1.2. Goals and Constraints
1.2. Goals and Constraints
The goals and constraints for the User-based Security Model are as follows:
-
The User-based Security Model MUST support authentication and privacy as separate and independent security services.
-
The User-based Security Model MUST be flexible in its use of authentication and privacy algorithms. The model MUST allow for the addition of new authentication and privacy algorithms.
-
The User-based Security Model MUST provide a means to protect against message modification, masquerade, message stream modification, and disclosure threats. Protection against these threats MUST be independently selectable.
-
The User-based Security Model MUST provide a means for verifying that each received message has not been delayed or replayed.
-
The User-based Security Model MUST be extensible to support additional security services.
-
The User-based Security Model MUST provide a means to identify the user on whose behalf a message is generated.
-
The User-based Security Model MUST be usable by applications that generate SNMP messages.
-
The User-based Security Model MUST be implementable at reasonable cost on resource-constrained platforms.