<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 3.3.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-oauth-status-list-04" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.23.1 -->
  <front>
    <title>Token Status List</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-oauth-status-list-04"/>
    <author fullname="Tobias Looker">
      <organization>MATTR</organization>
      <address>
        <email>tobias.looker@mattr.global</email>
      </address>
    </author>
    <author fullname="Paul Bastian">
      <organization/>
      <address>
        <email>paul.bastian@posteo.de</email>
      </address>
    </author>
    <author fullname="Christian Bormann">
      <organization>Robert Bosch GmbH</organization>
      <address>
        <email>christiancarl.bormann@bosch.com</email>
      </address>
    </author>
    <date year="2024" month="October" day="02"/>
    <abstract>
      <?line 81?>

<t>This specification defines status list data structures and processing rules for representing the status of tokens secured by JSON Object Signing and Encryption (JOSE) or CBOR Object Signing and Encryption(COSE), such as JSON Web Tokens (JWTs), CBOR Web Tokens (CWTs) and ISO mdoc.
The status list token data structures themselves are also represented as JWTs or CWTs.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://oauth-wg.github.io/draft-ietf-oauth-status-list/draft-ietf-oauth-status-list.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-oauth-status-list/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/oauth-wg/draft-ietf-oauth-status-list"/>.</t>
    </note>
  </front>
  <middle>
    <?line 86?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Token formats secured by JOSE <xref target="IANA.JOSE"/> or COSE <xref target="RFC9052"/>, such as JSON Web Tokens (JWTs) <xref target="RFC7519"/>, CBOR Web Tokens (CWTs) <xref target="RFC8392"/> and ISO mdoc <xref target="ISO.mdoc"/>, have vast possible applications. Some of these applications can involve issuing a token whereby certain semantics about the token can change over time, which are important to be able to communicate to relying parties in an interoperable manner, such as whether the token is considered invalidated or suspended by its issuer.</t>
      <t>This document defines a Status List and its representations in JSON and CBOR formats that describe the individual statuses of multiple Referenced Tokens, which themselves are JWTs or CWTs. The statuses of all Referenced Tokens are conveyed via a bit array in the Status List. Each Referenced Token is allocated an index during issuance that represents its position within this bit array. The value of the bit(s) at this index correspond to the Referenced Token's status. A Status List may either be provided via HTTPS or be signed and embedded into a Status List Token, whereas this document defines its representations in JWT and CWT. Status Lists may be composed for expressing a range of Status Types. This document defines basic Status Types for the most common use cases as well as an extensibility mechanism for custom Status Types. The document also defines how an issuer of a Referenced Token references a Status List (Token).</t>
      <t>An example for the usage of a Status List is to manage the status of issued access tokens as defined in section 1.4 of <xref target="RFC6749"/>. Token Introspection <xref target="RFC7662"/> defines another way to determine the status of an issued access token, but it requires the party trying to validate an access tokens status to directly contact the token issuer, whereas the mechanism defined in this specification does not have this limitation.</t>
      <t>Another possible use case for the Status List is to express the status of verifiable credentials (Referenced Tokens) issued by an Issuer in the Issuer-Holder-Verifier model <xref target="SD-JWT.VC"/>.
The following diagram depicts the basic conceptual relationship.</t>
      <artwork type="ascii-art"><![CDATA[
+-------------------+                  +------------------------+
|                   | describes status |                        |
|    Status List    +----------------->|    Referenced Token    |
|   (JSON or CBOR)  <------------------+      (JOSE, COSE)      |
|                   |   references     |                        |
+-------+-----------+                  +--------+---------------+
        |
        |embedded in
        v
+-------------------+
|                   |
| Status List Token |
|  (JWT or CWT)     |
|                   |
+-------------------+

]]></artwork>
      <section anchor="rationale">
        <name>Rationale</name>
        <t>Revocation mechanisms are an essential part for most identity ecosystems. In the past, revocation of X.509 TLS certificates has been proven difficult. Traditional certificate revocation lists (CRLs) have limited scalability; Online Certificate Status Protocol (OCSP) has additional privacy risks, since the client is leaking the requested website to a third party. OCSP stapling is addressing some of these problems at the cost of less up-to-date data. Modern approaches use accumulator-based revocation registries and Zero-Knowledge-Proofs to accommodate for this privacy gap, but face scalability issues again.</t>
        <t>This specification seeks to find a balance between scalability, security, and privacy by minimizing the status information to mere bits (often a single bit) and compressing the resulting binary data. Thereby, a Status List may contain statuses of many thousands or millions Referenced Tokens while remaining as small as possible. Placing large amounts of Referenced Tokens into the same list also enables herd privacy relative to the Issuer.</t>
        <t>This specification establishes the IANA "Status Mechanism Methods" registry for status mechanism and registers the members defined by this specification. Other specifications can register other members used for status retrieval.</t>
      </section>
      <section anchor="design-considerations">
        <name>Design Considerations</name>
        <t>The decisions taken in this specification aim to achieve the following design goals:</t>
        <ul spacing="normal">
          <li>
            <t>the specification shall favor a simple and easy to understand concept</t>
          </li>
          <li>
            <t>the specification shall be easy, fast and secure to implement in all major programming languages</t>
          </li>
          <li>
            <t>the specification shall be optimized to support the most common use cases and avoid unnecessary complexity of corner cases</t>
          </li>
          <li>
            <t>the Status List shall scale up to millions of tokens to support large scale government or enterprise use cases</t>
          </li>
          <li>
            <t>the Status List shall enable caching policies and offline support</t>
          </li>
          <li>
            <t>the specification shall support JSON and CBOR based tokens</t>
          </li>
          <li>
            <t>the specification shall not specify key resolution or trust frameworks</t>
          </li>
          <li>
            <t>the specification shall design an extension point to convey information about the status of a token that can be re-used by other mechanisms</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="terminology">
      <name>Terminology</name>
      <dl>
        <dt>Issuer:</dt>
        <dd>
          <t>An entity that issues the Referenced Token and provides the status information of the Referenced Token by serving a Status List Token on a public endpoint.</t>
        </dd>
        <dt>Relying Party:</dt>
        <dd>
          <t>An entity that relies on the Status List to validate the status of the Referenced Token. Also known as Verifier.</t>
        </dd>
        <dt>Status List:</dt>
        <dd>
          <t>An object in JSON or CBOR representation containing a bit array that lists the statuses of many Referenced Tokens.</t>
        </dd>
        <dt>Status List Token:</dt>
        <dd>
          <t>A token in JWT or CWT representation that contains a cryptographically secured Status List.</t>
        </dd>
        <dt>Referenced Token:</dt>
        <dd>
          <t>A cryptographically secured data structure which contains a reference to a Status List or Status List Token. It is <bcp14>RECOMMENDED</bcp14> to use JSON <xref target="RFC8259"/> or CBOR <xref target="RFC8949"/> for representation of the token and secure it using JSON Object Signing as defined in <xref target="RFC7515"/> or CBOR Object Signing and Encryption as defined in <xref target="RFC9052"/>. The information from the contained Status List may give a Relying Party additional information about up-to-date status of the Referenced Token.</t>
        </dd>
        <dt>base64url:</dt>
        <dd>
          <t>Denotes the URL-safe base64 encoding without padding as defined in Section 2 of <xref target="RFC7515"/> as "Base64url Encoding".</t>
        </dd>
      </dl>
    </section>
    <section anchor="status-list">
      <name>Status List</name>
      <t>A Status List is a byte array that contains the statuses of many Referenced Tokens represented by one or multiple bits. A common representation of a Status List is composed by the following algorithm:</t>
      <ol spacing="normal" type="1"><li>
          <t>Each status of a Referenced Token <bcp14>MUST</bcp14> be represented with a bit-size of 1,2,4, or 8. Therefore up to 2,4,16, or 256 statuses for a Referenced Token are possible, depending on the bit-size. This limitation is intended to limit bit manipulation necessary to a single byte for every operation and thus keeping implementations simpler and less error prone.</t>
        </li>
        <li>
          <t>The overall Status List is encoded as a byte array. Depending on the bit-size, each byte corresponds to 8/(#bit-size) statuses (8,4,2, or 1). The status of each Referenced Token is identified using the index that maps to one or more specific bits within the byte array. The index starts counting at 0 and ends with "size" - 1 (being the last valid entry). The bits within an array are counted from least significant bit "0" to the most significant bit ("7"). All bits of the byte array at a particular index are set to a status value.</t>
        </li>
        <li>
          <t>The byte array is compressed using DEFLATE <xref target="RFC1951"/> with the ZLIB <xref target="RFC1950"/> data format. Implementations are <bcp14>RECOMMENDED</bcp14> to use the highest compression level available.</t>
        </li>
      </ol>
      <t>The following example illustrates a Status List that represents the statuses of 16 Referenced Tokens, requiring 16 bits (2 bytes) for the uncompressed byte array:</t>
      <artwork type="ascii-art"><![CDATA[
status[0] = 1
status[1] = 0
status[2] = 0
status[3] = 1
status[4] = 1
status[5] = 1
status[6] = 0
status[7] = 1
status[8] = 1
status[9] = 1
status[10] = 0
status[11] = 0
status[12] = 0
status[13] = 1
status[14] = 0
status[15] = 1
]]></artwork>
      <t>These bits are concatenated:</t>
      <artwork type="ascii-art"><![CDATA[
byte             0                  1               2
bit       7 6 5 4 3 2 1 0    7 6 5 4 3 2 1 0    7
         +-+-+-+-+-+-+-+-+  +-+-+-+-+-+-+-+-+  +-+...
values   |1|0|1|1|1|0|0|1|  |1|0|1|0|0|0|1|1|  |0|...
         +-+-+-+-+-+-+-+-+  +-+-+-+-+-+-+-+-+  +-+...
index     7 6 5 4 3 2 1 0   15   ...  10 9 8   23
         \_______________/  \_______________/
                0xB9               0xA3

]]></artwork>
      <section anchor="status-list-json">
        <name>Status List in JSON Format</name>
        <t>This section defines the structure for a JSON-encoded Status List:</t>
        <ul spacing="normal">
          <li>
            <t><tt>status_list</tt>: <bcp14>REQUIRED</bcp14>. JSON Object that contains a Status List. It <bcp14>MUST</bcp14> contain at least the following claims:
            </t>
            <ul spacing="normal">
              <li>
                <t><tt>bits</tt>: <bcp14>REQUIRED</bcp14>. JSON Integer specifying the number of bits per Referenced Token in the Status List (<tt>lst</tt>). The allowed values for <tt>bits</tt> are 1,2,4 and 8.</t>
              </li>
              <li>
                <t><tt>lst</tt>: <bcp14>REQUIRED</bcp14>. JSON String that contains the status values for all the Referenced Tokens it conveys statuses for. The value <bcp14>MUST</bcp14> be the base64url-encoded Status List as specified in <xref target="status-list"/>.</t>
              </li>
              <li>
                <t><tt>aggregation_uri</tt>: <bcp14>OPTIONAL</bcp14>. JSON String that contains a URI to retrieve the Status List Aggregation for this type of Referenced Token. See section <xref target="batch-fetching"/> for further detail.</t>
              </li>
            </ul>
          </li>
        </ul>
        <t>The following example illustrates the JSON representation of the Status List:</t>
        <artwork><![CDATA[
byte_array = [0xb9, 0xa3] 
encoded:
{
  "bits": 1,
  "lst": "eNrbuRgAAhcBXQ"
}
]]></artwork>
      </section>
      <section anchor="status-list-cbor">
        <name>Status List in CBOR Format</name>
        <t>This section defines the structure for a CBOR-encoded Status List:</t>
        <ul spacing="normal">
          <li>
            <t>The <tt>StatusList</tt> structure is a map (Major Type 5) and defines the following entries:
            </t>
            <ul spacing="normal">
              <li>
                <t><tt>bits</tt>: <bcp14>REQUIRED</bcp14>. Unsigned int (Major Type 0) that contains the number of bits per Referenced Token in the Status List. The allowed values for <tt>bits</tt> are 1, 2, 4 and 8.</t>
              </li>
              <li>
                <t><tt>lst</tt>: <bcp14>REQUIRED</bcp14>. Byte string (Major Type 2) that contains the Status List as specified in <xref target="status-list"/>.</t>
              </li>
              <li>
                <t><tt>aggregation_uri</tt>: <bcp14>OPTIONAL</bcp14>. Text string (Major Type 3) that contains a URI to retrieve the Status List Aggregation for this type of Referenced Token. See section <xref target="batch-fetching"/> for further detail.</t>
              </li>
            </ul>
          </li>
        </ul>
        <t>The following example illustrates the CBOR representation of the Status List in Hex:</t>
        <artwork><![CDATA[
byte_array = [0xb9, 0xa3] 
encoded:
a2646269747301636c73744a78dadbb918000217015d
]]></artwork>
        <t>The following is the CBOR Annotated Hex output of the example above:</t>
        <artwork><![CDATA[
a2                              # map(2)
  64                            #   string(4)
    62697473                    #     "bits"
  01                            #   uint(1)
  63                            #   string(3)
    6c7374                      #     "lst"
  4a                            #   bytes(10)
    78dadbb918000217015d        #     "xÚÛ¹\x18\x00\x02\x17\x01]"
]]></artwork>
      </section>
    </section>
    <section anchor="status-list-token">
      <name>Status List Token</name>
      <t>A Status List Token embeds the Status List into a token that is cryptographically signed and protects the integrity of the Status List. This allows for the Status List Token to be hosted by third parties or be transferred for offline use cases.</t>
      <t>This section specifies Status List Tokens in JSON Web Token (JWT) and CBOR Web Token (CWT) format.</t>
      <section anchor="status-list-token-jwt">
        <name>Status List Token in JWT Format</name>
        <t>The Status List Token <bcp14>MUST</bcp14> be encoded as a "JSON Web Token (JWT)" according to <xref target="RFC7519"/>.</t>
        <t>The following content applies to the JWT Header:</t>
        <ul spacing="normal">
          <li>
            <t><tt>typ</tt>: <bcp14>REQUIRED</bcp14>. The JWT type <bcp14>MUST</bcp14> be <tt>statuslist+jwt</tt>.</t>
          </li>
        </ul>
        <t>The following content applies to the JWT Claims Set:</t>
        <ul spacing="normal">
          <li>
            <t><tt>sub</tt>: <bcp14>REQUIRED</bcp14>. The <tt>sub</tt> (subject) claim <bcp14>MUST</bcp14> specify the URI of the Status List Token. The value <bcp14>MUST</bcp14> be equal to that of the <tt>uri</tt> claim contained in the <tt>status_list</tt> claim of the Referenced Token.</t>
          </li>
          <li>
            <t><tt>iat</tt>: <bcp14>REQUIRED</bcp14>. The <tt>iat</tt> (issued at) claim <bcp14>MUST</bcp14> specify the time at which the Status List Token was issued.</t>
          </li>
          <li>
            <t><tt>exp</tt>: <bcp14>OPTIONAL</bcp14>. The <tt>exp</tt> (expiration time) claim, if present, <bcp14>MUST</bcp14> specify the time at which the Status List Token is considered expired by its issuer.</t>
          </li>
          <li>
            <t><tt>ttl</tt>: <bcp14>OPTIONAL</bcp14>. The <tt>ttl</tt> (time to live) claim, if present, <bcp14>MUST</bcp14> specify the maximum amount of time, in seconds, that the Status List Token can be cached by a consumer before a fresh copy <bcp14>SHOULD</bcp14> be retrieved. The value of the claim <bcp14>MUST</bcp14> be a positive number.</t>
          </li>
          <li>
            <t><tt>status_list</tt>: <bcp14>REQUIRED</bcp14>. The <tt>status_list</tt> (status list) claim <bcp14>MUST</bcp14> specify the Status List conforming to the rules outlined in <xref target="status-list-json"/>.</t>
          </li>
        </ul>
        <t>The following additional rules apply:</t>
        <ol spacing="normal" type="1"><li>
            <t>The JWT <bcp14>MAY</bcp14> contain other claims.</t>
          </li>
          <li>
            <t>The JWT <bcp14>MUST</bcp14> be digitally signed using an asymmetric cryptographic algorithm. Relying parties <bcp14>MUST</bcp14> reject the JWT if it is using a Message Authentication Code (MAC) algorithm. Relying parties <bcp14>MUST</bcp14> reject JWTs with an invalid signature.</t>
          </li>
          <li>
            <t>Relying parties <bcp14>MUST</bcp14> reject JWTs that are not valid in all other respects per "JSON Web Token (JWT)" <xref target="RFC7519"/>.</t>
          </li>
          <li>
            <t>Application of additional restrictions and policy are at the discretion of the verifying party.</t>
          </li>
        </ol>
        <t>The following is a non-normative example for a Status List Token in JWT format:</t>
        <artwork><![CDATA[
{
  "alg": "ES256",
  "kid": "12",
  "typ": "statuslist+jwt"
}
.
{
  "exp": 2291720170,
  "iat": 1686920170,
  "status_list": {
    "bits": 1,
    "lst": "eNrbuRgAAhcBXQ"
  },
  "sub": "https://example.com/statuslists/1",
  "ttl": 43200
}
]]></artwork>
      </section>
      <section anchor="status-list-token-cwt">
        <name>Status List Token in CWT Format</name>
        <t>The Status List Token <bcp14>MUST</bcp14> be encoded as a "CBOR Web Token (CWT)" according to <xref target="RFC8392"/>.</t>
        <t>The following content applies to the CWT protected header:</t>
        <ul spacing="normal">
          <li>
            <t><tt>16</tt> (type): <bcp14>REQUIRED</bcp14>. The type of the CWT <bcp14>MUST</bcp14> be <tt>statuslist+cwt</tt> as defined in <xref target="RFC9596"/>.</t>
          </li>
        </ul>
        <t>The following content applies to the CWT Claims Set:</t>
        <ul spacing="normal">
          <li>
            <t><tt>2</tt> (subject): <bcp14>REQUIRED</bcp14>. Same definition as <tt>sub</tt> claim in <xref target="status-list-token-jwt"/>.</t>
          </li>
          <li>
            <t><tt>6</tt> (issued at): <bcp14>REQUIRED</bcp14>. Same definition as <tt>iat</tt> claim in <xref target="status-list-token-jwt"/>.</t>
          </li>
          <li>
            <t><tt>4</tt> (expiration time): <bcp14>OPTIONAL</bcp14>. Same definition as <tt>exp</tt> claim in <xref target="status-list-token-jwt"/>.</t>
          </li>
          <li>
            <t><tt>65534</tt> (time to live): <bcp14>OPTIONAL</bcp14>. Same definition as <tt>ttl</tt> claim in <xref target="status-list-token-jwt"/>.</t>
          </li>
          <li>
            <t><tt>65533</tt> (status list): <bcp14>REQUIRED</bcp14>. The status list claim <bcp14>MUST</bcp14> specify the Status List conforming to the rules outlined in <xref target="status-list-cbor"/>.</t>
          </li>
        </ul>
        <t>The following additional rules apply:</t>
        <ol spacing="normal" type="1"><li>
            <t>The CWT <bcp14>MAY</bcp14> contain other claims.</t>
          </li>
          <li>
            <t>The CWT <bcp14>MUST</bcp14> be digitally signed using an asymmetric cryptographic algorithm. Relying parties <bcp14>MUST</bcp14> reject the CWT if it is using a Message Authentication Code (MAC) algorithm. Relying parties <bcp14>MUST</bcp14> reject CWTs with an invalid signature.</t>
          </li>
          <li>
            <t>Relying parties <bcp14>MUST</bcp14> reject CWTs that are not valid in all other respects per "CBOR Web Token (CWT)" <xref target="RFC8392"/>.</t>
          </li>
          <li>
            <t>Application of additional restrictions and policy are at the discretion of the verifying party.</t>
          </li>
        </ol>
        <t>The following is a non-normative example for a Status List Token in CWT format in Hex:</t>
        <artwork><![CDATA[
d28453a20126106e7374617475736c6973742b637774a1044231325850a502782168
747470733a2f2f6578616d706c652e636f6d2f7374617475736c697374732f31061a
648c5bea041a8898dfea19fffe19a8c019fffda2646269747301636c73744a78dadb
b918000217015d584003d2aeb1c53cb6f5486a26f9767b60475cef6f3f9589e79f48
038a3c2c3dbe8cbce1095f4898cfe4f38af8fc6337f7d8d1be8705d71cca5c57be93
79ae96d227
]]></artwork>
        <t>The following is the CBOR Annotated Hex output of the example above:</t>
        <artwork><![CDATA[
d2                              # tag(18)
  84                            #   array(4)
    53                          #     bytes(19)
      a20126106e7374617475736c  #       "¢\x01&\x10nstatusl"
      6973742b637774            #       "ist+cwt"
    a1                          #     map(1)
      04                        #       uint(4)
      42                        #       bytes(2)
        3132                    #         "12"
    58 50                       #     bytes(80)
      a502782168747470733a2f2f  #       "¥\x02x!https://"
      6578616d706c652e636f6d2f  #       "example.com/"
      7374617475736c697374732f  #       "statuslists/"
      31061a648c5bea041a8898df  #       "1\x06\x1ad\x8c[ê\x04\x1a\x88\x98ß"
      ea19fffe19a8c019fffda264  #       "ê\x19ÿþ\x19¨À\x19ÿý¢d"
      6269747301636c73744a78da  #       "bits\x01clstJxÚ"
      dbb918000217015d          #       "Û¹\x18\x00\x02\x17\x01]"
    58 40                       #     bytes(64)
      03d2aeb1c53cb6f5486a26f9  #       "\x03Ò®±Å<¶õHj&ù"
      767b60475cef6f3f9589e79f  #       "v{`G\ïo?\x95\x89ç\x9f"
      48038a3c2c3dbe8cbce1095f  #       "H\x03\x8a<,=¾\x8c¼á\x09_"
      4898cfe4f38af8fc6337f7d8  #       "H\x98Ïäó\x8aøüc7÷Ø"
      d1be8705d71cca5c57be9379  #       "Ñ¾\x87\x05×\x1cÊ\W¾\x93y"
      ae96d227                  #       "®\x96Ò'"
]]></artwork>
      </section>
    </section>
    <section anchor="referenced-token">
      <name>Referenced Token</name>
      <section anchor="status-claim">
        <name>Status Claim</name>
        <t>By including a "status" claim in a Referenced Token, the Issuer is referencing a mechanism to retrieve status information about this Referenced Token. The claim contains members used to reference to a status list as defined in this specification. Other members of the "status" object may be defined by other specifications. This is analogous to "cnf" claim in Section 3.1 of <xref target="RFC7800"/> in which different authenticity confirmation methods can be included.</t>
      </section>
      <section anchor="referenced-token-jose">
        <name>Referenced Token in JOSE</name>
        <t>The Referenced Token <bcp14>MAY</bcp14> be encoded as a "JSON Web Token (JWT)" according to <xref target="RFC7519"/> or other formats based on JOSE.</t>
        <t>The following content applies to the JWT Claims Set:</t>
        <ul spacing="normal">
          <li>
            <t><tt>status</tt>: <bcp14>REQUIRED</bcp14>. The <tt>status</tt> (status) claim <bcp14>MUST</bcp14> specify a JSON Object that contains at least one reference to a status mechanism.
            </t>
            <ul spacing="normal">
              <li>
                <t><tt>status_list</tt>: <bcp14>REQUIRED</bcp14> when the status list mechanism defined in this specification is used. It contains a reference to a Status List or Status List Token. It <bcp14>MUST</bcp14> at least contain the following claims:
                </t>
                <ul spacing="normal">
                  <li>
                    <t><tt>idx</tt>: <bcp14>REQUIRED</bcp14>. The <tt>idx</tt> (index) claim <bcp14>MUST</bcp14> specify an Integer that represents the index to check for status information in the Status List for the current Referenced Token. The value of <tt>idx</tt> <bcp14>MUST</bcp14> be a non-negative number, containing a value of zero or greater.</t>
                  </li>
                  <li>
                    <t><tt>uri</tt>: <bcp14>REQUIRED</bcp14>. The <tt>uri</tt> (URI) claim <bcp14>MUST</bcp14> specify a String value that identifies the Status List or Status List Token containing the status information for the Referenced Token. The value of <tt>uri</tt> <bcp14>MUST</bcp14> be a URI conforming to <xref target="RFC3986"/>.</t>
                  </li>
                </ul>
              </li>
            </ul>
          </li>
        </ul>
        <t>Application of additional restrictions and policy are at the discretion of the verifying party.</t>
        <t>The following is a non-normative example for a decoded header and payload of a Referenced Token:</t>
        <artwork type="ascii-art"><![CDATA[
{
  "alg": "ES256",
  "kid": "11"
}
.
{
  "status": {
    "status_list": {
      "idx": 0,
      "uri": "https://example.com/statuslists/1"
    }
  }
}
]]></artwork>
        <t>SD-JWT-based Verifiable Credentials <xref target="SD-JWT.VC"/> introduce the usage of Status List in Section 3.2.2.2. The "status" object uses the same encoding as a JWT as defined in <xref target="referenced-token-jose"/>.</t>
        <t>The following is a non-normative example for a Referenced Token in SD-JWT-VC serialized form as received from an Issuer:</t>
        <artwork type="ascii-art"><![CDATA[
eyJhbGciOiAiRVMyNTYiLCAidHlwIjogImV4YW1wbGUrc2Qtand0In0.eyJfc2QiOiBb
Ikh2cktYNmZQVjB2OUtfeUNWRkJpTEZIc01heGNEXzExNEVtNlZUOHgxbGciXSwgImlz
cyI6ICJodHRwczovL2V4YW1wbGUuY29tL2lzc3VlciIsICJpYXQiOiAxNjgzMDAwMDAw
LCAiZXhwIjogMTg4MzAwMDAwMCwgInN1YiI6ICI2YzVjMGE0OS1iNTg5LTQzMWQtYmFl
Ny0yMTkxMjJhOWVjMmMiLCAic3RhdHVzIjogeyJzdGF0dXNfbGlzdCI6IHsiaWR4Ijog
MCwgInVyaSI6ICJodHRwczovL2V4YW1wbGUuY29tL3N0YXR1c2xpc3RzLzEifX0sICJf
c2RfYWxnIjogInNoYS0yNTYifQ.-kgS-R-Z4DEDlqb8kb6381_gHHNatsoF1fcVKZk3M
06CrnV8F8k9d2w2V_YAOvgcb0f11FqDFezXBXH30d4vcw~WyIyR0xDNDJzS1F2ZUNmR2
ZyeU5STjl3IiwgInN0cmVldF9hZGRyZXNzIiwgIlNjaHVsc3RyLiAxMiJd~WyJlbHVWN
U9nM2dTTklJOEVZbnN4QV9BIiwgImxvY2FsaXR5IiwgIlNjaHVscGZvcnRhIl0~WyI2S
Wo3dE0tYTVpVlBHYm9TNXRtdlZBIiwgInJlZ2lvbiIsICJTYWNoc2VuLUFuaGFsdCJd~
WyJlSThaV205UW5LUHBOUGVOZW5IZGhRIiwgImNvdW50cnkiLCAiREUiXQ~WyJRZ19PN
jR6cUF4ZTQxMmExMDhpcm9BIiwgImFkZHJlc3MiLCB7Il9zZCI6IFsiNnZoOWJxLXpTN
EdLTV83R3BnZ1ZiWXp6dTZvT0dYcm1OVkdQSFA3NVVkMCIsICI5Z2pWdVh0ZEZST0NnU
nJ0TmNHVVhtRjY1cmRlemlfNkVyX2o3NmttWXlNIiwgIktVUkRQaDRaQzE5LTN0aXotR
GYzOVY4ZWlkeTFvVjNhM0gxRGEyTjBnODgiLCAiV045cjlkQ0JKOEhUQ3NTMmpLQVN4V
GpFeVc1bTV4NjVfWl8ycm8yamZYTSJdfV0~
]]></artwork>
        <t>Resulting payload of the example above:</t>
        <artwork type="ascii-art"><![CDATA[
{
  "_sd": [
    "HvrKX6fPV0v9K_yCVFBiLFHsMaxcD_114Em6VT8x1lg"
  ],
  "iss": "https://example.com/issuer",
  "iat": 1683000000,
  "exp": 1883000000,
  "sub": "6c5c0a49-b589-431d-bae7-219122a9ec2c",
  "status": {
    "status_list": {
      "idx": 0,
      "uri": "https://example.com/statuslists/1"
    }
  },
  "_sd_alg": "sha-256"
}
]]></artwork>
      </section>
      <section anchor="referenced-token-cose">
        <name>Referenced Token in COSE</name>
        <t>The Referenced Token <bcp14>MAY</bcp14> be encoded as a "COSE Web Token (CWT)" object according to <xref target="RFC8392"/> or other formats based on COSE.</t>
        <t>The following content applies to the CWT Claims Set:</t>
        <ul spacing="normal">
          <li>
            <t><tt>65535</tt> (status): <bcp14>REQUIRED</bcp14>. The status claim is encoded as a <tt>Status</tt> CBOR structure and <bcp14>MUST</bcp14> include at least one data item that refers to a status mechanism. Each data item in the <tt>Status</tt> CBOR structure comprises a key-value pair, where the key must be a CBOR text string (Major Type 3) specifying the identifier of the status mechanism, and the corresponding value defines its contents. This specification defines the following data items:
            </t>
            <ul spacing="normal">
              <li>
                <t><tt>status_list</tt> (status list): <bcp14>REQUIRED</bcp14> when the status list mechanism defined in this specification is used. It has the same definition as the <tt>status_list</tt> claim in <xref target="referenced-token-jose"/> but <bcp14>MUST</bcp14> be encoded as a <tt>StatusListInfo</tt> CBOR structure with the following fields:
                </t>
                <ul spacing="normal">
                  <li>
                    <t><tt>idx</tt>: <bcp14>REQUIRED</bcp14>. Same definition as <tt>idx</tt> claim in <xref target="referenced-token-jose"/>.</t>
                  </li>
                  <li>
                    <t><tt>uri</tt>: <bcp14>REQUIRED</bcp14>. Same definition as <tt>uri</tt> claim in <xref target="referenced-token-jose"/>.</t>
                  </li>
                </ul>
              </li>
            </ul>
          </li>
        </ul>
        <t>Application of additional restrictions and policy are at the discretion of the verifying party.</t>
        <t>The following is a non-normative example of a Referenced Token in CWT format in Hex:</t>
        <artwork><![CDATA[
d28443a10126a1044231325866a502653132333435017368747470733a2f2f657861
6d706c652e636f6d061a648c5bea041a8898dfea19ffffa16b7374617475735f6c69
7374a2636964780063757269782168747470733a2f2f6578616d706c652e636f6d2f
7374617475736c697374732f3158409e46484865d84adfbaa4f26e541fa6b3e49e1a
40bcd33117f810a5a37f8b44dee85188ac504b7bc6e404bac830cba4b28197abe1d4
9bca21c88b0c2c28749c94
]]></artwork>
        <t>The following is the CBOR Annotated Hex output of the example above:</t>
        <artwork><![CDATA[
d2                              # tag(18)
  84                            #   array(4)
    43                          #     bytes(3)
      a10126                    #       "¡\x01&"
    a1                          #     map(1)
      04                        #       uint(4)
      42                        #       bytes(2)
        3132                    #         "12"
    58 66                       #     bytes(102)
      a50265313233343501736874  #       "¥\x02e12345\x01sht"
      7470733a2f2f6578616d706c  #       "tps://exampl"
      652e636f6d061a648c5bea04  #       "e.com\x06\x1ad\x8c[ê\x04"
      1a8898dfea19ffffa16b7374  #       "\x1a\x88\x98ßê\x19ÿÿ¡kst"
      617475735f6c697374a26369  #       "atus_list¢ci"
      647800637572697821687474  #       "dx\x00curix!htt"
      70733a2f2f6578616d706c65  #       "ps://example"
      2e636f6d2f7374617475736c  #       ".com/statusl"
      697374732f31              #       "ists/1"
    58 40                       #     bytes(64)
      9e46484865d84adfbaa4f26e  #       "\x9eFHHeØJßº¤òn"
      541fa6b3e49e1a40bcd33117  #       "T\x1f¦³ä\x9e\x1a@¼Ó1\x17"
      f810a5a37f8b44dee85188ac  #       "ø\x10¥£\x7f\x8bDÞèQ\x88¬"
      504b7bc6e404bac830cba4b2  #       "PK{Æä\x04ºÈ0Ë¤²"
      8197abe1d49bca21c88b0c2c  #       "\x81\x97«áÔ\x9bÊ!È\x8b\x0c,"
      28749c94                  #       "(t\x9c\x94"
]]></artwork>
        <t>ISO mdoc <xref target="ISO.mdoc"/> may utilize the Status List mechanism by introducing the <tt>status</tt> parameter in the Mobile Security Object (MSO) as specified in Section 9.1.2. The <tt>status</tt> parameter uses the same encoding as a CWT as defined in <xref target="referenced-token-cose"/>.</t>
        <t>It is <bcp14>RECOMMENDED</bcp14> to use <tt>status</tt> for the label of the field that contains the <tt>Status</tt> CBOR structure.</t>
        <t>Application of additional restrictions and policy are at the discretion of the verifying party.</t>
        <t>The following is a non-normative example for an IssuerAuth as specified in ISO mDL (also referred to as signed MSO) in Hex:</t>
        <artwork type="ascii-art"><![CDATA[
8443a10126a118215901f3308201ef30820195a00302010202140bfec7da97e048e
15ac3dacb9eafe82e64fd07f5300a06082a8648ce3d040302302331143012060355
04030c0b75746f7069612069616361310b3009060355040613025553301e170d323
4313030313030303030305a170d3235313030313030303030305a30213112301006
035504030c0975746f706961206473310b300906035504061302555330593013060
72a8648ce3d020106082a8648ce3d03010703420004ace7ab7340e5d9648c5a72a9
a6f56745c7aad436a03a43efea77b5fa7b88f0197d57d8983e1b37d3a539f4d5883
65e38cbbf5b94d68c547b5bc8731dcd2f146ba381a83081a5301c0603551d1f0415
30133011a00fa00d820b6578616d706c652e636f6d301e0603551d1204173015811
36578616d706c65406578616d706c652e636f6d301d0603551d0e0416041414e290
17a6c35621ffc7a686b7b72db06cd12351301f0603551d2304183016801454fa238
3a04c28e0d930792261c80c4881d2c00b300e0603551d0f0101ff04040302078030
150603551d250101ff040b3009060728818c5d050102300a06082a8648ce3d04030
20348003045022100b7103fd4b90529f50bd6f70c5ae5ce7f4f3d4d15a4e082812f
9fa1f5c2e5aa0a0220070b2822ec7ce6c56804923a85b2cfbffd054cf9a915f070c
fef7179a4bc6569590320d81859031ba766737461747573a16b7374617475735f6c
697374a26369647819019c63757269782168747470733a2f2f6578616d706c652e6
36f6d2f7374617475736c697374732f3167646f6354797065756f72672e69736f2e
31383031332e352e312e6d444c6776657273696f6e63312e306c76616c696469747
9496e666fa3667369676e6564c074323032342d31302d30315431333a33303a3032
5a6976616c696446726f6dc074323032342d31302d30315431333a33303a30325a6
a76616c6964556e74696cc074323032352d31302d30315431333a33303a30325a6c
76616c756544696765737473a1716f72672e69736f2e31383031332e352e31ac005
820a81d65ed5075fbd7ee19fa66e2bb3047ed826e2769873e7ef07c923da7a6f243
01582048701a9546492284d266ed81d439230a582d0e1f17a08ab1859a3efe98069
0a4025820d11fe48c8835b30bfb3895c3905436ddfb63f59ab9eee181b110985329
2a8f62035820a741bf05e20a8bc359e32426106ed0899b2c60262cc3acc637ddc99
41095fb7a045820ab67cb9a8f20a8572f77f02727367d08dc8e57fb89deb46b9c62
6e94457b7d8b055820bacddb4142b3842bd555206eb5acb27ded063294995c7e7fe
fbf93ece522604d065820bfd02b3aebdc05b53b5539226c38088d6d784b0ea0fab6
9eb9311650a48d325307582027dab70fe71da63e5e5d199e8ae5b79cbe8904bc30c
5b7544fb809e02ccb3e6a0858200dbd7ccc9c7727d3d17295f1b6f1914071670ee2
3d4d33530c31f1f406b8e3b7095820a5beb5efadf37f21637209abc519830681cc5
1f334818a823fec13b29552f5ba0a5820d8047c95f9272d7d07b2c13a9f5ac2ee02
380ab272a165e569391d89a2152c3c0b582004939930ffb4911ef03487a153605a3
0368b69f2437d6d21b4c90f92bc144c3e6d6465766963654b6579496e666fa16964
65766963654b6579a40102200121582096313d6c63e24e3372742bfdb1a33ba2c89
7dcd68ab8c753e4fbd48dca6b7f9a2258201fb3269edd418857de1b39a4e4a44b92
fa484caa722c228288f01d0c03a2c3d66f646967657374416c676f726974686d675
348412d3235365840b7c2d4abe85aa5ba814ef95de0385c71c802be8ac33a4a971a
85ed800ba7acb59cb21035f4a68fc0caa450cbefd3b255aec72f83595f0ae7b7d50
fe8a1c4cafe
]]></artwork>
        <t>The following is the CBOR Diagnostic Notation of the example above:</t>
        <artwork><![CDATA[
[
  << {
    1: -7
  } >>,
  {
    33: h'308201ef30820195a00302010202140bfec7da97e048e15ac3dacb9ea
    fe82e64fd07f5300a06082a8648ce3d04030230233114301206035504030c0b
    75746f7069612069616361310b3009060355040613025553301e170d3234313
    030313030303030305a170d3235313030313030303030305a30213112301006
    035504030c0975746f706961206473310b30090603550406130255533059301
    306072a8648ce3d020106082a8648ce3d03010703420004ace7ab7340e5d964
    8c5a72a9a6f56745c7aad436a03a43efea77b5fa7b88f0197d57d8983e1b37d
    3a539f4d588365e38cbbf5b94d68c547b5bc8731dcd2f146ba381a83081a530
    1c0603551d1f041530133011a00fa00d820b6578616d706c652e636f6d301e0
    603551d120417301581136578616d706c65406578616d706c652e636f6d301d
    0603551d0e0416041414e29017a6c35621ffc7a686b7b72db06cd12351301f0
    603551d2304183016801454fa2383a04c28e0d930792261c80c4881d2c00b30
    0e0603551d0f0101ff04040302078030150603551d250101ff040b300906072
    8818c5d050102300a06082a8648ce3d0403020348003045022100b7103fd4b9
    0529f50bd6f70c5ae5ce7f4f3d4d15a4e082812f9fa1f5c2e5aa0a0220070b2
    822ec7ce6c56804923a85b2cfbffd054cf9a915f070cfef7179a4bc6569'
  },
  << 24( << {
    "status": {
      "status_list": {
        "idx": 412,
        "uri": "https://example.com/statuslists/1"
      }
    },
    "docType": "org.iso.18013.5.1.mDL",
    "version": "1.0",
    "validityInfo": {
      "signed": 2024-10-01 13:30:02+00:00,
      "validFrom": 2024-10-01 13:30:02+00:00,
      "validUntil": 2025-10-01 13:30:02+00:00
    },
    "valueDigests": {
      "org.iso.18013.5.1": {
        0: h'a81d65ed5075fbd7ee19fa66e2bb3047ed826e2769873e7ef07c92
        3da7a6f243',
        1: h'48701a9546492284d266ed81d439230a582d0e1f17a08ab1859a3e
        fe980690a4',
        2: h'd11fe48c8835b30bfb3895c3905436ddfb63f59ab9eee181b11098
        53292a8f62',
        3: h'a741bf05e20a8bc359e32426106ed0899b2c60262cc3acc637ddc9
        941095fb7a',
        4: h'ab67cb9a8f20a8572f77f02727367d08dc8e57fb89deb46b9c626e
        94457b7d8b',
        5: h'bacddb4142b3842bd555206eb5acb27ded063294995c7e7fefbf93
        ece522604d',
        6: h'bfd02b3aebdc05b53b5539226c38088d6d784b0ea0fab69eb93116
        50a48d3253',
        7: h'27dab70fe71da63e5e5d199e8ae5b79cbe8904bc30c5b7544fb809
        e02ccb3e6a',
        8: h'0dbd7ccc9c7727d3d17295f1b6f1914071670ee23d4d33530c31f1
        f406b8e3b7',
        9: h'a5beb5efadf37f21637209abc519830681cc51f334818a823fec13
        b29552f5ba',
        10: h'd8047c95f9272d7d07b2c13a9f5ac2ee02380ab272a165e569391
        d89a2152c3c',
        11: h'04939930ffb4911ef03487a153605a30368b69f2437d6d21b4c90
        f92bc144c3e'
      }
    },
    "deviceKeyInfo": {
      "deviceKey": {
        1: 2,
        -1: 1,
        -2: h'96313d6c63e24e3372742bfdb1a33ba2c897dcd68ab8c753e4fbd
        48dca6b7f9a',
        -3: h'1fb3269edd418857de1b39a4e4a44b92fa484caa722c228288f01
        d0c03a2c3d6'
      }
    },
    "digestAlgorithm": "SHA-256"
  } >> ) >>,
  h'b7c2d4abe85aa5ba814ef95de0385c71c802be8ac33a4a971a85ed800ba7acb
  59cb21035f4a68fc0caa450cbefd3b255aec72f83595f0ae7b7d50fe8a1c4cafe'
]
]]></artwork>
      </section>
    </section>
    <section anchor="status-types">
      <name>Status Types</name>
      <t>This document defines potential statuses of Referenced Tokens as Status Type values. If the Status List contains more than one bit per token (as defined by "bits" in the Status List), then the whole value of bits <bcp14>MUST</bcp14> describe one value. A Status List can not represent multiple statuses per Referenced Token.</t>
      <t>The registry in this document describes the basic Status Type values required for the most common use cases.
Additional values may defined for particular use cases.</t>
      <section anchor="status-types-values">
        <name>Status Types Values</name>
        <t>A status describes the state, mode, condition or stage of an entity that is described by the Status List. Status Types <bcp14>MUST</bcp14> be numeric values between 0 and 255.
Status types described by this specification comprise:</t>
        <ul spacing="normal">
          <li>
            <t>0x00 - "VALID" - The status of the Token is valid, correct or legal.</t>
          </li>
          <li>
            <t>0x01 - "INVALID" - The status of the Token is revoked, annulled, taken back, recalled or cancelled. This state is irreversible.</t>
          </li>
          <li>
            <t>0x02 - "SUSPENDED" - The status of the Token is temporarily invalid, hanging, debarred from privilege. This state is reversible.</t>
          </li>
        </ul>
        <t>The issuer of the Status List <bcp14>MUST</bcp14> choose an adequate <tt>bits</tt> (bit size) to be able to describe the required Status Types for the application.</t>
        <t>The processing rules for JWT or CWT precede any evaluation of a Referenced Token's status. For example, if a token is evaluated as being expired through the "exp" (Expiration Time) but also has a status of 0x00 ("VALID"), the token is considered expired.</t>
      </section>
    </section>
    <section anchor="verification-and-processing">
      <name>Verification and Processing</name>
      <section anchor="status-list-request">
        <name>Status List Request</name>
        <t>To obtain the Status List or Status List Token, the Relying Party <bcp14>MUST</bcp14> send an HTTP GET request to the URI provided in the Referenced Token.</t>
        <t>If the Status List is provided by an HTTP endpoint (and not as a Status List Token), the provider of the Status List <bcp14>MUST</bcp14> utilize TLS. Which version(s) should be implemented will vary over time. A TLS server certificate check <bcp14>MUST</bcp14> be performed as defined in Section 5 and 6 of <xref target="RFC6125"/>.</t>
        <t>The HTTP endpoint <bcp14>SHOULD</bcp14> support the use of Cross-Origin Resource Sharing (CORS) <xref target="CORS"/> and/or other methods as appropriate to enable Browser-Based clients to access it.</t>
        <t>The Relying Party <bcp14>SHOULD</bcp14> send the following Accept-Header to indicate the requested response type:</t>
        <ul spacing="normal">
          <li>
            <t>"application/statuslist+json" for Status List in JSON format</t>
          </li>
          <li>
            <t>"application/statuslist+jwt" for Status List in JWT format</t>
          </li>
          <li>
            <t>"application/statuslist+cbor" for Status List in CBOR format</t>
          </li>
          <li>
            <t>"application/statuslist+cwt" for Status List in CWT format</t>
          </li>
        </ul>
        <t>If the Relying Party does not send an Accept Header, the response type is assumed to be known implicit or out-of-band.</t>
      </section>
      <section anchor="status-list-response">
        <name>Status List Response</name>
        <t>In the successful response, the Status List Provider <bcp14>MUST</bcp14> use the following content-type:</t>
        <ul spacing="normal">
          <li>
            <t>"application/statuslist+json" for Status List in JSON format</t>
          </li>
          <li>
            <t>"application/statuslist+jwt" for Status List in JWT format</t>
          </li>
          <li>
            <t>"application/statuslist+cbor" for Status List in CBOR format</t>
          </li>
          <li>
            <t>"application/statuslist+cwt" for Status List in CWT format</t>
          </li>
        </ul>
        <t>In the case of "application/statuslist+json", the response <bcp14>MUST</bcp14> be of type JSON and follow the rules of <xref target="status-list-json"/>.
In the case of "application/statuslist+jwt", the response <bcp14>MUST</bcp14> be of type JWT and follow the rules of <xref target="status-list-token-jwt"/>.
In the case of "application/statuslist+cbor", the response <bcp14>MUST</bcp14> be of type CBOR and follow the rules of <xref target="status-list-cbor"/>.
In the case of "application/statuslist+cwt", the response <bcp14>MUST</bcp14> be of type CWT and follow the rules of <xref target="status-list-token-cwt"/>.</t>
        <t>The HTTP response <bcp14>SHOULD</bcp14> use gzip Content-Encoding as defined in <xref target="RFC9110"/>.</t>
      </section>
      <section anchor="validation-rules">
        <name>Validation Rules</name>
        <t>Upon receiving a Referenced Token, a Relying Party <bcp14>MUST</bcp14> first perform the validation of the Referenced Token - e.g., checking for expected attributes, valid signature, expiration time.
As this is out of scope of this document, this validation is not be described here, but is expected to be done according to the format of the Referenced Token.</t>
        <t>If this validation was not successful, the Referenced Token <bcp14>MUST</bcp14> be rejected. If the validation was successful, the Relying Party <bcp14>MUST</bcp14> perform the following validation steps to evaluate the status of the reference token:</t>
        <ol spacing="normal" type="1"><li>
            <t>Check for the existence of a <tt>status</tt> claim, check for the existence of a <tt>status_list</tt> claim within the <tt>status</tt> claim and validate that the content of <tt>status_list</tt> adheres to the rules defined in <xref target="referenced-token-jose"/> for JWTs and <xref target="referenced-token-cose"/> for CWTs. This step can be overruled if defined within the Referenced Token Format natively</t>
          </li>
          <li>
            <t>Resolve the Status List from the provided URI</t>
          </li>
          <li>
            <t>Validate the Status List Token:
            </t>
            <ol spacing="normal" type="1"><li>
                <t>Validate the Status List Token by following the rules defined in section 7.2 of <xref target="RFC7519"/> for JWTs and section 7.2 of <xref target="RFC8392"/> for CWTs.</t>
              </li>
              <li>
                <t>Check for the existence of the required claims as defined in <xref target="status-list-token-jwt"/> and <xref target="status-list-token-cwt"/></t>
              </li>
            </ol>
          </li>
          <li>
            <t>All existing claims in the Status List Token <bcp14>MUST</bcp14> be checked according to the rules in <xref target="status-list-token-jwt"/> and <xref target="status-list-token-cwt"/>
            </t>
            <ol spacing="normal" type="1"><li>
                <t>The subject claim (<tt>sub</tt> or <tt>2</tt>) of the Status List Token <bcp14>MUST</bcp14> be equal to the <tt>uri</tt> claim in the <tt>status_list</tt> object of the Referenced Token</t>
              </li>
              <li>
                <t>If the Relying Party has custom policies regarding the freshness of the Status List Token, it <bcp14>SHOULD</bcp14> check the issued at claim (<tt>iat</tt> or <tt>6</tt>)</t>
              </li>
              <li>
                <t>If expiration time is defined (<tt>exp</tt> or <tt>4</tt>), it <bcp14>MUST</bcp14> be checked if the Status List Token is expired</t>
              </li>
              <li>
                <t>If the Relying Party is using a system for caching the Status List Token, it <bcp14>SHOULD</bcp14> check the <tt>ttl</tt> claim of the Status List Token and retrieve a fresh copy if (time status was resolved + ttl &lt; current time)</t>
              </li>
            </ol>
          </li>
          <li>
            <t>Decompress the Status List with a decompressor that is compatible with DEFLATE <xref target="RFC1951"/> and ZLIB <xref target="RFC1950"/></t>
          </li>
          <li>
            <t>Retrieve the status value of the index specified in the Referenced Token as described in <xref target="status-list"/>. Fail if the provided index is out of bound of the status list</t>
          </li>
          <li>
            <t>Check the status value as described in <xref target="status-types"/></t>
          </li>
        </ol>
        <t>If any of these checks fails, no statement about the status of the Referenced Token can be made and the Referenced Token <bcp14>SHOULD</bcp14> be rejected.</t>
      </section>
    </section>
    <section anchor="batch-fetching">
      <name>Status List Aggregation</name>
      <t>Status List Aggregation is an optional mechanism to retrieve a list of URIs to all Status List Tokens, allowing a Relying Party to fetch all relevant Status Lists for a specific type of Referenced Token or issuer. This mechanism is intended to support fetching and caching mechanisms and allow offline validation of the status of a reference token for a period of time.</t>
      <t>There are two options for a Relying Party to retrieve the Status List Aggregation.
An issuer <bcp14>MAY</bcp14> support any of these mechanisms:</t>
      <ul spacing="normal">
        <li>
          <t>Issuer metadata: The issuer of the Referenced Token publishes an URI which links to Status List Aggregation, e.g. in publicly available metadata of an issuance protocol</t>
        </li>
        <li>
          <t>Status List Parameter: The issuer of the Referenced Token includes an additional claim in the Status List (Token) that contains the Status List Aggregation URI.</t>
        </li>
      </ul>
      <section anchor="issuer-metadata">
        <name>Issuer Metadata</name>
        <t>The issuer <bcp14>MAY</bcp14> link to the Status List Aggregation URI in metadata that can be provided by different means like .well-known metadata as is used commonly in OAuth and OpenID, or via a VICAL extension for ISO mDoc / mDL.</t>
        <t>The concrete specification on how this is implemented depends on the specific ecosystem and is out of scope of this specification.</t>
      </section>
      <section anchor="status-list-parameter">
        <name>Status List Parameter</name>
        <t>The URI to the Status List Aggregation <bcp14>MAY</bcp14> be provided as the optional parameter <tt>aggregation_uri</tt> in the Status List itself as explained in<xref target="status-list-cbor"/> and <xref target="status-list-json"/> respectively. A Relying Party may use this URI to retrieve an up-to-date list of relevant Status Lists.</t>
      </section>
      <section anchor="status-list-aggregation-in-json-format">
        <name>Status List Aggregation in JSON Format</name>
        <t>This section defines the structure for a JSON-encoded Status List Aggregation:</t>
        <ul spacing="normal">
          <li>
            <t><tt>status_lists</tt>: <bcp14>REQUIRED</bcp14>. JSON array of strings that contains URIs linking to Status List (Tokens).</t>
          </li>
        </ul>
        <t>The Status List Aggregation URI provides a list of Status List URIs. This aggregation in JSON and the media type return <bcp14>SHOULD</bcp14> be <tt>application/json</tt>. A Relying Party can iterate through this list and fetch all Status List Tokens before encountering the specific URI in a Referenced Token.</t>
        <t>The following is a non-normative example for media type <tt>application/json</tt>:</t>
        <sourcecode type="json"><![CDATA[
{
   "status_lists" : [
      "https://example.com/statuslists/1",
      "https://example.com/statuslists/2",
      "https://example.com/statuslists/3"
   ]
}
]]></sourcecode>
      </section>
    </section>
    <section anchor="further-examples">
      <name>Further Examples</name>
      <section anchor="status-list-token-with-2-bit-status-values-in-jwt-format">
        <name>Status List Token with 2-Bit Status Values in JWT format</name>
        <t>In this example, the Status List additionally includes the Status Type "SUSPENDED". As the Status Type value for "SUSPENDED" is 0x02 and does not fit into 1 bit, the "bits" is required to be 2.</t>
        <t>This example Status List represents the status of 12 Referenced Tokens, requiring 24 bits (3 bytes) of status.</t>
        <artwork type="ascii-art"><![CDATA[
status[0] = 1
status[1] = 2
status[2] = 0
status[3] = 3
status[4] = 0
status[5] = 1
status[6] = 0
status[7] = 1
status[8] = 1
status[9] = 2
status[10] = 3
status[11] = 3
]]></artwork>
        <t>These bits are concatenated:</t>
        <artwork type="ascii-art"><![CDATA[
byte             0                  1                  2
bit       7 6 5 4 3 2 1 0    7 6 5 4 3 2 1 0    7 6 5 4 3 2 1 0
         +-+-+-+-+-+-+-+-+  +-+-+-+-+-+-+-+-+  +-+-+-+-+-+-+-+-+
values   |1|1|0|0|1|0|0|1|  |0|1|0|0|0|1|0|0|  |1|1|1|1|1|0|0|1|
         +-+-+-+-+-+-+-+-+  +-+-+-+-+-+-+-+-+  +-+-+-+-+-+-+-+-+
          \ / \ / \ / \ /    \ / \ / \ / \ /    \ / \ / \ / \ /
status     3   0   2   1      1   0   1   0      3   3   2   1
index      3   2   1   0      7   6   5   4      11  10  9   8
           \___________/      \___________/      \___________/
                0xC9               0x44               0xF9

]]></artwork>
        <t>Resulting in the byte array and compressed/base64url-encoded status list:</t>
        <artwork><![CDATA[
byte_array = [0xc9, 0x44, 0xf9] 
encoded:
{
  "bits": 2,
  "lst": "eNo76fITAAPfAgc"
}
]]></artwork>
      </section>
    </section>
    <section anchor="Security">
      <name>Security Considerations</name>
      <section anchor="correct-decoding-and-parsing-of-the-encoded-status-list">
        <name>Correct decoding and parsing of the encoded status list</name>
        <t>Implementers should be particularly careful for the correct parsing and decoding of the status list. Incorrect implementations might check the index on the wrong data or miscalculate the bit and byte index leading to an erroneous status of the Referenced Token. Beware, that bits are indexed (bit order) from least significant bit to most significant bit (also called "right to left") while bytes are indexed (byte order) in their natural incrementing byte order (usually written for display purpose from left to write). Endianness does not apply here because each status value fits within a single byte.</t>
        <t>Implementations are <bcp14>RECOMMENDED</bcp14> to verify correctness using the test vectors given by this specification.</t>
      </section>
      <section anchor="security-guidance-for-jwt-and-cwt">
        <name>Security Guidance for JWT and CWT</name>
        <t>A Status List Token in the JWT format should follow the security considerations of <xref target="RFC7519"/> and the best current practices of <xref target="RFC8725"/>.</t>
        <t>A Status List Token in the CWT format should follow the security considerations of <xref target="RFC8392"/>.</t>
      </section>
      <section anchor="cached-and-stale-status-lists">
        <name>Cached and Stale status lists</name>
        <t>When consumers or verifiers of the Status List fetch the data, they need to be aware of its up-to-date status. The 'ttl' (time-to-live) claim
in the Status List Token provides one mechanism for setting a maximum cache time for the fetched data. This property permits distribution of
a status list to a CDN or other distribution mechanism while giving guidance to consumers of the status list on how often they need to fetch
a fresh copy of the status list even if that status list is not expired.</t>
      </section>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <section anchor="privacy-issuer">
        <name>Observability of Issuers</name>
        <t>The main privacy consideration for a Status List, especially in the context of the Issuer-Holder-Verifier model <xref target="SD-JWT.VC"/>, is to prevent the Issuer from tracking the usage of the Referenced Token when the status is being checked. If an Issuer offers status information by referencing a specific token, this would enable him to create a profile for the issued token by correlating the date and identity of Relying Parties, that are requesting the status.</t>
        <t>The Status List approaches these privacy implications by integrating the status information of many Referenced Tokens into the same list. Therefore, the Issuer does not learn for which Referenced Token the Relying Party is requesting the Status List. The privacy of the Holder is protected by the anonymity within the set of Referenced Tokens in the Status List, also called herd privacy. This limits the possibilities of tracking by the Issuer.</t>
        <t>The herd privacy is depending on the number of entities within the Status List called its size. A larger size results in better privacy but also impacts the performance as more data has to be transferred to read the Status List.</t>
        <t>Additionally, the Issuer may analyse data from the HTTP request to identify the Relying Party, e.g. through the sender's IP address. This behaviour may be mitigated by private relay protocols or other mechanism hiding the original sender like <xref target="RFC9458"/>.</t>
      </section>
      <section anchor="malicious-issuers">
        <name>Malicious Issuers</name>
        <t>A malicious Issuer could bypass the privacy benefits of the herd privacy by generating a unique Status List for every Referenced Token. By these means, he could maintain a mapping between Referenced Tokens and Status Lists and thus track the usage of Referenced Tokens by utilizing this mapping for the incoming requests. This malicious behaviour could be detected by Relying Parties that request large amounts of Referenced Tokens by comparing the number of different Status Lists and their sizes.</t>
      </section>
      <section anchor="privacy-relying-party">
        <name>Observability of Relying Parties</name>
        <t>Once the Relying Party receives the Referenced Token, this enables him to request the Status List to validate its status through the provided <tt>uri</tt> parameter and look up the corresponding <tt>index</tt>. However, the Relying Party may persistently store the <tt>uri</tt> and <tt>index</tt> of the Referenced Token to request the Status List again at a later time. By doing so regularly, the Relying Party may create a profile of the Referenced Token's validity status. This behaviour may be intended as a feature, e.g. for a KYC process that requires regular validity checks, but might also be abused in cases where this is not intended and unknown to the Holder, e.g. profiling the suspension of a driving license or checking the employment status of an employee credential.</t>
        <t>TODO elaborate on status list only providing the up-to date/latest status, no historical data, may be provided by the underlying hosting architecture</t>
        <t>This behaviour could be mitigated by:
- regular re-issuance of the Referenced Token, see <xref target="implementation-lifecycle"/>.</t>
      </section>
      <section anchor="privacy-outsider">
        <name>Observability of Outsiders</name>
        <t>Outside actors may analyse the publicly available Status Lists to get information on the internal processes of the Issuer and his related business. This data may allow inferences on the total number of issued Reference Tokens and the revocation rate. Additionally, actors may regularly fetch this data or use the historic data functionality to learn how these numbers change over time.</t>
        <t>This behaviour could be mitigated by:
- disable the historical data feature (TODO:link)
- disable the Status List Aggregation {#batch-fetching}
- choose non-sequential, pseudo-random or random indices
- use decoy entries to obfuscate the real number of Referenced Tokens within a Status List
- choose to deploy and utilize multiple Status Lists simultaneously</t>
      </section>
      <section anchor="unlinkability">
        <name>Unlinkability</name>
        <t>Colluding Issuers and Relying Parties have the possibility to link two transactions, as the tuple of <tt>uri</tt> and <tt>index</tt> inside the Referenced Token are unique and therefore traceable data. By comparing the status claims of received Referenced Tokens, two colluding Relying Parties could determine that they have interacted with the same user or an Issuer could trace the usage of its issued Referenced Token by colluding with various Relying Parties. It is therefore recommended to use Status Lists for Referenced Token formats that have similar unlinkability properties.</t>
        <t>To avoid privacy risks for colluding Relying Parties, it is <bcp14>RECOMMENDED</bcp14> that Issuers use batch issuance to issue multiple tokens, see <xref target="implementation-lifecycle"/>.</t>
        <t>To avoid further correlatable information by the values of <tt>uri</tt> and <tt>index</tt>, Issuers are <bcp14>RECOMMENDED</bcp14> to:</t>
        <ul spacing="normal">
          <li>
            <t>choose non-sequential, pseudo-random or random indices</t>
          </li>
          <li>
            <t>use decoy entries to obfuscate the real number of Referenced Tokens within a Status List</t>
          </li>
          <li>
            <t>choose to deploy and utilize multiple Status Lists simultaneously</t>
          </li>
        </ul>
      </section>
      <section anchor="third-party-hosting">
        <name>Third Party Hosting</name>
        <t>TODO elaborate on increased privacy if the status list is hosted by a third party instead of the issuer reducing tracking possibilities
TODO evaluate definition of Status List Provider?
 An entity that hosts the Status List as a resource for potential Relying Parties. The Status List Provider may be the issuer of the Status List but may also be outsourced to a trusted third party.</t>
      </section>
    </section>
    <section anchor="implementation">
      <name>Implementation Considerations</name>
      <section anchor="implementation-lifecycle">
        <name>Token Lifecycle</name>
        <t>The lifetime of a Status List (and the Status List Token) depends on the lifetime of its Referenced Tokens. Once all Referenced Tokens are expired, the Issuer may stop serving the Status List (and the Status List Token).</t>
        <t>Referenced Tokens may be regularly re-issued to mitigate linkability of presentations to Relying Parties. In this case, every re-issued Referenced Token <bcp14>MUST</bcp14> have a fresh Status List entry in order to prevent this becoming possible source of correlation.</t>
        <t>Referenced Tokens may also be issued in batches, such that Holders can use individual tokens for every transaction. In this case, every Referenced Token <bcp14>MUST</bcp14> have a dedicated Status List entry. Revoking batch issued Referenced Tokens might reveal this correlation later on.</t>
      </section>
      <section anchor="default-values-and-double-allocation">
        <name>Default Values and Double Allocation</name>
        <t>Implementations producing Status Lists are <bcp14>RECOMMENDED</bcp14> to initialize the Status List byte array with a default value and provide this as an initialization parameter to the Issuer. The Issuer is <bcp14>RECOMMENDED</bcp14> to use a default value that represents the most common value for its Referenced Tokens to avoid an update during issuance.</t>
        <t>Implementations producing Status Lists are <bcp14>RECOMMENDED</bcp14> to prevent double allocation, i.e. re-using the same <tt>uri</tt> and <tt>index</tt> for multiple Referenced Tokens. The Issuer <bcp14>MUST</bcp14> prevent any unintended double allocation by using the Status List.</t>
      </section>
      <section anchor="status-list-size">
        <name>Status List Size</name>
        <t>The Status List Issuer may increase the size of a Status List if it requires indices for additional Referenced Tokens. It is <bcp14>RECOMMENDED</bcp14> that the size of a Status List in bits is divisible in bytes (8 bits) without a remainder, i.e. <tt>size-in-bits</tt> % 8 = 0.</t>
        <t>The Status List Issuer may chunk its Referenced Tokens into multiple Status Lists to reduce the transmission size of an individual Status List Token. This may be useful for setups where some entities operate in constrained environments, e.g. for mobile internet or embedded devices.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="json-web-token-claims-registration">
        <name>JSON Web Token Claims Registration</name>
        <t>This specification requests registration of the following Claims in the
IANA "JSON Web Token Claims" registry <xref target="IANA.JWT"/> established by <xref target="RFC7519"/>.</t>
        <section anchor="registry-contents">
          <name>Registry Contents</name>
          <ul spacing="normal">
            <li>
              <t>Claim Name: <tt>status</tt></t>
            </li>
            <li>
              <t>Claim Description: Reference to a status or validity mechanism containing up-to-date status information on the JWT.</t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s): <xref target="status-claim"/> of this specification</t>
            </li>
          </ul>
          <t><br/></t>
          <ul spacing="normal">
            <li>
              <t>Claim Name: <tt>status_list</tt></t>
            </li>
            <li>
              <t>Claim Description: A status list containing up-to-date status information on multiple tokens.</t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s): <xref target="status-list-token-jwt"/> of this specification</t>
            </li>
          </ul>
          <t><br/></t>
          <ul spacing="normal">
            <li>
              <t>Claim Name: <tt>ttl</tt></t>
            </li>
            <li>
              <t>Claim Description: Time to Live</t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s): <xref target="status-list-token-jwt"/> of this specification</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="iana-registry">
        <name>JWT Status Mechanism Methods Registry</name>
        <t>This specification establishes the IANA "Status Mechanism Methods" registry for JWT "status" member values. The registry records the status mechanism method member and a reference to the specification that defines it.</t>
        <section anchor="registration-template">
          <name>Registration Template</name>
          <t>Status Method Value:</t>
          <ul empty="true">
            <li>
              <t>The name requested (e.g., "status_list"). The name is case sensitive. Names may not match other registered names in a case-insensitive manner unless the Designated Experts state that there is a compelling reason to allow an exception.</t>
            </li>
          </ul>
          <t>Status Method Description:</t>
          <ul empty="true">
            <li>
              <t>Brief description of the status mechanism method.</t>
            </li>
          </ul>
          <t>Change Controller:</t>
          <ul empty="true">
            <li>
              <t>For Standards Track RFCs, list the "IESG".  For others, give the name of the responsible party.  Other details (e.g., postal address, email address, home page URI) may also be included.</t>
            </li>
          </ul>
          <t>Specification Document(s):</t>
          <ul empty="true">
            <li>
              <t>Reference to the document or documents that specify the parameter, preferably including URIs that can be used to retrieve copies of the documents.  An indication of the relevant sections may also be included but is not required.</t>
            </li>
          </ul>
        </section>
        <section anchor="initial-registry-contents">
          <name>Initial Registry Contents</name>
          <ul spacing="normal">
            <li>
              <t>Status Method Value: <tt>status_list</tt></t>
            </li>
            <li>
              <t>Status Method Description: A status list containing up-to-date status information on multiple tokens.</t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s): <xref target="referenced-token-jose"/> of this specification</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="cbor-web-token-claims-registration">
        <name>CBOR Web Token Claims Registration</name>
        <t>This specification requests registration of the following Claims in the
IANA "CBOR Web Token (CWT) Claims" registry <xref target="IANA.CWT"/> established by <xref target="RFC8392"/>.</t>
        <section anchor="registry-contents-1">
          <name>Registry Contents</name>
          <t><br/></t>
          <ul spacing="normal">
            <li>
              <t>Claim Name: <tt>status</tt></t>
            </li>
            <li>
              <t>Claim Key: TBD (requested assignment 65535)</t>
            </li>
            <li>
              <t>Claim Description: Reference to a status or validity mechanism containing up-to-date status information on the CWT.</t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s): <xref target="status-claim"/> of this specification</t>
            </li>
          </ul>
          <t><br/></t>
          <ul spacing="normal">
            <li>
              <t>Claim Name: <tt>status_list</tt></t>
            </li>
            <li>
              <t>Claim Key: TBD (requested assignment 65533)</t>
            </li>
            <li>
              <t>Claim Description: A status list containing up-to-date status information on multiple tokens.</t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s): <xref target="status-list-token-cwt"/> of this specification</t>
            </li>
          </ul>
          <t><br/></t>
          <ul spacing="normal">
            <li>
              <t>Claim Name: <tt>ttl</tt></t>
            </li>
            <li>
              <t>Claim Key: TBD (requested assignment 65534)</t>
            </li>
            <li>
              <t>Claim Description: Time to Live</t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s): <xref target="status-list-token-cwt"/> of this specification</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="cwt-iana-registry">
        <name>CWT Status Mechanism Methods Registry</name>
        <t>This specification establishes the IANA "Status Mechanism Methods" registry for CWT "status" member values. The registry records the status mechanism method member and a reference to the specification that defines it.</t>
        <section anchor="registration-template-1">
          <name>Registration Template</name>
          <t>Status Method Value:</t>
          <ul empty="true">
            <li>
              <t>The name requested (e.g., "status_list"). The name is case sensitive. Names may not match other registered names in a case-insensitive manner unless the Designated Experts state that there is a compelling reason to allow an exception.</t>
            </li>
          </ul>
          <t>Status Method Description:</t>
          <ul empty="true">
            <li>
              <t>Brief description of the status mechanism method.</t>
            </li>
          </ul>
          <t>Change Controller:</t>
          <ul empty="true">
            <li>
              <t>For Standards Track RFCs, list the "IESG".  For others, give the name of the responsible party.  Other details (e.g., postal address, email address, home page URI) may also be included.</t>
            </li>
          </ul>
          <t>Specification Document(s):</t>
          <ul empty="true">
            <li>
              <t>Reference to the document or documents that specify the parameter, preferably including URIs that can be used to retrieve copies of the documents.  An indication of the relevant sections may also be included but is not required.</t>
            </li>
          </ul>
        </section>
        <section anchor="initial-registry-contents-1">
          <name>Initial Registry Contents</name>
          <ul spacing="normal">
            <li>
              <t>Status Method Value: <tt>status_list</tt></t>
            </li>
            <li>
              <t>Status Method Description: A status list containing up-to-date status information on multiple tokens.</t>
            </li>
            <li>
              <t>Change Controller: IETF</t>
            </li>
            <li>
              <t>Specification Document(s): <xref target="referenced-token-cose"/> of this specification</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="media-type-registration">
        <name>Media Type Registration</name>
        <t>This section requests registration of the following media types <xref target="RFC2046"/> in
the "Media Types" registry <xref target="IANA.MediaTypes"/> in the manner described
in <xref target="RFC6838"/>.</t>
        <t>To indicate that the content is an JSON-based Status List:</t>
        <ul spacing="normal">
          <li>
            <t>Type name: application</t>
          </li>
          <li>
            <t>Subtype name: statuslist+json</t>
          </li>
          <li>
            <t>Required parameters: n/a</t>
          </li>
          <li>
            <t>Optional parameters: n/a</t>
          </li>
          <li>
            <t>Encoding considerations: See <xref target="status-list-json"/> of this specification</t>
          </li>
          <li>
            <t>Security considerations: See <xref target="Security"/> of this specification</t>
          </li>
          <li>
            <t>Interoperability considerations: n/a</t>
          </li>
          <li>
            <t>Published specification: this specification</t>
          </li>
          <li>
            <t>Applications that use this media type: Applications using this specification for updated status information of tokens</t>
          </li>
          <li>
            <t>Fragment identifier considerations: n/a</t>
          </li>
          <li>
            <t>Additional information: n/a</t>
          </li>
          <li>
            <t>Person &amp; email address to contact for further information: Paul Bastian, paul.bastian@posteo.de</t>
          </li>
          <li>
            <t>Intended usage: COMMON</t>
          </li>
          <li>
            <t>Restrictions on usage: none</t>
          </li>
          <li>
            <t>Author: Paul Bastian, paul.bastian@posteo.de</t>
          </li>
          <li>
            <t>Change controller: IETF</t>
          </li>
          <li>
            <t>Provisional registration? No</t>
          </li>
        </ul>
        <t>To indicate that the content is an JWT-based Status List:</t>
        <ul spacing="normal">
          <li>
            <t>Type name: application</t>
          </li>
          <li>
            <t>Subtype name: statuslist+jwt</t>
          </li>
          <li>
            <t>Required parameters: n/a</t>
          </li>
          <li>
            <t>Optional parameters: n/a</t>
          </li>
          <li>
            <t>Encoding considerations: See <xref target="status-list-token-jwt"/> of this specification</t>
          </li>
          <li>
            <t>Security considerations: See <xref target="Security"/> of this specification</t>
          </li>
          <li>
            <t>Interoperability considerations: n/a</t>
          </li>
          <li>
            <t>Published specification: this specification</t>
          </li>
          <li>
            <t>Applications that use this media type: Applications using this specification for updated status information of tokens</t>
          </li>
          <li>
            <t>Fragment identifier considerations: n/a</t>
          </li>
          <li>
            <t>Additional information: n/a</t>
          </li>
          <li>
            <t>Person &amp; email address to contact for further information: Paul Bastian, paul.bastian@posteo.de</t>
          </li>
          <li>
            <t>Intended usage: COMMON</t>
          </li>
          <li>
            <t>Restrictions on usage: none</t>
          </li>
          <li>
            <t>Author: Paul Bastian, paul.bastian@posteo.de</t>
          </li>
          <li>
            <t>Change controller: IETF</t>
          </li>
          <li>
            <t>Provisional registration? No</t>
          </li>
        </ul>
        <t>To indicate that the content is an CBOR-based Status List:</t>
        <ul spacing="normal">
          <li>
            <t>Type name: application</t>
          </li>
          <li>
            <t>Subtype name: statuslist+cbor</t>
          </li>
          <li>
            <t>Required parameters: n/a</t>
          </li>
          <li>
            <t>Optional parameters: n/a</t>
          </li>
          <li>
            <t>Encoding considerations: See <xref target="status-list-cbor"/> of this specification</t>
          </li>
          <li>
            <t>Security considerations: See <xref target="Security"/> of this specification</t>
          </li>
          <li>
            <t>Interoperability considerations: n/a</t>
          </li>
          <li>
            <t>Published specification: this specification</t>
          </li>
          <li>
            <t>Applications that use this media type: Applications using this specification for updated status information of tokens</t>
          </li>
          <li>
            <t>Fragment identifier considerations: n/a</t>
          </li>
          <li>
            <t>Additional information: n/a</t>
          </li>
          <li>
            <t>Person &amp; email address to contact for further information: Paul Bastian, paul.bastian@posteo.de</t>
          </li>
          <li>
            <t>Intended usage: COMMON</t>
          </li>
          <li>
            <t>Restrictions on usage: none</t>
          </li>
          <li>
            <t>Author: Paul Bastian, paul.bastian@posteo.de</t>
          </li>
          <li>
            <t>Change controller: IETF</t>
          </li>
          <li>
            <t>Provisional registration? No</t>
          </li>
        </ul>
        <t>To indicate that the content is an CWT-based Status List:</t>
        <ul spacing="normal">
          <li>
            <t>Type name: application</t>
          </li>
          <li>
            <t>Subtype name: statuslist+cwt</t>
          </li>
          <li>
            <t>Required parameters: n/a</t>
          </li>
          <li>
            <t>Optional parameters: n/a</t>
          </li>
          <li>
            <t>Encoding considerations: See <xref target="status-list-token-cwt"/> of this specification</t>
          </li>
          <li>
            <t>Security considerations: See <xref target="Security"/> of this specification</t>
          </li>
          <li>
            <t>Interoperability considerations: n/a</t>
          </li>
          <li>
            <t>Published specification: this specification</t>
          </li>
          <li>
            <t>Applications that use this media type: Applications using this specification for updated status information of tokens</t>
          </li>
          <li>
            <t>Fragment identifier considerations: n/a</t>
          </li>
          <li>
            <t>Additional information: n/a</t>
          </li>
          <li>
            <t>Person &amp; email address to contact for further information: Paul Bastian, paul.bastian@posteo.de</t>
          </li>
          <li>
            <t>Intended usage: COMMON</t>
          </li>
          <li>
            <t>Restrictions on usage: none</t>
          </li>
          <li>
            <t>Author: Paul Bastian, paul.bastian@posteo.de</t>
          </li>
          <li>
            <t>Change controller: IETF</t>
          </li>
          <li>
            <t>Provisional registration? No</t>
          </li>
        </ul>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC1950">
          <front>
            <title>ZLIB Compressed Data Format Specification version 3.3</title>
            <author fullname="P. Deutsch" initials="P." surname="Deutsch"/>
            <author fullname="J-L. Gailly" surname="J-L. Gailly"/>
            <date month="May" year="1996"/>
            <abstract>
              <t>This specification defines a lossless compressed data format. This memo provides information for the Internet community. This memo does not specify an Internet standard of any kind.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1950"/>
          <seriesInfo name="DOI" value="10.17487/RFC1950"/>
        </reference>
        <reference anchor="RFC1951">
          <front>
            <title>DEFLATE Compressed Data Format Specification version 1.3</title>
            <author fullname="P. Deutsch" initials="P." surname="Deutsch"/>
            <date month="May" year="1996"/>
            <abstract>
              <t>This specification defines a lossless compressed data format that compresses data using a combination of the LZ77 algorithm and Huffman coding, with efficiency comparable to the best currently available general-purpose compression methods. This memo provides information for the Internet community. This memo does not specify an Internet standard of any kind.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1951"/>
          <seriesInfo name="DOI" value="10.17487/RFC1951"/>
        </reference>
        <reference anchor="RFC2046">
          <front>
            <title>Multipurpose Internet Mail Extensions (MIME) Part Two: Media Types</title>
            <author fullname="N. Freed" initials="N." surname="Freed"/>
            <author fullname="N. Borenstein" initials="N." surname="Borenstein"/>
            <date month="November" year="1996"/>
            <abstract>
              <t>This second document defines the general structure of the MIME media typing system and defines an initial set of media types. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2046"/>
          <seriesInfo name="DOI" value="10.17487/RFC2046"/>
        </reference>
        <reference anchor="RFC3986">
          <front>
            <title>Uniform Resource Identifier (URI): Generic Syntax</title>
            <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee"/>
            <author fullname="R. Fielding" initials="R." surname="Fielding"/>
            <author fullname="L. Masinter" initials="L." surname="Masinter"/>
            <date month="January" year="2005"/>
            <abstract>
              <t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource. This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet. The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier. This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="66"/>
          <seriesInfo name="RFC" value="3986"/>
          <seriesInfo name="DOI" value="10.17487/RFC3986"/>
        </reference>
        <reference anchor="RFC6125">
          <front>
            <title>Representation and Verification of Domain-Based Application Service Identity within Internet Public Key Infrastructure Using X.509 (PKIX) Certificates in the Context of Transport Layer Security (TLS)</title>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
            <author fullname="J. Hodges" initials="J." surname="Hodges"/>
            <date month="March" year="2011"/>
            <abstract>
              <t>Many application technologies enable secure communication between two entities by means of Internet Public Key Infrastructure Using X.509 (PKIX) certificates in the context of Transport Layer Security (TLS). This document specifies procedures for representing and verifying the identity of application services in such interactions. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6125"/>
          <seriesInfo name="DOI" value="10.17487/RFC6125"/>
        </reference>
        <reference anchor="RFC6838">
          <front>
            <title>Media Type Specifications and Registration Procedures</title>
            <author fullname="N. Freed" initials="N." surname="Freed"/>
            <author fullname="J. Klensin" initials="J." surname="Klensin"/>
            <author fullname="T. Hansen" initials="T." surname="Hansen"/>
            <date month="January" year="2013"/>
            <abstract>
              <t>This document defines procedures for the specification and registration of media types for use in HTTP, MIME, and other Internet protocols. This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="13"/>
          <seriesInfo name="RFC" value="6838"/>
          <seriesInfo name="DOI" value="10.17487/RFC6838"/>
        </reference>
        <reference anchor="RFC7515">
          <front>
            <title>JSON Web Signature (JWS)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Signature (JWS) represents content secured with digital signatures or Message Authentication Codes (MACs) using JSON-based data structures. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and an IANA registry defined by that specification. Related encryption capabilities are described in the separate JSON Web Encryption (JWE) specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7515"/>
          <seriesInfo name="DOI" value="10.17487/RFC7515"/>
        </reference>
        <reference anchor="RFC7519">
          <front>
            <title>JSON Web Token (JWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties. The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7519"/>
          <seriesInfo name="DOI" value="10.17487/RFC7519"/>
        </reference>
        <reference anchor="RFC8259">
          <front>
            <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format. It was derived from the ECMAScript Programming Language Standard. JSON defines a small set of formatting rules for the portable representation of structured data.</t>
              <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="90"/>
          <seriesInfo name="RFC" value="8259"/>
          <seriesInfo name="DOI" value="10.17487/RFC8259"/>
        </reference>
        <reference anchor="RFC8392">
          <front>
            <title>CBOR Web Token (CWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties. The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection. A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value. CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8392"/>
          <seriesInfo name="DOI" value="10.17487/RFC8392"/>
        </reference>
        <reference anchor="RFC8725">
          <front>
            <title>JSON Web Token Best Current Practices</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="D. Hardt" initials="D." surname="Hardt"/>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>JSON Web Tokens, also known as JWTs, are URL-safe JSON-based security tokens that contain a set of claims that can be signed and/or encrypted. JWTs are being widely used and deployed as a simple security token format in numerous protocols and applications, both in the area of digital identity and in other application areas. This Best Current Practices document updates RFC 7519 to provide actionable guidance leading to secure implementation and deployment of JWTs.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="225"/>
          <seriesInfo name="RFC" value="8725"/>
          <seriesInfo name="DOI" value="10.17487/RFC8725"/>
        </reference>
        <reference anchor="RFC8949">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="94"/>
          <seriesInfo name="RFC" value="8949"/>
          <seriesInfo name="DOI" value="10.17487/RFC8949"/>
        </reference>
        <reference anchor="RFC9052">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
              <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="96"/>
          <seriesInfo name="RFC" value="9052"/>
          <seriesInfo name="DOI" value="10.17487/RFC9052"/>
        </reference>
        <reference anchor="RFC9110">
          <front>
            <title>HTTP Semantics</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes.</t>
              <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="97"/>
          <seriesInfo name="RFC" value="9110"/>
          <seriesInfo name="DOI" value="10.17487/RFC9110"/>
        </reference>
        <reference anchor="RFC9596">
          <front>
            <title>CBOR Object Signing and Encryption (COSE) "typ" (type) Header Parameter</title>
            <author fullname="M.B. Jones" initials="M.B." surname="Jones"/>
            <author fullname="O. Steele" initials="O." surname="Steele"/>
            <date month="June" year="2024"/>
            <abstract>
              <t>This specification adds the equivalent of the JSON Object Signing and Encryption (JOSE) "typ" (type) header parameter to CBOR Object Signing and Encryption (COSE). This enables the benefits of explicit typing (as defined in RFC 8725, "JSON Web Token Best Current Practices") to be brought to COSE objects. The syntax of the COSE type header parameter value is the same as the existing COSE content type header parameter.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9596"/>
          <seriesInfo name="DOI" value="10.17487/RFC9596"/>
        </reference>
        <reference anchor="IANA.MediaTypes" target="https://www.iana.org/assignments/media-types/media-types.xhtml">
          <front>
            <title>Media Types</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="IANA.JOSE" target="https://www.iana.org/assignments/jose/jose.xhtml">
          <front>
            <title>JSON Object Signing and Encryption (JOSE)</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="IANA.JWT" target="https://www.iana.org/assignments/jwt/jwt.xhtml">
          <front>
            <title>JSON Web Token Claims</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="IANA.CWT" target="https://www.iana.org/assignments/cwt/cwt.xhtml">
          <front>
            <title>CBOR Web Token (CWT) Claims</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="CORS" target="https://fetch.spec.whatwg.org/#http-cors-protocol">
          <front>
            <title>Fetch Living Standard</title>
            <author>
              <organization>WHATWG</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC6749">
          <front>
            <title>The OAuth 2.0 Authorization Framework</title>
            <author fullname="D. Hardt" initials="D." role="editor" surname="Hardt"/>
            <date month="October" year="2012"/>
            <abstract>
              <t>The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf. This specification replaces and obsoletes the OAuth 1.0 protocol described in RFC 5849. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6749"/>
          <seriesInfo name="DOI" value="10.17487/RFC6749"/>
        </reference>
        <reference anchor="RFC7662">
          <front>
            <title>OAuth 2.0 Token Introspection</title>
            <author fullname="J. Richer" initials="J." role="editor" surname="Richer"/>
            <date month="October" year="2015"/>
            <abstract>
              <t>This specification defines a method for a protected resource to query an OAuth 2.0 authorization server to determine the active state of an OAuth 2.0 token and to determine meta-information about this token. OAuth 2.0 deployments can use this method to convey information about the authorization context of the token from the authorization server to the protected resource.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7662"/>
          <seriesInfo name="DOI" value="10.17487/RFC7662"/>
        </reference>
        <reference anchor="RFC7800">
          <front>
            <title>Proof-of-Possession Key Semantics for JSON Web Tokens (JWTs)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="April" year="2016"/>
            <abstract>
              <t>This specification describes how to declare in a JSON Web Token (JWT) that the presenter of the JWT possesses a particular proof-of- possession key and how the recipient can cryptographically confirm proof of possession of the key by the presenter. Being able to prove possession of a key is also sometimes described as the presenter being a holder-of-key.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7800"/>
          <seriesInfo name="DOI" value="10.17487/RFC7800"/>
        </reference>
        <reference anchor="RFC9458">
          <front>
            <title>Oblivious HTTP</title>
            <author fullname="M. Thomson" initials="M." surname="Thomson"/>
            <author fullname="C. A. Wood" initials="C. A." surname="Wood"/>
            <date month="January" year="2024"/>
            <abstract>
              <t>This document describes Oblivious HTTP, a protocol for forwarding encrypted HTTP messages. Oblivious HTTP allows a client to make multiple requests to an origin server without that server being able to link those requests to the client or to identify the requests as having come from the same client, while placing only limited trust in the nodes used to forward the messages.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9458"/>
          <seriesInfo name="DOI" value="10.17487/RFC9458"/>
        </reference>
        <reference anchor="SD-JWT.VC">
          <front>
            <title>SD-JWT-based Verifiable Credentials (SD-JWT VC)</title>
            <author fullname="Oliver Terbu" initials="O." surname="Terbu">
              <organization>MATTR</organization>
            </author>
            <author fullname="Daniel Fett" initials="D." surname="Fett">
              <organization>Authlete Inc.</organization>
            </author>
            <author fullname="Brian Campbell" initials="B." surname="Campbell">
              <organization>Ping Identity</organization>
            </author>
            <date day="18" month="September" year="2024"/>
            <abstract>
              <t>   This specification describes data formats as well as validation and
   processing rules to express Verifiable Credentials with JSON payloads
   with and without selective disclosure based on the SD-JWT
   [I-D.ietf-oauth-selective-disclosure-jwt] format.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-oauth-sd-jwt-vc-05"/>
        </reference>
        <reference anchor="ISO.mdoc">
          <front>
            <title>ISO/IEC 18013-5:2021 ISO-compliant driving licence</title>
            <author>
              <organization>ISO/IEC JTC 1/SC 17</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
    <?line 1147?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>We would like to thank
Brian Campbell,
Filip Skokan,
Francesco Marino,
Guiseppe De Marco,
Kristina Yasuda,
Markus Kreusch,
Martijn Haring,
Michael B. Jones,
Mike Prorock,
Oliver Terbu,
Orie Steele,
Timo Glastra
and
Torsten Lodderstedt</t>
      <t>for their valuable contributions, discussions and feedback to this specification.</t>
    </section>
    <section numbered="false" anchor="document-history">
      <name>Document History</name>
      <t>-04</t>
      <ul spacing="normal">
        <li>
          <t>add mDL example as Referenced Token and consolidate CWT and CBOR sections</t>
        </li>
        <li>
          <t>add implementation consideration for Default Values, Double Allocation and Status List Size</t>
        </li>
        <li>
          <t>add privacy consideration on using private relay protocols</t>
        </li>
        <li>
          <t>add privacy consideration on observability of outsiders</t>
        </li>
        <li>
          <t>add security considerations on correct parsing and decoding</t>
        </li>
        <li>
          <t>remove requirement for matching iss claim in Referenced Token and Status List Token</t>
        </li>
        <li>
          <t>add sd-jwt-vc example</t>
        </li>
        <li>
          <t>fix CWT status_list map encoding</t>
        </li>
        <li>
          <t>editorial fixes</t>
        </li>
        <li>
          <t>add CORS considerations to the http endpoint</t>
        </li>
        <li>
          <t>fix reference of Status List in CBOR format</t>
        </li>
        <li>
          <t>added status_list CWT claim key assigned</t>
        </li>
        <li>
          <t>move base64url definition to terminology</t>
        </li>
      </ul>
      <t>-03</t>
      <ul spacing="normal">
        <li>
          <t>remove unused reference to RFC9111</t>
        </li>
        <li>
          <t>add validation rules for status list token</t>
        </li>
        <li>
          <t>introduce the status list aggregation mechanism</t>
        </li>
        <li>
          <t>relax requirements for status_list claims to contain other parameters</t>
        </li>
        <li>
          <t>change cwt referenced token example to hex and annotated hex</t>
        </li>
        <li>
          <t>require TLS only for fetching Status List, not for Status List Token</t>
        </li>
        <li>
          <t>remove the undefined phrase Status List endpoint</t>
        </li>
        <li>
          <t>remove http caching in favor of the new ttl claim</t>
        </li>
        <li>
          <t>clarify the sub claim of Status List Token</t>
        </li>
        <li>
          <t>relax status_list iss requirements for CWT</t>
        </li>
        <li>
          <t>Fixes missing parts &amp; iana ttl registration in CWT examples</t>
        </li>
      </ul>
      <t>-02</t>
      <ul spacing="normal">
        <li>
          <t>add ttl claim to Status List Token to convey caching</t>
        </li>
        <li>
          <t>relax requirements on referenced token</t>
        </li>
        <li>
          <t>clarify Deflate / zlib compression</t>
        </li>
        <li>
          <t>make a reference to the Issuer-Holder-Verifier model of SD-JWT VC</t>
        </li>
        <li>
          <t>add COSE/CWT/CBOR encoding</t>
        </li>
      </ul>
      <t>-01</t>
      <ul spacing="normal">
        <li>
          <t>Rename title of the draft</t>
        </li>
        <li>
          <t>add design consideration to the introduction</t>
        </li>
        <li>
          <t>Change status claim to in referenced token to allow re-use for other mechanisms</t>
        </li>
        <li>
          <t>Add IANA Registry for status mechanisms</t>
        </li>
        <li>
          <t>restructure the sections of this document</t>
        </li>
        <li>
          <t>add option to return an unsigned Status List</t>
        </li>
        <li>
          <t>Changing compression from gzip to zlib</t>
        </li>
        <li>
          <t>Change typo in Status List Token sub claim description</t>
        </li>
        <li>
          <t>Add access token as an example use-case</t>
        </li>
      </ul>
      <t>-00</t>
      <ul spacing="normal">
        <li>
          <t>Initial draft after working group adoption</t>
        </li>
        <li>
          <t>update acknowledgments</t>
        </li>
        <li>
          <t>renamed Verifier to Relying Party</t>
        </li>
        <li>
          <t>added IANA consideration</t>
        </li>
      </ul>
      <t>[ draft-ietf-oauth-status-list ]</t>
      <t>-01</t>
      <ul spacing="normal">
        <li>
          <t>Applied editorial improvements suggested by Michael Jones.</t>
        </li>
      </ul>
      <t>-00</t>
      <ul spacing="normal">
        <li>
          <t>Initial draft</t>
        </li>
      </ul>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
