Motivation When deploying protocols the deployment environment needs to be considered. Allow the protocol to use credentials used in this environment This document analyses the usage of different security protocols (and credentials) with GIST. discusses API considerations when the authenticated identity needs to be passed from the GIST to NSLPs and security policies from the NSLP to GIST. |