<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.3.7) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-ace-coap-pubsub-profile-01" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.30.2 -->
  <front>
    <title abbrev="ACE CoAP Pub-Sub Profile">CoAP Publish-Subscribe Profile for Authentication and Authorization for Constrained Environments (ACE)</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-ace-coap-pubsub-profile-01"/>
    <author initials="F." surname="Palombini" fullname="Francesca Palombini">
      <organization>Ericsson</organization>
      <address>
        <email>francesca.palombini@ericsson.com</email>
      </address>
    </author>
    <author initials="C." surname="Sengul" fullname="Cigdem Sengul">
      <organization>Brunel University</organization>
      <address>
        <email>csengul@acm.org</email>
      </address>
    </author>
    <author initials="M." surname="Tiloca" fullname="Marco Tiloca">
      <organization>RISE AB</organization>
      <address>
        <email>marco.tiloca@ri.se</email>
      </address>
    </author>
    <date year="2025" month="October" day="20"/>
    <area>Security</area>
    <workgroup>ACE Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 76?>

<t>This document defines an application profile of the Authentication and Authorization for Constrained Environments (ACE) framework, to enable secure group communication in the Publish-Subscribe (Pub-Sub) architecture for the Constrained Application Protocol (CoAP) [draft-ietf-core-coap-pubsub], where Publishers and Subscribers communicate through a Broker. This profile relies on protocol-specific transport profiles of ACE to achieve communication security, server authentication, and proof of possession of a key owned by the Client and bound to an OAuth 2.0 access token. This document specifies the provisioning and enforcement of authorization information for Clients to act as Publishers and/or Subscribers, as well as the provisioning of keying material and security parameters that Clients use for protecting their communications end-to-end through the Broker.</t>
      <t>Note to RFC Editor: Please replace "[draft-ietf-core-coap-pubsub]" with the RFC number of that document and delete this paragraph.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Authentication and Authorization for Constrained Environments Working Group mailing list (ace@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/ace/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/ace-wg/pubsub-profile"/>.</t>
    </note>
  </front>
  <middle>
    <?line 81?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>In a publish-subscribe (Pub-Sub) scenario, devices acting as Publishers and/or Subscribers <!--with limited reachability--> communicate via a Broker that enforces store-and-forward messaging between those. This effectively enables a form of group communication, where all the Publishers and Subscribers participating in the same Pub-Sub topic are considered members of the same application group associated with that topic.</t>
      <t>With a focus on the Pub-Sub architecture defined in <xref target="I-D.ietf-core-coap-pubsub"/> for the Constrained Application Protocol (CoAP) <xref target="RFC7252"/>, this document defines an application profile of the Authentication and Authorization for Constrained Environments (ACE) framework <xref target="RFC9200"/>, which enables Pub-Sub communication where a group of Publishers and Subscribers securely communicate through a Broker using CoAP.</t>
      <t>Building on the message formats and processing defined in <xref target="RFC9594"/>, this document specifies the provisioning and enforcement of authorization information for Clients to act as Publishers and/or Subscribers at the Broker, as well as the provisioning of keying material and security parameters that Clients use for protecting end-to-end their communications via the Broker.</t>
      <t>In order to protect the Pub-Sub operations at the Broker as well as the provisioning of keying material and security parameters, this profile relies on protocol-specific transport profiles of ACE (e.g., <xref target="RFC9202"/>, <xref target="RFC9203"/>, or <xref target="I-D.ietf-ace-edhoc-oscore-profile"/>) to achieve communication security, server authentication, and proof of possession of a key owned by the Client and bound to an OAuth 2.0 access token.</t>
      <t>The content of published messages that are circulated by the Broker is protected end-to-end between the corresponding Publisher and the intended Subscribers. To this end, this profile relies on COSE <xref target="RFC9052"/><xref target="RFC9053"/> and on keying material provided to the Publishers and Subscribers participating in the same Pub-Sub topic. In particular, source authentication of published content is achieved by means of the corresponding Publisher signing such content with its own private key.</t>
      <!--While this profile focuses on the Pub-Sub architecture for CoAP, {{mqtt-pubsub}} of this document describes how this profile can be applicable to MQTT {{MQTT-OASIS-Standard-v5}}. Similar adaptations can also extend to further transport protocols and Pub-Sub architectures.-->

<section anchor="terminology">
        <name>Terminology</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

<t>Readers are expected to be familiar with:</t>
        <ul spacing="normal">
          <li>
            <t>The terms and concepts described in the ACE framework for Authentication and Authorization <xref target="RFC9200"/>. The terminology for entities in the considered architecture is defined in OAuth 2.0 <xref target="RFC6749"/>. In particular, this includes Client, Resource Server (RS), and Authorization Server (AS).</t>
          </li>
          <li>
            <t>The Authorization Information Format (AIF) <xref target="RFC9237"/> used to express authorization information.</t>
          </li>
          <li>
            <t>The terms and concept related to the message formats and processing specified in <xref target="RFC9594"/>, for provisioning and renewing keying material in group communication scenarios. These include the abbreviations REQx and OPTx denoting the numbered mandatory-to-address and optional-to-address requirements, respectively.</t>
          </li>
          <li>
            <t>The terms and concepts described in CDDL <xref target="RFC8610"/>, CBOR <xref target="RFC8949"/>, and COSE <xref target="RFC9052"/><xref target="RFC9053"/><xref target="RFC9338"/>.</t>
          </li>
          <li>
            <t>The terms and concepts described in CoAP <xref target="RFC7252"/>. Note that the term "endpoint" is used here following its OAuth definition <xref target="RFC6749"/>, aimed at denoting resources such as <tt>/token</tt> and <tt>/introspect</tt> at the AS, and <tt>/authz-info</tt> at the RS. The CoAP definition, which is "[a]n entity participating in the CoAP protocol" <xref target="RFC7252"/>, is not used in this document.</t>
          </li>
          <li>
            <t>The terms and concepts of Pub-Sub group communication with CoAP, as described in <xref target="I-D.ietf-core-coap-pubsub"/>.</t>
          </li>
        </ul>
        <t>A party interested in participating in group communication as well as already participating as a group member is interchangeably denoted as "Client", "Pub-Sub client", or "node".</t>
        <ul spacing="normal">
          <li>
            <t>Group: a set of nodes that share common keying material and security parameters to protect their communications with one another. That is, the term refers to a "security group".  </t>
            <t>
This is not to be confused with an "application group", which has relevance at the application level and whose members are in this case the Clients acting as Publishers and/or Subscribers for a topic.</t>
          </li>
        </ul>
        <t>Examples throughout this document are expressed in CBOR diagnostic notation as defined in <xref section="8" sectionFormat="of" target="RFC8949"/> and <xref section="G" sectionFormat="of" target="RFC8610"/>. Diagnostic notation comments are often used to provide a textual representation of the parameters' keys and values.</t>
      </section>
    </section>
    <section anchor="overview">
      <name>Application Profile Overview</name>
      <t>This document describes how to use <xref target="RFC9200"/> and <xref target="RFC9594"/> to perform authentication, authorization, and key distribution operations as overviewed in <xref section="2" sectionFormat="of" target="RFC9594"/>, where the considered group is the security group composed of the Pub-Sub clients that exchange end-to-end protected content through the Broker.</t>
      <t>Pub-Sub clients communicate within their application groups, each of which is mapped to a topic. Depending on the application, a topic may consist of one or more sub-topics, which in turn may have their own sub-topics and so on, thus forming a hierarchy. A security group <bcp14>SHOULD</bcp14> be associated with a single application group. However, the same application group <bcp14>MAY</bcp14> be associated with multiple security groups. Further details and considerations on the mapping between the two types of groups are out of the scope of this document.</t>
      <t>This profile considers the architecture shown in <xref target="archi"/>. A Client can act as a Publisher, or a Subscriber, or both, e.g., by publishing to some topics and subscribing to others. However, for the simplicity of presentation, this profile describes Publisher and Subscriber Clients separately.</t>
      <t>Both Publishers and Subscribers act as ACE Clients. The Broker acts as an ACE RS and corresponds to the Dispatcher in <xref target="RFC9594"/>. The Key Distribution Center (KDC) also acts as an ACE RS and builds on what is defined for the KDC in <xref target="RFC9594"/>. From a high-level point of view, the Clients interact with the KDC in order to join security groups, thereby obtaining the group keying material to protect end-to-end and verify the content published in the associated topics.</t>
      <figure anchor="archi">
        <name>Architecture for Pub-Sub with Authorization Server and Key Distribution Center</name>
        <artset>
          <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="320" width="400" viewBox="0 0 400 320" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 8,224 L 8,304" fill="none" stroke="black"/>
              <path d="M 48,160 L 48,216" fill="none" stroke="black"/>
              <path d="M 80,192 L 80,216" fill="none" stroke="black"/>
              <path d="M 112,32 L 112,112" fill="none" stroke="black"/>
              <path d="M 112,224 L 112,304" fill="none" stroke="black"/>
              <path d="M 192,120 L 192,160" fill="none" stroke="black"/>
              <path d="M 240,32 L 240,112" fill="none" stroke="black"/>
              <path d="M 272,32 L 272,112" fill="none" stroke="black"/>
              <path d="M 288,224 L 288,304" fill="none" stroke="black"/>
              <path d="M 336,120 L 336,192" fill="none" stroke="black"/>
              <path d="M 392,32 L 392,112" fill="none" stroke="black"/>
              <path d="M 392,224 L 392,304" fill="none" stroke="black"/>
              <path d="M 112,32 L 240,32" fill="none" stroke="black"/>
              <path d="M 272,32 L 392,32" fill="none" stroke="black"/>
              <path d="M 112,112 L 240,112" fill="none" stroke="black"/>
              <path d="M 272,112 L 392,112" fill="none" stroke="black"/>
              <path d="M 48,160 L 96,160" fill="none" stroke="black"/>
              <path d="M 144,160 L 192,160" fill="none" stroke="black"/>
              <path d="M 80,192 L 224,192" fill="none" stroke="black"/>
              <path d="M 272,192 L 336,192" fill="none" stroke="black"/>
              <path d="M 8,224 L 112,224" fill="none" stroke="black"/>
              <path d="M 288,224 L 392,224" fill="none" stroke="black"/>
              <path d="M 120,240 L 176,240" fill="none" stroke="black"/>
              <path d="M 224,240 L 280,240" fill="none" stroke="black"/>
              <path d="M 120,272 L 176,272" fill="none" stroke="black"/>
              <path d="M 224,272 L 280,272" fill="none" stroke="black"/>
              <path d="M 8,304 L 112,304" fill="none" stroke="black"/>
              <path d="M 288,304 L 392,304" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="344,120 332,114.4 332,125.6" fill="black" transform="rotate(270,336,120)"/>
              <polygon class="arrowhead" points="288,272 276,266.4 276,277.6" fill="black" transform="rotate(0,280,272)"/>
              <polygon class="arrowhead" points="288,240 276,234.4 276,245.6" fill="black" transform="rotate(0,280,240)"/>
              <polygon class="arrowhead" points="200,120 188,114.4 188,125.6" fill="black" transform="rotate(270,192,120)"/>
              <polygon class="arrowhead" points="128,272 116,266.4 116,277.6" fill="black" transform="rotate(180,120,272)"/>
              <polygon class="arrowhead" points="128,240 116,234.4 116,245.6" fill="black" transform="rotate(180,120,240)"/>
              <polygon class="arrowhead" points="88,216 76,210.4 76,221.6" fill="black" transform="rotate(90,80,216)"/>
              <polygon class="arrowhead" points="56,216 44,210.4 44,221.6" fill="black" transform="rotate(90,48,216)"/>
              <g class="text">
                <text x="176" y="52">Authorization</text>
                <text x="328" y="52">Key</text>
                <text x="172" y="68">Server</text>
                <text x="332" y="68">Distribution</text>
                <text x="172" y="84">(AS)</text>
                <text x="332" y="84">Center</text>
                <text x="328" y="100">(KDC)</text>
                <text x="120" y="164">(A)</text>
                <text x="248" y="196">(B)</text>
                <text x="200" y="244">(O)</text>
                <text x="56" y="260">Pub-Sub</text>
                <text x="340" y="260">Broker</text>
                <text x="52" y="276">Client</text>
                <text x="200" y="276">(C)</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art" align="center"><![CDATA[
             +---------------+   +--------------+
             | Authorization |   |     Key      |
             |    Server     |   | Distribution |
             |     (AS)      |   |    Center    |
             |               |   |    (KDC)     |
             +---------------+   +--------------+
                       ^                 ^
                       |                 |
     +------ (A) ------+                 |
     |                                   |
     |   +------------------ (B) --------+
     v   v
+------------+                     +------------+
|            |<------- (O) ------->|            |
|  Pub-Sub   |                     |   Broker   |
|  Client    |<------- (C) ------->|            |
|            |                     |            |
+------------+                     +------------+
]]></artwork>
        </artset>
      </figure>
      <t>Both Publishers and Subscribers <bcp14>MUST</bcp14> use the same protocol for interacting with the Broker and participating in Pub-Sub communications. When using the profile defined in this document, such a protocol <bcp14>MUST</bcp14> be CoAP <xref target="RFC7252"/>, which is used as described in <xref target="I-D.ietf-core-coap-pubsub"/> (REQ22). <!--What is specified in this document can apply to other protocols for Pub-Sub communications such as MQTT {{MQTT-OASIS-Standard-v5}}, or to further transport protocols-->.</t>
      <t>All Publishers and Subscribers <bcp14>MUST</bcp14> use CoAP when communicating with the KDC.</t>
      <t>Furthermore, both Publishers and Subscribers <bcp14>MUST</bcp14> use the same transport profile of ACE (e.g., <xref target="RFC9202"/> for DTLS; or <xref target="RFC9203"/> or <xref target="I-D.ietf-ace-edhoc-oscore-profile"/> for OSCORE) in their interaction with the Broker. In order to reduce the number of libraries that Clients have to support, it is <bcp14>RECOMMENDED</bcp14> that the same transport profile of ACE is used also for the interaction between the Clients and the KDC (REQ24).</t>
      <t>All communications between the involved entities <bcp14>MUST</bcp14> be secured.</t>
      <t>For each Client, the Client and the Broker <bcp14>MUST</bcp14> have a secure communication association, which they establish with the help of the AS and using a transport profile of ACE. This is shown by the interactions A and C in <xref target="archi"/>. During this process, the Client obtains an access token from the AS and uploads it to the Broker, thus providing an evidence of the topics that it is authorised to participate in, and with which permissions.</t>
      <t>For each Client, the Client and the KDC <bcp14>MUST</bcp14> have a secure communication association, which they also establish with the help of the AS and using a transport profile of ACE (REQ24). This is shown by the interactions A and B in <xref target="archi"/>. During this process, the Client obtains an access token from the AS and uploads it to the KDC, thus providing an evidence of the security groups that it can join, as associated with the topics of interest at the Broker. Based on the permissions specified in the access token, the Client can request the KDC to join a security group, after which the Client obtains from the KDC the keying material to use for communicating with the other group members. This builds on the process for joining security groups with ACE, as defined in <xref target="RFC9594"/> and further specified in this document.</t>
      <t>In addition, this profile allows an anonymous Client to perform some of the discovery operations defined in <xref section="2.3" sectionFormat="of" target="I-D.ietf-core-coap-pubsub"/> through the Broker, as shown by the interaction O in <xref target="archi"/>. That is, an anonymous Client can discover:</t>
      <ul spacing="normal">
        <li>
          <t>the Broker itself, by relying on the resource type "core.ps" (see <xref section="2.3.1" sectionFormat="of" target="I-D.ietf-core-coap-pubsub"/>); and</t>
        </li>
        <li>
          <t>topics of interest at the Broker (i.e., the corresponding topic resources hosted at the Broker), by relying on the resource type "core.ps.conf" (see <xref section="2.3.3" sectionFormat="of" target="I-D.ietf-core-coap-pubsub"/>).</t>
        </li>
      </ul>
      <t>However, an anonymous Client is not allowed to access topic resources at the Broker and obtain from those any additional information or metadata about the corresponding topic (e.g., the topic status, the URI of the topic-data resource where to publish or subscribe for that topic, or the URI to the KDC).</t>
      <t>As highlighted in <xref target="associations"/>, each Client maintains two different security associations pertaining to the Pub-Sub group communication. On the one hand, the Client has a pairwise security association with the Broker, which, as an ACE RS, verifies that the Client is authorised to perform data operations (i.e., publish, subscribe, read, delete) on a certain set of topics (Security Association 1). As discussed above, this security association is set up with the help of the AS and using a transport profile of ACE, when the Client obtains the access token to upload to the Broker.</t>
      <t>On the other hand, separately for each topic, all the Publishers and Subscribers for that topic have a common, group security association, through which the published content sent through the Broker is protected end-to-end (Security Association 2). As discussed above, this security association is set up and maintained as the different Clients request the KDC to join the security group, upon which they obtain from the KDC the corresponding group keying material to use for protecting end-to-end and verifying the content of their Pub-Sub group communication.</t>
      <figure anchor="associations">
        <name>Security Associations between Publisher, Broker, and Subscriber</name>
        <artset>
          <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="240" width="544" viewBox="0 0 544 240" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 8,32 L 8,112" fill="none" stroke="black"/>
              <path d="M 40,120 L 40,208" fill="none" stroke="black"/>
              <path d="M 72,120 L 72,160" fill="none" stroke="black"/>
              <path d="M 104,32 L 104,112" fill="none" stroke="black"/>
              <path d="M 216,32 L 216,112" fill="none" stroke="black"/>
              <path d="M 248,120 L 248,160" fill="none" stroke="black"/>
              <path d="M 288,120 L 288,160" fill="none" stroke="black"/>
              <path d="M 320,32 L 320,112" fill="none" stroke="black"/>
              <path d="M 432,32 L 432,112" fill="none" stroke="black"/>
              <path d="M 464,120 L 464,160" fill="none" stroke="black"/>
              <path d="M 504,120 L 504,208" fill="none" stroke="black"/>
              <path d="M 536,32 L 536,112" fill="none" stroke="black"/>
              <path d="M 8,32 L 104,32" fill="none" stroke="black"/>
              <path d="M 216,32 L 320,32" fill="none" stroke="black"/>
              <path d="M 432,32 L 536,32" fill="none" stroke="black"/>
              <path d="M 8,112 L 104,112" fill="none" stroke="black"/>
              <path d="M 216,112 L 320,112" fill="none" stroke="black"/>
              <path d="M 432,112 L 536,112" fill="none" stroke="black"/>
              <path d="M 72,160 L 112,160" fill="none" stroke="black"/>
              <path d="M 200,160 L 248,160" fill="none" stroke="black"/>
              <path d="M 288,160 L 336,160" fill="none" stroke="black"/>
              <path d="M 424,160 L 464,160" fill="none" stroke="black"/>
              <path d="M 40,208 L 224,208" fill="none" stroke="black"/>
              <path d="M 312,208 L 504,208" fill="none" stroke="black"/>
              <g class="text">
                <text x="56" y="68">Publisher</text>
                <text x="268" y="68">Broker</text>
                <text x="484" y="68">Subscriber</text>
                <text x="156" y="164">Security</text>
                <text x="380" y="164">Security</text>
                <text x="152" y="180">Association</text>
                <text x="208" y="180">1</text>
                <text x="376" y="180">Association</text>
                <text x="432" y="180">1</text>
                <text x="268" y="212">Security</text>
                <text x="264" y="228">Association</text>
                <text x="320" y="228">2</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art" align="center"><![CDATA[
+-----------+             +------------+             +------------+
|           |             |            |             |            |
| Publisher |             |   Broker   |             | Subscriber |
|           |             |            |             |            |
|           |             |            |             |            |
+-----------+             +------------+             +------------+
    |   |                     |    |                     |    |
    |   |                     |    |                     |    |
    |   '----- Security ------'    '------ Security -----'    |
    |        Association 1               Association 1        |
    |                                                         |
    '----------------------- Security ------------------------'
                           Association 2
]]></artwork>
        </artset>
      </figure>
      <t>In summary, this profile specifies the following functionalities.</t>
      <ol spacing="normal" type="1"><li>
          <t>A Client obtains the authorization to participate in a Pub-Sub topic at the Broker with certain permissions. This pertains operations defined in <xref target="I-D.ietf-core-coap-pubsub"/> for taking part in Pub-Sub communication with CoAP.</t>
        </li>
        <li>
          <t>A Client obtains the authorization to join a security group with certain permissions. This allows the Client to obtain from the KDC the group keying material for communicating with other group members, i.e., to protect end-to-end and verify the content published at the Broker on topics associated with the security group.</t>
        </li>
        <li>
          <t>A Client obtains from the KDC the authentication credentials of other group members, and provides or updates the KDC with its own authentication credential.</t>
        </li>
        <li>
          <t>A Client leaves the group or is removed from the group by the KDC.</t>
        </li>
        <li>
          <t>The KDC renews and redistributes the group keying material (rekeying), e.g., due to a membership change in the group.</t>
        </li>
      </ol>
      <t><xref target="groupcomm_requirements"/> lists the specifications on this application profile of ACE, based on the requirements defined in <xref section="A" sectionFormat="of" target="RFC9594"/>.</t>
    </section>
    <section anchor="authorisation">
      <name>Getting Authorisation to Join a Pub-Sub security group (A)</name>
      <t><xref target="message-flow"/> provides a high level overview of the message flow for a Client getting authorisation to join a group. Square brackets denote optional steps. The message flow is expanded in the subsequent sections.</t>
      <figure anchor="message-flow">
        <name>Authorisation Flow</name>
        <artset>
          <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="576" width="576" viewBox="0 0 576 576" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 16,48 L 16,560" fill="none" stroke="black"/>
              <path d="M 456,48 L 456,152" fill="none" stroke="black"/>
              <path d="M 456,184 L 456,328" fill="none" stroke="black"/>
              <path d="M 456,360 L 456,392" fill="none" stroke="black"/>
              <path d="M 456,424 L 456,448" fill="none" stroke="black"/>
              <path d="M 456,488 L 456,560" fill="none" stroke="black"/>
              <path d="M 520,48 L 520,392" fill="none" stroke="black"/>
              <path d="M 520,424 L 520,456" fill="none" stroke="black"/>
              <path d="M 520,488 L 520,560" fill="none" stroke="black"/>
              <path d="M 560,48 L 560,560" fill="none" stroke="black"/>
              <path d="M 32,64 L 112,64" fill="none" stroke="black"/>
              <path d="M 352,64 L 440,64" fill="none" stroke="black"/>
              <path d="M 32,96 L 160,96" fill="none" stroke="black"/>
              <path d="M 312,96 L 440,96" fill="none" stroke="black"/>
              <path d="M 32,112 L 168,112" fill="none" stroke="black"/>
              <path d="M 304,112 L 440,112" fill="none" stroke="black"/>
              <path d="M 16,160 L 72,160" fill="none" stroke="black"/>
              <path d="M 416,160 L 512,160" fill="none" stroke="black"/>
              <path d="M 24,176 L 72,176" fill="none" stroke="black"/>
              <path d="M 424,176 L 520,176" fill="none" stroke="black"/>
              <path d="M 16,224 L 80,224" fill="none" stroke="black"/>
              <path d="M 384,224 L 448,224" fill="none" stroke="black"/>
              <path d="M 24,240 L 80,240" fill="none" stroke="black"/>
              <path d="M 384,240 L 448,240" fill="none" stroke="black"/>
              <path d="M 32,288 L 48,288" fill="none" stroke="black"/>
              <path d="M 416,288 L 440,288" fill="none" stroke="black"/>
              <path d="M 16,336 L 88,336" fill="none" stroke="black"/>
              <path d="M 408,336 L 512,336" fill="none" stroke="black"/>
              <path d="M 24,352 L 88,352" fill="none" stroke="black"/>
              <path d="M 416,352 L 520,352" fill="none" stroke="black"/>
              <path d="M 16,400 L 104,400" fill="none" stroke="black"/>
              <path d="M 408,400 L 552,400" fill="none" stroke="black"/>
              <path d="M 24,416 L 104,416" fill="none" stroke="black"/>
              <path d="M 408,416 L 552,416" fill="none" stroke="black"/>
              <path d="M 16,464 L 72,464" fill="none" stroke="black"/>
              <path d="M 480,464 L 552,464" fill="none" stroke="black"/>
              <path d="M 24,480 L 104,480" fill="none" stroke="black"/>
              <path d="M 432,480 L 560,480" fill="none" stroke="black"/>
              <path d="M 16,528 L 152,528" fill="none" stroke="black"/>
              <path d="M 304,528 L 448,528" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="560,464 548,458.4 548,469.6" fill="black" transform="rotate(0,552,464)"/>
              <polygon class="arrowhead" points="560,416 548,410.4 548,421.6" fill="black" transform="rotate(0,552,416)"/>
              <polygon class="arrowhead" points="560,400 548,394.4 548,405.6" fill="black" transform="rotate(0,552,400)"/>
              <polygon class="arrowhead" points="520,336 508,330.4 508,341.6" fill="black" transform="rotate(0,512,336)"/>
              <polygon class="arrowhead" points="520,160 508,154.4 508,165.6" fill="black" transform="rotate(0,512,160)"/>
              <polygon class="arrowhead" points="456,528 444,522.4 444,533.6" fill="black" transform="rotate(0,448,528)"/>
              <polygon class="arrowhead" points="456,240 444,234.4 444,245.6" fill="black" transform="rotate(0,448,240)"/>
              <polygon class="arrowhead" points="456,224 444,218.4 444,229.6" fill="black" transform="rotate(0,448,224)"/>
              <polygon class="arrowhead" points="448,288 436,282.4 436,293.6" fill="black" transform="rotate(0,440,288)"/>
              <polygon class="arrowhead" points="448,96 436,90.4 436,101.6" fill="black" transform="rotate(0,440,96)"/>
              <polygon class="arrowhead" points="448,64 436,58.4 436,69.6" fill="black" transform="rotate(0,440,64)"/>
              <polygon class="arrowhead" points="40,288 28,282.4 28,293.6" fill="black" transform="rotate(180,32,288)"/>
              <polygon class="arrowhead" points="40,112 28,106.4 28,117.6" fill="black" transform="rotate(180,32,112)"/>
              <polygon class="arrowhead" points="40,64 28,58.4 28,69.6" fill="black" transform="rotate(180,32,64)"/>
              <polygon class="arrowhead" points="32,480 20,474.4 20,485.6" fill="black" transform="rotate(180,24,480)"/>
              <polygon class="arrowhead" points="32,416 20,410.4 20,421.6" fill="black" transform="rotate(180,24,416)"/>
              <polygon class="arrowhead" points="32,352 20,346.4 20,357.6" fill="black" transform="rotate(180,24,352)"/>
              <polygon class="arrowhead" points="32,240 20,234.4 20,245.6" fill="black" transform="rotate(180,24,240)"/>
              <polygon class="arrowhead" points="32,176 20,170.4 20,181.6" fill="black" transform="rotate(180,24,176)"/>
              <g class="text">
                <text x="28" y="36">Client</text>
                <text x="460" y="36">Broker</text>
                <text x="524" y="36">AS</text>
                <text x="560" y="36">KDC</text>
                <text x="24" y="68">[</text>
                <text x="160" y="68">Discovery</text>
                <text x="212" y="68">of</text>
                <text x="248" y="68">Topic</text>
                <text x="308" y="68">Resource</text>
                <text x="448" y="68">]</text>
                <text x="24" y="100">[</text>
                <text x="204" y="100">Resource</text>
                <text x="272" y="100">Request</text>
                <text x="448" y="100">]</text>
                <text x="24" y="116">[</text>
                <text x="188" y="116">AS</text>
                <text x="248" y="116">Information</text>
                <text x="448" y="116">]</text>
                <text x="136" y="164">Authorisation</text>
                <text x="224" y="164">Request</text>
                <text x="300" y="164">(Audience:</text>
                <text x="376" y="164">Broker)</text>
                <text x="136" y="180">Authorisation</text>
                <text x="228" y="180">Response</text>
                <text x="308" y="180">(Audience:</text>
                <text x="384" y="180">Broker)</text>
                <text x="116" y="228">Upload</text>
                <text x="156" y="228">of</text>
                <text x="224" y="228">authorisation</text>
                <text x="328" y="228">information</text>
                <text x="144" y="244">Establishment</text>
                <text x="212" y="244">of</text>
                <text x="252" y="244">secure</text>
                <text x="328" y="244">association</text>
                <text x="24" y="292">[</text>
                <text x="96" y="292">Discovery</text>
                <text x="148" y="292">of</text>
                <text x="176" y="292">KDC</text>
                <text x="208" y="292">and</text>
                <text x="244" y="292">name</text>
                <text x="276" y="292">of</text>
                <text x="324" y="292">security</text>
                <text x="384" y="292">group</text>
                <text x="448" y="292">]</text>
                <text x="152" y="340">Authorisation</text>
                <text x="240" y="340">Request</text>
                <text x="316" y="340">(Audience:</text>
                <text x="380" y="340">KDC)</text>
                <text x="152" y="356">Authorisation</text>
                <text x="244" y="356">Response</text>
                <text x="324" y="356">(Audience:</text>
                <text x="388" y="356">KDC)</text>
                <text x="140" y="404">Upload</text>
                <text x="180" y="404">of</text>
                <text x="248" y="404">authorisation</text>
                <text x="352" y="404">information</text>
                <text x="168" y="420">Establishment</text>
                <text x="236" y="420">of</text>
                <text x="276" y="420">secure</text>
                <text x="352" y="420">association</text>
                <text x="112" y="468">Request</text>
                <text x="156" y="468">to</text>
                <text x="188" y="468">join</text>
                <text x="224" y="468">the</text>
                <text x="276" y="468">security</text>
                <text x="336" y="468">group</text>
                <text x="376" y="468">for</text>
                <text x="408" y="468">the</text>
                <text x="448" y="468">topic</text>
                <text x="140" y="484">Keying</text>
                <text x="204" y="484">material</text>
                <text x="256" y="484">for</text>
                <text x="288" y="484">the</text>
                <text x="340" y="484">security</text>
                <text x="400" y="484">group</text>
                <text x="196" y="532">Resource</text>
                <text x="264" y="532">Request</text>
                <text x="176" y="548">(Publication/Subscription</text>
                <text x="292" y="548">to</text>
                <text x="320" y="548">the</text>
                <text x="364" y="548">topic)</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art" align="center"><![CDATA[
Client                                                Broker    AS  KDC
 |                                                      |       |    |
 |[<---------- Discovery of Topic Resource ----------->]|       |    |
 |                                                      |       |    |
 |[----------------- Resource Request ---------------->]|       |    |
 |[<----------------- AS Information ------------------]|       |    |
 |                                                      |       |    |
 |                                                      |       |    |
 +------- Authorisation Request (Audience: Broker) ------------>|    |
 |<------ Authorisation Response (Audience: Broker) ------------+    |
 |                                                      |       |    |
 |                                                      |       |    |
 +-------- Upload of authorisation information -------->|       |    |
 |<------- Establishment of secure association -------->|       |    |
 |                                                      |       |    |
 |                                                      |       |    |
 |[<-- Discovery of KDC and name of security group --->]|       |    |
 |                                                      |       |    |
 |                                                      |       |    |
 +--------- Authorisation Request (Audience: KDC) ------------->|    |
 |<-------- Authorisation Response (Audience: KDC) -------------+    |
 |                                                      |       |    |
 |                                                      |       |    |
 +----------- Upload of authorisation information ------------------>|
 |<---------- Establishment of secure association ------------------>|
 |                                                      |       |    |
 |                                                      |       |    |
 +------- Request to join the security group for the topic --------->|
 |<---------- Keying material for the security group ----------------+
 |                                                      |       |    |
 |                                                      |       |    |
 +----------------- Resource Request ------------------>|       |    |
 |       (Publication/Subscription to the topic)        |       |    |
 |                                                      |       |    |
]]></artwork>
        </artset>
      </figure>
      <t>After a Client uploads to the Broker the authorisation information for participating in a Pub-Sub topic with name TOPICNAME (see <xref target="auth-request"/>), the Client can perform the optional discovery of the KDC and security group name at the Broker, by accessing the topic resource corresponding to the topic in question (see <xref target="kdc-discovery"/>).</t>
      <t>In order to ensure that the Client can seamlessly access the right topic resource at the Broker, it is <bcp14>RECOMMENDED</bcp14> that a Broker implementing this application profile uses the path /ps/TOPICNAME to host the topic resource for the topic with name TOPICNAME.</t>
      <t>Alternatively, the Client might not know the right topic resource to target and thus would attempt to access different ones (e.g., based on the result of an early discovery of topic resources, see <xref target="topic-discovery"/>), until it finds the right one specifying TOPICNAME as value of the 'topic-name' parameter in the resource representation.</t>
      <t>Since <xref target="RFC9200"/> recommends the use of CoAP and CBOR, this document describes the exchanges assuming that CoAP and CBOR are used.</t>
      <t>However, using HTTP instead of CoAP is possible, by leveraging the corresponding parameters and methods. Analogously, JSON <xref target="RFC8259"/> can be used instead of CBOR, by relying on the conversion method specified in Sections <xref target="RFC8949" section="6.1" sectionFormat="bare"/> and <xref target="RFC8949" section="6.2" sectionFormat="bare"/> of <xref target="RFC8949"/>. In case JSON is used, the Content-Format of the message has to be specified accordingly. Exact definitions of these exchanges are out of scope for this document.</t>
      <section anchor="topic-discovery">
        <name>Topic Discovery at the Broker (Optional)</name>
        <t>The discovery of a topic at the Broker can be performed by discovering the corresponding topic resource hosted at the Broker. For example, the Client can send a lookup request to /.well-known/core at the Broker, specifying as lookup criterion the resource type "core.ps.conf" (see <xref section="2.3.3" sectionFormat="of" target="I-D.ietf-core-coap-pubsub"/>).</t>
        <t>Although the links to the topic resources are also specified in the representation of the collection resource at the Broker (see <xref section="2.4" sectionFormat="of" target="I-D.ietf-core-coap-pubsub"/>), the Client is not supposed to access such a resource, as intended for administrative operations that are out of the scope of this document.</t>
      </section>
      <section anchor="AS-discovery">
        <name>AS Discovery at the Broker (Optional)</name>
        <t>Complementary to what is defined in <xref section="5.1" sectionFormat="of" target="RFC9200"/> for AS discovery, the Broker <bcp14>MAY</bcp14> send the address of the AS to the Client in the 'AS' parameter of the AS Request Creation Hints, as a response to an Unauthorised Resource Request (see <xref section="5.2" sectionFormat="of" target="RFC9200"/>). An example using the CBOR diagnostic notation and CoAP is given below.</t>
        <figure anchor="AS-info-ex">
          <name>AS Request Creation Hints Example</name>
          <artwork align="left"><![CDATA[
    4.01 Unauthorized
    Content-Format: 19 (application/ace+cbor)
    Payload:
    {
     / AS / 1 : "coaps://as.example.com/token"
    }
]]></artwork>
        </figure>
      </section>
      <section anchor="kdc-discovery">
        <name>KDC Discovery at the Broker (Optional)</name>
        <t>Once a Client has obtained an access token from the AS and accordingly established a secure association with the Broker, the Client has the permission to access the topic resources at the Broker that pertain to the topics on which the Client is authorised to operate.</t>
        <t>In particular the Client is authorised to retrieve the representation of a topic resource, from which the Client can retrieve information related to the topic in question, as specified in <xref section="2.5" sectionFormat="of" target="I-D.ietf-core-coap-pubsub"/>.</t>
        <t>This profile extends the set of CoAP Pub-Sub Parameters that is possible to specify within the representation of a topic resource, as originally defined in <xref section="3" sectionFormat="of" target="I-D.ietf-core-coap-pubsub"/>. In particular, this profile defines the following two parameters that the Broker can specify in a response from a topic resource (see <xref section="2.5" sectionFormat="of" target="I-D.ietf-core-coap-pubsub"/>). Note that, when these parameters are transported in their respective fields of the message payload, the Content-Format "application/core-pubsub+cbor" defined in <xref target="I-D.ietf-core-coap-pubsub"/> <bcp14>MUST</bcp14> be used.</t>
        <ul spacing="normal">
          <li>
            <t>'kdc_uri', with value the URI of the group-membership resource at the KDC, where Clients can send a request to join the security group associated with the topic in question. The URI is encoded as a CBOR text string. Clients will have to obtain an access token from the AS to upload to the KDC, before starting the process to join the security group at the KDC.</t>
          </li>
          <li>
            <t>'sec_gp', specifying the name of the security group associated with the topic in question, as a stable and invariant identifier. The name of the security group is encoded as a CBOR text string.</t>
          </li>
        </ul>
        <t>Furthermore, the Resource Type (rt=) Link Target Attribute value "core.ps.gm" is registered in <xref target="core_rt"/> (REQ10), and can be used to describe group-membership resources at the KDC, e.g., by using a CoRE link-format document <xref target="RFC6690"/>. As an alternative to the discovery approach defined above and provided by the Broker, applications can use this common resource type to discover links to group-membership resources at the KDC for joining security groups associated with Pub-Sub topics.</t>
      </section>
      <section anchor="auth-request">
        <name>Authorisation Request/Response for the KDC and the Broker</name>
        <t>A Client sends two Authorisation Requests to the AS, targeting two different audiences, i.e., the Broker and the KDC.</t>
        <t>As to the former, the AS handles Authorisation Requests related to a topic for which the Client is allowed to perform topic data operations at the Broker, as corresponding to an application group.</t>
        <t>As to the latter, the AS handles Authorization Requests for security groups that the Client is allowed to join, in order to obtain the group keying material for protecting end-to-end and verifying the content of exchanged messages on the associated Pub-Sub topics.</t>
        <t>This section builds on <xref section="3" sectionFormat="of" target="RFC9594"/> and defines only additions or modifications to that specification.</t>
        <t>Both Authorisation Requests include the following fields (see <xref section="3.1" sectionFormat="of" target="RFC9594"/>):</t>
        <ul spacing="normal">
          <li>
            <t>'scope': Optional. If present, it specifies the following information, depending on the specifically targeted audience.  </t>
            <t>
If the audience is the Broker, the scope specifies the names of the topics that the Client wishes to access, together with the corresponding requested permissions.  </t>
            <t>
If the audience is the KDC, the scope specifies the names of the security groups that the Client wishes to join, together with the corresponding requested permissions.  </t>
            <t>
This parameter is encoded as a CBOR byte string, whose value is the binary encoding of a CBOR array. The format of the encoded scope <bcp14>MUST</bcp14> follow the data model AIF-PUBSUB-GROUPCOMM defined in <xref target="scope"/>.  </t>
            <t>
The textual format specified in <xref section="3.1" sectionFormat="of" target="RFC9594"/> is not used in this application profile (OPT1).</t>
          </li>
          <li>
            <t>'audience': Required identifier corresponding to either the Broker or the KDC.</t>
          </li>
        </ul>
        <t>Other additional parameters can be included if necessary, as defined in <xref target="RFC9200"/>.</t>
        <t>When using this profile, it is expected that a one-to-one mapping is enforced between the application group and the security group (see <xref target="overview"/>). If this is not the case, the correct access policies for both sets of scopes have to be available to the AS.</t>
        <section anchor="scope">
          <name>Format of Scope</name>
          <t>Building on <xref section="3.1" sectionFormat="of" target="RFC9594"/>, this section defines the exact format and encoding of scope used in this profile.</t>
          <t>To this end, this profile uses the Authorization Information Format (AIF) <xref target="RFC9237"/> (REQ1). With reference to the generic AIF model</t>
          <artwork><![CDATA[
      AIF-Generic<Toid, Tperm> = [* [Toid, Tperm]]
]]></artwork>
          <t>the value of the CBOR byte string used as scope encodes the CBOR array [* [Toid, Tperm]], where each [Toid, Tperm] element corresponds to one scope entry.</t>
          <t>Furthermore, this document defines the new AIF data model AIF-PUBSUB-GROUPCOMM that this profile <bcp14>MUST</bcp14> use to format and encode scope entries.</t>
          <t>In particular, the following holds for each scope entry.</t>
          <t>The object identifier ("Toid") is specialized as a CBOR data item specifying the name of the group pertaining to the scope entry.</t>
          <t>The permission set ("Tperm") is specialized as a CBOR unsigned integer with value R, specifying the permissions that the Client wishes to have in the group indicated by "Toid".</t>
          <t>More specifically, the following applies when, as defined in this document, a scope entry includes a set of permissions for user-related operations performed by a pubsub Client.</t>
          <ul spacing="normal">
            <li>
              <t>The object identifier ("Toid") is a CBOR text string, specifying the name of one application group (topic) or of the corresponding security group to which the scope entry pertains.</t>
            </li>
            <li>
              <t>The permission set ("Tperm") is a CBOR unsigned integer, whose value R specifies the operations that the Client wishes to or has been authorised to perform on the resources at the Broker associated with the application group (topic) indicated by "Toid", or on the resources at the KDC associated with the security group indicated by "Toid" (REQ1). The value R is computed as follows.  </t>
              <ul spacing="normal">
                <li>
                  <t>Each operation (i.e., permission detail) in the permission set is converted into the corresponding numeric identifier X taken from the following set.      </t>
                  <ul spacing="normal">
                    <li>
                      <t>Admin (0): This operation is reserved for scope entries that express permissions for Administrators of Pub-Sub groups, which are not specified in this document.</t>
                    </li>
                    <li>
                      <t>AppGroup (1): This operation is indicated as wished/authorised when "Toid" specifies the name of an application group (topic), while it is indicated as not wished/authorised when Toid specifies the name of a security group.</t>
                    </li>
                    <li>
                      <t>Publish (2): This operation concerns the publication of data to the topic in question, performed by means of a PUT request sent by a Publisher Client to the corresponding topic-data resource at the Broker.</t>
                    </li>
                    <li>
                      <t>Read (3): This operation concerns both: i) the subscription at the topic-data resource for the topic in question at the Broker, performed by means of a GET request with the CoAP Observe Option set to 0 and sent by a Subscriber Client; and ii) the simple reading of the latest data published to the topic in question, performed by means of a simple GET request sent to the same topic-data resource.</t>
                    </li>
                    <li>
                      <t>Delete (4): This operation concerns the deletion of the topic-data resource for the topic in question at the Broker, performed by means of a DELETE request sent to that resource.          </t>
                      <t>
If a Client wishes to have authorised only the Delete operation on an application group, then the Client does not need to join the corresponding security group, hence it does not need to request an access token for interacting with the KDC.          </t>
                      <t>
If a Client wishes to have authorised the Delete operation on a security group, then the AS and the KDC ignore the wish for that operation when processing the scope entry in question.</t>
                    </li>
                  </ul>
                </li>
                <li>
                  <t>The set of N numeric identifiers is converted into the single value R, by taking two to the power of each numeric identifier X_1, X_2, ..., X_N, and then computing the inclusive OR of the binary representations of all the power values.</t>
                </li>
              </ul>
              <t>
Since this application profile considers user-related operations, the "Admin" operation is indicated as not wished/authorised. That is, the scope entries <bcp14>MUST</bcp14> have the least significant bit of "Tperm" set to 0.</t>
            </li>
          </ul>
          <t>If the "Toid" of a scope entry in an access token specifies the name of an application group (i.e., the "AppGroup" operation is indicated as authorised), the Client has also the permission to retrieve the configuration of the application group (topic) whose name is indicated by "Toid", by sending a GET or FETCH request to the corresponding topic resource at the Broker.</t>
          <t>The specific interactions between the Client and the Broker are defined in <xref target="I-D.ietf-core-coap-pubsub"/>.</t>
          <t>The following CDDL <xref target="RFC8610"/> notation defines a scope entry that uses the AIF-PUBSUB-GROUPCOMM data model and expresses a set of permissions.</t>
          <figure anchor="scope-aif">
            <name>Pub-Sub scope using the AIF format</name>
            <artwork align="center"><![CDATA[
  AIF-PUBSUB-GROUPCOMM = AIF-Generic<pubsub-group, pubsub-perm>
   pubsub-group = tstr ; name of Pub-Sub topic or of
                       ; the associated security group

   pubsub-perm = uint .bits pubsub-perm-details

   pubsub-perm-details = &(
    Admin: 0,
    AppGroup: 1,
    Publish: 2,
    Read: 3,
    Delete: 4
   )

   scope_entry = [pubsub-group, pubsub-perm]
]]></artwork>
          </figure>
          <t>As per the guidelines in <xref target="RFC9237"/>, <xref target="aif"/> and <xref target="content_formats"/> register the specific instance of "Toid" and "Tperm" as media type parameters and a corresponding Content-Format (REQ2).</t>
        </section>
      </section>
      <section anchor="as-response">
        <name>Authorization response</name>
        <t>The AS responds with an Authorization Response as defined in <xref section="5.8.2" sectionFormat="of" target="RFC9200"/> and <xref section="3.2" sectionFormat="of" target="RFC9594"/>, with the following additions:</t>
        <ul spacing="normal">
          <li>
            <t>In the Authorization Response, the AS <bcp14>MUST</bcp14> include the 'expires_in' parameter.</t>
          </li>
          <li>
            <t>In the Authorization Response, the AS <bcp14>MUST</bcp14> include the 'scope' parameter, when the value included in the access token differs from the one specified by the Client in the Authorization Request.  In such a case, the second element of each scope entry specifies the set of operations that the Client is authorised for that scope entry, encoded as specified in <xref target="auth-request"/>.</t>
          </li>
        </ul>
        <t>Furthermore, the AS <bcp14>MAY</bcp14> use the extended format of scope defined in <xref section="7" sectionFormat="of" target="RFC9594"/> for the 'scope' claim of the access token. In such a case, the AS <bcp14>MUST</bcp14> use the CBOR tag with tag number TAG_NUMBER, associated with the CoAP Content-Format CF_ID for the media type "application/aif+cbor" registered in <xref target="content_formats"/> of this document (REQ28).</t>
        <t>Note to RFC Editor: In the previous paragraph, please replace "TAG_NUMBER" with the CBOR tag number computed as TN(ct) in <xref section="4.3" sectionFormat="of" target="RFC9277"/>, where ct is the ID assigned to the CoAP Content-Format registered in <xref target="content_formats"/> of this document.  Then, please replace "CF_ID" with the ID assigned to that CoAP Content-Format.  Finally, please delete this paragraph.</t>
        <t>This indicates that the binary encoded scope follows the scope semantics defined for this application profile in <xref target="scope"/> of this document.</t>
      </section>
      <section anchor="token-post">
        <name>Token Transfer to the KDC</name>
        <t>The Client transfers its access token to the KDC using one of the methods defined in the <xref section="3.3" sectionFormat="of" target="RFC9594"/>. This typically includes sending a POST request to the /authz-info endpoint. However, if the DTLS transport profile of ACE <xref target="RFC9202"/> is used and the Client uses a symmetric proof-of-possession (PoP) key in the DTLS handshake, the Client <bcp14>MAY</bcp14> provide the access token to the KDC in the "psk_identity" field of the DTLS ClientKeyExchange message when using DTLS 1.2 <xref target="RFC6347"/>, or in the "identity" field of a PskIdentity within the PreSharedKeyExtension of the ClientHello message when using DTLS 1.3 <xref target="RFC9147"/>. In addition to that, the following applies.</t>
        <t>In the Token Transfer Response to the Publishers, i.e., the Clients whose scope of the access token includes the "Publish" permission for at least one scope entry, the KDC <bcp14>MUST</bcp14> include the parameter 'kdcchallenge' in the CBOR map. 'kdcchallenge' is a nonce N_S generated by the KDC. As to the N_S value, it is <bcp14>RECOMMENDED</bcp14> to be at least 8-byte long and it is <bcp14>RECOMMENDED</bcp14> to be a random value. Later when joining the group, the Publisher can use the 'kdcchallenge' nonce as part of proving possession of its private key (see <xref target="RFC9594"/>). If a Publisher provides the access token to the KDC through an /authz-info endpoint, the Client <bcp14>MUST</bcp14> support the parameter 'kdcchallenge' (REQ30).</t>
        <t>If 'sign_info' is included in the Token Transfer Request, the KDC <bcp14>SHOULD</bcp14> include the 'sign_info' parameter in the Token Transfer Response. Note that the joining node may have obtained such information by alternative means, e.g., the 'sign_info' may have been pre-configured (OPT3).</t>
        <t>The following applies for each element 'sign_info_entry'.</t>
        <ul spacing="normal">
          <li>
            <t>'sign_alg' <bcp14>MUST</bcp14> take its value from the "Value" column of one of the recommended algorithms in the "COSE Algorithms" registry <xref target="IANA.cose_algorithms"/> (REQ3).</t>
          </li>
          <li>
            <t>'sign_parameters' is a CBOR array.  Its format and value are the same of the COSE capabilities array for the algorithm indicated in 'sign_alg' under the "Capabilities" column of the "COSE Algorithms" registry <xref target="IANA.cose_algorithms"/> (REQ4).</t>
          </li>
          <li>
            <t>'sign_key_parameters' is a CBOR array.  Its format and value are the same of the COSE capabilities array for the COSE key type of the keys used with the algorithm indicated in 'sign_alg', as specified for that key type in the "Capabilities" column of the "COSE Key Types" registry <xref target="IANA.cose_key-type"/> (REQ5).</t>
          </li>
          <li>
            <t>'cred_fmt' takes value from the "Label" column of the "COSE Header Parameters" registry <xref target="IANA.cose_header-parameters"/> (REQ6). Acceptable values denote a format of authentication credential that <bcp14>MUST</bcp14> explicitly provide the public key as well as the comprehensive set of information related to the public key algorithm, including, e.g., the used elliptic curve (when applicable).  </t>
            <t>
Acceptable formats of authentication credentials include CBOR Web Tokens (CWTs) and CWT Claims Sets (CCSs) <xref target="RFC8392"/>, X.509 certificates <xref target="RFC7925"/>, and C509 certificates <xref target="I-D.ietf-cose-cbor-encoded-cert"/>. Future formats would be acceptable to use as long as they comply with the criteria defined above.</t>
          </li>
        </ul>
        <t>This application profile does not define additional parameters to be used in the exchange of Token Transfer Request and Response (OPT2).</t>
      </section>
    </section>
    <section anchor="kdc-interface">
      <name>Client Group Communication Interface at the KDC</name>
      <t>In order to enable secure group communication for the Pub-Sub Clients, the KDC provides the resources listed in <xref target="tab-kdc-resources"/>.</t>
      <t>The entry of each resource specifies the CoAP methods by means of which it is admitted to access that resource, for nodes with different roles in the group or as non members. Except for accessing the /ace-group resource with the FETCH method and the /ace-group/GROUPNAME resource with the POST method, all other operations are admitted only to current members of the security group with name GROUPNAME (REQ11).</t>
      <t>Each resource is marked as <bcp14>REQUIRED</bcp14> or <bcp14>OPTIONAL</bcp14> to be hosted at the KDC (REQ9).</t>
      <table align="center" anchor="tab-kdc-resources">
        <name>Resources at the KDC</name>
        <thead>
          <tr>
            <th align="left">KDC resource</th>
            <th align="left">Description</th>
            <th align="left">Operations</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">/ace-group</td>
            <td align="left">
              <bcp14>REQUIRED</bcp14>. Contains a set of group names, each corresponding to one of the specified group identifiers.</td>
            <td align="left">FETCH (All Clients)</td>
          </tr>
          <tr>
            <td align="left">/ace-group/GROUPNAME</td>
            <td align="left">
              <bcp14>REQUIRED</bcp14>. Contains symmetric group keying material associated with GROUPNAME.</td>
            <td align="left">GET, POST (All Clients)</td>
          </tr>
          <tr>
            <td align="left">/ace-group/GROUPNAME/creds</td>
            <td align="left">
              <bcp14>REQUIRED</bcp14>. Contains the authentication credentials of all the Publishers of the group with name GROUPNAME.</td>
            <td align="left">GET, FETCH (All Clients)</td>
          </tr>
          <tr>
            <td align="left">/ace-group/GROUPNAME/num</td>
            <td align="left">
              <bcp14>REQUIRED</bcp14>. Contains the current version number for the symmetric group keying material of the group with name GROUPNAME.</td>
            <td align="left">GET (All Clients)</td>
          </tr>
          <tr>
            <td align="left">/ace-group/GROUPNAME/nodes/NODENAME</td>
            <td align="left">
              <bcp14>REQUIRED</bcp14>. Contains the group keying material for that group member NODENAME in GROUPNAME.</td>
            <td align="left">GET, DELETE (All Clients). POST (Publishers).</td>
          </tr>
          <tr>
            <td align="left">/ace-group/GROUPNAME/nodes/NODENAME/cred</td>
            <td align="left">
              <bcp14>REQUIRED</bcp14>. Authentication credential for NODENAME in the group GROUPNAME.</td>
            <td align="left">POST (Publishers)</td>
          </tr>
          <tr>
            <td align="left">/ace-group/GROUPNAME/kdc-cred</td>
            <td align="left">
              <bcp14>REQUIRED</bcp14> if a group re-keying mechanism is used. Contains the authentication credential of the KDC for the group with name GROUPNAME.</td>
            <td align="left">GET (All Clients)</td>
          </tr>
          <tr>
            <td align="left">/ace-group/GROUPNAME/policies</td>
            <td align="left">
              <bcp14>OPTIONAL</bcp14>. Contains the group policies of the group with name GROUPNAME.</td>
            <td align="left">GET (All Clients)</td>
          </tr>
        </tbody>
      </table>
      <t>The use of these resources follows what is defined in <xref target="RFC9594"/>, and only additions or modifications to that specification are defined in this document. With respect to <xref target="RFC9594"/>, this document does not define new operations for Clients interacting with the KDC (REQ12).</t>
      <t>Consistent with what is defined in <xref section="4.1.2" sectionFormat="of" target="RFC9594"/>, some error responses from the KDC can convey error-specific information according to the problem-details format specified in <xref target="RFC9290"/>. This application profile does not define additional identifiers of error types as values of the 'error-id' field within the Custom Problem Detail entry 'ace-groupcomm-error' (OPT5).</t>
      <section anchor="join">
        <name>Joining a Security Group</name>
        <t>This section describes the interactions between a Client and the KDC to join a security group. Source authentication of a message sent within the group is ensured by means of a digital signature embedded in the message. Subscribers must be able to retrieve Publishers' authentication credentials from a trusted repository, to verify source authentication of received messages. Hence, on joining a security group, a Publisher is expected to provide its own authentication credential to the KDC.</t>
        <t>On a successful join, the Clients receive from the KDC the symmetric COSE Key <xref target="RFC9052"/> that is used as the shared group key to protect the payload of a published topic data.</t>
        <t>The message exchange between the joining node and the KDC follows what is defined in <xref section="4.3.1.1" sectionFormat="of" target="RFC9594"/>, and only additions or modifications to that specification are defined in this document.</t>
        <figure anchor="join-flow">
          <name>Join Flow</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="144" width="320" viewBox="0 0 320 144" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 32,48 L 32,112" fill="none" stroke="black"/>
                <path d="M 304,48 L 304,112" fill="none" stroke="black"/>
                <path d="M 32,64 L 72,64" fill="none" stroke="black"/>
                <path d="M 248,64 L 296,64" fill="none" stroke="black"/>
                <path d="M 40,96 L 72,96" fill="none" stroke="black"/>
                <path d="M 256,96 L 304,96" fill="none" stroke="black"/>
                <polygon class="arrowhead" points="304,64 292,58.4 292,69.6" fill="black" transform="rotate(0,296,64)"/>
                <polygon class="arrowhead" points="48,96 36,90.4 36,101.6" fill="black" transform="rotate(180,40,96)"/>
                <g class="text">
                  <text x="28" y="36">Client</text>
                  <text x="304" y="36">KDC</text>
                  <text x="100" y="68">Join</text>
                  <text x="152" y="68">Request</text>
                  <text x="212" y="68">(CoAP)</text>
                  <text x="100" y="100">Join</text>
                  <text x="156" y="100">Response</text>
                  <text x="220" y="100">(CoAP)</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
   Client                              KDC
      |                                 |
      +----- Join Request (CoAP) ------>|
      |                                 |
      |<---- Join Response (CoAP) ------+
      |                                 |
]]></artwork>
          </artset>
        </figure>
        <section anchor="join-request">
          <name>Join Request</name>
          <t>After establishing a secure communication association with the KDC, the Client sends a Join Request to the KDC as described in <xref section="4.3" sectionFormat="of" target="RFC9594"/>. More specifically, the Client sends a POST request to the /ace-group/GROUPNAME endpoint, with Content-Format "application/ace-groupcomm+cbor". The payload contains the following information formatted as a CBOR map, which <bcp14>MUST</bcp14> be encoded as defined in <xref section="4.3.1" sectionFormat="of" target="RFC9594"/>:</t>
          <ul spacing="normal">
            <li>
              <t>'scope': It <bcp14>MUST</bcp14> be present and its value <bcp14>MUST</bcp14> indicate the group that the Client is attempting to join, i.e., the group name, and the permissions that the Client wishes to have in the group. This value corresponds to one scope entry, as defined in <xref target="scope"/>.</t>
            </li>
            <li>
              <t>'get_creds': It <bcp14>MAY</bcp14> be present if the Client wishes to join as a Subscriber and wants to retrieve the public keys of all the Publishers upon joining. Otherwise, this parameter <bcp14>MUST NOT</bcp14> be present. If the parameter is present, the parameter <bcp14>MUST</bcp14> encode the CBOR simple value <tt>null</tt> (0xf6). Note that the parameter 'role_filter' is not necessary, as the KDC returns the authentication credentials of Publishers by default.</t>
            </li>
            <li>
              <t>'client_cred': The use of this parameter is detailed in <xref target="client_cred"/>.</t>
            </li>
            <li>
              <t>'cnonce': It specifies a dedicated nonce N_C generated by the Client. As to the N_C value, it is <bcp14>RECOMMENDED</bcp14> to be at least 8-byte long and it is <bcp14>RECOMMENDED</bcp14> to be a random value. Join Requests include a new 'cnonce' at each join attempt.</t>
            </li>
            <li>
              <t>'client_cred_verify': The use of this parameter is detailed in <xref target="pop"/>.</t>
            </li>
          </ul>
          <t>As a Publisher Client has its own authentication credential to use in a group, it <bcp14>MUST</bcp14> support the 'client_cred', 'cnonce', and 'client_cred_verify' parameters (REQ30).</t>
          <t>For this application profile, the 'creds_repo' parameter is not relevant, since the KDC always acts as repository of the Publishers' authentication credentials. Consequently, no encoding is defined for this parameter (OPT6).</t>
          <t>This application profile does not define the functionalities that are implemented at the resource possibly hosted by the Client at the URI indicated in the 'control_uri' parameter (OPT7), if included in the Join Request.</t>
          <section anchor="client_cred">
            <name>Client Credential in 'client_cred'</name>
            <t>One of the following cases can occur when a new Client attempts to join a security group.</t>
            <ul spacing="normal">
              <li>
                <t>The joining node is not a Publisher, i.e., it is not going to send data to the application group.  In this case, the joining node is not required to provide its own authentication credential to the KDC. In case the joining node still provides an authentication credential in the 'client_cred' parameter of the Join Request (see <xref target="join-request"/>), the KDC silently ignores that parameter, as well as the related parameter 'client_cred_verify'.</t>
              </li>
              <li>
                <t>The joining node wishes to join as a Publisher and the KDC has not previously acquired an authentication credential of the joining node. Then, the joining node <bcp14>MUST</bcp14> provide a compatible authentication credential in the 'client_cred' parameter of the Join Request (see <xref target="join-request"/>).</t>
              </li>
              <li>
                <t>The joining node wishes to join as a Publisher and the KDC already acquired the authentication credential of the joining node, either during a past group joining process or when establishing a secure communication association using asymmetric proof-of-possession keys.  </t>
                <t>
If the joining node's proof-of-possession key is compatible with the signature algorithm used in the security group and with possible associated parameters, then the corresponding authentication credential can be used in the group. In this case, the joining node <bcp14>MAY</bcp14> choose not to provide again its authentication credential to the KDC in order to limit the size of the Join Request.</t>
              </li>
            </ul>
            <t>The joining node <bcp14>MUST</bcp14> provide the KDC with its own authentication credential again, if it has previously provided the KDC with multiple authentication credentials intended for different security groups.</t>
            <t>If the joining node provides its authentication credential, the KDC performs the consistency checks above and, in case of success, considers it as the authentication credential associated with the joining node in the group.</t>
          </section>
          <section anchor="pop">
            <name>Proof of Possession through 'client_cred_verify'</name>
            <t>The 'client_cred_verify' parameter contains the proof-of-possession evidence and is computed as defined below (REQ14).</t>
            <t>The Publisher signs the scope, concatenated with N_S and further concatenated with N_C, by using the private key corresponding to the public key that is specified in the 'client_cred' parameter.</t>
            <t>The N_S may be either of the following:</t>
            <ul spacing="normal">
              <li>
                <t>The nonce received from the KDC in the 'kdcchallenge' parameter of the 2.01 (Created) response to the Token Transfer Request (see <xref target="token-post"/>).</t>
              </li>
              <li>
                <t>If the provisioning of the access token to the KDC has relied on the DTLS profile of ACE <xref target="RFC9202"/> and the access token was specified in the "psk_identity" field of the ClientKeyExchange message when using DTLS 1.2 <xref target="RFC6347"/>, then N_S is an exporter value computed as defined in <xref section="4" sectionFormat="of" target="RFC5705"/> (REQ15).  </t>
                <t>
Specifically, N_S is exported from the DTLS session between the joining node and the KDC, using an empty context value (i.e., a context value of zero-length), 32 as length value in bytes, and the exporter label "EXPORTER-ACE-Sign-Challenge-coap-pubsub-app" defined in <xref target="tls_exporter"/> of this document.  </t>
                <t>
The same as above holds if TLS 1.2 <xref target="RFC5246"/> was used instead of DTLS 1.2, as per <xref target="RFC9430"/>.</t>
              </li>
              <li>
                <t>If the provisioning of the access token to the KDC has relied on the DTLS profile of ACE <xref target="RFC9202"/> and the access token was specified in the "identity" field of a PskIdentity within the PreSharedKeyExtension of the ClientHello message when using DTLS 1.3 <xref target="RFC9147"/>, then N_S is an exporter value computed as defined in <xref section="7.5" sectionFormat="of" target="RFC8446"/> (REQ15).  </t>
                <t>
Specifically, N_S is exported from the DTLS session between the joining node and the KDC, using an empty 'context_value' (i.e., a 'context_value' of zero length), 32 as 'key_length' in bytes, and the exporter label "EXPORTER-ACE-Sign-Challenge-coap-pubsub-app" defined in <xref target="tls_exporter"/> of this document.  </t>
                <t>
The same as above holds if TLS 1.3 <xref target="RFC8446"/> was used instead of DTLS 1.3, as per <xref target="RFC9430"/>.</t>
              </li>
              <li>
                <t>If the Join Request is a retry in response to an error response from the KDC, which included a new 'kdcchallenge' parameter, then N_S <bcp14>MUST</bcp14> be the new value from this parameter.</t>
              </li>
            </ul>
            <t>It is up to applications to define how N_S is computed in further alternative settings.</t>
          </section>
        </section>
        <section anchor="join-response">
          <name>Join Response</name>
          <t>Upon receiving the Join Request, the KDC processes it as defined in <xref section="4.3.1" sectionFormat="of" target="RFC9594"/> and returns a success or error response.</t>
          <t>If the 'client_cred' parameter is present, the KDC verifies the signature in the 'client_cred_verify' parameter. As PoP input, the KDC uses the value of the 'scope' parameter from the Join Request as a CBOR byte string, concatenated with N_S encoded as a CBOR byte string, concatenated with N_C encoded as a CBOR byte string.</t>
          <t>As public key of the joining node, the KDC uses either the one included in the authentication credential retrieved from the 'client_cred' parameter of the Join Request, or the one from the already stored authentication credential from previous interactions with the joining node. The KDC verifies the signature used as PoP evidence by means of the public key of the joining node, according to the signature algorithm used in the group and possible corresponding parameters.</t>
          <t>In case of any Join Request error, the KDC and the joining node follow the procedure defined in <xref target="join-error"/>.</t>
          <t>In case of success, the KDC responds with a Join Response, whose payload is formatted as a CBOR map and <bcp14>MUST</bcp14> contain the following fields as per <xref section="4.3.1" sectionFormat="of" target="RFC9594"/>:</t>
          <ul spacing="normal">
            <li>
              <t>'gkty': this field specifies the key type "Group_PubSub_Keying_Material" (REQ18) registered in <xref target="iana-ace-groupcomm-key"/> for the 'key' parameter.</t>
            </li>
            <li>
              <t>'key': this field specifies the keying material to use for secure communication in the group (REQ17). This field has as value a CBOR map that includes the following parameters.  </t>
              <ul spacing="normal">
                <li>
                  <t>'group_key': this parameter is identified by the CBOR unsigned integer 0 used as map key. Its value is a COSE_Key object as defined in <xref target="RFC9052"/> and conveying the group key to use in the security group.      </t>
                  <t>
The COSE_Key object <bcp14>MUST</bcp14> contain the following parameters:      </t>
                  <ul spacing="normal">
                    <li>
                      <t>'kty', with value 4 (Symmetric).</t>
                    </li>
                    <li>
                      <t>'alg', with value the identifier of the AEAD algorithm used in the security group. The value is taken from the "Value" column of the "COSE Algorithms" registry <xref target="IANA.cose_algorithms"/>.</t>
                    </li>
                    <li>
                      <t>'Base IV', with value the Base Initialization Vector (Base IV) to use in the security group with this group key.</t>
                    </li>
                    <li>
                      <t>'k', with value the symmetric encryption key to use as group key.</t>
                    </li>
                    <li>
                      <t>'kid', with value the identifier of the COSE_Key object, hence of the group key.          </t>
                      <t>
This value is used as Group Identifier (Gid) of the security group, as long as the present key is used as group key in the security group. Consistent with the CBOR type of the 'kid' parameter, the Gid of the security group is encoded as a CBOR byte string (REQ13).</t>
                    </li>
                  </ul>
                </li>
                <li>
                  <t>'group_SenderId': this parameter is identified by the CBOR unsigned integer 1 used as map key. Its value is the Client's Sender ID encoded as a CBOR byte string. This parameter <bcp14>MUST</bcp14> be included if the Client is joining the security group as a Publisher and <bcp14>MUST NOT</bcp14> be included otherwise. A Publisher Client <bcp14>MUST</bcp14> support the 'group_SenderId' parameter (REQ29).      </t>
                  <t>
The Sender ID <bcp14>MUST</bcp14> be unique within the security group. The KDC <bcp14>MUST</bcp14> only assign an available Sender ID that has not been used in the security group since the last time when the current Gid value was assigned to the group (i.e., since the latest group rekeying, see <xref target="rekeying"/>). The KDC <bcp14>MUST NOT</bcp14> assign a Sender ID to the joining node if the node is not joining the group as a Publisher.      </t>
                  <t>
The Sender ID can be short in length. Its maximum length in bytes is the length in bytes of the AEAD nonce for the AEAD algorithm, minus 6. This means that, when using AES-CCM-16-64-128 as AEAD algorithm in the security group, the maximum length of Sender IDs is 7 bytes.</t>
                </li>
                <li>
                  <t>'cred_fmt': this parameter is identified by the CBOR unsigned integer 2 used as map key. Its value specifies the format of authentication credentials used in the group and is taken from the "Label" column of the "COSE Header Parameters" registry <xref target="IANA.cose_header-parameters"/>.      </t>
                  <t>
At the time of writing this specification, acceptable formats of authentication credentials are CBOR Web Tokens (CWTs) and CWT Claims Sets (CCSs) <xref target="RFC8392"/>, X.509 certificates <xref target="RFC7925"/>, and C509 certificates <xref target="I-D.ietf-cose-cbor-encoded-cert"/>. Further formats may be available in the future and would be acceptable to use as long as they comply with the criteria defined above (REQ6).</t>
                </li>
                <li>
                  <t>'sign_alg': this parameter is identified by the CBOR unsigned integer 3 used as map key. Its value specifies the Signature Algorithm used to sign messages in the group and is taken from the "Value" column of the "COSE Algorithms" registry <xref target="IANA.cose_algorithms"/>.</t>
                </li>
                <li>
                  <t>'sign_params': this parameter is identified by the CBOR unsigned integer 4 used as map key. Its value specifies the parameters of the Signature Algorithm and is encoded as a CBOR array including the following two elements:      </t>
                  <ul spacing="normal">
                    <li>
                      <t>'sign_alg_capab' is a CBOR array, with the same format and value of the COSE capabilities array for the Signature Algorithm indicated in 'sign_alg', as specified for that algorithm in the "Capabilities" column of the "COSE Algorithms" registry <xref target="IANA.cose_algorithms"/>.</t>
                    </li>
                    <li>
                      <t>'sign_key_type_capab' is a CBOR array, with the same format and value of the COSE capabilities array for the COSE key type of the keys used with the Signature Algorithm indicated in 'sign_alg', as specified for that key type in the "Capabilities" column of the "COSE Key Types" registry <xref target="IANA.cose_key-type"/>.</t>
                    </li>
                  </ul>
                </li>
              </ul>
            </li>
            <li>
              <t>'num', specifying the version number of the keying material specified in the 'key' field. The initial value of the version number <bcp14>MUST</bcp14> be set to 0 upon creating the group (REQ16).</t>
            </li>
            <li>
              <t>'exi', which <bcp14>MUST</bcp14> be present.</t>
            </li>
            <li>
              <t>'ace_groupcomm_profile', which <bcp14>MUST</bcp14> be present and has value "coap_group_pubsub_app" (PROFILE_TBD), which is registered in <xref target="iana-profile"/> (REQ19).</t>
            </li>
            <li>
              <t>'creds', which <bcp14>MUST</bcp14> be present if the 'get_creds' parameter was present in the Join Request and <bcp14>MUST NOT</bcp14> be present otherwise. It specifies the authentication credentials of all the Publishers in the security group.</t>
            </li>
            <li>
              <t>'peer_roles', which <bcp14>MAY</bcp14> be omitted even if 'creds' is present, since: i) each authentication credential conveyed in the 'creds' parameter is associated with a Client authorised to be Publisher in the group; and ii) it is irrelevant whether such a Client is also authorised to be Subscriber in the group. If 'creds' is not present, 'peer_roles' <bcp14>MUST NOT</bcp14> be present.</t>
            </li>
            <li>
              <t>'peer_identifiers', which <bcp14>MUST</bcp14> be present if 'creds' is also present and <bcp14>MUST NOT</bcp14> be present otherwise. The identifiers are the Publisher Sender IDs, whose corresponding authentication credentials are specified in the 'creds' parameter (REQ25).</t>
            </li>
            <li>
              <t>'kdc_cred', which <bcp14>MUST</bcp14> be present if group re-keying is used. It is encoded as a CBOR byte string, with value the original binary representation of the KDC's authentication credential (REQ8).</t>
            </li>
            <li>
              <t>'kdc_nonce', which <bcp14>MUST</bcp14> be present if 'kdc_cred' is present. It is encoded as a CBOR byte string, with value a dedicated nonce N_KDC generated by the KDC. As to the N_KDC value, it is <bcp14>RECOMMENDED</bcp14> to be at least 8-byte long and it is <bcp14>RECOMMENDED</bcp14> to be a random value.</t>
            </li>
            <li>
              <t>'kdc_cred_verify', which <bcp14>MUST</bcp14> be present if 'kdc_cred' is present. It is encoded as a CBOR byte string. The KDC <bcp14>MUST</bcp14> compute the specified PoP evidence as a signature by using the signature algorithm used in the group, as well as its own private key associated with the authentication credential specified in the 'kdc_cred' parameter (REQ21).</t>
            </li>
            <li>
              <t>'group_rekeying', which <bcp14>MAY</bcp14> be omitted if the KDC uses the "Point-to-Point" group rekeying scheme registered in <xref section="11.13" sectionFormat="of" target="RFC9594"/> as the default rekeying scheme in the group (OPT9). In any other case, the 'group_rekeying' parameter <bcp14>MUST</bcp14> be included.</t>
            </li>
          </ul>
          <t>The 'group_policies' parameter is not expected to be included in the Join Response (REQ20). This application profile does not define the functionalities that are possibly implemented at the resource hosted by the Client at the URI indicated in the 'control_group_uri' parameter (OPT10), if included in the Join Response.</t>
          <t>After sending a successful Join Response, the KDC adds the Client to the list of current members of the security group, if that Client is not already a group member. Also, the Client is assigned a name NODENAME and a sub-resource /ace-group/GROUPNAME/nodes/NODENAME at the KDC. Furthermore, the KDC associates NODENAME with the Client's access token and with the secure communication association that the KDC has with the Client. If the Client is a Publisher, its authentication credential is also associated with the tuple containing NODENAME, GROUPNAME, the current Gid, the newly assigned Publisher's Sender ID, and the Client's access token. The KDC <bcp14>MUST</bcp14> keep this association updated over time.</t>
          <t>Note that, as long as the secure communication association between the Client and the KDC persists, the same Client re-joining the group is recognized by the KDC by virtue of such a secure communication association. As a consequence, the re-joining Client keeps the same NODENAME and the associated subresource /ace-group/GROUPNAME/nodes/NODENAME. Also, if the Client is a Publisher, it receives a new Sender ID according to the same criteria defined above.</t>
          <t>If the application requires backward security, the KDC <bcp14>MUST</bcp14> generate updated security parameters and group keying material, and provide it to the current group members upon the new node's joining (see <xref target="rekeying"/>). In such a case, the joining node is not able to access secure communication in the Pub-Sub group prior to its joining.</t>
          <t>Upon receiving the Join Response, the joining node retrieves the KDC's authentication credential from the 'kdc_cred' parameter (if present). The joining node <bcp14>MUST</bcp14> verify the signature used as PoP evidence, which is specified by the 'kdc_cred_verify' parameter of the Join Response (REQ21).</t>
        </section>
        <section anchor="join-error">
          <name>Join Error Handling</name>
          <t>The KDC <bcp14>MUST</bcp14> reply with a 4.00 (Bad Request) error response (OPT4) to the Join Request in the following cases:</t>
          <ul spacing="normal">
            <li>
              <t>The 'client_cred' parameter is present in the Join Request and its value is not an eligible authentication credential (e.g., it is not of the format accepted in the group) (OPT8).</t>
            </li>
            <li>
              <t>The 'client_cred' parameter is present, but the 'cnonce' and 'client_cred_verify' parameters are not present.</t>
            </li>
            <li>
              <t>The 'client_cred' parameter is not present while the joining node is not requesting to join the group exclusively as a Subscriber, and any of the following conditions holds:  </t>
              <ul spacing="normal">
                <li>
                  <t>The KDC does not store an eligible authentication credential for the joining node (e.g., of the format accepted in the group).</t>
                </li>
                <li>
                  <t>The KDC stores multiple eligible authentication credentials for the joining node (e.g., of the format accepted in the group).</t>
                </li>
              </ul>
            </li>
            <li>
              <t>The 'scope' parameter is not present in the Join Request, or it is present and specifies any set of permissions not included in the list defined in <xref target="scope"/>.</t>
            </li>
          </ul>
          <t>A 4.00 (Bad Request) error response from the KDC to the joining node <bcp14>MAY</bcp14> have content format "application/ace-groupcomm+cbor" and contain a CBOR map as payload.</t>
          <t>The CBOR map <bcp14>MAY</bcp14> include the 'kdcchallenge' parameter. If present, this parameter is a CBOR byte string, with value a newly generated 'kdcchallenge' value that the Client can use when preparing a new Join Request. In such a case, the KDC <bcp14>MUST</bcp14> store the newly generated value as the 'kdcchallenge' value associated with the joining node, which replaces the currently stored value (if any).</t>
          <t>Upon receiving the Join Response, if 'kdc_cred' is present but the Client cannot verify the PoP evidence, the Client <bcp14>MUST</bcp14> stop processing the Join Response and <bcp14>MAY</bcp14> send a new Join Request to the KDC.</t>
          <t>The KDC <bcp14>MUST</bcp14> return a 5.03 (Service Unavailable) error response to a Client that sends a Join Request to join the security group as Publisher, in case there are currently no Sender IDs available to assign. The response <bcp14>MUST</bcp14> have Content-Format set to "application/concise-problem-details+cbor" and is formatted as defined in <xref section="4.1.2" sectionFormat="of" target="RFC9594"/>. Within the Custom Problem Detail entry 'ace-groupcomm-error', the value of the 'error-id' field <bcp14>MUST</bcp14> be set to 4 ("No available individual keying material").</t>
        </section>
      </section>
      <section anchor="other-group-operations-through-the-kdc">
        <name>Other Group Operations through the KDC</name>
        <section anchor="query">
          <name>Obtaining Latest Information on the Group, Group Keying Material, and Sender ID</name>
          <t>A Client can access the following resources at the KDC, in order to retrieve latest information about the group or the group keying material.</t>
          <ul spacing="normal">
            <li>
              <t>'/ace-group': All Clients can send a FETCH request to retrieve a set of group names associated with their group identifiers specified in the request payload. Each element of the CBOR array 'gid' is a CBOR byte string (REQ13), which encodes the Gid of the group (see <xref target="join-response"/>) for which the group name and the URI to the group-membership resource are provided in the returned response.</t>
            </li>
            <li>
              <t>'/ace-group/GROUPNAME':  All group member Clients can send a GET request to retrieve the symmetric group keying material of the group with the name GROUPNAME. The value of the GROUPNAME URI path and the group name in the access token scope ('gname') <bcp14>MUST</bcp14> coincide (REQ7).  </t>
              <t>
The KDC processes the Key Distribution Request according to <xref section="4.3.2" sectionFormat="of" target="RFC9594"/>. The Key Distribution Response is formatted as defined in <xref section="4.3.2" sectionFormat="of" target="RFC9594"/>, with the following additions.  </t>
              <ul spacing="normal">
                <li>
                  <t>The 'key' field is formatted as defined in <xref target="join-response"/> of this document, with the difference that it does not include the 'group_SenderId' parameter.</t>
                </li>
                <li>
                  <t>The 'exi' field <bcp14>MUST</bcp14> be present.</t>
                </li>
                <li>
                  <t>The 'ace_groupcomm_profile' field <bcp14>MUST</bcp14> be present and has value "coap_group_pubsub_app" (PROFILE_TBD).</t>
                </li>
              </ul>
              <t>
Upon receiving the Key Distribution Response, the requesting group member retrieves the updated security parameters and group keying material. If they differ from the currently stored ones, then the group member uses the received one as group keying material to protect/unprotect published topic data thereafter.  </t>
              <t>
This application profile does not specify policies that instruct group members to retain messages and for how long, if those messages are unsuccessfully decrypted (OPT11).</t>
            </li>
            <li>
              <t>'/ace-group/GROUPNAME/creds': The KDC acts as a repository of authentication credentials for the Publishers that are member of the security group with name GROUPNAME. The members of the group that are Subscribers can send GET/FETCH requests to this resource in order to retrieve the authentication credentials of all or a subset of the group members that are Publishers. The KDC silently ignores the Sender IDs included in the 'get_creds' parameter of the request that are not associated with any current Publisher group member (REQ26).  </t>
              <t>
The response from the KDC <bcp14>MAY</bcp14> omit the parameter 'peer_roles', since: i) each authentication credential conveyed in the 'creds' parameter is associated with a Client authorised to be Publisher in the group; and ii) it is irrelevant whether such a Client is also authorised to be Subscriber in the group. If 'creds' is not present, 'peer_roles' <bcp14>MUST NOT</bcp14> be present.</t>
            </li>
            <li>
              <t>'/ace-group/GROUPNAME/num': All group member Clients can send a GET request to this resource in order to retrieve the current version number for the symmetric group keying material of the group with name GROUPNAME.</t>
            </li>
            <li>
              <t>'/ace-group/GROUPNAME/kdc-cred': All group member Clients can send a GET request to this resource in order to retrieve the current authentication credential of the KDC.</t>
            </li>
            <li>
              <t>'/ace-group/GROUPNAME/nodes/NODENAME': A group member can send a Key Distribution Request to the KDC by sending a GET request to this resource to retrieve the latest group keying material as well as its Sender ID that it has in the group (if Publisher).  </t>
              <t>
The KDC processes the Key Distribution Request according to <xref section="4.8.1" sectionFormat="of" target="RFC9594"/>. The Key Distribution Response is formatted as defined in <xref section="4.8.1" sectionFormat="of" target="RFC9594"/>, with the following additions.  </t>
              <ul spacing="normal">
                <li>
                  <t>The 'key' field is formatted as defined in <xref target="join-response"/> of this document. If the requesting group member is not a Publisher Client, then the 'key' field does not include the 'group_SenderId' parameter.</t>
                </li>
                <li>
                  <t>The 'exi' field <bcp14>MUST</bcp14> be present.</t>
                </li>
              </ul>
              <t>
Upon receiving the Key Distribution Response, the group member retrieves the updated security parameters, group keying material, and Sender ID (if the 'key' field includes the 'group_SenderId' parameter). If they differ from the currently stored ones, then the group member uses the received one as group keying material to protect/unprotect published topic data thereafter.  </t>
              <t>
This application profile does not specify policies that instruct group members to retain messages and for how long, if those messages are unsuccessfully decrypted (OPT11).</t>
            </li>
          </ul>
        </section>
        <section anchor="sec-key-renewal-request">
          <name>Requesting a New Sender ID</name>
          <t>A Publisher group member with node name NODENAME may at some point exhaust its Sender Sequence Numbers used for protecting its published topic data (see <xref target="oscon"/>).</t>
          <t>When this happens, the Publisher <bcp14>MUST</bcp14> send a Key Renewal Request message to the KDC, as per <xref section="4.8.2.1" sectionFormat="of" target="RFC9594"/>. That is, it sends a CoAP POST request to the endpoint /ace-group/GROUPNAME/nodes/NODENAME at the KDC.</t>
          <t>Upon receiving the Key Renewal Request, the KDC processes it as defined in <xref section="4.8.2" sectionFormat="of" target="RFC9594"/>, with the addition that the KDC takes one of the following actions.</t>
          <ul spacing="normal">
            <li>
              <t>The KDC rekeys the group. That is, the KDC generates new group keying material for that group (see <xref target="rekeying"/>) and replies to the Publisher with a group rekeying message as defined in <xref target="rekeying"/>, providing the new group keying material. Then, the KDC rekeys the rest of the group, as discussed in <xref target="rekeying"/>.  </t>
              <t>
The KDC <bcp14>SHOULD</bcp14> perform a group rekeying only if already scheduled to occur shortly, e.g., according to an application-specific rekeying period or scheduling, or as a reaction to a recent change in the group membership. In any other case, the KDC <bcp14>SHOULD NOT</bcp14> rekey the OSCORE group when receiving a Key Renewal Request (OPT12).</t>
            </li>
            <li>
              <t>The KDC determines and assigns a new Sender ID for the Publisher (REQ27), and it replies with a Key Renewal Response formatted as defined in <xref section="4.8.2" sectionFormat="of" target="RFC9594"/>. The CBOR Map in the response payload includes only the parameter 'group_SenderId' registered in <xref section="16.3" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm-oscore"/>, which specifies the new Sender ID of the Publisher encoded as a CBOR byte string (REQ27).  </t>
              <t>
The KDC <bcp14>MUST</bcp14> assign a new Sender ID that has not been used in the group since the latest time when the current Gid value was assigned to the group (i.e., since the latest group rekeying, see <xref target="rekeying"/>).  </t>
              <t>
The KDC <bcp14>MUST</bcp14> return a 5.03 (Service Unavailable) error response in case there are currently no Sender IDs available to assign in the group. The response <bcp14>MUST</bcp14> have Content-Format set to "application/concise-problem-details+cbor" and is formatted as defined in <xref section="4.1.2" sectionFormat="of" target="RFC9594"/>. Within the Custom Problem Detail entry 'ace-groupcomm-error', the value of the 'error-id' field <bcp14>MUST</bcp14> be set to 4 ("No available individual keying material").</t>
            </li>
          </ul>
        </section>
        <section anchor="updating-authentication-credentials">
          <name>Updating Authentication Credentials</name>
          <t>A Publisher group member with node name NODENAME can contact the KDC to upload a new authentication credential to use in the security group with name GROUPNAME, and replace the currently stored one.</t>
          <t>To this end, the Publisher sends a CoAP POST request to its associated sub-resource /ace-group/GROUPNAME/nodes/NODENAME/cred at the KDC (see <xref section="4.9.1" sectionFormat="of" target="RFC9594"/>).</t>
          <t>Following a successful processing of the request, the KDC replaces the stored authentication credential of this Client for the group GROUPNAME with the one specified in the request.</t>
          <t>This application profile does not specify a method for the group member to provide other group members with the identifier of its new authentication credential (OPT13).</t>
        </section>
        <section anchor="sec-group-leaving">
          <name>Leaving a Group</name>
          <t>A group member with node name NODENAME can actively request to leave the security group with name GROUPNAME.</t>
          <t>To this end, the Client sends a CoAP DELETE request to the associated sub-resource /ace-group/GROUPNAME/nodes/NODENAME at the KDC (see <xref section="4.8.3" sectionFormat="of" target="RFC9594"/>).</t>
          <t>The KDC can also remove a group member due to any of the reasons described in <xref section="5" sectionFormat="of" target="RFC9594"/>.</t>
        </section>
      </section>
    </section>
    <section anchor="rekeying">
      <name>Group Rekeying Process</name>
      <t>Rekeying a group consists in the KDC generating and distributing a new symmetric key, which is used as group key from then on to protect the publication of topic data with COSE (see <xref target="oscon"/>).</t>
      <t>The KDC <bcp14>MUST</bcp14> trigger a group rekeying as described in <xref section="6" sectionFormat="of" target="RFC9594"/>, upon a change in the group membership or due to the current group keying material approaching its expiration time. In addition, the KDC <bcp14>MAY</bcp14> perform regularly scheduled group rekeying executions.</t>
      <t>Upon generating the new group key and before starting its distribution:</t>
      <ul spacing="normal">
        <li>
          <t>The KDC <bcp14>MUST</bcp14> increment the version number of the group keying material.</t>
        </li>
        <li>
          <t>The KDC <bcp14>MUST</bcp14> generate a new Group Identifier (Gid) for the group. This is used as the identifier of the new group key, when providing it to the current group members through the group rekeying and to Clients (re-)joining the security group thereafter (see <xref target="join-response"/>).  </t>
          <t>
That is, the value of the new Gid is specified by the 'kid' parameter of the COSE_Key Object that is used to encode the new group key.</t>
        </li>
      </ul>
      <t>When rekeying the group, the KDC <bcp14>MUST</bcp14> preserve the current value of the Sender ID of each member in that group.</t>
      <t>The default rekeying scheme is "Point-to-Point" (see <xref section="6.1" sectionFormat="of" target="RFC9594"/>), according to which the KDC individually targets each node to rekey, using the pairwise secure communication association with that node.</t>
      <t>In particular, a group rekeying message <bcp14>MUST</bcp14> have Content-Format set to "application/ace-groupcomm+cbor" and have the same format used for the Join Response message defined in <xref target="join-response"/>, with the following differences:</t>
      <ul spacing="normal">
        <li>
          <t>Within the 'key' field, only the parameter 'group_key' is present.</t>
        </li>
        <li>
          <t>The fields 'kdc_cred' ,'kdc_nonce', 'kdc_cred_verify', and 'group_rekeying' are not present.</t>
        </li>
        <li>
          <t>The fields 'creds' and 'peer_identifiers' <bcp14>SHOULD</bcp14> be present, if the group rekeying is performed due to one or multiple Clients joining the group as Publishers. Following the same semantics used in the Join Response message, the two parameters specify the authentication credentials and Sender IDs of such Clients. Like in the Join Response message, the 'peer_roles' parameter <bcp14>MAY</bcp14> be omitted.</t>
        </li>
      </ul>
      <t>This application profile does not define additional information to include in rekeying messages for the "Point-to-Point" group rekeying scheme (OPT14).</t>
    </section>
    <section anchor="protected_communication">
      <name>Pub-Sub Protected Communication</name>
      <t>In the diagram shown in <xref target="pubsub-3"/>, (D) corresponds to the publication on a topic at the Broker, by using a CoAP PUT request. The Publisher protects the published topic data end-to-end for the Subscribers by using COSE (<xref target="RFC9052"/><xref target="RFC9053"/><xref target="RFC9338"/>), as detailed in <xref target="oscon"/>.</t>
      <t>In the same diagram, (E) corresponds to the subscription of a Subscriber to the same topic, by means of a CoAP GET request with the Observe option set to 0 (register) <xref target="RFC7641"/>, as per <xref target="I-D.ietf-core-coap-pubsub"/>. Finally, (F) corresponds to the Observe notification response from the Broker to the Subscriber, where the published topic data is conveyed as originally protected end-to-end with COSE by the Publisher.</t>
      <figure anchor="pubsub-3">
        <name>Secure Pub-Sub Communication between Publisher and Subscriber</name>
        <artset>
          <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="176" width="520" viewBox="0 0 520 176" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 8,32 L 8,160" fill="none" stroke="black"/>
              <path d="M 104,32 L 104,160" fill="none" stroke="black"/>
              <path d="M 216,32 L 216,160" fill="none" stroke="black"/>
              <path d="M 288,32 L 288,160" fill="none" stroke="black"/>
              <path d="M 408,32 L 408,160" fill="none" stroke="black"/>
              <path d="M 512,32 L 512,160" fill="none" stroke="black"/>
              <path d="M 8,32 L 104,32" fill="none" stroke="black"/>
              <path d="M 216,32 L 288,32" fill="none" stroke="black"/>
              <path d="M 408,32 L 512,32" fill="none" stroke="black"/>
              <path d="M 120,64 L 136,64" fill="none" stroke="black"/>
              <path d="M 184,64 L 200,64" fill="none" stroke="black"/>
              <path d="M 304,96 L 328,96" fill="none" stroke="black"/>
              <path d="M 376,96 L 392,96" fill="none" stroke="black"/>
              <path d="M 304,128 L 328,128" fill="none" stroke="black"/>
              <path d="M 376,128 L 392,128" fill="none" stroke="black"/>
              <path d="M 8,160 L 104,160" fill="none" stroke="black"/>
              <path d="M 216,160 L 288,160" fill="none" stroke="black"/>
              <path d="M 408,160 L 512,160" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="400,128 388,122.4 388,133.6" fill="black" transform="rotate(0,392,128)"/>
              <polygon class="arrowhead" points="312,96 300,90.4 300,101.6" fill="black" transform="rotate(180,304,96)"/>
              <polygon class="arrowhead" points="208,64 196,58.4 196,69.6" fill="black" transform="rotate(0,200,64)"/>
              <g class="text">
                <text x="160" y="68">(D)</text>
                <text x="56" y="100">Publisher</text>
                <text x="252" y="100">Broker</text>
                <text x="352" y="100">(E)</text>
                <text x="460" y="100">Subscriber</text>
                <text x="352" y="132">(F)</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art" align="center"><![CDATA[
+-----------+             +--------+              +------------+
|           |             |        |              |            |
|           | --- (D) --> |        |              |            |
|           |             |        |              |            |
| Publisher |             | Broker | <--- (E) --- | Subscriber |
|           |             |        |              |            |
|           |             |        | ---- (F) --> |            |
|           |             |        |              |            |
+-----------+             +--------+              +------------+
]]></artwork>
        </artset>
      </figure>
      <t><xref target="flow"/> provides a more detailed example of such a secure Pub-Sub communication. All the messages exchanged between a Client and the Broker are protected with the secure communication association between that Client and the Broker. In addition, COSE is used to protect end-to-end the published topic data, which is conveyed in a PUT request from the Publisher to the topic-data resource at the Broker and in a 2.05 (Content) response from that resource to a Subscriber.</t>
      <t>The example also shows a delete operation, where the Publisher deletes the topic-data resource by sending a CoAP DELETE request to the URI of that resource. In case of success, the Broker replies with a 2.02 (Deleted) response. Consequently, the Broker also unsubscribes all the Clients subscribed to that topic-data resource, by removing them from the list of observers and sending them a final 4.04 (Not Found) error response as per <xref section="3.2" sectionFormat="of" target="RFC7641"/>.</t>
      <figure anchor="flow">
        <name>Example of Secure Pub-Sub Communication using CoAP</name>
        <artset>
          <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="320" width="568" viewBox="0 0 568 320" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 8,48 L 8,304" fill="none" stroke="black"/>
              <path d="M 296,48 L 296,304" fill="none" stroke="black"/>
              <path d="M 560,48 L 560,304" fill="none" stroke="black"/>
              <path d="M 8,64 L 40,64" fill="none" stroke="black"/>
              <path d="M 256,64 L 288,64" fill="none" stroke="black"/>
              <path d="M 16,96 L 64,96" fill="none" stroke="black"/>
              <path d="M 184,96 L 296,96" fill="none" stroke="black"/>
              <path d="M 304,128 L 320,128" fill="none" stroke="black"/>
              <path d="M 544,128 L 560,128" fill="none" stroke="black"/>
              <path d="M 296,176 L 344,176" fill="none" stroke="black"/>
              <path d="M 464,176 L 552,176" fill="none" stroke="black"/>
              <path d="M 8,224 L 24,224" fill="none" stroke="black"/>
              <path d="M 272,224 L 288,224" fill="none" stroke="black"/>
              <path d="M 16,256 L 48,256" fill="none" stroke="black"/>
              <path d="M 168,256 L 296,256" fill="none" stroke="black"/>
              <path d="M 296,288 L 344,288" fill="none" stroke="black"/>
              <path d="M 480,288 L 552,288" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="560,288 548,282.4 548,293.6" fill="black" transform="rotate(0,552,288)"/>
              <polygon class="arrowhead" points="560,176 548,170.4 548,181.6" fill="black" transform="rotate(0,552,176)"/>
              <polygon class="arrowhead" points="312,128 300,122.4 300,133.6" fill="black" transform="rotate(180,304,128)"/>
              <polygon class="arrowhead" points="296,224 284,218.4 284,229.6" fill="black" transform="rotate(0,288,224)"/>
              <polygon class="arrowhead" points="296,64 284,58.4 284,69.6" fill="black" transform="rotate(0,288,64)"/>
              <polygon class="arrowhead" points="24,256 12,250.4 12,261.6" fill="black" transform="rotate(180,16,256)"/>
              <polygon class="arrowhead" points="24,96 12,90.4 12,101.6" fill="black" transform="rotate(180,16,96)"/>
              <g class="text">
                <text x="40" y="36">Publisher</text>
                <text x="300" y="36">Broker</text>
                <text x="524" y="36">Subscriber</text>
                <text x="68" y="68">0.03</text>
                <text x="104" y="68">PUT</text>
                <text x="184" y="68">ps/data/1bd0d6d</text>
                <text x="92" y="100">2.01</text>
                <text x="144" y="100">Created</text>
                <text x="348" y="132">0.01</text>
                <text x="384" y="132">GET</text>
                <text x="468" y="132">/ps/data/1bd0d6d</text>
                <text x="368" y="148">Observe:0</text>
                <text x="372" y="180">2.05</text>
                <text x="424" y="180">Content</text>
                <text x="388" y="196">Observe:</text>
                <text x="448" y="196">10001</text>
                <text x="52" y="228">0.04</text>
                <text x="100" y="228">DELETE</text>
                <text x="196" y="228">/ps/data/1bd0d6d</text>
                <text x="76" y="260">2.02</text>
                <text x="128" y="260">Deleted</text>
                <text x="372" y="292">4.04</text>
                <text x="408" y="292">Not</text>
                <text x="448" y="292">Found</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art" align="center"><![CDATA[
Publisher                         Broker                    Subscriber
|                                   |                                |
+---- 0.03 PUT ps/data/1bd0d6d ---->|                                |
|                                   |                                |
|<------ 2.01 Created --------------+                                |
|                                   |                                |
|                                   |<-- 0.01 GET /ps/data/1bd0d6d --+
|                                   |    Observe:0                   |
|                                   |                                |
|                                   +------ 2.05 Content ----------->|
|                                   |       Observe: 10001           |
|                                   |                                |
+-- 0.04 DELETE /ps/data/1bd0d6d -->|                                |
|                                   |                                |
|<---- 2.02 Deleted ----------------+                                |
|                                   |                                |
|                                   +------ 4.04 Not Found --------->|
|                                   |                                |
]]></artwork>
        </artset>
      </figure>
      <section anchor="oscon">
        <name>Using COSE to Protect the Published Topic Data</name>
        <t>The Publisher uses the symmetric COSE Key received from the KDC to protect the payload of the Publish operation (see <xref section="3.2.1" sectionFormat="of" target="I-D.ietf-core-coap-pubsub"/>). Specifically, the Publisher creates a COSE_Encrypt0 object <xref target="RFC9052"/><xref target="RFC9053"/> by means of the COSE Key currently used as group key (REQ23). The encryption algorithm and Base IV to use are specified by the 'alg' and 'Base IV' parameters of the COSE Key, together with its key identifier in the 'kid' parameter.</t>
        <t>Also, the Publisher uses its private key corresponding to the public key sent to the KDC, in order to countersign the COSE_Encrypt0 object as specified in <xref target="RFC9338"/> (REQ23). The countersignature is specified in the 'Countersignature version 2' parameter, within the 'unprotected' field of the COSE_Encrypt0 object.</t>
        <t>Finally, the Publisher sends the COSE_Encrypt0 object conveying the countersignature to the Broker, as payload of the PUT request sent to the topic-data of the topic targeted by the Publish operation.</t>
        <t>Upon receiving a response from the topic-data resource at the Broker, the Subscriber uses the 'kid' parameter from the 'Countersignature version 2' parameter within the 'unprotected' field of the COSE_Encrypt0 object, in order to retrieve the Publisher's public key from the Broker or from its local storage. Then, the Subscriber uses that public key to verify the countersignature.</t>
        <t>In case of successful verification, the Subscriber uses the 'kid' parameter from the 'unprotected' field of the COSE_Encrypt0 object, in order to retrieve the COSE Key used as current group key from its local storage. Then, the Subscriber uses that group key to verify and decrypt the COSE_Encrypt0 object. In case of successful verification, the Subscriber delivers the received topic data to the application.</t>
        <t>The COSE_Encrypt0 object is constructed as follows.</t>
        <t>The 'protected' field <bcp14>MUST</bcp14> include:</t>
        <ul spacing="normal">
          <li>
            <t>The 'alg' parameter, with value the identifier of the AEAD algorithm specified in the 'alg' parameter of the COSE Key used as current group key.</t>
          </li>
        </ul>
        <t>The 'unprotected' field <bcp14>MUST</bcp14> include:</t>
        <ul spacing="normal">
          <li>
            <t>The 'kid' parameter, with the same value specified in the 'kid' parameter of the COSE Key used as current group key. This value represents the current Group ID (Gid) of the security group associated with the application group (topic).</t>
          </li>
          <li>
            <t>The 'Partial IV' parameter, with value set to the current Sender Sequence Number of the Publisher. All leading bytes of value zero <bcp14>SHALL</bcp14> be removed when encoding the Partial IV, except in the case of Partial IV with value 0, which is encoded to the byte string 0x00.  </t>
            <t>
The Publisher <bcp14>MUST</bcp14> initialize the Sender Sequence Number to 0 upon joining the security group and <bcp14>MUST</bcp14> reset it to 0 upon receiving a new group key as the result of a group rekeying (see <xref target="rekeying"/>). The Publisher <bcp14>MUST</bcp14> increment its Sender Sequence Number value by 1, after having completed an encryption operation by means of the current group key.  </t>
            <t>
When the Publisher exhausts its Sender Sequence Numbers, the Publisher <bcp14>MUST NOT</bcp14> protect further topic data by using the current group key while still retaining its current Sender ID, and it <bcp14>MUST</bcp14> send a Key Renewal Request message to the KDC (see <xref target="sec-key-renewal-request"/>). This will result in the KDC rekeying the group and distributing a new group key, or in the KDC providing the Publisher with a new Sender ID. The Publisher <bcp14>MUST</bcp14> reset its Sender Sequence Number to 0 upon receiving a new Sender ID from the KDC.</t>
          </li>
          <li>
            <t>The 'Countersignature version 2' parameter, specifying the countersignature of the COSE_Encrypt0 object. In particular:  </t>
            <ul spacing="normal">
              <li>
                <t>The 'protected' field includes the 'alg' parameter, with value the identifier of the Signature Algorithm used in the security group.</t>
              </li>
              <li>
                <t>The 'unprotected' field includes the 'kid' parameter, with value the Publisher's Sender ID that the Publisher obtained from the KDC when joining the security group, as the value of the 'group_SenderId' parameter of the Join Response (see <xref target="join-response"/>).</t>
              </li>
              <li>
                <t>The 'signature' field, with value the countersignature.</t>
              </li>
            </ul>
            <t>
The countersignature is computed as defined in <xref target="RFC9338"/>, by using the private key of the Publisher as signing key and by means of the Signature Algorithm used in the group. The fields of the Countersign_structure are populated as follows:  </t>
            <ul spacing="normal">
              <li>
                <t>'context' takes "CounterSignature".</t>
              </li>
              <li>
                <t>'body_protected' takes the serialized parameters from the 'protected' field of the COSE_Encrypt0 object, i.e., the 'alg' parameter.</t>
              </li>
              <li>
                <t>'sign_protected' takes the serialized parameters from the 'protected' field of the 'Countersignature version 2' parameter, i.e., the 'alg' parameter.</t>
              </li>
              <li>
                <t>'external_aad is not supplied.</t>
              </li>
              <li>
                <t>'payload' is the ciphertext of the COSE_Encrypt0 object (see below).</t>
              </li>
            </ul>
          </li>
        </ul>
        <t>The 'ciphertext' field specifies the ciphertext computed over the topic data to publish. The ciphertext is computed as defined in <xref target="RFC9052"/><xref target="RFC9053"/>, by using the current group key as encryption key, the AEAD Nonce computed as defined in <xref target="ssec-aead-nonce"/>, the topic data to publish as plaintext, and the Enc_structure populated as follows:</t>
        <ul spacing="normal">
          <li>
            <t>'context' takes "Encrypt0".</t>
          </li>
          <li>
            <t>'protected' takes the serialization of the protected parameter 'alg' from the 'protected' field of the COSE_Encrypt0 object.</t>
          </li>
          <li>
            <t>'external_aad is not supplied.</t>
          </li>
        </ul>
      </section>
      <section anchor="ssec-aead-nonce">
        <name>AEAD Nonce</name>
        <t>This section defines how to generate the AEAD nonce used for encrypting and decrypting the COSE_Encrypt0 object protecting the published topic data. This construction is analogous to that used to generate the AEAD nonce in the OSCORE security protocol (see <xref section="5.2" sectionFormat="of" target="RFC8613"/>).</t>
        <t>The AEAD nonce for producing or consuming the COSE_Encrypt0 object is constructed as defined below and also shown in <xref target="fig-aead-nonce"/>.</t>
        <ol spacing="normal" type="1"><li>
            <t>Left-pad the Partial IV (PIV) with zeroes to exactly 5 bytes.</t>
          </li>
          <li>
            <t>Left-pad the Sender ID of the Publisher that generated the Partial IV (ID_PIV) with zeroes to exactly the nonce length of the AEAD algorithm minus 6 bytes.</t>
          </li>
          <li>
            <t>Concatenate the size of the ID_PIV (a single byte S) with the padded ID_PIV and the padded PIV.</t>
          </li>
          <li>
            <t>XOR the result from the previous step with the Base IV.</t>
          </li>
        </ol>
        <figure anchor="fig-aead-nonce">
          <name>AEAD Nonce Construction</name>
          <artwork align="center"><![CDATA[
     <- nonce length minus 6 B -> <-- 5 bytes -->
+---+-------------------+--------+---------+-----+
| S |      padding      | ID_PIV | padding | PIV |-----+
+---+-------------------+--------+---------+-----+     |
                                                       |
 <---------------- nonce length ---------------->      |
+------------------------------------------------+     |
|                    Base IV                     |-->(XOR)
+------------------------------------------------+     |
                                                       |
 <---------------- nonce length ---------------->      |
+------------------------------------------------+     |
|                     Nonce                      |<----+
+------------------------------------------------+
]]></artwork>
        </figure>
        <t>The construction above only supports AEAD algorithms that use nonces with length equal or greater than 7 bytes. At the same time, it makes it easy to verify that the nonces will be unique when used with the same group key, even though this is shared and used by all the Publishers in the security group. In fact:</t>
        <ul spacing="normal">
          <li>
            <t>Since Publisher's Sender IDs are unique within the security group and they are not reassigned until a group rekeying occurs (see <xref target="join-response"/> and <xref target="rekeying"/>), two Publisher Clients cannot share the same tuple (S, padded ID_PIV) by construction.</t>
          </li>
          <li>
            <t>Since a Publisher increments by 1 its Sender Sequence Number after each use that it makes of the current group key, the Publisher  never reuses the same tuple (S, padded ID_PIV, padded PIV) together with the same group key.</t>
          </li>
          <li>
            <t>Therefore neither the same Publisher reuses the same AEAD nonce with the same group key, nor any two Publishers use the same AEAD nonce with the same group key.</t>
          </li>
        </ul>
      </section>
      <section anchor="ssec-replay-checks">
        <name>Replay Checks</name>
        <t>In order to protect from replay of published topic data, every Subscriber maintains a Replay Window for each different Publisher in the same group. It is <bcp14>RECOMMENDED</bcp14> that the Replay Window has a default size of 32.</t>
        <t>Upon receiving a topic data published by a given Publisher P, the Subscriber retrieves the Sender ID of P conveyed as 'kid' in the 'Countersignature version 2' parameter of the COSE_Encrypt0 object (see <xref target="oscon"/>) and determines the Replay Window W_P associated with P.</t>
        <t>The Subscriber <bcp14>MUST</bcp14> verify that, according to W_P, the Sender Sequence Number SN_P specified by the 'Partial IV' parameter of the COSE_Encrypt0 object has not been received before from P.</t>
        <t>If the verification above fails, the Subscriber <bcp14>MUST</bcp14> stop processing the COSE_Encrypt0 object conveying the topic data. If the value of SN_P is strictly smaller than the currently smallest value in W_P, then the Subscriber <bcp14>MUST</bcp14> stop processing the COSE_Encrypt0 object.</t>
        <t>If the verification above succeeds, the Subscriber proceeds with processing the COSE_Encrypt0 object, by verifying the countersignature from P using P's public key as well as by decrypting and verifying the COSE_Encrypt0 object using the group key. If both operations succeed, the Subscriber updates W_P as follows:</t>
        <ul spacing="normal">
          <li>
            <t>If SN_P is strictly greater than the currently largest value in W_P, then W_P is updated in order to set SN_P as its largest value.</t>
          </li>
          <li>
            <t>SN_P is marked to denote that it has been received.</t>
          </li>
        </ul>
        <t>The operation of validating the 'Partial IV' and updating the Replay Window <bcp14>MUST</bcp14> be atomic.</t>
        <t>Upon installing a new group key (e.g., due to a group rekeying performed by the KDC, see <xref target="rekeying"/>) or upon receiving published topic data from a given Publisher for the first time, the Subscriber initializes the Replay Window corresponding to that Publisher, i.e., the smallest value of the Replay Window is set to 0.</t>
        <!--# Applicability to the MQTT Pub-Sub Profile {#mqtt-pubsub}

This section describes how this profile can be applicable to the MQTT protocol {{MQTT-OASIS-Standard-v5}}.

The MQTT clients would go through steps similar to those performed by the CoAP clients, and the payload of the MQTT PUBLISH messages is protected using COSE. The MQTT clients need to use CoAP for communicating with the KDC, in order to join security groups and be part of the pairwise rekeying initiated by the KDC.

The discovery of the AS is defined in {{Section 2.4.1 of RFC9431}} for MQTT v5 clients, and it is not supported for MQTT v3 clients. $SYS/ has been widely adopted as a prefix to topics that contain server-specific information or control APIs, and may be used for discovering topics and the KDC.

In the Join Response from the KDC to a Client (see {{join-response}}), the 'ace_groupcomm_profile' parameter has value "mqtt_pubsub_app", which is registered in {{iana-profile}}.

Both Publishers and Subscribers MUST authorise to the Broker with their respective tokens, as described in {{RFC9431}}. A Publisher sends PUBLISH messages for a given topic and protects the payload with the corresponding key for the associated security group. A Subscriber may send SUBSCRIBE messages with one or multiple topic filters. A topic filter may correspond to multiple topics. The Broker forwards all PUBLISH messages to all authorised Subscribers, including the retained messages.
-->

</section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Security considerations for this profile are inherited from <xref target="RFC9594"/>, the ACE framework for Authentication and Authorization <xref target="RFC9200"/>, and the specific transport profile of ACE used, such as <xref target="RFC9202"/> and <xref target="RFC9203"/>.</t>
      <t>The following security considerations also apply for this profile.</t>
      <t>Consistent with the intended group-confidentiality model, each Client in a security group is able to decrypt the data published in the topic(s) associated with that group, by using the symmetric group key that is shared with all the other group members.</t>
      <t>At the same time, source authentication of the published topic data is achieved by means of a digital signature, which the Publisher of the data in question computes with its private key and embeds in the published data. This ensures integrity of the published topic data as well as its origin, thus preventing a group member from impersonating another one.</t>
      <t>To this end, both Publishers and Subscribers rely on asymmetric cryptography, while Subscribers must be able to access the public keys of the Publishers to a specific topic in order to verify the signature over the published topic data. This might make the message exchange quite heavy for small constrained devices.</t>
      <t>The Broker is only trusted with verifying that a Publisher is authorised to publish on a certain topic and with distributing that data only to the Subscribers authorised to obtain it. However, the Broker is not trusted with the published data in itself, which the Broker cannot read or modify as it does not have access to the group key required for decrypting the data.</t>
      <t>With respect to the reusage of nonces for proof-of-possession input, the same considerations apply as in <xref target="I-D.ietf-ace-key-groupcomm-oscore"/>, with the difference that the KDC of the present document is considered instead of the Group Manager defined therein.</t>
      <t>Access tokens might have to be revoked before their expiration time. <xref target="RFC9770"/> provides a list of possible circumstances where this can happen, and it specifies a method that an Authorization Server can use in order to notify the KDC, the Broker, and the Clients about pertaining access tokens that have been revoked but are not expired yet.</t>
      <t>Clients can be excluded from future communications related to a topic, by appropriately re-keying the group associated with the topic in question.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>Note to RFC Editor: Please replace "[RFC-XXXX]" with the RFC number of this document and delete this paragraph.</t>
      <t>This document has the following actions for IANA.</t>
      <section anchor="iana-ace-groupcomm-key">
        <name>ACE Groupcomm Key Types</name>
        <t>IANA is asked to register the following entry in the "ACE Groupcomm Key Types" registry defined in <xref section="11.8" sectionFormat="of" target="RFC9594"/>.</t>
        <ul spacing="normal">
          <li>
            <t>Name: Group_PubSub_Keying_Material</t>
          </li>
          <li>
            <t>Key Type Value: GROUPCOMM_KEY_TBD (suggested value: 2)</t>
          </li>
          <li>
            <t>Profile: coap_group_pubsub_app (<xref target="iana-profile"/> of [RFC-XXXX]).</t>
          </li>
          <li>
            <t>Description: Encoded as described in <xref target="join-response"/> of [RFC-XXXX].</t>
          </li>
          <li>
            <t>References: <xref target="RFC9052"/>, <xref target="RFC9053"/>, [RFC-XXXX]</t>
          </li>
        </ul>
      </section>
      <section anchor="iana-profile">
        <name>ACE Groupcomm Profiles</name>
        <t>IANA is asked to register the following entries in the "ACE Groupcomm Profiles" registry defined in <xref section="11.9" sectionFormat="of" target="RFC9594"/>.</t>
        <ul spacing="normal">
          <li>
            <t>Name: coap_group_pubsub_app</t>
          </li>
          <li>
            <t>Description: Application profile to provision keying material for participating in group communication based on the Pub-Sub architecture <xref target="I-D.ietf-core-coap-pubsub"/> for CoAP <xref target="RFC7252"/> and protected with COSE <xref target="RFC9052"/><xref target="RFC9053"/><xref target="RFC9338"/>.</t>
          </li>
          <li>
            <t>CBOR Value: TBD (suggested value: 2)</t>
          </li>
          <li>
            <t>Reference: [RFC-XXXX]</t>
          </li>
        </ul>
      </section>
      <section anchor="core_rt">
        <name>CoRE Resource Type</name>
        <t>IANA is asked to register the following entry in the "Resource Type (rt=) Link Target Attribute Values" registry within the "Constrained Restful Environments (CoRE) Parameters" registry group.</t>
        <ul spacing="normal">
          <li>
            <t>Value: "core.ps.gm"</t>
          </li>
          <li>
            <t>Description: Group-membership resource for Pub-Sub communication.</t>
          </li>
          <li>
            <t>Reference: [RFC-XXXX]</t>
          </li>
        </ul>
        <t>Clients can use this resource type to discover a group membership resource at the KDC.</t>
      </section>
      <section anchor="aif">
        <name>AIF Media-Type Sub-Parameters</name>
        <t>For the media-types "application/aif+cbor" and "application/aif+json" defined in <xref section="5.1" sectionFormat="of" target="RFC9237"/>, IANA is requested to register the following entries for the two media-type parameters Toid and Tperm, in the respective sub-registry defined in <xref section="5.2" sectionFormat="of" target="RFC9237"/> within the "MIME Media Type Sub-Parameter" registry group.</t>
        <ul spacing="normal">
          <li>
            <t>Parameter: Toid</t>
          </li>
          <li>
            <t>Name: pubsub-topic</t>
          </li>
          <li>
            <t>Description/Specification: Name of one application group (topic) or of a corresponding security group.</t>
          </li>
          <li>
            <t>Reference: [RFC-XXXX]</t>
          </li>
        </ul>
        <t><br/></t>
        <ul spacing="normal">
          <li>
            <t>Parameter: Tperm</t>
          </li>
          <li>
            <t>Name: pubsub-perm</t>
          </li>
          <li>
            <t>Description/Specification: Permissions pertaining to application groups (topics) or to corresponding security groups.</t>
          </li>
          <li>
            <t>Reference: [RFC-XXXX]</t>
          </li>
        </ul>
      </section>
      <section anchor="content_formats">
        <name>CoAP Content-Formats</name>
        <t>IANA is asked to register the following entries to the "CoAP Content-Formats" registry within the "Constrained RESTful Environments (CoRE) Parameters" registry group.</t>
        <ul spacing="normal">
          <li>
            <t>Content Type: application/aif+cbor;toid=pubsub-topic;tperm=pubsub-perm</t>
          </li>
          <li>
            <t>Content Coding: -</t>
          </li>
          <li>
            <t>ID: 294 (suggested)</t>
          </li>
          <li>
            <t>Reference: [RFC-XXXX]</t>
          </li>
        </ul>
        <t><br/></t>
        <ul spacing="normal">
          <li>
            <t>Content Type: application/aif+json;toid=pubsub-topic;tperm=pubsub-perm</t>
          </li>
          <li>
            <t>Content Coding: -</t>
          </li>
          <li>
            <t>ID: 295 (suggested)</t>
          </li>
          <li>
            <t>Reference: [RFC-XXXX]</t>
          </li>
        </ul>
      </section>
      <section anchor="tls_exporter">
        <name>TLS Exporter Labels</name>
        <t>IANA is asked to register the following entry to the "TLS Exporter Labels" registry defined in <xref section="6" sectionFormat="of" target="RFC5705"/> and updated in <xref section="12" sectionFormat="of" target="RFC8447"/>.</t>
        <ul spacing="normal">
          <li>
            <t>Value: EXPORTER-ACE-Sign-Challenge-coap-pubsub-app</t>
          </li>
          <li>
            <t>DTLS-OK: Y</t>
          </li>
          <li>
            <t>Recommended: N</t>
          </li>
          <li>
            <t>Reference: <xref target="pop"/> of [RFC-XXXX]</t>
          </li>
        </ul>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="IANA.cose_algorithms" target="https://www.iana.org/assignments/cose">
          <front>
            <title>COSE Algorithms</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="IANA.cose_key-type" target="https://www.iana.org/assignments/cose">
          <front>
            <title>COSE Key Types</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="IANA.cose_header-parameters" target="https://www.iana.org/assignments/cose">
          <front>
            <title>COSE Header Parameters</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="I-D.ietf-core-coap-pubsub">
          <front>
            <title>A publish-subscribe architecture for the Constrained Application Protocol (CoAP)</title>
            <author fullname="Jaime Jimenez" initials="J." surname="Jimenez">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Michael Koster" initials="M." surname="Koster">
              <organization>Dogtiger Labs</organization>
            </author>
            <author fullname="Ari Keränen" initials="A." surname="Keränen">
              <organization>Ericsson</organization>
            </author>
            <date day="28" month="February" year="2025"/>
            <abstract>
              <t>   This document describes a publish-subscribe architecture for the
   Constrained Application Protocol (CoAP), extending the capabilities
   of CoAP communications for supporting endpoints with long breaks in
   connectivity and/or up-time.  CoAP clients publish on and subscribe
   to a topic via a corresponding topic resource at a CoAP server acting
   as broker.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-coap-pubsub-18"/>
        </reference>
        <reference anchor="RFC5246">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
            <author fullname="T. Dierks" initials="T." surname="Dierks"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2008"/>
            <abstract>
              <t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol. The TLS protocol provides communications security over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5246"/>
          <seriesInfo name="DOI" value="10.17487/RFC5246"/>
        </reference>
        <reference anchor="RFC5705">
          <front>
            <title>Keying Material Exporters for Transport Layer Security (TLS)</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="March" year="2010"/>
            <abstract>
              <t>A number of protocols wish to leverage Transport Layer Security (TLS) to perform key establishment but then use some of the keying material for their own purposes. This document describes a general mechanism for allowing that. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5705"/>
          <seriesInfo name="DOI" value="10.17487/RFC5705"/>
        </reference>
        <reference anchor="RFC6347">
          <front>
            <title>Datagram Transport Layer Security Version 1.2</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="January" year="2012"/>
            <abstract>
              <t>This document specifies version 1.2 of the Datagram Transport Layer Security (DTLS) protocol. The DTLS protocol provides communications privacy for datagram protocols. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. The DTLS protocol is based on the Transport Layer Security (TLS) protocol and provides equivalent security guarantees. Datagram semantics of the underlying transport are preserved by the DTLS protocol. This document updates DTLS 1.0 to work with TLS version 1.2. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6347"/>
          <seriesInfo name="DOI" value="10.17487/RFC6347"/>
        </reference>
        <reference anchor="RFC6690">
          <front>
            <title>Constrained RESTful Environments (CoRE) Link Format</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <date month="August" year="2012"/>
            <abstract>
              <t>This specification defines Web Linking using a link format for use by constrained web servers to describe hosted resources, their attributes, and other relationships between links. Based on the HTTP Link Header field defined in RFC 5988, the Constrained RESTful Environments (CoRE) Link Format is carried as a payload and is assigned an Internet media type. "RESTful" refers to the Representational State Transfer (REST) architecture. A well-known URI is defined as a default entry point for requesting the links hosted by a server. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6690"/>
          <seriesInfo name="DOI" value="10.17487/RFC6690"/>
        </reference>
        <reference anchor="RFC6749">
          <front>
            <title>The OAuth 2.0 Authorization Framework</title>
            <author fullname="D. Hardt" initials="D." role="editor" surname="Hardt"/>
            <date month="October" year="2012"/>
            <abstract>
              <t>The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf. This specification replaces and obsoletes the OAuth 1.0 protocol described in RFC 5849. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6749"/>
          <seriesInfo name="DOI" value="10.17487/RFC6749"/>
        </reference>
        <reference anchor="RFC7252">
          <front>
            <title>The Constrained Application Protocol (CoAP)</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s. The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
              <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types. CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7252"/>
          <seriesInfo name="DOI" value="10.17487/RFC7252"/>
        </reference>
        <reference anchor="RFC7641">
          <front>
            <title>Observing Resources in the Constrained Application Protocol (CoAP)</title>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <date month="September" year="2015"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a RESTful application protocol for constrained nodes and networks. The state of a resource on a CoAP server can change over time. This document specifies a simple protocol extension for CoAP that enables CoAP clients to "observe" resources, i.e., to retrieve a representation of a resource and keep this representation updated by the server over a period of time. The protocol follows a best-effort approach for sending new representations to clients and provides eventual consistency between the state observed by each client and the actual resource state at the server.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7641"/>
          <seriesInfo name="DOI" value="10.17487/RFC7641"/>
        </reference>
        <reference anchor="RFC7925">
          <front>
            <title>Transport Layer Security (TLS) / Datagram Transport Layer Security (DTLS) Profiles for the Internet of Things</title>
            <author fullname="H. Tschofenig" initials="H." role="editor" surname="Tschofenig"/>
            <author fullname="T. Fossati" initials="T." surname="Fossati"/>
            <date month="July" year="2016"/>
            <abstract>
              <t>A common design pattern in Internet of Things (IoT) deployments is the use of a constrained device that collects data via sensors or controls actuators for use in home automation, industrial control systems, smart cities, and other IoT deployments.</t>
              <t>This document defines a Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) 1.2 profile that offers communications security for this data exchange thereby preventing eavesdropping, tampering, and message forgery. The lack of communication security is a common vulnerability in IoT products that can easily be solved by using these well-researched and widely deployed Internet security protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7925"/>
          <seriesInfo name="DOI" value="10.17487/RFC7925"/>
        </reference>
        <reference anchor="RFC8392">
          <front>
            <title>CBOR Web Token (CWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties. The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection. A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value. CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8392"/>
          <seriesInfo name="DOI" value="10.17487/RFC8392"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC8447">
          <front>
            <title>IANA Registry Updates for TLS and DTLS</title>
            <author fullname="J. Salowey" initials="J." surname="Salowey"/>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document describes a number of changes to TLS and DTLS IANA registries that range from adding notes to the registry all the way to changing the registration policy. These changes were mostly motivated by WG review of the TLS- and DTLS-related registries undertaken as part of the TLS 1.3 development process.</t>
              <t>This document updates the following RFCs: 3749, 5077, 4680, 5246, 5705, 5878, 6520, and 7301.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8447"/>
          <seriesInfo name="DOI" value="10.17487/RFC8447"/>
        </reference>
        <reference anchor="RFC8610">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="C. Vigano" initials="C." surname="Vigano"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8610"/>
          <seriesInfo name="DOI" value="10.17487/RFC8610"/>
        </reference>
        <reference anchor="RFC8949">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="94"/>
          <seriesInfo name="RFC" value="8949"/>
          <seriesInfo name="DOI" value="10.17487/RFC8949"/>
        </reference>
        <reference anchor="RFC9052">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
              <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="96"/>
          <seriesInfo name="RFC" value="9052"/>
          <seriesInfo name="DOI" value="10.17487/RFC9052"/>
        </reference>
        <reference anchor="RFC9053">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Initial Algorithms</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines a set of algorithms that can be used with the CBOR Object Signing and Encryption (COSE) protocol (RFC 9052).</t>
              <t>This document, along with RFC 9052, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9053"/>
          <seriesInfo name="DOI" value="10.17487/RFC9053"/>
        </reference>
        <reference anchor="RFC9147">
          <front>
            <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>This document specifies version 1.3 of the Datagram Transport Layer Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability. Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
              <t>This document obsoletes RFC 6347.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9147"/>
          <seriesInfo name="DOI" value="10.17487/RFC9147"/>
        </reference>
        <reference anchor="RFC9200">
          <front>
            <title>Authentication and Authorization for Constrained Environments Using the OAuth 2.0 Framework (ACE-OAuth)</title>
            <author fullname="L. Seitz" initials="L." surname="Seitz"/>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>This specification defines a framework for authentication and authorization in Internet of Things (IoT) environments called ACE-OAuth. The framework is based on a set of building blocks including OAuth 2.0 and the Constrained Application Protocol (CoAP), thus transforming a well-known and widely used authorization solution into a form suitable for IoT devices. Existing specifications are used where possible, but extensions are added and profiles are defined to better serve the IoT use cases.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9200"/>
          <seriesInfo name="DOI" value="10.17487/RFC9200"/>
        </reference>
        <reference anchor="RFC9237">
          <front>
            <title>An Authorization Information Format (AIF) for Authentication and Authorization for Constrained Environments (ACE)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Information about which entities are authorized to perform what operations on which constituents of other entities is a crucial component of producing an overall system that is secure. Conveying precise authorization information is especially critical in highly automated systems with large numbers of entities, such as the Internet of Things.</t>
              <t>This specification provides a generic information model and format for representing such authorization information, as well as two variants of a specific instantiation of that format for use with Representational State Transfer (REST) resources identified by URI path.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9237"/>
          <seriesInfo name="DOI" value="10.17487/RFC9237"/>
        </reference>
        <reference anchor="RFC9277">
          <front>
            <title>On Stable Storage for Items in Concise Binary Object Representation (CBOR)</title>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>This document defines a stored ("file") format for Concise Binary Object Representation (CBOR) data items that is friendly to common systems that recognize file types, such as the Unix file(1) command.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9277"/>
          <seriesInfo name="DOI" value="10.17487/RFC9277"/>
        </reference>
        <reference anchor="RFC9290">
          <front>
            <title>Concise Problem Details for Constrained Application Protocol (CoAP) APIs</title>
            <author fullname="T. Fossati" initials="T." surname="Fossati"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="October" year="2022"/>
            <abstract>
              <t>This document defines a concise "problem detail" as a way to carry machine-readable details of errors in a Representational State Transfer (REST) response to avoid the need to define new error response formats for REST APIs for constrained environments. The format is inspired by, but intended to be more concise than, the problem details for HTTP APIs defined in RFC 7807.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9290"/>
          <seriesInfo name="DOI" value="10.17487/RFC9290"/>
        </reference>
        <reference anchor="RFC9338">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Countersignatures</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="December" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. CBOR Object Signing and Encryption (COSE) defines a set of security services for CBOR. This document defines a countersignature algorithm along with the needed header parameters and CBOR tags for COSE. This document updates RFC 9052.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="96"/>
          <seriesInfo name="RFC" value="9338"/>
          <seriesInfo name="DOI" value="10.17487/RFC9338"/>
        </reference>
        <reference anchor="RFC9430">
          <front>
            <title>Extension of the Datagram Transport Layer Security (DTLS) Profile for Authentication and Authorization for Constrained Environments (ACE) to Transport Layer Security (TLS)</title>
            <author fullname="O. Bergmann" initials="O." surname="Bergmann"/>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <date month="July" year="2023"/>
            <abstract>
              <t>This document updates "Datagram Transport Layer Security (DTLS) Profile for Authentication and Authorization for Constrained Environments (ACE)" (RFC 9202) by specifying that the profile applies to TLS as well as DTLS.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9430"/>
          <seriesInfo name="DOI" value="10.17487/RFC9430"/>
        </reference>
        <reference anchor="RFC9594">
          <front>
            <title>Key Provisioning for Group Communication Using Authentication and Authorization for Constrained Environments (ACE)</title>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <author fullname="M. Tiloca" initials="M." surname="Tiloca"/>
            <date month="September" year="2024"/>
            <abstract>
              <t>This document defines how to use the Authentication and Authorization for Constrained Environments (ACE) framework to distribute keying material and configuration parameters for secure group communication. Candidate group members that act as Clients and are authorized to join a group can do so by interacting with a Key Distribution Center (KDC) acting as the Resource Server, from which they obtain the keying material to communicate with other group members. While defining general message formats as well as the interface and operations available at the KDC, this document supports different approaches and protocols for secure group communication. Therefore, details are delegated to separate application profiles of this document as specialized instances that target a particular group communication approach and define how communications in the group are protected. Compliance requirements for such application profiles are also specified.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9594"/>
          <seriesInfo name="DOI" value="10.17487/RFC9594"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC8613">
          <front>
            <title>Object Security for Constrained RESTful Environments (OSCORE)</title>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="J. Mattsson" initials="J." surname="Mattsson"/>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <author fullname="L. Seitz" initials="L." surname="Seitz"/>
            <date month="July" year="2019"/>
            <abstract>
              <t>This document defines Object Security for Constrained RESTful Environments (OSCORE), a method for application-layer protection of the Constrained Application Protocol (CoAP), using CBOR Object Signing and Encryption (COSE). OSCORE provides end-to-end protection between endpoints communicating using CoAP or CoAP-mappable HTTP. OSCORE is designed for constrained nodes and networks supporting a range of proxy operations, including translation between different transport protocols.</t>
              <t>Although an optional functionality of CoAP, OSCORE alters CoAP options processing and IANA registration. Therefore, this document updates RFC 7252.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8613"/>
          <seriesInfo name="DOI" value="10.17487/RFC8613"/>
        </reference>
        <reference anchor="RFC8259">
          <front>
            <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format. It was derived from the ECMAScript Programming Language Standard. JSON defines a small set of formatting rules for the portable representation of structured data.</t>
              <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="90"/>
          <seriesInfo name="RFC" value="8259"/>
          <seriesInfo name="DOI" value="10.17487/RFC8259"/>
        </reference>
        <reference anchor="RFC9202">
          <front>
            <title>Datagram Transport Layer Security (DTLS) Profile for Authentication and Authorization for Constrained Environments (ACE)</title>
            <author fullname="S. Gerdes" initials="S." surname="Gerdes"/>
            <author fullname="O. Bergmann" initials="O." surname="Bergmann"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="L. Seitz" initials="L." surname="Seitz"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>This specification defines a profile of the Authentication and Authorization for Constrained Environments (ACE) framework that allows constrained servers to delegate client authentication and authorization. The protocol relies on DTLS version 1.2 or later for communication security between entities in a constrained network using either raw public keys or pre-shared keys. A resource-constrained server can use this protocol to delegate management of authorization information to a trusted host with less-severe limitations regarding processing power and memory.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9202"/>
          <seriesInfo name="DOI" value="10.17487/RFC9202"/>
        </reference>
        <reference anchor="RFC9203">
          <front>
            <title>The Object Security for Constrained RESTful Environments (OSCORE) Profile of the Authentication and Authorization for Constrained Environments (ACE) Framework</title>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <author fullname="L. Seitz" initials="L." surname="Seitz"/>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="M. Gunnarsson" initials="M." surname="Gunnarsson"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>This document specifies a profile for the Authentication and Authorization for Constrained Environments (ACE) framework. It utilizes Object Security for Constrained RESTful Environments (OSCORE) to provide communication security and proof-of-possession for a key owned by the client and bound to an OAuth 2.0 access token.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9203"/>
          <seriesInfo name="DOI" value="10.17487/RFC9203"/>
        </reference>
        <reference anchor="RFC9770">
          <front>
            <title>Notification of Revoked Access Tokens in the Authentication and Authorization for Constrained Environments (ACE) Framework</title>
            <author fullname="M. Tiloca" initials="M." surname="Tiloca"/>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <author fullname="S. Echeverria" initials="S." surname="Echeverria"/>
            <author fullname="G. Lewis" initials="G." surname="Lewis"/>
            <date month="June" year="2025"/>
            <abstract>
              <t>This document specifies a method of the Authentication and Authorization for Constrained Environments (ACE) framework, which allows an authorization server to notify clients and resource servers (i.e., registered devices) about revoked access tokens. As specified in this document, the method allows clients and resource servers (RSs) to access a Token Revocation List (TRL) on the authorization server by using the Constrained Application Protocol (CoAP), with the possible additional use of resource observation. Resulting (unsolicited) notifications of revoked access tokens complement alternative approaches such as token introspection, while not requiring additional endpoints on clients and RSs.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9770"/>
          <seriesInfo name="DOI" value="10.17487/RFC9770"/>
        </reference>
        <reference anchor="I-D.ietf-cose-cbor-encoded-cert">
          <front>
            <title>CBOR Encoded X.509 Certificates (C509 Certificates)</title>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Göran Selander" initials="G." surname="Selander">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Shahid Raza" initials="S." surname="Raza">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Joel Höglund" initials="J." surname="Höglund">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Martin Furuhed" initials="M." surname="Furuhed">
              <organization>IN Groupe</organization>
            </author>
            <date day="18" month="August" year="2025"/>
            <abstract>
              <t>   This document specifies a CBOR encoding of X.509 certificates.  The
   resulting certificates are called C509 Certificates.  The CBOR
   encoding supports a large subset of RFC 5280 and all certificates
   compatible with the RFC 7925, IEEE 802.1AR (DevID), CNSA 1.0, RPKI,
   GSMA eUICC, and CA/Browser Forum Baseline Requirements profiles.
   C509 is deployed in different settings including, in-vehicle and
   vehicle-to-cloud communication, Unmanned Aircraft Systems (UAS), and
   Global Navigation Satellite System (GNSS).  When used to re-encode
   DER encoded X.509 certificates, the CBOR encoding can in many cases
   reduce the size of RFC 7925 profiled certificates by over 50% while
   also significantly reducing memory and code size compared to ASN.1.
   The CBOR encoded structure can alternatively be signed directly
   ("natively signed"), which does not require re-encoding for the
   signature to be verified.  The TLSA selectors registry defined in RFC
   6698 is extended to include C509 certificates.  The document also
   specifies C509 Certificate Requests, C509 COSE headers, a C509 TLS
   certificate type, and a C509 file format.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cose-cbor-encoded-cert-15"/>
        </reference>
        <reference anchor="I-D.ietf-ace-edhoc-oscore-profile">
          <front>
            <title>Ephemeral Diffie-Hellman Over COSE (EDHOC) and Object Security for Constrained Environments (OSCORE) Profile for Authentication and Authorization for Constrained Environments (ACE)</title>
            <author fullname="Göran Selander" initials="G." surname="Selander">
              <organization>Ericsson</organization>
            </author>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Marco Tiloca" initials="M." surname="Tiloca">
              <organization>RISE</organization>
            </author>
            <author fullname="Rikard Höglund" initials="R." surname="Höglund">
              <organization>RISE</organization>
            </author>
            <date day="7" month="July" year="2025"/>
            <abstract>
              <t>   This document specifies a profile for the Authentication and
   Authorization for Constrained Environments (ACE) framework.  It
   utilizes Ephemeral Diffie-Hellman Over COSE (EDHOC) for achieving
   mutual authentication between an ACE-OAuth client and resource
   server, and it binds an authentication credential of the client to an
   ACE-OAuth access token.  EDHOC also establishes an Object Security
   for Constrained RESTful Environments (OSCORE) Security Context, which
   is used to secure communications between the client and resource
   server when accessing protected resources according to the
   authorization information indicated in the access token.  This
   profile can be used to delegate management of authorization
   information from a resource-constrained server to a trusted host with
   less severe limitations regarding processing power and memory.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ace-edhoc-oscore-profile-08"/>
        </reference>
        <reference anchor="I-D.ietf-ace-key-groupcomm-oscore">
          <front>
            <title>Key Management for Group Object Security for Constrained RESTful Environments (Group OSCORE) Using Authentication and Authorization for Constrained Environments (ACE)</title>
            <author fullname="Marco Tiloca" initials="M." surname="Tiloca">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Francesca Palombini" initials="F." surname="Palombini">
              <organization>Ericsson AB</organization>
            </author>
            <date day="28" month="August" year="2025"/>
            <abstract>
              <t>   This document defines an application profile of the Authentication
   and Authorization for Constrained Environments (ACE) framework, to
   request and provision keying material in group communication
   scenarios that are based on the Constrained Application Protocol
   (CoAP) and are secured with Group Object Security for Constrained
   RESTful Environments (Group OSCORE).  This application profile
   delegates the authentication and authorization of Clients, which join
   an OSCORE group through a Resource Server acting as Group Manager for
   that group.  This application profile leverages protocol-specific
   transport profiles of ACE to achieve communication security, server
   authentication, and proof of possession for a key owned by the Client
   and bound to an OAuth 2.0 access token.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ace-key-groupcomm-oscore-18"/>
        </reference>
      </references>
    </references>
    <?line 1057?>

<section anchor="groupcomm_requirements">
      <name>Requirements on Application Profiles</name>
      <t>This section lists how this application profile of ACE addresses the requirements defined in <xref section="A" sectionFormat="of" target="RFC9594"/>.</t>
      <section anchor="mandatory-to-address-requirements">
        <name>Mandatory-to-Address Requirements</name>
        <ul spacing="normal">
          <li>
            <t>REQ1: Specify the format and encoding of scope. This includes defining the set of possible roles and their identifiers, as well as the corresponding encoding to use in the scope entries according to the used scope format: see <xref target="scope"/>.</t>
          </li>
          <li>
            <t>REQ2: If scope uses AIF, register its specific instance of "Toid" and "Tperm" as media type parameters and a corresponding Content-Format, as per the guidelines in <xref target="RFC9237"/>: see <xref target="aif"/> and <xref target="content_formats"/>.</t>
          </li>
          <li>
            <t>REQ3: If used, specify the acceptable values for the 'sign_alg' parameter: values from the "Value" column of the "COSE Algorithms" registry <xref target="IANA.cose_algorithms"/>.</t>
          </li>
          <li>
            <t>REQ4: If used, specify the acceptable values and structure for the 'sign_parameters' parameter: values and structure from the COSE algorithm capabilities as specified in the "COSE Algorithms" registry <xref target="IANA.cose_algorithms"/>.</t>
          </li>
          <li>
            <t>REQ5: If used, specify the acceptable values and structure for the 'sign_key_parameters' parameter: values and structure from the COSE key type capabilities as specified in the "COSE Key Types" registry <xref target="IANA.cose_key-type"/>.</t>
          </li>
          <li>
            <t>REQ6: Specify the acceptable formats for authentication credentials and, if applicable, the acceptable values for the 'cred_fmt' parameter: acceptable formats explicitly provide the public key as well as the comprehensive set of information related to the public key algorithm (see <xref target="token-post"/> and <xref target="join-response"/>). Consistent acceptable values for 'cred_fmt' are taken from the "Label" column of the "COSE Header Parameters" registry <xref target="IANA.cose_header-parameters"/>.</t>
          </li>
          <li>
            <t>REQ7: If the value of the GROUPNAME URI path and the group name in the access token scope ('gname') are not required to coincide, specify the mechanism to map the GROUPNAME value in the URI to the group name: not applicable, since a perfect matching is required.</t>
          </li>
          <li>
            <t>REQ8: Define whether the KDC has an authentication credential as required for the correct group operation and if this has to be provided through the 'kdc_cred' parameter: optional, see <xref target="join-response"/>.</t>
          </li>
          <li>
            <t>REQ9: Specify if any part of the KDC interface as defined in <xref target="RFC9594"/> is not supported by the KDC: part of the KDC interface is optional to support, see <xref target="kdc-interface"/>.</t>
          </li>
          <li>
            <t>REQ10: Register a Resource Type for the group-membership resources, which is used to discover the correct URL for sending a Join Request to the KDC: the Resource Type (rt=) Link Target Attribute value "core.ps.gm" is registered in <xref target="core_rt"/>.</t>
          </li>
          <li>
            <t>REQ11: Define what specific actions (e.g., CoAP methods) are allowed on each resource accessible through the KDC interface, depending on: whether the Client is a current group member; the roles that a Client is authorised to take as per the obtained access token; and the roles that the Client has as a current group member: see <xref target="kdc-interface"/>.</t>
          </li>
          <li>
            <t>REQ12: Categorize possible newly defined operations for Clients into primary operations expected to be minimally supported and secondary operations, and provide accompanying considerations: no new operations are defined.</t>
          </li>
          <li>
            <t>REQ13: Specify the encoding of group identifiers: CBOR byte string, with value used also to identify the current group key used in the security group (see <xref target="join-response"/> and <xref target="query"/>).</t>
          </li>
          <li>
            <t>REQ14: Specify the approaches used to compute and verify the PoP evidence to include in the 'client_cred_verify' parameter and which of those approaches is used in which case: see <xref target="pop"/>.</t>
          </li>
          <li>
            <t>REQ15: Specify how the nonce N_S is generated, if the access token is not provided to the KDC through the Token Transfer Request sent to the /authz-info endpoint (e.g., the access token is instead transferred during the establishment of a secure communication association): see <xref target="pop"/>.</t>
          </li>
          <li>
            <t>REQ16: Define the initial value of the version number for the group keying material: the initial value <bcp14>MUST</bcp14> be set to 0 (see <xref target="join-response"/>).</t>
          </li>
          <li>
            <t>REQ17: Specify the format of the group keying material that is conveyed in the 'key' parameter: see <xref target="join-response"/>.</t>
          </li>
          <li>
            <t>REQ18: Specify the acceptable values of the 'gkty' parameter. For each of them, register a corresponding entry in the "ACE Groupcomm Key Types" IANA registry if such an entry does not exist already: Group_PubSub_Keying_Material, see <xref target="join-response"/> and <xref target="iana-ace-groupcomm-key"/>.</t>
          </li>
          <li>
            <t>REQ19: Specify and register the application profile identifier: coap_group_pubsub_app (see <xref target="join-response"/> and <xref target="iana-profile"/>).</t>
          </li>
          <li>
            <t>REQ20: If used, specify the format and default values of the entries of the CBOR map to include in the 'group_policies' parameter: not applicable.</t>
          </li>
          <li>
            <t>REQ21: Specify the approaches used to compute and verify the PoP evidence to include in the 'kdc_cred_verify' parameter and which of those approaches is used in which case. If external signature verifiers are supported, specify how those provide a nonce to the KDC to be used for computing the PoP evidence: see <xref target="join-response"/>.</t>
          </li>
          <li>
            <t>REQ22: Specify the communication protocol that members of the group use to communicate with each other (e.g., CoAP for group communication): CoAP <xref target="RFC7252"/>, used for Pub-Sub communications as defined in <xref target="I-D.ietf-core-coap-pubsub"/>.</t>
          </li>
          <li>
            <t>REQ23: Specify the security protocol that members of the group use to protect the group communication (e.g., Group OSCORE). This must provide encryption, integrity, and replay protection: Publishers in a group use a symmetric group key to protect published topic data as a COSE_Encrypt0 object, per the AEAD algorithm specified by the KDC. A Publisher also produces a COSE countersignature of the COSE_Encrypt0 object by using its private key, per the signature algorithm specified by the KDC.</t>
          </li>
          <li>
            <t>REQ24: Specify how the communication is secured between the Client and the KDC. Optionally, specify a transport profile of ACE <xref target="RFC9200"/> to use between the Client and the KDC: ACE transport profile such as for DTLS <xref target="RFC9202"/> or OSCORE <xref target="RFC9203"/>.</t>
          </li>
          <li>
            <t>REQ25: Specify the format of the node identifiers of group members: the Sender ID defined in <xref target="join-response"/>.</t>
          </li>
          <li>
            <t>REQ26: Specify policies at the KDC to handle node identifiers that are included in the 'get_creds' parameter but are not associated with any current group member: see <xref target="query"/>.</t>
          </li>
          <li>
            <t>REQ27: Specify the format of (newly generated) individual keying material for group members or of the information to derive such keying material, as well as the corresponding CBOR map key that has to be registered in the "ACE Groupcomm Parameters" registry: see <xref target="sec-key-renewal-request"/>.</t>
          </li>
          <li>
            <t>REQ28: Specify which CBOR tag is used for identifying the semantics of binary scopes, or register a new CBOR tag if a suitable one does not exist already: see <xref target="as-response"/> and <xref target="content_formats"/>.</t>
          </li>
          <li>
            <t>REQ29: Categorize newly defined parameters according to the same criteria of <xref section="8" sectionFormat="of" target="RFC9594"/>: a Publisher Client <bcp14>MUST</bcp14> support 'group_SenderId' in 'key'; see <xref target="join-response"/>.</t>
          </li>
          <li>
            <t>REQ30: Define whether Clients must, should, or may support the conditional parameters defined in <xref section="8" sectionFormat="of" target="RFC9594"/> and under which circumstances: a Publisher Client <bcp14>MUST</bcp14> support the client_cred', 'cnonce', and 'client_cred_verify' parameters (see <xref target="join-request"/>). A Publisher Client that provides the access token to the KDC through the /authz-info endpoint <bcp14>MUST</bcp14> support the parameter 'kdcchallenge' (see <xref target="token-post"/>).</t>
          </li>
        </ul>
      </section>
      <section anchor="optional-to-address-requirements">
        <name>Optional-to-Address Requirements</name>
        <ul spacing="normal">
          <li>
            <t>OPT1: Optionally, if the textual format of scope is used, specify CBOR values to use for abbreviating the role identifiers in the group: not applicable.</t>
          </li>
          <li>
            <t>OPT2: Optionally, specify the additional parameters used in the exchange of Token Transfer Request and Response: none are defined.</t>
          </li>
          <li>
            <t>OPT3: Optionally, specify the negotiation of parameter values for signature algorithm and signature keys, if the 'sign_info' parameter is not used: see <xref target="token-post"/>.</t>
          </li>
          <li>
            <t>OPT4: Optionally, specify possible or required payload formats for specific error cases: see <xref target="join-error"/>.</t>
          </li>
          <li>
            <t>OPT5: Optionally, specify additional identifiers of error types as values of the 'error-id' field within the Custom Problem Detail entry 'ace-groupcomm-error': none are defined.</t>
          </li>
          <li>
            <t>OPT6: Optionally, specify the encoding of the 'creds_repo' parameter if the default one is not used: no encoding is defined.</t>
          </li>
          <li>
            <t>OPT7: Optionally, specify the functionalities implemented at the resource hosted by the Client at the URI indicated in the 'control_uri' parameter, including the encoding of exchanged messages and other details: no functionalities are defined.</t>
          </li>
          <li>
            <t>OPT8: Optionally, specify the behavior of the POST handler of group-membership resources, for the case when it fails to retrieve an authentication credential for the specific Client: The KDC <bcp14>MUST</bcp14> reply with a 4.00 (Bad Request) error response to the Join Request (see <xref target="join-error"/>).</t>
          </li>
          <li>
            <t>OPT9: Optionally, define a default group rekeying scheme to refer to in case the 'rekeying_scheme' parameter is not included in the Join Response: the "Point-to-Point" rekeying scheme registered in <xref section="11.13" sectionFormat="of" target="RFC9594"/>.</t>
          </li>
          <li>
            <t>OPT10: Optionally, specify the functionalities implemented at the resource hosted by the Client at the URI indicated in the 'control_group_uri' parameter, including the encoding of exchanged messages and other details: no functionalities are defined.</t>
          </li>
          <li>
            <t>OPT11: Optionally, specify policies that instruct Clients to retain messages and for how long, if those are unsuccessfully decrypted: no such policies are specified.</t>
          </li>
          <li>
            <t>OPT12: Optionally, specify for the KDC to perform a group rekeying when receiving a Key Renewal Request, together with or instead of renewing individual keying material: the KDC <bcp14>SHOULD NOT</bcp14> perform a group rekeying, unless already scheduled to occur shortly (see <xref target="sec-key-renewal-request"/>).</t>
          </li>
          <li>
            <t>OPT13: Optionally, specify how the identifier of a group member's authentication credential is included in requests sent to other group members: no such method is defined.</t>
          </li>
          <li>
            <t>OPT14: Optionally, specify additional information to include in rekeying messages for the "Point-to-Point" group rekeying scheme (see <xref section="6" sectionFormat="of" target="RFC9594"/>): no additional information is defined.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="sec-document-updates" removeInRFC="true">
      <name>Document Updates</name>
      <section anchor="sec-00-01">
        <name>Version -00 to -01</name>
        <ul spacing="normal">
          <li>
            <t>Clarified recommendations about randomness and size of nonces.</t>
          </li>
          <li>
            <t>Clarified generation of N_S if TLS is used with the KDC instead of DTLS.</t>
          </li>
          <li>
            <t>Added missing references to REQ and OPT requirements.</t>
          </li>
          <li>
            <t>Updated IANA considerations:  </t>
            <ul spacing="normal">
              <li>
                <t>Suggested values for IANA registrations.</t>
              </li>
              <li>
                <t>Renamed TLS Exporter Label.</t>
              </li>
              <li>
                <t>Fixed content types in the CoAP Content-Formats registrations.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Updated references.</t>
          </li>
          <li>
            <t>Editorial fixes and improvements.</t>
          </li>
        </ul>
      </section>
      <section anchor="sec-00">
        <name>Version -00</name>
        <ul spacing="normal">
          <li>
            <t>Imported content from draft-ietf-ace-pubsub-profile-11.</t>
          </li>
          <li>
            <t>Removed content about MQTT.</t>
          </li>
          <li>
            <t>New document title.</t>
          </li>
        </ul>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors wish to thank <contact fullname="Ari Keränen"/>, <contact fullname="John Preuß Mattsson"/>, <contact fullname="Jim Schaad"/>, <contact fullname="Ludwig Seitz"/>, and <contact fullname="Göran Selander"/> for the useful discussion and reviews that helped shape this document.</t>
      <t>This work was supported by the Sweden's Innovation Agency VINNOVA within the EUREKA CELTIC-NEXT projects CRITISEC and CYPRESS; and by the H2020 project SIFIS-Home (Grant agreement 952652).</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
