<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-mcd-ivy-entitlement-inventory-02" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.30.0 -->
  <front>
    <title abbrev="almo-entitlement-inventory">A YANG Module for Entitlement Inventory</title>
    <seriesInfo name="Internet-Draft" value="draft-mcd-ivy-entitlement-inventory-02"/>
    <author initials="M." surname="Palmero" fullname="Marisol Palmero">
      <organization>Independent</organization>
      <address>
        <email>marisol.ietf@gmail.com</email>
      </address>
    </author>
    <author initials="C." surname="Cardona" fullname="Camilo Cardona">
      <organization>NTT</organization>
      <address>
        <email>camilo@gin.ntt.net</email>
      </address>
    </author>
    <author initials="D." surname="Lopez" fullname="Diego Lopez">
      <organization>Telefonica</organization>
      <address>
        <email>diego.r.lopez@telefonica.com</email>
      </address>
    </author>
    <date year="2025" month="July" day="23"/>
    <area>Operations and Management</area>
    <workgroup>Network Inventory YANG WG</workgroup>
    <keyword>inventory</keyword>
    <keyword>capability</keyword>
    <keyword>entitlement</keyword>
    <keyword>licensing</keyword>
    <abstract>
      <?line 44?>

<t>This document proposes a YANG module for incorporating entitlements in a network inventory. Entitlements define the rights for their holder to use specific capabilities in a network element(s). The model is rooted by the concept of the capabilities offered by a network element, enabled by the held entitlements, and considers entitlement scope, how they are assigned, and when they expire. The model introduces a descriptive definition of capabilities and the entitlement use restrictions, supporting entitlement administration and the understanding of the capabilities available through the network.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://dr2lopez.github.io/ivy-capability-entitlement/draft-mcd-ivy-entitlement-inventory.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-mcd-ivy-entitlement-inventory/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Network Inventory YANG WG Working Group mailing list (<eref target="mailto:inventory-yang@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/inventory-yang/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/inventory-yang/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/dr2lopez/ivy-capability-entitlement"/>.</t>
    </note>
  </front>
  <middle>
    <?line 48?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The goal of any network elements included as assets in the inventory of any network service provider or enterprise is to leverage their capabilities to build network services. Many of these capabilities are not automatically enabled upon acquisition; their use may require specific rights—typically provided via entitlements or licenses from the vendor.</t>
      <t>The primary intent of this draft is to support three key operational use cases in managing software entitlements and network capabilities:</t>
      <ul spacing="normal">
        <li>
          <t>Listing entitlements (e.g., licenses) available across the organization, their holders, and applicable scope.</t>
        </li>
        <li>
          <t>Modeling the capabilities that entitlements permit or enable, representing what a device can do when properly licensed.</t>
        </li>
        <li>
          <t>Representing the actual use of capabilities, including any active restrictions or limits defined by the associated entitlements.</t>
        </li>
      </ul>
      <t>Together, these use cases enable administrators to answer essential questions such as: What can this device do? What is it currently allowed to do? And what is it actively doing within the bounds of licensing or entitlement constraints? This approach supports not only entitlement tracking but also intent-aware control of device behavior and resource exposure.</t>
      <t>As network technology evolves toward modular, software-defined, and virtualized architectures, managing the rights to activate specific functions becomes increasingly complex. These rights granted via entitlements or licenses must be tracked, aggregated, and matched to assets to ensure that services can be delivered using available capabilities. This complexity calls for structured, machine-readable models that represent which capabilities are available, permitted, and in use.</t>
      <t>To address this, the model relies on two core concepts: capability and entitlement. A capability represents what a system or component can do; an entitlement grants permission to use one or more of those capabilities, possibly under constraints such as time, scope, or usage limits. Being able to represent and exchange this information across systems helps automate entitlement administration and simplify operational decisions.</t>
      <t>This draft provides a foundational YANG structure for representing these relationships in a standard, vendor neutral way, complementing the network inventory module.</t>
      <section anchor="scope-of-the-entitlement-model">
        <name>Scope of the Entitlement Model</name>
        <t>The entitlement model aims to provide an inventory of entitlements. This includes the entitled holders and the capabilities to which they are entitled. Additionally, it offers information into the restrictions of the operation of the different assets (network entities and components). In general, this model seeks to address the following questions:</t>
        <ul spacing="normal">
          <li>
            <t>What entitlements are administered/owned by the organization?</t>
          </li>
          <li>
            <t>How are entitlements restricted to some assets and holders?</t>
          </li>
          <li>
            <t>What entitlements are installed on each network element?</t>
          </li>
          <li>
            <t>What constraints do the current installed entitlements impose on the network elements' functionality?</t>
          </li>
          <li>
            <t>Does the entitlement impose any kind of global restrictions? What are they?</t>
          </li>
          <li>
            <t>What are the restrictions that each network element has due to the entitlements it holds locally?</t>
          </li>
        </ul>
        <t>The model is designed with flexibility in mind, allowing for expansion through the utilization of tools provided by YANG.</t>
        <t>The realm of entitlements and licensing is inherently complex, presenting challenges in creating a model that can comprehensively encompass all scenarios without ambiguity. While we attempt to address various situations through examples and use cases, we acknowledge that the model might not be able to cover all corner cases without ambiguity. In such cases, we recommend that implementations provide additional documentation to clarify those potential ambiguities. The current model does not aim to serve as a catalog of licenses. While it may accommodate basic scenarios, it does not aim to cover the full spectrum of license characteristics, which can vary significantly. Instead, our focus is on providing a general framework for describing relationships and answering the questions posed above.</t>
        <t>With the aim of clarifying the model scope, here are some questions that our model does not attempt to answer:</t>
        <ul spacing="normal">
          <li>
            <t>What are the implications of purchasing a specific entitlement?</t>
          </li>
          <li>
            <t>Which entitlement should I acquire to get a specific capability?</t>
          </li>
          <li>
            <t>Is license migration feasible?</t>
          </li>
          <li>
            <t>What capabilities will be allowed if I install an entitlement in a specific device?</t>
          </li>
          <li>
            <t>Features or restrictions that depend on each user. We are not covering this in the current version of this document, but it could be done if we expand the holders' identification.</t>
          </li>
        </ul>
        <t>This model focuses on the ability to use capabilities, not on access control mechanisms. For example, if a router cannot enable MPLS due to entitlement restrictions, it means the organization lacks the rights to use that capability—even if access to the device itself is available. This distinction is separate from, for instance, the ability of a specific user to configure MPLS due to access control limitations.</t>
      </section>
      <section anchor="pre-provisioned-vs-discovered-entitlements">
        <name>Pre-Provisioned vs. Discovered Entitlements</name>
        <t>This model is not intended for automatic discovery of entitlements or capabilities through the network elements themselves. Instead, it assumes that entitlements and their associations are either:</t>
        <ul spacing="normal">
          <li>
            <t>Provisioned in a license server or asset database;</t>
          </li>
          <li>
            <t>Installed on individual devices and reported through management interfaces; or</t>
          </li>
          <li>
            <t>Manually configured as part of an inventory process.</t>
          </li>
        </ul>
        <t>Future augmentations may explore capability discovery or telemetry driven models, but they are out of scope for the current version.</t>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<ul spacing="normal">
        <li>
          <t>TBU Open Issue for the IVY WG, to include:</t>
        </li>
      </ul>
      <t>(Update Glossary for Network Inventory draft. We need at least formal definitions of "capability" and "entitlement")</t>
      <ul spacing="normal">
        <li>
          <t>Capability: A function or resource that a network element can support or execute.</t>
        </li>
        <li>
          <t>Entitlement: A right granted to a holder (organization or user) to access or activate specific capabilities under defined conditions.</t>
        </li>
      </ul>
    </section>
    <section anchor="modeling-capabilities-and-entitlements">
      <name>Modeling Capabilities and Entitlements</name>
      <t>The model describes how to represent capabilities and the entitlements that enable them across inventoried network elements. Capabilities describe what a device can do. Entitlements indicate whether those capabilities are allowed and under what conditions.</t>
      <t>In deployments where entitlements are directly associated with specific network elements, the devices themselves may expose entitlement information. Alternatively, some environments may rely on a centralized license server that maintains the entitlements of an organization. By querying the list of capabilities and entitlements, along with their associated metadata, a NETCONF or RESTCONF client can retrieve essential inventory details about what capabilities are available and which entitlements are currently in place.</t>
      <t>Note that the model uses lists based on classes on multiple parts to be able to extend functionality.</t>
      <t>(TBD: Provide examples of how this can be done in future releases of this document)</t>
      <t>Entitlements may be listed without explicitly identifying the assets (network elements or components) they apply to. Entitlements are defined directly under the network-inventory container for organizational management. Entitlements are linked to network-elements in multiple ways: (1) When entitlements are created for specific network-elements (i.e. they should only be installed on those), then those network elements are specified under the entitlement element's attachment section. (2) When an entitlement is installed in a network-element, it appears in the network-element's installed-entitlements list. (3) When an installed entitlement enables capabilities, the network-element's capabilities will reference the installed entitlement via the supporting-entitlements list.</t>
      <t>Capabilities, restrictions and the entitlements supporting them within a network element are defined under the network-element under the container "capabilities".</t>
      <section anchor="capabilities">
        <name>Capabilities</name>
        <t>Capabilities are modeled by augmenting "network-element" in the "ietf-network-inventory" module in <xref target="BaseInventory"/> according to the following tree:</t>
        <artwork><![CDATA[
+--ro capabilities
   +--ro capability-class* [capability-class]
      +--ro capability-class                     identityref
      +--ro capability* [capability-id]
         +--ro capability-id                     string
         +--ro extended-capability-description?     string
         +--ro resource-description?             string
         +--ro resource-units?                   string
         +--ro resource-amount?                  int32
         +--ro supporting-entitlements
            +--ro entitlement* [entitlement-id]
            +--ro entitlement-id                 -> ../../../installed-entitlements/entitlement/eid
            +--ro allowed?                       boolean
            +--ro in-use?                        boolean
            +--ro capability-restriction* [capability-restriction-id]
               +--ro capability-restriction-id   string
               +--ro component-id?               -> ../../../../../components/component/component-id
               +--ro description?                string
               +--ro resource-name?              string
               +--ro units?                      string
               +--ro max-value?                  int32
               +--ro current-value?              int32
]]></artwork>
        <t>For any given network element, the capabilities list <bcp14>MAY</bcp14> include all potential capabilities advertised by the vendor, and <bcp14>MUST</bcp14> include those for which the network operator holds a valid entitlement—whether active or not.</t>
        <t>The capabilities of an inventoried network element may be restricted based on the availability of proper entitlements. An entitlement manager might be interested in the capabilities available to be used on the network elements, and the capabilities that are currently available. The model includes this information by means of the "supporting entitlements" list, which references locally installed entitlements and includes potential restrictions related to the status of the entitlement. This allows organizations to monitor entitlement usage and avoid misconfigurations or exceeding permitted capability limits.</t>
      </section>
      <section anchor="entitlements">
        <name>Entitlements</name>
        <t>The entitlement modeling augments "network-inventory" in the ietf-network-inventory module in <xref target="BaseInventory"/> with a top-level entitlements container according to the following tree:</t>
        <t>Figure 1 depicts the relationship between the Entitlement Inventory model and other models. The Entitlement Inventory model enhances the model defined in the base network inventory model with entitlement-specific attributes and centralized entitlement management capabilities.</t>
        <artwork><![CDATA[
   +----------------------+
   |                      |
   |Base Network Inventory|
   |                      |
   +----------+-----------+
              ^
              |
   +----------+-----------+
   |                      |
   | Entitlement Inventory|
   |  e.g., licenses,     |
   |  capabilities,       |
   |  restrictions        |
   +----------------------+

      Figure 1: Relationship of Entitlement Inventory Model to Other
                              Inventory Models
]]></artwork>
        <artwork><![CDATA[
+--ro entitlements
   +--ro entitlement* [eid]
   +--ro eid                                  string
   +--ro product-id?                          string
   +--ro state?                               entitlement-state-t
   +--ro renewal-profile
   |  +--ro activation-date?                  yang:date-and-time
   |  +--ro expiration-date?                  yang:date-and-time
   +--ro restrictions
   |  +--ro restriction* [restriction-id]
   |  +--ro restriction-id                    string
   |  +--ro description?                      string
   |  +--ro units?                            string
   |  +--ro max-value?                        int32
   |  +--ro current-value?                    int32
   +--ro parent-entitlement-uid?              -> ../entitlement/eid
   +--ro entitlement-attachment
      +--ro universal-access?   boolean
      +--ro holders
      |  +--ro organizations_names
      |  |  +--ro organizations*           string
      |  +--ro users_names
      |     +--ro users*                   string
      +--ro assets
         +--ro elements
            +--ro network-elements*        -> /network-inventory/network-elements/network-element/ne-id
            +--ro components
               +--ro component* [network-element component-id]
                  +--ro network-element    -> /network-inventory/network-elements/network-element/ne-id
                  +--ro component-id       -> /network-inventory/network-elements/network-element/components/component/component-id
]]></artwork>
        <t>Entitlements and network elements are linked in the model in multiple ways. Entitlements at the network-inventory level might be attached to network elements through their attachment mechanism, representing organizational entitlements. Network elements have their own installed-entitlements that may be derived from the centralized entitlements or installed directly. The capabilities of network elements reference these locally installed entitlements through their supporting-entitlements lists. The former addresses the case of a centralized license server or inventory system, while the latter represents entitlements that are locally available and actively used by the network element's capabilities. An installed entitlement that is not referenced by any network element capability means that it is available locally but not currently in use.</t>
        <t>Entitlements are managed both centrally at the network-inventory level and locally within network elements through installed-entitlements. Network elements utilize locally installed entitlements and reference them through their capabilities' supporting-entitlements lists. For instance, a license server or inventory system might list an entitlement at the top level, which then gets installed on specific network elements where the capabilities reference the local copy. The "parent-entitlement-uid" field in installed entitlements provides traceability back to centralized entitlements when applicable. Proper identification of entitlements is imperative to ensure consistency across systems, enabling monitoring systems to recognize when multiple locations reference related entitlements. Furthermore, there are cases where an authorized network element might have locally installed entitlements without explicit knowledge of the covering organizational license. Consider the scenario of a site license, wherein any device under the site may utilize a feature through locally installed entitlements derived from the site-wide license. In such cases, the parent-entitlement-uid maintains the connection to the organizational entitlement policy.</t>
        <section anchor="reverse-mapping-from-entitlements-to-capabilities">
          <name>Reverse Mapping from Entitlements to Capabilities</name>
          <t>While the model includes links from capabilities to supporting entitlements, some inventory operators may need to evaluate entitlements independently and identify the capabilities they enable.</t>
          <t>To support this, implementers may use the "product-id" or "capability-class" metadata along with external references or catalogs. A reverse mapping structure may be introduced in a future version of the model, once a reliable binding syntax for entitlement to capability is standardized.</t>
        </section>
      </section>
      <section anchor="entitlement-attachment">
        <name>Entitlement Attachment</name>
        <t>The "entitlement" container holds a container called "entitlement-attachment" which relates how the entitlement is operationally linked to holders or network elements. Note that there is a difference between an entitlement being attached to a network element and an entitlement being installed in the network element. In the former, the license was explicitly associated with one or more network elements. Some licenses actually can be open but have a limited number of installation. Other licenses might be openly constrained to a geographic location. We are not dealing with these complex cases now, but the container can be expanded for this in the future.</t>
        <t>The model accommodates listing entitlements acquired by the organization but not yet applied or utilized by any actor/asset at the network-inventory level. For these pending entitlements, they can be managed centrally without requiring individual network elements to be aware of their existence.</t>
        <t>Some entitlements are inherently associated with a holder, such as organization or a user. For example, a software license might be directly attached to a user. Also, the use of a network device might come with a basic license provided solely to an organization. Some entitlements could be assigned to a more abstract description of holders, such as people under a jurisdiction or a geographical area. The model contains basic information about this, but it can be extended in the future to be more descriptive.</t>
        <t>While attachment is optional, the model should be capable of expressing attachment in various scenarios. The model can be expanded to list to which network elements an entitlement is aimed for, when this link is more vague, such as a site license (e.g., network elements located in a specific site), or more open licenses (e.g., free software for all users subscribed to a streaming platform).</t>
        <t>It is important to note that the current model does not provide information on whether an entitlement can be reassigned to other network elements. Such scenarios fall under the "what if" category, which is not covered by this model.</t>
      </section>
      <section anchor="installed-entitlements">
        <name>Installed Entitlements</name>
        <t>Since capabilities are optional in network elements, the model also provides an augmentation to track entitlements that are installed directly on network elements. This augmentation of "network-element" in the "ietf-network-inventory" module provides local entitlement storage according to the following tree:</t>
        <artwork><![CDATA[
+--ro installed-entitlements
   +--ro entitlement* [eid]
   +--ro eid                                  -> /network-inventory/entitlements/entitlement/eid
]]></artwork>
        <t>The installed entitlements represent references to entitlements that are locally present on the network element. The "eid" field provides a direct reference to the centralized entitlement at the network-inventory level.</t>
        <t>This structure allows network elements to operate independently of centralized entitlement management while maintaining the ability to track relationships to organization-wide entitlement policies.</t>
      </section>
      <section anchor="model-definition">
        <name>Model Definition</name>
        <t>TBP</t>
      </section>
    </section>
    <section anchor="use-cases-and-examples">
      <name>Use cases and Examples</name>
      <t>This section describes use cases, provide an example of how they could be modeled by the model, and show how each of the questions that we have explored in this draft can be answered by the model.</t>
      <section anchor="mpls-capability-license-on-a-network-os">
        <name>MPLS Capability License on a Network OS</name>
        <t>An operator installs a software license (entitlement) enabling MPLS routing on a NOS. The license is attached to a specific network element and activates the "mpls-routing" capability class.</t>
        <t>Complete example showing network inventory augmented with entitlements:</t>
        <artwork><![CDATA[
json
{
  "ietf-network-inventory:network-inventory": {
    "entitlements": {
      "entitlement": [
        {
          "eid": "mpls-license-001",
          "product-id": "mpls-software-lic-v2",
          "state": "active",
          "renewal-profile": {
            "activation-date": "2025-01-01T00:00:00Z",
            "expiration-date": "2026-01-01T00:00:00Z"
          },
          "entitlement-attachment": {
            "holders": {
              "organizations_names": {
                "organizations": ["ACME Corp"]
              }
            },
            "assets": {
              "elements": {
                "network-elements": ["router-5"]
              }
            }
          }
        }
      ]
    },
    "network-elements": {
      "network-element": [
        {
          "ne-id": "router-5",
          "ne-type": "ietf-network-inventory:router",
          "installed-entitlements": {
            "entitlement": [
              {
                "eid": "mpls-license-001"
              }
            ]
          },
          "capabilities": {
            "capability-class": [
              {
                "capability-class": "ietf-entitlement-inventory:routing",
                "capability": [
                  {
                    "capability-id": "mpls-routing",
                    "extended-capability-description": "MPLS Label Switching Protocol",
                    "supporting-entitlements": {
                      "entitlement": [
                        {
                          "entitlement-id": "mpls-license-001",
                          "allowed": true,
                          "in-use": true
                        }
                      ]
                    }
                  }
                ]
              }
            ]
          }
        }
      ]
    }
  }
}
]]></artwork>
      </section>
      <section anchor="bandwidth-upgrade-via-license">
        <name>Bandwidth Upgrade via License</name>
        <t>A vendor-N device uses a capacity license to expand throughput.</t>
        <t>Complete example showing network inventory augmented with bandwidth entitlements:</t>
        <artwork><![CDATA[
json
{
  "ietf-network-inventory:network-inventory": {
    "entitlements": {
      "entitlement": [
        {
          "eid": "vendorN-bw-10g",
          "product-id": "vendorN-bw-upgrade",
          "state": "active",
          "restrictions": {
            "restriction": [
              {
                "restriction-id": "global-cap",
                "description": "Organization bandwidth cap",
                "units": "Gbps",
                "max-value": 100,
                "current-value": 25
              }
            ]
          }
        }
      ]
    },
    "network-elements": {
      "network-element": [
        {
          "ne-id": "switch-10g-01",
          "ne-type": "ietf-network-inventory:switch",
          "installed-entitlements": {
            "entitlement": [
              {
                "eid": "vendorN-bw-10g"
              }
            ]
          },
          "capabilities": {
            "capability-class": [
              {
                "capability-class": "ietf-entitlement-inventory:bandwidth",
                "capability": [
                  {
                    "capability-id": "bw-capability",
                    "resource-description": "Licensed bandwidth",
                    "resource-units": "Gbps",
                    "resource-amount": 10,
                    "supporting-entitlements": {
                      "entitlement": [
                        {
                          "entitlement-id": "vendorN-bw-10g",
                          "allowed": true,
                          "in-use": true,
                          "capability-restriction": [
                            {
                              "capability-restriction-id": "bw-limit",
                              "description": "Current bandwidth usage",
                              "resource-name": "active-bandwidth",
                              "units": "Gbps",
                              "max-value": 10,
                              "current-value": 6
                            }
                          ]
                        }
                      ]
                    }
                  }
                ]
              }
            ]
          }
        }
      ]
    }
  }
}
]]></artwork>
      </section>
      <section anchor="floating-license-managed-by-license-server">
        <name>Floating License Managed by License Server</name>
        <t>A shared entitlement is held by a license server and consumed dynamically by multiple switches.</t>
        <t>Complete example showing floating license across multiple network elements:</t>
        <artwork><![CDATA[
json
{
  "ietf-network-inventory:network-inventory": {
    "entitlements": {
      "entitlement": [
        {
          "eid": "shared-switch-license-1",
          "product-id": "advanced-switching-features",
          "state": "active",
          "entitlement-attachment": {
            "universal-access": true,
            "holders": {
              "organizations_names": {
                "organizations": ["NTT"]
              }
            },
          },
          "restrictions": {
            "restriction": [
              {
                "restriction-id": "concurrent-users",
                "description": "Maximum concurrent feature usage",
                "units": "sessions",
                "max-value": 50,
                "current-value": 12
              }
            ]
          }
        }
      ]
    },
    "network-elements": {
      "network-element": [
        {
          "ne-id": "switch-1",
          "ne-type": "ietf-network-inventory:switch",
          "installed-entitlements": {
            "entitlement": [
              {
                "eid": "shared-switch-license-1"
              }
            ]
          },
          "capabilities": {
            "capability-class": [
              {
                "capability-class": "ietf-entitlement-inventory:switching",
                "capability": [
                  {
                    "capability-id": "advanced-vlan-features",
                    "extended-capability-description": "Advanced VLAN management features",
                    "supporting-entitlements": {
                      "entitlement": [
                        {
                          "entitlement-id": "shared-switch-license-1",
                          "allowed": true,
                          "in-use": false
                        }
                      ]
                    }
                  },
                  {
                    "capability-id": "qos-policies",
                    "extended-capability-description": "Quality of Service policies",
                    "supporting-entitlements": {
                      "entitlement": [
                        {
                          "entitlement-id": "shared-switch-license-1",
                          "allowed": true,
                          "in-use": true
                        }
                      ]
                    }
                  }
                ]
              }
            ]
          }
        },
        {
          "ne-id": "switch-2",
          "ne-type": "ietf-network-inventory:switch",
          "installed-entitlements": {
            "entitlement": [
              {
                "eid": "shared-switch-license-1"
              }
            ]
          },
          "capabilities": {
            "capability-class": [
              {
                "capability-class": "ietf-entitlement-inventory:switching",
                "capability": [
                  {
                    "capability-id": "advanced-vlan-features",
                    "extended-capability-description": "Advanced VLAN management features",
                    "supporting-entitlements": {
                      "entitlement": [
                        {
                          "entitlement-id": "shared-switch-license-1",
                          "allowed": true,
                          "in-use": true
                        }
                      ]
                    }
                  }
                ]
              }
            ]
          }
        }
      ]
    }
  }
}
]]></artwork>
        <t>This example demonstrates how a floating license can be managed centrally while being installed locally on multiple network elements. Each switch has its own local copy of the entitlement that traces back to the centralized policy. The centralized entitlement shows global restrictions (concurrent users), while individual switches show their local usage. This entitlement may be tracked across devices using a license server asset that records usage or seat count (future extension).</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>(TBP)</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>(TBP)</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="BaseInventory">
          <front>
            <title>A Base YANG Data Model for Network Inventory</title>
            <author fullname="Chaode Yu" initials="C." surname="Yu">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Sergio Belotti" initials="S." surname="Belotti">
              <organization>Nokia</organization>
            </author>
            <author fullname="Jean-Francois Bouquier" initials="J." surname="Bouquier">
              <organization>Vodafone</organization>
            </author>
            <author fullname="Fabio Peruzzini" initials="F." surname="Peruzzini">
              <organization>FiberCop</organization>
            </author>
            <author fullname="Phil Bedard" initials="P." surname="Bedard">
              <organization>Cisco</organization>
            </author>
            <date day="22" month="July" year="2025"/>
            <abstract>
              <t>   This document defines a base YANG data model for network inventory.
   The scope of this base model is set to be application- and
   technology-agnostic.  The base data model can be augmented with
   application- and technology-specific details.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ivy-network-inventory-yang-08"/>
        </reference>
      </references>
    </references>
    <?line 583?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>This document is based on work partially funded by the EU Horizon Europe projects ACROSS (grant 101097122), ROBUST-6G (grant 101139068), iTrust6G (grant 101139198), MARE (grant 101191436), and CYBERNEMO (grant 101168182).</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
