<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-mcd-ivy-entitlement-inventory-01" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.29.0 -->
  <front>
    <title abbrev="almo-entitlement-inventory">A YANG Module for Entitlement Inventory</title>
    <seriesInfo name="Internet-Draft" value="draft-mcd-ivy-entitlement-inventory-01"/>
    <author initials="M." surname="Palmero" fullname="Marisol Palmero">
      <organization>Independent</organization>
      <address>
        <email>marisol.ietf@gmail.com</email>
      </address>
    </author>
    <author initials="C." surname="Cardona" fullname="Camilo Cardona">
      <organization>NTT</organization>
      <address>
        <email>camilo@gin.ntt.net</email>
      </address>
    </author>
    <author initials="D." surname="Lopez" fullname="Diego Lopez">
      <organization>Telefonica</organization>
      <address>
        <email>diego.r.lopez@telefonica.com</email>
      </address>
    </author>
    <date year="2025" month="July" day="07"/>
    <area>Operations and Management</area>
    <workgroup>Network Inventory YANG WG</workgroup>
    <keyword>inventory</keyword>
    <keyword>capability</keyword>
    <keyword>entitlement</keyword>
    <keyword>licensing</keyword>
    <abstract>
      <?line 44?>

<t>This document proposes a YANG module for incorporating entitlements in a network inventory of entitlements. Entitlements define the rights for their holder to use specific capabilities in a network element(s). The model is rooted by the concept of the capabilities offered by an element, enabled by the held entitlements, and considers entitlement scope, how they are assigned, and when they expire. The model introduces a descriptive definition of capabilities and the entitlement use restrictions, supporting entitlement administration and the understanding of the capabilities available through the network.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://dr2lopez.github.io/ivy-capability-entitlement/draft-mcd-ivy-entitlement-inventory.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-mcd-ivy-entitlement-inventory/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Network Inventory YANG WG Working Group mailing list (<eref target="mailto:inventory-yang@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/inventory-yang/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/inventory-yang/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/dr2lopez/ivy-capability-entitlement"/>.</t>
    </note>
  </front>
  <middle>
    <?line 48?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The goal of any network elements included as assets in the inventory of any network service provider or enterprise is to leverage their capabilities to build network services. Many of these capabilities are not automatically enabled upon acquisition; their use may require specific rights—typically provided via entitlements or licenses from the vendor.</t>
      <t>The primary intent of this draft is to support three key operational use cases in managing software entitlements and network capabilities:</t>
      <ul spacing="normal">
        <li>
          <t>Listing entitlements (e.g., licenses) available across the organization, their holders, and applicable scope.</t>
        </li>
        <li>
          <t>Modeling the capabilities that entitlements permit or enable, representing what a device can do when properly licensed.</t>
        </li>
        <li>
          <t>Representing the actual use of capabilities, including any active restrictions or limits defined by the associated entitlements.</t>
        </li>
      </ul>
      <t>Together, these use cases enable administrators to answer essential questions such as: What can this device do? What is it currently allowed to do? And what is it actively doing within the bounds of licensing or entitlement constraints? This approach supports not only entitlement tracking but also intent-aware control of device behavior and resource exposure.</t>
      <t>As network technology evolves toward modular, software-defined, and virtualized architectures, managing the rights to activate specific functions becomes increasingly complex. These rights granted via entitlements or licenses must be tracked, aggregated, and matched to assets to ensure that services can be delivered using available capabilities. This complexity calls for structured, machine-readable models that represent which capabilities are available, permitted, and in use.</t>
      <t>To address this, the model relies on two core concepts: capability and entitlement. A capability represents what a system or component can do; an entitlement grants permission to use one or more of those capabilities, possibly under constraints such as time, scope, or usage limits. Being able to represent and exchange this information across systems helps automate entitlement administration and simplify operational decisions.</t>
      <t>This draft provides a foundational YANG structure for representing these relationships in a standard, vendor neutral way, complementing the network inventory module.</t>
      <section anchor="scope-of-the-entitlement-model">
        <name>Scope of the Entitlement Model</name>
        <t>The entitlement model aims to provide an inventory of entitlements. This includes the entitled holders and the capabilities to which they are entitled. Additionally, it offers information into the restrictions of the operation of the different assets (network entities and components). In general, this model seeks to address the following questions:</t>
        <ul spacing="normal">
          <li>
            <t>What entitlements are administered/owned by the organization?</t>
          </li>
          <li>
            <t>How are entitlements restricted to some assets and holders?</t>
          </li>
          <li>
            <t>What entitlements are assigned or installed on each asset(s)?</t>
          </li>
          <li>
            <t>What constraints do the current entitlements impose on the assets' functionality?</t>
          </li>
          <li>
            <t>Does the entitlement impose any kind of global restrictions? What are they?</t>
          </li>
          <li>
            <t>What are the restrictions that each asset due to the entitlements it holds?</t>
          </li>
        </ul>
        <t>The model is designed with flexibility in mind, allowing for expansion through the utilization of tools provided by YANG.</t>
        <t>The realm of entitlements and licensing is inherently complex, presenting challenges in creating a model that can comprehensively encompass all scenarios without ambiguity. While we attempt to address various situations through examples and use cases, we acknowledge that the model might not be able to cover all corner cases without ambiguity. In such cases, we recommend that implementations provide additional documentation to clarify those potential ambiguities. The current model does not aim to serve as a catalog of licenses. While it may accommodate basic scenarios, it does not aim to cover the full spectrum of license characteristics, which can vary significantly. Instead, our focus is on providing a general framework for describing relationships and answering the questions posed above.</t>
        <t>With the aim of clarifying the model scope, here are some questions that our model does not attempt to answer:</t>
        <ul spacing="normal">
          <li>
            <t>What are the implications of purchasing a specific entitlement?</t>
          </li>
          <li>
            <t>Which entitlement should I acquire to get a specific capability?</t>
          </li>
          <li>
            <t>Is license migration feasible?</t>
          </li>
          <li>
            <t>What capabilities will be allowed if I install an entitlement in a specific device?</t>
          </li>
          <li>
            <t>Features or restrictions that depend on each user. We are not covering this in the current version of this document, but it could be done if we expand the holders' identification.</t>
          </li>
        </ul>
        <t>This model focuses on the ability to use capabilities, not on access control mechanisms. For example, if a router cannot enable MPLS due to entitlement restrictions, it means the organization lacks the rights to use that capability—even if access to the device itself is available. This distinction is separate from, for instance, the ability of a specific user to configure MPLS due to access control limitations.</t>
      </section>
      <section anchor="pre-provisioned-vs-discovered-entitlements">
        <name>Pre-Provisioned vs. Discovered Entitlements</name>
        <t>This model is not intended for automatic discovery of entitlements or capabilities through the network elements themselves. Instead, it assumes that entitlements and their associations are either:</t>
        <ul spacing="normal">
          <li>
            <t>Provisioned in a license server or asset database;</t>
          </li>
          <li>
            <t>Installed on individual devices and reported through management interfaces; or</t>
          </li>
          <li>
            <t>Manually configured as part of an inventory process.</t>
          </li>
        </ul>
        <t>Future augmentations may explore capability discovery or telemetry driven models, but they are out of scope for the current version.</t>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<ul spacing="normal">
        <li>
          <t>TBU Open Issue for the IVY WG, to include:</t>
        </li>
      </ul>
      <t>(Update Glossary for Network Inventory draft. We need at least formal definitions of "capability" and "entitlement")</t>
      <ul spacing="normal">
        <li>
          <t>Capability: A function or resource that a network element can support or execute.</t>
        </li>
        <li>
          <t>Entitlement: A right granted to a holder (organization or user) to access or activate specific capabilities under defined conditions.</t>
        </li>
      </ul>
    </section>
    <section anchor="modeling-capabilities-and-entitlements">
      <name>Modeling Capabilities and Entitlements</name>
      <t>The model describes how to represent capabilities and the entitlements that enable them across inventoried assets. Capabilities describe what a device can do. Entitlements indicate whether those capabilities are allowed and under what conditions.</t>
      <t>In deployments where entitlements are directly associated with specific network elements, the devices themselves may expose entitlement information. Alternatively, some environments may rely on a centralized license server that maintains the entitlements of an organization. By querying the list of capabilities and entitlements, along with their associated metadata, a NETCONF or RESTCONF client can retrieve essential inventory details about what capabilities are available and which entitlements are currently in place.</t>
      <t>Note that the model uses lists based on classes on multiple parts to be able to extend functionality.</t>
      <t>(TBD: Provide examples of how this can be done in future releases of this document)</t>
      <t>Capabilities and entitlements may be listed without explicitly identifying the assets (network elements or components) they apply to. To support assignment, the network inventory <xref target="BaseInventory"/> should be augmented with two new containers referred as capabilities and entitlements. These containers hold information of the state of capabilities and entitlements in the asset(s).</t>
      <section anchor="capabilities">
        <name>Capabilities</name>
        <t>Capabilities are modeled by augmenting "network-element" in the "ietf-network-inventory" module in <xref target="BaseInventory"/> according to the following tree:</t>
        <artwork><![CDATA[
+--rw capabilities
   +--rw capability-class* [capability-class]
      +--rw capability-class                     identityref
      +--rw capability* [capability-id]
         +--rw capability-id                     string
         +--rw extended-capability-description?     string
         +--rw resource-description?             string
         +--rw resource-units?                   string
         +--rw resource-amount?                  int32
         +--rw supporting-entitlements
            +--rw entitlement* [entitlement-id]
            +--rw entitlement-id                 -> ../../../../../entitlements/entitlment/entitlement-id
            +--rw allowed?                       boolean
            +--rw in-use?                        boolean
            +--rw capability-restriction* [capability-restriction-id]
               +--rw capability-restriction-id   string
               +--rw component-id?               -> ../../../../../components/component/component-id
               +--rw description?                string
               +--rw resource-name?              string
               +--rw units?                      string
               +--rw max-value?                  int32
               +--rw current-value?              int32
]]></artwork>
        <t>For any given element, the capabilities list <bcp14>MAY</bcp14> include all potential capabilities advertised by the vendor, and <bcp14>MUST</bcp14> include those for which the network operator holds a valid entitlement—whether active or not.</t>
        <t>The capabilities of an inventoried asset may be restricted based on the availability of proper entitlements. An entitlement manager might be interested in the capabilities available to be use on the assets, and the capabilities that are available. The model includes this information by means of the "supporting entitlements" list, that includes potential restrictions related to the status of the entitlement. This allows organizations to monitor entitlement usage and avoid misconfigurations or exceeding permitted capability limits.</t>
      </section>
      <section anchor="entitlements">
        <name>Entitlements</name>
        <t>As in the case of capabilities, entitlement modeling augments "network-element" in the ietf-network-inventory module in <xref target="BaseInventory"/> according to the following tree:</t>
        <artwork><![CDATA[
+--rw entitlements
   +--rw entitlement* [eid]
   +--rw eid                                  string
   +--rw product-id?                          string
   +--rw state?                               entitlement-state-t
   +--rw renewal-profile
   |  +--rw activation-date?                  yang:date-and-time
   |  +--rw expiration-date?                  yang:date-and-time
   +--rw restrictions
   |  +--rw restriction* [restriction-id]
   |  +--rw restriction-id                    string
   |  +--rw description?                      string
   |  +--rw units?                            string
   |  +--rw max-value?                        int32
   |  +--rw current-value?                    int32
   +--rw parent-entitlement-uid?              -> ../entitlement/eid
   +--rw entitlement-attachment
      +--rw universal-access?   boolean
      +--rw holders!
         |  +--rw organizations_names
         |  |  +--rw organizations*           string
         |  +--rw users_names
         |     +--rw users*                   string
         +--rw assets
            +--rw elements
               +--rw network-elements*        string
               +--rw components
                  +--rw component* [network-element component-id]
                     +--rw network-element    string
                     +--rw component-id       string
]]></artwork>
        <t>Entitlements and assets are linked in the model in two ways. Entitlements might be attached to assets, and assets include (or have installed) entitlements. The former way addresses the case of a license server, while the latter considers an entitlement directly associated with the network element. An entitlement that is not included by any asset means that it is not being used.</t>
        <t>Entitlements may be listed in multiple assets. For instance, a license server, functioning as an asset, might list an entitlement, while the network element entitled by that license might also list it. Proper identification of entitlements is imperative to ensure consistency across systems, enabling monitoring systems to recognize when multiple assets list the same entitlement. Furthermore, there are cases where an authorized asset might not be aware of the covering license. Consider the scenario of a site license, wherein any device under the site may utilize a feature without explicit knowledge of the covering license. In such cases, asset awareness relies on management controls or a service license capable of listing it.</t>
        <section anchor="reverse-mapping-from-entitlements-to-capabilities">
          <name>Reverse Mapping from Entitlements to Capabilities</name>
          <t>While the model includes links from capabilities to supporting entitlements, some inventory operators may need to evaluate entitlements independently and identify the capabilities they enable.</t>
          <t>To support this, implementers may use the <tt>product-id</tt> or <tt>capability-class</tt> metadata along with external references or catalogs. A reverse mapping structure may be introduced in a future version of the model, once a reliable binding syntax for entitlement to capability is standardized.</t>
        </section>
      </section>
      <section anchor="entitlement-attachment">
        <name>Entitlement Attachment</name>
        <t>The "entitlement" container holds a container called "entitlement-attachment" which relates how the entitlement is operationally linked to holders or assets. Note that there is a difference between an entitlement being attached to an asset and an entitlement being installed in the asset. In the former, the license was explicitly associated with one or more assets. Some licenses actually can be open but have a limited number of installation. Other licenses might be openly constrained to a geographic location. We are not dealing with these complex cases now, but the container can be expanded for this in the future.</t>
        <t>The model accommodates listing entitlements acquired by the organization but not yet applied or utilized by any actor/asset. For these pending entitlements, logistical constraints may arise in informing their existence, as there must be at least one element exporting the model that is aware of their existence.</t>
        <t>Some entitlements are inherently associated with a holder, such as organization or a user. For example, a software license might be directly attached to a user. Also, the use of a network device might come with a basic license provided solely to an organization. Some entitlements could be assigned to a more abstract description of holders, such as people under a jurisdiction or a geographical area. The model contains basic information about this, but it can be extended in the future to be more descriptive.</t>
        <t>While attachment is optional, the model should be capable of expressing attachment in various scenarios. The model can be expanded to list to which assets an entitlement is aimed for, when this link is more vague, such as a site license (e.g., assets located in a specific site), or more open licenses (e.g., free software for all users subscribed to a streaming platform).</t>
        <t>It is important to note that the current model does not provide information on whether an entitlement can be reassigned to other devices (e.g., fixed or floating license). Such scenarios fall under the "what if" category, which is not covered by this model.</t>
      </section>
      <section anchor="model-definition">
        <name>Model Definition</name>
        <t>TBP</t>
      </section>
      <section anchor="read-only-vs-read-write-model-segmentation">
        <name>Read-Only vs. Read-Write Model Segmentation</name>
        <t>Not all elements in the entitlement model are expected to be configurable. The current YANG tree uses <tt>rw</tt> extensively for structural convenience. However, in many real-world use cases, entitlement and capability data will be read-only from the device or management system perspective.</t>
        <t>Data can be classified as follows:</t>
        <ul spacing="normal">
          <li>
            <t><strong>Read-only (ro)</strong>: Installed entitlements, current-value/max-value, expiration timestamps, holder details.</t>
          </li>
          <li>
            <t><strong>Read-write (rw)</strong>: Static description of capabilities and manually registered licenses.</t>
          </li>
        </ul>
        <t>Future revisions may refactor the model to more accurately reflect configuration vs. operational state using <tt>config false</tt> statements.</t>
      </section>
    </section>
    <section anchor="use-cases-and-examples">
      <name>Use cases and Examples</name>
      <t>This section describes use cases, provide an example of how they could be modeled by the model, and show how each of the questions that we have explored in this draft can be answered by the model.</t>
      <section anchor="mpls-capability-license-on-a-network-os">
        <name>MPLS Capability License on a Network OS</name>
        <t>An operator installs a software license (entitlement) enabling MPLS routing on a NOS. The license is attached to a specific device and activates the "mpls-routing" capability class.</t>
        <artwork><![CDATA[
json
"entitlement": {
  "eid": "mpls-license-001",
  "product-id": "mpls-software-lic-v2",
  "renewal-profile": {
    "activation-date": "2025-01-01T00:00:00Z",
    "expiration-date": "2026-01-01T00:00:00Z"
  },
  "entitlement-attachment": {
    "holders": {
      "organizations_names": {
        "organizations": ["ACME Corp"]
      },
      "assets": {
        "elements": {
          "network-elements": ["router-5"]
        }
      }
    }
  }
}

"capability": {
  "capability-id": "mpls-routing",
  "capability-class": "routing",
  "supporting-entitlements": {
    "entitlement": [
      {
        "entitlement-id": "mpls-license-001",
        "allowed": true,
        "in-use": true
      }
    ]
  }
}
]]></artwork>
      </section>
      <section anchor="bandwidth-upgrade-via-license">
        <name>Bandwidth Upgrade via License</name>
        <t>A vendor-N device uses a capacity license to expand throughput.</t>
        <artwork><![CDATA[
json
"entitlement": {
  "eid": "vendorN-bw-10g",
  "product-id": "vendorN-bw-upgrade",
  "restrictions": {
    "restriction": [
      {
        "restriction-id": "cap",
        "description": "Bandwidth cap",
        "units": "Gbps",
        "max-value": 10,
        "current-value": 6
      }
    ]
  }
}

"capability": {
  "capability-id": "bw-capability",
  "resource-description": "Licensed bandwidth",
  "resource-units": "Gbps",
  "resource-amount": 10,
  "supporting-entitlements": {
    "entitlement": [
      {
        "entitlement-id": "vendorN-bw-10g",
        "allowed": true,
        "in-use": true
      }
    ]
  }
}
]]></artwork>
      </section>
      <section anchor="floating-license-managed-by-license-server">
        <name>Floating License Managed by License Server</name>
        <t>A shared entitlement is held by a license server and consumed dynamically by multiple switches.</t>
        <artwork><![CDATA[
json
"entitlement": {
  "eid": "shared-switch-license-1",
  "entitlement-attachment": {
    "universal-access": true,
    "holders": {
      "organizations_names": {
        "organizations": ["NTT"]
      }
    },
    "assets": {
      "elements": {
        "network-elements": ["switch-1", "switch-2", "switch-3"]
      }
    }
  }
}
]]></artwork>
        <t>This entitlement may be tracked across devices using a <tt>license server</tt> asset that records usage or seat count (future extension).</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>(TBP)</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>(TBP)</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="BaseInventory">
          <front>
            <title>A Base YANG Data Model for Network Inventory</title>
            <author fullname="Chaode Yu" initials="C." surname="Yu">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Sergio Belotti" initials="S." surname="Belotti">
              <organization>Nokia</organization>
            </author>
            <author fullname="Jean-Francois Bouquier" initials="J." surname="Bouquier">
              <organization>Vodafone</organization>
            </author>
            <author fullname="Fabio Peruzzini" initials="F." surname="Peruzzini">
              <organization>FiberCop</organization>
            </author>
            <author fullname="Phil Bedard" initials="P." surname="Bedard">
              <organization>Cisco</organization>
            </author>
            <date day="7" month="July" year="2025"/>
            <abstract>
              <t>   This document defines a base YANG data model for network inventory.
   The scope of this base model is set to be application- and
   technology-agnostic.  The base data model can be augmented with
   application- and technology-specific details.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ivy-network-inventory-yang-07"/>
        </reference>
      </references>
    </references>
    <?line 378?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>This document is based on work partially funded by the EU Horizon Europe projects ACROSS (grant 101097122), ROBUST-6G (grant 101139068), iTrust6G (grant 101139198), MARE (grant 101191436), and CYBERNEMO (grant 101168182).</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
