Skip to main content

1.2. Goals and Constraints

1.2. Goals and Constraints

The goals and constraints for the User-based Security Model are as follows:

  1. The User-based Security Model MUST support authentication and privacy as separate and independent security services.

  2. The User-based Security Model MUST be flexible in its use of authentication and privacy algorithms. The model MUST allow for the addition of new authentication and privacy algorithms.

  3. The User-based Security Model MUST provide a means to protect against message modification, masquerade, message stream modification, and disclosure threats. Protection against these threats MUST be independently selectable.

  4. The User-based Security Model MUST provide a means for verifying that each received message has not been delayed or replayed.

  5. The User-based Security Model MUST be extensible to support additional security services.

  6. The User-based Security Model MUST provide a means to identify the user on whose behalf a message is generated.

  7. The User-based Security Model MUST be usable by applications that generate SNMP messages.

  8. The User-based Security Model MUST be implementable at reasonable cost on resource-constrained platforms.