Trusted Network Connect

Open architecture for network access control


title: "Trusted Network Connect" type: doc version: 1 created: 2026-02-28 author: "Wikipedia contributors" status: active scope: public tags: ["computer-network-security", "trusted-computing"] description: "Open architecture for network access control" topic_path: "technology/networking" source: "https://en.wikipedia.org/wiki/Trusted_Network_Connect" license: "CC BY-SA 4.0" wikipedia_page_id: 0 wikipedia_revision_id: 0

::summary Open architecture for network access control ::

Trusted Network Connect (TNC) is an open architecture for network access control, promulgated by the Trusted Network Connect Work Group (TNC-WG) of the Trusted Computing Group (TCG).

History

The TNC architecture was first introduced at the RSA Conference in 2005. TNC was originally a network access control standard with a goal of multi-vendor endpoint policy enforcement.

In 2009 TCG announced expanded specifications which extended the specifications to systems outside of the enterprise network. Additional uses for TNC which have been reported include Industrial Control System (ICS), SCADA security, and physical security.

Specifications

Specifications introduced by the TNC Work Group:

  • TNC Architecture for Interoperability
  • IF-IMC - Integrity Measurement Collector Interface
  • IF-IMV - Integrity Measurement Verifier Interface
  • IF-TNCCS - Trusted Network Connect Client-Server Interface
  • IF-M - Vendor-Specific IMC/IMV Messages Interface
  • IF-T - Network Authorization Transport Interface
  • IF-PEP - Policy Enforcement Point Interface
  • IF-MAP - Metadata Access Point Interface
  • CESP - Clientless Endpoint Support Profile
  • Federated TNC

Adoption

A partial list of vendors who have adopted TNC Standards:

Also, networking by

TNC Customer Adoption

The U.S. Army has planned to use this technology to enhance the security of its computer networks.

The South Carolina Department of Probation, Parole, and Pardon Services has tested a TNC-SCAP integration combination in a pilot program.

References

Sources

References

  1. ""Using Trusted Network Connect for NAC — FedTech Magazine" — FedTech Magazine".
  2. "Wireless Infrastructure Advice, Discussion, Community". Network Computing.
  3. "Archived copy".
  4. "'Trusted Network Connect' Puts Hardware Security Agent in Every PC - - - Informationweek".
  5. Vijayan, Jaikumar. (2005-05-09). "Vendor Group Adds Net Access Specs". Computerworld.
  6. (18 May 2009). "Trusted Computing Group Widens Security Specs Beyond Enterprise Networks".
  7. "Not your Father's Control System | Tofino Industrial Security Solution".
  8. "Securing SCADA and Control Networks".
  9. "Hirsch Demonstrates Industry's First Standards-Based Network / Physical Access Control Enforcement Solution".
  10. "Trusted Computing Group Continues to Extend TNC Specifications | Current Analysis".
  11. "Archived copy".
  12. "Archived copy".
  13. "Archived copy".
  14. link. (2011-07-16)
  15. "Archived copy".
  16. Jackson, William. (2010-09-28). "Speed of cybersecurity rises with combination of Trusted Network Connect and Security Content Automation Protocols".

::callout[type=info title="Wikipedia Source"] This article was imported from Wikipedia and is available under the Creative Commons Attribution-ShareAlike 4.0 License. Content has been adapted to SurfDoc format. Original contributors can be found on the article history page. ::

computer-network-securitytrusted-computing