<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.3.8) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-ace-coap-pubsub-profile-02" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="ACE CoAP Pub-Sub Profile">CoAP Publish-Subscribe Profile for Authentication and Authorization for Constrained Environments (ACE)</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-ace-coap-pubsub-profile-02"/>
    <author initials="F." surname="Palombini" fullname="Francesca Palombini">
      <organization>Ericsson</organization>
      <address>
        <email>francesca.palombini@ericsson.com</email>
      </address>
    </author>
    <author initials="C." surname="Sengul" fullname="Cigdem Sengul">
      <organization>Brunel University</organization>
      <address>
        <email>csengul@acm.org</email>
      </address>
    </author>
    <author initials="M." surname="Tiloca" fullname="Marco Tiloca">
      <organization>RISE AB</organization>
      <address>
        <email>marco.tiloca@ri.se</email>
      </address>
    </author>
    <date year="2026" month="January" day="08"/>
    <area>Security</area>
    <workgroup>ACE Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 76?>

<t>This document defines an application profile of the Authentication and Authorization for Constrained Environments (ACE) framework, to enable secure group communication in the Publish-Subscribe (Pub-Sub) architecture for the Constrained Application Protocol (CoAP) [draft-ietf-core-coap-pubsub], where Publishers and Subscribers communicate through a Broker. This profile relies on protocol-specific transport profiles of ACE to achieve communication security, server authentication, and proof of possession of a key owned by the Client and bound to an OAuth 2.0 access token. This document specifies the provisioning and enforcement of authorization information for Clients to act as Publishers and/or Subscribers, as well as the provisioning of keying material and security parameters that Clients use for protecting their communications end-to-end through the Broker.</t>
      <t>Note to RFC Editor: Please replace "[draft-ietf-core-coap-pubsub]" with the RFC number of that document and delete this paragraph.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Authentication and Authorization for Constrained Environments Working Group mailing list (ace@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/ace/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/ace-wg/pubsub-profile"/>.</t>
    </note>
  </front>
  <middle>
    <?line 81?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>In a publish-subscribe (Pub-Sub) scenario, devices acting as Publishers and/or Subscribers <!--with limited reachability--> communicate via a Broker that enforces store-and-forward messaging between those. This effectively enables a form of group communication, where all the Publishers and Subscribers participating in the same Pub-Sub topic are considered members of the same application group associated with that topic.</t>
      <t>With a focus on the Pub-Sub architecture defined in <xref target="I-D.ietf-core-coap-pubsub"/> for the Constrained Application Protocol (CoAP) <xref target="RFC7252"/>, this document defines an application profile of the Authentication and Authorization for Constrained Environments (ACE) framework <xref target="RFC9200"/>, which enables Pub-Sub communication where a group of Publishers and Subscribers securely communicate through a Broker using CoAP.</t>
      <t>Building on the message formats and processing defined in <xref target="RFC9594"/>, this document specifies the provisioning and enforcement of authorization information for Clients to act as Publishers and/or Subscribers at the Broker, as well as the provisioning of keying material and security parameters that Clients use for protecting end-to-end their communications via the Broker.</t>
      <t>In order to protect the Pub-Sub operations at the Broker as well as the provisioning of keying material and security parameters, this profile relies on protocol-specific transport profiles of ACE (e.g., <xref target="RFC9202"/>, <xref target="RFC9203"/>, or <xref target="I-D.ietf-ace-edhoc-oscore-profile"/>) to achieve communication security, server authentication, and proof of possession of a key owned by the Client and bound to an OAuth 2.0 access token.</t>
      <t>The content of published messages that are circulated by the Broker is protected end-to-end between the corresponding Publisher and the intended Subscribers. To this end, this profile relies on COSE <xref target="RFC9052"/><xref target="RFC9053"/> and on keying material provided to the Publishers and Subscribers participating in the same Pub-Sub topic. In particular, source authentication of published content is achieved by means of the corresponding Publisher signing such content with its own private key.</t>
      <!--While this profile focuses on the Pub-Sub architecture for CoAP, {{mqtt-pubsub}} of this document describes how this profile can be applicable to MQTT {{MQTT-OASIS-Standard-v5}}. Similar adaptations can also extend to further transport protocols and Pub-Sub architectures.-->

<section anchor="terminology">
        <name>Terminology</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

<t>Readers are expected to be familiar with:</t>
        <ul spacing="normal">
          <li>
            <t>The terms and concepts described in the ACE framework for Authentication and Authorization <xref target="RFC9200"/>. The terminology for entities in the considered architecture is defined in OAuth 2.0 <xref target="RFC6749"/>. In particular, this includes Client, Resource Server (RS), and Authorization Server (AS).</t>
          </li>
          <li>
            <t>The Authorization Information Format (AIF) <xref target="RFC9237"/> used to express authorization information.</t>
          </li>
          <li>
            <t>The terms and concept related to the message formats and processing specified in <xref target="RFC9594"/>, for provisioning and renewing keying material in group communication scenarios. These include the abbreviations REQx and OPTx denoting the numbered mandatory-to-address and optional-to-address requirements, respectively.</t>
          </li>
          <li>
            <t>The terms and concepts described in CDDL <xref target="RFC8610"/>, CBOR <xref target="RFC8949"/>, and COSE <xref target="RFC9052"/><xref target="RFC9053"/><xref target="RFC9338"/>.</t>
          </li>
          <li>
            <t>The terms and concepts described in CoAP <xref target="RFC7252"/>. Note that the term "endpoint" is used here following its OAuth definition <xref target="RFC6749"/>, aimed at denoting resources such as <tt>/token</tt> and <tt>/introspect</tt> at the AS, and <tt>/authz-info</tt> at the RS. The CoAP definition, which is "[a]n entity participating in the CoAP protocol" <xref target="RFC7252"/>, is not used in this document.</t>
          </li>
          <li>
            <t>The terms and concepts of Pub-Sub group communication with CoAP, as described in <xref target="I-D.ietf-core-coap-pubsub"/>.</t>
          </li>
        </ul>
        <t>A party interested in participating in group communication as well as already participating as a group member is interchangeably denoted as "Client", "Pub-Sub client", or "node".</t>
        <ul spacing="normal">
          <li>
            <t>Group: a set of nodes that share common keying material and security parameters to protect their communications with one another. That is, the term refers to a "security group".  </t>
            <t>
This is not to be confused with an "application group", which has relevance at the application level and whose members are in this case the Clients acting as Publishers and/or Subscribers for a topic.</t>
          </li>
        </ul>
        <t>Examples throughout this document are expressed in CBOR diagnostic notation as defined in <xref section="8" sectionFormat="of" target="RFC8949"/> and <xref section="G" sectionFormat="of" target="RFC8610"/>. Diagnostic notation comments are often used to provide a textual representation of the parameters' keys and values.</t>
      </section>
    </section>
    <section anchor="overview">
      <name>Application Profile Overview</name>
      <t>This document describes how to use <xref target="RFC9200"/> and <xref target="RFC9594"/> to perform authentication, authorization, and key distribution operations as overviewed in <xref section="2" sectionFormat="of" target="RFC9594"/>, where the considered group is the security group composed of the Pub-Sub clients that exchange end-to-end protected content through the Broker.</t>
      <t>Pub-Sub clients communicate within their application groups, each of which is mapped to a topic. Depending on the application, a topic may consist of one or more sub-topics, which in turn may have their own sub-topics and so on, thus forming a hierarchy. A security group <bcp14>SHOULD</bcp14> be associated with a single application group. However, the same application group <bcp14>MAY</bcp14> be associated with multiple security groups. Further details and considerations on the mapping between the two types of groups are out of the scope of this document.</t>
      <t>This profile considers the architecture shown in <xref target="archi"/>. A Client can act as a Publisher, or a Subscriber, or both, e.g., by publishing to some topics and subscribing to others. However, for the simplicity of presentation, this profile describes Publisher and Subscriber Clients separately.</t>
      <t>Both Publishers and Subscribers act as ACE Clients. The Broker acts as an ACE RS and corresponds to the Dispatcher in <xref target="RFC9594"/>. The Key Distribution Center (KDC) also acts as an ACE RS and builds on what is defined for the KDC in <xref target="RFC9594"/>. From a high-level point of view, the Clients interact with the KDC in order to join security groups, thereby obtaining the group keying material to protect end-to-end and verify the content published in the associated topics.</t>
      <figure anchor="archi">
        <name>Architecture for Pub-Sub with Authorization Server and Key Distribution Center</name>
        <artset>
          <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="320" width="400" viewBox="0 0 400 320" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 8,224 L 8,304" fill="none" stroke="black"/>
              <path d="M 48,160 L 48,216" fill="none" stroke="black"/>
              <path d="M 80,192 L 80,216" fill="none" stroke="black"/>
              <path d="M 112,32 L 112,112" fill="none" stroke="black"/>
              <path d="M 112,224 L 112,304" fill="none" stroke="black"/>
              <path d="M 192,120 L 192,160" fill="none" stroke="black"/>
              <path d="M 240,32 L 240,112" fill="none" stroke="black"/>
              <path d="M 272,32 L 272,112" fill="none" stroke="black"/>
              <path d="M 288,224 L 288,304" fill="none" stroke="black"/>
              <path d="M 336,120 L 336,192" fill="none" stroke="black"/>
              <path d="M 392,32 L 392,112" fill="none" stroke="black"/>
              <path d="M 392,224 L 392,304" fill="none" stroke="black"/>
              <path d="M 112,32 L 240,32" fill="none" stroke="black"/>
              <path d="M 272,32 L 392,32" fill="none" stroke="black"/>
              <path d="M 112,112 L 240,112" fill="none" stroke="black"/>
              <path d="M 272,112 L 392,112" fill="none" stroke="black"/>
              <path d="M 48,160 L 96,160" fill="none" stroke="black"/>
              <path d="M 144,160 L 192,160" fill="none" stroke="black"/>
              <path d="M 80,192 L 224,192" fill="none" stroke="black"/>
              <path d="M 272,192 L 336,192" fill="none" stroke="black"/>
              <path d="M 8,224 L 112,224" fill="none" stroke="black"/>
              <path d="M 288,224 L 392,224" fill="none" stroke="black"/>
              <path d="M 120,240 L 176,240" fill="none" stroke="black"/>
              <path d="M 224,240 L 280,240" fill="none" stroke="black"/>
              <path d="M 120,272 L 176,272" fill="none" stroke="black"/>
              <path d="M 224,272 L 280,272" fill="none" stroke="black"/>
              <path d="M 8,304 L 112,304" fill="none" stroke="black"/>
              <path d="M 288,304 L 392,304" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="344,120 332,114.4 332,125.6" fill="black" transform="rotate(270,336,120)"/>
              <polygon class="arrowhead" points="288,272 276,266.4 276,277.6" fill="black" transform="rotate(0,280,272)"/>
              <polygon class="arrowhead" points="288,240 276,234.4 276,245.6" fill="black" transform="rotate(0,280,240)"/>
              <polygon class="arrowhead" points="200,120 188,114.4 188,125.6" fill="black" transform="rotate(270,192,120)"/>
              <polygon class="arrowhead" points="128,272 116,266.4 116,277.6" fill="black" transform="rotate(180,120,272)"/>
              <polygon class="arrowhead" points="128,240 116,234.4 116,245.6" fill="black" transform="rotate(180,120,240)"/>
              <polygon class="arrowhead" points="88,216 76,210.4 76,221.6" fill="black" transform="rotate(90,80,216)"/>
              <polygon class="arrowhead" points="56,216 44,210.4 44,221.6" fill="black" transform="rotate(90,48,216)"/>
              <g class="text">
                <text x="176" y="52">Authorization</text>
                <text x="328" y="52">Key</text>
                <text x="172" y="68">Server</text>
                <text x="332" y="68">Distribution</text>
                <text x="172" y="84">(AS)</text>
                <text x="332" y="84">Center</text>
                <text x="328" y="100">(KDC)</text>
                <text x="120" y="164">(A)</text>
                <text x="248" y="196">(B)</text>
                <text x="200" y="244">(O)</text>
                <text x="56" y="260">Pub-Sub</text>
                <text x="340" y="260">Broker</text>
                <text x="52" y="276">Client</text>
                <text x="200" y="276">(C)</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art" align="center"><![CDATA[
             +---------------+   +--------------+
             | Authorization |   |     Key      |
             |    Server     |   | Distribution |
             |     (AS)      |   |    Center    |
             |               |   |    (KDC)     |
             +---------------+   +--------------+
                       ^                 ^
                       |                 |
     +------ (A) ------+                 |
     |                                   |
     |   +------------------ (B) --------+
     v   v
+------------+                     +------------+
|            |<------- (O) ------->|            |
|  Pub-Sub   |                     |   Broker   |
|  Client    |<------- (C) ------->|            |
|            |                     |            |
+------------+                     +------------+
]]></artwork>
        </artset>
      </figure>
      <t>Both Publishers and Subscribers <bcp14>MUST</bcp14> use the same protocol for interacting with the Broker and participating in Pub-Sub communications. When using the profile defined in this document, such a protocol <bcp14>MUST</bcp14> be CoAP <xref target="RFC7252"/>, which is used as described in <xref target="I-D.ietf-core-coap-pubsub"/> (REQ22). <!--What is specified in this document can apply to other protocols for Pub-Sub communications such as MQTT {{MQTT-OASIS-Standard-v5}}, or to further transport protocols-->.</t>
      <t>All Publishers and Subscribers <bcp14>MUST</bcp14> use CoAP when communicating with the KDC.</t>
      <t>Furthermore, both Publishers and Subscribers <bcp14>MUST</bcp14> use the same transport profile of ACE (e.g., <xref target="RFC9202"/> for DTLS; or <xref target="RFC9203"/> or <xref target="I-D.ietf-ace-edhoc-oscore-profile"/> for OSCORE) in their interaction with the Broker. In order to reduce the number of libraries that Clients have to support, it is <bcp14>RECOMMENDED</bcp14> that the same transport profile of ACE is used also for the interaction between the Clients and the KDC (REQ24).</t>
      <t>All communications between the involved entities <bcp14>MUST</bcp14> be secured.</t>
      <t>For each Client, the Client and the Broker <bcp14>MUST</bcp14> have a secure communication association, which they establish with the help of the AS and using a transport profile of ACE. This is shown by the interactions A and C in <xref target="archi"/>. During this process, the Client obtains an access token from the AS and uploads it to the Broker, thus providing an evidence of the topics that it is authorised to participate in, and with which permissions.</t>
      <t>For each Client, the Client and the KDC <bcp14>MUST</bcp14> have a secure communication association, which they also establish with the help of the AS and using a transport profile of ACE (REQ24). This is shown by the interactions A and B in <xref target="archi"/>. During this process, the Client obtains an access token from the AS and uploads it to the KDC, thus providing an evidence of the security groups that it can join, as associated with the topics of interest at the Broker. Based on the permissions specified in the access token, the Client can request the KDC to join a security group, after which the Client obtains from the KDC the keying material to use for communicating with the other group members. This builds on the process for joining security groups with ACE, as defined in <xref target="RFC9594"/> and further specified in this document.</t>
      <t>In addition, this profile allows an anonymous Client to perform some of the discovery operations defined in <xref section="2.3" sectionFormat="of" target="I-D.ietf-core-coap-pubsub"/> through the Broker, as shown by the interaction O in <xref target="archi"/>. That is, an anonymous Client can discover:</t>
      <ul spacing="normal">
        <li>
          <t>the Broker itself, by relying on the resource type "core.ps" (see <xref section="2.3.1" sectionFormat="of" target="I-D.ietf-core-coap-pubsub"/>); and</t>
        </li>
        <li>
          <t>topics of interest at the Broker (i.e., the corresponding topic resources hosted at the Broker), by relying on the resource type "core.ps.conf" (see <xref section="2.3.3" sectionFormat="of" target="I-D.ietf-core-coap-pubsub"/>).</t>
        </li>
      </ul>
      <t>However, an anonymous Client is not allowed to access topic resources at the Broker and obtain from those any additional information or metadata about the corresponding topic (e.g., the topic status, the URI of the topic-data resource where to publish or subscribe for that topic, or the URI to the KDC).</t>
      <t>As highlighted in <xref target="associations"/>, each Client maintains two different security associations pertaining to the Pub-Sub group communication. On the one hand, the Client has a pairwise security association with the Broker, which, as an ACE RS, verifies that the Client is authorised to perform data operations (i.e., publish, subscribe, read, delete) on a certain set of topics (Security Association 1). As discussed above, this security association is set up with the help of the AS and using a transport profile of ACE, when the Client obtains the access token to upload to the Broker.</t>
      <t>On the other hand, separately for each topic, all the Publishers and Subscribers for that topic have a common, group security association, through which the published content sent through the Broker is protected end-to-end (Security Association 2). As discussed above, this security association is set up and maintained as the different Clients request the KDC to join the security group, upon which they obtain from the KDC the corresponding group keying material to use for protecting end-to-end and verifying the content of their Pub-Sub group communication.</t>
      <figure anchor="associations">
        <name>Security Associations between Publisher, Broker, and Subscriber</name>
        <artset>
          <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="240" width="544" viewBox="0 0 544 240" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 8,32 L 8,112" fill="none" stroke="black"/>
              <path d="M 40,120 L 40,208" fill="none" stroke="black"/>
              <path d="M 72,120 L 72,160" fill="none" stroke="black"/>
              <path d="M 104,32 L 104,112" fill="none" stroke="black"/>
              <path d="M 216,32 L 216,112" fill="none" stroke="black"/>
              <path d="M 248,120 L 248,160" fill="none" stroke="black"/>
              <path d="M 288,120 L 288,160" fill="none" stroke="black"/>
              <path d="M 320,32 L 320,112" fill="none" stroke="black"/>
              <path d="M 432,32 L 432,112" fill="none" stroke="black"/>
              <path d="M 464,120 L 464,160" fill="none" stroke="black"/>
              <path d="M 504,120 L 504,208" fill="none" stroke="black"/>
              <path d="M 536,32 L 536,112" fill="none" stroke="black"/>
              <path d="M 8,32 L 104,32" fill="none" stroke="black"/>
              <path d="M 216,32 L 320,32" fill="none" stroke="black"/>
              <path d="M 432,32 L 536,32" fill="none" stroke="black"/>
              <path d="M 8,112 L 104,112" fill="none" stroke="black"/>
              <path d="M 216,112 L 320,112" fill="none" stroke="black"/>
              <path d="M 432,112 L 536,112" fill="none" stroke="black"/>
              <path d="M 72,160 L 112,160" fill="none" stroke="black"/>
              <path d="M 200,160 L 248,160" fill="none" stroke="black"/>
              <path d="M 288,160 L 336,160" fill="none" stroke="black"/>
              <path d="M 424,160 L 464,160" fill="none" stroke="black"/>
              <path d="M 40,208 L 224,208" fill="none" stroke="black"/>
              <path d="M 312,208 L 504,208" fill="none" stroke="black"/>
              <g class="text">
                <text x="56" y="68">Publisher</text>
                <text x="268" y="68">Broker</text>
                <text x="484" y="68">Subscriber</text>
                <text x="156" y="164">Security</text>
                <text x="380" y="164">Security</text>
                <text x="152" y="180">Association</text>
                <text x="208" y="180">1</text>
                <text x="376" y="180">Association</text>
                <text x="432" y="180">1</text>
                <text x="268" y="212">Security</text>
                <text x="264" y="228">Association</text>
                <text x="320" y="228">2</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art" align="center"><![CDATA[
+-----------+             +------------+             +------------+
|           |             |            |             |            |
| Publisher |             |   Broker   |             | Subscriber |
|           |             |            |             |            |
|           |             |            |             |            |
+-----------+             +------------+             +------------+
    |   |                     |    |                     |    |
    |   |                     |    |                     |    |
    |   '----- Security ------'    '------ Security -----'    |
    |        Association 1               Association 1        |
    |                                                         |
    '----------------------- Security ------------------------'
                           Association 2
]]></artwork>
        </artset>
      </figure>
      <t>In summary, this profile specifies the following functionalities.</t>
      <ol spacing="normal" type="1"><li>
          <t>A Client obtains the authorization to participate in a Pub-Sub topic at the Broker with certain permissions. This pertains operations defined in <xref target="I-D.ietf-core-coap-pubsub"/> for taking part in Pub-Sub communication with CoAP.</t>
        </li>
        <li>
          <t>A Client obtains the authorization to join a security group with certain permissions. This allows the Client to obtain from the KDC the group keying material for communicating with other group members, i.e., to protect end-to-end and verify the content published at the Broker on topics associated with the security group.</t>
        </li>
        <li>
          <t>A Client obtains from the KDC the authentication credentials of other group members, and provides or updates the KDC with its own authentication credential.</t>
        </li>
        <li>
          <t>A Client leaves the group or is removed from the group by the KDC.</t>
        </li>
        <li>
          <t>The KDC renews and redistributes the group keying material (rekeying), e.g., due to a membership change in the group.</t>
        </li>
      </ol>
      <t><xref target="groupcomm_requirements"/> compiles the list of requirements for this application profile of ACE and how they are fulfilled, consistently with the list of requirements defined in <xref section="A" sectionFormat="of" target="RFC9594"/>.</t>
    </section>
    <section anchor="authorisation">
      <name>Getting Authorisation to Join a Pub-Sub security group</name>
      <t><xref target="message-flow"/> provides a high level overview of the message flow for a Client getting authorisation to join a group. Square brackets denote optional steps. The message flow is expanded in the subsequent sections.</t>
      <figure anchor="message-flow">
        <name>Authorisation Flow</name>
        <artset>
          <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="576" width="576" viewBox="0 0 576 576" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 16,48 L 16,560" fill="none" stroke="black"/>
              <path d="M 456,48 L 456,152" fill="none" stroke="black"/>
              <path d="M 456,184 L 456,328" fill="none" stroke="black"/>
              <path d="M 456,360 L 456,392" fill="none" stroke="black"/>
              <path d="M 456,424 L 456,448" fill="none" stroke="black"/>
              <path d="M 456,488 L 456,560" fill="none" stroke="black"/>
              <path d="M 520,48 L 520,392" fill="none" stroke="black"/>
              <path d="M 520,424 L 520,456" fill="none" stroke="black"/>
              <path d="M 520,488 L 520,560" fill="none" stroke="black"/>
              <path d="M 560,48 L 560,560" fill="none" stroke="black"/>
              <path d="M 32,64 L 112,64" fill="none" stroke="black"/>
              <path d="M 352,64 L 440,64" fill="none" stroke="black"/>
              <path d="M 32,96 L 160,96" fill="none" stroke="black"/>
              <path d="M 312,96 L 440,96" fill="none" stroke="black"/>
              <path d="M 32,112 L 168,112" fill="none" stroke="black"/>
              <path d="M 304,112 L 440,112" fill="none" stroke="black"/>
              <path d="M 16,160 L 72,160" fill="none" stroke="black"/>
              <path d="M 416,160 L 512,160" fill="none" stroke="black"/>
              <path d="M 24,176 L 72,176" fill="none" stroke="black"/>
              <path d="M 424,176 L 520,176" fill="none" stroke="black"/>
              <path d="M 16,224 L 80,224" fill="none" stroke="black"/>
              <path d="M 384,224 L 448,224" fill="none" stroke="black"/>
              <path d="M 24,240 L 80,240" fill="none" stroke="black"/>
              <path d="M 384,240 L 448,240" fill="none" stroke="black"/>
              <path d="M 32,288 L 48,288" fill="none" stroke="black"/>
              <path d="M 416,288 L 440,288" fill="none" stroke="black"/>
              <path d="M 16,336 L 88,336" fill="none" stroke="black"/>
              <path d="M 408,336 L 512,336" fill="none" stroke="black"/>
              <path d="M 24,352 L 88,352" fill="none" stroke="black"/>
              <path d="M 416,352 L 520,352" fill="none" stroke="black"/>
              <path d="M 16,400 L 104,400" fill="none" stroke="black"/>
              <path d="M 408,400 L 552,400" fill="none" stroke="black"/>
              <path d="M 24,416 L 104,416" fill="none" stroke="black"/>
              <path d="M 408,416 L 552,416" fill="none" stroke="black"/>
              <path d="M 16,464 L 72,464" fill="none" stroke="black"/>
              <path d="M 480,464 L 552,464" fill="none" stroke="black"/>
              <path d="M 24,480 L 104,480" fill="none" stroke="black"/>
              <path d="M 432,480 L 560,480" fill="none" stroke="black"/>
              <path d="M 16,528 L 152,528" fill="none" stroke="black"/>
              <path d="M 304,528 L 448,528" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="560,464 548,458.4 548,469.6" fill="black" transform="rotate(0,552,464)"/>
              <polygon class="arrowhead" points="560,416 548,410.4 548,421.6" fill="black" transform="rotate(0,552,416)"/>
              <polygon class="arrowhead" points="560,400 548,394.4 548,405.6" fill="black" transform="rotate(0,552,400)"/>
              <polygon class="arrowhead" points="520,336 508,330.4 508,341.6" fill="black" transform="rotate(0,512,336)"/>
              <polygon class="arrowhead" points="520,160 508,154.4 508,165.6" fill="black" transform="rotate(0,512,160)"/>
              <polygon class="arrowhead" points="456,528 444,522.4 444,533.6" fill="black" transform="rotate(0,448,528)"/>
              <polygon class="arrowhead" points="456,240 444,234.4 444,245.6" fill="black" transform="rotate(0,448,240)"/>
              <polygon class="arrowhead" points="456,224 444,218.4 444,229.6" fill="black" transform="rotate(0,448,224)"/>
              <polygon class="arrowhead" points="448,288 436,282.4 436,293.6" fill="black" transform="rotate(0,440,288)"/>
              <polygon class="arrowhead" points="448,96 436,90.4 436,101.6" fill="black" transform="rotate(0,440,96)"/>
              <polygon class="arrowhead" points="448,64 436,58.4 436,69.6" fill="black" transform="rotate(0,440,64)"/>
              <polygon class="arrowhead" points="40,288 28,282.4 28,293.6" fill="black" transform="rotate(180,32,288)"/>
              <polygon class="arrowhead" points="40,112 28,106.4 28,117.6" fill="black" transform="rotate(180,32,112)"/>
              <polygon class="arrowhead" points="40,64 28,58.4 28,69.6" fill="black" transform="rotate(180,32,64)"/>
              <polygon class="arrowhead" points="32,480 20,474.4 20,485.6" fill="black" transform="rotate(180,24,480)"/>
              <polygon class="arrowhead" points="32,416 20,410.4 20,421.6" fill="black" transform="rotate(180,24,416)"/>
              <polygon class="arrowhead" points="32,352 20,346.4 20,357.6" fill="black" transform="rotate(180,24,352)"/>
              <polygon class="arrowhead" points="32,240 20,234.4 20,245.6" fill="black" transform="rotate(180,24,240)"/>
              <polygon class="arrowhead" points="32,176 20,170.4 20,181.6" fill="black" transform="rotate(180,24,176)"/>
              <g class="text">
                <text x="28" y="36">Client</text>
                <text x="460" y="36">Broker</text>
                <text x="524" y="36">AS</text>
                <text x="560" y="36">KDC</text>
                <text x="24" y="68">[</text>
                <text x="160" y="68">Discovery</text>
                <text x="212" y="68">of</text>
                <text x="248" y="68">Topic</text>
                <text x="308" y="68">Resource</text>
                <text x="448" y="68">]</text>
                <text x="24" y="100">[</text>
                <text x="204" y="100">Resource</text>
                <text x="272" y="100">Request</text>
                <text x="448" y="100">]</text>
                <text x="24" y="116">[</text>
                <text x="188" y="116">AS</text>
                <text x="248" y="116">Information</text>
                <text x="448" y="116">]</text>
                <text x="136" y="164">Authorisation</text>
                <text x="224" y="164">Request</text>
                <text x="300" y="164">(Audience:</text>
                <text x="376" y="164">Broker)</text>
                <text x="136" y="180">Authorisation</text>
                <text x="228" y="180">Response</text>
                <text x="308" y="180">(Audience:</text>
                <text x="384" y="180">Broker)</text>
                <text x="116" y="228">Upload</text>
                <text x="156" y="228">of</text>
                <text x="224" y="228">authorisation</text>
                <text x="328" y="228">information</text>
                <text x="144" y="244">Establishment</text>
                <text x="212" y="244">of</text>
                <text x="252" y="244">secure</text>
                <text x="328" y="244">association</text>
                <text x="24" y="292">[</text>
                <text x="96" y="292">Discovery</text>
                <text x="148" y="292">of</text>
                <text x="176" y="292">KDC</text>
                <text x="208" y="292">and</text>
                <text x="244" y="292">name</text>
                <text x="276" y="292">of</text>
                <text x="324" y="292">security</text>
                <text x="384" y="292">group</text>
                <text x="448" y="292">]</text>
                <text x="152" y="340">Authorisation</text>
                <text x="240" y="340">Request</text>
                <text x="316" y="340">(Audience:</text>
                <text x="380" y="340">KDC)</text>
                <text x="152" y="356">Authorisation</text>
                <text x="244" y="356">Response</text>
                <text x="324" y="356">(Audience:</text>
                <text x="388" y="356">KDC)</text>
                <text x="140" y="404">Upload</text>
                <text x="180" y="404">of</text>
                <text x="248" y="404">authorisation</text>
                <text x="352" y="404">information</text>
                <text x="168" y="420">Establishment</text>
                <text x="236" y="420">of</text>
                <text x="276" y="420">secure</text>
                <text x="352" y="420">association</text>
                <text x="112" y="468">Request</text>
                <text x="156" y="468">to</text>
                <text x="188" y="468">join</text>
                <text x="224" y="468">the</text>
                <text x="276" y="468">security</text>
                <text x="336" y="468">group</text>
                <text x="376" y="468">for</text>
                <text x="408" y="468">the</text>
                <text x="448" y="468">topic</text>
                <text x="140" y="484">Keying</text>
                <text x="204" y="484">material</text>
                <text x="256" y="484">for</text>
                <text x="288" y="484">the</text>
                <text x="340" y="484">security</text>
                <text x="400" y="484">group</text>
                <text x="196" y="532">Resource</text>
                <text x="264" y="532">Request</text>
                <text x="176" y="548">(Publication/Subscription</text>
                <text x="292" y="548">to</text>
                <text x="320" y="548">the</text>
                <text x="364" y="548">topic)</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art" align="center"><![CDATA[
Client                                                Broker    AS  KDC
 |                                                      |       |    |
 |[<---------- Discovery of Topic Resource ----------->]|       |    |
 |                                                      |       |    |
 |[----------------- Resource Request ---------------->]|       |    |
 |[<----------------- AS Information ------------------]|       |    |
 |                                                      |       |    |
 |                                                      |       |    |
 +------- Authorisation Request (Audience: Broker) ------------>|    |
 |<------ Authorisation Response (Audience: Broker) ------------+    |
 |                                                      |       |    |
 |                                                      |       |    |
 +-------- Upload of authorisation information -------->|       |    |
 |<------- Establishment of secure association -------->|       |    |
 |                                                      |       |    |
 |                                                      |       |    |
 |[<-- Discovery of KDC and name of security group --->]|       |    |
 |                                                      |       |    |
 |                                                      |       |    |
 +--------- Authorisation Request (Audience: KDC) ------------->|    |
 |<-------- Authorisation Response (Audience: KDC) -------------+    |
 |                                                      |       |    |
 |                                                      |       |    |
 +----------- Upload of authorisation information ------------------>|
 |<---------- Establishment of secure association ------------------>|
 |                                                      |       |    |
 |                                                      |       |    |
 +------- Request to join the security group for the topic --------->|
 |<---------- Keying material for the security group ----------------+
 |                                                      |       |    |
 |                                                      |       |    |
 +----------------- Resource Request ------------------>|       |    |
 |       (Publication/Subscription to the topic)        |       |    |
 |                                                      |       |    |
]]></artwork>
        </artset>
      </figure>
      <t>As shown in <xref target="message-flow"/>, after a Client obtains authorisation information for participating in a Pub-Sub topic with name TOPICNAME (see <xref target="auth-request"/> and <xref target="as-response"/>), the Client uploads that information to the Broker as per the specific transport profile of ACE used, e.g., <xref target="RFC9202"/> or <xref target="RFC9203"/>.</t>
      <t>Following that, the Client can perform the optional discovery of the KDC and security group name at the Broker, by accessing the topic resource corresponding to the topic in question (see <xref target="kdc-discovery"/>).</t>
      <t>In order to ensure that the Client can seamlessly access the right topic resource at the Broker, it is <bcp14>RECOMMENDED</bcp14> that a Broker implementing this application profile uses the path /ps/TOPICNAME to host the topic resource for the topic with name TOPICNAME. Alternatively, the Client might not know the right topic resource to target and thus would attempt to access different ones (e.g., based on the result of an early discovery of topic resources, see <xref target="topic-discovery"/>), until it finds the right one specifying TOPICNAME as value of the 'topic-name' parameter in the resource representation.</t>
      <t>Separately, after the Client obtains authorisation information for joining the security group at the KDC (see <xref target="auth-request"/> and <xref target="as-response"/>), the Client uploads that information to the KDC (see <xref target="token-post"/>). Following that, the Client can join the security group at the KDC and thus obtain the corresponding keying material (see <xref target="join"/>).</t>
      <t>Once the steps above have been completed, the Client can take part in the secure group communication for the topic TOPICNAME, e.g., by publishing data to the topic through a request targeting the topic-data resource at the Broker.</t>
      <t>Note that the overview in <xref target="message-flow"/> shows the specific sequence of steps where the Client: first associates with the Broker for participating in a topic; then discovers the KDC and the name of the security group through the Broker; and finally associates with the KDC, through which it joins the security group. However, if the Client is early aware about how to reach the KDC and about the name of the security group, the Client can instead: first associate with the KDC and join the security group, and then associate with the Broker for participating in the topic.</t>
      <t>Since <xref target="RFC9200"/> recommends the use of CoAP and CBOR, this document describes the exchanges assuming that CoAP and CBOR are used. However, using HTTP instead of CoAP is possible, by leveraging the corresponding parameters and methods. Analogously, JSON <xref target="RFC8259"/> can be used instead of CBOR, by relying on the conversion method specified in Sections <xref target="RFC8949" section="6.1" sectionFormat="bare"/> and <xref target="RFC8949" section="6.2" sectionFormat="bare"/> of <xref target="RFC8949"/>. In case JSON is used, the Content-Format of the message has to be specified accordingly. Exact definitions of these exchanges are out of scope for this document.</t>
      <section anchor="topic-discovery">
        <name>Topic Discovery at the Broker (Optional)</name>
        <t>The discovery of a topic at the Broker can be performed by discovering the corresponding topic resource hosted at the Broker. For example, the Client can send a lookup request to /.well-known/core at the Broker, specifying as lookup criterion the resource type "core.ps.conf" (see <xref section="2.3.3" sectionFormat="of" target="I-D.ietf-core-coap-pubsub"/>).</t>
        <t>Although the links to the topic resources are also specified in the representation of the collection resource at the Broker (see <xref section="2.4" sectionFormat="of" target="I-D.ietf-core-coap-pubsub"/>), the Client is not supposed to access such a resource, as intended for administrative operations that are out of the scope of this document.</t>
      </section>
      <section anchor="AS-discovery">
        <name>AS Discovery at the Broker (Optional)</name>
        <t>Complementary to what is defined in <xref section="5.1" sectionFormat="of" target="RFC9200"/> for AS discovery, the Broker <bcp14>MAY</bcp14> send the address of the AS to the Client in the 'AS' parameter of the AS Request Creation Hints, as a response to an Unauthorised Resource Request (see <xref section="5.2" sectionFormat="of" target="RFC9200"/>). An example using the CBOR diagnostic notation and CoAP is given below.</t>
        <figure anchor="AS-info-ex">
          <name>AS Request Creation Hints Example</name>
          <artwork align="left"><![CDATA[
    4.01 Unauthorized
    Content-Format: 19 (application/ace+cbor)
    Payload:
    {
     / AS / 1 : "coaps://as.example.com/token"
    }
]]></artwork>
        </figure>
      </section>
      <section anchor="kdc-discovery">
        <name>KDC Discovery at the Broker (Optional)</name>
        <t>Once a Client has obtained an access token from the AS and accordingly established a secure association with the Broker, the Client has the permission to access the topic resources at the Broker that pertain to the topics on which the Client is authorised to operate.</t>
        <t>In particular the Client is authorised to retrieve the representation of a topic resource, from which the Client can retrieve information related to the topic in question, as specified in <xref section="2.5" sectionFormat="of" target="I-D.ietf-core-coap-pubsub"/>.</t>
        <t>This profile extends the set of CoAP Pub-Sub Parameters that is possible to specify within the representation of a topic resource, as originally defined in <xref section="3" sectionFormat="of" target="I-D.ietf-core-coap-pubsub"/>. In particular, this profile defines the following two parameters that the Broker can specify in a response to a request that targets a topic resource (see <xref section="2.5" sectionFormat="of" target="I-D.ietf-core-coap-pubsub"/>). Note that, when these parameters are transported in their respective fields of the message payload, the Content-Format "application/core-pubsub+cbor" defined in <xref target="I-D.ietf-core-coap-pubsub"/> <bcp14>MUST</bcp14> be used.</t>
        <ul spacing="normal">
          <li>
            <t>'kdc_uri', with value the URI of the group-membership resource at the KDC, where Clients can send a request to join the security group associated with the topic in question. The URI is encoded as a CBOR text string. Clients will have to obtain an access token from the AS to upload to the KDC, before starting the process to join the security group at the KDC.</t>
          </li>
          <li>
            <t>'sec_gp', specifying the name of the security group associated with the topic in question, as a stable and invariant identifier. The name of the security group is encoded as a CBOR text string.</t>
          </li>
        </ul>
        <t>Furthermore, the Resource Type (rt=) Link Target Attribute value "core.ps.gm" is registered in <xref target="core_rt"/> (REQ10), and can be used to describe group-membership resources at the KDC, e.g., by using a CoRE link-format document <xref target="RFC6690"/>. As an alternative to the discovery approach defined above and provided by the Broker, applications can use this common resource type to discover links to group-membership resources at the KDC for joining security groups associated with Pub-Sub topics.</t>
      </section>
      <section anchor="auth-request">
        <name>Authorisation Request/Response for the KDC and the Broker</name>
        <t>A Client sends two Authorisation Requests to the AS, targeting two different audiences, i.e., the Broker and the KDC.</t>
        <t>As to the former, the AS handles Authorisation Requests related to a topic for which the Client is allowed to perform topic data operations at the Broker, as corresponding to an application group.</t>
        <t>As to the latter, the AS handles Authorization Requests for security groups that the Client is allowed to join, in order to obtain the group keying material for protecting end-to-end and verifying the content of exchanged messages on the associated Pub-Sub topics.</t>
        <t>This section builds on <xref section="3" sectionFormat="of" target="RFC9594"/> and defines only additions or modifications to that specification.</t>
        <t>Both Authorisation Requests include the following fields (see <xref section="3.1" sectionFormat="of" target="RFC9594"/>):</t>
        <ul spacing="normal">
          <li>
            <t>'scope': Optional. If present, it specifies the following information, depending on the specifically targeted audience.  </t>
            <t>
If the audience is the Broker, the scope specifies the names of the topics that the Client wishes to access, together with the corresponding requested permissions.  </t>
            <t>
If the audience is the KDC, the scope specifies the names of the security groups that the Client wishes to join, together with the corresponding requested permissions.  </t>
            <t>
This parameter is encoded as a CBOR byte string, whose value is the binary encoding of a CBOR array. The format of the encoded scope <bcp14>MUST</bcp14> follow the data model AIF-PUBSUB-GROUPCOMM defined in <xref target="scope"/>.  </t>
            <t>
The textual format specified in <xref section="3.1" sectionFormat="of" target="RFC9594"/> is not used in this application profile (OPT1).</t>
          </li>
          <li>
            <t>'audience': Required identifier corresponding to either the Broker or the KDC.</t>
          </li>
        </ul>
        <t>Other additional parameters can be included if necessary, as defined in <xref target="RFC9200"/>.</t>
        <t>When using this profile, it is expected that a one-to-one mapping is enforced between the application group and the security group (see <xref target="overview"/>). If this is not the case, the correct access policies for both sets of scopes have to be available to the AS.</t>
        <section anchor="scope">
          <name>Format of Scope</name>
          <t>Building on <xref section="3.1" sectionFormat="of" target="RFC9594"/>, this section defines the exact format and encoding of scope used in this profile.</t>
          <t>To this end, this profile uses the Authorization Information Format (AIF) <xref target="RFC9237"/> (REQ1). With reference to the generic AIF model</t>
          <artwork><![CDATA[
      AIF-Generic<Toid, Tperm> = [* [Toid, Tperm]]
]]></artwork>
          <t>the value of the CBOR byte string used as scope encodes the CBOR array [* [Toid, Tperm]], where each [Toid, Tperm] element corresponds to one scope entry.</t>
          <t>Furthermore, this document defines the new AIF data model AIF-PUBSUB-GROUPCOMM that this profile <bcp14>MUST</bcp14> use to format and encode scope entries.</t>
          <t>In particular, the following holds for each scope entry.</t>
          <t>The object identifier ("Toid") is specialized as a CBOR data item specifying the name of the group pertaining to the scope entry.</t>
          <t>The permission set ("Tperm") is specialized as a CBOR unsigned integer with value R, specifying the permissions that the Client wishes to have in the group indicated by "Toid".</t>
          <t>More specifically, the following applies when, as defined in this document, a scope entry includes a set of permissions for user-related operations performed by a Pub-Sub Client.</t>
          <ul spacing="normal">
            <li>
              <t>The object identifier ("Toid") is a CBOR text string, specifying the name of one application group (topic) or of the corresponding security group to which the scope entry pertains.</t>
            </li>
            <li>
              <t>The permission set ("Tperm") is a CBOR unsigned integer, whose value R specifies the operations that the Client wishes to or has been authorised to perform on the resources at the Broker associated with the application group (topic) indicated by "Toid", or on the resources at the KDC associated with the security group indicated by "Toid" (REQ1). The value R is computed as follows.  </t>
              <ul spacing="normal">
                <li>
                  <t>Each operation (i.e., permission detail) in the permission set is converted into the corresponding numeric identifier X taken from the following set.      </t>
                  <ul spacing="normal">
                    <li>
                      <t>Admin (0): This operation is reserved for scope entries that express permissions for Administrators of Pub-Sub groups, which are not specified in this document.</t>
                    </li>
                    <li>
                      <t>AppGroup (1): This operation is indicated as wished/authorised when "Toid" specifies the name of an application group (topic), while it is indicated as not wished/authorised when Toid specifies the name of a security group.</t>
                    </li>
                    <li>
                      <t>Publish (2): This operation concerns the publication of data to the topic in question, performed by means of a PUT request sent by a Publisher Client to the corresponding topic-data resource at the Broker.</t>
                    </li>
                    <li>
                      <t>Read (3): This operation concerns both: i) the subscription at the topic-data resource for the topic in question at the Broker, performed by means of a GET request with the CoAP Observe Option set to 0 and sent by a Subscriber Client; and ii) the simple reading of the latest data published to the topic in question, performed by means of a simple GET request sent to the same topic-data resource.</t>
                    </li>
                    <li>
                      <t>Delete (4): This operation concerns the deletion of the topic-data resource for the topic in question at the Broker, performed by means of a DELETE request sent to that resource.          </t>
                      <t>
If a Client wishes to have authorised only the Delete operation on an application group, then the Client does not need to join the corresponding security group, hence it does not need to request an access token for interacting with the KDC.          </t>
                      <t>
If a Client wishes to have authorised the Delete operation on a security group, then the AS and the KDC ignore the wish for that operation when processing the scope entry in question.</t>
                    </li>
                  </ul>
                </li>
                <li>
                  <t>The set of N numeric identifiers is converted into the single value R, by taking two to the power of each numeric identifier X_1, X_2, ..., X_N, and then computing the inclusive OR of the binary representations of all the power values.</t>
                </li>
              </ul>
              <t>
Since this application profile considers user-related operations, the "Admin" operation is indicated as not wished/authorised. That is, the scope entries <bcp14>MUST</bcp14> have the least significant bit of "Tperm" set to 0.</t>
            </li>
          </ul>
          <t>If the "Toid" of a scope entry in an access token specifies the name of an application group (i.e., the "AppGroup" operation is indicated as authorised), the Client has also the permission to retrieve the configuration of the application group (topic) whose name is indicated by "Toid", by sending a GET or FETCH request to the corresponding topic resource at the Broker.</t>
          <t>The specific interactions between the Client and the Broker are defined in <xref target="I-D.ietf-core-coap-pubsub"/>.</t>
          <t>The following CDDL <xref target="RFC8610"/> notation defines a scope entry that uses the AIF-PUBSUB-GROUPCOMM data model and expresses a set of permissions.</t>
          <figure anchor="scope-aif">
            <name>Pub-Sub scope using the AIF format</name>
            <artwork align="center"><![CDATA[
  AIF-PUBSUB-GROUPCOMM = AIF-Generic<pubsub-group, pubsub-perm>
   pubsub-group = tstr ; name of Pub-Sub topic or of
                       ; the associated security group

   pubsub-perm = uint .bits pubsub-perm-details

   pubsub-perm-details = &(
    Admin: 0,
    AppGroup: 1,
    Publish: 2,
    Read: 3,
    Delete: 4
   )

   scope_entry = [pubsub-group, pubsub-perm]
]]></artwork>
          </figure>
          <t>As per the guidelines in <xref target="RFC9237"/>, <xref target="aif"/> and <xref target="content_formats"/> register the specific instance of "Toid" and "Tperm" as media type parameters and a corresponding Content-Format (REQ2).</t>
        </section>
      </section>
      <section anchor="as-response">
        <name>Authorization response</name>
        <t>The AS responds with an Authorization Response as defined in <xref section="5.8.2" sectionFormat="of" target="RFC9200"/> and <xref section="3.2" sectionFormat="of" target="RFC9594"/>, with the following additions:</t>
        <ul spacing="normal">
          <li>
            <t>In the Authorization Response, the AS <bcp14>MUST</bcp14> include the 'expires_in' parameter.</t>
          </li>
          <li>
            <t>In the Authorization Response, the AS <bcp14>MUST</bcp14> include the 'scope' parameter, when the value included in the access token differs from the one specified by the Client in the Authorization Request.  In such a case, the second element of each scope entry specifies the set of operations that the Client is authorised for that scope entry, encoded as specified in <xref target="auth-request"/>.</t>
          </li>
        </ul>
        <t>Furthermore, the AS <bcp14>MAY</bcp14> use the extended format of scope defined in <xref section="7" sectionFormat="of" target="RFC9594"/> for the 'scope' claim of the access token. In such a case, the AS <bcp14>MUST</bcp14> use the CBOR tag with tag number TAG_NUMBER, associated with the CoAP Content-Format CF_ID for the media type "application/aif+cbor" registered in <xref target="content_formats"/> of this document (REQ28).</t>
        <t>Note to RFC Editor: In the previous paragraph, please replace "TAG_NUMBER" with the CBOR tag number computed as TN(ct) in <xref section="4.3" sectionFormat="of" target="RFC9277"/>, where ct is the ID assigned to the CoAP Content-Format registered in <xref target="content_formats"/> of this document.  Then, please replace "CF_ID" with the ID assigned to that CoAP Content-Format.  Finally, please delete this paragraph.</t>
        <t>This indicates that the binary encoded scope follows the scope semantics defined for this application profile in <xref target="scope"/> of this document.</t>
      </section>
      <section anchor="token-post">
        <name>Token Transfer to the KDC</name>
        <t>The Client transfers its access token to the KDC using one of the methods defined in the <xref section="3.3" sectionFormat="of" target="RFC9594"/>. This typically includes sending a POST request to the /authz-info endpoint. However, if the DTLS transport profile of ACE <xref target="RFC9202"/> is used and the Client uses a symmetric proof-of-possession (PoP) key in the DTLS handshake, the Client <bcp14>MAY</bcp14> provide the access token to the KDC in the "psk_identity" field of the DTLS ClientKeyExchange message when using DTLS 1.2 <xref target="RFC6347"/>, or in the "identity" field of a PskIdentity within the PreSharedKeyExtension of the ClientHello message when using DTLS 1.3 <xref target="RFC9147"/>. In addition to that, the following applies.</t>
        <t>In the Token Transfer Response to the Publishers, i.e., the Clients whose scope of the access token includes the "Publish" permission for at least one scope entry, the KDC <bcp14>MUST</bcp14> include the parameter 'kdcchallenge' in the CBOR map. 'kdcchallenge' is a nonce N_S generated by the KDC. As to the N_S value, it is <bcp14>RECOMMENDED</bcp14> to be at least 8-byte long and it is <bcp14>RECOMMENDED</bcp14> to be a random value. Later when joining the group, the Publisher can use the 'kdcchallenge' nonce as part of proving possession of its private key (see <xref target="RFC9594"/>). If a Publisher provides the access token to the KDC through an /authz-info endpoint, the Client <bcp14>MUST</bcp14> support the parameter 'kdcchallenge' (REQ30).</t>
        <t>If 'sign_info' is included in the Token Transfer Request, the KDC <bcp14>SHOULD</bcp14> include the 'sign_info' parameter in the Token Transfer Response. Note that the joining node may have obtained such information by alternative means, e.g., the 'sign_info' may have been pre-configured (OPT3).</t>
        <t>The following applies for each element 'sign_info_entry'.</t>
        <ul spacing="normal">
          <li>
            <t>'sign_alg' <bcp14>MUST</bcp14> take its value from the "Value" column of one of the recommended algorithms in the "COSE Algorithms" registry <xref target="IANA.cose_algorithms"/> (REQ3).</t>
          </li>
          <li>
            <t>'sign_parameters' is a CBOR array.  Its format and value are the same of the COSE capabilities array for the algorithm indicated in 'sign_alg' under the "Capabilities" column of the "COSE Algorithms" registry <xref target="IANA.cose_algorithms"/> (REQ4).</t>
          </li>
          <li>
            <t>'sign_key_parameters' is a CBOR array.  Its format and value are the same of the COSE capabilities array for the COSE key type of the keys used with the algorithm indicated in 'sign_alg', as specified for that key type in the "Capabilities" column of the "COSE Key Types" registry <xref target="IANA.cose_key-type"/> (REQ5).</t>
          </li>
          <li>
            <t>'cred_fmt' takes value from the "Label" column of the "COSE Header Parameters" registry <xref target="IANA.cose_header-parameters"/> (REQ6). Acceptable values denote a format of authentication credential that <bcp14>MUST</bcp14> explicitly provide the public key as well as the comprehensive set of information related to the public key algorithm, including, e.g., the used elliptic curve (when applicable).  </t>
            <t>
Acceptable formats of authentication credentials include CBOR Web Tokens (CWTs) and CWT Claims Sets (CCSs) <xref target="RFC8392"/>, X.509 certificates <xref target="RFC7925"/>, and C509 certificates <xref target="I-D.ietf-cose-cbor-encoded-cert"/>. Future formats would be acceptable to use as long as they comply with the criteria defined above.</t>
          </li>
        </ul>
        <t>This application profile does not define additional parameters to be used in the exchange of Token Transfer Request and Response (OPT2).</t>
      </section>
    </section>
    <section anchor="kdc-interface">
      <name>Client Group Communication Interface at the KDC</name>
      <t>In order to enable secure group communication for the Pub-Sub Clients, the KDC provides the resources listed in <xref target="tab-kdc-resources"/>.</t>
      <t>The entry of each resource specifies the CoAP methods by means of which it is admitted to access that resource, for nodes with different roles in the group or as non members. Except for accessing the /ace-group resource with the FETCH method (to retrieve security group names through their group identifiers) and the /ace-group/GROUPNAME resource with the POST method (to join the security group with name GROUPNAME), all other operations are admitted only to current members of the security group with name GROUPNAME (REQ11).</t>
      <t>Each resource is marked as <bcp14>REQUIRED</bcp14> or <bcp14>OPTIONAL</bcp14> to be hosted at the KDC (REQ9).</t>
      <table align="center" anchor="tab-kdc-resources">
        <name>Resources at the KDC</name>
        <thead>
          <tr>
            <th align="left">KDC resource</th>
            <th align="left">Description</th>
            <th align="left">Operations</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">/ace-group</td>
            <td align="left">
              <bcp14>REQUIRED</bcp14>. Contains a set of group names, each corresponding to one of the specified group identifiers.</td>
            <td align="left">FETCH (All Clients)</td>
          </tr>
          <tr>
            <td align="left">/ace-group/GROUPNAME</td>
            <td align="left">
              <bcp14>REQUIRED</bcp14>. Contains symmetric group keying material associated with GROUPNAME.</td>
            <td align="left">GET, POST (All Clients)</td>
          </tr>
          <tr>
            <td align="left">/ace-group/GROUPNAME/creds</td>
            <td align="left">
              <bcp14>REQUIRED</bcp14>. Contains the authentication credentials of all the Publishers of the group with name GROUPNAME.</td>
            <td align="left">GET, FETCH (All Clients)</td>
          </tr>
          <tr>
            <td align="left">/ace-group/GROUPNAME/num</td>
            <td align="left">
              <bcp14>REQUIRED</bcp14>. Contains the current version number for the symmetric group keying material of the group with name GROUPNAME.</td>
            <td align="left">GET (All Clients)</td>
          </tr>
          <tr>
            <td align="left">/ace-group/GROUPNAME/nodes/NODENAME</td>
            <td align="left">
              <bcp14>REQUIRED</bcp14>. Contains the group keying material for that group member NODENAME in GROUPNAME.</td>
            <td align="left">GET, DELETE (All Clients). POST (Publishers).</td>
          </tr>
          <tr>
            <td align="left">/ace-group/GROUPNAME/nodes/NODENAME/cred</td>
            <td align="left">
              <bcp14>REQUIRED</bcp14>. Authentication credential for NODENAME in the group GROUPNAME.</td>
            <td align="left">POST (Publishers)</td>
          </tr>
          <tr>
            <td align="left">/ace-group/GROUPNAME/kdc-cred</td>
            <td align="left">
              <bcp14>REQUIRED</bcp14> if a group re-keying mechanism is used. Contains the authentication credential of the KDC for the group with name GROUPNAME.</td>
            <td align="left">GET (All Clients)</td>
          </tr>
          <tr>
            <td align="left">/ace-group/GROUPNAME/policies</td>
            <td align="left">
              <bcp14>OPTIONAL</bcp14>. Contains the group policies of the group with name GROUPNAME.</td>
            <td align="left">GET (All Clients)</td>
          </tr>
        </tbody>
      </table>
      <t>The use of these resources follows what is defined in <xref target="RFC9594"/>, and only additions or modifications to that specification are defined in this document. With respect to <xref target="RFC9594"/>, this document does not define new operations for Clients interacting with the KDC (REQ12).</t>
      <t>Consistent with what is defined in <xref section="4.1.2" sectionFormat="of" target="RFC9594"/>, some error responses from the KDC can convey error-specific information according to the problem-details format specified in <xref target="RFC9290"/>. This application profile does not define additional identifiers of error types as values of the 'error-id' field within the Custom Problem Detail entry 'ace-groupcomm-error' (OPT5).</t>
      <section anchor="join">
        <name>Joining a Security Group</name>
        <t>This section describes the interactions between a Client and the KDC to join a security group. Source authentication of a message sent within the group is ensured by means of a digital signature embedded in the message. Subscribers must be able to retrieve Publishers' authentication credentials from a trusted repository, to verify source authentication of received messages. Hence, on joining a security group, a Publisher is expected to provide its own authentication credential to the KDC.</t>
        <t>On a successful join, the Clients receive from the KDC the symmetric COSE Key <xref target="RFC9052"/> that is used as the shared group key to protect the payload of a published topic data.</t>
        <t>The message exchange between the joining node and the KDC follows what is defined in <xref section="4.3.1.1" sectionFormat="of" target="RFC9594"/>, and only additions or modifications to that specification are defined in this document.</t>
        <figure anchor="join-flow">
          <name>Join Flow</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="144" width="320" viewBox="0 0 320 144" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 32,48 L 32,112" fill="none" stroke="black"/>
                <path d="M 304,48 L 304,112" fill="none" stroke="black"/>
                <path d="M 32,64 L 72,64" fill="none" stroke="black"/>
                <path d="M 248,64 L 296,64" fill="none" stroke="black"/>
                <path d="M 40,96 L 72,96" fill="none" stroke="black"/>
                <path d="M 256,96 L 304,96" fill="none" stroke="black"/>
                <polygon class="arrowhead" points="304,64 292,58.4 292,69.6" fill="black" transform="rotate(0,296,64)"/>
                <polygon class="arrowhead" points="48,96 36,90.4 36,101.6" fill="black" transform="rotate(180,40,96)"/>
                <g class="text">
                  <text x="28" y="36">Client</text>
                  <text x="304" y="36">KDC</text>
                  <text x="100" y="68">Join</text>
                  <text x="152" y="68">Request</text>
                  <text x="212" y="68">(CoAP)</text>
                  <text x="100" y="100">Join</text>
                  <text x="156" y="100">Response</text>
                  <text x="220" y="100">(CoAP)</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
   Client                              KDC
      |                                 |
      +----- Join Request (CoAP) ------>|
      |                                 |
      |<---- Join Response (CoAP) ------+
      |                                 |
]]></artwork>
          </artset>
        </figure>
        <section anchor="join-request">
          <name>Join Request</name>
          <t>After establishing a secure communication association with the KDC, the Client sends a Join Request to the KDC as described in <xref section="4.3" sectionFormat="of" target="RFC9594"/>. More specifically, the Client sends a POST request to the /ace-group/GROUPNAME endpoint, with Content-Format "application/ace-groupcomm+cbor". The payload contains the following information formatted as a CBOR map, which <bcp14>MUST</bcp14> be encoded as defined in <xref section="4.3.1" sectionFormat="of" target="RFC9594"/>:</t>
          <ul spacing="normal">
            <li>
              <t>'scope': It <bcp14>MUST</bcp14> be present and its value <bcp14>MUST</bcp14> indicate the group that the Client is attempting to join, i.e., the group name, and the permissions that the Client wishes to have in the group. This value corresponds to one scope entry, as defined in <xref target="scope"/>.</t>
            </li>
            <li>
              <t>'get_creds': It <bcp14>MAY</bcp14> be present if the Client wishes to join as a Subscriber and wants to retrieve the public keys of all the Publishers upon joining. Otherwise, this parameter <bcp14>MUST NOT</bcp14> be present. If the parameter is present, the parameter <bcp14>MUST</bcp14> encode the CBOR simple value <tt>null</tt> (0xf6). Note that the parameter 'role_filter' is not necessary, as the KDC returns the authentication credentials of Publishers by default.</t>
            </li>
            <li>
              <t>'client_cred': The use of this parameter is detailed in <xref target="client_cred"/>.</t>
            </li>
            <li>
              <t>'cnonce': It specifies a dedicated nonce N_C generated by the Client. As to the N_C value, it is <bcp14>RECOMMENDED</bcp14> to be at least 8-byte long and it is <bcp14>RECOMMENDED</bcp14> to be a random value. Join Requests include a new 'cnonce' at each join attempt.</t>
            </li>
            <li>
              <t>'client_cred_verify': The use of this parameter is detailed in <xref target="pop"/>.</t>
            </li>
          </ul>
          <t>As a Publisher Client has its own authentication credential to use in a group, it <bcp14>MUST</bcp14> support the 'client_cred', 'cnonce', and 'client_cred_verify' parameters (REQ30).</t>
          <t>For this application profile, the 'creds_repo' parameter is not relevant, since the KDC always acts as repository of the Publishers' authentication credentials. Consequently, no encoding is defined for this parameter (OPT6).</t>
          <t>This application profile does not define the functionalities that are implemented at the resource possibly hosted by the Client at the URI indicated in the 'control_uri' parameter (OPT7), if included in the Join Request.</t>
          <section anchor="client_cred">
            <name>Client Credential in 'client_cred'</name>
            <t>One of the following cases can occur when a new Client attempts to join a security group.</t>
            <ul spacing="normal">
              <li>
                <t>The joining node is not a Publisher, i.e., it is not going to send data to the application group.  In this case, the joining node is not required to provide its own authentication credential to the KDC. In case the joining node still provides an authentication credential in the 'client_cred' parameter of the Join Request (see <xref target="join-request"/>), the KDC silently ignores that parameter, as well as the related parameter 'client_cred_verify'.</t>
              </li>
              <li>
                <t>The joining node wishes to join as a Publisher and the KDC has not previously acquired an authentication credential of the joining node. Then, the joining node <bcp14>MUST</bcp14> provide a compatible authentication credential in the 'client_cred' parameter of the Join Request (see <xref target="join-request"/>).</t>
              </li>
              <li>
                <t>The joining node wishes to join as a Publisher and the KDC already acquired the authentication credential of the joining node, either during a past group joining process or when establishing a secure communication association using asymmetric proof-of-possession keys.  </t>
                <t>
If the joining node's proof-of-possession key is compatible with the signature algorithm used in the security group and with possible associated parameters, then the corresponding authentication credential can be used in the group. In this case, the joining node <bcp14>MAY</bcp14> choose not to provide again its authentication credential to the KDC in order to limit the size of the Join Request.</t>
              </li>
            </ul>
            <t>The joining node <bcp14>MUST</bcp14> provide the KDC with its own authentication credential again, if it has previously provided the KDC with multiple authentication credentials intended for different security groups.</t>
            <t>If the joining node provides its authentication credential, the KDC performs the consistency checks above and, in case of success, considers it as the authentication credential associated with the joining node in the group.</t>
          </section>
          <section anchor="pop">
            <name>Proof of Possession through 'client_cred_verify'</name>
            <t>The 'client_cred_verify' parameter contains the proof-of-possession evidence and is computed as defined below (REQ14).</t>
            <t>The Publisher signs the scope, concatenated with N_S and further concatenated with N_C, by using the private key corresponding to the public key that is specified in the 'client_cred' parameter.</t>
            <t>The N_S may be either of the following:</t>
            <ul spacing="normal">
              <li>
                <t>The nonce received from the KDC in the 'kdcchallenge' parameter of the 2.01 (Created) response to the Token Transfer Request (see <xref target="token-post"/>).</t>
              </li>
              <li>
                <t>If the provisioning of the access token to the KDC has relied on the DTLS profile of ACE <xref target="RFC9202"/> and the access token was specified in the "psk_identity" field of the ClientKeyExchange message when using DTLS 1.2 <xref target="RFC6347"/>, then N_S is an exporter value computed as defined in <xref section="4" sectionFormat="of" target="RFC5705"/> (REQ15).  </t>
                <t>
Specifically, N_S is exported from the DTLS session between the joining node and the KDC, using an empty context value (i.e., a context value of zero-length), 32 as length value in bytes, and the exporter label "EXPORTER-ACE-Sign-Challenge-coap-pubsub-app" defined in <xref target="tls_exporter"/> of this document.  </t>
                <t>
The same as above holds if TLS 1.2 <xref target="RFC5246"/> was used instead of DTLS 1.2, as per <xref target="RFC9430"/>.</t>
              </li>
              <li>
                <t>If the provisioning of the access token to the KDC has relied on the DTLS profile of ACE <xref target="RFC9202"/> and the access token was specified in the "identity" field of a PskIdentity within the PreSharedKeyExtension of the ClientHello message when using DTLS 1.3 <xref target="RFC9147"/>, then N_S is an exporter value computed as defined in <xref section="7.5" sectionFormat="of" target="RFC8446"/> (REQ15).  </t>
                <t>
Specifically, N_S is exported from the DTLS session between the joining node and the KDC, using an empty 'context_value' (i.e., a 'context_value' of zero length), 32 as 'key_length' in bytes, and the exporter label "EXPORTER-ACE-Sign-Challenge-coap-pubsub-app" defined in <xref target="tls_exporter"/> of this document.  </t>
                <t>
The same as above holds if TLS 1.3 <xref target="RFC8446"/> was used instead of DTLS 1.3, as per <xref target="RFC9430"/>.</t>
              </li>
              <li>
                <t>If the Join Request is a retry in response to an error response from the KDC, which included a new 'kdcchallenge' parameter, then N_S <bcp14>MUST</bcp14> be the new value from this parameter.</t>
              </li>
            </ul>
            <t>It is up to applications or future specifications to define how N_S is computed in further alternative settings.</t>
          </section>
        </section>
        <section anchor="join-response">
          <name>Join Response</name>
          <t>Upon receiving the Join Request, the KDC processes it as defined in <xref section="4.3.1" sectionFormat="of" target="RFC9594"/> and returns a success or error response.</t>
          <t>If the 'client_cred' parameter is present, the KDC verifies the signature in the 'client_cred_verify' parameter. As PoP input, the KDC uses the value of the 'scope' parameter from the Join Request as a CBOR byte string, concatenated with N_S encoded as a CBOR byte string, concatenated with N_C encoded as a CBOR byte string.</t>
          <t>As public key of the joining node, the KDC uses either the one included in the authentication credential retrieved from the 'client_cred' parameter of the Join Request, or the one from the already stored authentication credential from previous interactions with the joining node. The KDC verifies the signature used as PoP evidence by means of the public key of the joining node, according to the signature algorithm used in the group and possible corresponding parameters.</t>
          <t>In case of any Join Request error, the KDC and the joining node follow the procedure defined in <xref target="join-error"/>.</t>
          <t>In case of success, the KDC responds with a Join Response, whose payload is formatted as a CBOR map and <bcp14>MUST</bcp14> contain the following fields as per <xref section="4.3.1" sectionFormat="of" target="RFC9594"/>:</t>
          <ul spacing="normal">
            <li>
              <t>'gkty': this field specifies the key type "Group_PubSub_Keying_Material" (REQ18) registered in <xref target="iana-ace-groupcomm-key"/> for the 'key' parameter.</t>
            </li>
            <li>
              <t>'key': this field specifies the keying material to use for secure communication in the group (REQ17). This field has as value a CBOR map that includes the following parameters.  </t>
              <ul spacing="normal">
                <li>
                  <t>'group_key': this parameter is identified by the CBOR unsigned integer 0 used as map key. Its value is a COSE_Key object as defined in <xref target="RFC9052"/> and conveying the group key to use in the security group.      </t>
                  <t>
The COSE_Key object <bcp14>MUST</bcp14> contain the following parameters:      </t>
                  <ul spacing="normal">
                    <li>
                      <t>'kty', with value 4 (Symmetric).</t>
                    </li>
                    <li>
                      <t>'alg', with value the identifier of the AEAD algorithm used in the security group. The value is taken from the "Value" column of the "COSE Algorithms" registry <xref target="IANA.cose_algorithms"/>.</t>
                    </li>
                    <li>
                      <t>'Base IV', with value the Base Initialization Vector (Base IV) to use in the security group with this group key.</t>
                    </li>
                    <li>
                      <t>'k', with value the symmetric encryption key to use as group key.</t>
                    </li>
                    <li>
                      <t>'kid', with value the identifier of the COSE_Key object, hence of the group key.          </t>
                      <t>
This value is used as Group Identifier (Gid) of the security group, as long as the present key is used as group key in the security group. Consistent with the CBOR type of the 'kid' parameter, the Gid of the security group is encoded as a CBOR byte string (REQ13).</t>
                    </li>
                  </ul>
                </li>
                <li>
                  <t>'group_SenderId': this parameter is identified by the CBOR unsigned integer 1 used as map key. Its value is the Client's Sender ID encoded as a CBOR byte string. This parameter <bcp14>MUST</bcp14> be included if the Client is joining the security group as a Publisher and <bcp14>MUST NOT</bcp14> be included otherwise. A Publisher Client <bcp14>MUST</bcp14> support the 'group_SenderId' parameter (REQ29).      </t>
                  <t>
The Sender ID <bcp14>MUST</bcp14> be unique within the security group. The KDC <bcp14>MUST</bcp14> only assign an available Sender ID that has not been used in the security group since the last time when the current Gid value was assigned to the group (i.e., since the latest group rekeying, see <xref target="rekeying"/>). The KDC <bcp14>MUST NOT</bcp14> assign a Sender ID to the joining node if the node is not joining the group as a Publisher.      </t>
                  <t>
The Sender ID can be short in length. Its maximum length in bytes is the length in bytes of the AEAD nonce for the AEAD algorithm, minus 6. This means that, when using AES-CCM-16-64-128 as AEAD algorithm in the security group, the maximum length of Sender IDs is 7 bytes.</t>
                </li>
                <li>
                  <t>'cred_fmt': this parameter is identified by the CBOR unsigned integer 2 used as map key. Its value specifies the format of authentication credentials used in the group and is taken from the "Label" column of the "COSE Header Parameters" registry <xref target="IANA.cose_header-parameters"/>.      </t>
                  <t>
At the time of writing this specification, acceptable formats of authentication credentials are CBOR Web Tokens (CWTs) and CWT Claims Sets (CCSs) <xref target="RFC8392"/>, X.509 certificates <xref target="RFC7925"/>, and C509 certificates <xref target="I-D.ietf-cose-cbor-encoded-cert"/>. Further formats may be available in the future and would be acceptable to use as long as they comply with the criteria defined above (REQ6).</t>
                </li>
                <li>
                  <t>'sign_alg': this parameter is identified by the CBOR unsigned integer 3 used as map key. Its value specifies the Signature Algorithm used to sign messages in the group and is taken from the "Value" column of the "COSE Algorithms" registry <xref target="IANA.cose_algorithms"/>.</t>
                </li>
                <li>
                  <t>'sign_params': this parameter is identified by the CBOR unsigned integer 4 used as map key. Its value specifies the parameters of the Signature Algorithm and is encoded as a CBOR array including the following two elements:      </t>
                  <ul spacing="normal">
                    <li>
                      <t>'sign_alg_capab' is a CBOR array, with the same format and value of the COSE capabilities array for the Signature Algorithm indicated in 'sign_alg', as specified for that algorithm in the "Capabilities" column of the "COSE Algorithms" registry <xref target="IANA.cose_algorithms"/>.</t>
                    </li>
                    <li>
                      <t>'sign_key_type_capab' is a CBOR array, with the same format and value of the COSE capabilities array for the COSE key type of the keys used with the Signature Algorithm indicated in 'sign_alg', as specified for that key type in the "Capabilities" column of the "COSE Key Types" registry <xref target="IANA.cose_key-type"/>.</t>
                    </li>
                  </ul>
                </li>
              </ul>
            </li>
            <li>
              <t>'num', specifying the version number of the keying material specified in the 'key' field. The initial value of the version number <bcp14>MUST</bcp14> be set to 0 upon creating the group (REQ16).</t>
            </li>
            <li>
              <t>'exi', which <bcp14>MUST</bcp14> be present.</t>
            </li>
            <li>
              <t>'ace_groupcomm_profile', which <bcp14>MUST</bcp14> be present and has value "coap_group_pubsub_app" (PROFILE_TBD), which is registered in <xref target="iana-profile"/> (REQ19).</t>
            </li>
            <li>
              <t>'creds', which <bcp14>MUST</bcp14> be present if the 'get_creds' parameter was present in the Join Request and <bcp14>MUST NOT</bcp14> be present otherwise. It specifies the authentication credentials of all the Publishers in the security group.</t>
            </li>
            <li>
              <t>'peer_roles', which <bcp14>MAY</bcp14> be omitted even if 'creds' is present, since: i) each authentication credential conveyed in the 'creds' parameter is associated with a Client authorised to be Publisher in the group; and ii) it is irrelevant whether such a Client is also authorised to be Subscriber in the group. If 'creds' is not present, 'peer_roles' <bcp14>MUST NOT</bcp14> be present.</t>
            </li>
            <li>
              <t>'peer_identifiers', which <bcp14>MUST</bcp14> be present if 'creds' is also present and <bcp14>MUST NOT</bcp14> be present otherwise. The identifiers are the Publisher Sender IDs, whose corresponding authentication credentials are specified in the 'creds' parameter (REQ25).</t>
            </li>
            <li>
              <t>'kdc_cred', which <bcp14>MUST</bcp14> be present if group re-keying is used. It is encoded as a CBOR byte string, with value the original binary representation of the KDC's authentication credential (REQ8).</t>
            </li>
            <li>
              <t>'kdc_nonce', which <bcp14>MUST</bcp14> be present if 'kdc_cred' is present. It is encoded as a CBOR byte string, with value a dedicated nonce N_KDC generated by the KDC. As to the N_KDC value, it is <bcp14>RECOMMENDED</bcp14> to be at least 8-byte long and it is <bcp14>RECOMMENDED</bcp14> to be a random value.</t>
            </li>
            <li>
              <t>'kdc_cred_verify', which <bcp14>MUST</bcp14> be present if 'kdc_cred' is present. It is encoded as a CBOR byte string. The KDC <bcp14>MUST</bcp14> compute the specified PoP evidence as a signature by using the signature algorithm used in the group, as well as its own private key associated with the authentication credential specified in the 'kdc_cred' parameter (REQ21).</t>
            </li>
            <li>
              <t>'group_rekeying', which <bcp14>MAY</bcp14> be omitted if the KDC uses the "Point-to-Point" group rekeying scheme registered in <xref section="11.13" sectionFormat="of" target="RFC9594"/> as the default rekeying scheme in the group (OPT9). In any other case, the 'group_rekeying' parameter <bcp14>MUST</bcp14> be included.</t>
            </li>
          </ul>
          <t>The 'group_policies' parameter is not expected to be included in the Join Response (REQ20). This application profile does not define the functionalities that are possibly implemented at the resource hosted by the Client at the URI indicated in the 'control_group_uri' parameter (OPT10), if included in the Join Response.</t>
          <t>After sending a successful Join Response, the KDC adds the Client to the list of current members of the security group, if that Client is not already a group member. Also, the Client is assigned a name NODENAME and a sub-resource /ace-group/GROUPNAME/nodes/NODENAME at the KDC. Furthermore, the KDC associates NODENAME with the Client's access token and with the secure communication association that the KDC has with the Client. If the Client is a Publisher, its authentication credential is also associated with the tuple containing NODENAME, GROUPNAME, the current Gid, the newly assigned Publisher's Sender ID, and the Client's access token. The KDC <bcp14>MUST</bcp14> keep this association updated over time.</t>
          <t>Note that, as long as the secure communication association between the Client and the KDC persists, the same Client re-joining the group is recognized by the KDC by virtue of such a secure communication association. As a consequence, the re-joining Client keeps the same NODENAME and the associated subresource /ace-group/GROUPNAME/nodes/NODENAME. Also, if the Client is a Publisher, it receives a new Sender ID according to the same criteria defined above.</t>
          <t>If the application requires backward security, the KDC <bcp14>MUST</bcp14> generate updated security parameters and group keying material, and provide it to the current group members upon the new node's joining (see <xref target="rekeying"/>). In such a case, the joining node is not able to access secure communication in the Pub-Sub group prior to its joining.</t>
          <t>Upon receiving the Join Response, the joining node retrieves the KDC's authentication credential from the 'kdc_cred' parameter (if present). The joining node <bcp14>MUST</bcp14> verify the signature used as PoP evidence, which is specified by the 'kdc_cred_verify' parameter of the Join Response (REQ21).</t>
        </section>
        <section anchor="join-error">
          <name>Join Error Handling</name>
          <t>The KDC <bcp14>MUST</bcp14> reply with a 4.00 (Bad Request) error response (OPT4) to the Join Request in the following cases:</t>
          <ul spacing="normal">
            <li>
              <t>The 'client_cred' parameter is present in the Join Request and its value is not an eligible authentication credential (e.g., it is not of the format accepted in the group) (OPT8).</t>
            </li>
            <li>
              <t>The 'client_cred' parameter is present, but the 'cnonce' and 'client_cred_verify' parameters are not present.</t>
            </li>
            <li>
              <t>The 'client_cred' parameter is not present while the joining node is not requesting to join the group exclusively as a Subscriber, and any of the following conditions holds:  </t>
              <ul spacing="normal">
                <li>
                  <t>The KDC does not store an eligible authentication credential for the joining node (e.g., of the format accepted in the group).</t>
                </li>
                <li>
                  <t>The KDC stores multiple eligible authentication credentials for the joining node (e.g., of the format accepted in the group).</t>
                </li>
              </ul>
            </li>
            <li>
              <t>The 'scope' parameter is not present in the Join Request, or it is present and specifies any set of permissions not included in the list defined in <xref target="scope"/>.</t>
            </li>
          </ul>
          <t>A 4.00 (Bad Request) error response from the KDC to the joining node <bcp14>MAY</bcp14> have content format "application/ace-groupcomm+cbor" and contain a CBOR map as payload.</t>
          <t>The CBOR map <bcp14>MAY</bcp14> include the 'kdcchallenge' parameter. If present, this parameter is a CBOR byte string, with value a newly generated 'kdcchallenge' value that the Client can use when preparing a new Join Request. In such a case, the KDC <bcp14>MUST</bcp14> store the newly generated value as the 'kdcchallenge' value associated with the joining node, which replaces the currently stored value (if any).</t>
          <t>Upon receiving the Join Response, if 'kdc_cred' is present but the Client cannot verify the PoP evidence, the Client <bcp14>MUST</bcp14> stop processing the Join Response and <bcp14>MAY</bcp14> send a new Join Request to the KDC.</t>
          <t>The KDC <bcp14>MUST</bcp14> return a 5.03 (Service Unavailable) error response to a Client that sends a Join Request to join the security group as Publisher, in case there are currently no Sender IDs available to assign. The response <bcp14>MUST</bcp14> have Content-Format set to "application/concise-problem-details+cbor" and is formatted as defined in <xref section="4.1.2" sectionFormat="of" target="RFC9594"/>. Within the Custom Problem Detail entry 'ace-groupcomm-error', the value of the 'error-id' field <bcp14>MUST</bcp14> be set to 4 ("No available individual keying material").</t>
        </section>
      </section>
      <section anchor="other-group-operations-through-the-kdc">
        <name>Other Group Operations through the KDC</name>
        <section anchor="query">
          <name>Obtaining Latest Information on the Group, Group Keying Material, and Sender ID</name>
          <t>A Client can access the following resources at the KDC, in order to retrieve latest information about the group or the group keying material.</t>
          <ul spacing="normal">
            <li>
              <t>'/ace-group': All Clients can send a FETCH request to retrieve a set of group names associated with their group identifiers specified in the request payload. Each element of the CBOR array 'gid' is a CBOR byte string (REQ13), which encodes the Gid of the group (see <xref target="join-response"/>) for which the group name and the URI to the group-membership resource are provided in the returned response.</t>
            </li>
            <li>
              <t>'/ace-group/GROUPNAME':  All group member Clients can send a GET request to retrieve the symmetric group keying material of the group with the name GROUPNAME. The value of the GROUPNAME URI path and the group name in the access token scope ('gname') <bcp14>MUST</bcp14> coincide (REQ7).  </t>
              <t>
The KDC processes the Key Distribution Request according to <xref section="4.3.2" sectionFormat="of" target="RFC9594"/>. The Key Distribution Response is formatted as defined in <xref section="4.3.2" sectionFormat="of" target="RFC9594"/>, with the following additions.  </t>
              <ul spacing="normal">
                <li>
                  <t>The 'key' field is formatted as defined in <xref target="join-response"/> of this document, with the difference that it does not include the 'group_SenderId' parameter.</t>
                </li>
                <li>
                  <t>The 'exi' field <bcp14>MUST</bcp14> be present.</t>
                </li>
                <li>
                  <t>The 'ace_groupcomm_profile' field <bcp14>MUST</bcp14> be present and has value "coap_group_pubsub_app" (PROFILE_TBD).</t>
                </li>
              </ul>
              <t>
Upon receiving the Key Distribution Response, the requesting group member retrieves the updated security parameters and group keying material. If they differ from the currently stored ones, then the group member uses the received ones thereafter for the security processing of published topic data, i.e., for encryption operations when acting as Publisher and for decryption operations when acting as Subscriber.  </t>
              <t>
This application profile does not specify policies that instruct group members to retain messages and for how long, if those messages are unsuccessfully decrypted (OPT11).</t>
            </li>
            <li>
              <t>'/ace-group/GROUPNAME/creds': The KDC acts as a repository of authentication credentials for the Publishers that are member of the security group with name GROUPNAME. The members of the group that are Subscribers can send GET/FETCH requests to this resource in order to retrieve the authentication credentials of all or a subset of the group members that are Publishers. The KDC silently ignores the Sender IDs included in the 'get_creds' parameter of the request that are not associated with any current Publisher group member (REQ26).  </t>
              <t>
The response from the KDC <bcp14>MAY</bcp14> omit the parameter 'peer_roles', since: i) each authentication credential conveyed in the 'creds' parameter is associated with a Client authorised to be Publisher in the group; and ii) it is irrelevant whether such a Client is also authorised to be Subscriber in the group. If 'creds' is not present, 'peer_roles' <bcp14>MUST NOT</bcp14> be present.</t>
            </li>
            <li>
              <t>'/ace-group/GROUPNAME/num': All group member Clients can send a GET request to this resource in order to retrieve the current version number for the symmetric group keying material of the group with name GROUPNAME.</t>
            </li>
            <li>
              <t>'/ace-group/GROUPNAME/kdc-cred': All group member Clients can send a GET request to this resource in order to retrieve the current authentication credential of the KDC.</t>
            </li>
            <li>
              <t>'/ace-group/GROUPNAME/nodes/NODENAME': A group member can send a Key Distribution Request to the KDC by sending a GET request to this resource to retrieve the latest group keying material as well as its Sender ID that it has in the group (if Publisher).  </t>
              <t>
The KDC processes the Key Distribution Request according to <xref section="4.8.1" sectionFormat="of" target="RFC9594"/>. The Key Distribution Response is formatted as defined in <xref section="4.8.1" sectionFormat="of" target="RFC9594"/>, with the following additions.  </t>
              <ul spacing="normal">
                <li>
                  <t>The 'key' field is formatted as defined in <xref target="join-response"/> of this document. If the requesting group member is not a Publisher Client, then the 'key' field does not include the 'group_SenderId' parameter.</t>
                </li>
                <li>
                  <t>The 'exi' field <bcp14>MUST</bcp14> be present.</t>
                </li>
              </ul>
              <t>
Upon receiving the Key Distribution Response, the group member retrieves the updated security parameters, group keying material, and Sender ID (if the 'key' field includes the 'group_SenderId' parameter). If they differ from the currently stored ones, then the group member uses the received ones thereafter for the security processing of published topic data, i.e., for encryption operations when acting as Publisher and for decryption operations when acting as Subscriber.  </t>
              <t>
This application profile does not specify policies that instruct group members to retain messages and for how long, if those messages are unsuccessfully decrypted (OPT11).</t>
            </li>
          </ul>
        </section>
        <section anchor="sec-key-renewal-request">
          <name>Requesting a New Sender ID</name>
          <t>A Publisher group member with node name NODENAME may at some point exhaust its Sender Sequence Numbers used for protecting its published topic data (see <xref target="oscon"/>).</t>
          <t>When this happens, the Publisher <bcp14>MUST</bcp14> send a Key Renewal Request message to the KDC, as per <xref section="4.8.2.1" sectionFormat="of" target="RFC9594"/>. That is, it sends a CoAP POST request to the endpoint /ace-group/GROUPNAME/nodes/NODENAME at the KDC.</t>
          <t>Upon receiving the Key Renewal Request, the KDC processes it as defined in <xref section="4.8.2" sectionFormat="of" target="RFC9594"/>, with the addition that the KDC takes one of the following actions.</t>
          <ul spacing="normal">
            <li>
              <t>The KDC rekeys the group. That is, the KDC generates new group keying material for that group (see <xref target="rekeying"/>) and replies to the Publisher with a group rekeying message as defined in <xref target="rekeying"/>, providing the new group keying material. Then, the KDC rekeys the rest of the group, as discussed in <xref target="rekeying"/>.  </t>
              <t>
The KDC <bcp14>SHOULD</bcp14> perform a group rekeying if one is already scheduled to occur within a time frame that is acceptably short, as per application-specific policies at the KDC. For instance, a group rekeying could be already upcoming in accordance with an application-specific rekeying period or scheduling, or as a reaction to a recent change in the group membership. If a group rekeying is not already scheduled to occur within an acceptably short time frame, the KDC <bcp14>SHOULD NOT</bcp14> rekey the group when receiving a Key Renewal Request (OPT12).</t>
            </li>
            <li>
              <t>The KDC determines and assigns a new Sender ID for the Publisher (REQ27), and it replies with a Key Renewal Response formatted as defined in <xref section="4.8.2" sectionFormat="of" target="RFC9594"/>. The CBOR Map in the response payload includes only the parameter 'group_SenderId' registered in <xref section="16.3" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm-oscore"/>, which specifies the new Sender ID of the Publisher encoded as a CBOR byte string (REQ27).  </t>
              <t>
The KDC <bcp14>MUST</bcp14> assign a new Sender ID that has not been used in the group since the latest time when the current Gid value was assigned to the group (i.e., since the latest group rekeying, see <xref target="rekeying"/>).  </t>
              <t>
The KDC <bcp14>MUST</bcp14> return a 5.03 (Service Unavailable) error response in case there are currently no Sender IDs available to assign in the group. The response <bcp14>MUST</bcp14> have Content-Format set to "application/concise-problem-details+cbor" and is formatted as defined in <xref section="4.1.2" sectionFormat="of" target="RFC9594"/>. Within the Custom Problem Detail entry 'ace-groupcomm-error', the value of the 'error-id' field <bcp14>MUST</bcp14> be set to 4 ("No available individual keying material").</t>
            </li>
          </ul>
        </section>
        <section anchor="updating-authentication-credentials">
          <name>Updating Authentication Credentials</name>
          <t>A Publisher group member with node name NODENAME can contact the KDC to upload a new authentication credential to use in the security group with name GROUPNAME, and replace the currently stored one.</t>
          <t>To this end, the Publisher sends a CoAP POST request to its associated sub-resource /ace-group/GROUPNAME/nodes/NODENAME/cred at the KDC (see <xref section="4.9.1" sectionFormat="of" target="RFC9594"/>).</t>
          <t>Following a successful processing of the request, the KDC replaces the stored authentication credential of this Client for the group GROUPNAME with the one specified in the request.</t>
          <t>This application profile does not specify a method for the group member to provide other group members with the identifier of its new authentication credential (OPT13).</t>
        </section>
        <section anchor="sec-group-leaving">
          <name>Leaving a Group</name>
          <t>A group member with node name NODENAME can actively request to leave the security group with name GROUPNAME.</t>
          <t>To this end, the Client sends a CoAP DELETE request to the associated sub-resource /ace-group/GROUPNAME/nodes/NODENAME at the KDC (see <xref section="4.8.3" sectionFormat="of" target="RFC9594"/>).</t>
          <t>The KDC can also remove a group member due to any of the reasons described in <xref section="5" sectionFormat="of" target="RFC9594"/>.</t>
        </section>
      </section>
    </section>
    <section anchor="rekeying">
      <name>Group Rekeying Process</name>
      <t>Rekeying a group consists in the KDC generating and distributing a new symmetric key, which is used as group key from then on to protect the publication of topic data with COSE (see <xref target="oscon"/>).</t>
      <t>The KDC <bcp14>MUST</bcp14> trigger a group rekeying as described in <xref section="6" sectionFormat="of" target="RFC9594"/>, upon a change in the group membership or due to the current group keying material approaching its expiration time. In addition, the KDC <bcp14>MAY</bcp14> perform regularly scheduled group rekeying executions.</t>
      <t>Upon generating the new group key and before starting its distribution:</t>
      <ul spacing="normal">
        <li>
          <t>The KDC <bcp14>MUST</bcp14> increment the version number of the group keying material.</t>
        </li>
        <li>
          <t>The KDC <bcp14>MUST</bcp14> generate a new Group Identifier (Gid) for the group. This is used as the identifier of the new group key, when providing it to the current group members through the group rekeying and to Clients (re-)joining the security group thereafter (see <xref target="join-response"/>).  </t>
          <t>
That is, the value of the new Gid is specified by the 'kid' parameter of the COSE_Key Object that is used to encode the new group key.</t>
        </li>
      </ul>
      <t>When rekeying the group, the KDC <bcp14>MUST</bcp14> preserve the current value of the Sender ID of each member in that group.</t>
      <t>The default rekeying scheme is "Point-to-Point" (see <xref section="6.1" sectionFormat="of" target="RFC9594"/>), according to which the KDC individually targets each node to rekey, using the pairwise secure communication association with that node.</t>
      <t>In particular, a group rekeying message <bcp14>MUST</bcp14> have Content-Format set to "application/ace-groupcomm+cbor" and have the same format used for the Join Response message defined in <xref target="join-response"/>, with the following differences:</t>
      <ul spacing="normal">
        <li>
          <t>Within the 'key' field, only the parameter 'group_key' is present.</t>
        </li>
        <li>
          <t>The fields 'kdc_cred' ,'kdc_nonce', 'kdc_cred_verify', and 'group_rekeying' are not present.</t>
        </li>
        <li>
          <t>The fields 'creds' and 'peer_identifiers' <bcp14>SHOULD</bcp14> be present, if the group rekeying is performed due to one or multiple Clients joining the group as Publishers. Following the same semantics used in the Join Response message, the two parameters specify the authentication credentials and Sender IDs of such Clients. Like in the Join Response message, the 'peer_roles' parameter <bcp14>MAY</bcp14> be omitted.</t>
        </li>
      </ul>
      <t>This application profile does not define additional information to include in rekeying messages for the "Point-to-Point" group rekeying scheme (OPT14).</t>
    </section>
    <section anchor="protected_communication">
      <name>Pub-Sub Protected Communication</name>
      <t>In the diagram shown in <xref target="pubsub-3"/>, (D) corresponds to the publication on a topic at the Broker, by using a CoAP PUT request. The Publisher protects the published topic data end-to-end for the Subscribers by using COSE (<xref target="RFC9052"/><xref target="RFC9053"/><xref target="RFC9338"/>), as detailed in <xref target="oscon"/>.</t>
      <t>In the same diagram, (E) corresponds to the subscription of a Subscriber to the same topic, by means of a CoAP GET request with the Observe option set to 0 (register) <xref target="RFC7641"/>, as per <xref target="I-D.ietf-core-coap-pubsub"/>. Finally, (F) corresponds to the Observe notification response from the Broker to the Subscriber, where the published topic data is conveyed as originally protected end-to-end with COSE by the Publisher.</t>
      <figure anchor="pubsub-3">
        <name>Secure Pub-Sub Communication between Publisher and Subscriber</name>
        <artset>
          <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="176" width="520" viewBox="0 0 520 176" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 8,32 L 8,160" fill="none" stroke="black"/>
              <path d="M 104,32 L 104,160" fill="none" stroke="black"/>
              <path d="M 216,32 L 216,160" fill="none" stroke="black"/>
              <path d="M 288,32 L 288,160" fill="none" stroke="black"/>
              <path d="M 408,32 L 408,160" fill="none" stroke="black"/>
              <path d="M 512,32 L 512,160" fill="none" stroke="black"/>
              <path d="M 8,32 L 104,32" fill="none" stroke="black"/>
              <path d="M 216,32 L 288,32" fill="none" stroke="black"/>
              <path d="M 408,32 L 512,32" fill="none" stroke="black"/>
              <path d="M 120,64 L 136,64" fill="none" stroke="black"/>
              <path d="M 184,64 L 200,64" fill="none" stroke="black"/>
              <path d="M 304,96 L 328,96" fill="none" stroke="black"/>
              <path d="M 376,96 L 392,96" fill="none" stroke="black"/>
              <path d="M 304,128 L 328,128" fill="none" stroke="black"/>
              <path d="M 376,128 L 392,128" fill="none" stroke="black"/>
              <path d="M 8,160 L 104,160" fill="none" stroke="black"/>
              <path d="M 216,160 L 288,160" fill="none" stroke="black"/>
              <path d="M 408,160 L 512,160" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="400,128 388,122.4 388,133.6" fill="black" transform="rotate(0,392,128)"/>
              <polygon class="arrowhead" points="312,96 300,90.4 300,101.6" fill="black" transform="rotate(180,304,96)"/>
              <polygon class="arrowhead" points="208,64 196,58.4 196,69.6" fill="black" transform="rotate(0,200,64)"/>
              <g class="text">
                <text x="160" y="68">(D)</text>
                <text x="56" y="100">Publisher</text>
                <text x="252" y="100">Broker</text>
                <text x="352" y="100">(E)</text>
                <text x="460" y="100">Subscriber</text>
                <text x="352" y="132">(F)</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art" align="center"><![CDATA[
+-----------+             +--------+              +------------+
|           |             |        |              |            |
|           | --- (D) --> |        |              |            |
|           |             |        |              |            |
| Publisher |             | Broker | <--- (E) --- | Subscriber |
|           |             |        |              |            |
|           |             |        | ---- (F) --> |            |
|           |             |        |              |            |
+-----------+             +--------+              +------------+
]]></artwork>
        </artset>
      </figure>
      <t><xref target="flow"/> provides a more detailed example of such a secure Pub-Sub communication. All the messages exchanged between a Client and the Broker are protected with the secure communication association between that Client and the Broker. In addition, COSE is used to protect end-to-end the published topic data, which is conveyed in a PUT request from the Publisher to the topic-data resource at the Broker and in a 2.05 (Content) response from that resource to a Subscriber.</t>
      <t>The example also shows a delete operation, where the Publisher deletes the topic-data resource by sending a CoAP DELETE request to the URI of that resource. In case of success, the Broker replies with a 2.02 (Deleted) response. Consequently, the Broker also unsubscribes all the Clients subscribed to that topic-data resource, by removing them from the list of observers and sending them a final 4.04 (Not Found) error response as per <xref section="3.2" sectionFormat="of" target="RFC7641"/>.</t>
      <figure anchor="flow">
        <name>Example of Secure Pub-Sub Communication using CoAP</name>
        <artset>
          <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="320" width="568" viewBox="0 0 568 320" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 8,48 L 8,304" fill="none" stroke="black"/>
              <path d="M 296,48 L 296,304" fill="none" stroke="black"/>
              <path d="M 560,48 L 560,304" fill="none" stroke="black"/>
              <path d="M 8,64 L 40,64" fill="none" stroke="black"/>
              <path d="M 256,64 L 288,64" fill="none" stroke="black"/>
              <path d="M 16,96 L 64,96" fill="none" stroke="black"/>
              <path d="M 184,96 L 296,96" fill="none" stroke="black"/>
              <path d="M 304,128 L 320,128" fill="none" stroke="black"/>
              <path d="M 544,128 L 560,128" fill="none" stroke="black"/>
              <path d="M 296,176 L 344,176" fill="none" stroke="black"/>
              <path d="M 464,176 L 552,176" fill="none" stroke="black"/>
              <path d="M 8,224 L 24,224" fill="none" stroke="black"/>
              <path d="M 272,224 L 288,224" fill="none" stroke="black"/>
              <path d="M 16,256 L 48,256" fill="none" stroke="black"/>
              <path d="M 168,256 L 296,256" fill="none" stroke="black"/>
              <path d="M 296,288 L 344,288" fill="none" stroke="black"/>
              <path d="M 480,288 L 552,288" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="560,288 548,282.4 548,293.6" fill="black" transform="rotate(0,552,288)"/>
              <polygon class="arrowhead" points="560,176 548,170.4 548,181.6" fill="black" transform="rotate(0,552,176)"/>
              <polygon class="arrowhead" points="312,128 300,122.4 300,133.6" fill="black" transform="rotate(180,304,128)"/>
              <polygon class="arrowhead" points="296,224 284,218.4 284,229.6" fill="black" transform="rotate(0,288,224)"/>
              <polygon class="arrowhead" points="296,64 284,58.4 284,69.6" fill="black" transform="rotate(0,288,64)"/>
              <polygon class="arrowhead" points="24,256 12,250.4 12,261.6" fill="black" transform="rotate(180,16,256)"/>
              <polygon class="arrowhead" points="24,96 12,90.4 12,101.6" fill="black" transform="rotate(180,16,96)"/>
              <g class="text">
                <text x="40" y="36">Publisher</text>
                <text x="300" y="36">Broker</text>
                <text x="524" y="36">Subscriber</text>
                <text x="68" y="68">0.03</text>
                <text x="104" y="68">PUT</text>
                <text x="184" y="68">ps/data/1bd0d6d</text>
                <text x="92" y="100">2.01</text>
                <text x="144" y="100">Created</text>
                <text x="348" y="132">0.01</text>
                <text x="384" y="132">GET</text>
                <text x="468" y="132">/ps/data/1bd0d6d</text>
                <text x="368" y="148">Observe:0</text>
                <text x="372" y="180">2.05</text>
                <text x="424" y="180">Content</text>
                <text x="388" y="196">Observe:</text>
                <text x="448" y="196">10001</text>
                <text x="52" y="228">0.04</text>
                <text x="100" y="228">DELETE</text>
                <text x="196" y="228">/ps/data/1bd0d6d</text>
                <text x="76" y="260">2.02</text>
                <text x="128" y="260">Deleted</text>
                <text x="372" y="292">4.04</text>
                <text x="408" y="292">Not</text>
                <text x="448" y="292">Found</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art" align="center"><![CDATA[
Publisher                         Broker                    Subscriber
|                                   |                                |
+---- 0.03 PUT ps/data/1bd0d6d ---->|                                |
|                                   |                                |
|<------ 2.01 Created --------------+                                |
|                                   |                                |
|                                   |<-- 0.01 GET /ps/data/1bd0d6d --+
|                                   |    Observe:0                   |
|                                   |                                |
|                                   +------ 2.05 Content ----------->|
|                                   |       Observe: 10001           |
|                                   |                                |
+-- 0.04 DELETE /ps/data/1bd0d6d -->|                                |
|                                   |                                |
|<---- 2.02 Deleted ----------------+                                |
|                                   |                                |
|                                   +------ 4.04 Not Found --------->|
|                                   |                                |
]]></artwork>
        </artset>
      </figure>
      <section anchor="oscon">
        <name>Using COSE to Protect the Published Topic Data</name>
        <t>The Publisher uses the symmetric COSE Key received from the KDC to protect the payload of the Publish operation (see <xref section="3.2.1" sectionFormat="of" target="I-D.ietf-core-coap-pubsub"/>). Specifically, the Publisher creates a COSE_Encrypt0 object <xref target="RFC9052"/><xref target="RFC9053"/> by means of the COSE Key currently used as group key (REQ23). The encryption algorithm and Base IV to use are specified by the 'alg' and 'Base IV' parameters of the COSE Key, together with its key identifier in the 'kid' parameter.</t>
        <t>Also, the Publisher uses its private key corresponding to the public key sent to the KDC, in order to countersign the COSE_Encrypt0 object as specified in <xref target="RFC9338"/> (REQ23). The countersignature is specified in the 'Countersignature version 2' parameter, within the 'unprotected' field of the COSE_Encrypt0 object.</t>
        <t>Finally, the Publisher sends the COSE_Encrypt0 object conveying the countersignature to the Broker, as payload of the PUT request sent to the topic-data of the topic targeted by the Publish operation.</t>
        <t>Upon receiving a response from the topic-data resource at the Broker, the Subscriber uses the 'kid' parameter from the 'Countersignature version 2' parameter within the 'unprotected' field of the COSE_Encrypt0 object, in order to retrieve the Publisher's public key from the KDC (see <xref target="query"/>) or from its local storage. Then, the Subscriber uses that public key to verify the countersignature.</t>
        <t>In case of successful verification, the Subscriber uses the 'kid' parameter from the 'unprotected' field of the COSE_Encrypt0 object, in order to retrieve the COSE Key used as current group key from its local storage. Then, the Subscriber uses that group key to verify and decrypt the COSE_Encrypt0 object. In case of successful verification, the Subscriber delivers the received topic data to the application.</t>
        <t>The COSE_Encrypt0 object is constructed as follows.</t>
        <t>The 'protected' field <bcp14>MUST</bcp14> include:</t>
        <ul spacing="normal">
          <li>
            <t>The 'alg' parameter, with value the identifier of the AEAD algorithm specified in the 'alg' parameter of the COSE Key used as current group key.</t>
          </li>
        </ul>
        <t>The 'unprotected' field <bcp14>MUST</bcp14> include:</t>
        <ul spacing="normal">
          <li>
            <t>The 'kid' parameter, with the same value specified in the 'kid' parameter of the COSE Key used as current group key. This value represents the current Group ID (Gid) of the security group associated with the application group (topic).</t>
          </li>
          <li>
            <t>The 'Partial IV' parameter, with value set to the current Sender Sequence Number of the Publisher. All leading bytes of value zero <bcp14>SHALL</bcp14> be removed when encoding the Partial IV, except in the case of Partial IV with value 0, which is encoded to the byte string 0x00.  </t>
            <t>
The Publisher <bcp14>MUST</bcp14> initialize the Sender Sequence Number to 0 upon joining the security group and <bcp14>MUST</bcp14> reset it to 0 upon receiving a new group key as the result of a group rekeying (see <xref target="rekeying"/>). The Publisher <bcp14>MUST</bcp14> increment its Sender Sequence Number value by 1, after having completed an encryption operation by means of the current group key.  </t>
            <t>
When the Publisher exhausts its Sender Sequence Numbers, the Publisher <bcp14>MUST NOT</bcp14> protect further topic data by using the current group key while still retaining its current Sender ID, and it <bcp14>MUST</bcp14> send a Key Renewal Request message to the KDC (see <xref target="sec-key-renewal-request"/>). This will result in the KDC rekeying the group and distributing a new group key, or in the KDC providing the Publisher with a new Sender ID. The Publisher <bcp14>MUST</bcp14> reset its Sender Sequence Number to 0 upon receiving a new Sender ID from the KDC.</t>
          </li>
          <li>
            <t>The 'Countersignature version 2' parameter, specifying the countersignature of the COSE_Encrypt0 object. In particular:  </t>
            <ul spacing="normal">
              <li>
                <t>The 'protected' field includes the 'alg' parameter, with value the identifier of the Signature Algorithm used in the security group.</t>
              </li>
              <li>
                <t>The 'unprotected' field includes the 'kid' parameter, with value the Publisher's Sender ID that the Publisher obtained from the KDC when joining the security group, as the value of the 'group_SenderId' parameter of the Join Response (see <xref target="join-response"/>).</t>
              </li>
              <li>
                <t>The 'signature' field, with value the countersignature.</t>
              </li>
            </ul>
            <t>
The countersignature is computed as defined in <xref target="RFC9338"/>, by using the private key of the Publisher as signing key and by means of the Signature Algorithm used in the group. The fields of the Countersign_structure are populated as follows:  </t>
            <ul spacing="normal">
              <li>
                <t>'context' takes "CounterSignature".</t>
              </li>
              <li>
                <t>'body_protected' takes the serialized parameters from the 'protected' field of the COSE_Encrypt0 object, i.e., the 'alg' parameter.</t>
              </li>
              <li>
                <t>'sign_protected' takes the serialized parameters from the 'protected' field of the 'Countersignature version 2' parameter, i.e., the 'alg' parameter.</t>
              </li>
              <li>
                <t>'external_aad is not supplied.</t>
              </li>
              <li>
                <t>'payload' is the ciphertext of the COSE_Encrypt0 object (see below).</t>
              </li>
            </ul>
          </li>
        </ul>
        <t>The 'ciphertext' field specifies the ciphertext computed over the topic data to publish. The ciphertext is computed as defined in <xref target="RFC9052"/><xref target="RFC9053"/>, by using the current group key as encryption key, the AEAD Nonce computed as defined in <xref target="ssec-aead-nonce"/>, the topic data to publish as plaintext, and the Enc_structure populated as follows:</t>
        <ul spacing="normal">
          <li>
            <t>'context' takes "Encrypt0".</t>
          </li>
          <li>
            <t>'protected' takes the serialization of the protected parameter 'alg' from the 'protected' field of the COSE_Encrypt0 object.</t>
          </li>
          <li>
            <t>'external_aad is not supplied.</t>
          </li>
        </ul>
      </section>
      <section anchor="ssec-aead-nonce">
        <name>AEAD Nonce</name>
        <t>This section defines how to generate the AEAD nonce used for encrypting and decrypting the COSE_Encrypt0 object protecting the published topic data. This construction is analogous to that used to generate the AEAD nonce in the OSCORE security protocol (see <xref section="5.2" sectionFormat="of" target="RFC8613"/>).</t>
        <t>The AEAD nonce for producing or consuming the COSE_Encrypt0 object is constructed as defined below and also shown in <xref target="fig-aead-nonce"/>.</t>
        <ol spacing="normal" type="1"><li>
            <t>Left-pad the Partial IV (PIV) with zeroes to exactly 5 bytes.</t>
          </li>
          <li>
            <t>Left-pad the Sender ID of the Publisher that generated the Partial IV (ID_PIV) with zeroes to exactly the nonce length of the AEAD algorithm minus 6 bytes.</t>
          </li>
          <li>
            <t>Concatenate the size of the ID_PIV (a single byte S) with the padded ID_PIV and the padded PIV.</t>
          </li>
          <li>
            <t>XOR the result from the previous step with the Base IV.</t>
          </li>
        </ol>
        <figure anchor="fig-aead-nonce">
          <name>AEAD Nonce Construction</name>
          <artwork align="center"><![CDATA[
     <- nonce length minus 6 B -> <-- 5 bytes -->
+---+-------------------+--------+---------+-----+
| S |      padding      | ID_PIV | padding | PIV |-----+
+---+-------------------+--------+---------+-----+     |
                                                       |
 <---------------- nonce length ---------------->      |
+------------------------------------------------+     |
|                    Base IV                     |-->(XOR)
+------------------------------------------------+     |
                                                       |
 <---------------- nonce length ---------------->      |
+------------------------------------------------+     |
|                     Nonce                      |<----+
+------------------------------------------------+
]]></artwork>
        </figure>
        <t>The construction above only supports AEAD algorithms that use nonces with length equal or greater than 7 bytes. At the same time, it makes it easy to verify that the nonces will be unique when used with the same group key, even though this is shared and used by all the Publishers in the security group. In fact:</t>
        <ul spacing="normal">
          <li>
            <t>Since Publisher's Sender IDs are unique within the security group and they are not reassigned until a group rekeying occurs (see <xref target="join-response"/> and <xref target="rekeying"/>), two Publisher Clients cannot share the same tuple (S, padded ID_PIV) by construction.</t>
          </li>
          <li>
            <t>Since a Publisher increments by 1 its Sender Sequence Number after each use that it makes of the current group key, the Publisher  never reuses the same tuple (S, padded ID_PIV, padded PIV) together with the same group key.</t>
          </li>
          <li>
            <t>Therefore neither the same Publisher reuses the same AEAD nonce with the same group key, nor any two Publishers use the same AEAD nonce with the same group key.</t>
          </li>
        </ul>
      </section>
      <section anchor="ssec-replay-checks">
        <name>Replay Checks</name>
        <t>In order to protect from replay of published topic data, every Subscriber maintains a Replay Window for each different Publisher in the same group. It is <bcp14>RECOMMENDED</bcp14> that the Replay Window has a default size of 32.</t>
        <t>Upon receiving a topic data published by a given Publisher P, the Subscriber retrieves the Sender ID of P conveyed as 'kid' in the 'Countersignature version 2' parameter of the COSE_Encrypt0 object (see <xref target="oscon"/>) and determines the Replay Window W_P associated with P.</t>
        <t>The Subscriber <bcp14>MUST</bcp14> verify that, according to W_P, the Sender Sequence Number SN_P specified by the 'Partial IV' parameter of the COSE_Encrypt0 object has not been received before from P.</t>
        <t>If the verification above fails, the Subscriber <bcp14>MUST</bcp14> stop processing the COSE_Encrypt0 object conveying the topic data. If the value of SN_P is strictly smaller than the currently smallest value in W_P, then the Subscriber <bcp14>MUST</bcp14> stop processing the COSE_Encrypt0 object.</t>
        <t>If the verification above succeeds, the Subscriber proceeds with processing the COSE_Encrypt0 object, by verifying the countersignature from P using P's public key as well as by decrypting and verifying the COSE_Encrypt0 object using the group key. If both operations succeed, the Subscriber updates W_P as follows:</t>
        <ul spacing="normal">
          <li>
            <t>If SN_P is strictly greater than the currently largest value in W_P, then W_P is updated in order to set SN_P as its largest value.</t>
          </li>
          <li>
            <t>SN_P is marked to denote that it has been received.</t>
          </li>
        </ul>
        <t>The operation of validating the 'Partial IV' and updating the Replay Window <bcp14>MUST</bcp14> be atomic.</t>
        <t>Upon installing a new group key (e.g., due to a group rekeying performed by the KDC, see <xref target="rekeying"/>) or upon receiving published topic data from a given Publisher for the first time, the Subscriber initializes the Replay Window corresponding to that Publisher, i.e., the smallest value of the Replay Window is set to 0.</t>
        <!--# Applicability to the MQTT Pub-Sub Profile {#mqtt-pubsub}

This section describes how this profile can be applicable to the MQTT protocol {{MQTT-OASIS-Standard-v5}}.

The MQTT clients would go through steps similar to those performed by the CoAP clients, and the payload of the MQTT PUBLISH messages is protected using COSE. The MQTT clients need to use CoAP for communicating with the KDC, in order to join security groups and be part of the pairwise rekeying initiated by the KDC.

The discovery of the AS is defined in {{Section 2.4.1 of RFC9431}} for MQTT v5 clients, and it is not supported for MQTT v3 clients. $SYS/ has been widely adopted as a prefix to topics that contain server-specific information or control APIs, and may be used for discovering topics and the KDC.

In the Join Response from the KDC to a Client (see {{join-response}}), the 'ace_groupcomm_profile' parameter has value "mqtt_pubsub_app", which is registered in {{iana-profile}}.

Both Publishers and Subscribers MUST authorise to the Broker with their respective tokens, as described in {{RFC9431}}. A Publisher sends PUBLISH messages for a given topic and protects the payload with the corresponding key for the associated security group. A Subscriber may send SUBSCRIBE messages with one or multiple topic filters. A topic filter may correspond to multiple topics. The Broker forwards all PUBLISH messages to all authorised Subscribers, including the retained messages.
-->

</section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Security considerations for this profile are inherited from <xref target="RFC9594"/>, the ACE framework for Authentication and Authorization <xref target="RFC9200"/>, and the specific transport profile of ACE used, such as <xref target="RFC9202"/> and <xref target="RFC9203"/>.</t>
      <t>The following security considerations also apply for this profile.</t>
      <t>Consistent with the intended group-confidentiality model, each Client in a security group is able to decrypt the data published in the topic(s) associated with that group, by using the symmetric group key that is shared with all the other group members.</t>
      <t>At the same time, source authentication of the published topic data is achieved by means of a digital signature, which the Publisher of the data in question computes with its private key and embeds in the published data. This ensures integrity of the published topic data as well as its origin, thus preventing a group member from impersonating another one.</t>
      <t>To this end, both Publishers and Subscribers rely on asymmetric cryptography, while Subscribers must be able to access the public keys of the Publishers to a specific topic in order to verify the signature over the published topic data. This might make the message exchange quite heavy for small constrained devices.</t>
      <t>The Broker is only trusted with verifying that a Publisher is authorised to publish on a certain topic and with distributing that data only to the Subscribers authorised to obtain it. However, the Broker is not trusted with the published data in itself, which the Broker cannot read or modify as it does not have access to the group key required for decrypting the data.</t>
      <t>With respect to the reuse of nonces for proof-of-possession input, the same considerations apply as in <xref target="I-D.ietf-ace-key-groupcomm-oscore"/>, with the difference that the KDC of the present document is considered instead of the Group Manager defined therein.</t>
      <t>Access tokens might have to be revoked before their expiration time. <xref target="RFC9770"/> provides a list of possible circumstances where this can happen, and it specifies a method that an Authorization Server can use in order to notify the KDC, the Broker, and the Clients about pertaining access tokens that have been revoked but are not expired yet.</t>
      <t>Clients can be excluded from future communications related to a topic, by appropriately re-keying the group associated with the topic in question.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>Note to RFC Editor: Please replace "[RFC-XXXX]" with the RFC number of this document and delete this paragraph.</t>
      <t>This document has the following actions for IANA.</t>
      <section anchor="iana-ace-groupcomm-key">
        <name>ACE Groupcomm Key Types</name>
        <t>IANA is asked to register the following entry in the "ACE Groupcomm Key Types" registry defined in <xref section="11.8" sectionFormat="of" target="RFC9594"/>.</t>
        <ul spacing="normal">
          <li>
            <t>Name: Group_PubSub_Keying_Material</t>
          </li>
          <li>
            <t>Key Type Value: GROUPCOMM_KEY_TBD (suggested value: 2)</t>
          </li>
          <li>
            <t>Profile: coap_group_pubsub_app (<xref target="iana-profile"/> of [RFC-XXXX]).</t>
          </li>
          <li>
            <t>Description: Encoded as described in <xref target="join-response"/> of [RFC-XXXX].</t>
          </li>
          <li>
            <t>References: <xref target="RFC9052"/>, <xref target="RFC9053"/>, [RFC-XXXX]</t>
          </li>
        </ul>
      </section>
      <section anchor="iana-profile">
        <name>ACE Groupcomm Profiles</name>
        <t>IANA is asked to register the following entries in the "ACE Groupcomm Profiles" registry defined in <xref section="11.9" sectionFormat="of" target="RFC9594"/>.</t>
        <ul spacing="normal">
          <li>
            <t>Name: coap_group_pubsub_app</t>
          </li>
          <li>
            <t>Description: Application profile to provision keying material for participating in group communication based on the Pub-Sub architecture <xref target="I-D.ietf-core-coap-pubsub"/> for CoAP <xref target="RFC7252"/> and protected with COSE <xref target="RFC9052"/><xref target="RFC9053"/><xref target="RFC9338"/>.</t>
          </li>
          <li>
            <t>CBOR Value: TBD (suggested value: 2)</t>
          </li>
          <li>
            <t>Reference: [RFC-XXXX]</t>
          </li>
        </ul>
      </section>
      <section anchor="core_rt">
        <name>CoRE Resource Type</name>
        <t>IANA is asked to register the following entry in the "Resource Type (rt=) Link Target Attribute Values" registry within the "Constrained Restful Environments (CoRE) Parameters" registry group.</t>
        <ul spacing="normal">
          <li>
            <t>Value: "core.ps.gm"</t>
          </li>
          <li>
            <t>Description: Group-membership resource for Pub-Sub communication.</t>
          </li>
          <li>
            <t>Reference: [RFC-XXXX]</t>
          </li>
        </ul>
        <t>Clients can use this resource type to discover a group membership resource at the KDC.</t>
      </section>
      <section anchor="aif">
        <name>AIF Media-Type Sub-Parameters</name>
        <t>For the media-types "application/aif+cbor" and "application/aif+json" defined in <xref section="5.1" sectionFormat="of" target="RFC9237"/>, IANA is requested to register the following entries for the two media-type parameters Toid and Tperm, in the respective sub-registry defined in <xref section="5.2" sectionFormat="of" target="RFC9237"/> within the "MIME Media Type Sub-Parameter" registry group.</t>
        <ul spacing="normal">
          <li>
            <t>Parameter: Toid</t>
          </li>
          <li>
            <t>Name: pubsub-topic</t>
          </li>
          <li>
            <t>Description/Specification: Name of one application group (topic) or of a corresponding security group.</t>
          </li>
          <li>
            <t>Reference: [RFC-XXXX]</t>
          </li>
        </ul>
        <t><br/></t>
        <ul spacing="normal">
          <li>
            <t>Parameter: Tperm</t>
          </li>
          <li>
            <t>Name: pubsub-perm</t>
          </li>
          <li>
            <t>Description/Specification: Permissions pertaining to application groups (topics) or to corresponding security groups.</t>
          </li>
          <li>
            <t>Reference: [RFC-XXXX]</t>
          </li>
        </ul>
      </section>
      <section anchor="content_formats">
        <name>CoAP Content-Formats</name>
        <t>IANA is asked to register the following entries to the "CoAP Content-Formats" registry within the "Constrained RESTful Environments (CoRE) Parameters" registry group.</t>
        <ul spacing="normal">
          <li>
            <t>Content Type: application/aif+cbor;toid=pubsub-topic;tperm=pubsub-perm</t>
          </li>
          <li>
            <t>Content Coding: -</t>
          </li>
          <li>
            <t>ID: 294 (suggested)</t>
          </li>
          <li>
            <t>Reference: [RFC-XXXX]</t>
          </li>
        </ul>
        <t><br/></t>
        <ul spacing="normal">
          <li>
            <t>Content Type: application/aif+json;toid=pubsub-topic;tperm=pubsub-perm</t>
          </li>
          <li>
            <t>Content Coding: -</t>
          </li>
          <li>
            <t>ID: 295 (suggested)</t>
          </li>
          <li>
            <t>Reference: [RFC-XXXX]</t>
          </li>
        </ul>
      </section>
      <section anchor="tls_exporter">
        <name>TLS Exporter Labels</name>
        <t>IANA is asked to register the following entry to the "TLS Exporter Labels" registry defined in <xref section="6" sectionFormat="of" target="RFC5705"/> and updated in <xref section="12" sectionFormat="of" target="RFC8447"/>.</t>
        <ul spacing="normal">
          <li>
            <t>Value: EXPORTER-ACE-Sign-Challenge-coap-pubsub-app</t>
          </li>
          <li>
            <t>DTLS-OK: Y</t>
          </li>
          <li>
            <t>Recommended: N</t>
          </li>
          <li>
            <t>Reference: <xref target="pop"/> of [RFC-XXXX]</t>
          </li>
        </ul>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="IANA.cose_algorithms" target="https://www.iana.org/assignments/cose">
          <front>
            <title>COSE Algorithms</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="IANA.cose_key-type" target="https://www.iana.org/assignments/cose">
          <front>
            <title>COSE Key Types</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="IANA.cose_header-parameters" target="https://www.iana.org/assignments/cose">
          <front>
            <title>COSE Header Parameters</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="I-D.ietf-core-coap-pubsub">
          <front>
            <title>A publish-subscribe architecture for the Constrained Application Protocol (CoAP)</title>
            <author fullname="Jaime Jimenez" initials="J." surname="Jimenez">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Michael Koster" initials="M." surname="Koster">
              <organization>Dogtiger Labs</organization>
            </author>
            <author fullname="Ari Keränen" initials="A." surname="Keränen">
              <organization>Ericsson</organization>
            </author>
            <date day="28" month="February" year="2025"/>
            <abstract>
              <t>   This document describes a publish-subscribe architecture for the
   Constrained Application Protocol (CoAP), extending the capabilities
   of CoAP communications for supporting endpoints with long breaks in
   connectivity and/or up-time.  CoAP clients publish on and subscribe
   to a topic via a corresponding topic resource at a CoAP server acting
   as broker.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-coap-pubsub-18"/>
        </reference>
        <reference anchor="RFC5246">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
            <author fullname="T. Dierks" initials="T." surname="Dierks"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2008"/>
            <abstract>
              <t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol. The TLS protocol provides communications security over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5246"/>
          <seriesInfo name="DOI" value="10.17487/RFC5246"/>
        </reference>
        <reference anchor="RFC5705">
          <front>
            <title>Keying Material Exporters for Transport Layer Security (TLS)</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="March" year="2010"/>
            <abstract>
              <t>A number of protocols wish to leverage Transport Layer Security (TLS) to perform key establishment but then use some of the keying material for their own purposes. This document describes a general mechanism for allowing that. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5705"/>
          <seriesInfo name="DOI" value="10.17487/RFC5705"/>
        </reference>
        <reference anchor="RFC6347">
          <front>
            <title>Datagram Transport Layer Security Version 1.2</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="January" year="2012"/>
            <abstract>
              <t>This document specifies version 1.2 of the Datagram Transport Layer Security (DTLS) protocol. The DTLS protocol provides communications privacy for datagram protocols. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. The DTLS protocol is based on the Transport Layer Security (TLS) protocol and provides equivalent security guarantees. Datagram semantics of the underlying transport are preserved by the DTLS protocol. This document updates DTLS 1.0 to work with TLS version 1.2. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6347"/>
          <seriesInfo name="DOI" value="10.17487/RFC6347"/>
        </reference>
        <reference anchor="RFC6690">
          <front>
            <title>Constrained RESTful Environments (CoRE) Link Format</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <date month="August" year="2012"/>
            <abstract>
              <t>This specification defines Web Linking using a link format for use by constrained web servers to describe hosted resources, their attributes, and other relationships between links. Based on the HTTP Link Header field defined in RFC 5988, the Constrained RESTful Environments (CoRE) Link Format is carried as a payload and is assigned an Internet media type. "RESTful" refers to the Representational State Transfer (REST) architecture. A well-known URI is defined as a default entry point for requesting the links hosted by a server. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6690"/>
          <seriesInfo name="DOI" value="10.17487/RFC6690"/>
        </reference>
        <reference anchor="RFC6749">
          <front>
            <title>The OAuth 2.0 Authorization Framework</title>
            <author fullname="D. Hardt" initials="D." role="editor" surname="Hardt"/>
            <date month="October" year="2012"/>
            <abstract>
              <t>The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf. This specification replaces and obsoletes the OAuth 1.0 protocol described in RFC 5849. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6749"/>
          <seriesInfo name="DOI" value="10.17487/RFC6749"/>
        </reference>
        <reference anchor="RFC7252">
          <front>
            <title>The Constrained Application Protocol (CoAP)</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s. The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
              <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types. CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7252"/>
          <seriesInfo name="DOI" value="10.17487/RFC7252"/>
        </reference>
        <reference anchor="RFC7641">
          <front>
            <title>Observing Resources in the Constrained Application Protocol (CoAP)</title>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <date month="September" year="2015"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a RESTful application protocol for constrained nodes and networks. The state of a resource on a CoAP server can change over time. This document specifies a simple protocol extension for CoAP that enables CoAP clients to "observe" resources, i.e., to retrieve a representation of a resource and keep this representation updated by the server over a period of time. The protocol follows a best-effort approach for sending new representations to clients and provides eventual consistency between the state observed by each client and the actual resource state at the server.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7641"/>
          <seriesInfo name="DOI" value="10.17487/RFC7641"/>
        </reference>
        <reference anchor="RFC7925">
          <front>
            <title>Transport Layer Security (TLS) / Datagram Transport Layer Security (DTLS) Profiles for the Internet of Things</title>
            <author fullname="H. Tschofenig" initials="H." role="editor" surname="Tschofenig"/>
            <author fullname="T. Fossati" initials="T." surname="Fossati"/>
            <date month="July" year="2016"/>
            <abstract>
              <t>A common design pattern in Internet of Things (IoT) deployments is the use of a constrained device that collects data via sensors or controls actuators for use in home automation, industrial control systems, smart cities, and other IoT deployments.</t>
              <t>This document defines a Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) 1.2 profile that offers communications security for this data exchange thereby preventing eavesdropping, tampering, and message forgery. The lack of communication security is a common vulnerability in IoT products that can easily be solved by using these well-researched and widely deployed Internet security protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7925"/>
          <seriesInfo name="DOI" value="10.17487/RFC7925"/>
        </reference>
        <reference anchor="RFC8392">
          <front>
            <title>CBOR Web Token (CWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties. The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection. A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value. CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8392"/>
          <seriesInfo name="DOI" value="10.17487/RFC8392"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC8447">
          <front>
            <title>IANA Registry Updates for TLS and DTLS</title>
            <author fullname="J. Salowey" initials="J." surname="Salowey"/>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document describes a number of changes to TLS and DTLS IANA registries that range from adding notes to the registry all the way to changing the registration policy. These changes were mostly motivated by WG review of the TLS- and DTLS-related registries undertaken as part of the TLS 1.3 development process.</t>
              <t>This document updates the following RFCs: 3749, 5077, 4680, 5246, 5705, 5878, 6520, and 7301.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8447"/>
          <seriesInfo name="DOI" value="10.17487/RFC8447"/>
        </reference>
        <reference anchor="RFC8610">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="C. Vigano" initials="C." surname="Vigano"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8610"/>
          <seriesInfo name="DOI" value="10.17487/RFC8610"/>
        </reference>
        <reference anchor="RFC8949">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="94"/>
          <seriesInfo name="RFC" value="8949"/>
          <seriesInfo name="DOI" value="10.17487/RFC8949"/>
        </reference>
        <reference anchor="RFC9052">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
              <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="96"/>
          <seriesInfo name="RFC" value="9052"/>
          <seriesInfo name="DOI" value="10.17487/RFC9052"/>
        </reference>
        <reference anchor="RFC9053">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Initial Algorithms</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines a set of algorithms that can be used with the CBOR Object Signing and Encryption (COSE) protocol (RFC 9052).</t>
              <t>This document, along with RFC 9052, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9053"/>
          <seriesInfo name="DOI" value="10.17487/RFC9053"/>
        </reference>
        <reference anchor="RFC9147">
          <front>
            <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>This document specifies version 1.3 of the Datagram Transport Layer Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability. Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
              <t>This document obsoletes RFC 6347.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9147"/>
          <seriesInfo name="DOI" value="10.17487/RFC9147"/>
        </reference>
        <reference anchor="RFC9200">
          <front>
            <title>Authentication and Authorization for Constrained Environments Using the OAuth 2.0 Framework (ACE-OAuth)</title>
            <author fullname="L. Seitz" initials="L." surname="Seitz"/>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>This specification defines a framework for authentication and authorization in Internet of Things (IoT) environments called ACE-OAuth. The framework is based on a set of building blocks including OAuth 2.0 and the Constrained Application Protocol (CoAP), thus transforming a well-known and widely used authorization solution into a form suitable for IoT devices. Existing specifications are used where possible, but extensions are added and profiles are defined to better serve the IoT use cases.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9200"/>
          <seriesInfo name="DOI" value="10.17487/RFC9200"/>
        </reference>
        <reference anchor="RFC9237">
          <front>
            <title>An Authorization Information Format (AIF) for Authentication and Authorization for Constrained Environments (ACE)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Information about which entities are authorized to perform what operations on which constituents of other entities is a crucial component of producing an overall system that is secure. Conveying precise authorization information is especially critical in highly automated systems with large numbers of entities, such as the Internet of Things.</t>
              <t>This specification provides a generic information model and format for representing such authorization information, as well as two variants of a specific instantiation of that format for use with Representational State Transfer (REST) resources identified by URI path.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9237"/>
          <seriesInfo name="DOI" value="10.17487/RFC9237"/>
        </reference>
        <reference anchor="RFC9277">
          <front>
            <title>On Stable Storage for Items in Concise Binary Object Representation (CBOR)</title>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>This document defines a stored ("file") format for Concise Binary Object Representation (CBOR) data items that is friendly to common systems that recognize file types, such as the Unix file(1) command.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9277"/>
          <seriesInfo name="DOI" value="10.17487/RFC9277"/>
        </reference>
        <reference anchor="RFC9290">
          <front>
            <title>Concise Problem Details for Constrained Application Protocol (CoAP) APIs</title>
            <author fullname="T. Fossati" initials="T." surname="Fossati"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="October" year="2022"/>
            <abstract>
              <t>This document defines a concise "problem detail" as a way to carry machine-readable details of errors in a Representational State Transfer (REST) response to avoid the need to define new error response formats for REST APIs for constrained environments. The format is inspired by, but intended to be more concise than, the problem details for HTTP APIs defined in RFC 7807.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9290"/>
          <seriesInfo name="DOI" value="10.17487/RFC9290"/>
        </reference>
        <reference anchor="RFC9338">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Countersignatures</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="December" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. CBOR Object Signing and Encryption (COSE) defines a set of security services for CBOR. This document defines a countersignature algorithm along with the needed header parameters and CBOR tags for COSE. This document updates RFC 9052.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="96"/>
          <seriesInfo name="RFC" value="9338"/>
          <seriesInfo name="DOI" value="10.17487/RFC9338"/>
        </reference>
        <reference anchor="RFC9430">
          <front>
            <title>Extension of the Datagram Transport Layer Security (DTLS) Profile for Authentication and Authorization for Constrained Environments (ACE) to Transport Layer Security (TLS)</title>
            <author fullname="O. Bergmann" initials="O." surname="Bergmann"/>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <date month="July" year="2023"/>
            <abstract>
              <t>This document updates "Datagram Transport Layer Security (DTLS) Profile for Authentication and Authorization for Constrained Environments (ACE)" (RFC 9202) by specifying that the profile applies to TLS as well as DTLS.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9430"/>
          <seriesInfo name="DOI" value="10.17487/RFC9430"/>
        </reference>
        <reference anchor="RFC9594">
          <front>
            <title>Key Provisioning for Group Communication Using Authentication and Authorization for Constrained Environments (ACE)</title>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <author fullname="M. Tiloca" initials="M." surname="Tiloca"/>
            <date month="September" year="2024"/>
            <abstract>
              <t>This document defines how to use the Authentication and Authorization for Constrained Environments (ACE) framework to distribute keying material and configuration parameters for secure group communication. Candidate group members that act as Clients and are authorized to join a group can do so by interacting with a Key Distribution Center (KDC) acting as the Resource Server, from which they obtain the keying material to communicate with other group members. While defining general message formats as well as the interface and operations available at the KDC, this document supports different approaches and protocols for secure group communication. Therefore, details are delegated to separate application profiles of this document as specialized instances that target a particular group communication approach and define how communications in the group are protected. Compliance requirements for such application profiles are also specified.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9594"/>
          <seriesInfo name="DOI" value="10.17487/RFC9594"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC8613">
          <front>
            <title>Object Security for Constrained RESTful Environments (OSCORE)</title>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="J. Mattsson" initials="J." surname="Mattsson"/>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <author fullname="L. Seitz" initials="L." surname="Seitz"/>
            <date month="July" year="2019"/>
            <abstract>
              <t>This document defines Object Security for Constrained RESTful Environments (OSCORE), a method for application-layer protection of the Constrained Application Protocol (CoAP), using CBOR Object Signing and Encryption (COSE). OSCORE provides end-to-end protection between endpoints communicating using CoAP or CoAP-mappable HTTP. OSCORE is designed for constrained nodes and networks supporting a range of proxy operations, including translation between different transport protocols.</t>
              <t>Although an optional functionality of CoAP, OSCORE alters CoAP options processing and IANA registration. Therefore, this document updates RFC 7252.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8613"/>
          <seriesInfo name="DOI" value="10.17487/RFC8613"/>
        </reference>
        <reference anchor="RFC8259">
          <front>
            <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format. It was derived from the ECMAScript Programming Language Standard. JSON defines a small set of formatting rules for the portable representation of structured data.</t>
              <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="90"/>
          <seriesInfo name="RFC" value="8259"/>
          <seriesInfo name="DOI" value="10.17487/RFC8259"/>
        </reference>
        <reference anchor="RFC9202">
          <front>
            <title>Datagram Transport Layer Security (DTLS) Profile for Authentication and Authorization for Constrained Environments (ACE)</title>
            <author fullname="S. Gerdes" initials="S." surname="Gerdes"/>
            <author fullname="O. Bergmann" initials="O." surname="Bergmann"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="L. Seitz" initials="L." surname="Seitz"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>This specification defines a profile of the Authentication and Authorization for Constrained Environments (ACE) framework that allows constrained servers to delegate client authentication and authorization. The protocol relies on DTLS version 1.2 or later for communication security between entities in a constrained network using either raw public keys or pre-shared keys. A resource-constrained server can use this protocol to delegate management of authorization information to a trusted host with less-severe limitations regarding processing power and memory.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9202"/>
          <seriesInfo name="DOI" value="10.17487/RFC9202"/>
        </reference>
        <reference anchor="RFC9203">
          <front>
            <title>The Object Security for Constrained RESTful Environments (OSCORE) Profile of the Authentication and Authorization for Constrained Environments (ACE) Framework</title>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <author fullname="L. Seitz" initials="L." surname="Seitz"/>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="M. Gunnarsson" initials="M." surname="Gunnarsson"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>This document specifies a profile for the Authentication and Authorization for Constrained Environments (ACE) framework. It utilizes Object Security for Constrained RESTful Environments (OSCORE) to provide communication security and proof-of-possession for a key owned by the client and bound to an OAuth 2.0 access token.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9203"/>
          <seriesInfo name="DOI" value="10.17487/RFC9203"/>
        </reference>
        <reference anchor="RFC9770">
          <front>
            <title>Notification of Revoked Access Tokens in the Authentication and Authorization for Constrained Environments (ACE) Framework</title>
            <author fullname="M. Tiloca" initials="M." surname="Tiloca"/>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <author fullname="S. Echeverria" initials="S." surname="Echeverria"/>
            <author fullname="G. Lewis" initials="G." surname="Lewis"/>
            <date month="June" year="2025"/>
            <abstract>
              <t>This document specifies a method of the Authentication and Authorization for Constrained Environments (ACE) framework, which allows an authorization server to notify clients and resource servers (i.e., registered devices) about revoked access tokens. As specified in this document, the method allows clients and resource servers (RSs) to access a Token Revocation List (TRL) on the authorization server by using the Constrained Application Protocol (CoAP), with the possible additional use of resource observation. Resulting (unsolicited) notifications of revoked access tokens complement alternative approaches such as token introspection, while not requiring additional endpoints on clients and RSs.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9770"/>
          <seriesInfo name="DOI" value="10.17487/RFC9770"/>
        </reference>
        <reference anchor="I-D.ietf-cose-cbor-encoded-cert">
          <front>
            <title>CBOR Encoded X.509 Certificates (C509 Certificates)</title>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Göran Selander" initials="G." surname="Selander">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Shahid Raza" initials="S." surname="Raza">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Joel Höglund" initials="J." surname="Höglund">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Martin Furuhed" initials="M." surname="Furuhed">
              <organization>IN Groupe</organization>
            </author>
            <date day="18" month="August" year="2025"/>
            <abstract>
              <t>   This document specifies a CBOR encoding of X.509 certificates.  The
   resulting certificates are called C509 Certificates.  The CBOR
   encoding supports a large subset of RFC 5280 and all certificates
   compatible with the RFC 7925, IEEE 802.1AR (DevID), CNSA 1.0, RPKI,
   GSMA eUICC, and CA/Browser Forum Baseline Requirements profiles.
   C509 is deployed in different settings including, in-vehicle and
   vehicle-to-cloud communication, Unmanned Aircraft Systems (UAS), and
   Global Navigation Satellite System (GNSS).  When used to re-encode
   DER encoded X.509 certificates, the CBOR encoding can in many cases
   reduce the size of RFC 7925 profiled certificates by over 50% while
   also significantly reducing memory and code size compared to ASN.1.
   The CBOR encoded structure can alternatively be signed directly
   ("natively signed"), which does not require re-encoding for the
   signature to be verified.  The TLSA selectors registry defined in RFC
   6698 is extended to include C509 certificates.  The document also
   specifies C509 Certificate Requests, C509 COSE headers, a C509 TLS
   certificate type, and a C509 file format.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cose-cbor-encoded-cert-15"/>
        </reference>
        <reference anchor="I-D.ietf-ace-edhoc-oscore-profile">
          <front>
            <title>Ephemeral Diffie-Hellman Over COSE (EDHOC) and Object Security for Constrained Environments (OSCORE) Profile for Authentication and Authorization for Constrained Environments (ACE)</title>
            <author fullname="Göran Selander" initials="G." surname="Selander">
              <organization>Ericsson</organization>
            </author>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Marco Tiloca" initials="M." surname="Tiloca">
              <organization>RISE</organization>
            </author>
            <author fullname="Rikard Höglund" initials="R." surname="Höglund">
              <organization>RISE</organization>
            </author>
            <date day="20" month="October" year="2025"/>
            <abstract>
              <t>   This document specifies a profile for the Authentication and
   Authorization for Constrained Environments (ACE) framework.  It
   utilizes Ephemeral Diffie-Hellman Over COSE (EDHOC) for achieving
   mutual authentication between an ACE-OAuth client and resource
   server, and it binds an authentication credential of the client to an
   ACE-OAuth access token.  EDHOC also establishes an Object Security
   for Constrained RESTful Environments (OSCORE) Security Context, which
   is used to secure communications between the client and resource
   server when accessing protected resources according to the
   authorization information indicated in the access token.  This
   profile can be used to delegate management of authorization
   information from a resource-constrained server to a trusted host with
   less severe limitations regarding processing power and memory.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ace-edhoc-oscore-profile-09"/>
        </reference>
        <reference anchor="I-D.ietf-ace-key-groupcomm-oscore">
          <front>
            <title>Key Management for Group Object Security for Constrained RESTful Environments (Group OSCORE) Using Authentication and Authorization for Constrained Environments (ACE)</title>
            <author fullname="Marco Tiloca" initials="M." surname="Tiloca">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Francesca Palombini" initials="F." surname="Palombini">
              <organization>Ericsson AB</organization>
            </author>
            <date day="28" month="August" year="2025"/>
            <abstract>
              <t>   This document defines an application profile of the Authentication
   and Authorization for Constrained Environments (ACE) framework, to
   request and provision keying material in group communication
   scenarios that are based on the Constrained Application Protocol
   (CoAP) and are secured with Group Object Security for Constrained
   RESTful Environments (Group OSCORE).  This application profile
   delegates the authentication and authorization of Clients, which join
   an OSCORE group through a Resource Server acting as Group Manager for
   that group.  This application profile leverages protocol-specific
   transport profiles of ACE to achieve communication security, server
   authentication, and proof of possession for a key owned by the Client
   and bound to an OAuth 2.0 access token.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ace-key-groupcomm-oscore-18"/>
        </reference>
      </references>
    </references>
    <?line 1061?>

<section anchor="groupcomm_requirements">
      <name>Requirements on Application Profiles</name>
      <t>This section lists how this application profile of ACE addresses the requirements defined in <xref section="A" sectionFormat="of" target="RFC9594"/>.</t>
      <section anchor="mandatory-to-address-requirements">
        <name>Mandatory-to-Address Requirements</name>
        <ul spacing="normal">
          <li>
            <t>REQ1: Specify the format and encoding of scope. This includes defining the set of possible roles and their identifiers, as well as the corresponding encoding to use in the scope entries according to the used scope format: see <xref target="scope"/>.</t>
          </li>
          <li>
            <t>REQ2: If scope uses AIF, register its specific instance of "Toid" and "Tperm" as media type parameters and a corresponding Content-Format, as per the guidelines in <xref target="RFC9237"/>: see <xref target="aif"/> and <xref target="content_formats"/>.</t>
          </li>
          <li>
            <t>REQ3: If used, specify the acceptable values for the 'sign_alg' parameter: values from the "Value" column of the "COSE Algorithms" registry <xref target="IANA.cose_algorithms"/>.</t>
          </li>
          <li>
            <t>REQ4: If used, specify the acceptable values and structure for the 'sign_parameters' parameter: values and structure from the COSE algorithm capabilities as specified in the "COSE Algorithms" registry <xref target="IANA.cose_algorithms"/>.</t>
          </li>
          <li>
            <t>REQ5: If used, specify the acceptable values and structure for the 'sign_key_parameters' parameter: values and structure from the COSE key type capabilities as specified in the "COSE Key Types" registry <xref target="IANA.cose_key-type"/>.</t>
          </li>
          <li>
            <t>REQ6: Specify the acceptable formats for authentication credentials and, if applicable, the acceptable values for the 'cred_fmt' parameter: acceptable formats explicitly provide the public key as well as the comprehensive set of information related to the public key algorithm (see <xref target="token-post"/> and <xref target="join-response"/>). Consistent acceptable values for 'cred_fmt' are taken from the "Label" column of the "COSE Header Parameters" registry <xref target="IANA.cose_header-parameters"/>.</t>
          </li>
          <li>
            <t>REQ7: If the value of the GROUPNAME URI path and the group name in the access token scope ('gname') are not required to coincide, specify the mechanism to map the GROUPNAME value in the URI to the group name: not applicable, since a perfect matching is required.</t>
          </li>
          <li>
            <t>REQ8: Define whether the KDC has an authentication credential as required for the correct group operation and if this has to be provided through the 'kdc_cred' parameter: optional, see <xref target="join-response"/>.</t>
          </li>
          <li>
            <t>REQ9: Specify if any part of the KDC interface as defined in <xref target="RFC9594"/> is not supported by the KDC: part of the KDC interface is optional to support, see <xref target="kdc-interface"/>.</t>
          </li>
          <li>
            <t>REQ10: Register a Resource Type for the group-membership resources, which is used to discover the correct URL for sending a Join Request to the KDC: the Resource Type (rt=) Link Target Attribute value "core.ps.gm" is registered in <xref target="core_rt"/>.</t>
          </li>
          <li>
            <t>REQ11: Define what specific actions (e.g., CoAP methods) are allowed on each resource accessible through the KDC interface, depending on: whether the Client is a current group member; the roles that a Client is authorised to take as per the obtained access token; and the roles that the Client has as a current group member: see <xref target="kdc-interface"/>.</t>
          </li>
          <li>
            <t>REQ12: Categorize possible newly defined operations for Clients into primary operations expected to be minimally supported and secondary operations, and provide accompanying considerations: no new operations are defined.</t>
          </li>
          <li>
            <t>REQ13: Specify the encoding of group identifiers: CBOR byte string, with value used also to identify the current group key used in the security group (see <xref target="join-response"/> and <xref target="query"/>).</t>
          </li>
          <li>
            <t>REQ14: Specify the approaches used to compute and verify the PoP evidence to include in the 'client_cred_verify' parameter and which of those approaches is used in which case: see <xref target="pop"/>.</t>
          </li>
          <li>
            <t>REQ15: Specify how the nonce N_S is generated, if the access token is not provided to the KDC through the Token Transfer Request sent to the /authz-info endpoint (e.g., the access token is instead transferred during the establishment of a secure communication association): see <xref target="pop"/>.</t>
          </li>
          <li>
            <t>REQ16: Define the initial value of the version number for the group keying material: the initial value <bcp14>MUST</bcp14> be set to 0 (see <xref target="join-response"/>).</t>
          </li>
          <li>
            <t>REQ17: Specify the format of the group keying material that is conveyed in the 'key' parameter: see <xref target="join-response"/>.</t>
          </li>
          <li>
            <t>REQ18: Specify the acceptable values of the 'gkty' parameter. For each of them, register a corresponding entry in the "ACE Groupcomm Key Types" IANA registry if such an entry does not exist already: Group_PubSub_Keying_Material, see <xref target="join-response"/> and <xref target="iana-ace-groupcomm-key"/>.</t>
          </li>
          <li>
            <t>REQ19: Specify and register the application profile identifier: coap_group_pubsub_app (see <xref target="join-response"/> and <xref target="iana-profile"/>).</t>
          </li>
          <li>
            <t>REQ20: If used, specify the format and default values of the entries of the CBOR map to include in the 'group_policies' parameter: not applicable.</t>
          </li>
          <li>
            <t>REQ21: Specify the approaches used to compute and verify the PoP evidence to include in the 'kdc_cred_verify' parameter and which of those approaches is used in which case. If external signature verifiers are supported, specify how those provide a nonce to the KDC to be used for computing the PoP evidence: see <xref target="join-response"/>.</t>
          </li>
          <li>
            <t>REQ22: Specify the communication protocol that members of the group use to communicate with each other (e.g., CoAP for group communication): CoAP <xref target="RFC7252"/>, used for Pub-Sub communications as defined in <xref target="I-D.ietf-core-coap-pubsub"/>.</t>
          </li>
          <li>
            <t>REQ23: Specify the security protocol that members of the group use to protect the group communication (e.g., Group OSCORE). This must provide encryption, integrity, and replay protection: Publishers in a group use a symmetric group key to protect published topic data as a COSE_Encrypt0 object, per the AEAD algorithm specified by the KDC. A Publisher also produces a COSE countersignature of the COSE_Encrypt0 object by using its private key, per the signature algorithm specified by the KDC.</t>
          </li>
          <li>
            <t>REQ24: Specify how the communication is secured between the Client and the KDC. Optionally, specify a transport profile of ACE <xref target="RFC9200"/> to use between the Client and the KDC: ACE transport profile such as for DTLS <xref target="RFC9202"/> or OSCORE <xref target="RFC9203"/>.</t>
          </li>
          <li>
            <t>REQ25: Specify the format of the node identifiers of group members: the Sender ID defined in <xref target="join-response"/>.</t>
          </li>
          <li>
            <t>REQ26: Specify policies at the KDC to handle node identifiers that are included in the 'get_creds' parameter but are not associated with any current group member: see <xref target="query"/>.</t>
          </li>
          <li>
            <t>REQ27: Specify the format of (newly generated) individual keying material for group members or of the information to derive such keying material, as well as the corresponding CBOR map key that has to be registered in the "ACE Groupcomm Parameters" registry: see <xref target="sec-key-renewal-request"/>.</t>
          </li>
          <li>
            <t>REQ28: Specify which CBOR tag is used for identifying the semantics of binary scopes, or register a new CBOR tag if a suitable one does not exist already: see <xref target="as-response"/> and <xref target="content_formats"/>.</t>
          </li>
          <li>
            <t>REQ29: Categorize newly defined parameters according to the same criteria of <xref section="8" sectionFormat="of" target="RFC9594"/>: a Publisher Client <bcp14>MUST</bcp14> support 'group_SenderId' in 'key'; see <xref target="join-response"/>.</t>
          </li>
          <li>
            <t>REQ30: Define whether Clients must, should, or may support the conditional parameters defined in <xref section="8" sectionFormat="of" target="RFC9594"/> and under which circumstances: a Publisher Client <bcp14>MUST</bcp14> support the client_cred', 'cnonce', and 'client_cred_verify' parameters (see <xref target="join-request"/>). A Publisher Client that provides the access token to the KDC through the /authz-info endpoint <bcp14>MUST</bcp14> support the parameter 'kdcchallenge' (see <xref target="token-post"/>).</t>
          </li>
        </ul>
      </section>
      <section anchor="optional-to-address-requirements">
        <name>Optional-to-Address Requirements</name>
        <ul spacing="normal">
          <li>
            <t>OPT1: Optionally, if the textual format of scope is used, specify CBOR values to use for abbreviating the role identifiers in the group: not applicable.</t>
          </li>
          <li>
            <t>OPT2: Optionally, specify the additional parameters used in the exchange of Token Transfer Request and Response: none are defined.</t>
          </li>
          <li>
            <t>OPT3: Optionally, specify the negotiation of parameter values for signature algorithm and signature keys, if the 'sign_info' parameter is not used: see <xref target="token-post"/>.</t>
          </li>
          <li>
            <t>OPT4: Optionally, specify possible or required payload formats for specific error cases: see <xref target="join-error"/>.</t>
          </li>
          <li>
            <t>OPT5: Optionally, specify additional identifiers of error types as values of the 'error-id' field within the Custom Problem Detail entry 'ace-groupcomm-error': none are defined.</t>
          </li>
          <li>
            <t>OPT6: Optionally, specify the encoding of the 'creds_repo' parameter if the default one is not used: no encoding is defined.</t>
          </li>
          <li>
            <t>OPT7: Optionally, specify the functionalities implemented at the resource hosted by the Client at the URI indicated in the 'control_uri' parameter, including the encoding of exchanged messages and other details: no functionalities are defined.</t>
          </li>
          <li>
            <t>OPT8: Optionally, specify the behavior of the POST handler of group-membership resources, for the case when it fails to retrieve an authentication credential for the specific Client: The KDC <bcp14>MUST</bcp14> reply with a 4.00 (Bad Request) error response to the Join Request (see <xref target="join-error"/>).</t>
          </li>
          <li>
            <t>OPT9: Optionally, define a default group rekeying scheme to refer to in case the 'rekeying_scheme' parameter is not included in the Join Response: the "Point-to-Point" rekeying scheme registered in <xref section="11.13" sectionFormat="of" target="RFC9594"/>.</t>
          </li>
          <li>
            <t>OPT10: Optionally, specify the functionalities implemented at the resource hosted by the Client at the URI indicated in the 'control_group_uri' parameter, including the encoding of exchanged messages and other details: no functionalities are defined.</t>
          </li>
          <li>
            <t>OPT11: Optionally, specify policies that instruct Clients to retain messages and for how long, if those are unsuccessfully decrypted: no such policies are specified.</t>
          </li>
          <li>
            <t>OPT12: Optionally, specify for the KDC to perform a group rekeying when receiving a Key Renewal Request, together with or instead of renewing individual keying material: the KDC <bcp14>SHOULD</bcp14> perform a group rekeying if one is already scheduled to occur within an acceptably short time frame, otherwise it <bcp14>SHOULD NOT</bcp14> (see <xref target="sec-key-renewal-request"/>).</t>
          </li>
          <li>
            <t>OPT13: Optionally, specify how the identifier of a group member's authentication credential is included in requests sent to other group members: no such method is defined.</t>
          </li>
          <li>
            <t>OPT14: Optionally, specify additional information to include in rekeying messages for the "Point-to-Point" group rekeying scheme (see <xref section="6" sectionFormat="of" target="RFC9594"/>): no additional information is defined.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="sec-document-updates" removeInRFC="true">
      <name>Document Updates</name>
      <section anchor="sec-01-02">
        <name>Version -01 to -02</name>
        <ul spacing="normal">
          <li>
            <t>Clarified high-level description of the authorisation flow.</t>
          </li>
          <li>
            <t>Clarified relation between a group rekeying and a Key Renewal Request.</t>
          </li>
          <li>
            <t>Editorial fixes and improvements.</t>
          </li>
        </ul>
      </section>
      <section anchor="sec-00-01">
        <name>Version -00 to -01</name>
        <ul spacing="normal">
          <li>
            <t>Clarified recommendations about randomness and size of nonces.</t>
          </li>
          <li>
            <t>Clarified generation of N_S if TLS is used with the KDC instead of DTLS.</t>
          </li>
          <li>
            <t>Added missing references to REQ and OPT requirements.</t>
          </li>
          <li>
            <t>Updated IANA considerations:  </t>
            <ul spacing="normal">
              <li>
                <t>Suggested values for IANA registrations.</t>
              </li>
              <li>
                <t>Renamed TLS Exporter Label.</t>
              </li>
              <li>
                <t>Fixed content types in the CoAP Content-Formats registrations.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Updated references.</t>
          </li>
          <li>
            <t>Editorial fixes and improvements.</t>
          </li>
        </ul>
      </section>
      <section anchor="sec-00">
        <name>Version -00</name>
        <ul spacing="normal">
          <li>
            <t>Imported content from draft-ietf-ace-pubsub-profile-11.</t>
          </li>
          <li>
            <t>Removed content about MQTT.</t>
          </li>
          <li>
            <t>New document title.</t>
          </li>
        </ul>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors wish to thank <contact fullname="Ari Keränen"/>, <contact fullname="John Preuß Mattsson"/>, <contact fullname="Jim Schaad"/>, <contact fullname="Ludwig Seitz"/>, and <contact fullname="Göran Selander"/> for the useful discussion and reviews that helped shape this document.</t>
      <t>This work was supported by the Sweden's Innovation Agency VINNOVA within the EUREKA CELTIC-NEXT projects CRITISEC and CYPRESS; and by the H2020 project SIFIS-Home (Grant agreement 952652).</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
