<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.24 (Ruby 3.3.6) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-mcd-ivy-entitlement-inventory-00" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.28.0 -->
  <front>
    <title abbrev="almo-entitlement-inventory">A YANG Module for Entitlement Inventory</title>
    <seriesInfo name="Internet-Draft" value="draft-mcd-ivy-entitlement-inventory-00"/>
    <author initials="M." surname="Palmero" fullname="Marisol Palmero">
      <organization>Cisco Systems</organization>
      <address>
        <email>mpalmero@cisco.com</email>
      </address>
    </author>
    <author initials="C." surname="Cardona" fullname="Camilo Cardona">
      <organization>NTT</organization>
      <address>
        <email>camilo@gin.ntt.net</email>
      </address>
    </author>
    <author initials="D." surname="Lopez" fullname="Diego Lopez">
      <organization>Telefonica</organization>
      <address>
        <email>diego.r.lopez@telefonica.com</email>
      </address>
    </author>
    <date year="2025" month="March" day="03"/>
    <area>Operations and Management</area>
    <workgroup>Network Inventory YANG WG</workgroup>
    <keyword>inventory</keyword>
    <keyword>capability</keyword>
    <keyword>entitlement</keyword>
    <keyword>licensing</keyword>
    <abstract>
      <?line 43?>

<t>This document proposes a YANG module for incorporating entitlements in a network inventory of entitlements. Entitlements define the rights for their holder to use specific feature(s) in a network element(s). The model is rooted by the concept of the capabilities offered by an element, enabled by the held entitlements, and considers entitlement scope, how they are assigned, and when they expire. The model introduces a descriptive definition of capabilities and the entitlement use restrictions, supporting entitlement administration and the understanding of the capabilities available through the network.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://dr2lopez.github.io/ivy-capability-entitlement/draft-mcd-ivy-entitlement-inventory.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-mcd-ivy-entitlement-inventory/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Network Inventory YANG WG Working Group mailing list (<eref target="mailto:inventory-yang@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/inventory-yang/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/inventory-yang/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/dr2lopez/ivy-capability-entitlement"/>.</t>
    </note>
  </front>
  <middle>
    <?line 47?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The goal of any network elements included as assets in the inventory of any network service provider is to be used to build such services, taking advantage of the features provided by the inventoried assets. The use of many of these features are not necessarily associated with the acquisition of an inventoried network element, as their use requires specific permissions, usually in terms of licenses issued by the network element provider explicitly authorizing the use of a (number of) feature(s). As the technology evolves, making network elements more modular and software-intensive, and even fully virtualized, the management of these permissions, their agreggation and application to enable a concrete network service becomes more relevant. These trends also imply the combination of a greater number of these permissions, within a given network element or in a number of them, implying an increasing complexity when trying to assess the feasibility of providing a specific service by integrating the necessary assets. This draft proposes a YANG model for incorporating the management of these permissions, based on two essential concepts: capability and entitlement.</t>
      <t>Capability refers to the ability or power to do something, often indicating a skill, talent, or potential to achieve a specific outcome, and is commonly used to describe the features or functions of a system or device that enable it to perform tasks. On the other hand, an entitlement corresponds to the right that someone has to do or have something. Following this general definitions, the model considers entitlements as the means that grant specific holders the right to access particular capabilities of one or more of the assets in the network inventory. The use of these capabilities may be restricted in various ways, such as by duration, usage limits, or predefined conditions. Being able to exchange information on the state of the entitlements applicable to network elements can save time and facilitate decision making. This document proposes a YANG model that, complementing the network inventory module, can provide the information an asset/entitlement administrator needs for this purpose.</t>
      <section anchor="scope-of-the-entitlement-model">
        <name>Scope of the Entitlement Model</name>
        <t>The entitlement model aims to provide an inventory of entitlements. This includes the entitled holders and the capabilities to which they are entitled. Additionally, it offers information into the restrictions of the operation of the different assets (network entities and components). In general, this model seeks to address the following questions:</t>
        <ul spacing="normal">
          <li>
            <t>What entitlements are administered/owned by the organization?</t>
          </li>
          <li>
            <t>How are entitlements restricted to some assets and holders?</t>
          </li>
          <li>
            <t>What entitlements are assigned or installed on each asset(s)?</t>
          </li>
          <li>
            <t>What constraints do the current entitlements impose on the assets' functionality?</t>
          </li>
          <li>
            <t>Does the entitlement impose any kind of global restrictions? What are they?</t>
          </li>
          <li>
            <t>What are the restrictions that each asset due to the entitlements it holds?</t>
          </li>
        </ul>
        <t>The model is designed with flexibility in mind, allowing for expansion through the utilization of tools provided by YANG.</t>
        <t>The realm of entitlements and licensing is inherently complex, presenting challenges in creating a model that can comprehensively encompass all scenarios without ambiguity. While we attempt to address various situations through examples and use cases, we acknowledge that the model might not be able to cover all corner cases without ambiguity. In such cases, we recommend that implementations provide additional documentation to clarify those potential ambiguities. The current model does not aim to serve as a catalog of licenses. While it may accommodate basic scenarios, it does not aim to cover the full spectrum of license characteristics, which can vary significantly. Instead, our focus is on providing a general framework for describing relationships and answering the questions posed above.</t>
        <t>With the aim of clarifying the model scope, here are some questions that our model does not attempt to answer:</t>
        <ul spacing="normal">
          <li>
            <t>What are the implications of purchasing a specific entitlement?</t>
          </li>
          <li>
            <t>Which entitlement should I acquire to get a specific capability?</t>
          </li>
          <li>
            <t>Is license migration feasible?</t>
          </li>
          <li>
            <t>What capabilities will be allowed if I install an entitlement in a specific device?</t>
          </li>
          <li>
            <t>Features or restrictions that depend on each user. We are not covering this in the current version of this document, but it could be done if we expand the holders' identification.</t>
          </li>
        </ul>
        <t>It is important to note that the model primarily addresses the utilization of capabilities, rather than access control. For instance, if a network device cannot be configured to use an arbitrary network protocol (e.g. MPLS) due to licensing restrictions, this implies that the organization owning the router (the holder in this scenario) is not permitted to utilize the MPLS feature. This distinction is separate from, for instance, the ability of a specific user to configure MPLS due to access control limitations.</t>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>(Glossary TBP. We need at least formal definitions of "capability" and "entitlement")</t>
    </section>
    <section anchor="modeling-capabilities-and-entitlements">
      <name>Modeling Capabilities and Entitlements</name>
      <t>The model is intended to facilitate information on all capabilities and entitlements associated with a set of inventoried assets under the same inventory management. In scenarios where entitlements are tied to network elements, the element itself can provide this information. Alternatively, providers may support something similar to a license server, which could house comprehensive information regarding an organization's entitlements. Just by listing capabilities and entitlements, and reading their basic information, a NETCONF/RESTCONF client will be able to retrieve basic inventory information of available capabilities and existing entitlements.</t>
      <t>Note that the model uses lists based on classes on multiple parts to be able to extend functionality.</t>
      <t>(TBD: Provide examples of how this can be done in future releases of this document)</t>
      <t>Entitlements and features can be made available by means of  do not specifying which the assets (network elements or components) are actually assigned the entitlements, either through an installation or a similar operation. For this, we augment the network elements from the network-inventory [I-D.draft-ietf-ivy-network-inventory-yang-03] model with a new container called entitlement-information. This container holds information of the state of entitlements in the asset.</t>
      <section anchor="capabilities">
        <name>Capabilities</name>
        <t>Capabilities are modeled by augmenting "newtwork-element" in the "ietf-network-inventory" module in <xref target="BaseInventory"/> according to the following tree:</t>
        <artwork><![CDATA[
+--rw capabilities
   +--rw capability-class* [capability-class]
      +--rw capability-class                     identityref
      +--rw capability* [capability-id]
         +--rw capability-id                     string
         +--rw extended-feature-description?     string
         +--rw resource-description?             string
         +--rw resource-units?                   string
         +--rw resource-amount?                  int32
         +--rw supporting-entitlements
            +--rw entitlement* [entitlement-id]
            +--rw entitlement-id                 -> ../../../../../entitlements/entitlment/entitlement-id
            +--rw allowed?                       boolean
            +--rw in-use?                        boolean
            +--rw capability-restriction* [capability-restriction-id]
               +--rw capability-restriction-id   string
               +--rw component-id?               -> ../../../../../components/component/component-id
               +--rw description?                string
               +--rw resource-name?              string
               +--rw units?                      string
               +--rw max-value?                  int32
               +--rw current-value?              int32
]]></artwork>
        <t>The list of capabilities for a given element <bcp14>MAY</bcp14> contain all the associated capabilities provided by the element vendor for such an element, and <bcp14>MUST</bcp14> contain all the capabilities the network service provider operating the network element has acquired an entitlement for, independently of it being active or not.</t>
        <t>The capabilities of an inventoried asset may be restricted based on the availability of proper entitlements. An entitlement manager might be interested in the capabilities available to be use on the assets, and the capabilities that are available. The model includes this information by means of the "supporting-entitlements" list, that includes potential restrictions related to the status of the entitlement. This can help organizations stay informed about their entitlement usage and take necessary actions to prevent potential violations or overuse of capabilities.</t>
      </section>
      <section anchor="entitlements">
        <name>Entitlements</name>
        <t>As in the case of capabilities, entitlement modeling augments "newtwork-element" in the ietf-network-inventory module in <xref target="BaseInventory"/> according to the following tree:</t>
        <artwork><![CDATA[
+--rw entitlements
   +--rw entitlement* [eid]
   +--rw eid                                  string
   +--rw product-id?                          string
   +--rw state?                               entitlement-state-t
   +--rw renewal-profile
   |  +--rw activation-date?                  yang:date-and-time
   |  +--rw expiration-date?                  yang:date-and-time
   +--rw restrictions
   |  +--rw restriction* [restriction-id]
   |  +--rw restriction-id                    string
   |  +--rw description?                      string
   |  +--rw units?                            string
   |  +--rw max-value?                        int32
   |  +--rw current-value?                    int32
   +--rw parent-entitlement-uid?              -> ../entitlement/eid
   +--rw entitlement-attachment
      +--rw universal-access?   boolean
      +--rw holders!
         |  +--rw organizations_names
         |  |  +--rw organizations*           string
         |  +--rw users_names
         |     +--rw users*                   string
         +--rw assets
            +--rw elements
               +--rw network-elements*        string
               +--rw components
                  +--rw component* [network-element component-id]
                     +--rw network-element    string
                     +--rw component-id       string
]]></artwork>
        <t>Entitlements and assets are linked in the model in two ways. Entitlements might be attached to assets, and assets include (or have installed) entitlements. The former way addresses the case of a license server, while the latter considers an entitlement directly associated with the network element. An entitlement that is not included by any asset means that it is not being used.</t>
        <t>Entitlements may be listed in multiple assets. For instance, a license server, functioning as an asset, might list an entitlement, while the network element entitled by that license might also list it. Proper identification of entitlements is imperative to ensure consistency across systems, enabling monitoring systems to recognize when multiple assets list the same entitlement. Furthermore, there are cases where an authorized asset might not be aware of the covering license. Consider the scenario of a site license, wherein any device under the site may utilize a feature without explicit knowledge of the covering license. In such cases, asset awareness relies on management controls or a service license capable of listing it.</t>
      </section>
      <section anchor="entitlement-attachment">
        <name>Entitlement Attachment</name>
        <t>The "entitlement" container holds a container called "entitlement-attachement" which relates how the entitlement is operationally linked to holders or assets. Note that there is a difference between an entilement being attached to an asset and an entilement being installed in the asset. In the former, we mean that the license was issued only for one (or more) assets. Some licenses actually can be open but have a limited number of installation. Other licenses might be openly constraint to geography location. We are not dealing with these complex cases now, but the container can be expanded for this in the future.</t>
        <t>The model accommodates listing entitlements acquired by the organization but not yet applied or utilized by any actor/asset. For these pending entitlements, logistical constraints may arise in informing their existence, as there must be at least one element exporting the model that is aware of their existence.</t>
        <t>Some entitlements are inherently associated with a holder, such as organization or an user. For example, a software license might be directly attached to a user. Also, the use of a network device might come with a basic license provided solely to an organization. Some entitlements could be assigned to a more abstract description of holders, such as people under a jurisdiction or a geographical area. The model contains basic information about this, but it can be extended in the future to be more descriptive.</t>
        <t>While attachment is optional, the model should be capable of expressing attachment in various scenarios. The model can be expanded to list to which assets an entitlement is aimed for, when this link is more vague, such as a site license (e.g., assets located in a specific site), or more open licenses (e.g., free software for all users subscribed to a streaming platform).</t>
        <t>It is important to note that the current model does not provide information on whether an entitlement can be reassigned to other devices (e.g., fixed or floating license). Such scenarios fall under the "what if" category, which is not covered by this model.</t>
      </section>
      <section anchor="model-definition">
        <name>Model Definition</name>
        <t>TBP</t>
      </section>
    </section>
    <section anchor="use-cases">
      <name>Use cases</name>
      <t>This section will describe use cases, provide an example of how they could be modeled by the model, and show how each of the questions that we have explored in this draft can be answered by the model.</t>
      <t>(TBP in next versions)</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>(TBP)</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>(TBP)</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="BaseInventory">
          <front>
            <title>A Base YANG Data Model for Network Inventory</title>
            <author fullname="Chaode Yu" initials="C." surname="Yu">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Sergio Belotti" initials="S." surname="Belotti">
              <organization>Nokia</organization>
            </author>
            <author fullname="Jean-Francois Bouquier" initials="J." surname="Bouquier">
              <organization>Vodafone</organization>
            </author>
            <author fullname="Fabio Peruzzini" initials="F." surname="Peruzzini">
              <organization>TIM</organization>
            </author>
            <author fullname="Phil Bedard" initials="P." surname="Bedard">
              <organization>Cisco</organization>
            </author>
            <date day="28" month="February" year="2025"/>
            <abstract>
              <t>   This document defines a base YANG data model for network inventory.
   The scope of this base model is set to be application- and
   technology-agnostic.  However, the data model is designed with
   appropriate provisions to ease future augmentations with application-
   and technology-specific details.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ivy-network-inventory-yang-05"/>
        </reference>
      </references>
    </references>
    <?line 224?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>This document is based on work partially funded by the EU Horizon Europe projects ACROSS (grant 101097122), ROBUST-6G (grant 101139068), iTrust6G (grant 101139198), MARE (grant 101191436), and CYBERNEMO (grant 101168182).</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
