<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-ivy-entitlement-inventory-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.30.2 -->
  <front>
    <title abbrev="entitlement-inventory">A YANG Module for Entitlement Inventory</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-ivy-entitlement-inventory-00"/>
    <author initials="M." surname="Palmero" fullname="Marisol Palmero">
      <organization>Independent</organization>
      <address>
        <email>marisol.ietf@gmail.com</email>
      </address>
    </author>
    <author initials="C." surname="Cardona" fullname="Camilo Cardona">
      <organization>NTT</organization>
      <address>
        <email>camilo@gin.ntt.net</email>
      </address>
    </author>
    <author initials="D." surname="Lopez" fullname="Diego Lopez">
      <organization>Telefonica</organization>
      <address>
        <email>diego.r.lopez@telefonica.com</email>
      </address>
    </author>
    <date year="2025" month="October" day="10"/>
    <area>Operations and Management</area>
    <workgroup>Network Inventory YANG WG</workgroup>
    <keyword>inventory</keyword>
    <keyword>capability</keyword>
    <keyword>entitlement</keyword>
    <keyword>licensing</keyword>
    <abstract>
      <?line 42?>

<t>This document proposes a YANG module for incorporating entitlements in a network inventory, encompassing both virtual and physical network elements. Entitlements define the rights for their holder to use specific capabilities in a network element(s). The model is rooted by the concept of the capabilities offered by an element, enabled by the held entitlements, and considers entitlement scope, how they are assigned, and when they expire. The model introduces a descriptive definition of capabilities and the entitlement use restrictions, supporting entitlement administration and the understanding of the capabilities available through the network.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://dr2lopez.github.io/ivy-capability-entitlement/draft-ietf-ivy-entitlement-inventory.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-ivy-entitlement-inventory/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Network Inventory YANG WG Working Group mailing list (<eref target="mailto:inventory-yang@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/inventory-yang/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/inventory-yang/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/dr2lopez/ivy-capability-entitlement"/>.</t>
    </note>
  </front>
  <middle>
    <?line 46?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The purpose of any network elements included as assets in the inventory of any network operator is to leverage their capabilities to build network services. Many of these capabilities are not automatically enabled upon acquisition; their use may require specific rights—typically provided via entitlements or licenses from the vendor.</t>
      <t>The primary intent of this draft is to support three key operational use cases in managing software entitlements and network capabilities:</t>
      <ul spacing="normal">
        <li>
          <t>Listing entitlements (e.g., licenses) available across the operator organization, their holders, and applicable scope.</t>
        </li>
        <li>
          <t>Modeling the capabilities that entitlements permit or enable, representing what a network element may do when properly licensed.</t>
        </li>
        <li>
          <t>Representing the actual use of capabilities, including any active restrictions or limits defined by the associated entitlements.</t>
        </li>
      </ul>
      <t>Together, these use cases enable administrators to answer essential questions such as: What can this device do? What is it currently allowed to do? And what is it actively doing within the bounds of licensing or entitlement constraints? This approach supports not only entitlement tracking but also intent-aware control of device behavior and resource exposure.</t>
      <t>As network technology evolves toward modular, software-defined, and virtualized architectures, managing the rights to activate specific functions becomes increasingly complex. These rights granted via entitlements or licenses must be tracked, aggregated, and matched to assets to ensure that services can be delivered using available capabilities. This complexity calls for structured, machine-readable models that represent which capabilities are available, permitted, and in use.</t>
      <t>To address this, the model relies on two core concepts: capability and entitlement. A capability represents what a system or component may do; an entitlement grants permission to use one or more of those capabilities, possibly under constraints such as time, scope, or usage limits. Being able to represent and exchange this information across systems helps automate entitlement administration and simplify operational decisions.</t>
      <t>This draft provides a foundational YANG structure for representing these relationships as standards, complementing the network inventory module.</t>
      <section anchor="scope-of-the-entitlement-model">
        <name>Scope of the Entitlement Model</name>
        <t>The entitlement model aims to provide an inventory of entitlements. This includes the entitled holders and the capabilities to which they are entitled. Additionally, it offers information into the restrictions of the operation of the different assets (network entities and components). In general, this model seeks to address the following questions:</t>
        <ul spacing="normal">
          <li>
            <t>What entitlements are administered/owned by the organization?</t>
          </li>
          <li>
            <t>How are entitlements restricted to some assets and holders?</t>
          </li>
          <li>
            <t>What entitlements are installed on each network element?</t>
          </li>
          <li>
            <t>What constraints do the current installed entitlements impose on the network elements' functionality?</t>
          </li>
          <li>
            <t>Does the entitlement impose any kind of global restrictions? What are they?</t>
          </li>
          <li>
            <t>What are the restrictions that each network element has due to the entitlements it holds locally?</t>
          </li>
        </ul>
        <t>The model is designed with flexibility in mind, allowing for expansion through the utilization of tools provided by YANG.</t>
        <t>The realm of entitlements and licensing is inherently complex, presenting challenges in creating a model that can comprehensively encompass all scenarios without ambiguity. While we attempt to address various situations through examples and use cases, we acknowledge that the model might not be able to cover all corner cases without ambiguity. In such cases, we recommend that implementations provide additional documentation to clarify those potential ambiguities. The current model does not aim to serve as a catalog of licenses. While it may accommodate basic scenarios, it does not aim to cover the full spectrum of license characteristics, which can vary significantly. Instead, our focus is on providing a general framework for describing relationships and answering the questions posed above.</t>
        <t>With the aim of clarifying the model scope, here are some questions that our model does not attempt to answer:</t>
        <ul spacing="normal">
          <li>
            <t>What are the implications of purchasing a specific entitlement?</t>
          </li>
          <li>
            <t>Which entitlement is needed to obtain a specific capability?</t>
          </li>
          <li>
            <t>Is license migration feasible?</t>
          </li>
          <li>
            <t>What capabilities are permitted when an entitlement is installed in a specific device?</t>
          </li>
          <li>
            <t>Features or restrictions that depend on each user. We are not covering this in the current version of this document, but it could be done if we expand the holders' identification.</t>
          </li>
        </ul>
        <t>This model focuses on the ability to use capabilities, not on access control mechanisms. For example, if a router cannot enable MPLS due to entitlement restrictions, it means the organization lacks the rights to use that capability—even if access to the device itself is available. This distinction is separate from, for instance, the ability of a specific user to configure MPLS due to access control limitations.</t>
      </section>
      <section anchor="pre-provisioned-vs-discovered-entitlements">
        <name>Pre-Provisioned vs. Discovered Entitlements</name>
        <t>This model is not intended for automatic discovery of entitlements or capabilities through the network elements themselves. Instead, it assumes that entitlements and their associations are either:</t>
        <ul spacing="normal">
          <li>
            <t>Provisioned in a license server or asset database;</t>
          </li>
          <li>
            <t>Installed on individual devices and reported through management interfaces; or</t>
          </li>
          <li>
            <t>Manually configured as part of an inventory process.</t>
          </li>
        </ul>
        <t>Future augmentations may explore capability discovery or telemetry driven models, but they are out of scope for the current version.</t>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<ul spacing="normal">
        <li>
          <t>ToBeUpdated(TBU) Open Issue for the IVY WG, to include:</t>
        </li>
      </ul>
      <t>&lt;&lt;Update Glossary under  Network Inventory draft, <xref target="BaseInventory"/>. We need at least formal definitions of "capability" and "entitlement".&gt;&gt;</t>
      <ul spacing="normal">
        <li>
          <t>Capability: A function or resource that a network element can support or execute.</t>
        </li>
        <li>
          <t>Entitlement: A right granted to a holder (organization or user) to access or activate specific capabilities under defined conditions.</t>
        </li>
      </ul>
    </section>
    <section anchor="modeling-capabilities-and-entitlements">
      <name>Modeling Capabilities and Entitlements</name>
      <t>The model describes how to represent capabilities and the entitlements that enable them across inventoried network elements. Capabilities describe what a device can do. Entitlements indicate whether those capabilities are allowed and under what conditions.</t>
      <t>In deployments where entitlements are directly associated with specific network elements, the devices themselves may expose entitlement information. Alternatively, some environments may rely on a centralized license server that maintains the entitlements of an organization. By querying the list of capabilities and entitlements, along with their associated metadata, a NETCONF or RESTCONF client can retrieve essential inventory details about what capabilities are available and which entitlements are currently in place.</t>
      <t>Note that the model uses lists based on classes on multiple parts to be able to extend functionality.</t>
      <t>(TBD: Provide examples of how this can be done in future releases of this document)</t>
      <t>Entitlements may be listed without explicitly identifying the assets (network elements or components) they apply to. Entitlements are defined directly under the network-inventory container for organizational management. Entitlements are linked to network-elements in multiple ways: (1) When entitlements are created for specific network-elements (i.e. they should only be installed on those), then those network elements are specified under the entitlement element's attachment section. (2) When an entitlement is installed in a network-element, it appears in the network-element's installed-entitlements list. (3) When an installed entitlement enables capabilities, the network-element's capabilities will reference the installed entitlement via the supporting-entitlements list.</t>
      <t>Capabilities, restrictions and the entitlements supporting them within a network element are defined under the network-element under the container "capabilities".</t>
      <section anchor="capabilities">
        <name>Capabilities</name>
        <t>Capabilities are modeled by augmenting "network-element" in the "ietf-network-inventory" module in <xref target="BaseInventory"/> according to the following tree:</t>
        <artwork><![CDATA[
+--ro capabilities
   +--ro capability-class* [capability-class]
      +--ro capability-class                     identityref
      +--ro capability* [capability-id]
         +--ro capability-id                     string
         +--ro extended-capability-description?     string
         +--ro resource-description?             string
         +--ro resource-units?                   string
         +--ro resource-amount?                  int32
         +--ro supporting-entitlements
            +--ro entitlement* [entitlement-id]
            +--ro entitlement-id                 -> ../../../../../entitlements/entitlement/entitlement-id
            +--ro allowed?                       boolean
            +--ro in-use?                        boolean
            +--ro capability-restriction* [capability-restriction-id]
               +--ro capability-restriction-id   string
               +--ro component-id?               -> ../../../../../components/component/component-id
               +--ro description?                string
               +--ro resource-name?              string
               +--ro units?                      string
               +--ro max-value?                  int32
               +--ro current-value?              int32
]]></artwork>
        <t>For any given network element, the capabilities list <bcp14>MAY</bcp14> include all potential capabilities advertised by the vendor, and <bcp14>MUST</bcp14> include those for which the network operator holds a valid entitlement—whether active or not.</t>
        <t>The capabilities of an inventoried network element may be restricted based on the availability of proper entitlements. An entitlement manager might be interested in the capabilities available to be used on the network elements, and the capabilities that are currently available. The model includes this information by means of the "supporting entitlements" list, which references locally installed entitlements and includes potential restrictions related to the status of the entitlement. This allows organizations to monitor entitlement usage and avoid misconfigurations or exceeding permitted capability limits.</t>
      </section>
      <section anchor="entitlements">
        <name>Entitlements</name>
        <t>The entitlement modeling augments "network-inventory" in the ietf-network-inventory module in <xref target="BaseInventory"/> with a top-level entitlements container according to the following tree:</t>
        <t>Figure 1 depicts the relationship between the Entitlement Inventory model and other models. The Entitlement Inventory model enhances the model defined in the base network inventory model with entitlement-specific attributes and centralized entitlement management capabilities.</t>
        <artwork><![CDATA[
   +----------------------+
   |                      |
   |Base Network Inventory|
   |                      |
   +----------+-----------+
              ^
              |
   +----------+-----------+
   |                      |
   | Entitlement Inventory|
   |  e.g., licenses,     |
   |  capabilities,       |
   |  restrictions        |
   +----------------------+

      Figure 1: Relationship of Entitlement Inventory Model to Other
                              Inventory Models
]]></artwork>
        <artwork><![CDATA[
+--ro entitlements
   +--ro entitlement* [eid]
   +--ro eid                                  string
   +--ro product-id?                          string
   +--ro state?                               entitlement-state-t
   +--ro renewal-profile
   |  +--ro activation-date?                  yang:date-and-time
   |  +--ro start-date?                       yang:date-and-time
   |  +--ro expiration-date?                  yang:date-and-time
   +--ro restrictions
   |  +--ro restriction* [restriction-id]
   |  +--ro restriction-id                    string
   |  +--ro description?                      string
   |  +--ro units?                            string
   |  +--ro max-value?                        int32
   |  +--ro current-value?                    int32
   +--ro parent-entitlement-uid?              -> ../entitlement/eid
   +--ro entitlement-attachment
      +--ro universal-access?   boolean
      +--ro holders
      |  +--ro organizations_names
      |  |  +--ro organizations*           string
      |  +--ro users_names
      |     +--ro users*                   string
      +--ro assets
         +--ro elements
            +--ro network-elements*        -> /network-inventory/network-elements/network-element/ne-id
            +--ro components
               +--ro component* [network-element component-id]
                  +--ro network-element    -> /network-inventory/network-elements/network-element/ne-id
                  +--ro component-id       -> /network-inventory/network-elements/network-element/components/component/component-id
]]></artwork>
        <t>Entitlements and network elements are linked in the model in multiple ways. Entitlements at the network-inventory level might be attached to network elements through their attachment mechanism, representing organizational entitlements. Network elements have their own installed-entitlements that may be derived from the centralized entitlements or installed directly. The capabilities of network elements reference these locally installed entitlements through their supporting-entitlements lists. The former addresses the case of a centralized license server or inventory system, while the latter represents entitlements that are locally available and actively used by the network element's capabilities. An installed entitlement that is not referenced by any network element capability means that it is available locally but not currently in use.</t>
        <t>Entitlements are managed both centrally at the network-inventory level and locally within network elements through installed-entitlements. Network elements utilize locally installed entitlements and reference them through their capabilities' supporting-entitlements lists. For instance, a license server or inventory system might list an entitlement at the top level, which then gets installed on specific network elements where the capabilities reference the local copy. The "parent-entitlement-uid" field in installed entitlements provides traceability back to centralized entitlements when applicable. Proper identification of entitlements is imperative to ensure consistency across systems, enabling monitoring systems to recognize when multiple locations reference related entitlements. Furthermore, there are cases where an authorized network element might have locally installed entitlements without explicit knowledge of the covering organizational license. Consider the scenario of a site license, wherein any device under the site may utilize a feature through locally installed entitlements derived from the site-wide license. In such cases, the parent-entitlement-uid maintains the connection to the organizational entitlement policy.</t>
        <section anchor="reverse-mapping-from-entitlements-to-capabilities">
          <name>Reverse Mapping from Entitlements to Capabilities</name>
          <t>While the model includes links from capabilities to supporting entitlements, some inventory operators may need to evaluate entitlements independently and identify the capabilities they enable.</t>
          <t>To support this, implementers may use the "product-id" or "capability-class" metadata along with external references or catalogs. A reverse mapping structure may be introduced in a future version of the model, once a reliable binding syntax for entitlement to capability is standardized.</t>
        </section>
      </section>
      <section anchor="entitlement-attachment">
        <name>Entitlement Attachment</name>
        <t>The "entitlement" container holds a container called "entitlement-attachment" which relates how the entitlement is operationally linked to holders or network elements. Note that there is a difference between an entitlement being attached to a network element and an entitlement being installed in the network element. In the former, the license was explicitly associated with one or more network elements. Some licenses actually can be open but have a limited number of installation. Other licenses might be openly constrained to a geographic location. We are not dealing with these complex cases now, but the container can be expanded for this in the future.</t>
        <t>The model accommodates listing entitlements acquired by the organization but not yet applied or utilized by any actor/asset at the network-inventory level. For these pending entitlements, they can be managed centrally without requiring individual network elements to be aware of their existence.</t>
        <t>Some entitlements are inherently associated with a holder, such as organization or a user. For example, a software license might be directly attached to a user. Also, the use of a network device might come with a basic license provided solely to an organization. Some entitlements could be assigned to a more abstract description of holders, such as people under a jurisdiction or a geographical area. The model contains basic information about this, but it can be extended in the future to be more descriptive.</t>
        <t>While attachment is optional, the model should be capable of expressing attachment in various scenarios. The model can be expanded to list to which network elements an entitlement is aimed for, when this link is more vague, such as a site license (e.g., network elements located in a specific site), or more open licenses (e.g., free software for all users subscribed to a streaming platform).</t>
        <t>It is important to note that the current model does not provide information on whether an entitlement can be reassigned to other network elements. Such scenarios fall under the "what if" category, which is not covered by this model.</t>
      </section>
      <section anchor="installed-entitlements">
        <name>Installed Entitlements</name>
        <t>Since capabilities are optional in network elements, the model also provides an augmentation to track entitlements that are installed directly on network elements. This augmentation of "network-element" in the "ietf-network-inventory" module provides local entitlement storage according to the following tree:</t>
        <artwork><![CDATA[
+--ro installed-entitlements
   +--ro entitlement* [eid]
   +--ro eid                                  -> /network-inventory/entitlements/entitlement/eid
]]></artwork>
        <t>The installed entitlements represent references to entitlements that are locally present on the network element. The "eid" field provides a direct reference to the centralized entitlement at the network-inventory level.</t>
        <t>This structure allows network elements to operate independently of centralized entitlement management while maintaining the ability to track relationships to organization-wide entitlement policies.</t>
      </section>
      <section anchor="model-definition">
        <name>Model Definition</name>
        <t>TBP</t>
      </section>
    </section>
    <section anchor="use-cases-and-examples">
      <name>Use cases and Examples</name>
      <t>This section describes use cases, provide an example of how they could be modeled by the model, and show how each of the questions that we have explored in this draft can be answered by the model.</t>
      <section anchor="mpls-capability-license-on-a-network-os">
        <name>MPLS Capability License on a Network OS</name>
        <t>An operator installs a software license (entitlement) enabling MPLS routing on a NOS. The license is attached to a specific network element and activates the "mpls-routing" capability class.</t>
        <t>Complete example showing network inventory augmented with entitlements:</t>
        <artwork><![CDATA[
json
{
  "ietf-network-inventory:network-inventory": {
    "entitlements": {
      "entitlement": [
        {
          "eid": "mpls-license-001",
          "product-id": "mpls-software-lic-v2",
          "state": "active",
          "renewal-profile": {
            "activation-date": "2025-01-01T00:00:00Z",
            "expiration-date": "2026-01-01T00:00:00Z"
          },
          "entitlement-attachment": {
            "holders": {
              "organizations_names": {
                "organizations": ["ACME Corp"]
              }
            },
            "assets": {
              "elements": {
                "network-elements": ["router-5"]
              }
            }
          }
        }
      ]
    },
    "network-elements": {
      "network-element": [
        {
          "ne-id": "router-5",
          "ne-type": "ietf-network-inventory:router",
          "installed-entitlements": {
            "entitlement": [
              {
                "eid": "mpls-license-001"
              }
            ]
          },
          "capabilities": {
            "capability-class": [
              {
                "capability-class": "ietf-entitlement-inventory:routing",
                "capability": [
                  {
                    "capability-id": "mpls-routing",
                    "extended-capability-description": "MPLS Label Switching Protocol",
                    "supporting-entitlements": {
                      "entitlement": [
                        {
                          "entitlement-id": "mpls-license-001",
                          "allowed": true,
                          "in-use": true
                        }
                      ]
                    }
                  }
                ]
              }
            ]
          }
        }
      ]
    }
  }
}
]]></artwork>
      </section>
      <section anchor="bandwidth-upgrade-via-license">
        <name>Bandwidth Upgrade via License</name>
        <t>A vendor-N device uses a capacity license to expand throughput.</t>
        <t>Complete example showing network inventory augmented with bandwidth entitlements:</t>
        <artwork><![CDATA[
json
{
  "ietf-network-inventory:network-inventory": {
    "entitlements": {
      "entitlement": [
        {
          "eid": "vendorN-bw-10g",
          "product-id": "vendorN-bw-upgrade",
          "state": "active",
          "restrictions": {
            "restriction": [
              {
                "restriction-id": "global-cap",
                "description": "Organization bandwidth cap",
                "units": "Gbps",
                "max-value": 100,
                "current-value": 25
              }
            ]
          }
        }
      ]
    },
    "network-elements": {
      "network-element": [
        {
          "ne-id": "switch-10g-01",
          "ne-type": "ietf-network-inventory:switch",
          "installed-entitlements": {
            "entitlement": [
              {
                "eid": "vendorN-bw-10g"
              }
            ]
          },
          "capabilities": {
            "capability-class": [
              {
                "capability-class": "ietf-entitlement-inventory:bandwidth",
                "capability": [
                  {
                    "capability-id": "bw-capability",
                    "resource-description": "Licensed bandwidth",
                    "resource-units": "Gbps",
                    "resource-amount": 10,
                    "supporting-entitlements": {
                      "entitlement": [
                        {
                          "entitlement-id": "vendorN-bw-10g",
                          "allowed": true,
                          "in-use": true,
                          "capability-restriction": [
                            {
                              "capability-restriction-id": "bw-limit",
                              "description": "Current bandwidth usage",
                              "resource-name": "active-bandwidth",
                              "units": "Gbps",
                              "max-value": 10,
                              "current-value": 6
                            }
                          ]
                        }
                      ]
                    }
                  }
                ]
              }
            ]
          }
        }
      ]
    }
  }
}
]]></artwork>
      </section>
      <section anchor="floating-license-managed-by-license-server">
        <name>Floating License Managed by License Server</name>
        <t>A shared entitlement is held by a license server and consumed dynamically by multiple switches.</t>
        <t>Complete example showing floating license across multiple network elements:</t>
        <artwork><![CDATA[
json
{
  "ietf-network-inventory:network-inventory": {
    "entitlements": {
      "entitlement": [
        {
          "eid": "shared-switch-license-1",
          "product-id": "advanced-switching-features",
          "state": "active",
          "entitlement-attachment": {
            "universal-access": true,
            "holders": {
              "organizations_names": {
                "organizations": ["NTT"]
              }
            },
          },
          "restrictions": {
            "restriction": [
              {
                "restriction-id": "concurrent-users",
                "description": "Maximum concurrent feature usage",
                "units": "sessions",
                "max-value": 50,
                "current-value": 12
              }
            ]
          }
        }
      ]
    },
    "network-elements": {
      "network-element": [
        {
          "ne-id": "switch-1",
          "ne-type": "ietf-network-inventory:switch",
          "installed-entitlements": {
            "entitlement": [
              {
                "eid": "shared-switch-license-1"
              }
            ]
          },
          "capabilities": {
            "capability-class": [
              {
                "capability-class": "ietf-entitlement-inventory:switching",
                "capability": [
                  {
                    "capability-id": "advanced-vlan-features",
                    "extended-capability-description": "Advanced VLAN management features",
                    "supporting-entitlements": {
                      "entitlement": [
                        {
                          "entitlement-id": "shared-switch-license-1",
                          "allowed": true,
                          "in-use": false
                        }
                      ]
                    }
                  },
                  {
                    "capability-id": "qos-policies",
                    "extended-capability-description": "Quality of Service policies",
                    "supporting-entitlements": {
                      "entitlement": [
                        {
                          "entitlement-id": "shared-switch-license-1",
                          "allowed": true,
                          "in-use": true
                        }
                      ]
                    }
                  }
                ]
              }
            ]
          }
        },
        {
          "ne-id": "switch-2",
          "ne-type": "ietf-network-inventory:switch",
          "installed-entitlements": {
            "entitlement": [
              {
                "eid": "shared-switch-license-1"
              }
            ]
          },
          "capabilities": {
            "capability-class": [
              {
                "capability-class": "ietf-entitlement-inventory:switching",
                "capability": [
                  {
                    "capability-id": "advanced-vlan-features",
                    "extended-capability-description": "Advanced VLAN management features",
                    "supporting-entitlements": {
                      "entitlement": [
                        {
                          "entitlement-id": "shared-switch-license-1",
                          "allowed": true,
                          "in-use": true
                        }
                      ]
                    }
                  }
                ]
              }
            ]
          }
        }
      ]
    }
  }
}
]]></artwork>
        <t>This example demonstrates how a floating license can be managed centrally while being installed locally on multiple network elements. Each switch has its own local copy of the entitlement that traces back to the centralized policy. The centralized entitlement shows global restrictions (concurrent users), while individual switches show their local usage. This entitlement may be tracked across devices using a license server asset that records usage or seat count (future extension).</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>(TBP)</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>(TBP)</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="BaseInventory">
          <front>
            <title>A Base YANG Data Model for Network Inventory</title>
            <author fullname="Chaode Yu" initials="C." surname="Yu">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Sergio Belotti" initials="S." surname="Belotti">
              <organization>Nokia</organization>
            </author>
            <author fullname="Jean-Francois Bouquier" initials="J." surname="Bouquier">
              <organization>Vodafone</organization>
            </author>
            <author fullname="Fabio Peruzzini" initials="F." surname="Peruzzini">
              <organization>FiberCop</organization>
            </author>
            <author fullname="Phil Bedard" initials="P." surname="Bedard">
              <organization>Cisco</organization>
            </author>
            <date day="10" month="October" year="2025"/>
            <abstract>
              <t>   This document defines a base YANG data model for reporting network
   inventory.  The scope of this base model is set to be application-
   and technology-agnostic.  The base data model can be augmented with
   application- and technology-specific details.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ivy-network-inventory-yang-09"/>
        </reference>
      </references>
    </references>
    <?line 583?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>This document is based on work partially funded by the EU Horizon Europe projects ACROSS (grant 101097122), ROBUST-6G (grant 101139068), iTrust6G (grant 101139198), MARE (grant 101191436), and CYBERNEMO (grant 101168182).</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
