Access-   |
   |           | 14) RADIUS|           |           | Accept    |
   |           | Access-   |           |           | (EAP-     |
   |           | Accept    | 13) RadSec Access-    | SUCCESS)  |
   |           | (EAP-     | Accept (EAP-SUCCESS)  |<----------|
   | 15) EAP-  | SUCCESS)  |<----------------------|           |
   | SUCCESS   |<----------|           |           |           |
   |<----------|           |           |           |           |
 +---------------+         |           |           |           |
 | 16) Secured   |         |           |           |           |
 |  OpenRoaming  17) RADIUS|           |           |           |
 |    Service    Accounting|           |           |           |
 |               Request   |           |           | 19) RADIUS|
 |               (Start)   | 18) RadSec Accounting | Accounting|
 |               |-------->| -Request (Start)      | Request   |
 |               |         |---------------------->| (Start)   |
 |               |         |           |           |---------->|
 +---------------+         |           |           |           |
   |           | 20) RADIUS|           |           |           |
   |           | Accounting|           |           |           |
   |           | Request   |           |           | 22) RADIUS|
   |           | (Stop)    | 21) RadSec Accounting | Accounting|
   |           |---------->| -Request (Stop)       | Request   |
   |           |           |---------------------->| (Stop)    |
   |           |           |           |           |---------->|
+------+    +------+    +------+    +------+    +------+    +------+
|Device|    |Wi-Fi |    |RadSec|    | DNS  |    |RadSec|    |  EAP |
|      |    |AP/WLC|    |Client|    |      |    |Server|    |Server|
+------+    +------+    +------+    +------+    +------+    +------+
]]></artwork>
      </figure>
    </section>
    <section anchor="rcoi">
      <name>Example OpenRoaming RCOI Usage</name>
      <t>This Annex illustrates the use of OpenRoaming RCOIs to enforce different policies
in the OpenRoaming federation, ensuring that when there is a policy mismatch
between the device and access network, that the device will avoid triggering
an authentication exchange that would subsequently have to be rejected because
of policy enforcement decisions.</t>
      <section anchor="openroaming-rcoi-based-policy-for-supporting-qos-tiers">
        <name>OpenRoaming RCOI based policy for supporting QoS tiers</name>
        <t><xref target="figqosrcoi"/> illustrates the use of OpenRoaming RCOIs for
supporting the standard (bronze) and silver QoS tiers across the federation.
The figure shows two different devices:</t>
        <ul spacing="normal">
          <li>
            <t>Device 1 has been provisioned by its IDP to require the basic bronze QoS policy.</t>
          </li>
          <li>
            <t>Device 2 has been provisioned by its IDP to require the silver tier of QoS handling.</t>
          </li>
        </ul>
        <t>The figure also shows illustrates the RCOI configuration of two ANP Access Networks:</t>
        <ul spacing="normal">
          <li>
            <t>ANP#1 is configured to support the silver tier of QoS handling corresponding to the silver RCOI. Because the network requirements associated with the silver tier are a superset of the bronze QoS tier, the ANP also configures the bronze RCOI on its Wi-Fi access network.</t>
          </li>
          <li>
            <t>ANP#2 is only configured to support the standard (bronze) QoS tier and as such only configures the RCOI corresponding to the bronze QoS tier on its Wi-Fi access network.</t>
          </li>
        </ul>
        <t>The figure shows how normal Passpoint RCOI matching rules can be used to ensure that devices only trigger authentication with ANP access networks which support the required QoS tier according to the device's policy.</t>
        <figure anchor="figqosrcoi">
          <name>Use of OpenRoaming RCOIs to realize QoS policies</name>
          <artwork><![CDATA[

+----------------------+      +----------------------+
|OpenRoaming Device #1 |      |OpenRoaming Device #2 |
| Bronze Service Level |      | Silver Service Level |
| +------------------+ |      | +------------------+ |
| |Passpoint Profile | |      | |Passpoint Profile | |
| |   Bronze RCOI    | |      | |   Silver RCOI    | |
| +------------------+ |      | +------------------+ |
|     /|\        /|\   |      |           /|\        |
+------|----------|----+      +------------|---------+
       |          |                        |
       |          |                        |
       |          |                        | RCOI
       |          |                        | Match
       |     +-----------------------------+
  RCOI |     |    |
 Match |     |    |
       |     |    |
       |     |    +------------------------+
       |     |                             | RCOI
       |     |                             | Match
       |     |                             |
      \|/   \|/                           \|/
+----------------------+       +----------------------+
|  OpenRoaming ANP#1   |       |  OpenRoaming ANP#2   |
|      Silver QoS      |       |      Bronze QoS      |
|   +--------------+   |       |   +--------------+   |
|   |     WLAN     |   |       |   |     WLAN     |   |
|   | Bronze RCOI  |   |       |   | Bronze RCOI  |   |
|   | Silver RCOI  |   |       |   |              |   |
|   +--------------+   |       |   +--------------+   |
+----------------------+       +----------------------+

]]></artwork>
        </figure>
      </section>
      <section anchor="openroaming-rcoi-based-policy-for-supporting-identity-type-policies">
        <name>OpenRoaming RCOI based policy for supporting identity type policies</name>
        <t><xref target="figidtypercoi"/> illustrates the use of OpenRoaming RCOIs for supporting different identity type policies across the federation. The figure shows two different devices:</t>
        <ul spacing="normal">
          <li>
            <t>Device#1 has been provisioned by an IDP corresponding to a service provider. It provisions the device's Passpoint profile with the RCOI policy identifying the service provider ID-type policy as well as the "any ID-type"  RCOI policy.</t>
          </li>
          <li>
            <t>Device 2 has been provisioned by a IDP corresponding to a hospitality provider. It provisions the device's Passpoint profile with the RCOI policy identifying the hospitality ID-type policy as well as the "any ID-type" RCOI policy.</t>
          </li>
        </ul>
        <t>The figure also shows the RCOI configuration of three different ANP Access Networks:</t>
        <ul spacing="normal">
          <li>
            <t>ANP#1 only supports access using service provider type-IDs and so has configured the service provider ID-type policy RCOI.</t>
          </li>
          <li>
            <t>ANP#2 supports access from all identity types and so has configured the any ID-type policy RCOI.</t>
          </li>
          <li>
            <t>ANP#3 only supports access using hospitality type IDs and so has configured the hospitality ID-type policy RCOI.</t>
          </li>
        </ul>
        <t>The figure shows how normal Passpoint RCOI matching rules can be used to ensure that devices only trigger authentication with ANP access networks which support the required identity types according to the ANP's policy.</t>
        <figure anchor="figidtypercoi">
          <name>Use of OpenRoaming RCOIs to realize ID-Type policies</name>
          <artwork><![CDATA[


+----------------------------+   +-----------------------------+
|   OpenRoaming Device #1    |   |    OpenRoaming Device #2    |
|  IDP is Service Provider   |   | IDP is Hospitality Provider |
|+------------++------------+|   |+------------++------------+ |
|| Passpoint  || Passpoint  ||   || Passpoint  || Passpoint  | |
||  Profile   ||  Profile   ||   ||  Profile   ||  Profile   | |
||     SP     ||Any ID-Type ||   ||Any ID-Type || Hospitality| |
||ID-Type RCOI||    RCOI    ||   ||   RCOI     ||ID-Type RCOI| |
|+------------++------------+|   |+------------++------------+ |
|      /|\          /|\      |   |       /|\        /|\        |
+-------|------------|-------+   +-------------------|---------+
        |            |                    |          |
        |            |                    |          |
        |            |                    |          |
        |            |                    |          |
        | RCOI       | RCOI               | RCOI     | RCOI
        | Match      | Match              | Match    | Match
        |            |                    |          |
        |            +-----+        +-----+          |
        |                  |        |                |
        |                  |        |                |
        |                  |        |                |
        |                  |        |                |
        |                  |        |                |
       \|/                \|/      \|/              \|/
+------------------+  +------------------+  +------------------+
|OpenRoaming ANP#1 |  |OpenRoaming ANP#2 |  |OpenRoaming ANP#3 |
|  Only accepts    |  |    Accepts all   |  |   Only accepts   |
| Service Provider |  |     ID-Types     |  |    Hospitality   |
|     ID-Types     |  |                  |  |     ID-Types     |
| +--------------+ |  | +--------------+ |  | +--------------+ |
| |     WLAN     | |  | |     WLAN     | |  | |     WLAN     | |
| |  SP ID-Type  | |  | | Any ID-Type  | |  | |  Hospitality | |
| |     RCOI     | |  | |     RCOI     | |  | | ID-Type RCOI | |
| +--------------+ |  | +--------------+ |  | +--------------+ |
+------------------+  +------------------+  +------------------+


]]></artwork>
        </figure>
      </section>
      <section anchor="openroaming-rcoi-based-policy-for-supporting-different-identity-proofing-policies">
        <name>OpenRoaming RCOI based policy for supporting different identity proofing policies</name>
        <t><xref target="figidproofrcoi"/> illustrates the use of OpenRoaming RCOIs for supporting different
identity proofing policies across the federation. The figure shows two different devices:</t>
        <ul spacing="normal">
          <li>
            <t>Device 1 has been provisioned by an IDP that uses enhanced identity proofing controls that meet the enhanced OpenRoaming requirements, equivalent to LoA 3 in <xref target="ISO29115"/>. Because the enhanced identity proofing requirements are a superset of the requirements of the baseline identity proofing policy, the IDP also configures the use of the RCOI with baseline identity proofing.</t>
          </li>
          <li>
            <t>Device 2 has been provisioned by an IDP that uses identity proofing with controls that meet the baseline OpenRoaming requirements.</t>
          </li>
        </ul>
        <t>The figure also shows the RCOI configuration of two ANP Access Networks:</t>
        <ul spacing="normal">
          <li>
            <t>ANP#1 is operated in a geography where regulations require support of enhanced identity proofing.</t>
          </li>
          <li>
            <t>ANP#2 is operated in a geography where regulations permit support of authentications with identities managed using the OpenRoaming baseline identity proofing requirements.</t>
          </li>
        </ul>
        <t>The figure shows how normal Passpoint RCOI matching rules can be used to ensure that devices only trigger authentication with ANP access networks which support the required identity proofing according to the ANP's policy.</t>
        <figure anchor="figidproofrcoi">
          <name>Use of OpenRoaming RCOIs to realize identity proofing policies</name>
          <artwork><![CDATA[

+----------------------------+   +-----------------------------+
|    OpenRoaming Device #1   |   |    OpenRoaming Device #2    |
|     IDP uses enhanced      |   |     IDP uses baseline       |
|     identity proofing      |   |     identity proofing       |
|+------------++------------+|   |       +------------+        |
|| Passpoint  ||  Passpoint ||   |       |  Passpoint |        |
||  Profile   ||   Profile  ||   |       |   Profile  |        |
||Enhanced LoA||Baseline LoA||   |       |Baseline LoA|        |
||    RCOI    ||    RCOI    ||   |       |    RCOI    |        |
|+------------++------------+|   |       +------------+        |
|      /|\          /|\      |   |             /|\             |
+-------|------------|-------+   +--------------|--------------+
        |            |                          |
        |            |                          |
        |            |                          |
        | RCOI       | RCOI                     | RCOI
        | Match      | Match                    | Match
        |            |                          |
        |            |                          |
        |            +--------------------+     +-----+
        |                                 |           |
        |                                 |           |
        |                                 |           |
        |                                 |           |
        |                                 |           |
       \|/                               \|/         \|/
   +------------------------+       +------------------------+
   |   OpenRoaming ANP#1    |       |   OpenRoaming ANP#2    |
   | Operates in a country  |       | Operates in a country  |
   |  where the regulator   |       |  where the regulator   |
   |   requires enhanced    |       |   permits baseline     |
   |   identity proofing    |       |   identity proofing    |
   |    +--------------+    |       |    +--------------+    |
   |    |     WLAN     |    |       |    |     WLAN     |    |
   |    | Enhanced LoA |    |       |    | Baseline LoA |    |
   |    |     RCOI     |    |       |    |     RCOI     |    |
   |    +--------------+    |       |    +--------------+    |
   +------------------------+       +------------------------+


]]></artwork>
        </figure>
      </section>
    </section>
    <section anchor="legal">
      <name>OpenRoaming legal framework</name>
      <section anchor="seamless-experience">
        <name>Seamless experience</name>
        <t>In order for OpenRoaming to avoid the need for end-users to
be presented with and accept legal terms and conditions covering their
use of the Wi-Fi hotspot service, there needs to be a legal framework in place.</t>
      </section>
      <section anchor="openroaming-organization">
        <name>OpenRoaming Organization</name>
        <t>The federation is based on a legal framework that comprises a set of policies,
templated agreements and immutable terms as agreed to by the WBA and its membership.
The framework defines a hierarchy of roles, responsibilities and relationships that
are designed to enable the federation to scale to millions of Wi-Fi access networks.</t>
        <t><xref target="figorg"/> shows the
relationships between WBA, OpenRoaming Brokers, who are members of the WBA that
have agreed terms with WBA to perform the OpenRoaming broker role and the OpenRoaming providers.
OpenRoaming brokers agree terms with OpenRoaming Providers that can act as Access Network
Providers (ANPs) and/or Identity Providers (IDPs). OpenRoaming providers do not have
to be members of the WBA to provide OpenRoaming services. Finally, OpenRoaming IDPs
agree terms with OpenRoaming end-users who then benefit from seamless authentication onto
the Wi-Fi networks deployed by the different OpenRoaming ANPs.</t>
        <figure anchor="figorg">
          <name>Organization of the OpenRoaming Federation</name>
          <artwork><![CDATA[
                            +----------+
                            | Wireless |
                            | Broadband|
                            | Alliance |
                            +----------+
                              /|\  /|\
                               |    |
                          Agrees terms with
                               |    |
          +-----------+        |    |        +-----------+
          |OpenRoaming|<-------+    +------->|OpenRoaming|
          |Broker     |                      |Broker     |
          +-----------+                      +-----------+
             /|\  /|\                           /|\  /|\
              |    |                             |    |
         Agrees terms with                  Agrees terms with
              |    |                             |    |
        +-----+    +-----+                 +-----+    +-----+
        |                |                 |                |
       \|/              \|/               \|/              \|/
+-----------+     +-----------+     +-----------+     +-----------+
|OpenRoaming|     |OpenRoaming|     |OpenRoaming|     |OpenRoaming|
|Access     |     |Identity   |     |Identity   |     |Access     |
|Network    |     |Provider   |     |Provider   |     |Network    |
|Provider   |     |           |     |           |     |Provider   |
+-----------+     +-----------+     +-----------+     +-----------+
                   /|\  /|\            /|\  /|\
                    |    |              |    |
               Agrees terms with   Agrees terms with
                    |    |              |    |
      +-------------+    |              |    +-------------+
      |                  |              |                  |
     \|/                \|/            \|/                \|/
+-----------+     +-----------+     +-----------+      +-----------+
|OpenRoaming|     |OpenRoaming|     |OpenRoaming|      |OpenRoaming|
|End-User   |     |End-User   |     |End-User   |      |End-User   |
+-----------+     +-----------+     +-----------+      +-----------+

]]></artwork>
        </figure>
      </section>
      <section anchor="openroaming-legal-terms">
        <name>OpenRoaming legal terms</name>
        <t>In OpenRoaming there is no direct agreement between individual ANPs and individual
IDPs or between end-users and ANPs. As a consequence, OpenRoaming brokers
agree to use certain federation-specific terms in their agreements with
OpenRoaming providers.</t>
        <t>This arrangement ensures that all ANPs agree to abide by the OpenRoaming
privacy policy <xref target="ORPRIVACY"/> and all end-users agree to abide by the
OpenRoaming end-user Terms and Conditions <xref target="ORTERMS"/>.</t>
      </section>
    </section>
    <section numbered="false" anchor="Changelog">
      <name>Changelog</name>
      <ul spacing="normal">
        <li>
          <t>01 - added details of WBA-Custom-SLA for OpenRoaming ANP networks that signal using
<xref target="RFC7268"/> that they operate on a vehicular platform. Added clarifications regarding use
of direct and indirect names in certificate validation.</t>
        </li>
        <li>
          <t>02 - added details of OpenRoaming protection of end-user privacy, including WRIX recommendations
on use of correlation identifiers in RADIUS Access-Accept packet that may unintentionally weaken
end-user privacy.</t>
        </li>
        <li>
          <t>03 - updated DNSsec reference. Added section on interworking with other federations.</t>
        </li>
        <li>
          <t>04 - updated PKI Policy OID to reflect new certificate chain. Added IDP availability requirements.
Added session-timeout requirements. Added new onboarding capabilities for short lived credentials. Added text concerning OpenRoaming Privacy Policy and restrictions on location usage.</t>
        </li>
      </ul>
    </section>
    <section numbered="false" anchor="Acknowledgements">
      <name>Acknowledgements</name>
      <t>The authors would like to thank all the members of the WBA's OpenRoaming Workgroup
who help define the OpenRoaming specifications.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
