<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 3.3.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-rats-eat-media-type-11" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.23.2 -->
  <front>
    <title abbrev="EAT Media Types">EAT Media Types</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-rats-eat-media-type-11"/>
    <author initials="L." surname="Lundblade" fullname="Laurence Lundblade">
      <organization>Security Theory LLC</organization>
      <address>
        <email>lgl@securitytheory.com</email>
      </address>
    </author>
    <author initials="H." surname="Birkholz" fullname="Henk Birkholz">
      <organization abbrev="Fraunhofer SIT">Fraunhofer Institute for Secure Information Technology</organization>
      <address>
        <postal>
          <street>Rheinstrasse 75</street>
          <city>Darmstadt</city>
          <code>64295</code>
          <country>Germany</country>
        </postal>
        <email>henk.birkholz@sit.fraunhofer.de</email>
      </address>
    </author>
    <author initials="T." surname="Fossati" fullname="Thomas Fossati">
      <organization>Linaro</organization>
      <address>
        <email>thomas.fossati@linaro.org</email>
      </address>
    </author>
    <date year="2024" month="October" day="10"/>
    <area>Security</area>
    <workgroup>Remote ATtestation ProcedureS</workgroup>
    <keyword>EAT, media type</keyword>
    <abstract>
      <?line 56?>

<t>Payloads used in Remote Attestation Procedures may require an associated media
type for their conveyance, for example when used in RESTful APIs.</t>
      <t>This memo defines media types to be used for Entity Attestation Tokens (EAT).</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Remote ATtestation ProcedureS Working Group mailing list (rats@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/rats/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/thomas-fossati/draft-eat-mt"/>.</t>
    </note>
  </front>
  <middle>
    <?line 63?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Payloads used in Remote Attestation Procedures <xref target="RATS-Arch"/> may require an
associated media type for their conveyance, for example when used in RESTful
APIs (<xref target="fig-api-sd"/>).</t>
      <figure anchor="fig-api-sd">
        <name>Conveying RATS conceptual messages in REST APIs using EAT</name>
        <artset>
          <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="288" width="512" viewBox="0 0 512 288" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 8,32 L 8,64" fill="none" stroke="black"/>
              <path d="M 24,64 L 24,272" fill="none" stroke="black"/>
              <path d="M 136,32 L 136,64" fill="none" stroke="black"/>
              <path d="M 216,32 L 216,64" fill="none" stroke="black"/>
              <path d="M 256,64 L 256,272" fill="none" stroke="black"/>
              <path d="M 304,32 L 304,64" fill="none" stroke="black"/>
              <path d="M 416,32 L 416,64" fill="none" stroke="black"/>
              <path d="M 488,64 L 488,272" fill="none" stroke="black"/>
              <path d="M 504,32 L 504,64" fill="none" stroke="black"/>
              <path d="M 8,32 L 136,32" fill="none" stroke="black"/>
              <path d="M 216,32 L 304,32" fill="none" stroke="black"/>
              <path d="M 416,32 L 504,32" fill="none" stroke="black"/>
              <path d="M 8,64 L 136,64" fill="none" stroke="black"/>
              <path d="M 216,64 L 304,64" fill="none" stroke="black"/>
              <path d="M 416,64 L 504,64" fill="none" stroke="black"/>
              <path d="M 256,112 L 480,112" fill="none" stroke="black"/>
              <path d="M 264,160 L 488,160" fill="none" stroke="black"/>
              <path d="M 32,208 L 256,208" fill="none" stroke="black"/>
              <path d="M 24,240 L 248,240" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="488,112 476,106.4 476,117.6" fill="black" transform="rotate(0,480,112)"/>
              <polygon class="arrowhead" points="272,160 260,154.4 260,165.6" fill="black" transform="rotate(180,264,160)"/>
              <polygon class="arrowhead" points="256,240 244,234.4 244,245.6" fill="black" transform="rotate(0,248,240)"/>
              <polygon class="arrowhead" points="40,208 28,202.4 28,213.6" fill="black" transform="rotate(180,32,208)"/>
              <g class="text">
                <text x="48" y="52">Relying</text>
                <text x="104" y="52">Party</text>
                <text x="260" y="52">Attester</text>
                <text x="460" y="52">Verifier</text>
                <text x="284" y="84">POST</text>
                <text x="336" y="84">/verify</text>
                <text x="320" y="100">EAT(Evidence)</text>
                <text x="440" y="132">200</text>
                <text x="468" y="132">OK</text>
                <text x="344" y="148">EAT(Attestation</text>
                <text x="444" y="148">Results)</text>
                <text x="180" y="180">POST</text>
                <text x="224" y="180">/auth</text>
                <text x="112" y="196">EAT(Attestation</text>
                <text x="212" y="196">Results)</text>
                <text x="48" y="228">201</text>
                <text x="96" y="228">Created</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art" align="center"><![CDATA[
.---------------.         .----------.             .----------.
| Relying Party |         | Attester |             | Verifier |
'-+-------------'         '----+-----'             '--------+-'
  |                            | POST /verify               |
  |                            | EAT(Evidence)              |
  |                            +--------------------------->|
  |                            |                     200 OK |
  |                            |   EAT(Attestation Results) |
  |                            |<---------------------------+
  |                 POST /auth |                            |
  |   EAT(Attestation Results) |                            |
  |<---------------------------+                            |
  | 201 Created                |                            |
  +--------------------------->|                            |
  |                            |                            |
  |                            |                            |
]]></artwork>
        </artset>
      </figure>
      <t>This memo defines media types to be used for Entity Attestation Token (EAT)
<xref target="EAT"/> payloads independently of the RATS Conceptual Message in which they
manifest themselves.  The objective is to give protocol, API and application
designers a number of readily available and reusable media types for
integrating EAT-based messages in their flows, for example when using HTTP
<xref target="BUILD-W-HTTP"/> or CoAP <xref target="REST-IoT"/>.</t>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>This document uses the terms and concepts defined in <xref target="RATS-Arch"/>.</t>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="eat-types">
      <name>EAT Types</name>
      <t><xref target="fig-eat-types"/> illustrates the six EAT wire formats and how they relate to
each other.  <xref target="EAT"/> defines four of them (CWT, JWT and Detached EAT Bundle in
its JSON and CBOR flavours), whilst <xref target="UCCS"/> defines UCCS, and we use
the abbreviation "UJCS" to refer to unprotected JWT Claims Sets as
defined in <xref section="2" sectionFormat="of" target="JWT"/>.</t>
      <figure anchor="fig-eat-types">
        <name>EAT Types</name>
        <artset>
          <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="544" width="520" viewBox="0 0 520 544" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 8,432 L 8,464" fill="none" stroke="black"/>
              <path d="M 72,64 L 72,424" fill="none" stroke="black"/>
              <path d="M 120,48 L 120,64" fill="none" stroke="black"/>
              <path d="M 120,112 L 120,128" fill="none" stroke="black"/>
              <path d="M 120,176 L 120,192" fill="none" stroke="black"/>
              <path d="M 120,240 L 120,256" fill="none" stroke="black"/>
              <path d="M 120,304 L 120,320" fill="none" stroke="black"/>
              <path d="M 120,368 L 120,384" fill="none" stroke="black"/>
              <path d="M 128,432 L 128,464" fill="none" stroke="black"/>
              <path d="M 176,32 L 176,48" fill="none" stroke="black"/>
              <path d="M 176,96 L 176,112" fill="none" stroke="black"/>
              <path d="M 184,160 L 184,176" fill="none" stroke="black"/>
              <path d="M 184,224 L 184,240" fill="none" stroke="black"/>
              <path d="M 184,288 L 184,304" fill="none" stroke="black"/>
              <path d="M 184,352 L 184,368" fill="none" stroke="black"/>
              <path d="M 240,512 L 240,528" fill="none" stroke="black"/>
              <path d="M 272,360 L 272,448" fill="none" stroke="black"/>
              <path d="M 328,496 L 328,512" fill="none" stroke="black"/>
              <path d="M 336,256 L 336,288" fill="none" stroke="black"/>
              <path d="M 352,368 L 352,400" fill="none" stroke="black"/>
              <path d="M 360,496 L 360,528" fill="none" stroke="black"/>
              <path d="M 368,224 L 368,256" fill="none" stroke="black"/>
              <path d="M 368,288 L 368,320" fill="none" stroke="black"/>
              <path d="M 384,128 L 384,256" fill="none" stroke="black"/>
              <path d="M 384,296 L 384,368" fill="none" stroke="black"/>
              <path d="M 384,408 L 384,432" fill="none" stroke="black"/>
              <path d="M 400,64 L 400,256" fill="none" stroke="black"/>
              <path d="M 400,288 L 400,360" fill="none" stroke="black"/>
              <path d="M 416,496 L 416,528" fill="none" stroke="black"/>
              <path d="M 424,368 L 424,400" fill="none" stroke="black"/>
              <path d="M 440,256 L 440,288" fill="none" stroke="black"/>
              <path d="M 472,288 L 472,312" fill="none" stroke="black"/>
              <path d="M 472,352 L 472,368" fill="none" stroke="black"/>
              <path d="M 136,32 L 176,32" fill="none" stroke="black"/>
              <path d="M 88,48 L 120,48" fill="none" stroke="black"/>
              <path d="M 184,48 L 384,48" fill="none" stroke="black"/>
              <path d="M 120,64 L 160,64" fill="none" stroke="black"/>
              <path d="M 136,96 L 176,96" fill="none" stroke="black"/>
              <path d="M 72,112 L 120,112" fill="none" stroke="black"/>
              <path d="M 184,112 L 368,112" fill="none" stroke="black"/>
              <path d="M 120,128 L 160,128" fill="none" stroke="black"/>
              <path d="M 136,160 L 184,160" fill="none" stroke="black"/>
              <path d="M 72,176 L 120,176" fill="none" stroke="black"/>
              <path d="M 192,176 L 240,176" fill="none" stroke="black"/>
              <path d="M 120,192 L 168,192" fill="none" stroke="black"/>
              <path d="M 240,192 L 280,192" fill="none" stroke="black"/>
              <path d="M 304,208 L 352,208" fill="none" stroke="black"/>
              <path d="M 136,224 L 184,224" fill="none" stroke="black"/>
              <path d="M 240,224 L 280,224" fill="none" stroke="black"/>
              <path d="M 72,240 L 120,240" fill="none" stroke="black"/>
              <path d="M 192,240 L 240,240" fill="none" stroke="black"/>
              <path d="M 120,256 L 168,256" fill="none" stroke="black"/>
              <path d="M 336,256 L 440,256" fill="none" stroke="black"/>
              <path d="M 440,272 L 456,272" fill="none" stroke="black"/>
              <path d="M 136,288 L 184,288" fill="none" stroke="black"/>
              <path d="M 336,288 L 440,288" fill="none" stroke="black"/>
              <path d="M 72,304 L 120,304" fill="none" stroke="black"/>
              <path d="M 192,304 L 240,304" fill="none" stroke="black"/>
              <path d="M 120,320 L 168,320" fill="none" stroke="black"/>
              <path d="M 240,320 L 280,320" fill="none" stroke="black"/>
              <path d="M 456,320 L 496,320" fill="none" stroke="black"/>
              <path d="M 304,336 L 352,336" fill="none" stroke="black"/>
              <path d="M 136,352 L 184,352" fill="none" stroke="black"/>
              <path d="M 240,352 L 280,352" fill="none" stroke="black"/>
              <path d="M 456,352 L 496,352" fill="none" stroke="black"/>
              <path d="M 72,368 L 120,368" fill="none" stroke="black"/>
              <path d="M 192,368 L 240,368" fill="none" stroke="black"/>
              <path d="M 352,368 L 424,368" fill="none" stroke="black"/>
              <path d="M 120,384 L 168,384" fill="none" stroke="black"/>
              <path d="M 432,384 L 456,384" fill="none" stroke="black"/>
              <path d="M 352,400 L 424,400" fill="none" stroke="black"/>
              <path d="M 8,432 L 128,432" fill="none" stroke="black"/>
              <path d="M 128,448 L 368,448" fill="none" stroke="black"/>
              <path d="M 8,464 L 128,464" fill="none" stroke="black"/>
              <path d="M 144,496 L 192,496" fill="none" stroke="black"/>
              <path d="M 256,496 L 328,496" fill="none" stroke="black"/>
              <path d="M 360,496 L 416,496" fill="none" stroke="black"/>
              <path d="M 144,528 L 192,528" fill="none" stroke="black"/>
              <path d="M 240,528 L 312,528" fill="none" stroke="black"/>
              <path d="M 360,528 L 416,528" fill="none" stroke="black"/>
              <path d="M 136,32 C 127.16936,32 120,39.16936 120,48" fill="none" stroke="black"/>
              <path d="M 88,48 C 79.16936,48 72,55.16936 72,64" fill="none" stroke="black"/>
              <path d="M 384,48 C 392.83064,48 400,55.16936 400,64" fill="none" stroke="black"/>
              <path d="M 160,64 C 168.83064,64 176,56.83064 176,48" fill="none" stroke="black"/>
              <path d="M 136,96 C 127.16936,96 120,103.16936 120,112" fill="none" stroke="black"/>
              <path d="M 368,112 C 376.83064,112 384,119.16936 384,128" fill="none" stroke="black"/>
              <path d="M 160,128 C 168.83064,128 176,120.83064 176,112" fill="none" stroke="black"/>
              <path d="M 136,160 C 127.16936,160 120,167.16936 120,176" fill="none" stroke="black"/>
              <path d="M 240,176 C 248.83064,176 256,183.16936 256,192" fill="none" stroke="black"/>
              <path d="M 168,192 C 176.83064,192 184,184.83064 184,176" fill="none" stroke="black"/>
              <path d="M 240,192 C 231.16936,192 224,199.16936 224,208" fill="none" stroke="black"/>
              <path d="M 280,192 C 288.83064,192 296,199.16936 296,208" fill="none" stroke="black"/>
              <path d="M 352,208 C 360.83064,208 368,215.16936 368,224" fill="none" stroke="black"/>
              <path d="M 136,224 C 127.16936,224 120,231.16936 120,240" fill="none" stroke="black"/>
              <path d="M 240,224 C 231.16936,224 224,216.83064 224,208" fill="none" stroke="black"/>
              <path d="M 280,224 C 288.83064,224 296,216.83064 296,208" fill="none" stroke="black"/>
              <path d="M 240,240 C 248.83064,240 256,232.83064 256,224" fill="none" stroke="black"/>
              <path d="M 168,256 C 176.83064,256 184,248.83064 184,240" fill="none" stroke="black"/>
              <path d="M 456,272 C 464.83064,272 472,279.16936 472,288" fill="none" stroke="black"/>
              <path d="M 136,288 C 127.16936,288 120,295.16936 120,304" fill="none" stroke="black"/>
              <path d="M 240,304 C 248.83064,304 256,311.16936 256,320" fill="none" stroke="black"/>
              <path d="M 168,320 C 176.83064,320 184,312.83064 184,304" fill="none" stroke="black"/>
              <path d="M 240,320 C 231.16936,320 224,327.16936 224,336" fill="none" stroke="black"/>
              <path d="M 280,320 C 288.83064,320 296,327.16936 296,336" fill="none" stroke="black"/>
              <path d="M 456,320 C 447.16936,320 440,327.16936 440,336" fill="none" stroke="black"/>
              <path d="M 496,320 C 504.83064,320 512,327.16936 512,336" fill="none" stroke="black"/>
              <path d="M 352,336 C 360.83064,336 368,328.83064 368,320" fill="none" stroke="black"/>
              <path d="M 136,352 C 127.16936,352 120,359.16936 120,368" fill="none" stroke="black"/>
              <path d="M 240,352 C 231.16936,352 224,344.83064 224,336" fill="none" stroke="black"/>
              <path d="M 280,352 C 288.83064,352 296,344.83064 296,336" fill="none" stroke="black"/>
              <path d="M 456,352 C 447.16936,352 440,344.83064 440,336" fill="none" stroke="black"/>
              <path d="M 496,352 C 504.83064,352 512,344.83064 512,336" fill="none" stroke="black"/>
              <path d="M 240,368 C 248.83064,368 256,360.83064 256,352" fill="none" stroke="black"/>
              <path d="M 168,384 C 176.83064,384 184,376.83064 184,368" fill="none" stroke="black"/>
              <path d="M 456,384 C 464.83064,384 472,376.83064 472,368" fill="none" stroke="black"/>
              <path d="M 368,448 C 376.83064,448 384,440.83064 384,432" fill="none" stroke="black"/>
              <path d="M 144,496 C 135.16936,496 128,503.16936 128,512" fill="none" stroke="black"/>
              <path d="M 192,496 C 200.83064,496 208,503.16936 208,512" fill="none" stroke="black"/>
              <path d="M 256,496 C 247.16936,496 240,503.16936 240,512" fill="none" stroke="black"/>
              <path d="M 144,528 C 135.16936,528 128,520.83064 128,512" fill="none" stroke="black"/>
              <path d="M 192,528 C 200.83064,528 208,520.83064 208,512" fill="none" stroke="black"/>
              <path d="M 312,528 C 320.83064,528 328,520.83064 328,512" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="480,312 468,306.4 468,317.6" fill="black" transform="rotate(90,472,312)"/>
              <polygon class="arrowhead" points="440,384 428,378.4 428,389.6" fill="black" transform="rotate(180,432,384)"/>
              <polygon class="arrowhead" points="408,360 396,354.4 396,365.6" fill="black" transform="rotate(90,400,360)"/>
              <polygon class="arrowhead" points="392,408 380,402.4 380,413.6" fill="black" transform="rotate(270,384,408)"/>
              <polygon class="arrowhead" points="392,296 380,290.4 380,301.6" fill="black" transform="rotate(270,384,296)"/>
              <polygon class="arrowhead" points="312,336 300,330.4 300,341.6" fill="black" transform="rotate(180,304,336)"/>
              <polygon class="arrowhead" points="312,208 300,202.4 300,213.6" fill="black" transform="rotate(180,304,208)"/>
              <polygon class="arrowhead" points="280,360 268,354.4 268,365.6" fill="black" transform="rotate(270,272,360)"/>
              <polygon class="arrowhead" points="200,368 188,362.4 188,373.6" fill="black" transform="rotate(180,192,368)"/>
              <polygon class="arrowhead" points="200,304 188,298.4 188,309.6" fill="black" transform="rotate(180,192,304)"/>
              <polygon class="arrowhead" points="200,240 188,234.4 188,245.6" fill="black" transform="rotate(180,192,240)"/>
              <polygon class="arrowhead" points="200,176 188,170.4 188,181.6" fill="black" transform="rotate(180,192,176)"/>
              <polygon class="arrowhead" points="192,112 180,106.4 180,117.6" fill="black" transform="rotate(180,184,112)"/>
              <polygon class="arrowhead" points="192,48 180,42.4 180,53.6" fill="black" transform="rotate(180,184,48)"/>
              <polygon class="arrowhead" points="80,424 68,418.4 68,429.6" fill="black" transform="rotate(90,72,424)"/>
              <g class="text">
                <text x="148" y="52">UJCS</text>
                <text x="148" y="116">UCCS</text>
                <text x="152" y="180">JWT</text>
                <text x="260" y="212">Crypto</text>
                <text x="152" y="244">CWT</text>
                <text x="388" y="276">Claims-Set</text>
                <text x="152" y="308">BUN-J</text>
                <text x="260" y="340">Bundle</text>
                <text x="476" y="340">Digest</text>
                <text x="152" y="372">BUN-C</text>
                <text x="388" y="388">submod</text>
                <text x="68" y="452">Nested-Token</text>
                <text x="76" y="516">Legenda:</text>
                <text x="168" y="516">Process</text>
                <text x="268" y="516">Wire</text>
                <text x="304" y="516">Fmt</text>
                <text x="388" y="516">CDDL</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art" align="center"><![CDATA[
               .-----.
         .----+ UJCS |<-------------------------.
        |     '-----'                            |
        |                                        |
        |      .-----.                           |
        +-----+ UCCS |<-----------------------.  |
        |     '-----'                          | |
        |                                      | |
        |      .------.                        | |
        +-----+  JWT  |<------.                | |
        |     '------'      .--+---.           | |
        |                  | Crypto |<------.  | |
        |      .------.     '--+---'         | | |
        +-----+  CWT  |<------'              | | |
        |     '------'                   .---+-+-+----.
        |                                | Claims-Set +--.
        |      .------.                  '---+---+----'   |
        +-----+ BUN-J |<------.              | ^ |        v
        |     '------'      .--+---.         | | |     .------.
        |                  | Bundle |<------'  | |    | Digest |
        |      .------.     '--+---'           | v     '--+---'
        +-----+ BUN-C |<------'  ^         .---+----.     |
        |     '------'           |         | submod |<---'
        |                        |         '--------'
        v                        |             ^
.--------------.                 |             |
| Nested-Token +-----------------+------------'
'--------------'

                .-------.     .---------.   .------.
     Legenda:  | Process |   | Wire Fmt |   | CDDL |
                '-------'    '---------'    '------'
]]></artwork>
        </artset>
      </figure>
    </section>
    <section anchor="a-media-type-parameter-for-eat-profiles">
      <name>A Media Type Parameter for EAT Profiles</name>
      <t>EAT is an open and flexible format.  To improve interoperability, <xref section="6" sectionFormat="of" target="EAT"/> defines the concept of EAT profiles.  Profiles are used to constrain
the parameters that producers and consumers of a specific EAT profile need to
understand in order to interoperate.  For example: the number and type of
claims, which serialisation format, the supported signature schemes, etc.  EATs
carry an in-band profile identifier using the <tt>eat_profile</tt> claim (see
<xref section="4.3.2" sectionFormat="of" target="EAT"/>).  The value of the <tt>eat_profile</tt> claim is either an
OID or a URI.</t>
      <t>The media types defined in this document include an optional <tt>eat_profile</tt>
parameter that can be used to mirror the <tt>eat_profile</tt> claim of the transported
EAT.  Exposing the EAT profile at the API layer allows API routers to dispatch
payloads directly to the profile-specific processor without having to snoop
into the request bodies.  This design also provides a finer-grained and
scalable type system that matches the inherent extensibility of EAT.  The
expectation being that a certain EAT profile automatically obtains a media type
derived from the base (e.g., <tt>application/eat+cwt)</tt> by populating the
<tt>eat_profile</tt> parameter with the corresponding OID or URL.</t>
      <t>When the parameterised version of the EAT media type is used in HTTP (for
example, with the "Content-Type" and "Accept" headers), and the value is an
absolute URI (<xref section="4.3" sectionFormat="of" target="URI"/>), the <tt>parameter-value</tt> (<xref section="A" sectionFormat="of" target="HTTP"/>) <bcp14>MUST</bcp14> use the <tt>quoted-string</tt> encoding, e.g.:</t>
      <ul empty="true">
        <li>
          <t><tt>application/eat+jwt; eat_profile="tag:evidence.example,2022"</tt></t>
        </li>
      </ul>
      <t>Instead, when the EAT profile is an OID, the <tt>token</tt> encoding (i.e., without
quotes) can be used, e.g.:</t>
      <ul empty="true">
        <li>
          <t><tt>application/eat+cwt; eat_profile=2.999.1</tt>.</t>
        </li>
      </ul>
    </section>
    <section anchor="examples">
      <name>Examples</name>
      <t>The example in <xref target="fig-rest-req"/> illustrates the usage of EAT media types for
transporting attestation evidence as well as negotiating the acceptable format
of the attestation result.</t>
      <figure anchor="fig-rest-req">
        <name>Example REST Verification API (request)</name>
        <sourcecode type="http-message"><![CDATA[
# NOTE: '\' line wrapping per RFC 8792

POST /challenge-response/v1/session/1234567890 HTTP/1.1
Host: verifier.example
Accept: application/eat+cwt; eat_profile="tag:ar4si.example,2021"
Content-Type: application/eat+cwt; \
              eat_profile="tag:evidence.example,2022"

[ CBOR-encoded EAT w/ eat_profile="tag:evidence.example,2022" ]
]]></sourcecode>
      </figure>
      <t>The example in <xref target="fig-rest-rsp"/> illustrates the usage of EAT media types for
transporting attestation results.</t>
      <figure anchor="fig-rest-rsp">
        <name>Example REST Verification API (response)</name>
        <sourcecode type="http-message"><![CDATA[
# NOTE: '\' line wrapping per RFC 8792

HTTP/1.1 200 OK
Content-Type: application/eat+cwt; \
              eat_profile="tag:ar4si.example,2021"

[ CBOR-encoded EAT w/ eat_profile="tag:ar4si.example,2021" ]
]]></sourcecode>
      </figure>
      <t>In both cases, a tag URI <xref target="TAG"/> identifying the profile is carried as an
explicit parameter.</t>
    </section>
    <section anchor="seccons">
      <name>Security Considerations</name>
      <t>Media types only provide clues to the processing application. The application
must verify that the received data matches the expected format, regardless of
the advertised media type. Failing to do so could expose the user to security
risks, such as privilege escalation and cross-protocol attacks.</t>
      <t>The security consideration of <xref target="EAT"/> and <xref target="UCCS"/> apply in full.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t><cref anchor="to-be-removed">RFC Editor: please replace RFCthis with this RFC number and remove this note.</cref></t>
      <section anchor="cwt-structured-syntax-suffix">
        <name><tt>+cwt</tt> Structured Syntax Suffix</name>
        <t>IANA is requested to register the <tt>+cwt</tt> structured syntax suffix in the
"Structured Syntax Suffixes" registry <xref target="IANA.media-type-structured-suffix"/> in
the manner described in <xref target="MediaTypes"/>, which can be used to indicate that the
media type is encoded as a CWT.</t>
        <section anchor="registry-contents">
          <name>Registry Contents</name>
          <dl spacing="compact">
            <dt>Name:</dt>
            <dd>
              <t>CBOR Web Token (CWT)</t>
            </dd>
            <dt>+suffix:</dt>
            <dd>
              <t>+cwt</t>
            </dd>
            <dt>References:</dt>
            <dd>
              <t><xref target="CWT"/></t>
            </dd>
            <dt>Encoding Considerations:</dt>
            <dd>
              <t>binary</t>
            </dd>
            <dt>Interoperability Considerations:</dt>
            <dd>
              <t>N/A</t>
            </dd>
            <dt>Fragment Identifier Considerations:</dt>
            <dd>
              <t>The syntax and semantics of fragment identifiers specified for +cwt <bcp14>SHOULD</bcp14> be
as specified for <tt>application/cwt</tt>.  (At publication of this document, there
is no fragment identification syntax defined for <tt>application/cwt</tt>.)</t>
            </dd>
            <dt>Security Considerations:</dt>
            <dd>
              <t>See <xref section="8" sectionFormat="of" target="CWT"/></t>
            </dd>
            <dt>Contact:</dt>
            <dd>
              <t>RATS WG mailing list (rats@ietf.org), or IETF Security Area (saag@ietf.org)</t>
            </dd>
            <dt>Author/Change Controller:</dt>
            <dd>
              <t>Remote ATtestation ProcedureS (RATS) Working Group.
The IETF has change control over this registration.</t>
            </dd>
          </dl>
        </section>
      </section>
      <section anchor="media-type">
        <name>Media Types</name>
        <t>IANA is requested to add the following media types to the
"Media Types" registry <xref target="IANA.media-types"/>.</t>
        <table align="left" anchor="new-media-type">
          <name>New Media Types</name>
          <thead>
            <tr>
              <th align="left">Name</th>
              <th align="left">Template</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">EAT CWT</td>
              <td align="left">application/eat+cwt</td>
              <td align="left">RFCthis, <xref target="media-type-eat-cwt"/></td>
            </tr>
            <tr>
              <td align="left">EAT JWT</td>
              <td align="left">application/eat+jwt</td>
              <td align="left">RFCthis, <xref target="media-type-eat-jwt"/></td>
            </tr>
            <tr>
              <td align="left">Detached EAT Bundle CBOR</td>
              <td align="left">application/eat-bun+cbor</td>
              <td align="left">RFCthis, <xref target="media-type-deb-cbor"/></td>
            </tr>
            <tr>
              <td align="left">Detached EAT Bundle JSON</td>
              <td align="left">application/eat-bun+json</td>
              <td align="left">RFCthis, <xref target="media-type-deb-json"/></td>
            </tr>
            <tr>
              <td align="left">EAT UCCS</td>
              <td align="left">application/eat-ucs+cbor</td>
              <td align="left">RFCthis, <xref target="media-type-ucs-cbor"/></td>
            </tr>
            <tr>
              <td align="left">EAT UJCS</td>
              <td align="left">application/eat-ucs+json</td>
              <td align="left">RFCthis, <xref target="media-type-ucs-json"/></td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="media-type-eat-cwt">
        <name>application/eat+cwt Registration</name>
        <dl spacing="compact">
          <dt>Type name:</dt>
          <dd>
            <t>application</t>
          </dd>
          <dt>Subtype name:</dt>
          <dd>
            <t>eat+cwt</t>
          </dd>
          <dt>Required parameters:</dt>
          <dd>
            <t>n/a</t>
          </dd>
          <dt>Optional parameters:</dt>
          <dd>
            <t>"eat_profile" (EAT profile in string format.  OIDs <bcp14>MUST</bcp14> use the
dotted-decimal notation.  The parameter value is case-insensitive.)</t>
          </dd>
          <dt>Encoding considerations:</dt>
          <dd>
            <t>binary</t>
          </dd>
          <dt>Security considerations:</dt>
          <dd>
            <t><xref section="9" sectionFormat="of" target="EAT"/></t>
          </dd>
          <dt>Interoperability considerations:</dt>
          <dd>
            <t>n/a</t>
          </dd>
          <dt>Published specification:</dt>
          <dd>
            <t>RFCthis</t>
          </dd>
          <dt>Applications that use this media type:</dt>
          <dd>
            <t>Attesters, Verifiers, Endorsers and Reference-Value providers, Relying
Parties that need to transfer EAT payloads over HTTP(S), CoAP(S), and other
transports.</t>
          </dd>
          <dt>Fragment identifier considerations:</dt>
          <dd>
            <t>n/a</t>
          </dd>
          <dt>Person &amp; email address to contact for further information:</dt>
          <dd>
            <t>RATS WG mailing list (rats@ietf.org)</t>
          </dd>
          <dt>Intended usage:</dt>
          <dd>
            <t>COMMON</t>
          </dd>
          <dt>Restrictions on usage:</dt>
          <dd>
            <t>none</t>
          </dd>
          <dt>Author/Change controller:</dt>
          <dd>
            <t>IETF</t>
          </dd>
          <dt>Provisional registration:</dt>
          <dd>
            <t>no</t>
          </dd>
        </dl>
      </section>
      <section anchor="media-type-eat-jwt">
        <name>application/eat+jwt Registration</name>
        <dl spacing="compact">
          <dt>Type name:</dt>
          <dd>
            <t>application</t>
          </dd>
          <dt>Subtype name:</dt>
          <dd>
            <t>eat+jwt</t>
          </dd>
          <dt>Required parameters:</dt>
          <dd>
            <t>n/a</t>
          </dd>
          <dt>Optional parameters:</dt>
          <dd>
            <t>"eat_profile" (EAT profile in string format.  OIDs <bcp14>MUST</bcp14> use the
dotted-decimal notation.  The parameter value is case-insensitive.)</t>
          </dd>
          <dt>Encoding considerations:</dt>
          <dd>
            <t>8bit</t>
          </dd>
          <dt>Security considerations:</dt>
          <dd>
            <t><xref section="9" sectionFormat="of" target="EAT"/> and <xref target="BCP225"/></t>
          </dd>
          <dt>Interoperability considerations:</dt>
          <dd>
            <t>n/a</t>
          </dd>
          <dt>Published specification:</dt>
          <dd>
            <t>RFCthis</t>
          </dd>
          <dt>Applications that use this media type</dt>
          <dd>
            <t>Attesters, Verifiers, Endorsers and Reference-Value providers, Relying
Parties that need to transfer EAT payloads over HTTP(S), CoAP(S), and other
transports.</t>
          </dd>
          <dt>Fragment identifier considerations:</dt>
          <dd>
            <t>n/a</t>
          </dd>
          <dt>Person &amp; email address to contact for further information:</dt>
          <dd>
            <t>RATS WG mailing list (rats@ietf.org)</t>
          </dd>
          <dt>Intended usage:</dt>
          <dd>
            <t>COMMON</t>
          </dd>
          <dt>Restrictions on usage:</dt>
          <dd>
            <t>none</t>
          </dd>
          <dt>Author/Change controller:</dt>
          <dd>
            <t>IETF</t>
          </dd>
          <dt>Provisional registration:</dt>
          <dd>
            <t>no</t>
          </dd>
        </dl>
      </section>
      <section anchor="media-type-deb-cbor">
        <name>application/eat-bun+cbor Registration</name>
        <dl spacing="compact">
          <dt>Type name:</dt>
          <dd>
            <t>application</t>
          </dd>
          <dt>Subtype name:</dt>
          <dd>
            <t>eat-bun+cbor</t>
          </dd>
          <dt>Required parameters:</dt>
          <dd>
            <t>n/a</t>
          </dd>
          <dt>Optional parameters:</dt>
          <dd>
            <t>"eat_profile" (EAT profile in string format.  OIDs <bcp14>MUST</bcp14> use the
dotted-decimal notation.  The parameter value is case-insensitive.)</t>
          </dd>
          <dt>Encoding considerations:</dt>
          <dd>
            <t>binary</t>
          </dd>
          <dt>Security considerations:</dt>
          <dd>
            <t><xref section="9" sectionFormat="of" target="EAT"/></t>
          </dd>
          <dt>Interoperability considerations:</dt>
          <dd>
            <t>n/a</t>
          </dd>
          <dt>Published specification:</dt>
          <dd>
            <t>RFCthis</t>
          </dd>
          <dt>Applications that use this media type:</dt>
          <dd>
            <t>Attesters, Verifiers, Endorsers and Reference-Value providers, Relying
Parties that need to transfer EAT payloads over HTTP(S), CoAP(S), and other
transports.</t>
          </dd>
          <dt>Fragment identifier considerations:</dt>
          <dd>
            <t>n/a</t>
          </dd>
          <dt>Person &amp; email address to contact for further information:</dt>
          <dd>
            <t>RATS WG mailing list (rats@ietf.org)</t>
          </dd>
          <dt>Intended usage:</dt>
          <dd>
            <t>COMMON</t>
          </dd>
          <dt>Restrictions on usage:</dt>
          <dd>
            <t>none</t>
          </dd>
          <dt>Author/Change controller:</dt>
          <dd>
            <t>IETF</t>
          </dd>
          <dt>Provisional registration:</dt>
          <dd>
            <t>no</t>
          </dd>
        </dl>
      </section>
      <section anchor="media-type-deb-json">
        <name>application/eat-bun+json Registration</name>
        <dl spacing="compact">
          <dt>Type name:</dt>
          <dd>
            <t>application</t>
          </dd>
          <dt>Subtype name:</dt>
          <dd>
            <t>eat-bun+json</t>
          </dd>
          <dt>Required parameters:</dt>
          <dd>
            <t>n/a</t>
          </dd>
          <dt>Optional parameters:</dt>
          <dd>
            <t>"eat_profile" (EAT profile in string format.  OIDs <bcp14>MUST</bcp14> use the
dotted-decimal notation.  The parameter value is case-insensitive.)</t>
          </dd>
          <dt>Encoding considerations:</dt>
          <dd>
            <t>Same as <xref target="JSON"/></t>
          </dd>
          <dt>Security considerations:</dt>
          <dd>
            <t><xref section="9" sectionFormat="of" target="EAT"/></t>
          </dd>
          <dt>Interoperability considerations:</dt>
          <dd>
            <t>n/a</t>
          </dd>
          <dt>Published specification:</dt>
          <dd>
            <t>RFCthis</t>
          </dd>
          <dt>Applications that use this media type</dt>
          <dd>
            <t>Attesters, Verifiers, Endorsers and Reference-Value providers, Relying
Parties that need to transfer EAT payloads over HTTP(S), CoAP(S), and other
transports.</t>
          </dd>
          <dt>Fragment identifier considerations:</dt>
          <dd>
            <t>n/a</t>
          </dd>
          <dt>Person &amp; email address to contact for further information:</dt>
          <dd>
            <t>RATS WG mailing list (rats@ietf.org)</t>
          </dd>
          <dt>Intended usage:</dt>
          <dd>
            <t>COMMON</t>
          </dd>
          <dt>Restrictions on usage:</dt>
          <dd>
            <t>none</t>
          </dd>
          <dt>Author/Change controller:</dt>
          <dd>
            <t>IETF</t>
          </dd>
          <dt>Provisional registration:</dt>
          <dd>
            <t>no</t>
          </dd>
        </dl>
      </section>
      <section anchor="media-type-ucs-cbor">
        <name>application/eat-ucs+cbor Registration</name>
        <dl spacing="compact">
          <dt>Type name:</dt>
          <dd>
            <t>application</t>
          </dd>
          <dt>Subtype name:</dt>
          <dd>
            <t>eat-ucs+cbor</t>
          </dd>
          <dt>Required parameters:</dt>
          <dd>
            <t>n/a</t>
          </dd>
          <dt>Optional parameters:</dt>
          <dd>
            <t>"eat_profile" (EAT profile in string format.  OIDs <bcp14>MUST</bcp14> use the
dotted-decimal notation.  The parameter value is case-insensitive.)</t>
          </dd>
          <dt>Encoding considerations:</dt>
          <dd>
            <t>binary</t>
          </dd>
          <dt>Security considerations:</dt>
          <dd>
            <t><xref section="7" sectionFormat="of" target="UCCS"/></t>
          </dd>
          <dt>Interoperability considerations:</dt>
          <dd>
            <t>n/a</t>
          </dd>
          <dt>Published specification:</dt>
          <dd>
            <t>RFCthis</t>
          </dd>
          <dt>Applications that use this media type:</dt>
          <dd>
            <t>Attesters, Verifiers, Endorsers and Reference-Value providers, Relying
Parties that need to transfer EAT payloads over HTTP(S), CoAP(S), and other
transports.</t>
          </dd>
          <dt>Fragment identifier considerations:</dt>
          <dd>
            <t>n/a</t>
          </dd>
          <dt>Person &amp; email address to contact for further information:</dt>
          <dd>
            <t>RATS WG mailing list (rats@ietf.org)</t>
          </dd>
          <dt>Intended usage:</dt>
          <dd>
            <t>COMMON</t>
          </dd>
          <dt>Restrictions on usage:</dt>
          <dd>
            <t>none</t>
          </dd>
          <dt>Author/Change controller:</dt>
          <dd>
            <t>IETF</t>
          </dd>
          <dt>Provisional registration:</dt>
          <dd>
            <t>no</t>
          </dd>
        </dl>
      </section>
      <section anchor="media-type-ucs-json">
        <name>application/eat-ucs+json Registration</name>
        <dl spacing="compact">
          <dt>Type name:</dt>
          <dd>
            <t>application</t>
          </dd>
          <dt>Subtype name:</dt>
          <dd>
            <t>eat-ucs+json</t>
          </dd>
          <dt>Required parameters:</dt>
          <dd>
            <t>n/a</t>
          </dd>
          <dt>Optional parameters:</dt>
          <dd>
            <t>"eat_profile" (EAT profile in string format.  OIDs <bcp14>MUST</bcp14> use the
dotted-decimal notation.  The parameter value is case-insensitive.)</t>
          </dd>
          <dt>Encoding considerations:</dt>
          <dd>
            <t>Same as <xref target="JSON"/></t>
          </dd>
          <dt>Security considerations:</dt>
          <dd>
            <t><xref section="7" sectionFormat="of" target="UCCS"/></t>
          </dd>
          <dt>Interoperability considerations:</dt>
          <dd>
            <t>n/a</t>
          </dd>
          <dt>Published specification:</dt>
          <dd>
            <t>RFCthis</t>
          </dd>
          <dt>Applications that use this media type</dt>
          <dd>
            <t>Attesters, Verifiers, Endorsers and Reference-Value providers, Relying
Parties that need to transfer EAT payloads over HTTP(S), CoAP(S), and other
transports.</t>
          </dd>
          <dt>Fragment identifier considerations:</dt>
          <dd>
            <t>n/a</t>
          </dd>
          <dt>Person &amp; email address to contact for further information:</dt>
          <dd>
            <t>RATS WG mailing list (rats@ietf.org)</t>
          </dd>
          <dt>Intended usage:</dt>
          <dd>
            <t>COMMON</t>
          </dd>
          <dt>Restrictions on usage:</dt>
          <dd>
            <t>none</t>
          </dd>
          <dt>Author/Change controller:</dt>
          <dd>
            <t>IETF</t>
          </dd>
          <dt>Provisional registration:</dt>
          <dd>
            <t>no</t>
          </dd>
        </dl>
      </section>
      <section anchor="coap-content-format-registrations">
        <name>CoAP Content-Format Registrations</name>
        <t>IANA is requested to register the following Content-Format numbers in the "CoAP
Content-Formats" sub-registry, within the "Constrained RESTful Environments
(CoRE) Parameters" Registry <xref target="IANA.core-parameters"/>:</t>
        <table align="left">
          <name>New Content-Formats</name>
          <thead>
            <tr>
              <th align="left">Content-Type</th>
              <th align="left">Content Coding</th>
              <th align="left">ID</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">application/eat+cwt</td>
              <td align="left">-</td>
              <td align="left">TBD1</td>
              <td align="left">RFCthis</td>
            </tr>
            <tr>
              <td align="left">application/eat+jwt</td>
              <td align="left">-</td>
              <td align="left">TBD2</td>
              <td align="left">RFCthis</td>
            </tr>
            <tr>
              <td align="left">application/eat-bun+cbor</td>
              <td align="left">-</td>
              <td align="left">TBD3</td>
              <td align="left">RFCthis</td>
            </tr>
            <tr>
              <td align="left">application/eat-bun+json</td>
              <td align="left">-</td>
              <td align="left">TBD4</td>
              <td align="left">RFCthis</td>
            </tr>
            <tr>
              <td align="left">application/eat-ucs+cbor</td>
              <td align="left">-</td>
              <td align="left">TBD5</td>
              <td align="left">RFCthis</td>
            </tr>
            <tr>
              <td align="left">application/eat-ucs+json</td>
              <td align="left">-</td>
              <td align="left">TBD6</td>
              <td align="left">RFCthis</td>
            </tr>
          </tbody>
        </table>
        <t>TBD1..6 are to be assigned from the space 256..999.</t>
      </section>
    </section>
    <section anchor="changelog">
      <name>Changelog</name>
      <t><cref anchor="remove-sec">RFC editor: please remove this section</cref></t>
      <section anchor="cl-04">
        <name> -04</name>
        <ul spacing="normal">
          <li>
            <t>Early IANA review</t>
          </li>
        </ul>
      </section>
      <section anchor="cl-03">
        <name> -03</name>
        <ul spacing="normal">
          <li>
            <t>Update references</t>
          </li>
        </ul>
      </section>
      <section anchor="cl-02">
        <name> -02</name>
        <ul spacing="normal">
          <li>
            <t>Update references</t>
          </li>
          <li>
            <t>Register +cwt SSS
(<eref target="https://github.com/ietf-rats-wg/draft-eat-mt/issues/14">Issue#14</eref>)</t>
          </li>
          <li>
            <t>Move from eat-jwt to eat+jwt
(<eref target="https://github.com/ietf-rats-wg/draft-eat-mt/issues/14">Issue#14</eref>)</t>
          </li>
          <li>
            <t>Move from eat-cwt to eat+cwt
(<eref target="https://github.com/ietf-rats-wg/draft-eat-mt/issues/14">Issue#14</eref>)</t>
          </li>
        </ul>
      </section>
      <section anchor="cl-01">
        <name> -01</name>
        <ul spacing="normal">
          <li>
            <t>Rename <tt>profile</tt> to <tt>eat_profile</tt> for consistency with EAT
(<eref target="https://github.com/ietf-rats-wg/draft-eat-mt/issues/4">Issue#4</eref>)</t>
          </li>
          <li>
            <t>The DEB acronym is gone: shorthand is now "bun" from bundle
(<eref target="https://github.com/ietf-rats-wg/draft-eat-mt/issues/8">Issue#8</eref>)</t>
          </li>
          <li>
            <t>Incorporate editorial suggestions from Carl and Dave
(<eref target="https://github.com/ietf-rats-wg/draft-eat-mt/issues/7">Issue#7</eref>,
<eref target="https://github.com/ietf-rats-wg/draft-eat-mt/issues/9">Issue#9</eref>)</t>
          </li>
        </ul>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="EAT">
          <front>
            <title>The Entity Attestation Token (EAT)</title>
            <author fullname="Laurence Lundblade" initials="L." surname="Lundblade">
              <organization>Security Theory LLC</organization>
            </author>
            <author fullname="Giridhar Mandyam" initials="G." surname="Mandyam">
              <organization>Mediatek USA</organization>
            </author>
            <author fullname="Jeremy O'Donoghue" initials="J." surname="O'Donoghue">
              <organization>Qualcomm Technologies Inc.</organization>
            </author>
            <author fullname="Carl Wallace" initials="C." surname="Wallace">
              <organization>Red Hound Software, Inc.</organization>
            </author>
            <date day="6" month="September" year="2024"/>
            <abstract>
              <t>   An Entity Attestation Token (EAT) provides an attested claims set
   that describes state and characteristics of an entity, a device like
   a smartphone, IoT device, network equipment or such.  This claims set
   is used by a relying party, server or service to determine the type
   and degree of trust placed in the entity.

   An EAT is either a CBOR Web Token (CWT) or JSON Web Token (JWT) with
   attestation-oriented claims.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-eat-31"/>
        </reference>
        <reference anchor="JWT">
          <front>
            <title>JSON Web Token (JWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties. The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7519"/>
          <seriesInfo name="DOI" value="10.17487/RFC7519"/>
        </reference>
        <reference anchor="CWT">
          <front>
            <title>CBOR Web Token (CWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties. The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection. A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value. CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8392"/>
          <seriesInfo name="DOI" value="10.17487/RFC8392"/>
        </reference>
        <reference anchor="UCCS">
          <front>
            <title>A CBOR Tag for Unprotected CWT Claims Sets</title>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Jeremy O'Donoghue" initials="J." surname="O'Donoghue">
              <organization>Qualcomm Technologies Inc.</organization>
            </author>
            <author fullname="Nancy Cam-Winget" initials="N." surname="Cam-Winget">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Carsten Bormann" initials="C." surname="Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <date day="4" month="July" year="2024"/>
            <abstract>
              <t>   When transported over secure channels, CBOR Web Token (CWT, RFC 8392)
   Claims Sets may not need the protection afforded by wrapping them
   into COSE, as is required for a true CWT.  This specification defines
   a CBOR tag for such unprotected CWT Claims Sets (UCCS) and discusses
   conditions for its proper use.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-uccs-10"/>
        </reference>
        <reference anchor="MediaTypes">
          <front>
            <title>Media Type Specifications and Registration Procedures</title>
            <author fullname="N. Freed" initials="N." surname="Freed"/>
            <author fullname="J. Klensin" initials="J." surname="Klensin"/>
            <author fullname="T. Hansen" initials="T." surname="Hansen"/>
            <date month="January" year="2013"/>
            <abstract>
              <t>This document defines procedures for the specification and registration of media types for use in HTTP, MIME, and other Internet protocols. This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="13"/>
          <seriesInfo name="RFC" value="6838"/>
          <seriesInfo name="DOI" value="10.17487/RFC6838"/>
        </reference>
        <reference anchor="URI">
          <front>
            <title>Uniform Resource Identifier (URI): Generic Syntax</title>
            <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee"/>
            <author fullname="R. Fielding" initials="R." surname="Fielding"/>
            <author fullname="L. Masinter" initials="L." surname="Masinter"/>
            <date month="January" year="2005"/>
            <abstract>
              <t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource. This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet. The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier. This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="66"/>
          <seriesInfo name="RFC" value="3986"/>
          <seriesInfo name="DOI" value="10.17487/RFC3986"/>
        </reference>
        <reference anchor="HTTP">
          <front>
            <title>HTTP Semantics</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes.</t>
              <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="97"/>
          <seriesInfo name="RFC" value="9110"/>
          <seriesInfo name="DOI" value="10.17487/RFC9110"/>
        </reference>
        <reference anchor="JSON">
          <front>
            <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format. It was derived from the ECMAScript Programming Language Standard. JSON defines a small set of formatting rules for the portable representation of structured data.</t>
              <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="90"/>
          <seriesInfo name="RFC" value="8259"/>
          <seriesInfo name="DOI" value="10.17487/RFC8259"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="IANA.media-type-structured-suffix" target="https://www.iana.org/assignments/media-type-structured-suffix">
          <front>
            <title>Structured Syntax Suffixes</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="IANA.media-types" target="https://www.iana.org/assignments/media-types">
          <front>
            <title>Media Types</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <referencegroup anchor="BCP225" target="https://www.rfc-editor.org/info/bcp225">
          <reference anchor="RFC8725" target="https://www.rfc-editor.org/info/rfc8725">
            <front>
              <title>JSON Web Token Best Current Practices</title>
              <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
              <author fullname="D. Hardt" initials="D." surname="Hardt"/>
              <author fullname="M. Jones" initials="M." surname="Jones"/>
              <date month="February" year="2020"/>
              <abstract>
                <t>JSON Web Tokens, also known as JWTs, are URL-safe JSON-based security tokens that contain a set of claims that can be signed and/or encrypted. JWTs are being widely used and deployed as a simple security token format in numerous protocols and applications, both in the area of digital identity and in other application areas. This Best Current Practices document updates RFC 7519 to provide actionable guidance leading to secure implementation and deployment of JWTs.</t>
              </abstract>
            </front>
            <seriesInfo name="BCP" value="225"/>
            <seriesInfo name="RFC" value="8725"/>
            <seriesInfo name="DOI" value="10.17487/RFC8725"/>
          </reference>
        </referencegroup>
        <reference anchor="IANA.core-parameters" target="https://www.iana.org/assignments/core-parameters">
          <front>
            <title>Constrained RESTful Environments (CoRE) Parameters</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RATS-Arch">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="N. Smith" initials="N." surname="Smith"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9334"/>
          <seriesInfo name="DOI" value="10.17487/RFC9334"/>
        </reference>
        <referencegroup anchor="BUILD-W-HTTP" target="https://www.rfc-editor.org/info/bcp56">
          <reference anchor="RFC9205" target="https://www.rfc-editor.org/info/rfc9205">
            <front>
              <title>Building Protocols with HTTP</title>
              <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
              <date month="June" year="2022"/>
              <abstract>
                <t>Applications often use HTTP as a substrate to create HTTP-based APIs. This document specifies best practices for writing specifications that use HTTP to define new application protocols. It is written primarily to guide IETF efforts to define application protocols using HTTP for deployment on the Internet but might be applicable in other situations.</t>
                <t>This document obsoletes RFC 3205.</t>
              </abstract>
            </front>
            <seriesInfo name="BCP" value="56"/>
            <seriesInfo name="RFC" value="9205"/>
            <seriesInfo name="DOI" value="10.17487/RFC9205"/>
          </reference>
        </referencegroup>
        <reference anchor="REST-IoT">
          <front>
            <title>Guidance on RESTful Design for Internet of Things Systems</title>
            <author fullname="Ari Keränen" initials="A." surname="Keränen">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Matthias Kovatsch" initials="M." surname="Kovatsch">
              <organization>Siemens</organization>
            </author>
            <author fullname="Klaus Hartke" initials="K." surname="Hartke">
         </author>
            <date day="27" month="July" year="2024"/>
            <abstract>
              <t>   This document gives guidance for designing Internet of Things (IoT)
   systems that follow the principles of the Representational State
   Transfer (REST) architectural style.  This document is a product of
   the IRTF Thing-to-Thing Research Group (T2TRG).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-irtf-t2trg-rest-iot-14"/>
        </reference>
        <reference anchor="TAG">
          <front>
            <title>The 'tag' URI Scheme</title>
            <author fullname="T. Kindberg" initials="T." surname="Kindberg"/>
            <author fullname="S. Hawke" initials="S." surname="Hawke"/>
            <date month="October" year="2005"/>
            <abstract>
              <t>This document describes the "tag" Uniform Resource Identifier (URI) scheme. Tag URIs (also known as "tags") are designed to be unique across space and time while being tractable to humans. They are distinct from most other URIs in that they have no authoritative resolution mechanism. A tag may be used purely as an entity identifier. Furthermore, using tags has some advantages over the common practice of using "http" URIs as identifiers for non-HTTP-accessible resources. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4151"/>
          <seriesInfo name="DOI" value="10.17487/RFC4151"/>
        </reference>
      </references>
    </references>
    <?line 665?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Thank you
Carl Wallace,
Carsten Bormann,
Dave Thaler,
Deb Cooley,
Jouni Korhonen,
Kathleen Moriarty,
Michael Richardson,
Paul Howard
and
Tim Hollebeek
for your comments and suggestions.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
