Are the applications working together to implement some service?
If so, then it would be reasonable for the clients to authenticate
themselves
against one of the elements, for example a proxy server that sits on the
"edge"
of the application's domain, and for subsequent nodes to implicitly trust
that
the subscriber has been authenticated.

                -------------
Client   -->   | A    B    C |
                -------------

In the diagram above, node A might be responsible for authenticating the
clients.
Nodes B and C would implicitly trust the client.

According to one model of network security, we might say that nodes A, B,
and C
form a trust domain and that the client joins the trust domain by
authenticating itself
with node A. Of course, this requires that nodes A, B and C to trust each
other. It
also leaves nodes B and C vulnerable if node A gets compromised.

Hope that helps.

-- 
Gary Cote
www.awardsolutions.com
_______________________________________________
Sip-implementors mailing list
[email protected]
https://lists.cs.columbia.edu/cucslists/listinfo/sip-implementors

Reply via email to