Use Case E: Guest: No-ID Access

Use Case E: Guest: No-ID Access#

Note

This page is supplementary material for the NIST SP 1800-35 publication.

Scenario E-1: Guest requests public internet access#

For No-ID access, the only deciding factor is the type of device used and any observable compliance state or sent traffic of the device. Authentication/authorization is not a factor (No-ID). Enterprise resource compliance is likewise assumed, as resources would not be visible otherwise.

Pre-Condition: The requestor does not need to authenticate (i.e., guest access). Per configuration, the requestor is authorized with default universal access to the resource (i.e., no authentication or authorization checks are performed). A request to access the enterprise resource is granted and a session is established. The resource is assumed to be in compliance.

Demonstration: Systems can differentiate between device classifications and perform some action based on policy to restrict privileged devices (i.e., enterprise-managed, BYOD) based on endpoint compliance policy.

Purpose and Outcome: This demonstration focuses on device identification and compliance (when applicable).

Table 1 - Scenario E-1 Demonstrations

Demo ID

Location of Subject

Access

Desired Outcome

E-1.1

a

On-Prem

Public resource

Access Successful

E-1.1

b

On-Prem

Public internet

Access Successful

E-1.2

a

Branch

Public resource

Access Successful

E-1.2

b

Branch

Public internet

Access Successful