<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version  (Ruby 3.1.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-ace-oscore-gm-admin-coral-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.17.1 -->
  <front>
    <title abbrev="CoRAL Admin Interface for the OSCORE GM">Using the Constrained RESTful Application Language (CoRAL) with the Admin Interface for the OSCORE Group Manager</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-ace-oscore-gm-admin-coral-00"/>
    <author initials="M." surname="Tiloca" fullname="Marco Tiloca">
      <organization>RISE AB</organization>
      <address>
        <postal>
          <street>Isafjordsgatan 22</street>
          <city>Kista</city>
          <code>16440 Stockholm</code>
          <country>Sweden</country>
        </postal>
        <email>marco.tiloca@ri.se</email>
      </address>
    </author>
    <author initials="R." surname="Höglund" fullname="Rikard Höglund">
      <organization>RISE AB</organization>
      <address>
        <postal>
          <street>Isafjordsgatan 22</street>
          <city>Kista</city>
          <code>16440 Stockholm</code>
          <country>Sweden</country>
        </postal>
        <email>rikard.hoglund@ri.se</email>
      </address>
    </author>
    <date year="2023" month="July" day="01"/>
    <area>Security</area>
    <workgroup>ACE Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>Group communication for CoAP can be secured using Group Object Security for Constrained RESTful Environments (Group OSCORE). A Group Manager is responsible to handle the joining of new group members, as well as to manage and distribute the group keying material. The Group Manager can provide a RESTful admin interface that allows an Administrator entity to create and delete OSCORE groups, as well as to retrieve and update their configuration. This document specifies how an Administrator entity interacts with the admin interface at the Group Manager by using the Constrained RESTful Application Language (CoRAL). The ACE framework for Authentication and Authorization is used to enforce authentication and authorization of the Administrator at the Group Manager. Protocol-specific transport profiles of ACE are used to achieve communication security, proof-of-possession and server authentication.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Authentication and Authorization for Constrained Environments Working Group mailing list (ace@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/ace/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/ace-wg/ace-oscore-gm-admin-coral"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="intro">
      <name>Introduction</name>
      <t>The Constrained Application Protocol (CoAP) <xref target="RFC7252"/> can also be used for group communication <xref target="I-D.ietf-core-groupcomm-bis"/>, where messages are exchanged between members of a group, e.g., over IP multicast. Applications relying on CoAP can achieve end-to-end security at the application layer by using Object Security for Constrained RESTful Environments (OSCORE) <xref target="RFC8613"/>, and especially Group OSCORE <xref target="I-D.ietf-core-oscore-groupcomm"/> in group communication scenarios.</t>
      <t>When group communication for CoAP is protected with Group OSCORE, nodes are required to explicitly join the correct OSCORE group. To this end, a joining node interacts with a Group Manager (GM) entity responsible for that group, and retrieves the required keying material to securely communicate with other group members using Group OSCORE.</t>
      <t>The method in <xref target="I-D.ietf-ace-key-groupcomm-oscore"/> specifies how nodes can join an OSCORE group through the respective Group Manager. Such a method builds on the ACE framework for Authentication and Authorization <xref target="RFC9200"/>, so ensuring a secure joining process as well as authentication and authorization of joining nodes (clients) at the Group Manager (resource server).</t>
      <t><xref target="I-D.ietf-ace-oscore-gm-admin"/> specifies a RESTful admin interface at the Group Manager, intended for an Administrator as a separate entity external to the Group Manager and its application. The interface allows the Administrator to create and delete OSCORE groups, as well as to configure and update their configuration.</t>
      <t>This document builds on <xref target="I-D.ietf-ace-oscore-gm-admin"/>, and specifies how an Administrator interacts with the same RESTful admin interface by using the Constrained RESTful Application Language (CoRAL) <xref target="I-D.ietf-core-coral"/>. Compared to <xref target="I-D.ietf-ace-oscore-gm-admin"/>, there is no change in the admin interface and its operations, nor in the way the group configurations are organized and represented.</t>
      <t>Interaction examples using Packed CBOR <xref target="I-D.ietf-cbor-packed"/> are provided, and are expressed in CBOR diagnostic notation <xref target="RFC8949"/>. <xref target="notation-coral-examples"/> provides the notation and assumptions used in the examples.</t>
      <t>The ACE framework is used to ensure authentication and authorization of the Administrator (client) at the Group Manager (resource server). In order to achieve communication security, proof-of-possession and server authentication, the Administrator and the Group Manager leverage protocol-specific transport profiles of ACE, such as <xref target="RFC9202"/><xref target="RFC9203"/>. These include also possible forthcoming transport profiles that comply with the requirements in <xref section="C" sectionFormat="of" target="RFC9200"/>.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all capitals, as shown here.</t>
        <t>Readers are expected to be familiar with the terms and concepts from the following specifications.</t>
        <ul spacing="normal">
          <li>CBOR <xref target="RFC8949"/>, Packed CBOR <xref target="I-D.ietf-cbor-packed"/>, and COSE <xref target="RFC9052"/><xref target="RFC9053"/>.</li>
          <li>The Constrained RESTful Application Language (CoRAL) <xref target="I-D.ietf-core-coral"/> and Constrained Resource Identifiers (CRIs) <xref target="I-D.ietf-core-href"/>.</li>
          <li>
            <t>The CoAP protocol <xref target="RFC7252"/>, also in group communication scenarios <xref target="I-D.ietf-core-groupcomm-bis"/>. These include the concepts of:  </t>
            <ul spacing="normal">
              <li>"application group", as a set of CoAP nodes that share a common set of resources; and of</li>
              <li>"security group", as a set of CoAP nodes that share the same security material, and use it to protect and verify exchanged messages.</li>
            </ul>
          </li>
          <li>
            <t>The OSCORE <xref target="RFC8613"/> and Group OSCORE <xref target="I-D.ietf-core-oscore-groupcomm"/> security protocols. These especially include the concepts of:  </t>
            <ul spacing="normal">
              <li>Group Manager, as the entity responsible for a set of OSCORE groups where communications among members are secured using Group OSCORE. An OSCORE group is used as security group for one or many application groups.</li>
              <li>Authentication credential, as the set of information associated with an entity, including that entity's public key and parameters associated with the public key. Examples of authentication credentials are CBOR Web Tokens (CWTs) and CWT Claims Sets (CCSs) <xref target="RFC8392"/>, X.509 certificates <xref target="RFC5280"/> and C509 certificates <xref target="I-D.ietf-cose-cbor-encoded-cert"/>.</li>
            </ul>
          </li>
          <li>The ACE framework for authentication and authorization <xref target="RFC9200"/>. The terminology for entities in the considered architecture is defined in OAuth 2.0 <xref target="RFC6749"/>. In particular, this includes Client (C), Resource Server (RS), and Authorization Server (AS).</li>
          <li>The management of keying material for groups in ACE <xref target="I-D.ietf-ace-key-groupcomm"/> and specifically for OSCORE groups <xref target="I-D.ietf-ace-key-groupcomm-oscore"/>. These include the concept of group-membership resource hosted by the Group Manager, that new members access to join the OSCORE group, while current members can access to retrieve updated keying material.</li>
        </ul>
        <t>Readers are also expected to be familiar with the terms and concepts used in <xref target="I-D.ietf-ace-oscore-gm-admin"/>, with particular reference to: "Administrator", "group name", "group-collection resource", and "group-configuration resource".</t>
        <t>Like in <xref target="I-D.ietf-ace-oscore-gm-admin"/>, the url-path to a group-configuration resource has GROUPNAME as last segment, with GROUPNAME the invariant group name assigned upon its creation. Building on the considered url-path of the group-collection resource, this document uses /manage/GROUPNAME as the url-path of a group-configuration resource; implementations are not required to use this name, and can define their own instead.</t>
        <t>Note that, unless otherwise indicated, the term "endpoint" is used here following its OAuth definition, aimed at denoting resources such as /token and /introspect at the AS, and /authz-info at the RS. This document does not use the CoAP definition of "endpoint", which is "An entity participating in the CoAP protocol".</t>
      </section>
      <section anchor="notation-coral-examples">
        <name>Notation and Assumptions in the Examples</name>
        <t>As per <xref section="2.4" sectionFormat="of" target="I-D.ietf-core-coral"/>, CoRAL expresses Uniform Resource Identifiers (URIs) <xref target="RFC3986"/> as Constrained Resource Identifier (CRI) references <xref target="I-D.ietf-core-href"/>.</t>
        <t>The examples in this document use the following notation.</t>
        <t>When using the CURIE syntax <xref target="CURIE-20101216"/>, the following applies.</t>
        <ul spacing="normal">
          <li>'core.osc.gcoll' stands for http://coreapps.org/core.osc.gcoll#</li>
          <li>'core.osc.gconf' stands for http://coreapps.org/core.osc.gconf#</li>
          <li>
            <t>'linkformat' stands for http://www.iana.org/assignments/linkformat  </t>
            <t>
This URI is to be defined with IANA, together with other URIs that build on it through further path segments, e.g., http://www.iana.org/assignments/linkformat/rt</t>
          </li>
        </ul>
        <t>When using a URI http://www.iana.org/assignments/linkformat/SEG1/SEG2</t>
        <ul spacing="normal">
          <li>
            <t>The path segment SEG1 is the name of a web link target attribute.  </t>
            <t>
Names of target attributes used in Link Format <xref target="RFC6690"/> are expected to be coordinated through the "Target Attributes" registry defined in <xref target="I-D.ietf-core-target-attr"/>.</t>
          </li>
          <li>The path segment SEG2 is the value of the target attribute.</li>
        </ul>
        <t>The notation cri'' introduced in <xref target="I-D.ietf-cbor-edn-literals"/> is used to represent CRIs <xref target="I-D.ietf-core-href"/>. This format is not expected to be sent over the network.</t>
        <t>Packed CBOR <xref target="I-D.ietf-cbor-packed"/> is also used, thus reducing representation size. The examples especially refer to the values from the two shared item tables in <xref target="sec-packed-cbor-tables"/>.</t>
        <t>Finally, the examples consider a Group Manager with address [2001:db8::ab], and use the CoAP Content-Format ID 65087 for the media-type application/coral+cbor.</t>
      </section>
    </section>
    <section anchor="overview">
      <name>Group Administration</name>
      <t>The group administration is enforced as defined in <xref section="2" sectionFormat="of" target="I-D.ietf-ace-oscore-gm-admin"/>.</t>
      <section anchor="managing-groups">
        <name>Managing OSCORE Groups</name>
        <t>The same resource model defined in <xref section="2.1" sectionFormat="of" target="I-D.ietf-ace-oscore-gm-admin"/> as based on a group-collection resource and multiple group-configuration resources is used in this document.</t>
        <t>When accessing such resources, the Administrator relies on the same interface defined in <xref section="6" sectionFormat="of" target="I-D.ietf-ace-oscore-gm-admin"/>, for which differences that apply when using CoRAL are compiled in <xref target="interactions"/> of this document.</t>
      </section>
      <section anchor="collection-representation">
        <name>Collection Representation</name>
        <t>A collection of group configurations is represented as a CoRAL document containing the list of corresponding group-configuration resources.</t>
        <t>Each group configuration is represented as a top-level link element, with the URI of the group-configuration resource as link target, and with http://coreapps.org/core.osc.gcoll#item as relation type.</t>
      </section>
      <section anchor="discovery">
        <name>Discovery</name>
        <t>The Administrator can discover the group-collection resource from a Resource Directory (see, for instance <xref target="I-D.hartke-t2trg-coral-reef"/>) or from .well-known/core, by using the resource type "core.osc.gcoll" defined in <xref section="10.3" sectionFormat="of" target="I-D.ietf-ace-oscore-gm-admin"/>.</t>
        <t>The Administrator can discover group-configuration resources for the group-collection resource as specified in <xref target="collection-resource-get"/> and <xref target="collection-resource-fetch"/>.</t>
      </section>
    </section>
    <section anchor="scope-format">
      <name>Format of Scope</name>
      <t>In order to express authorization information for the Administrator (see <xref target="getting-access"/>), the same format and encoding of scope defined in <xref section="3" sectionFormat="of" target="I-D.ietf-ace-oscore-gm-admin"/> is used, as relying on the Authorization Information Format (AIF) <xref target="RFC9237"/> and the extended AIF data model AIF-OSCORE-GROUPCOMM defined in <xref section="3" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm-oscore"/>.</t>
    </section>
    <section anchor="getting-access">
      <name>Getting Access to the Group Manager</name>
      <t>All communications between the involved entities rely on the CoAP protocol and MUST be secured.</t>
      <t>In particular, communications between the Administrator and the Group Manager leverage protocol-specific transport profiles of ACE to achieve communication security, proof-of-possession and server authentication. To this end, the AS may explicitly signal the specific transport profile to use, consistently with requirements and assumptions defined in the ACE framework <xref target="RFC9200"/>.</t>
      <t>With reference to the AS, communications between the Administrator and the AS (/token endpoint) as well as between the Group Manager and the AS (/introspect endpoint) can be secured by different means, for instance using DTLS <xref target="RFC9147"/> or OSCORE <xref target="RFC8613"/>. Further details on how the AS secures communications (with the Administrator and the Group Manager) depend on the specifically used transport profile of ACE, and are out of the scope of this document.</t>
      <t>The Administrator requests access to the Group Manager as per Steps 1-3 in <xref section="4" sectionFormat="of" target="I-D.ietf-ace-oscore-gm-admin"/>.</t>
      <t>The Administrator accesses the admin interface at the Group Manager as per Step 4 in <xref section="4" sectionFormat="of" target="I-D.ietf-ace-oscore-gm-admin"/>, with the difference that administrative operations are performed not as defined in <xref section="6" sectionFormat="of" target="I-D.ietf-ace-oscore-gm-admin"/>, but instead as defined in <xref target="interactions"/> of this document.</t>
      <section anchor="multiple-administrators-for-the-same-oscore-group">
        <name>Multiple Administrators for the Same OSCORE Group</name>
        <t>What is defined in <xref section="4.1" sectionFormat="of" target="I-D.ietf-ace-oscore-gm-admin"/> holds for this document, with the following difference.</t>
        <t>The Administrator performs administrative operations at the Group Manager not as defined in <xref section="6" sectionFormat="of" target="I-D.ietf-ace-oscore-gm-admin"/>, but instead as defined in <xref target="interactions"/> of this document.</t>
      </section>
    </section>
    <section anchor="group-configurations">
      <name>Group Configurations</name>
      <t>A group configuration consists of a set of parameters.</t>
      <section anchor="config-repr">
        <name>Group Configuration Representation</name>
        <t>The same group configuration representation defined in <xref section="5.1" sectionFormat="of" target="I-D.ietf-ace-oscore-gm-admin"/> is used, as including configuration properties and status properties.</t>
        <section anchor="config-repr-config-properties">
          <name>Configuration Properties</name>
          <t>The same configuration properties defined in <xref section="5.1.1" sectionFormat="of" target="I-D.ietf-ace-oscore-gm-admin"/> are used.</t>
        </section>
        <section anchor="config-repr-status-properties">
          <name>Status Properties</name>
          <t>The same status properties defined in <xref section="5.1.2" sectionFormat="of" target="I-D.ietf-ace-oscore-gm-admin"/> are used.</t>
        </section>
      </section>
      <section anchor="default-values">
        <name>Default Values</name>
        <t>The Group manager refers to the same default values defined in <xref section="5.2" sectionFormat="of" target="I-D.ietf-ace-oscore-gm-admin"/>.</t>
      </section>
    </section>
    <section anchor="interactions">
      <name>Interactions with the Group Manager</name>
      <t>The same as defined in <xref section="6" sectionFormat="of" target="I-D.ietf-ace-oscore-gm-admin"/> holds, with the following differences.</t>
      <ul spacing="normal">
        <li>The Content-Format in messages containing a payload is set to application/coral+cbor, defined in <xref section="7.2" sectionFormat="of" target="I-D.ietf-core-coral"/>.</li>
        <li>The parameters 'sign_params', 'ecdh_params', 'app_groups' and 'group_policies' are referred to as "structured parameters".</li>
        <li>
          <t>If a message payload specifies a link element corresponding to a structured parameter, then:  </t>
          <ul spacing="normal">
            <li>The payload MUST NOT include any link element corresponding to an inner information element of that structured parameter.</li>
            <li>
              <t>The link element MUST have the link target with value "false" (0xf4) for indicating the structured parameter with no elements.      </t>
              <t>
Editor's note: this should change to using an empty CBOR array or an empty CBOR map as appropriate, once this is made explicitly possible in the binary format of link items in CoRAL (see Section 3.1.4 of <xref target="I-D.ietf-core-coral"/>).</t>
            </li>
          </ul>
        </li>
        <li>If a message payload specifies an information element of a structured parameter from the group configuration, then that information element MUST be specified by means of the corresponding link element.</li>
      </ul>
      <section anchor="collection-resource-get">
        <name>Retrieve the Full List of Group Configurations</name>
        <t>This operation MUST be supported by the Group Manager and an Administrator.</t>
        <t>The Administrator can send a GET request to the group-collection resource, in order to retrieve a list of the existing OSCORE groups at the Group Manager.</t>
        <t>The same as defined in <xref section="6.1" sectionFormat="of" target="I-D.ietf-ace-oscore-gm-admin"/> holds.</t>
        <t>An example of message exchange is shown below.</t>
        <artwork><![CDATA[
=> 0.01 GET
   Uri-Path: manage

<= 2.05 Content
   Content-Format: 65087 (application/coral+cbor)

   Payload:

   [
     [1, cri'coap://[2001:db8::ab]/manage'],
     [2, 6(17) / item 50 for core.osc.gcoll:item /, cri'/gp1', [
       [2, simple(6) / item 6 for linkformat:rt /,
        6(-200) / item 415 for cri'http://www.iana.org/assignments
                                   /linkformat/rt/core.osc.gconf' /]
     ]],
     [2, 6(17) / item 50 for core.osc.gcoll:item /, cri'/gp2', [
       [2, simple(6) / item 6 for linkformat:rt /,
        6(-200) / item 415 for cri'http://www.iana.org/assignments
                                   /linkformat/rt/core.osc.gconf' /]
     ]],
     [2, 6(17) / item 50 for core.osc.gcoll:item /, cri'/gp3', [
       [2, simple(6) / item 6 for linkformat:rt /,
        6(-200) / item 415 for cri'http://www.iana.org/assignments
                                   /linkformat/rt/core.osc.gconf' /]
     ]]
   ]
]]></artwork>
      </section>
      <section anchor="collection-resource-fetch">
        <name>Retrieve a List of Group Configurations by Filters</name>
        <t>This operation MUST be supported by the Group Manager and MAY be supported by an Administrator.</t>
        <t>The Administrator can send a FETCH request to the group-collection resource, in order to retrieve a list of the existing OSCORE groups that fully match a set of specified filter criteria.</t>
        <t>The same as defined in <xref section="6.2" sectionFormat="of" target="I-D.ietf-ace-oscore-gm-admin"/> holds, with the following differences.</t>
        <ul spacing="normal">
          <li>The filter criteria are specified in the request payload with top-level link elements, each of which corresponds to an entry of the group configuration (see <xref target="config-repr"/>), with the exception of non-empty structured parameters.</li>
          <li>If names of application groups are used as filter criteria, each element of the 'app_groups' array from the status properties is included as a separate link element with name 'app_group'.</li>
          <li>With the exception of the 'app_group' element, a valid request MUST NOT include the same element multiple times. Element values are the ones admitted for the corresponding labels in the POST request for creating a group configuration (see <xref target="collection-resource-post"/>).</li>
        </ul>
        <t>An example of message exchange is shown below.</t>
        <artwork><![CDATA[
=> 0.05 FETCH
   Uri-Path: manage
   Content-Format: 65087 (application/coral+cbor)

   Payload:

   [
     [2, 6(27) / item 70 for core.osc.gconf:group_mode /, true],
     [2, 6(-28) / item 71 for core.osc.gconf:gp_enc_alg /, 10],
     [2, 6(26) / item 68 for core.osc.gconf:hkdf /, 5]
   ]

<= 2.05 Content
   Content-Format: 65087 (application/coral+cbor)

   Payload:

   [
    [1, cri'coap://[2001:db8::ab]/manage'],
    [2, 6(17) / item 50 for core.osc.gcoll:item /, cri'/gp1', [
      [2, simple(6) / item 6 for linkformat:rt /,
       6(-200) / item 415 for cri'http://www.iana.org/assignments
                                  /linkformat/rt/core.osc.gconf' /]
    ]],
    [2, 6(17) / item 50 for core.osc.gcoll:item /, cri'/gp2', [
      [2, simple(6) / item 6 for linkformat:rt /,
       6(-200) / item 415 for cri'http://www.iana.org/assignments
                                  /linkformat/rt/core.osc.gconf' /]
    ]],
    [2, 6(17) / item 50 for core.osc.gcoll:item /, cri'/gp3', [
      [2, simple(6) / item 6 for linkformat:rt /,
       6(-200) / item 415 for cri'http://www.iana.org/assignments
                                  /linkformat/rt/core.osc.gconf' /]
    ]]
   ]
]]></artwork>
      </section>
      <section anchor="collection-resource-post">
        <name>Create a New Group Configuration</name>
        <t>This operation MUST be supported by the Group Manager and an Administrator.</t>
        <t>The Administrator can send a POST request to the group-collection resource, in order to create a new OSCORE group at the Group Manager.</t>
        <t>The same as defined in <xref section="6.3" sectionFormat="of" target="I-D.ietf-ace-oscore-gm-admin"/> holds, with the following differences.</t>
        <ul spacing="normal">
          <li>In the request payload, each link element corresponds to an entry of the group configuration (see <xref target="config-repr"/>), with the exception of non-empty structured parameters.</li>
          <li>In the request payload, each element of the 'app_groups' array from the status properties is included as a separate element with name 'app_group'.</li>
          <li>The Group Manager MUST respond with a 4.00 (Bad Request) response if any link element is specified multiple times in the payload of the POST request, with the exception of the 'app_group' link element.</li>
          <li>The response payload includes one link element for each specified parameter, with the exception of non-empty structured parameters.</li>
          <li>In the response payload, each element of the 'app_groups' array from the status properties is included as a separate element with name 'app_group'.</li>
          <li>If the Administrator performs the registration of the group-membership resource to a Resource Directory on behalf of the Group Manager, then the names of the application groups using the OSCORE group MUST take the values possibly specified by the different 'app_group' link elements in the POST request.</li>
        </ul>
        <t>An example of message exchange is shown below.</t>
        <artwork><![CDATA[
=> 0.02 POST
   Uri-Path: manage
   Content-Format: 65087 (application/coral+cbor)

   Payload:

   [
     [2, 6(-28) / item 71 for core.osc.gconf:gp_enc_alg /, 10],
     [2, 6(26) / item 68 for core.osc.gconf:hkdf /, 5],
     [2, 6(-31) / item 77 for core.osc.gconf:pairwise_mode /, true],
     [2, 6(-36) / item 87 for core.osc.gconf:active /, true],
     [2, 6(36) / item 88 for core.osc.gconf:group_name /, "gp4"],
     [2, 6(-37) / item 89 for core.osc.gconf:group_title /,
      "rooms 1 and 2"],
     [2, 6(39) / item 94 for core.osc.gconf:app_group /, "room 1"],
     [2, 6(39) / item 94 for core.osc.gconf:app_group /, "room 2"],
     [2, 6(43) / item 102 for core.osc.gconf:as_uri /,
      cri'coap://as.example.com/token']
   ]

<= 2.01 Created
   Location-Path: manage
   Location-Path: gp4
   Content-Format: 65087 (application/coral+cbor)

   Payload:

   [
     [2, 6(36) / item 88 for core.osc.gconf:group_name /, "gp4"],
     [2, 6(-41) / item 97 for core.osc.gconf:joining_uri /,
      cri'coap://[2001:db8::ab]/ace-group/gp4/'],
     [2, 6(43) / item 102 for core.osc.gconf:as_uri /,
      cri'coap://as.example.com/token']
   ]
]]></artwork>
      </section>
      <section anchor="configuration-resource-get">
        <name>Retrieve a Group Configuration</name>
        <t>This operation MUST be supported by the Group Manager and an Administrator.</t>
        <t>The Administrator can send a GET request to the group-configuration resource manage/GROUPNAME associated with an OSCORE group with group name GROUPNAME, in order to retrieve the complete current configuration of that group.</t>
        <t>The same as defined in <xref section="6.4" sectionFormat="of" target="I-D.ietf-ace-oscore-gm-admin"/> holds, with the following differences.</t>
        <ul spacing="normal">
          <li>The response payload includes one link element for each entry of the group configuration (see <xref target="config-repr"/>), with the exception of non-empty status parameters.</li>
          <li>Each element of the 'app_groups' array from the status properties is included as a separate link element with name 'app_group'.</li>
        </ul>
        <t>An example of message exchange is shown below.</t>
        <artwork><![CDATA[
=> 0.01 GET
   Uri-Path: manage
   Uri-Path: gp4

<= 2.05 Content
   Content-Format: 65087 (application/coral+cbor)

   Payload:

   [
     [2, 6(26) / item 68 for core.osc.gconf:hkdf /, 5],
     [2, 6(-27) / item 69 for core.osc.gconf:cred_fmt /, 33],
     [2, 6(27) / item 70 for core.osc.gconf:group_mode /, true],
     [2, 6(-28) / item 71 for core.osc.gconf:gp_enc_alg /, 10],
     [2, 6(28) / item 72 for core.osc.gconf:sign_alg /, -8],
     [2, 6(29) / item 74 for
      core.osc.gconf:sign_params.alg_capab.key_type /, 1],
     [2, 6(-30) / item 75 for
      core.osc.gconf:sign_params.key_type_capab.key_type /, 1],
     [2, 6(30) / item 76 for
      core.osc.gconf:sign_params.key_type_capab.curve /, 6],
     [2, 6(-31) / item 77 for core.osc.gconf:pairwise_mode /, true],
     [2, 6(31) / item 78 for core.osc.gconf:alg /, 10],
     [2, 6(-32) / item 79 for core.osc.gconf:ecdh_alg /, -27],
     [2, 6(-33) / item 81 for
      core.osc.gconf:ecdh_params.alg_capab.key_type /, 1],
     [2, 6(33) / item 82 for
      core.osc.gconf:ecdh_params.key_type_capab.key_type /, 1],
     [2, 6(-34) / item 83 for
      core.osc.gconf:ecdh_params.key_type_capab.curve /, 6],
     [2, 6(34) / item 84 for core.osc.gconf:det_req /, false],
     [2, 6(35) / item 86 for core.osc.gconf:rt /, "core.osc.gconf"],
     [2, 6(-36) / item 87 for core.osc.gconf:active /, true],
     [2, 6(36) / item 88 for core.osc.gconf:group_name /, "gp4"],
     [2, 6(-37) / item 89 for core.osc.gconf:group_title /,
      "rooms 1 and 2"],
     [2, 6(37) / item 90 for core.osc.gconf:ace_groupcomm_profile /,
      "coap_group_oscore_app"],
     [2, 6(-38) / item 91 for core.osc.gconf:max_stale_sets /, 3],
     [2, 6(38) / item 92 for core.osc.gconf:exp /, 1360289224],
     [2, 6(-39) / item 93 for core.osc.gconf:gid_reuse /, false],
     [2, 6(39) / item 94 for core.osc.gconf:app_group /, "room 1"],
     [2, 6(39) / item 94 for core.osc.gconf:app_group /, "room 2"],
     [2, 6(-41) / item 97 for core.osc.gconf:joining_uri /,
      cri'coap://[2001:db8::ab]/ace-group/gp4/'],
     [2, 6(43) / item 102 for core.osc.gconf:as_uri /,
      cri'coap://as.example.com/token']
   ]
]]></artwork>
      </section>
      <section anchor="configuration-resource-fetch">
        <name>Retrieve Part of a Group Configuration by Filters</name>
        <t>This operation MUST be supported by the Group Manager and MAY be supported by an Administrator.</t>
        <t>The Administrator can send a FETCH request to the group-configuration resource manage/GROUPNAME associated with an OSCORE group with group name GROUPNAME, in order to retrieve part of the current configuration of that group.</t>
        <t>The same as defined in <xref section="6.5" sectionFormat="of" target="I-D.ietf-ace-oscore-gm-admin"/> holds, with the following differences.</t>
        <ul spacing="normal">
          <li>The request payload includes one link element for each requested configuration parameter or status parameter of the current group configuration (see <xref target="config-repr"/>). All the specified link elements MUST have the link target with value "null".</li>
          <li>The request payload MUST NOT include any link element corresponding to an inner information element of a structured parameter.</li>
          <li>
            <t>The response payload includes the requested configuration parameters and status parameters, and is formatted as in the response payload of a GET request to a group-configuration resource (see <xref target="configuration-resource-get"/>).  </t>
            <t>
If the request payload specifies a parameter that is not included in the group configuration, then the response payload MUST NOT include a corresponding link element.</t>
          </li>
        </ul>
        <t>An example of message exchange is shown below.</t>
        <artwork><![CDATA[
=> 0.05 FETCH
   Uri-Path: manage
   Uri-Path: gp4
   Content-Format: 65087 (application/coral+cbor)

   Payload:

   [
     [2, 6(-28) / item 71 for core.osc.gconf:gp_enc_alg /, null],
     [2, 6(26) / item 68 for core.osc.gconf:hkdf /, null],
     [2, 6(-31) / item 77 for core.osc.gconf:pairwise_mode /, null],
     [2, 6(-36) / item 87 for core.osc.gconf:active /, null],
     [2, 6(-37) / item 89 for core.osc.gconf:group_title /, null],
     [2, 6(41) / item 98 for core.osc.gconf:app_groups /, null]
   ]

<= 2.05 Content
   Content-Format: 65087 (application/coral+cbor)

   Payload:

   [
     [2, 6(-28) / item 71 for core.osc.gconf:gp_enc_alg /, 10],
     [2, 6(26) / item 68 for core.osc.gconf:hkdf /, 5],
     [2, 6(-31) / item 77 for core.osc.gconf:pairwise_mode /, true],
     [2, 6(-36) / item 87 for core.osc.gconf:active /, true],
     [2, 6(-37) / item 89 for core.osc.gconf:group_title /,
      "rooms 1 and 2"],
     [2, 6(39) / item 94 for core.osc.gconf:app_group /, "room 1"],
     [2, 6(39) / item 94 for core.osc.gconf:app_group /, "room 2"]
   ]
]]></artwork>
      </section>
      <section anchor="configuration-resource-put">
        <name>Overwrite a Group Configuration</name>
        <t>This operation MAY be supported by the Group Manager and an Administrator.</t>
        <t>The Administrator can send a PUT request to the group-configuration resource manage/GROUPNAME associated with an OSCORE group with group name GROUPNAME, in order to overwrite the current configuration of that group with a new one.</t>
        <t>The same as defined in <xref section="6.6" sectionFormat="of" target="I-D.ietf-ace-oscore-gm-admin"/> holds, with the following difference.</t>
        <ul spacing="normal">
          <li>If the Administrator updates the registration of the group-membership resource in the Resource Directory on behalf of the Group Manager, then the names of the application groups using the OSCORE group MUST take the values possibly specified by the different 'app_group' link elements in the PUT request.</li>
        </ul>
        <t>An example of message exchange is shown below.</t>
        <artwork><![CDATA[
=> 0.03 PUT
   Uri-Path: manage
   Uri-Path: gp4
   Content-Format: 65087 (application/coral+cbor)

   Payload:

   [
     [2, 6(-28) / item 71 for core.osc.gconf:gp_enc_alg /, 11],
     [2, 6(26) / item 68 for core.osc.gconf:hkdf /, 5]
   ]

<= 2.04 Changed
   Content-Format: 65087 (application/coral+cbor)

   Payload:

   [
     [2, 6(36) / item 88 for core.osc.gconf:group_name /, "gp4"],
     [2, 6(-41) / item 97 for core.osc.gconf:joining_uri /,
      cri'coap://[2001:db8::ab]/ace-group/gp4/'],
     [2, 6(43) / item 102 for core.osc.gconf:as_uri /,
      cri'coap://as.example.com/token']
   ]
]]></artwork>
        <section anchor="sssec-effects-overwrite-joining-nodes">
          <name>Effects on Joining Nodes</name>
          <t>The same as defined in <xref section="6.6.1" sectionFormat="of" target="I-D.ietf-ace-oscore-gm-admin"/> holds.</t>
        </section>
        <section anchor="sssec-effects-overwrite-group-members">
          <name>Effects on the Group Members</name>
          <t>The same as defined in <xref section="6.6.2" sectionFormat="of" target="I-D.ietf-ace-oscore-gm-admin"/> holds.</t>
        </section>
      </section>
      <section anchor="configuration-resource-patch">
        <name>Selective Update of a Group Configuration</name>
        <t>This operation MAY be supported by the Group Manager and an Administrator.</t>
        <t>The Administrator can send a PATCH/iPATCH request <xref target="RFC8132"/> to the group-configuration resource manage/GROUPNAME associated with an OSCORE group with group name GROUPNAME, in order to update the value of only part of the group configuration.</t>
        <t>The same as defined in <xref section="6.7" sectionFormat="of" target="I-D.ietf-ace-oscore-gm-admin"/> holds, with the following differences.</t>
        <ul spacing="normal">
          <li>
            <t>If the request payload specifies names of application groups to be removed from or added to the 'app_groups' status parameter, then such names are specified by means of the following top-level link elements.  </t>
            <ul spacing="normal">
              <li>'app_group_del', with value a text string specifying the name of an application group to remove from the 'app_groups' status parameter. This link element can be included multiple times.</li>
              <li>'app_group_add', with value a text string specifying the name of an application group to add to the 'app_groups' status parameter. This link element can be included multiple times.</li>
            </ul>
            <t>
The Group Manager MUST respond with a 4.00 (Bad Request) response, in case the request payload includes both any 'app_group' link element as well as any 'app_group_del' and/or 'app_group_add' link element.</t>
          </li>
          <li>The Group Manager MUST respond with a 4.00 (Bad Request) response, if the request payload includes no link elements.</li>
          <li>When the request uses specifically the iPATCH method, the Group Manager MUST respond with a 4.00 (Bad Request) response, in case any link element 'app_group_del' and/or 'app_group_add' is included.</li>
          <li>
            <t>When updating the 'app_groups' status parameter by difference, the Group Manager:  </t>
            <ul spacing="normal">
              <li>Deletes from the 'app_groups' status parameter the names of the application groups specified in the different 'app_group_del' link elements.</li>
              <li>Adds to the 'app_groups' status parameter the names of the application groups specified in the different 'app_group_add' link elements.</li>
            </ul>
          </li>
        </ul>
        <t>An example of message exchange is shown below.</t>
        <artwork><![CDATA[
=> 0.06 PATCH
   Uri-Path: manage
   Uri-Path: gp4
   Content-Format: 65087 (application/coral+cbor)

   Payload:

   [
     [2, 6(-28) / item 71 for core.osc.gconf:gp_enc_alg /, 10],
     [2, 6(-40) / item 95 for core.osc.gconf:app_group_del /, "room1"],
     [2, 6(40) / item 96 for core.osc.gconf:app_group_add /, "room3"],
     [2, 6(40) / item 96 for core.osc.gconf:app_group_add /, "room4"]
   ]

<= 2.04 Changed
   Content-Format: 65087 (application/coral+cbor)

   Payload:

   [
     [2, 6(36) / item 88 for core.osc.gconf:group_name /, "gp4"],
     [2, 6(-41) / item 97 for core.osc.gconf:joining_uri /,
      cri'coap://[2001:db8::ab]/ace-group/gp4/'],
     [2, 6(43) / item 102 for core.osc.gconf:as_uri /,
      cri'coap://as.example.com/token']
   ]
]]></artwork>
        <section anchor="effects-on-joining-nodes">
          <name>Effects on Joining Nodes</name>
          <t>The same as defined in <xref section="6.7.1" sectionFormat="of" target="I-D.ietf-ace-oscore-gm-admin"/> holds.</t>
        </section>
        <section anchor="effects-on-the-group-members">
          <name>Effects on the Group Members</name>
          <t>The same as defined in <xref section="6.7.2" sectionFormat="of" target="I-D.ietf-ace-oscore-gm-admin"/> holds.</t>
        </section>
      </section>
      <section anchor="configuration-resource-delete">
        <name>Delete a Group Configuration</name>
        <t>This operation MUST be supported by the Group Manager and an Administrator.</t>
        <t>The Administrator can send a DELETE request to the group-configuration resource manage/GROUPNAME associated with an OSCORE group with group name GROUPNAME, in order to delete that OSCORE group.</t>
        <t>The same as defined in <xref section="6.8" sectionFormat="of" target="I-D.ietf-ace-oscore-gm-admin"/> holds.</t>
        <section anchor="effects-on-the-group-members-1">
          <name>Effects on the Group Members</name>
          <t>The same as defined in <xref section="6.8.1" sectionFormat="of" target="I-D.ietf-ace-oscore-gm-admin"/> holds.</t>
        </section>
      </section>
    </section>
    <section anchor="support-of-top-level-link-elements">
      <name>Support of Top-Level Link Elements</name>
      <t>Consistently with <xref section="7" sectionFormat="of" target="I-D.ietf-ace-oscore-gm-admin"/>, the following holds for the Group Manager.</t>
      <ul spacing="normal">
        <li>
          <t>It MUST support the top-level link elements 'error', 'error_description', 'ace_groupcomm_profile', 'exp', and 'group_policies' corresponding to the ACE Groupcomm Parameters defined in <xref section="8" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>.  </t>
          <t>
This is consistent with what is defined in <xref section="8" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/> for the Key Distribution Center, of which the Group Manager defined in <xref target="I-D.ietf-ace-key-groupcomm-oscore"/> is a specific instance.</t>
        </li>
        <li>It MUST support the top-level link elements corresponding to all the parameters listed in <xref section="7" sectionFormat="of" target="I-D.ietf-ace-oscore-gm-admin"/>, with the exception of 'app_groups_diff' that MUST be supported only if the Group Manager supports the selective update of a group configuration (see <xref target="configuration-resource-patch"/>).</li>
      </ul>
      <t>The following holds for an Administrator.</t>
      <ul spacing="normal">
        <li>It MUST support the top-level link elements 'error', 'error_description', 'ace_groupcomm_profile', 'exp', and 'group_policies' corresponding to the ACE Groupcomm Parameters defined in <xref section="8" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>.</li>
        <li>
          <t>It MUST support the top-level link elements corresponding to all the parameters listed in <xref section="7" sectionFormat="of" target="I-D.ietf-ace-oscore-gm-admin"/>, with the following exceptions.  </t>
          <ul spacing="normal">
            <li>'conf_filter', which MUST be supported only if the Administrator supports the partial retrieval of a group configuration by filters (see <xref target="configuration-resource-fetch"/>).</li>
            <li>'app_groups_diff' parameter, which MUST be supported only if the Administrator supports the selective update of a group configuration (see <xref target="configuration-resource-patch"/>).</li>
          </ul>
        </li>
      </ul>
    </section>
    <section anchor="error-identifiers">
      <name>Error Identifiers</name>
      <t>If the Group Manager sends an error response including the link element 'error', this can specify any of the values defined in <xref section="8" sectionFormat="of" target="I-D.ietf-ace-oscore-gm-admin"/>.</t>
      <t>The same guidelines in <xref section="8" sectionFormat="of" target="I-D.ietf-ace-oscore-gm-admin"/> for the Administrator to handle such error identifiers holds.</t>
    </section>
    <section anchor="sec-security-considerations">
      <name>Security Considerations</name>
      <t>Security considerations are inherited from the ACE framework for Authentication and Authorization <xref target="RFC9200"/>, and from the specific transport profile of ACE used between the Administrator and the Group Manager, such as <xref target="RFC9202"/> and <xref target="RFC9203"/>.</t>
      <t>The same security considerations from <xref target="I-D.ietf-ace-key-groupcomm"/> and <xref target="I-D.ietf-ace-key-groupcomm-oscore"/> also apply, with particular reference to the process of rekeying OSCORE groups.</t>
      <t>The same security considerations from <xref target="I-D.ietf-ace-oscore-gm-admin"/> also apply, as well for the security considerations for CoRAL <xref target="I-D.ietf-core-coral"/> and Packed CBOR <xref target="I-D.ietf-cbor-packed"/>.</t>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <t>This document has no actions for IANA.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="I-D.ietf-core-oscore-groupcomm">
          <front>
            <title>Group Object Security for Constrained RESTful Environments (Group OSCORE)</title>
            <author fullname="Marco Tiloca" initials="M." surname="Tiloca">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Göran Selander" initials="G." surname="Selander">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Francesca Palombini" initials="F." surname="Palombini">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Jiye Park" initials="J." surname="Park">
              <organization>Universitaet Duisburg-Essen</organization>
            </author>
            <date day="22" month="June" year="2023"/>
            <abstract>
              <t>   This document defines the security protocol Group Object Security for
   Constrained RESTful Environments (Group OSCORE), providing end-to-end
   security of CoAP messages exchanged between members of a group, e.g.,
   sent over IP multicast.  In particular, the described protocol
   defines how OSCORE is used in a group communication setting to
   provide source authentication for CoAP group requests, sent by a
   client to multiple servers, and for protection of the corresponding
   CoAP responses.  Group OSCORE also defines a pairwise mode where each
   member of the group can efficiently derive a symmetric pairwise key
   with any other member of the group for pairwise OSCORE communication.
   Group OSCORE can be used between endpoints communicating with CoAP or
   CoAP-mappable HTTP.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-oscore-groupcomm-18"/>
        </reference>
        <reference anchor="I-D.ietf-ace-key-groupcomm">
          <front>
            <title>Key Provisioning for Group Communication using ACE</title>
            <author fullname="Francesca Palombini" initials="F." surname="Palombini">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Marco Tiloca" initials="M." surname="Tiloca">
              <organization>RISE AB</organization>
            </author>
            <date day="5" month="September" year="2022"/>
            <abstract>
              <t>   This document defines how to use the Authentication and Authorization
   for Constrained Environments (ACE) framework to distribute keying
   material and configuration parameters for secure group communication.
   Candidate group members acting as Clients and authorized to join a
   group can do so by interacting with a Key Distribution Center (KDC)
   acting as Resource Server, from which they obtain the keying material
   to communicate with other group members.  While defining general
   message formats as well as the interface and operations available at
   the KDC, this document supports different approaches and protocols
   for secure group communication.  Therefore, details are delegated to
   separate application profiles of this document, as specialized
   instances that target a particular group communication approach and
   define how communications in the group are protected.  Compliance
   requirements for such application profiles are also specified.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ace-key-groupcomm-16"/>
        </reference>
        <reference anchor="I-D.ietf-ace-key-groupcomm-oscore">
          <front>
            <title>Key Management for OSCORE Groups in ACE</title>
            <author fullname="Marco Tiloca" initials="M." surname="Tiloca">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Jiye Park" initials="J." surname="Park">
              <organization>Universitaet Duisburg-Essen</organization>
            </author>
            <author fullname="Francesca Palombini" initials="F." surname="Palombini">
              <organization>Ericsson AB</organization>
            </author>
            <date day="6" month="March" year="2023"/>
            <abstract>
              <t>   This document defines an application profile of the ACE framework for
   Authentication and Authorization, to request and provision keying
   material in group communication scenarios that are based on CoAP and
   are secured with Group Object Security for Constrained RESTful
   Environments (Group OSCORE).  This application profile delegates the
   authentication and authorization of Clients, that join an OSCORE
   group through a Resource Server acting as Group Manager for that
   group.  This application profile leverages protocol-specific
   transport profiles of ACE to achieve communication security, server
   authentication and proof-of-possession for a key owned by the Client
   and bound to an OAuth 2.0 Access Token.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ace-key-groupcomm-oscore-16"/>
        </reference>
        <reference anchor="I-D.ietf-ace-oscore-gm-admin">
          <front>
            <title>Admin Interface for the OSCORE Group Manager</title>
            <author fullname="Marco Tiloca" initials="M." surname="Tiloca">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Rikard Höglund" initials="R." surname="Höglund">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Peter Van der Stok" initials="P." surname="Van der Stok">
              <organization>Consultant</organization>
            </author>
            <author fullname="Francesca Palombini" initials="F." surname="Palombini">
              <organization>Ericsson AB</organization>
            </author>
            <date day="1" month="July" year="2023"/>
            <abstract>
              <t>   Group communication for CoAP can be secured using Group Object
   Security for Constrained RESTful Environments (Group OSCORE).  A
   Group Manager is responsible to handle the joining of new group
   members, as well as to manage and distribute the group keying
   material.  This document defines a RESTful admin interface at the
   Group Manager, that allows an Administrator entity to create and
   delete OSCORE groups, as well as to retrieve and update their
   configuration.  The ACE framework for Authentication and
   Authorization is used to enforce authentication and authorization of
   the Administrator at the Group Manager.  Protocol-specific transport
   profiles of ACE are used to achieve communication security, proof-of-
   possession, and server authentication.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ace-oscore-gm-admin-09"/>
        </reference>
        <reference anchor="I-D.ietf-core-coral">
          <front>
            <title>The Constrained RESTful Application Language (CoRAL)</title>
            <author fullname="Christian Amsüss" initials="C." surname="Amsüss">
         </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>ARM</organization>
            </author>
            <date day="7" month="March" year="2022"/>
            <abstract>
              <t>   The Constrained RESTful Application Language (CoRAL) defines a data
   model and interaction model as well as a compact serialization
   formats for the description of typed connections between resources on
   the Web ("links"), possible operations on such resources ("forms"),
   and simple resource metadata.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-coral-05"/>
        </reference>
        <reference anchor="I-D.ietf-core-groupcomm-bis">
          <front>
            <title>Group Communication for the Constrained Application Protocol (CoAP)</title>
            <author fullname="Esko Dijk" initials="E." surname="Dijk">
              <organization>IoTconsultancy.nl</organization>
            </author>
            <author fullname="Chonggang Wang" initials="C." surname="Wang">
              <organization>InterDigital</organization>
            </author>
            <author fullname="Marco Tiloca" initials="M." surname="Tiloca">
              <organization>RISE AB</organization>
            </author>
            <date day="11" month="January" year="2023"/>
            <abstract>
              <t>   This document specifies the use of the Constrained Application
   Protocol (CoAP) for group communication, including the use of UDP/IP
   multicast as the default underlying data transport.  Both unsecured
   and secured CoAP group communication are specified.  Security is
   achieved by use of the Group Object Security for Constrained RESTful
   Environments (Group OSCORE) protocol.  The target application area of
   this specification is any group communication use cases that involve
   resource-constrained devices or networks that support CoAP.  This
   document replaces RFC 7390, while it updates RFC 7252 and RFC 7641.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-groupcomm-bis-08"/>
        </reference>
        <reference anchor="I-D.ietf-cbor-edn-literals">
          <front>
            <title>Application-Oriented Literals in CBOR Extended Diagnostic Notation</title>
            <author fullname="Carsten Bormann" initials="C." surname="Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <date day="14" month="June" year="2023"/>
            <abstract>
              <t>   The Concise Binary Object Representation, CBOR (RFC 8949), defines a
   "diagnostic notation" in order to be able to converse about CBOR data
   items without having to resort to binary data.

   This document specifies how to add application-oriented extensions to
   the diagnostic notation.  It then defines two such extensions for the
   use of CBOR diagnostic notation with CoRAL and Constrained Resource
   Identifiers (draft-ietf-core-coral, draft-ietf-core-href).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cbor-edn-literals-00"/>
        </reference>
        <reference anchor="I-D.ietf-cbor-packed">
          <front>
            <title>Packed CBOR</title>
            <author fullname="Carsten Bormann" initials="C." surname="Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <date day="23" month="January" year="2023"/>
            <abstract>
              <t>   The Concise Binary Object Representation (CBOR, RFC 8949 == STD 94)
   is a data format whose design goals include the possibility of
   extremely small code size, fairly small message size, and
   extensibility without the need for version negotiation.

   CBOR does not provide any forms of data compression.  CBOR data
   items, in particular when generated from legacy data models, often
   allow considerable gains in compactness when applying data
   compression.  While traditional data compression techniques such as
   DEFLATE (RFC 1951) can work well for CBOR encoded data items, their
   disadvantage is that the receiver needs to decompress the compressed
   form to make use of the data.

   This specification describes Packed CBOR, a simple transformation of
   a CBOR data item into another CBOR data item that is almost as easy
   to consume as the original CBOR data item.  A separate decompression
   step is therefore often not required at the receiver.


   // The present version (-08) is a refresh update to -07, which added
   // the concept of Tag Equivalence as initially discussed at the CBOR
   // Interim meeting 12 in 2022 and at IETF 114.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cbor-packed-08"/>
        </reference>
        <reference anchor="I-D.ietf-core-href">
          <front>
            <title>Constrained Resource Identifiers</title>
            <author fullname="Carsten Bormann" initials="C." surname="Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <date day="6" month="March" year="2023"/>
            <abstract>
              <t>   The Constrained Resource Identifier (CRI) is a complement to the
   Uniform Resource Identifier (URI) that serializes the URI components
   in Concise Binary Object Representation (CBOR) instead of a sequence
   of characters.  This simplifies parsing, comparison and reference
   resolution in environments with severe limitations on processing
   power, code size, and memory size.


   // The present revision -12 of this draft adds a registry that is
   // intended to provide full coverage for representing a URI scheme
   // (and certain text strings used in their place) as negative
   // integers.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-href-12"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized.  This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC3986">
          <front>
            <title>Uniform Resource Identifier (URI): Generic Syntax</title>
            <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee"/>
            <author fullname="R. Fielding" initials="R." surname="Fielding"/>
            <author fullname="L. Masinter" initials="L." surname="Masinter"/>
            <date month="January" year="2005"/>
            <abstract>
              <t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource.  This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet.  The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier.  This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="66"/>
          <seriesInfo name="RFC" value="3986"/>
          <seriesInfo name="DOI" value="10.17487/RFC3986"/>
        </reference>
        <reference anchor="RFC6690">
          <front>
            <title>Constrained RESTful Environments (CoRE) Link Format</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <date month="August" year="2012"/>
            <abstract>
              <t>This specification defines Web Linking using a link format for use by constrained web servers to describe hosted resources, their attributes, and other relationships between links.  Based on the HTTP Link Header field defined in RFC 5988, the Constrained RESTful Environments (CoRE) Link Format is carried as a payload and is assigned an Internet media type. "RESTful" refers to the Representational State Transfer (REST) architecture.  A well-known URI is defined as a default entry point for requesting the links hosted by a server. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6690"/>
          <seriesInfo name="DOI" value="10.17487/RFC6690"/>
        </reference>
        <reference anchor="RFC6749">
          <front>
            <title>The OAuth 2.0 Authorization Framework</title>
            <author fullname="D. Hardt" initials="D." role="editor" surname="Hardt"/>
            <date month="October" year="2012"/>
            <abstract>
              <t>The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf.  This specification replaces and obsoletes the OAuth 1.0 protocol described in RFC 5849. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6749"/>
          <seriesInfo name="DOI" value="10.17487/RFC6749"/>
        </reference>
        <reference anchor="RFC7252">
          <front>
            <title>The Constrained Application Protocol (CoAP)</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s. The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
              <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types. CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7252"/>
          <seriesInfo name="DOI" value="10.17487/RFC7252"/>
        </reference>
        <reference anchor="RFC8132">
          <front>
            <title>PATCH and FETCH Methods for the Constrained Application Protocol (CoAP)</title>
            <author fullname="P. van der Stok" initials="P." surname="van der Stok"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="A. Sehgal" initials="A." surname="Sehgal"/>
            <date month="April" year="2017"/>
            <abstract>
              <t>The methods defined in RFC 7252 for the Constrained Application Protocol (CoAP) only allow access to a complete resource, not to parts of a resource. In case of resources with larger or complex data, or in situations where resource continuity is required, replacing or requesting the whole resource is undesirable. Several applications using CoAP need to access parts of the resources.</t>
              <t>This specification defines the new CoAP methods, FETCH, PATCH, and iPATCH, which are used to access and update parts of a resource.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8132"/>
          <seriesInfo name="DOI" value="10.17487/RFC8132"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8613">
          <front>
            <title>Object Security for Constrained RESTful Environments (OSCORE)</title>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="J. Mattsson" initials="J." surname="Mattsson"/>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <author fullname="L. Seitz" initials="L." surname="Seitz"/>
            <date month="July" year="2019"/>
            <abstract>
              <t>This document defines Object Security for Constrained RESTful Environments (OSCORE), a method for application-layer protection of the Constrained Application Protocol (CoAP), using CBOR Object Signing and Encryption (COSE). OSCORE provides end-to-end protection between endpoints communicating using CoAP or CoAP-mappable HTTP. OSCORE is designed for constrained nodes and networks supporting a range of proxy operations, including translation between different transport protocols.</t>
              <t>Although an optional functionality of CoAP, OSCORE alters CoAP options processing and IANA registration. Therefore, this document updates RFC 7252.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8613"/>
          <seriesInfo name="DOI" value="10.17487/RFC8613"/>
        </reference>
        <reference anchor="RFC8949">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="94"/>
          <seriesInfo name="RFC" value="8949"/>
          <seriesInfo name="DOI" value="10.17487/RFC8949"/>
        </reference>
        <reference anchor="RFC9052">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
              <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="96"/>
          <seriesInfo name="RFC" value="9052"/>
          <seriesInfo name="DOI" value="10.17487/RFC9052"/>
        </reference>
        <reference anchor="RFC9053">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Initial Algorithms</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines a set of algorithms that can be used with the CBOR Object Signing and Encryption (COSE) protocol (RFC 9052).</t>
              <t>This document, along with RFC 9052, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9053"/>
          <seriesInfo name="DOI" value="10.17487/RFC9053"/>
        </reference>
        <reference anchor="RFC9200">
          <front>
            <title>Authentication and Authorization for Constrained Environments Using the OAuth 2.0 Framework (ACE-OAuth)</title>
            <author fullname="L. Seitz" initials="L." surname="Seitz"/>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>This specification defines a framework for authentication and authorization in Internet of Things (IoT) environments called ACE-OAuth.  The framework is based on a set of building blocks including OAuth 2.0 and the Constrained Application Protocol (CoAP), thus transforming a well-known and widely used authorization solution into a form suitable for IoT devices.  Existing specifications are used where possible, but extensions are added and profiles are defined to better serve the IoT use cases.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9200"/>
          <seriesInfo name="DOI" value="10.17487/RFC9200"/>
        </reference>
        <reference anchor="RFC9202">
          <front>
            <title>Datagram Transport Layer Security (DTLS) Profile for Authentication and Authorization for Constrained Environments (ACE)</title>
            <author fullname="S. Gerdes" initials="S." surname="Gerdes"/>
            <author fullname="O. Bergmann" initials="O." surname="Bergmann"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="L. Seitz" initials="L." surname="Seitz"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>This specification defines a profile of the Authentication and Authorization for Constrained Environments (ACE) framework that allows constrained servers to delegate client authentication and authorization.  The protocol relies on DTLS version 1.2 or later for communication security between entities in a constrained network using either raw public keys or pre-shared keys.  A resource-constrained server can use this protocol to delegate management of authorization information to a trusted host with less-severe limitations regarding processing power and memory.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9202"/>
          <seriesInfo name="DOI" value="10.17487/RFC9202"/>
        </reference>
        <reference anchor="RFC9203">
          <front>
            <title>The Object Security for Constrained RESTful Environments (OSCORE) Profile of the Authentication and Authorization for Constrained Environments (ACE) Framework</title>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <author fullname="L. Seitz" initials="L." surname="Seitz"/>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="M. Gunnarsson" initials="M." surname="Gunnarsson"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>This document specifies a profile for the Authentication and Authorization for Constrained Environments (ACE) framework.  It utilizes Object Security for Constrained RESTful Environments (OSCORE) to provide communication security and proof-of-possession for a key owned by the client and bound to an OAuth 2.0 access token.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9203"/>
          <seriesInfo name="DOI" value="10.17487/RFC9203"/>
        </reference>
        <reference anchor="RFC9237">
          <front>
            <title>An Authorization Information Format (AIF) for Authentication and Authorization for Constrained Environments (ACE)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Information about which entities are authorized to perform what operations on which constituents of other entities is a crucial component of producing an overall system that is secure. Conveying precise authorization information is especially critical in highly automated systems with large numbers of entities, such as the Internet of Things.</t>
              <t>This specification provides a generic information model and format for representing such authorization information, as well as two variants of a specific instantiation of that format for use with Representational State Transfer (REST) resources identified by URI path.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9237"/>
          <seriesInfo name="DOI" value="10.17487/RFC9237"/>
        </reference>
        <reference anchor="CURIE-20101216" target="http://www.w3.org/TR/2010/NOTE-curie-20101216">
          <front>
            <title>CURIE Syntax 1.0 - A syntax for expressing Compact URIs - W3C Working Group Note</title>
            <author initials="M." surname="Birbeck" fullname="Mark Birbeck">
              <organization/>
            </author>
            <author initials="S." surname="McCarron" fullname="Shane McCarron">
              <organization/>
            </author>
            <date year="2010" month="December" day="16"/>
          </front>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="I-D.hartke-t2trg-coral-reef">
          <front>
            <title>Resource Discovery in Constrained RESTful Environments (CoRE) using the Constrained RESTful Application Language (CoRAL)</title>
            <author fullname="Klaus Hartke" initials="K." surname="Hartke">
              <organization>Ericsson</organization>
            </author>
            <date day="9" month="May" year="2020"/>
            <abstract>
              <t>   This document explores how the Constrained RESTful Application
   Language (CoRAL) might be used for two use cases in Constrained
   RESTful Environments (CoRE): CoRE Resource Discovery, which allows a
   client to discover the resources of a server given a host name or IP
   address, and CoRE Resource Directory, which provides a directory of
   resources on many servers.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-hartke-t2trg-coral-reef-04"/>
        </reference>
        <reference anchor="I-D.ietf-cose-cbor-encoded-cert">
          <front>
            <title>CBOR Encoded X.509 Certificates (C509 Certificates)</title>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Göran Selander" initials="G." surname="Selander">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Shahid Raza" initials="S." surname="Raza">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Joel Höglund" initials="J." surname="Höglund">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Martin Furuhed" initials="M." surname="Furuhed">
              <organization>Nexus Group</organization>
            </author>
            <date day="10" month="January" year="2023"/>
            <abstract>
              <t>   This document specifies a CBOR encoding of X.509 certificates.  The
   resulting certificates are called C509 Certificates.  The CBOR
   encoding supports a large subset of RFC 5280 and all certificates
   compatible with the RFC 7925, IEEE 802.1AR (DevID), CNSA, RPKI, GSMA
   eUICC, and CA/Browser Forum Baseline Requirements profiles.  When
   used to re-encode DER encoded X.509 certificates, the CBOR encoding
   can in many cases reduce the size of RFC 7925 profiled certificates
   with over 50%.  The CBOR encoded structure can alternatively be
   signed directly ("natively signed"), which does not require re-
   encoding for the signature to be verified.  The document also
   specifies C509 COSE headers, a C509 TLS certificate type, and a C509
   file format.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cose-cbor-encoded-cert-05"/>
        </reference>
        <reference anchor="I-D.ietf-core-target-attr">
          <front>
            <title>CoRE Target Attributes Registry</title>
            <author fullname="Carsten Bormann" initials="C." surname="Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <date day="5" month="March" year="2023"/>
            <abstract>
              <t>   The Constrained RESTful Environments (CoRE) specifications apply Web
   technologies to constrained environments.  One important such
   technology is Web Linking (RFC 8288), which CoRE uses as the basis
   for a number of discovery protocols, such as the Link Format (RFC
   6690) in CoAP's Resource Discovery Protocol (Section 7.2 of RFC7252)
   and the Resource Directory (RFC 9176).

   Web Links can have target attributes, the names of which are not
   generally coordinated by the Web Linking specification (Section 2.2
   of RFC 8288).  This document introduces an IANA registry for
   coordinating names of target attributes when used in Constrained
   RESTful Environments.  It updates the RD Parameters Registry of RFC
   9176 to coordinate with this registry.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-target-attr-04"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet.  An overview of this approach and model is provided as an introduction.  The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms.  Standard certificate extensions are described and two Internet-specific extensions are defined.  A set of required certificate extensions is specified.  The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions.  An algorithm for X.509 certification path validation is described.  An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC8392">
          <front>
            <title>CBOR Web Token (CWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties.  The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection.  A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value.  CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8392"/>
          <seriesInfo name="DOI" value="10.17487/RFC8392"/>
        </reference>
        <reference anchor="RFC9147">
          <front>
            <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>This document specifies version 1.3 of the Datagram Transport Layer Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability. Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
              <t>This document obsoletes RFC 6347.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9147"/>
          <seriesInfo name="DOI" value="10.17487/RFC9147"/>
        </reference>
      </references>
    </references>
    <section anchor="sec-packed-cbor-tables">
      <name>Shared item tables for Packed CBOR</name>
      <t>This appendix defines the two shared item tables that the examples in this document refer to for using Packed CBOR <xref target="I-D.ietf-cbor-packed"/>.</t>
      <t>The notation cri'' introduced in <xref target="I-D.ietf-cbor-edn-literals"/> is used to represent CRIs <xref target="I-D.ietf-core-href"/>.</t>
      <section anchor="compression-of-coral-predicates">
        <name>Compression of CoRAL predicates</name>
        <t>The following shared item table is used for compressing CoRAL predicates, as per <xref section="2.2" sectionFormat="of" target="I-D.ietf-cbor-packed"/>.</t>
        <figure anchor="fig-packed-cbor-table-1">
          <name>Shared item table for compressing CoRAL predicates.</name>
          <artwork align="center"><![CDATA[
+-------+--------------------------------------------------------+
| Index | Item                                                   |
+-------+--------------------------------------------------------+
| 6     | cri'http://www.iana.org/assignments/linkformat/rt'     |
+-------+--------------------------------------------------------+
| 50    | cri'http://coreapps.org/core.osc.gcoll#item'           |
+-------+--------------------------------------------------------+
| 68    | cri'http://coreapps.org/core.osc.gconf#hkdf'           |
+-------+--------------------------------------------------------+
| 69    | cri'http://coreapps.org/core.osc.gconf#cred_fmt'       |
+-------+--------------------------------------------------------+
| 70    | cri'http://coreapps.org/core.osc.gconf#group_mode'     |
+-------+--------------------------------------------------------+
| 71    | cri'http://coreapps.org/core.osc.gconf#gp_enc_alg'     |
+-------+--------------------------------------------------------+
| 72    | cri'http://coreapps.org/core.osc.gconf#sign_alg'       |
+-------+--------------------------------------------------------+
| 73    | cri'http://coreapps.org/core.osc.gconf#sign_params'    |
+-------+--------------------------------------------------------+
| 74    | cri'http://coreapps.org/core.osc.gconf#sign_params     |
|       |     .alg_capab.key_type'                               |
+-------+--------------------------------------------------------+
| 75    | cri'http://coreapps.org/core.osc.gconf#sign_params     |
|       |     .key_type_capab.key_type'                          |
+-------+--------------------------------------------------------+
| 76    | cri'http://coreapps.org/core.osc.gconf#sign_params     |
|       |     .key_type_capab.curve'                             |
+-------+--------------------------------------------------------+
| 77    | cri'http://coreapps.org/core.osc.gconf#pairwise_mode'  |
+-------+--------------------------------------------------------+
| 78    | cri'http://coreapps.org/core.osc.gconf#alg'            |
+-------+--------------------------------------------------------+
| 79    | cri'http://coreapps.org/core.osc.gconf#ecdh_alg'       |
+-------+--------------------------------------------------------+
| 80    | cri'http://coreapps.org/core.osc.gconf#ecdh_params'    |
+-------+--------------------------------------------------------+
| 81    | cri'http://coreapps.org/core.osc.gconf#ecdh_params     |
|       |     .alg_capab.key_type'                               |
+-------+--------------------------------------------------------+
| 82    | cri'http://coreapps.org/core.osc.gconf#ecdh_params     |
|       |     .key_type_capab.key_type'                          |
+-------+--------------------------------------------------------+
| 83    | cri'http://coreapps.org/core.osc.gconf#ecdh_params     |
|       |     .key_type_capab.curve'                             |
+-------+--------------------------------------------------------+
| 84    | cri'http://coreapps.org/core.osc.gconf#det_req'        |
+-------+--------------------------------------------------------+
| 85    | cri'http://coreapps.org/core.osc.gconf#det_hash_alg'   |
+-------+--------------------------------------------------------+
| 86    | cri'http://coreapps.org/core.osc.gconf#rt'             |
+-------+--------------------------------------------------------+
| 87    | cri'http://coreapps.org/core.osc.gconf#active'         |
+-------+--------------------------------------------------------+
| 88    | cri'http://coreapps.org/core.osc.gconf#group_name'     |
+-------+--------------------------------------------------------+
| 89    | cri'http://coreapps.org/core.osc.gconf#group_title'    |
+-------+--------------------------------------------------------+
| 90    | cri'http://coreapps.org/core.osc.gconf                 |
|       |     #ace_groupcomm_profile'                            |
+-------+--------------------------------------------------------+
| 91    | cri'http://coreapps.org/core.osc.gconf#max_stale_sets' |
+-------+--------------------------------------------------------+
| 92    | cri'http://coreapps.org/core.osc.gconf#exp'            |
+-------+--------------------------------------------------------+
| 93    | cri'http://coreapps.org/core.osc.gconf#gid_reuse'      |
+-------+--------------------------------------------------------+
| 94    | cri'http://coreapps.org/core.osc.gconf#app_group'      |
+-------+--------------------------------------------------------+
| 95    | cri'http://coreapps.org/core.osc.gconf#app_group_del'  |
+-------+--------------------------------------------------------+
| 96    | cri'http://coreapps.org/core.osc.gconf#app_group_add'  |
+-------+--------------------------------------------------------+
| 97    | cri'http://coreapps.org/core.osc.gconf#joining_uri'    |
+-------+--------------------------------------------------------+
| 98    | cri'http://coreapps.org/core.osc.gconf#app_groups'     |
+-------+--------------------------------------------------------+
| 99    | cri'http://coreapps.org/core.osc.gconf#group_policies' |
+-------+--------------------------------------------------------+
| 100   | cri'http://coreapps.org/core.osc.gconf#group_policies  |
|       |     .key_update_check_interval'                        |
+-------+--------------------------------------------------------+
| 101   | cri'http://coreapps.org/core.osc.gconf#group_policies  |
|       |     .exp_delta'                                        |
+-------+--------------------------------------------------------+
| 102   | cri'http://coreapps.org/core.osc.gconf#as_uri'         |
+-------+--------------------------------------------------------+
]]></artwork>
        </figure>
      </section>
      <section anchor="compression-of-values-of-the-rt-target-attribute">
        <name>Compression of Values of the rt= Target Attribute</name>
        <t>The following shared item table is used for compressing values of the rt= target attribute, as per <xref section="2.2" sectionFormat="of" target="I-D.ietf-cbor-packed"/>.</t>
        <figure anchor="fig-packed-cbor-table-2">
          <name>Shared item table for compressing values of the rt= target attribute.</name>
          <artwork align="center"><![CDATA[
+-------+--------------------------------------------------------+
| Index | Item                                                   |
+-------+--------------------------------------------------------+
| 415   | cri'http://www.iana.org/assignments/linkformat/rt      |
|       |     /core.osc.gconf'                                   |
+-------+--------------------------------------------------------+
]]></artwork>
        </figure>
      </section>
    </section>
    <section anchor="sec-document-updates">
      <name>Document Updates</name>
      <t>RFC EDITOR: PLEASE REMOVE THIS SECTION.</t>
      <section anchor="sec-00">
        <name>Version -00</name>
        <ul spacing="normal">
          <li>CoRAL content taken out from draft-ietf-ace-oscore-gm-admin-08.</li>
        </ul>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgment">
      <name>Acknowledgments</name>
      <t>Most of the content in this document was originally specified in draft-ietf-ace-oscore-gm-admin, which is co-authored also by Peter van der Stok and Francesca Palombini, and where Klaus Hartke contributed in the initial definition of the resource model and interactions using CoRAL.</t>
      <t>The authors sincerely thank <contact fullname="Christian Amsüss"/>, <contact fullname="Carsten Bormann"/>, and <contact fullname="Jim Schaad"/> for their comments and feedback. The work on this document has been partly supported by VINNOVA and the Celtic-Next project CRITISEC; and by the H2020 project SIFIS-Home (Grant agreement 952652).</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
