<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 3.3.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-rats-eat-media-type-10" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.23.1 -->
  <front>
    <title abbrev="EAT Media Types">EAT Media Types</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-rats-eat-media-type-10"/>
    <author initials="L." surname="Lundblade" fullname="Laurence Lundblade">
      <organization>Security Theory LLC</organization>
      <address>
        <email>lgl@securitytheory.com</email>
      </address>
    </author>
    <author initials="H." surname="Birkholz" fullname="Henk Birkholz">
      <organization abbrev="Fraunhofer SIT">Fraunhofer Institute for Secure Information Technology</organization>
      <address>
        <postal>
          <street>Rheinstrasse 75</street>
          <city>Darmstadt</city>
          <code>64295</code>
          <country>Germany</country>
        </postal>
        <email>henk.birkholz@sit.fraunhofer.de</email>
      </address>
    </author>
    <author initials="T." surname="Fossati" fullname="Thomas Fossati">
      <organization>Linaro</organization>
      <address>
        <email>thomas.fossati@linaro.org</email>
      </address>
    </author>
    <date year="2024" month="September" day="26"/>
    <area>Security</area>
    <workgroup>Remote ATtestation ProcedureS</workgroup>
    <keyword>EAT, media type</keyword>
    <abstract>
      <?line 56?>

<t>Payloads used in Remote Attestation Procedures may require an associated media
type for their conveyance, for example when used in RESTful APIs.</t>
      <t>This memo defines media types to be used for Entity Attestation Tokens (EAT).</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Remote ATtestation ProcedureS Working Group mailing list (rats@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/rats/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/thomas-fossati/draft-eat-mt"/>.</t>
    </note>
  </front>
  <middle>
    <?line 63?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Payloads used in Remote Attestation Procedures <xref target="RATS-Arch"/> may require an
associated media type for their conveyance, for example when used in RESTful
APIs (<xref target="fig-api-sd"/>).</t>
      <figure anchor="fig-api-sd">
        <name>Conveying RATS conceptual messages in REST APIs using EAT</name>
        <artset>
          <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="288" width="536" viewBox="0 0 536 288" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 8,32 L 8,64" fill="none" stroke="black"/>
              <path d="M 24,64 L 24,272" fill="none" stroke="black"/>
              <path d="M 48,32 L 48,64" fill="none" stroke="black"/>
              <path d="M 216,32 L 216,64" fill="none" stroke="black"/>
              <path d="M 256,64 L 256,272" fill="none" stroke="black"/>
              <path d="M 304,32 L 304,64" fill="none" stroke="black"/>
              <path d="M 440,32 L 440,64" fill="none" stroke="black"/>
              <path d="M 488,64 L 488,272" fill="none" stroke="black"/>
              <path d="M 528,32 L 528,64" fill="none" stroke="black"/>
              <path d="M 8,32 L 48,32" fill="none" stroke="black"/>
              <path d="M 216,32 L 304,32" fill="none" stroke="black"/>
              <path d="M 440,32 L 528,32" fill="none" stroke="black"/>
              <path d="M 8,64 L 48,64" fill="none" stroke="black"/>
              <path d="M 216,64 L 304,64" fill="none" stroke="black"/>
              <path d="M 440,64 L 528,64" fill="none" stroke="black"/>
              <path d="M 256,112 L 480,112" fill="none" stroke="black"/>
              <path d="M 264,160 L 488,160" fill="none" stroke="black"/>
              <path d="M 32,208 L 256,208" fill="none" stroke="black"/>
              <path d="M 24,240 L 248,240" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="488,112 476,106.4 476,117.6" fill="black" transform="rotate(0,480,112)"/>
              <polygon class="arrowhead" points="272,160 260,154.4 260,165.6" fill="black" transform="rotate(180,264,160)"/>
              <polygon class="arrowhead" points="256,240 244,234.4 244,245.6" fill="black" transform="rotate(0,248,240)"/>
              <polygon class="arrowhead" points="40,208 28,202.4 28,213.6" fill="black" transform="rotate(180,32,208)"/>
              <g class="text">
                <text x="28" y="52">RP</text>
                <text x="260" y="52">Attester</text>
                <text x="484" y="52">Verifier</text>
                <text x="284" y="84">POST</text>
                <text x="336" y="84">/verify</text>
                <text x="320" y="100">EAT(Evidence)</text>
                <text x="440" y="132">200</text>
                <text x="468" y="132">OK</text>
                <text x="344" y="148">EAT(Attestation</text>
                <text x="444" y="148">Results)</text>
                <text x="180" y="180">POST</text>
                <text x="224" y="180">/auth</text>
                <text x="112" y="196">EAT(Attestation</text>
                <text x="212" y="196">Results)</text>
                <text x="48" y="228">201</text>
                <text x="96" y="228">Created</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art" align="center"><![CDATA[
.----.                    .----------.                .----------.
| RP |                    | Attester |                | Verifier |
'-+--'                    '----+-----'                '-----+----'
  |                            | POST /verify               |
  |                            | EAT(Evidence)              |
  |                            +--------------------------->|
  |                            |                     200 OK |
  |                            |   EAT(Attestation Results) |
  |                            |<---------------------------+
  |                 POST /auth |                            |
  |   EAT(Attestation Results) |                            |
  |<---------------------------+                            |
  | 201 Created                |                            |
  +--------------------------->|                            |
  |                            |                            |
  |                            |                            |
]]></artwork>
        </artset>
      </figure>
      <t>This memo defines media types to be used for Entity Attestation Token (EAT)
<xref target="EAT"/> payloads independently of the RATS Conceptual Message in which they
manifest themselves.  The objective is to give protocol, API and application
designers a number of readily available and reusable media types for
integrating EAT-based messages in their flows, for example when using HTTP
<xref target="BUILD-W-HTTP"/> or CoAP <xref target="REST-IoT"/>.</t>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>This document uses the terms and concepts defined in <xref target="RATS-Arch"/>.</t>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="eat-types">
      <name>EAT Types</name>
      <t><xref target="fig-eat-types"/> illustrates the six EAT wire formats and how they relate to
each other.  <xref target="EAT"/> defines four of them (CWT, JWT and Detached EAT Bundle in
its JSON and CBOR flavours), whilst <xref target="UCCS"/> defines UCCS, and we use
the abbreviation "UJCS" to refer to unprotected JWT Claims Sets as
defined in <xref section="2" sectionFormat="of" target="JWT"/>.</t>
      <figure anchor="fig-eat-types">
        <name>EAT Types</name>
        <artset>
          <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="544" width="520" viewBox="0 0 520 544" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 8,432 L 8,464" fill="none" stroke="black"/>
              <path d="M 72,64 L 72,424" fill="none" stroke="black"/>
              <path d="M 120,48 L 120,64" fill="none" stroke="black"/>
              <path d="M 120,112 L 120,128" fill="none" stroke="black"/>
              <path d="M 120,176 L 120,192" fill="none" stroke="black"/>
              <path d="M 120,240 L 120,256" fill="none" stroke="black"/>
              <path d="M 120,304 L 120,320" fill="none" stroke="black"/>
              <path d="M 120,368 L 120,384" fill="none" stroke="black"/>
              <path d="M 128,432 L 128,464" fill="none" stroke="black"/>
              <path d="M 176,32 L 176,48" fill="none" stroke="black"/>
              <path d="M 176,96 L 176,112" fill="none" stroke="black"/>
              <path d="M 184,160 L 184,176" fill="none" stroke="black"/>
              <path d="M 184,224 L 184,240" fill="none" stroke="black"/>
              <path d="M 184,288 L 184,304" fill="none" stroke="black"/>
              <path d="M 184,352 L 184,368" fill="none" stroke="black"/>
              <path d="M 240,512 L 240,528" fill="none" stroke="black"/>
              <path d="M 272,360 L 272,448" fill="none" stroke="black"/>
              <path d="M 328,496 L 328,512" fill="none" stroke="black"/>
              <path d="M 336,256 L 336,288" fill="none" stroke="black"/>
              <path d="M 352,368 L 352,400" fill="none" stroke="black"/>
              <path d="M 360,496 L 360,528" fill="none" stroke="black"/>
              <path d="M 368,224 L 368,256" fill="none" stroke="black"/>
              <path d="M 368,288 L 368,320" fill="none" stroke="black"/>
              <path d="M 384,128 L 384,256" fill="none" stroke="black"/>
              <path d="M 384,296 L 384,368" fill="none" stroke="black"/>
              <path d="M 384,408 L 384,432" fill="none" stroke="black"/>
              <path d="M 400,64 L 400,256" fill="none" stroke="black"/>
              <path d="M 400,288 L 400,360" fill="none" stroke="black"/>
              <path d="M 416,496 L 416,528" fill="none" stroke="black"/>
              <path d="M 424,368 L 424,400" fill="none" stroke="black"/>
              <path d="M 440,256 L 440,288" fill="none" stroke="black"/>
              <path d="M 472,288 L 472,312" fill="none" stroke="black"/>
              <path d="M 472,352 L 472,368" fill="none" stroke="black"/>
              <path d="M 136,32 L 176,32" fill="none" stroke="black"/>
              <path d="M 88,48 L 120,48" fill="none" stroke="black"/>
              <path d="M 184,48 L 384,48" fill="none" stroke="black"/>
              <path d="M 120,64 L 160,64" fill="none" stroke="black"/>
              <path d="M 136,96 L 176,96" fill="none" stroke="black"/>
              <path d="M 72,112 L 120,112" fill="none" stroke="black"/>
              <path d="M 184,112 L 368,112" fill="none" stroke="black"/>
              <path d="M 120,128 L 160,128" fill="none" stroke="black"/>
              <path d="M 136,160 L 184,160" fill="none" stroke="black"/>
              <path d="M 72,176 L 120,176" fill="none" stroke="black"/>
              <path d="M 192,176 L 240,176" fill="none" stroke="black"/>
              <path d="M 120,192 L 168,192" fill="none" stroke="black"/>
              <path d="M 240,192 L 280,192" fill="none" stroke="black"/>
              <path d="M 304,208 L 352,208" fill="none" stroke="black"/>
              <path d="M 136,224 L 184,224" fill="none" stroke="black"/>
              <path d="M 240,224 L 280,224" fill="none" stroke="black"/>
              <path d="M 72,240 L 120,240" fill="none" stroke="black"/>
              <path d="M 192,240 L 240,240" fill="none" stroke="black"/>
              <path d="M 120,256 L 168,256" fill="none" stroke="black"/>
              <path d="M 336,256 L 440,256" fill="none" stroke="black"/>
              <path d="M 440,272 L 456,272" fill="none" stroke="black"/>
              <path d="M 136,288 L 184,288" fill="none" stroke="black"/>
              <path d="M 336,288 L 440,288" fill="none" stroke="black"/>
              <path d="M 72,304 L 120,304" fill="none" stroke="black"/>
              <path d="M 192,304 L 240,304" fill="none" stroke="black"/>
              <path d="M 120,320 L 168,320" fill="none" stroke="black"/>
              <path d="M 240,320 L 280,320" fill="none" stroke="black"/>
              <path d="M 456,320 L 496,320" fill="none" stroke="black"/>
              <path d="M 304,336 L 352,336" fill="none" stroke="black"/>
              <path d="M 136,352 L 184,352" fill="none" stroke="black"/>
              <path d="M 240,352 L 280,352" fill="none" stroke="black"/>
              <path d="M 456,352 L 496,352" fill="none" stroke="black"/>
              <path d="M 72,368 L 120,368" fill="none" stroke="black"/>
              <path d="M 192,368 L 240,368" fill="none" stroke="black"/>
              <path d="M 352,368 L 424,368" fill="none" stroke="black"/>
              <path d="M 120,384 L 168,384" fill="none" stroke="black"/>
              <path d="M 432,384 L 456,384" fill="none" stroke="black"/>
              <path d="M 352,400 L 424,400" fill="none" stroke="black"/>
              <path d="M 8,432 L 128,432" fill="none" stroke="black"/>
              <path d="M 128,448 L 368,448" fill="none" stroke="black"/>
              <path d="M 8,464 L 128,464" fill="none" stroke="black"/>
              <path d="M 144,496 L 192,496" fill="none" stroke="black"/>
              <path d="M 256,496 L 328,496" fill="none" stroke="black"/>
              <path d="M 360,496 L 416,496" fill="none" stroke="black"/>
              <path d="M 144,528 L 192,528" fill="none" stroke="black"/>
              <path d="M 240,528 L 312,528" fill="none" stroke="black"/>
              <path d="M 360,528 L 416,528" fill="none" stroke="black"/>
              <path d="M 136,32 C 127.16936,32 120,39.16936 120,48" fill="none" stroke="black"/>
              <path d="M 88,48 C 79.16936,48 72,55.16936 72,64" fill="none" stroke="black"/>
              <path d="M 384,48 C 392.83064,48 400,55.16936 400,64" fill="none" stroke="black"/>
              <path d="M 160,64 C 168.83064,64 176,56.83064 176,48" fill="none" stroke="black"/>
              <path d="M 136,96 C 127.16936,96 120,103.16936 120,112" fill="none" stroke="black"/>
              <path d="M 368,112 C 376.83064,112 384,119.16936 384,128" fill="none" stroke="black"/>
              <path d="M 160,128 C 168.83064,128 176,120.83064 176,112" fill="none" stroke="black"/>
              <path d="M 136,160 C 127.16936,160 120,167.16936 120,176" fill="none" stroke="black"/>
              <path d="M 240,176 C 248.83064,176 256,183.16936 256,192" fill="none" stroke="black"/>
              <path d="M 168,192 C 176.83064,192 184,184.83064 184,176" fill="none" stroke="black"/>
              <path d="M 240,192 C 231.16936,192 224,199.16936 224,208" fill="none" stroke="black"/>
              <path d="M 280,192 C 288.83064,192 296,199.16936 296,208" fill="none" stroke="black"/>
              <path d="M 352,208 C 360.83064,208 368,215.16936 368,224" fill="none" stroke="black"/>
              <path d="M 136,224 C 127.16936,224 120,231.16936 120,240" fill="none" stroke="black"/>
              <path d="M 240,224 C 231.16936,224 224,216.83064 224,208" fill="none" stroke="black"/>
              <path d="M 280,224 C 288.83064,224 296,216.83064 296,208" fill="none" stroke="black"/>
              <path d="M 240,240 C 248.83064,240 256,232.83064 256,224" fill="none" stroke="black"/>
              <path d="M 168,256 C 176.83064,256 184,248.83064 184,240" fill="none" stroke="black"/>
              <path d="M 456,272 C 464.83064,272 472,279.16936 472,288" fill="none" stroke="black"/>
              <path d="M 136,288 C 127.16936,288 120,295.16936 120,304" fill="none" stroke="black"/>
              <path d="M 240,304 C 248.83064,304 256,311.16936 256,320" fill="none" stroke="black"/>
              <path d="M 168,320 C 176.83064,320 184,312.83064 184,304" fill="none" stroke="black"/>
              <path d="M 240,320 C 231.16936,320 224,327.16936 224,336" fill="none" stroke="black"/>
              <path d="M 280,320 C 288.83064,320 296,327.16936 296,336" fill="none" stroke="black"/>
              <path d="M 456,320 C 447.16936,320 440,327.16936 440,336" fill="none" stroke="black"/>
              <path d="M 496,320 C 504.83064,320 512,327.16936 512,336" fill="none" stroke="black"/>
              <path d="M 352,336 C 360.83064,336 368,328.83064 368,320" fill="none" stroke="black"/>
              <path d="M 136,352 C 127.16936,352 120,359.16936 120,368" fill="none" stroke="black"/>
              <path d="M 240,352 C 231.16936,352 224,344.83064 224,336" fill="none" stroke="black"/>
              <path d="M 280,352 C 288.83064,352 296,344.83064 296,336" fill="none" stroke="black"/>
              <path d="M 456,352 C 447.16936,352 440,344.83064 440,336" fill="none" stroke="black"/>
              <path d="M 496,352 C 504.83064,352 512,344.83064 512,336" fill="none" stroke="black"/>
              <path d="M 240,368 C 248.83064,368 256,360.83064 256,352" fill="none" stroke="black"/>
              <path d="M 168,384 C 176.83064,384 184,376.83064 184,368" fill="none" stroke="black"/>
              <path d="M 456,384 C 464.83064,384 472,376.83064 472,368" fill="none" stroke="black"/>
              <path d="M 368,448 C 376.83064,448 384,440.83064 384,432" fill="none" stroke="black"/>
              <path d="M 144,496 C 135.16936,496 128,503.16936 128,512" fill="none" stroke="black"/>
              <path d="M 192,496 C 200.83064,496 208,503.16936 208,512" fill="none" stroke="black"/>
              <path d="M 256,496 C 247.16936,496 240,503.16936 240,512" fill="none" stroke="black"/>
              <path d="M 144,528 C 135.16936,528 128,520.83064 128,512" fill="none" stroke="black"/>
              <path d="M 192,528 C 200.83064,528 208,520.83064 208,512" fill="none" stroke="black"/>
              <path d="M 312,528 C 320.83064,528 328,520.83064 328,512" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="480,312 468,306.4 468,317.6" fill="black" transform="rotate(90,472,312)"/>
              <polygon class="arrowhead" points="440,384 428,378.4 428,389.6" fill="black" transform="rotate(180,432,384)"/>
              <polygon class="arrowhead" points="408,360 396,354.4 396,365.6" fill="black" transform="rotate(90,400,360)"/>
              <polygon class="arrowhead" points="392,408 380,402.4 380,413.6" fill="black" transform="rotate(270,384,408)"/>
              <polygon class="arrowhead" points="392,296 380,290.4 380,301.6" fill="black" transform="rotate(270,384,296)"/>
              <polygon class="arrowhead" points="312,336 300,330.4 300,341.6" fill="black" transform="rotate(180,304,336)"/>
              <polygon class="arrowhead" points="312,208 300,202.4 300,213.6" fill="black" transform="rotate(180,304,208)"/>
              <polygon class="arrowhead" points="280,360 268,354.4 268,365.6" fill="black" transform="rotate(270,272,360)"/>
              <polygon class="arrowhead" points="200,368 188,362.4 188,373.6" fill="black" transform="rotate(180,192,368)"/>
              <polygon class="arrowhead" points="200,304 188,298.4 188,309.6" fill="black" transform="rotate(180,192,304)"/>
              <polygon class="arrowhead" points="200,240 188,234.4 188,245.6" fill="black" transform="rotate(180,192,240)"/>
              <polygon class="arrowhead" points="200,176 188,170.4 188,181.6" fill="black" transform="rotate(180,192,176)"/>
              <polygon class="arrowhead" points="192,112 180,106.4 180,117.6" fill="black" transform="rotate(180,184,112)"/>
              <polygon class="arrowhead" points="192,48 180,42.4 180,53.6" fill="black" transform="rotate(180,184,48)"/>
              <polygon class="arrowhead" points="80,424 68,418.4 68,429.6" fill="black" transform="rotate(90,72,424)"/>
              <g class="text">
                <text x="148" y="52">UJCS</text>
                <text x="148" y="116">UCCS</text>
                <text x="152" y="180">JWT</text>
                <text x="260" y="212">Crypto</text>
                <text x="152" y="244">CWT</text>
                <text x="388" y="276">Claims-Set</text>
                <text x="152" y="308">BUN-J</text>
                <text x="260" y="340">Bundle</text>
                <text x="476" y="340">Digest</text>
                <text x="152" y="372">BUN-C</text>
                <text x="388" y="388">submod</text>
                <text x="68" y="452">Nested-Token</text>
                <text x="76" y="516">Legenda:</text>
                <text x="168" y="516">Process</text>
                <text x="268" y="516">Wire</text>
                <text x="304" y="516">Fmt</text>
                <text x="388" y="516">CDDL</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art" align="center"><![CDATA[
               .-----.
         .----+ UJCS |<-------------------------.
        |     '-----'                            |
        |                                        |
        |      .-----.                           |
        +-----+ UCCS |<-----------------------.  |
        |     '-----'                          | |
        |                                      | |
        |      .------.                        | |
        +-----+  JWT  |<------.                | |
        |     '------'      .--+---.           | |
        |                  | Crypto |<------.  | |
        |      .------.     '--+---'         | | |
        +-----+  CWT  |<------'              | | |
        |     '------'                   .---+-+-+----.
        |                                | Claims-Set +--.
        |      .------.                  '---+---+----'   |
        +-----+ BUN-J |<------.              | ^ |        v
        |     '------'      .--+---.         | | |     .------.
        |                  | Bundle |<------'  | |    | Digest |
        |      .------.     '--+---'           | v     '--+---'
        +-----+ BUN-C |<------'  ^         .---+----.     |
        |     '------'           |         | submod |<---'
        |                        |         '--------'
        v                        |             ^
.--------------.                 |             |
| Nested-Token +-----------------+------------'
'--------------'

                .-------.     .---------.   .------.
     Legenda:  | Process |   | Wire Fmt |   | CDDL |
                '-------'    '---------'    '------'
]]></artwork>
        </artset>
      </figure>
    </section>
    <section anchor="a-media-type-parameter-for-eat-profiles">
      <name>A Media Type Parameter for EAT Profiles</name>
      <t>EAT is an open and flexible format.  To improve interoperability, <xref section="6" sectionFormat="of" target="EAT"/> defines the concept of EAT profiles.  Profiles are used to constrain
the parameters that producers and consumers of a specific EAT profile need to
understand in order to interoperate.  For example: the number and type of
claims, which serialisation format, the supported signature schemes, etc.  EATs
carry an in-band profile identifier using the <tt>eat_profile</tt> claim (see
<xref section="4.3.2" sectionFormat="of" target="EAT"/>).  The value of the <tt>eat_profile</tt> claim is either an
OID or a URI.</t>
      <t>The media types defined in this document include an optional <tt>eat_profile</tt>
parameter that can be used to mirror the <tt>eat_profile</tt> claim of the transported
EAT.  Exposing the EAT profile at the API layer allows API routers to dispatch
payloads directly to the profile-specific processor without having to snoop
into the request bodies.  This design also provides a finer-grained and
scalable type system that matches the inherent extensibility of EAT.  The
expectation being that a certain EAT profile automatically obtains a media type
derived from the base (e.g., <tt>application/eat+cwt)</tt> by populating the
<tt>eat_profile</tt> parameter with the corresponding OID or URL.</t>
      <t>When the parameterised version of the EAT media type is used in HTTP (for
example, with the "Content-Type" and "Accept" headers), and the value is an
absolute URI (<xref section="4.3" sectionFormat="of" target="URI"/>), the <tt>parameter-value</tt> (<xref section="A" sectionFormat="of" target="HTTP"/>) <bcp14>MUST</bcp14> use the <tt>quoted-string</tt> encoding, e.g.:</t>
      <ul empty="true">
        <li>
          <t><tt>application/eat+jwt; eat_profile="tag:evidence.example,2022"</tt></t>
        </li>
      </ul>
      <t>Instead, when the EAT profile is an OID, the <tt>token</tt> encoding (i.e., without
quotes) can be used, e.g.:</t>
      <ul empty="true">
        <li>
          <t><tt>application/eat+cwt; eat_profile=2.999.1</tt>.</t>
        </li>
      </ul>
    </section>
    <section anchor="examples">
      <name>Examples</name>
      <t>The example in <xref target="fig-rest-req"/> illustrates the usage of EAT media types for
transporting attestation evidence as well as negotiating the acceptable format
of the attestation result.</t>
      <figure anchor="fig-rest-req">
        <name>Example REST Verification API (request)</name>
        <sourcecode type="http-message"><![CDATA[
# NOTE: '\' line wrapping per RFC 8792

POST /challenge-response/v1/session/1234567890 HTTP/1.1
Host: verifier.example
Accept: application/eat+cwt; eat_profile="tag:ar4si.example,2021"
Content-Type: application/eat+cwt; \
              eat_profile="tag:evidence.example,2022"

[ CBOR-encoded EAT w/ eat_profile="tag:evidence.example,2022" ]
]]></sourcecode>
      </figure>
      <t>The example in <xref target="fig-rest-rsp"/> illustrates the usage of EAT media types for
transporting attestation results.</t>
      <figure anchor="fig-rest-rsp">
        <name>Example REST Verification API (response)</name>
        <sourcecode type="http-message"><![CDATA[
# NOTE: '\' line wrapping per RFC 8792

HTTP/1.1 200 OK
Content-Type: application/eat+cwt; \
              eat_profile="tag:ar4si.example,2021"

[ CBOR-encoded EAT w/ eat_profile="tag:ar4si.example,2021" ]
]]></sourcecode>
      </figure>
      <t>In both cases, a tag URI <xref target="TAG"/> identifying the profile is carried as an
explicit parameter.</t>
    </section>
    <section anchor="seccons">
      <name>Security Considerations</name>
      <t>The security consideration of <xref target="EAT"/> and <xref target="UCCS"/> apply in full.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t><cref anchor="to-be-removed">RFC Editor: please replace RFCthis with this RFC number and remove this note.</cref></t>
      <section anchor="cwt-structured-syntax-suffix">
        <name><tt>+cwt</tt> Structured Syntax Suffix</name>
        <t>IANA is requested to register the <tt>+cwt</tt> structured syntax suffix in the
"Structured Syntax Suffixes" registry <xref target="IANA.media-type-structured-suffix"/> in
the manner described in <xref target="MediaTypes"/>, which can be used to indicate that the
media type is encoded as a CWT.</t>
        <section anchor="registry-contents">
          <name>Registry Contents</name>
          <dl spacing="compact">
            <dt>Name:</dt>
            <dd>
              <t>CBOR Web Token (CWT)</t>
            </dd>
            <dt>+suffix:</dt>
            <dd>
              <t>+cwt</t>
            </dd>
            <dt>References:</dt>
            <dd>
              <t><xref target="CWT"/></t>
            </dd>
            <dt>Encoding Considerations:</dt>
            <dd>
              <t>binary</t>
            </dd>
            <dt>Interoperability Considerations:</dt>
            <dd>
              <t>N/A</t>
            </dd>
            <dt>Fragment Identifier Considerations:</dt>
            <dd>
              <t>The syntax and semantics of fragment identifiers specified for +cwt <bcp14>SHOULD</bcp14> be
as specified for <tt>application/cwt</tt>.  (At publication of this document, there
is no fragment identification syntax defined for <tt>application/cwt</tt>.)</t>
            </dd>
            <dt>Security Considerations:</dt>
            <dd>
              <t>See <xref section="8" sectionFormat="of" target="CWT"/></t>
            </dd>
            <dt>Contact:</dt>
            <dd>
              <t>RATS WG mailing list (rats@ietf.org), or IETF Security Area (saag@ietf.org)</t>
            </dd>
            <dt>Author/Change Controller:</dt>
            <dd>
              <t>Remote ATtestation ProcedureS (RATS) Working Group.
The IETF has change control over this registration.</t>
            </dd>
          </dl>
        </section>
      </section>
      <section anchor="media-type">
        <name>Media Types</name>
        <t>IANA is requested to add the following media types to the
"Media Types" registry <xref target="IANA.media-types"/>.</t>
        <table align="left" anchor="new-media-type">
          <name>New Media Types</name>
          <thead>
            <tr>
              <th align="left">Name</th>
              <th align="left">Template</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">EAT CWT</td>
              <td align="left">application/eat+cwt</td>
              <td align="left">RFCthis, <xref target="media-type-eat-cwt"/></td>
            </tr>
            <tr>
              <td align="left">EAT JWT</td>
              <td align="left">application/eat+jwt</td>
              <td align="left">RFCthis, <xref target="media-type-eat-jwt"/></td>
            </tr>
            <tr>
              <td align="left">Detached EAT Bundle CBOR</td>
              <td align="left">application/eat-bun+cbor</td>
              <td align="left">RFCthis, <xref target="media-type-deb-cbor"/></td>
            </tr>
            <tr>
              <td align="left">Detached EAT Bundle JSON</td>
              <td align="left">application/eat-bun+json</td>
              <td align="left">RFCthis, <xref target="media-type-deb-json"/></td>
            </tr>
            <tr>
              <td align="left">EAT UCCS</td>
              <td align="left">application/eat-ucs+cbor</td>
              <td align="left">RFCthis, <xref target="media-type-ucs-cbor"/></td>
            </tr>
            <tr>
              <td align="left">EAT UJCS</td>
              <td align="left">application/eat-ucs+json</td>
              <td align="left">RFCthis, <xref target="media-type-ucs-json"/></td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="media-type-eat-cwt">
        <name>application/eat+cwt Registration</name>
        <dl spacing="compact">
          <dt>Type name:</dt>
          <dd>
            <t>application</t>
          </dd>
          <dt>Subtype name:</dt>
          <dd>
            <t>eat+cwt</t>
          </dd>
          <dt>Required parameters:</dt>
          <dd>
            <t>n/a</t>
          </dd>
          <dt>Optional parameters:</dt>
          <dd>
            <t>"eat_profile" (EAT profile in string format.  OIDs <bcp14>MUST</bcp14> use the
dotted-decimal notation.  The parameter value is case-insensitive.)</t>
          </dd>
          <dt>Encoding considerations:</dt>
          <dd>
            <t>binary</t>
          </dd>
          <dt>Security considerations:</dt>
          <dd>
            <t><xref section="9" sectionFormat="of" target="EAT"/></t>
          </dd>
          <dt>Interoperability considerations:</dt>
          <dd>
            <t>n/a</t>
          </dd>
          <dt>Published specification:</dt>
          <dd>
            <t><xref target="media-type"/> of RFCthis</t>
          </dd>
          <dt>Applications that use this media type:</dt>
          <dd>
            <t>Attesters, Verifiers, Endorsers and Reference-Value providers, Relying
Parties that need to transfer EAT payloads over HTTP(S), CoAP(S), and other
transports.</t>
          </dd>
          <dt>Fragment identifier considerations:</dt>
          <dd>
            <t>n/a</t>
          </dd>
          <dt>Person &amp; email address to contact for further information:</dt>
          <dd>
            <t>RATS WG mailing list (rats@ietf.org)</t>
          </dd>
          <dt>Intended usage:</dt>
          <dd>
            <t>COMMON</t>
          </dd>
          <dt>Restrictions on usage:</dt>
          <dd>
            <t>none</t>
          </dd>
          <dt>Author/Change controller:</dt>
          <dd>
            <t>IETF</t>
          </dd>
          <dt>Provisional registration:</dt>
          <dd>
            <t>no</t>
          </dd>
        </dl>
      </section>
      <section anchor="media-type-eat-jwt">
        <name>application/eat+jwt Registration</name>
        <dl spacing="compact">
          <dt>Type name:</dt>
          <dd>
            <t>application</t>
          </dd>
          <dt>Subtype name:</dt>
          <dd>
            <t>eat+jwt</t>
          </dd>
          <dt>Required parameters:</dt>
          <dd>
            <t>n/a</t>
          </dd>
          <dt>Optional parameters:</dt>
          <dd>
            <t>"eat_profile" (EAT profile in string format.  OIDs <bcp14>MUST</bcp14> use the
dotted-decimal notation.  The parameter value is case-insensitive.)</t>
          </dd>
          <dt>Encoding considerations:</dt>
          <dd>
            <t>8bit</t>
          </dd>
          <dt>Security considerations:</dt>
          <dd>
            <t><xref section="9" sectionFormat="of" target="EAT"/> and <xref target="BCP225"/></t>
          </dd>
          <dt>Interoperability considerations:</dt>
          <dd>
            <t>n/a</t>
          </dd>
          <dt>Published specification:</dt>
          <dd>
            <t><xref target="media-type"/> of RFCthis</t>
          </dd>
          <dt>Applications that use this media type</dt>
          <dd>
            <t>Attesters, Verifiers, Endorsers and Reference-Value providers, Relying
Parties that need to transfer EAT payloads over HTTP(S), CoAP(S), and other
transports.</t>
          </dd>
          <dt>Fragment identifier considerations:</dt>
          <dd>
            <t>n/a</t>
          </dd>
          <dt>Person &amp; email address to contact for further information:</dt>
          <dd>
            <t>RATS WG mailing list (rats@ietf.org)</t>
          </dd>
          <dt>Intended usage:</dt>
          <dd>
            <t>COMMON</t>
          </dd>
          <dt>Restrictions on usage:</dt>
          <dd>
            <t>none</t>
          </dd>
          <dt>Author/Change controller:</dt>
          <dd>
            <t>IETF</t>
          </dd>
          <dt>Provisional registration:</dt>
          <dd>
            <t>no</t>
          </dd>
        </dl>
      </section>
      <section anchor="media-type-deb-cbor">
        <name>application/eat-bun+cbor Registration</name>
        <dl spacing="compact">
          <dt>Type name:</dt>
          <dd>
            <t>application</t>
          </dd>
          <dt>Subtype name:</dt>
          <dd>
            <t>eat-bun+cbor</t>
          </dd>
          <dt>Required parameters:</dt>
          <dd>
            <t>n/a</t>
          </dd>
          <dt>Optional parameters:</dt>
          <dd>
            <t>"eat_profile" (EAT profile in string format.  OIDs <bcp14>MUST</bcp14> use the
dotted-decimal notation.  The parameter value is case-insensitive.)</t>
          </dd>
          <dt>Encoding considerations:</dt>
          <dd>
            <t>binary</t>
          </dd>
          <dt>Security considerations:</dt>
          <dd>
            <t><xref section="9" sectionFormat="of" target="EAT"/></t>
          </dd>
          <dt>Interoperability considerations:</dt>
          <dd>
            <t>n/a</t>
          </dd>
          <dt>Published specification:</dt>
          <dd>
            <t><xref target="media-type"/> of RFCthis</t>
          </dd>
          <dt>Applications that use this media type:</dt>
          <dd>
            <t>Attesters, Verifiers, Endorsers and Reference-Value providers, Relying
Parties that need to transfer EAT payloads over HTTP(S), CoAP(S), and other
transports.</t>
          </dd>
          <dt>Fragment identifier considerations:</dt>
          <dd>
            <t>n/a</t>
          </dd>
          <dt>Person &amp; email address to contact for further information:</dt>
          <dd>
            <t>RATS WG mailing list (rats@ietf.org)</t>
          </dd>
          <dt>Intended usage:</dt>
          <dd>
            <t>COMMON</t>
          </dd>
          <dt>Restrictions on usage:</dt>
          <dd>
            <t>none</t>
          </dd>
          <dt>Author/Change controller:</dt>
          <dd>
            <t>IETF</t>
          </dd>
          <dt>Provisional registration:</dt>
          <dd>
            <t>no</t>
          </dd>
        </dl>
      </section>
      <section anchor="media-type-deb-json">
        <name>application/eat-bun+json Registration</name>
        <dl spacing="compact">
          <dt>Type name:</dt>
          <dd>
            <t>application</t>
          </dd>
          <dt>Subtype name:</dt>
          <dd>
            <t>eat-bun+json</t>
          </dd>
          <dt>Required parameters:</dt>
          <dd>
            <t>n/a</t>
          </dd>
          <dt>Optional parameters:</dt>
          <dd>
            <t>"eat_profile" (EAT profile in string format.  OIDs <bcp14>MUST</bcp14> use the
dotted-decimal notation.  The parameter value is case-insensitive.)</t>
          </dd>
          <dt>Encoding considerations:</dt>
          <dd>
            <t>Same as <xref target="RFC7159"/></t>
          </dd>
          <dt>Security considerations:</dt>
          <dd>
            <t><xref section="9" sectionFormat="of" target="EAT"/></t>
          </dd>
          <dt>Interoperability considerations:</dt>
          <dd>
            <t>n/a</t>
          </dd>
          <dt>Published specification:</dt>
          <dd>
            <t><xref target="media-type"/> of RFCthis</t>
          </dd>
          <dt>Applications that use this media type</dt>
          <dd>
            <t>Attesters, Verifiers, Endorsers and Reference-Value providers, Relying
Parties that need to transfer EAT payloads over HTTP(S), CoAP(S), and other
transports.</t>
          </dd>
          <dt>Fragment identifier considerations:</dt>
          <dd>
            <t>n/a</t>
          </dd>
          <dt>Person &amp; email address to contact for further information:</dt>
          <dd>
            <t>RATS WG mailing list (rats@ietf.org)</t>
          </dd>
          <dt>Intended usage:</dt>
          <dd>
            <t>COMMON</t>
          </dd>
          <dt>Restrictions on usage:</dt>
          <dd>
            <t>none</t>
          </dd>
          <dt>Author/Change controller:</dt>
          <dd>
            <t>IETF</t>
          </dd>
          <dt>Provisional registration:</dt>
          <dd>
            <t>no</t>
          </dd>
        </dl>
      </section>
      <section anchor="media-type-ucs-cbor">
        <name>application/eat-ucs+cbor Registration</name>
        <dl spacing="compact">
          <dt>Type name:</dt>
          <dd>
            <t>application</t>
          </dd>
          <dt>Subtype name:</dt>
          <dd>
            <t>eat-ucs+cbor</t>
          </dd>
          <dt>Required parameters:</dt>
          <dd>
            <t>n/a</t>
          </dd>
          <dt>Optional parameters:</dt>
          <dd>
            <t>"eat_profile" (EAT profile in string format.  OIDs <bcp14>MUST</bcp14> use the
dotted-decimal notation.  The parameter value is case-insensitive.)</t>
          </dd>
          <dt>Encoding considerations:</dt>
          <dd>
            <t>binary</t>
          </dd>
          <dt>Security considerations:</dt>
          <dd>
            <t><xref section="7" sectionFormat="of" target="UCCS"/></t>
          </dd>
          <dt>Interoperability considerations:</dt>
          <dd>
            <t>n/a</t>
          </dd>
          <dt>Published specification:</dt>
          <dd>
            <t><xref target="media-type"/> of RFCthis</t>
          </dd>
          <dt>Applications that use this media type:</dt>
          <dd>
            <t>Attesters, Verifiers, Endorsers and Reference-Value providers, Relying
Parties that need to transfer EAT payloads over HTTP(S), CoAP(S), and other
transports.</t>
          </dd>
          <dt>Fragment identifier considerations:</dt>
          <dd>
            <t>n/a</t>
          </dd>
          <dt>Person &amp; email address to contact for further information:</dt>
          <dd>
            <t>RATS WG mailing list (rats@ietf.org)</t>
          </dd>
          <dt>Intended usage:</dt>
          <dd>
            <t>COMMON</t>
          </dd>
          <dt>Restrictions on usage:</dt>
          <dd>
            <t>none</t>
          </dd>
          <dt>Author/Change controller:</dt>
          <dd>
            <t>IETF</t>
          </dd>
          <dt>Provisional registration:</dt>
          <dd>
            <t>no</t>
          </dd>
        </dl>
      </section>
      <section anchor="media-type-ucs-json">
        <name>application/eat-ucs+json Registration</name>
        <dl spacing="compact">
          <dt>Type name:</dt>
          <dd>
            <t>application</t>
          </dd>
          <dt>Subtype name:</dt>
          <dd>
            <t>eat-ucs+json</t>
          </dd>
          <dt>Required parameters:</dt>
          <dd>
            <t>n/a</t>
          </dd>
          <dt>Optional parameters:</dt>
          <dd>
            <t>"eat_profile" (EAT profile in string format.  OIDs <bcp14>MUST</bcp14> use the
dotted-decimal notation.  The parameter value is case-insensitive.)</t>
          </dd>
          <dt>Encoding considerations:</dt>
          <dd>
            <t>Same as <xref target="RFC7159"/></t>
          </dd>
          <dt>Security considerations:</dt>
          <dd>
            <t><xref section="7" sectionFormat="of" target="UCCS"/></t>
          </dd>
          <dt>Interoperability considerations:</dt>
          <dd>
            <t>n/a</t>
          </dd>
          <dt>Published specification:</dt>
          <dd>
            <t><xref target="media-type"/> of RFCthis</t>
          </dd>
          <dt>Applications that use this media type</dt>
          <dd>
            <t>Attesters, Verifiers, Endorsers and Reference-Value providers, Relying
Parties that need to transfer EAT payloads over HTTP(S), CoAP(S), and other
transports.</t>
          </dd>
          <dt>Fragment identifier considerations:</dt>
          <dd>
            <t>n/a</t>
          </dd>
          <dt>Person &amp; email address to contact for further information:</dt>
          <dd>
            <t>RATS WG mailing list (rats@ietf.org)</t>
          </dd>
          <dt>Intended usage:</dt>
          <dd>
            <t>COMMON</t>
          </dd>
          <dt>Restrictions on usage:</dt>
          <dd>
            <t>none</t>
          </dd>
          <dt>Author/Change controller:</dt>
          <dd>
            <t>IETF</t>
          </dd>
          <dt>Provisional registration:</dt>
          <dd>
            <t>no</t>
          </dd>
        </dl>
      </section>
      <section anchor="coap-content-format-registrations">
        <name>CoAP Content-Format Registrations</name>
        <t>IANA is requested to register the following Content-Format numbers in the "CoAP
Content-Formats" sub-registry, within the "Constrained RESTful Environments
(CoRE) Parameters" Registry <xref target="IANA.core-parameters"/>:</t>
        <table align="left">
          <name>New Content-Formats</name>
          <thead>
            <tr>
              <th align="left">Content-Type</th>
              <th align="left">Content Coding</th>
              <th align="left">ID</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">application/eat+cwt</td>
              <td align="left">-</td>
              <td align="left">TBD1</td>
              <td align="left">RFCthis</td>
            </tr>
            <tr>
              <td align="left">application/eat+jwt</td>
              <td align="left">-</td>
              <td align="left">TBD2</td>
              <td align="left">RFCthis</td>
            </tr>
            <tr>
              <td align="left">application/eat-bun+cbor</td>
              <td align="left">-</td>
              <td align="left">TBD3</td>
              <td align="left">RFCthis</td>
            </tr>
            <tr>
              <td align="left">application/eat-bun+json</td>
              <td align="left">-</td>
              <td align="left">TBD4</td>
              <td align="left">RFCthis</td>
            </tr>
            <tr>
              <td align="left">application/eat-ucs+cbor</td>
              <td align="left">-</td>
              <td align="left">TBD5</td>
              <td align="left">RFCthis</td>
            </tr>
            <tr>
              <td align="left">application/eat-ucs+json</td>
              <td align="left">-</td>
              <td align="left">TBD6</td>
              <td align="left">RFCthis</td>
            </tr>
          </tbody>
        </table>
        <t>TBD1..6 are to be assigned from the space 256..999.</t>
      </section>
    </section>
    <section anchor="changelog">
      <name>Changelog</name>
      <t><cref anchor="remove-sec">RFC editor: please remove this section</cref></t>
      <section anchor="cl-04">
        <name> -04</name>
        <ul spacing="normal">
          <li>
            <t>Early IANA review</t>
          </li>
        </ul>
      </section>
      <section anchor="cl-03">
        <name> -03</name>
        <ul spacing="normal">
          <li>
            <t>Update references</t>
          </li>
        </ul>
      </section>
      <section anchor="cl-02">
        <name> -02</name>
        <ul spacing="normal">
          <li>
            <t>Update references</t>
          </li>
          <li>
            <t>Register +cwt SSS
(<eref target="https://github.com/ietf-rats-wg/draft-eat-mt/issues/14">Issue#14</eref>)</t>
          </li>
          <li>
            <t>Move from eat-jwt to eat+jwt
(<eref target="https://github.com/ietf-rats-wg/draft-eat-mt/issues/14">Issue#14</eref>)</t>
          </li>
          <li>
            <t>Move from eat-cwt to eat+cwt
(<eref target="https://github.com/ietf-rats-wg/draft-eat-mt/issues/14">Issue#14</eref>)</t>
          </li>
        </ul>
      </section>
      <section anchor="cl-01">
        <name> -01</name>
        <ul spacing="normal">
          <li>
            <t>Rename <tt>profile</tt> to <tt>eat_profile</tt> for consistency with EAT
(<eref target="https://github.com/ietf-rats-wg/draft-eat-mt/issues/4">Issue#4</eref>)</t>
          </li>
          <li>
            <t>The DEB acronym is gone: shorthand is now "bun" from bundle
(<eref target="https://github.com/ietf-rats-wg/draft-eat-mt/issues/8">Issue#8</eref>)</t>
          </li>
          <li>
            <t>Incorporate editorial suggestions from Carl and Dave
(<eref target="https://github.com/ietf-rats-wg/draft-eat-mt/issues/7">Issue#7</eref>,
<eref target="https://github.com/ietf-rats-wg/draft-eat-mt/issues/9">Issue#9</eref>)</t>
          </li>
        </ul>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="EAT">
          <front>
            <title>The Entity Attestation Token (EAT)</title>
            <author fullname="Laurence Lundblade" initials="L." surname="Lundblade">
              <organization>Security Theory LLC</organization>
            </author>
            <author fullname="Giridhar Mandyam" initials="G." surname="Mandyam">
              <organization>Mediatek USA</organization>
            </author>
            <author fullname="Jeremy O'Donoghue" initials="J." surname="O'Donoghue">
              <organization>Qualcomm Technologies Inc.</organization>
            </author>
            <author fullname="Carl Wallace" initials="C." surname="Wallace">
              <organization>Red Hound Software, Inc.</organization>
            </author>
            <date day="6" month="September" year="2024"/>
            <abstract>
              <t>   An Entity Attestation Token (EAT) provides an attested claims set
   that describes state and characteristics of an entity, a device like
   a smartphone, IoT device, network equipment or such.  This claims set
   is used by a relying party, server or service to determine the type
   and degree of trust placed in the entity.

   An EAT is either a CBOR Web Token (CWT) or JSON Web Token (JWT) with
   attestation-oriented claims.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-eat-31"/>
        </reference>
        <reference anchor="JWT">
          <front>
            <title>JSON Web Token (JWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties. The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7519"/>
          <seriesInfo name="DOI" value="10.17487/RFC7519"/>
        </reference>
        <reference anchor="CWT">
          <front>
            <title>CBOR Web Token (CWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties. The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection. A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value. CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8392"/>
          <seriesInfo name="DOI" value="10.17487/RFC8392"/>
        </reference>
        <reference anchor="UCCS">
          <front>
            <title>A CBOR Tag for Unprotected CWT Claims Sets</title>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Jeremy O'Donoghue" initials="J." surname="O'Donoghue">
              <organization>Qualcomm Technologies Inc.</organization>
            </author>
            <author fullname="Nancy Cam-Winget" initials="N." surname="Cam-Winget">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Carsten Bormann" initials="C." surname="Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <date day="4" month="July" year="2024"/>
            <abstract>
              <t>   When transported over secure channels, CBOR Web Token (CWT, RFC 8392)
   Claims Sets may not need the protection afforded by wrapping them
   into COSE, as is required for a true CWT.  This specification defines
   a CBOR tag for such unprotected CWT Claims Sets (UCCS) and discusses
   conditions for its proper use.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-uccs-10"/>
        </reference>
        <reference anchor="CoAP">
          <front>
            <title>The Constrained Application Protocol (CoAP)</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s. The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
              <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types. CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7252"/>
          <seriesInfo name="DOI" value="10.17487/RFC7252"/>
        </reference>
        <reference anchor="MediaTypes">
          <front>
            <title>Media Type Specifications and Registration Procedures</title>
            <author fullname="N. Freed" initials="N." surname="Freed"/>
            <author fullname="J. Klensin" initials="J." surname="Klensin"/>
            <author fullname="T. Hansen" initials="T." surname="Hansen"/>
            <date month="January" year="2013"/>
            <abstract>
              <t>This document defines procedures for the specification and registration of media types for use in HTTP, MIME, and other Internet protocols. This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="13"/>
          <seriesInfo name="RFC" value="6838"/>
          <seriesInfo name="DOI" value="10.17487/RFC6838"/>
        </reference>
        <reference anchor="URI">
          <front>
            <title>Uniform Resource Identifier (URI): Generic Syntax</title>
            <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee"/>
            <author fullname="R. Fielding" initials="R." surname="Fielding"/>
            <author fullname="L. Masinter" initials="L." surname="Masinter"/>
            <date month="January" year="2005"/>
            <abstract>
              <t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource. This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet. The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier. This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="66"/>
          <seriesInfo name="RFC" value="3986"/>
          <seriesInfo name="DOI" value="10.17487/RFC3986"/>
        </reference>
        <reference anchor="HTTP">
          <front>
            <title>HTTP Semantics</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes.</t>
              <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="97"/>
          <seriesInfo name="RFC" value="9110"/>
          <seriesInfo name="DOI" value="10.17487/RFC9110"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="IANA.media-type-structured-suffix" target="https://www.iana.org/assignments/media-type-structured-suffix">
          <front>
            <title>Structured Syntax Suffixes</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="IANA.media-types" target="https://www.iana.org/assignments/media-types">
          <front>
            <title>Media Types</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <referencegroup anchor="BCP225" target="https://www.rfc-editor.org/info/bcp225">
          <reference anchor="RFC8725" target="https://www.rfc-editor.org/info/rfc8725">
            <front>
              <title>JSON Web Token Best Current Practices</title>
              <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
              <author fullname="D. Hardt" initials="D." surname="Hardt"/>
              <author fullname="M. Jones" initials="M." surname="Jones"/>
              <date month="February" year="2020"/>
              <abstract>
                <t>JSON Web Tokens, also known as JWTs, are URL-safe JSON-based security tokens that contain a set of claims that can be signed and/or encrypted. JWTs are being widely used and deployed as a simple security token format in numerous protocols and applications, both in the area of digital identity and in other application areas. This Best Current Practices document updates RFC 7519 to provide actionable guidance leading to secure implementation and deployment of JWTs.</t>
              </abstract>
            </front>
            <seriesInfo name="BCP" value="225"/>
            <seriesInfo name="RFC" value="8725"/>
            <seriesInfo name="DOI" value="10.17487/RFC8725"/>
          </reference>
        </referencegroup>
        <reference anchor="RFC7159">
          <front>
            <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
            <date month="March" year="2014"/>
            <abstract>
              <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format. It was derived from the ECMAScript Programming Language Standard. JSON defines a small set of formatting rules for the portable representation of structured data.</t>
              <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7159"/>
          <seriesInfo name="DOI" value="10.17487/RFC7159"/>
        </reference>
        <reference anchor="IANA.core-parameters" target="https://www.iana.org/assignments/core-parameters">
          <front>
            <title>Constrained RESTful Environments (CoRE) Parameters</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RATS-Arch">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="N. Smith" initials="N." surname="Smith"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9334"/>
          <seriesInfo name="DOI" value="10.17487/RFC9334"/>
        </reference>
        <referencegroup anchor="BUILD-W-HTTP" target="https://www.rfc-editor.org/info/bcp56">
          <reference anchor="RFC9205" target="https://www.rfc-editor.org/info/rfc9205">
            <front>
              <title>Building Protocols with HTTP</title>
              <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
              <date month="June" year="2022"/>
              <abstract>
                <t>Applications often use HTTP as a substrate to create HTTP-based APIs. This document specifies best practices for writing specifications that use HTTP to define new application protocols. It is written primarily to guide IETF efforts to define application protocols using HTTP for deployment on the Internet but might be applicable in other situations.</t>
                <t>This document obsoletes RFC 3205.</t>
              </abstract>
            </front>
            <seriesInfo name="BCP" value="56"/>
            <seriesInfo name="RFC" value="9205"/>
            <seriesInfo name="DOI" value="10.17487/RFC9205"/>
          </reference>
        </referencegroup>
        <reference anchor="REST-IoT">
          <front>
            <title>Guidance on RESTful Design for Internet of Things Systems</title>
            <author fullname="Ari Keränen" initials="A." surname="Keränen">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Matthias Kovatsch" initials="M." surname="Kovatsch">
              <organization>Siemens</organization>
            </author>
            <author fullname="Klaus Hartke" initials="K." surname="Hartke">
         </author>
            <date day="27" month="July" year="2024"/>
            <abstract>
              <t>   This document gives guidance for designing Internet of Things (IoT)
   systems that follow the principles of the Representational State
   Transfer (REST) architectural style.  This document is a product of
   the IRTF Thing-to-Thing Research Group (T2TRG).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-irtf-t2trg-rest-iot-14"/>
        </reference>
        <reference anchor="TAG">
          <front>
            <title>The 'tag' URI Scheme</title>
            <author fullname="T. Kindberg" initials="T." surname="Kindberg"/>
            <author fullname="S. Hawke" initials="S." surname="Hawke"/>
            <date month="October" year="2005"/>
            <abstract>
              <t>This document describes the "tag" Uniform Resource Identifier (URI) scheme. Tag URIs (also known as "tags") are designed to be unique across space and time while being tractable to humans. They are distinct from most other URIs in that they have no authoritative resolution mechanism. A tag may be used purely as an entity identifier. Furthermore, using tags has some advantages over the common practice of using "http" URIs as identifiers for non-HTTP-accessible resources. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4151"/>
          <seriesInfo name="DOI" value="10.17487/RFC4151"/>
        </reference>
      </references>
    </references>
    <?line 660?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Thank you
Carl Wallace,
Carsten Bormann,
Dave Thaler,
Deb Cooley,
Kathleen Moriarty,
Michael Richardson, and
Paul Howard
for your comments and suggestions.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
