From 68d0ed543d4fddef7a47892bb35b9949cf09304d Mon Sep 17 00:00:00 2001 From: Jim Schaad Date: Wed, 4 Nov 2015 15:59:45 +0900 Subject: [PATCH] Remove over aggressive change Accidently got one of my updates into the changes from .md to .xml --- draft-ietf-sacm-architecture.xml | 26 ++++++++++++++------------ 1 file changed, 14 insertions(+), 12 deletions(-) diff --git a/draft-ietf-sacm-architecture.xml b/draft-ietf-sacm-architecture.xml index 2670b0b..2810935 100644 --- a/draft-ietf-sacm-architecture.xml +++ b/draft-ietf-sacm-architecture.xml @@ -265,18 +265,20 @@ aggregated Posture Assessment Information that can be shared. to share or provide Posture Assessment information. -One means by which a Provider shares information, is in response to a direct request from a Consumer. -The response can be either a single response, or a series of responses for a subscription request. -In the event of a subscription, the Provider will occassionally need to update the authorization of the Consumer. - -A Provider may also share information spontaneously without a previous request from a Consumer. -In this case, the Provider obtain a destination and authorization via a broker or a proxy component. - -Both the spontaneous and subscription cases support use cases where asynchronous publication of -a change in a posture state requires that the Provider -provide the change to Consumers (such as Security Information and Event Management (SIEM) system); -similarly, SIEM applications that are providing live information require -such updates to posture information to be provided asynchronously. +One means by which a Provider shares information, is in response to a direct request from a Consumer. + + +A Provider may also share information spontaneously. Use cases such +as the change in a posture state require that a Provider be able to +provide such changes or updates especially to Consumers such as +Security Information and Event Management (SIEM) systems; similarly, +SIEM applications that are providing live information require any +such updates or changes to posture information to be provided +spontaneously. Authorization for the enabling for these unsolicited +messages happens through the Controller at the time that both +Provider and Consumers request authorization for (spontaneous) +messages. + The information provided, may be filtered or truncated to provide a subset of the requested information to honor the request. This