<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.6.6 (Ruby 2.7.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-selander-ace-edhoc-oscore-profile-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.12.4 -->
  <front>
    <title abbrev="CoAP-EDHOC-OSCORE">Ephemeral Diffie-Hellman Over COSE (EDHOC) and Object Security for Constrained Environments (OSCORE) Profile for Authentication and Authorization for Constrained Environments (ACE)</title>
    <seriesInfo name="Internet-Draft" value="draft-selander-ace-edhoc-oscore-profile-00"/>
    <author initials="G." surname="Selander" fullname="Göran Selander">
      <organization>Ericsson</organization>
      <address>
        <email>goran.selander@ericsson.com</email>
      </address>
    </author>
    <author initials="J." surname="Preuß Mattsson" fullname="John Preuß Mattsson">
      <organization>Ericsson</organization>
      <address>
        <email>john.mattsson@ericsson.com</email>
      </address>
    </author>
    <author initials="M." surname="Tiloca" fullname="Marco Tiloca">
      <organization>RISE</organization>
      <address>
        <email>marco.tiloca@ri.se</email>
      </address>
    </author>
    <author initials="R." surname="Höglund" fullname="Rikard Höglund">
      <organization>RISE</organization>
      <address>
        <email>rikard.hoglund@ri.se</email>
      </address>
    </author>
    <date year="2022" month="July" day="11"/>
    <area>Security</area>
    <workgroup>ACE Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document specifies a profile for the Authentication and Authorization for Constrained Environments (ACE) framework.
It utilizes Ephemeral Diffie-Hellman Over COSE (EDHOC) for achieving mutual authentication between an OAuth 2.0 Client and Resource Server, and it binds an authentication credential of the Client to an OAuth 2.0 access token.
EDHOC also establishes an Object Security for Constrained RESTful Environments (OSCORE) Security Context, which is used to secure communications when accessing protected resources according to the authorization information indicated in the access token.
A resource-constrained server can use this profile to delegate management of authorization information to a trusted host with less severe limitations regarding processing power and memory.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Authentication and Authorization for Constrained Environments Working Group mailing list (ace@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/ace/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/EricssonResearch/ace-edhoc-oscore-profile"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>This document defines the "coap_edhoc_oscore" profile of the ACE framework <xref target="I-D.ietf-ace-oauth-authz"/>. This profile addresses a "zero-touch" constrained setting where trusted operations can be performed with low overhead without endpoint specific configurations.</t>
      <t>Like in the "coap_oscore" profile <xref target="I-D.ietf-ace-oscore-profile"/>, also in this profile a client (C) and a resource server (RS) use the Constrained Application Protocol (CoAP) <xref target="RFC7252"/> to communicate, and Object Security for Constrained RESTful Environments (OSCORE) <xref target="RFC8613"/> to protect their communications. Also, the processing of requests for specific protected resources is identical to what is defined in the "coap_oscore" profile.</t>
      <t>When using this profile, C accesses protected resources hosted at RS with the use of an access token issued by a trusted authorization server (AS) and bound to an authentication credential of C. This differs from the "coap_oscore" profile, where the access token is bound to a symmetric key used to derive OSCORE keying material. As recommended in <xref target="I-D.ietf-ace-oauth-authz"/>, this document recommends the use of CBOR Web Tokens (CWTs) <xref target="RFC8392"/> as access tokens.</t>
      <t>The authentication and authorization processing requires C and RS to have access to each other's authentication credentials. C can obtain the authentication credential of RS from AS together with the access token. RS can obtain the authentication credential of C together with the associated access token in different ways. If RS successfully verifies the access token, then C and RS run the Ephemeral Diffie-Hellman Over COSE (EDHOC) protocol <xref target="I-D.ietf-lake-edhoc"/> using the authentication credentials.</t>
      <t>Once the EDHOC execution is completed, C and RS are mutually authenticated and can derive an OSCORE Security Context to protect subsequent communications.</t>
      <t>An authentication credential can be a raw public key, e.g., encoded as a CWT Claims Set (CCS, <xref target="RFC8392"/>); or a public key certificate, e.g., encoded as an X.509 certificate or as a CBOR encoded X.509 certificate (C509, <xref target="I-D.ietf-cose-cbor-encoded-cert"/>); or a different type of data structure containing the public key of the peer in question.</t>
      <t>The ACE protocol establishes what those authentication credentials are, and may transport the actual authentication credentials by value or uniquely refer to them. If an authentication credential is pre-provisioned or can be obtained over less constrained links, then it suffices that ACE provides a unique reference such as a certificate hash (e.g., by using the COSE header parameter "x5t", see <xref target="I-D.ietf-cose-x509"/>). This is in the same spirit as EDHOC, where the authentication credentials may be transported or referenced in the ID_CRED_x message fields (see Section 3.5.3 of <xref target="I-D.ietf-lake-edhoc"/>).</t>
      <t>In general, AS and RS are likely to have trusted access to each other's authentication credentials, since AS acts on behalf of RS as per the trust model of ACE. Also, AS needs to have some information about C, including the relevant authentication credential, in order to identify C when it requests an access token and to determine what access rights it can be granted. However, the authentication credential of C may potentially be conveyed (or uniquely referred to) within the request for access which C makes to AS.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <t>Certain security-related terms such as "authentication", "authorization", "confidentiality", "(data) integrity", "Message Authentication Code (MAC)", "Hash-based Message Authentication Code (HMAC)", and "verify" are taken from <xref target="RFC4949"/>.</t>
        <t>RESTful terminology follows HTTP <xref target="RFC9110"/>.</t>
        <t>Readers are expected to be familiar with the terms and concepts defined in CoAP <xref target="RFC7252"/>, OSCORE <xref target="RFC8613"/> and EDHOC <xref target="I-D.ietf-lake-edhoc"/>.</t>
        <t>Readers are also expected to be familiar with the terms and concepts of the ACE framework described in <xref target="I-D.ietf-ace-oauth-authz"/> and in <xref target="I-D.ietf-ace-oauth-params"/>.</t>
        <t>Terminology for entities in the architecture is defined in OAuth 2.0 <xref target="RFC6749"/>, such as the client (C), the resource server (RS), and the authorization server (AS).  It is assumed in this document that a given resource on a specific RS is associated with a unique AS.</t>
        <t>Note that the term "endpoint" is used here, as in <xref target="I-D.ietf-ace-oauth-authz"/>, following its OAuth definition, which is to denote resources such as /token and /introspect at AS and /authz-info at RS. The CoAP <xref target="RFC7252"/> definition, which is "An entity participating in the CoAP protocol" is not used in this document.</t>
        <t>The authorization information (authz-info) resource refers to the authorization information endpoint as specified in <xref target="I-D.ietf-ace-oauth-authz"/>. The term "claim" is used in this document with the same semantics as in <xref target="I-D.ietf-ace-oauth-authz"/>, i.e., it denotes information carried in the access token or returned from introspection.</t>
        <t>This document defines "token series" as a series of access tokens sorted in chronological order as they are released, characterized by the following properties:</t>
        <ul spacing="normal">
          <li>issued by the same AS</li>
          <li>issued to the same C and for the same RS</li>
          <li>issued together with the same authentication credential of RS</li>
          <li>associated with the same authentication credential of C</li>
        </ul>
        <t>When an access token becomes invalid (e.g., due to its expiration or revocation), the token series it belongs to ends.</t>
        <t>Concise Binary Object Representation (CBOR) <xref target="RFC8949"/><xref target="RFC8742"/> and Concise Data Definition Language (CDDL) <xref target="RFC8610"/> are used in this document. CDDL predefined type names, especially bstr for CBOR byte strings and tstr for CBOR text strings, are used extensively in this document.</t>
        <t>Examples throughout this document are expressed in CBOR diagnostic notation without the tag and value abbreviations.</t>
      </section>
    </section>
    <section anchor="overview">
      <name>Protocol Overview</name>
      <t>This section gives an overview of how to use the ACE framework <xref target="I-D.ietf-ace-oauth-authz"/> together with the authenticated key establishment protocol EDHOC <xref target="I-D.ietf-lake-edhoc"/>. By doing so, a client (C) and a resource server (RS) generate an OSCORE Security Context <xref target="RFC8613"/> associated with authorization information, and use that Security Context to protect their communications. The parameters needed by C to negotiate the use of this profile with the authorization server (AS), as well as the OSCORE setup process, are described in detail in the following sections.</t>
      <t>RS maintains a collection of authentication credentials. These are related to OSCORE Security Contexts associated with authorization information for all the clients that RS is communicating with. The authorization information is maintained as policy that is used as input to the processing of requests from those clients.</t>
      <t>This profile specifies how C requests an access token from AS for the resources it wants to access on an RS, by sending an access token request to the /token endpoint, as specified in <xref section="5.8" sectionFormat="of" target="I-D.ietf-ace-oauth-authz"/>. The access token request and response MUST be confidentiality protected and ensure authenticity. The use of EDHOC and OSCORE between C and AS is RECOMMENDED in this profile, in order to reduce the number of libraries that C has to support. However, other protocols fulfilling the security requirements defined in <xref section="5" sectionFormat="of" target="I-D.ietf-ace-oauth-authz"/> MAY alternatively be used, such as TLS <xref target="RFC8446"/> or DTLS <xref target="RFC9147"/>.</t>
      <t>If C has retrieved an access token, there are two different options for C to upload it to RS, as further detailed in this document.</t>
      <ol spacing="normal" type="1"><li>C posts the access token to the /authz-info endpoint by using the mechanisms specified in <xref section="5.8" sectionFormat="of" target="I-D.ietf-ace-oauth-authz"/>. If the access token is valid, RS responds to the request with a 2.01 (Created) response, after which C initiates the EDHOC protocol by sending EDHOC message_1 to RS. The communication with the /authz-info endpoint is not protected, except for the update of access rights.</li>
        <li>C initiates the EDHOC protocol by sending EDHOC message_1 to RS, specifying the access token as External Authorization Data (EAD) in the EAD_1 field of EDHOC message_1 (see <xref section="3.8" sectionFormat="of" target="I-D.ietf-lake-edhoc"/>). If the access token is valid and the processing of EDHOC message_1 is successful, RS responds with EDHOC message_2, thus continuing the EDHOC protocol. This alternative cannot be used for the update of access rights.</li>
      </ol>
      <t>When running the EDHOC protocol, C uses the authentication credential of RS specified by AS together with the access token, while RS uses the authentication credential of C bound to and specified within the access token. If C and RS complete the EDHOC execution successfully, they are mutually authenticated and they derive an OSCORE Security Context as per <xref section="A.1" sectionFormat="of" target="I-D.ietf-lake-edhoc"/>. Also, RS associates the two used authentication credentials and the completed EDHOC execution with the derived Security Context. The latter is in turn associated with the access token and the access rights of C specified therein.</t>
      <t>From then on, C effectively gains authorized and secure access to protected resources on RS, for as long as the access token is valid. Until then, C can communicate with RS by sending a request protected with the established OSCORE Security Context above. The Security Context is discarded when an access token (whether the same or a different one) is used to successfully derive a new Security Context for C, either by exchanging nonces and using the EDHOC-KeyUpdate function (see <xref target="edhoc-key-update"/>), or by re-running EDHOC. In particular, when supporting this profile, both C and RS MUST support the EDHOC-KeyUpdate function, and they MUST use it instead of re-running EDHOC if the outcome of their previously completed EDHOC execution is still valid.</t>
      <t>After the whole procedure has completed and while the access token is valid, C can contact AS to request an update of its access rights, by sending a similar request to the /token endpoint. This request also includes an identifier, which allows AS to find the data it has previously shared with C. This specific identifier, encoded as a byte string, is assigned by AS to a "token series" (see <xref target="terminology"/>). Upon a successful update of access rights, the new issued access token becomes the latest in its token series. When the latest access token of a token series becomes invalid (e.g., when it expires or gets revoked), that token series ends.</t>
      <t>An overview of the profile flow for the "coap_edhoc_oscore" profile is given in <xref target="protocol-overview"/>. The names of messages coincide with those of <xref target="I-D.ietf-ace-oauth-authz"/> when applicable.</t>
      <figure anchor="protocol-overview">
        <name>Protocol Overview</name>
        <artwork><![CDATA[
   C                            RS                       AS
   |                            |                         |
   | <==== Mutual authentication and secure channel ====> |
   |                            |                         |
   | ------- POST /token  ------------------------------> |
   |                            |                         |
   | <-------------------------------- Access Token ----- |
   |                               + Access Information   |
   |                            |                         |
   | ---- POST /authz-info ---> |                         |
   |       (access_token)       |                         |
   |                            |                         |
   | <----- 2.01 Created ------ |                         |
   |                            |                         |
   | <========= EDHOC ========> |                         |
   |  Mutual authentication     |                         |
   |  and derivation of an      |                         |
   |  OSCORE Security Context   |                         |
   |                            |                         |
   |                /Proof-of-possession and              |
   |                Security Context storage/             |
   |                            |                         |
   | ---- OSCORE Request -----> |                         |
   |                            |                         |
   | <--- OSCORE Response ----- |                         |
   |                            |                         |
/Proof-of-possession            |                         |
and Security Context            |                         |
storage (latest)/               |                         |
   |                            |                         |
   | ---- OSCORE Request -----> |                         |
   |                            |                         |
   | <--- OSCORE Response ----- |                         |
   |                            |                         |
   |           ...              |                         |

]]></artwork>
      </figure>
    </section>
    <section anchor="c-as-comm">
      <name>Client-AS Communication</name>
      <t>The following subsections describe the details of the POST request and response to the /token endpoint between C and AS.</t>
      <t>In this exchange, AS provides C with the access token, together with a set of parameters that enable C to run EDHOC with RS. In particular, these include information about the authorization credential of RS, AUTH_CRED_RS, transported by value or uniquely referred to.</t>
      <t>The access token is securely associated with the authentication credential of C, AUTH_CRED_C, by including it or uniquely referring to it in the access token.</t>
      <t>AUTH_CRED_C is specified in the "req_cnf" parameter defined in <xref target="I-D.ietf-ace-oauth-params"/> of the POST request to the /token endpoint from C to AS, either transported by value or uniquely referred to.</t>
      <t>The request to the /token endpoint and the corresponding response can include EDHOC_Information, which is a CBOR map object defined in <xref target="edhoc-parameters-object"/>. This object is transported in the "edhoc_info" parameter registered in <xref target="iana-oauth-params"/> and <xref target="iana-oauth-cbor-mappings"/>.</t>
      <section anchor="c-as">
        <name>C-to-AS: POST to /token endpoint</name>
        <t>The client-to-AS request is specified in <xref section="5.8.1" sectionFormat="of" target="I-D.ietf-ace-oauth-authz"/>.</t>
        <t>The client must send this POST request to the /token endpoint over a secure channel that guarantees authentication, message integrity and confidentiality (see <xref target="secure-comm-as"/>).</t>
        <t>Editor's note: This formulation overlaps with 3rd para in <xref target="overview"/>, which has normative language. Preferable to keep normative language here.</t>
        <t>An example of such a request is shown in <xref target="token-request"/>. In this example, C specifies its own authentication credential by reference, as the hash of an X.509 certificate carried in the "x5t" field of the "req_cnf" parameter. In fact, it is expected that C can typically specify its own authentication credential by reference, since AS is expected to obtain the actual authentication credential during an early client registration process or during a previous secure association establishment with C.</t>
        <figure anchor="token-request">
          <name>Example of C-to-AS POST /token request for an access token.</name>
          <artwork><![CDATA[
   Header: POST (Code=0.02)
   Uri-Host: "as.example.com"
   Uri-Path: "token"
   Content-Format: "application/ace+cbor"
   Payload:
   {
     "audience" : "tempSensor4711",
     "scope" : "read",
     "req_cnf" : {
       "x5t" : h'822E4879F2A41B510C1F9B'
     }
   }
]]></artwork>
        </figure>
        <t>If C wants to update its access rights without changing an existing OSCORE Security Context, it MUST include EDHOC_Information in its POST request to the /token endpoint. In turn, EDHOC_Information MUST include the "id" field, carrying a CBOR byte string containing the identifier of the token series to which the current, still valid access token shared with RS belongs to. This POST request MUST omit the "req_cnf" parameter.</t>
        <t>This identifier is assigned by AS as discussed in <xref target="as-c"/>, and, together with other information such as audience (see <xref section="5.8.1" sectionFormat="of" target="I-D.ietf-ace-oauth-authz"/>), can be used by AS to determine the token series to which the new requested access token has to be added. Therefore, the identifier MUST identify the pair (AUTH_CRED_C, AUTH_CRED_RS) associated with a still valid access token previously issued for C and RS by AS.</t>
        <t>AS MUST verify that the received value identifies a token series to which a still valid access token issued for C and RS belongs to. If that is not the case, the Client-to-AS request MUST be declined with the error code "invalid_request" as defined in <xref section="5.8.3" sectionFormat="of" target="I-D.ietf-ace-oauth-authz"/>.</t>
        <t>An example of such a request is shown in <xref target="token-request-update"/>.</t>
        <figure anchor="token-request-update">
          <name>Example of C-to-AS POST /token request for updating access rights to an access token.</name>
          <artwork><![CDATA[
   Header: POST (Code=0.02)
   Uri-Host: "as.example.com"
   Uri-Path: "token"
   Content-Format: "application/ace+cbor"
   Payload:
   {
     "audience" : "tempSensor4711",
     "scope" : "write",
     "edhoc_info" : {
        "id" : h'01'
     }
   }
]]></artwork>
        </figure>
      </section>
      <section anchor="as-c">
        <name>AS-to-C: Access Token Response</name>
        <t>After verifying the POST request to the /token endpoint and that C is authorized to obtain an access token corresponding to its access token request, AS responds as defined in <xref section="5.8.2" sectionFormat="of" target="I-D.ietf-ace-oauth-authz"/>. If the request from C was invalid, or not authorized, AS returns an error response as described in <xref section="5.8.3" sectionFormat="of" target="I-D.ietf-ace-oauth-authz"/>.</t>
        <t>AS can signal that the use of EDHOC and OSCORE as per this profile is REQUIRED for a specific access token, by including the "ace_profile" parameter with the value "coap_edhoc_oscore" in the access token response. This means that C MUST use EDHOC with RS and derive an OSCORE Security Context, as specified in <xref target="edhoc-exec"/>. After that, C MUST use the established OSCORE Security Context to protect communications with RS, when accessing protected resources at RS according to the authorization information indicated in the access token. Usually, it is assumed that constrained devices will be pre-configured with the necessary profile, so that this kind of profile signaling can be omitted.</t>
        <t>When issuing any access token of a token series, AS MUST send the following data in the response to C.</t>
        <ul spacing="normal">
          <li>
            <t>The identifier of the token series to which the issued access token belongs to. This is specified in the "id" field of EDHOC_Information.  </t>
            <t>
All the access tokens belonging to the same token series are associated with the same identifier, which does not change throughout the series lifetime. A token series ends when the latest issued access token in the series becomes invalid (e.g., when it expires or gets revoked).  </t>
            <t>
AS assigns an identifier to a token series when issuing the first access token T of that series. When assigning the identifier, AS MUST ensure that this was never used in a previous series of access tokens such that: i) they were issued for the same RS for which the access token T is being issued; and ii) they were bound to the same authentication credential AUTH_CRED_C of the requesting client to which the access token T is being issued (irrespectively of the exact way AUTH_CRED_C is specified in such access tokens).</t>
          </li>
        </ul>
        <t>When issuing the first access token of a token series, AS MUST send the following data in the response to C.</t>
        <ul spacing="normal">
          <li>
            <t>The authentication credential of RS, namely AUTH_CRED_RS. This is specified in the "rs_cnf" parameter defined in <xref target="I-D.ietf-ace-oauth-params"/>. AUTH_CRED_RS can be transported by value or referred to by means of an appropriate identifier.  </t>
            <t>
When issuing the first access token ever to a pair (C, RS) using a pair of corresponding authentication credentials (AUTH_CRED_C, AUTH_CRED_RS), it is typically expected that the response to C specifies AUTH_CRED_RS by value.  </t>
            <t>
When later issuing further access tokens to the same pair (C, RS) using the same AUTH_CRED_RS, it is typically expected that the response to C specifies AUTH_CRED_RS by reference.</t>
          </li>
        </ul>
        <t>When issuing the first access token of a token series, AS MAY send the following data in the response to C. If present, this data MUST be included in the corresponding fields of EDHOC_Information. Some of this information takes advantage of the knowledge that AS may have about C and RS since a previous registration process, with particular reference to what they support as EDHOC peers.</t>
        <ul spacing="normal">
          <li>The EDHOC methods supported by both C and RS (see <xref section="3.2" sectionFormat="of" target="I-D.ietf-lake-edhoc"/>). This is specified in the "methods" field of EDHOC_Information.</li>
          <li>The EDHOC cipher suite (see <xref section="3.6" sectionFormat="of" target="I-D.ietf-lake-edhoc"/>) to be used by C and RS as selected cipher suite when running EDHOC. This is specified in the "cipher_suites" field of EDHOC_Information. If present, this MUST specify the EDHOC cipher suite which is most preferred by C and at the same time supported by both C and RS.</li>
          <li>Whether RS supports or not EDHOC message_4 (see <xref section="5.5" sectionFormat="of" target="I-D.ietf-lake-edhoc"/>). This is specified in the "message_4" field of EDHOC_Information.</li>
          <li>Whether RS supports or not the combined EDHOC + OSCORE request defined in <xref target="I-D.ietf-core-oscore-edhoc"/>. This is specified in the "comb_req" field of EDHOC_Information.</li>
          <li>The path component of the URI of the EDHOC resource at RS, where C is expected to send EDHOC messages as CoAP requests. This is specified in the "uri_path" field of EDHOC_Information. If not specified, the URI path "/.well-known/edhoc" defined in <xref section="9.7" sectionFormat="of" target="I-D.ietf-lake-edhoc"/>) is assumed.</li>
          <li>The size in bytes of the OSCORE Master Secret to derive after the EDHOC execution (see <xref section="A.1" sectionFormat="of" target="I-D.ietf-lake-edhoc"/>) and to use for establishing an OSCORE Security Context. This is specified in the "osc_ms_len" field of EDHOC_Information. If not specified, the default value from <xref section="A.1" sectionFormat="of" target="I-D.ietf-lake-edhoc"/> is assumed.</li>
          <li>The size in bytes of the OSCORE Master Salt to derive after the EDHOC execution (see <xref section="A.1" sectionFormat="of" target="I-D.ietf-lake-edhoc"/>) and to use for establishing an OSCORE Security Context. This is specified in the "osc_salt_len" field of EDHOC_Information. If not specified, the default value from <xref section="A.1" sectionFormat="of" target="I-D.ietf-lake-edhoc"/> is assumed.</li>
          <li>The OSCORE version to use (see <xref section="5.4" sectionFormat="of" target="RFC8613"/>). This is specified in the "osc_version" field of EDHOC_Information. If specified, AS MUST indicate the highest OSCORE version supported by both C and RS. If not specified, the default value of 1 (see <xref section="5.4" sectionFormat="of" target="RFC8613"/>) is assumed.</li>
        </ul>
        <t>When issuing any access token of a token series, AS MUST specify the following data in the claims associated with the access token.</t>
        <ul spacing="normal">
          <li>The identifier of the token series, specified in the "id" field of EDHOC_Information, and with the same value specified in the response to C from the /token endpoint.</li>
          <li>
            <t>The same authentication credential of C that C specified in its POST request to the /token endpoint (see <xref target="c-as"/>), namely AUTH_CRED_C. If the access token is a CWT, this information MUST be specified in the "cnf" claim.  </t>
            <t>
In the access token, AUTH_CRED_C can be transported by value or referred to by means of an appropriate identifier, regardless of how C specified it in the request to the /token endpoint. Thus, the specific field carried in the access token claim and specifying AUTH_CRED_C depends on the specific way used by AS.  </t>
            <t>
When issuing the first access token ever to a pair (C, RS) using a pair of corresponding authentication credentials (AUTH_CRED_C, AUTH_CRED_RS), it is typically expected that AUTH_CRED_C is specified by value.  </t>
            <t>
When later issuing further access tokens to the same pair (C, RS) using the same AUTH_CRED_C, it is typically expected that AUTH_CRED_C is specified by reference.</t>
          </li>
        </ul>
        <t>When issuing the first access token of a token series, AS MAY specify the following data in the claims associated with the access token. If these data are specified in the response to C from the /token endpoint, they MUST be included in the access token and specify the same values that they have in the response from the /token endpoint.</t>
        <ul spacing="normal">
          <li>The size in bytes of the OSCORE Master Secret to derive after the EDHOC execution and to use for establishing an OSCORE Security Context. If it is included, it is specified in the "osc_ms_len" field of EDHOC_Information, and it has the same value that the "osc_ms_len" field has in the response to C. If it is not included, the default value from <xref section="A.1" sectionFormat="of" target="I-D.ietf-lake-edhoc"/> is assumed.</li>
          <li>The size in bytes of the OSCORE Master Salt to derive after the EDHOC execution (see <xref section="A.1" sectionFormat="of" target="I-D.ietf-lake-edhoc"/>) and to use for establishing an OSCORE Security Context. If it is included, it is specified in the "osc_salt_len" field of EDHOC_Information, and it has the same value that the "osc_salt_len" field has in the response to C. If it is not included, the default value from <xref section="A.1" sectionFormat="of" target="I-D.ietf-lake-edhoc"/> is assumed.</li>
          <li>The OSCORE version to use (see <xref section="5.4" sectionFormat="of" target="RFC8613"/>). This is specified in the "osc_version" field of the "edhoc_info" parameter. If it is included, it is specified in the "osc_version" field of EDHOC_Information, and it has the same value that the "osc_version" field has in the response to C. If it is not included, the default value of 1 (see <xref section="5.4" sectionFormat="of" target="RFC8613"/>) is assumed.</li>
        </ul>
        <t>When issuing the first access token of a token series, AS can take either of the two possible options.</t>
        <ul spacing="normal">
          <li>AS provides the access token to C, by specifying it in the "access_token" parameter of the access token response. In such a case, the access token response MAY include the parameter "access_token", which MUST encode the CBOR simple value "false" (0xf4).</li>
          <li>
            <t>AS does not provide the access token to C. Rather, AS uploads the access token to the /authz-info endpoint at RS, exactly like C would do, and as defined in <xref target="c-rs"/> and <xref target="rs-c"/>. Then, when replying to C with the access token response as defined above, the response MUST NOT include the parameter "access_token", and MUST include the parameter "token_uploaded" encoding the CBOR simple value "true" (0xf5). This is shown by the example in <xref target="example-without-optimization-as-posting"/>.  </t>
            <t>
Note that, in case C and RS have already completed an EDHOC execution leveraging a previous access token series, using this approach implies that C and RS have to re-run the EDHOC protocol. That is, they cannot more efficiently make use of the EDHOC-KeyUpdate function, as defined in <xref target="edhoc-key-update"/>, see <xref target="c-rs-comm"/>.  </t>
            <t>
Also note that this approach is not applicable when issuing access tokens following the first one in the same token series, i.e., when updating access rights.</t>
          </li>
        </ul>
        <t>When CWTs are used as access tokens, EDHOC_Information MUST be transported in the "edhoc_info" claim, defined in <xref target="iana-token-cwt-claims"/>.</t>
        <t>Since the access token does not contain secret information, only its integrity and source authentication are strictly necessary to ensure. Therefore, AS can protect the access token with either of the means discussed in <xref section="6.1" sectionFormat="of" target="I-D.ietf-ace-oauth-authz"/>. Nevertheless, when using this profile, it is RECOMMENDED that the access token is a CBOR web token (CWT) protected with COSE_Encrypt/COSE_Encrypt0 as specified in <xref target="RFC8392"/>.</t>
        <t><xref target="fig-token-response"/> shows an example of an AS response. The "rs_cnf" parameter specifies the authentication credential of RS, as an X.509 certificate transported by value in the "x5chain" field. The access token and the authentication credential of RS have been truncated for readability.</t>
        <figure anchor="fig-token-response">
          <name>Example of AS-to-C Access Token response with EDHOC and OSCORE profile.</name>
          <artwork><![CDATA[
   Header: Created (Code=2.01)
      Content-Type: "application/ace+cbor"
      Payload:
      {
        "access_token" : h'8343a1010aa2044c53 ...
         (remainder of access token (CWT) omitted for brevity)',
        "ace_profile" : "coap_edhoc_oscore",
        "expires_in" : "3600",
        "rs_cnf" : {
          "x5chain" : h'3081ee3081a1a00302 ...'
          (remainder of the access credential omitted for brevity)'
        }
        "edhoc_info" : {
          "id" : h'01',
          "methods" : [0, 1, 2, 3],
          "cipher_suites": 0
        }
      }
]]></artwork>
        </figure>
        <t><xref target="fig-token"/> shows an example CWT Claims Set, including the relevant EDHOC parameters in the "edhoc_info" claim. The "cnf" claim specifies the authentication credential of C, as an X.509 certificate transported by value in the "x5chain" field. The authentication credential of C has been truncated for readability.</t>
        <figure anchor="fig-token">
          <name>Example of CWT Claims Set with EDHOC parameters.</name>
          <artwork><![CDATA[
   {
    "aud" : "tempSensorInLivingRoom",
    "iat" : "1360189224",
    "exp" : "1360289224",
    "scope" :  "temperature_g firmware_p",
    "cnf" : {
      "x5chain" : h'3081ee3081a1a00302 ...'
    }
    "edhoc_info" : {
      "id" : h'01',
      "methods" : [0, 1, 2, 3],
      "cipher_suites": 0
    }
  }
]]></artwork>
        </figure>
        <t>If C has requested an update to its access rights using the same OSCORE Security Context, which is valid and authorized, then:</t>
        <ul spacing="normal">
          <li>The response MUST NOT include the "rs_cnf" parameter.</li>
          <li>The EDHOC_Information in the response MUST include only the "id" field, specifying the identifier of the token series.</li>
          <li>The EDHOC_Information in the access token MUST include only the "id" field, specifying the identifier of the token series. In particular, if the access token is a CWT, the "edhoc_info" claim MUST include only the "id" field.</li>
        </ul>
        <t>This identifier of the token series needs to be included in the new access token in order for RS to identify the old access token to supersede, as well as the OSCORE Security Context already shared between C and RS and to be associated with the new access token.</t>
      </section>
      <section anchor="edhoc-parameters-object">
        <name>The EDHOC_Information</name>
        <t>An EDHOC_Information is an object including information that guides two peers towards executing the EDHOC protocol. In particular, the EDHOC_Information is defined to be serialized and transported between nodes, as specified by this document, but it can also be used by other specifications if needed.</t>
        <t>The EDHOC_Information can either be encoded as a JSON object or as a CBOR map.  The set of common fields that can appear in an EDHOC_Information can be found in the IANA "EDHOC Information" registry (see <xref target="iana-edhoc-parameters"/>), defined for extensibility, and the initial set of parameters defined in this document is specified below. All parameters are optional.</t>
        <t><xref target="fig-cbor-key-edhoc-params"/> provides a summary of the EDHOC_Information parameters defined in this section.</t>
        <figure anchor="fig-cbor-key-edhoc-params">
          <name>EDHOC_Information Parameters</name>
          <artwork align="center"><![CDATA[
+---------------+------+--------------+----------+--------------------+
| Name          | CBOR | CBOR value   | Registry | Description        |
|               | Type |              |          |                    |
+---------------+------+--------------+----------+--------------------+
| id            | 0    | bstr         |          | Identifier of      |
|               |      |              |          | EDHOC execution    |
+---------------+------+--------------+----------+--------------------+
| methods       | 1    | int /        | EDHOC    | Set of supported   |
|               |      | array of int | Method   | EDHOC methods      |
|               |      |              | Type     |                    |
|               |      |              | Registry |                    |
+---------------+------+--------------+----------+--------------------+
| cipher_suites | 2    | int /        | EDHOC    | Set of supported   |
|               |      | array of int | Cipher   | EDHOC cipher       |
|               |      |              | Suites   | suites             |
|               |      |              | Registry |                    |
+---------------+------+--------------+----------+--------------------+
| key_update    | 3    | simple value |          | Support for the    |
|               |      | "true" /     |          | EDHOC-KeyUpdate    |
|               |      | simple value |          | function           |
|               |      | "false"      |          |                    |
+---------------+------+--------------+----------+--------------------+
| message_4     | 4    | simple value |          | Support for EDHOC  |
|               |      | "true" /     |          | message_4          |
|               |      | simple value |          |                    |
|               |      | "false"      |          |                    |
+---------------+------+--------------+----------+--------------------+
| comb_req      | 5    | simple value |          | Support for the    |
|               |      | "true" /     |          | EDHOC + OSCORE     |
|               |      | simple value |          | combined request   |
|               |      | "false"      |          |                    |
+---------------+------+--------------+----------+--------------------+
| uri_path      | 6    | tstr         |          | URI-path of the    |
|               |      |              |          | EDHOC resource     |
+---------------+------+--------------+----------+--------------------+
| osc_ms_len    | 7    | uint         |          | Length in bytes of |
|               |      |              |          | the OSCORE Master  |
|               |      |              |          | Secret to derive   |
+---------------+------+--------------+----------+--------------------+
| osc_salt_len  | 8    | uint         |          | Length in bytes of |
|               |      |              |          | the OSCORE Master  |
|               |      |              |          | Salt to derive     |
+---------------+------+--------------+----------+--------------------+
| osc_version   | 9    | uint         |          | OSCORE version     |
|               |      |              |          | number to use      |
+---------------+------+--------------+----------+--------------------+
]]></artwork>
        </figure>
        <ul spacing="normal">
          <li>id: This parameter identifies an EDHOC execution and is encoded as a byte string. In JSON, the "id" value is a Base64 encoded byte string. In CBOR, the "id" type is a byte string, and has label 0.</li>
          <li>methods: This parameter specifies a set of supported EDHOC methods (see <xref section="3.2" sectionFormat="of" target="I-D.ietf-lake-edhoc"/>). If the set is composed of a single EDHOC method, this is encoded as an integer. Otherwise, the set is encoded as an array of integers, where each array element encodes one EDHOC method. In JSON, the "methods" value is an integer or an array of integers. In CBOR, the "methods" is an integer or an array of integers, and has label 1.</li>
          <li>cipher_suites: This parameter specifies a set of supported EDHOC cipher suites (see <xref section="3.6" sectionFormat="of" target="I-D.ietf-lake-edhoc"/>). If the set is composed of a single EDHOC cipher suite, this is encoded as an integer. Otherwise, the set is encoded as an array of integers, where each array element encodes one EDHOC cipher suite. In JSON, the "cipher_suites" value is an integer or an array of integers. In CBOR, the "cipher_suites" is an integer or an array of integers, and has label 2.</li>
          <li>key_update: This parameter indicates whether the EDHOC-KeyUpdate function (see <xref section="4.2.2" sectionFormat="of" target="I-D.ietf-lake-edhoc"/>) is supported. In JSON, the "key_update" value is a boolean. In CBOR, "key_update" is the simple value "true" or "false", and has label 3.</li>
          <li>message_4: This parameter indicates whether the EDHOC message_4 (see <xref section="5.5" sectionFormat="of" target="I-D.ietf-lake-edhoc"/>) is supported. In JSON, the "message_4" value is a boolean. In CBOR, "message_4" is the simple value "true" or "false", and has label 4.</li>
          <li>comb_req: This parameter indicates whether the combined EDHOC + OSCORE request defined in <xref target="I-D.ietf-core-oscore-edhoc"/>) is supported. In JSON, the "comb_req" value is a boolean. In CBOR, "comb_req" is the simple value "true" or "false", and has label 5.</li>
          <li>uri_path: This parameter specifies the path component of the URI of the EDHOC resource where EDHOC messages have to be sent as requests. In JSON, the "uri_path" value is a string. In CBOR, "uri_path" is text string, and has label 6.</li>
          <li>osc_ms_len: This parameter specifies the size in bytes of the OSCORE Master Secret to derive after the EDHOC execution, as per <xref section="A.1" sectionFormat="of" target="I-D.ietf-lake-edhoc"/>. In JSON, the "osc_ms_len" value is an integer. In CBOR, the "osc_ms_len" type is unsigned integer, and has label 7.</li>
          <li>osc_salt_len: This parameter specifies the size in bytes of the OSCORE Master Salt to derive after the EDHOC execution, as per <xref section="A.1" sectionFormat="of" target="I-D.ietf-lake-edhoc"/>. In JSON, the "osc_salt_len" value is an integer. In CBOR, the "osc_salt_len" type is unsigned integer, and has label 8.</li>
          <li>osc_version: This parameter specifies the OSCORE Version number that the two EDHOC peers have to use when using OSCORE. For more information about this parameter, see <xref section="5.4" sectionFormat="of" target="RFC8613"/>. In JSON, the "osc_version" value is an integer. In CBOR, the "osc_version" type is unsigned integer, and has label 9.</li>
        </ul>
        <t>An example of JSON EDHOC_Information is given in <xref target="fig-edhoc-info-json"/>.</t>
        <figure anchor="fig-edhoc-info-json">
          <name>Example of JSON EDHOC\_Information</name>
          <artwork><![CDATA[
   "edhoc_info" : {
       "id" : b64'AQ==',
       "methods" : 1,
       "cipher_suites" : 0
   }
]]></artwork>
        </figure>
        <t>The CDDL grammar describing the CBOR EDHOC_Information is:</t>
        <artwork><![CDATA[
EDHOC_Information = {
   ? 0 => bstr,             ; id
   ? 1 => int / array,      ; methods
   ? 2 => int / array,      ; cipher_suites
   ? 3 => true / false,     ; key_update
   ? 4 => true / false,     ; message_4
   ? 5 => true / false,     ; comb_req
   ? 6 => tstr,             ; uri_path
   ? 7 => uint,             ; osc_ms_len
   ? 8 => uint,             ; osc_salt_len
   ? 9 => uint,             ; osc_version
   * int / tstr => any
}
]]></artwork>
      </section>
    </section>
    <section anchor="c-rs-comm">
      <name>Client-RS Communication</name>
      <t>The following subsections describe the exchanges between C and RS, which comprise the token uploading to RS, and the execution of the EDHOC protocol. Note that, as defined in <xref target="as-c"/>, AS may not have provided C with the access token, and have rather uploaded the access token to the /authz-info endpoint at RS on behalf of C.</t>
      <t>In order to upload the access token to RS, C can send a POST request to the /authz-info endpoint at RS. This is detailed in <xref target="c-rs"/> and <xref target="rs-c"/>, and it is shown by the example in <xref target="example-without-optimization"/>.</t>
      <t>Alternatively, C can upload the access token while executing the EDHOC protocol, by transporting the access token in the EAD_1 field of the first EDHOC message sent to RS. This is further discussed in <xref target="edhoc-exec"/>, and it is shown by the example in <xref target="example-with-optimization"/>.</t>
      <t>In either case, following the uploading of the access token, C and RS run the EDHOC protocol to completion, by exchanging POST requests and related responses to a dedicated EDHOC resource at RS (see <xref target="edhoc-exec"/>). Once completed the EDHOC execution, C and RS have agreed on a common secret key PRK_out (see <xref section="4.1.3" sectionFormat="of" target="I-D.ietf-lake-edhoc"/>), from which they establish an OSCORE Security Context (see <xref target="edhoc-exec"/>). After that, C and RS use the established OSCORE Security Context to protect their communications when accessing protected resources at RS, as per the access rights specified in the access token (see <xref target="access-rights-verif"/>).</t>
      <t>Note that, by means of the respective authentication credentials, C and RS are mutually authenticated once they have successfully completed the execution of the EDHOC protocol.</t>
      <t>As to proof-of-possession, RS always gains knowledge that C has PRK_out at the end of the successful EDHOC execution. Conversely, C gains knowledge that RS has PRK_out either when receiving and successfully verifying the optional EDHOC message_4 from RS, or when successfully verifying a response from RS protected with the generated OSCORE Security Context.</t>
      <section anchor="c-rs">
        <name>C-to-RS: POST to /authz-info endpoint</name>
        <t>The access token can be uploaded to RS by using the /authz-info endpoint at RS. To this end, C MUST use CoAP <xref target="RFC7252"/> and the Authorization Information endpoint described in <xref section="5.10.1" sectionFormat="of" target="I-D.ietf-ace-oauth-authz"/> in order to transport the access token.</t>
        <t>That is, C sends a POST request to the /authz-info endpoint at RS, with the request payload conveying the access token without any CBOR wrapping. As per <xref section="5.10.1" sectionFormat="of" target="I-D.ietf-ace-oauth-authz"/>, the Content-Format of the POST request has to reflect the format of the transported access token. In particular, if the access token is a CWT, the content-format MUST be "application/cwt".</t>
        <t>The communication with the /authz-info endpoint does not have to be protected, except for the update of access rights case described below.</t>
        <t>In case of initial access token provisioning to RS for this Client, or in other cases without a valid EDHOC session, the uploading of the access token is followed by the execution of the EDHOC protocol (or combined using EAD as described in <xref target="edhoc-exec"/>) and by the derivation of an OSCORE Security Context, as detailed later in this section.</t>
        <t>In the following, we outline some alternative processing, which occur when the provisioned access token or the established OSCORE Security Context for various reasons is no longer available or sufficient. In the cases below, it is assumed that the EDHOC session is still valid, otherwise the processing essentially falls back to the case discussed above.</t>
        <ol spacing="normal" type="1"><li>C may be required to re-POST the access token, since RS may have deleted a stored access token (and associated OSCORE Security Context) at any time, for example due to all storage space being consumed. This situation can be detected by C when it receives a 4.01 (Unauthorized) response from RS, especially as an "AS Request Creation Hints" message (see <xref section="5.3" sectionFormat="of" target="I-D.ietf-ace-oauth-authz"/>.</li>
          <li>C may be posting the first access token in a new series, e.g., because the old access token expired and thus its series terminated.</li>
          <li>
            <t>C may need to update the OSCORE Security Context, e.g., due to a policy limiting its use in terms of time or amount of processed data, or to the imminent exhaustion of the OSCORE Sender Sequence Number space. The OSCORE Security Context can be updated by:  </t>
            <t>
a. using the KUDOS key update protocol specified in <xref target="I-D.ietf-core-oscore-key-update"/>, if supported by both C and RS; or  </t>
            <t>
b. re-posting the access token using the same procedure as in case 1 above.</t>
          </li>
        </ol>
        <t>In cases 1, 2 and 3b, C and RS rely on a protocol similar to the <tt>coap_oscore</tt> profile <xref target="I-D.ietf-ace-oscore-profile"/>, but leveraging the EDHOC-KeyUpdate function (see <xref target="edhoc-key-update"/>) before deriving a new OSCORE Security Context.</t>
        <t>Case 3a provides a lightweight alternative independent of ACE, and does not require the posting of an access token.</t>
        <t>In either case, C and RS establish a new OSCORE Security Context that replaces the old one and will be used for protecting their communications from then on. In particular, RS MUST associate the new OSCORE Security Context with the current (potentially re-posted) access token. Note that, unless C and RS re-run the EDHOC protocol, they preserve their same OSCORE identifiers, i.e., their OSCORE Sender/Recipient IDs.</t>
        <t>If C has already posted a valid access token, has already established an OSCORE Security Context with RS, and wants to update its access rights, then C can do so by posting a new access token to the /authz-info endpoint. The new access token contains the updated access rights for C to access protected resources at RS, and C has to obtain it from AS as a new access token in the same token series of the current one (see <xref target="c-as"/> and <xref target="as-c"/>). When posting the new access token to the /authz-info endpoint, C MUST protect the POST request using the current OSCORE Security Context shared with RS. After successful verification (see <xref target="rs-c"/>), RS will replace the old access token with the new one, while preserving the same OSCORE Security Context. In particular, C and RS do not re-run the EDHOC protocol and they do not establish a new OSCORE Security Context.</t>
      </section>
      <section anchor="rs-c">
        <name>RS-to-C: 2.01 (Created)</name>
        <t>Upon receiving an access token from C, RS MUST follow the procedures defined in <xref section="5.10.1" sectionFormat="of" target="I-D.ietf-ace-oauth-authz"/>. That is, RS must verify the validity of the access token. RS may make an introspection request (see <xref section="5.9.1" sectionFormat="of" target="I-D.ietf-ace-oauth-authz"/>) to validate the access token.</t>
        <t>If the access token is valid, RS proceeds as follows.</t>
        <t>RS checks whether it is already storing the authentication credential of C, namely AUTH_CRED_C, specified as PoP-key in the access token by value or reference. In such a case, RS stores the access token and MUST reply to the POST request with a 2.01 (Created) response.</t>
        <t>Otherwise, RS retrieves AUTH_CRED_C, e.g., from the access token if the authentication credential is specified therein by value, or from a further trusted source pointed to by the AUTH_CRED_C identifier included in the access token. After that, RS validates the actual AUTH_CRED_C. In case of successful validation, RS stores AUTH_CRED_C as a valid authentication credential. Then, RS stores the access token and MUST reply to the POST request with a 2.01 (Created) response.</t>
        <t>If RS does not find an already stored AUTH_CRED_C, or fails to retrieve it or to validate it, then RS MUST respond with an error response code equivalent to the CoAP code 4.00 (Bad Request). RS may provide additional information in the payload of the error response, in order to clarify what went wrong.</t>
        <t>Instead, if the access token is valid but it is associated with claims that RS cannot process (e.g., an unknown scope), or if any of the expected parameters is missing (e.g., any of the mandatory parameters from AS or the identifier "id"), or if any parameters received in the EDHOC_Information is unrecognized, then RS MUST respond with an error response code equivalent to the CoAP code 4.00 (Bad Request). In the latter two cases, RS may provide additional information in the payload of the error response, in order to clarify what went wrong.</t>
        <t>When an access token becomes invalid (e.g., due to its expiration or revocation), RS MUST delete the access token and the associated OSCORE Security Context, and MUST notify C with an error response with code 4.01 (Unauthorized) for any long running request, as specified in <xref section="5.8.3" sectionFormat="of" target="I-D.ietf-ace-oauth-authz"/>.</t>
        <t>If RS receives an access token in an OSCORE protected request, it means that C is requesting an update of access rights. In such a case, RS MUST check that both the following conditions hold.</t>
        <ul spacing="normal">
          <li>RS checks whether it stores an access token T_OLD, such that the "id" field of EDHOC_Identifier matches the "id" field of EDHOC_Identifier in the new access token T_NEW.</li>
          <li>RS checks whether the OSCORE Security Context CTX used to protect the request matches the OSCORE Security Context associated with the stored access token T_OLD.</li>
        </ul>
        <t>If both the conditions above hold, RS MUST replace the old access token T_OLD with the new access token T_NEW, and associate T_NEW with the OSCORE Security Context CTX. Then, RS MUST respond with a 2.01 (Created) response protected with the same OSCORE Security Context, with no payload.</t>
        <t>Otherwise, RS MUST respond with a 4.01 (Unauthorized) error response. RS may provide additional information in the payload of the error response, in order to clarify what went wrong.</t>
        <t>As specified in <xref section="5.10.1" sectionFormat="of" target="I-D.ietf-ace-oauth-authz"/>, when receiving an updated access token with updated authorization information from C (see <xref target="c-rs"/>), it is recommended that RS overwrites the previous access token. That is, only the latest authorization information in the access token received by RS is valid. This simplifies the process needed by RS to keep track of authorization information for a given client.</t>
      </section>
      <section anchor="edhoc-exec">
        <name>EDHOC Execution and Setup of OSCORE Security Context</name>
        <t>In order to mutually authenticate and establish a long-term secret key PRK_out with forward secrecy, C and RS run the EDHOC protocol <xref target="I-D.ietf-lake-edhoc"/>. In particular, C acts as EDHOC Initiator thus sending EDHOC message_1, while RS acts as EDHOC Responder.</t>
        <t>As per <xref section="A.2" sectionFormat="of" target="I-D.ietf-lake-edhoc"/>, C sends EDHOC message_1 and EDHOC message_3 to an EDHOC resource at RS, as CoAP POST requests. Also RS sends EDHOC message_2 and (optionally) EDHOC message_4 as 2.04 (Changed) CoAP responses. If, in the access token response received from AS (see <xref target="c-as"/>), the "uri_path" field of the EDHOC_Information was included, then C MUST target the EDHOC resource at RS with the URI path specified in the "uri_path" field.</t>
        <t>In order to seamlessly run EDHOC, a client does not have to first upload to RS an access token whose scope explicitly indicates authorized access to the EDHOC resource. At the same time, RS has to ensure that attackers cannot perform requests on the EDHOC resource, other than sending EDHOC messages. Specifically, it SHOULD NOT be possible to perform anything else than POST on an EDHOC resource.</t>
        <t>When preparing EDHOC message_1, C performs the following steps, in additions to those defined in <xref section="5.2.1" sectionFormat="of" target="I-D.ietf-lake-edhoc"/>.</t>
        <ul spacing="normal">
          <li>If, in the access token response received from AS (see <xref target="c-as"/>), the "methods" field of the EDHOC_Information was included, then C MUST specify one of those EDHOC methods in the METHOD field of EDHOC message_1. That is, one of the EDHOC methods specified in the "methods" field of EDHOC_Information MUST be the EDHOC method used when running EDHOC with RS.</li>
          <li>If, in the access token response received from AS (see <xref target="c-as"/>), the "cipher_suites" field of the EDHOC_Information was included, then C MUST specify the EDHOC cipher suite therein in the SUITES_I field of EDHOC message_1. That is, the EDHOC cipher suite specified in the "cipher_suites" field of EDHOC_Information MUST be the selected cipher suite when running EDHOC with RS.</li>
          <li>
            <t>Rather than first uploading the access token to the /authz-info endpoint at RS as described in <xref target="c-rs"/>, C MAY include the access token in the EAD_1 field of EDHOC message_1 (see <xref section="3.8" sectionFormat="of" target="I-D.ietf-lake-edhoc"/>). This is shown by the example in <xref target="example-with-optimization"/>.  </t>
            <t>
In such a case, as per <xref section="3.8" sectionFormat="of" target="I-D.ietf-lake-edhoc"/>, C adds the EAD item EAD_ACCESS_TOKEN = (ead_label, ead_value) to the EAD_1 field. In particular, ead_label is the integer value TBD registered in <xref target="iana-edhoc-ead"/> of this document, while ead_value is a CBOR byte string with value the access token. That is, the value of the CBOR byte string is the content of the "access_token" field of the access token response from AS (see <xref target="as-c"/>).  </t>
            <t>
If EDHOC message_1 includes the EAD item EAD_ACCESS_TOKEN within the field EAD_1, then RS MUST process the access token carried out in ead_value as specified in <xref target="rs-c"/>. If such a process fails, RS MUST reply to C as specified in <xref target="rs-c"/>, it MUST discontinue the EDHOC protocol, and it MUST NOT send an EDHOC error message (see <xref section="6" sectionFormat="of" target="I-D.ietf-lake-edhoc"/>). RS MUST have successfully completed the processing of the access token before continuing the EDHOC execution by sending EDHOC message_2.  </t>
            <t>
Note that the EAD_1 field of EDHOC message_1 cannot carry an access token for the update of access rights, but rather only an access token issued as the first of a token series.</t>
          </li>
        </ul>
        <t>In EDHOC message_2, the authentication credential CRED_R indicated by the message field ID_CRED_R is the authentication credential of RS, namely AUTH_CRED_RS, that C obtained from AS. The processing of EDHOC message_2 is defined in detail in <xref section="5.3" sectionFormat="of" target="I-D.ietf-lake-edhoc"/>.</t>
        <t>In EDHOC message_3, the authentication credential CRED_I indicated by the message field ID_CRED_I is the authentication credential of C, namely AUTH_CRED_C, i.e., the PoP key bound to the access token and specified therein. The processing of EDHOC message_3 is defined in detail in <xref section="5.4" sectionFormat="of" target="I-D.ietf-lake-edhoc"/>.</t>
        <t>Once successfully completed the EDHOC execution, C and RS have both derived the long-term secret key PRK_out (see <xref section="4.1.3" sectionFormat="of" target="I-D.ietf-lake-edhoc"/>), from which they both derive the key PRK_Exporter (see <xref section="4.2.1" sectionFormat="of" target="I-D.ietf-lake-edhoc"/>). Then, C and RS derive an OSCORE Security Context, as defined in <xref section="A.1" sectionFormat="of" target="I-D.ietf-lake-edhoc"/>. In addition, the following applies.</t>
        <ul spacing="normal">
          <li>If, in the access token response received from AS (see <xref target="c-as"/>) and in the access token, the "osc_ms_size" field of the EDHOC_Information was included, then C and RS MUST use the value specified in the "osc_ms_size" field as length in bytes of the OSCORE Master Secret. That is, the value of the "osc_ms_size" field MUST be used as value for the oscore_key_length parameter of the EDHOC-Exporter function when deriving the OSCORE Master Secret (see <xref section="A.1" sectionFormat="of" target="I-D.ietf-lake-edhoc"/>).</li>
          <li>If, in the access token response received from AS (see <xref target="c-as"/>) and in the access token, the "osc_salt_size" field of the EDHOC_Information was included, then C and RS MUST use the value specified in the "osc_salt_size" field as length in bytes of the OSCORE Master Salt. That is, the value of the "osc_salt_size" field MUST be used as value for the oscore_salt_length parameter of the EDHOC-Exporter function when deriving the OSCORE Master Salt (see <xref section="A.1" sectionFormat="of" target="I-D.ietf-lake-edhoc"/>).</li>
          <li>If, in the access token response received from AS (see <xref target="c-as"/>) and in the access token, the "osc_version" field of the EDHOC_Information was included, then C and RS MUST derive the OSCORE Security Context, and later use it to protect their communications, consistently with the OSCORE version specified in the "osc_version" field.</li>
          <li>Given AUTH_CRED_C the authentication credential of C used as CRED_I in the completed EDHOC execution, RS associates the derived OSCORE Security Context with the stored access token bound to AUTH_CRED_C as PoP-key (regardless of whether AUTH_CRED_C is specified by value or by reference in the access token claims).</li>
        </ul>
        <t>If C supports it, C MAY use the EDHOC + OSCORE combined request defined in <xref target="I-D.ietf-core-oscore-edhoc"/>, as also shown by the example in <xref target="example-with-optimization"/>. In such a case, both EDHOC message_3 and the first OSCORE-protected application request to a protected resource are sent to RS as combined together in a single OSCORE-protected CoAP request, thus saving one round trip. This requires C to derive the OSCORE Security Context with RS already after having successfully processed the received EDHOC message_2. If, in the access token response received from AS (see <xref target="c-as"/>), the "comb_req" field of the EDHOC_Information was included and specified the CBOR simple value "false" (0xf4), then C MUST NOT use the EDHOC + OSCORE combined request with RS.</t>
      </section>
      <section anchor="access-rights-verif">
        <name>Access Rights Verification</name>
        <t>RS MUST follow the procedures defined in <xref section="5.10.2" sectionFormat="of" target="I-D.ietf-ace-oauth-authz"/>. That is, if RS receives an OSCORE-protected request targeting a protected resource from C, then RS processes the request according to <xref target="RFC8613"/>, when Version 1 of OSCORE is used. Future specifications may define new versions of OSCORE, that AS can indicate C and RS to use by means of the "osc_version" field of EDHOC_Information (see <xref target="c-as-comm"/>).</t>
        <t>If OSCORE verification succeeds and the target resource requires authorization, RS retrieves the authorization information using the access token associated with the OSCORE Security Context. Then, RS must verify that the authorization information covers the target resource and the action intended by C on it.</t>
      </section>
    </section>
    <section anchor="edhoc-key-update">
      <name>Use of EDHOC-KeyUpdate</name>
      <t>Once successfully completed an EDHOC execution, C and RS are expected to preserve the EDHOC state of such an execution, as long as the authentication credentials of both C and RS, namely AUTH_CRED_C and AUTH_CRED_RS are valid. This especially consists in preserving the secret key PRK_out attained at the end of the EDHOC execution.</t>
      <t>In case C has to establish a new OSCORE Security Context with RS, and as long as the outcome of their previously completed EDHOC execution is still valid, C and RS MUST rely on the EDHOC-KeyUpdate function defined in <xref section="4.2.2" sectionFormat="of" target="I-D.ietf-lake-edhoc"/> as further specified in the rest of this section, rather than re-running the EDHOC protocol. When supporting this profile, both C and RS MUST support the EDHOC-KeyUpdate function. The procedure is sketched in <xref target="key-update-procedure"/>.</t>
      <figure anchor="key-update-procedure">
        <name>Updated OSCORE Security Context using EDHOC-KeyUpdate</name>
        <artwork align="center"><![CDATA[
   C                            RS
   |                            |
   |                            |
   | ---- POST /authz-info ---> |
   |     (access_token, N1)     |
   |                            |
   | <--- 2.01 Created (N2) --- |
   |                            |

  /Apply EDHOC-KeyUpdate with
   concatenated nonces as input,
   derive OSCORE Security Context/

   |                            |
   | ---- OSCORE Request -----> |
   |                            |
   |        /Proof-of-possession and
   |         Security Context storage/
   |                            |
   | <--- OSCORE Response ----- |
   |                            |
/Proof-of-possession and        |
 Security Context storage/      |
   |                            |
   | ---- OSCORE Request -----> |
   |                            |
   | <--- OSCORE Response ----- |
   |                            |
   |           ...              |
]]></artwork>
      </figure>
      <t>Establishing a new OSCORE Security Context by leveraging the EDHOC-KeyUpdate function is possible in the following cases.</t>
      <ul spacing="normal">
        <li>C has to upload to RS the newly obtained, first access token of a new token series, as an unprotected POST request to the /authz-info endpoint at RS. This is the case after the latest access token of the previous token series has become invalid (e.g., it expired or got revoked), and thus RS has deleted it together with the associated OSCORE Security Context (see <xref target="discard-context"/>).</li>
        <li>C re-uploads to RS the current access token shared with RS, i.e., the latest access token in the current token series, as an unprotected POST request to the /authz-info endpoint at RS. Like in <xref target="c-rs"/>, this is the case when C simply wants to replace the current OSCORE Security Context with a new one, and associate it with the same current, re-uploaded access token.</li>
      </ul>
      <t>In either case, C and RS have to establish a new OSCORE Security Context and to associate it with the (re-)uploaded access token.</t>
      <t>When using this approach, C and RS perform the following actions.</t>
      <t>C MUST generate a nonce value N1 very unlikely to have been used with the same pair of authentication credentials (AUTH_CRED_C, AUTH_CRED_RS). When using this profile, it is RECOMMENDED to use a 64-bit long random number as the nonce's value. C MUST store the nonce N1 as long as the response from RS is not received and the access token related to it is still valid (to the best of C's knowledge).</t>
      <t>C MUST use CoAP <xref target="RFC7252"/> and the Authorization Information resource as described in <xref section="5.10.1" sectionFormat="of" target="I-D.ietf-ace-oauth-authz"/> to transport the access token and N1 to RS.</t>
      <t>Note that, unlike what is defined in <xref target="c-rs"/>, the use of the payload and of the Content-Format is different from what is described in <xref section="5.10.1" sectionFormat="of" target="I-D.ietf-ace-oauth-authz"/>, where only the access token is transported and without any CBOR wrapping. That is, C MUST wrap the access token and N1 in a CBOR map, and MUST use the Content-Format "application/ace+cbor" defined in <xref section="8.16" sectionFormat="of" target="I-D.ietf-ace-oauth-authz"/>. The CBOR map MUST specify the access token using the "access_token" parameter, and N1 using the "nonce1" parameter defined in <xref section="4.1.1" sectionFormat="of" target="I-D.ietf-ace-oscore-profile"/>.</t>
      <t>The communication with the /authz-info endpoint at RS MUST NOT be protected. This approach is not applicable when C uploads to RS for the first time an access token to update access rights (which rather requires protected communication and does not result in deriving a new OSCORE Security Context).</t>
      <t><xref target="fig-post-edhoc-key-update"/> shows an example of the POST request sent by C to RS. The access token has been truncated for readability.</t>
      <figure anchor="fig-post-edhoc-key-update">
        <name>Example of C-to-RS POST /authz-info request using CWT and EDHOC-KeyUpdate</name>
        <artwork><![CDATA[
   Header: POST (Code=0.02)
   Uri-Host: "rs.example.com"
   Uri-Path: "authz-info"
   Content-Format: "application/ace+cbor"
   Payload:
     {
       "access_token": h'8343a1010aa2044c53 ...
        (remainder of access token (CWT) omitted for brevity)',
       "nonce1": h'018a278f7faab55a'
     }
]]></artwork>
      </figure>
      <t>Upon receiving the POST request from C, RS MUST follow the procedures defined in <xref section="5.10.1" sectionFormat="of" target="I-D.ietf-ace-oauth-authz"/>. That is, RS must verify the validity of the access token. RS may make an introspection request (see <xref section="5.9.1" sectionFormat="of" target="I-D.ietf-ace-oauth-authz"/>) to validate the access token.</t>
      <t>If the access token is valid, RS proceeds as follows.</t>
      <t>RS checks whether it is already storing the authentication credential of C, namely AUTH_CRED_C, specified as PoP-key in the access token by value or reference.</t>
      <t>If RS does not find AUTH_CRED_C among the stored authentication credentials, RS retrieves AUTH_CRED_C, e.g., from the access token if the authentication credential is specified therein by value, or from a further trusted source pointed to by the AUTH_CRED_C identifier included in the access token. After that, RS validates the actual AUTH_CRED_C. In case of successful validation, RS stores AUTH_CRED_C as a valid authentication credential.</t>
      <t>If RS does not find an already stored AUTH_CRED_C, or fails to retrieve it or to validate it, then RS MUST respond with an error response code equivalent to the CoAP code 4.00 (Bad Request). RS may provide additional information in the payload of the error response, in order to clarify what went wrong.</t>
      <t>If the access token is valid but it is associated with claims that RS cannot process (e.g., an unknown scope), or if any of the expected parameters is missing (e.g., any of the mandatory parameters from AS or the identifier "id"), or if any parameters received in the EDHOC_Information is unrecognized, then RS MUST respond with an error response code equivalent to the CoAP code 4.00 (Bad Request). In the latter two cases, RS may provide additional information in the payload of the error response, in order to clarify what went wrong.</t>
      <t>If RS does not find the stored state of a completed EDHOC execution where the authentication credential AUTH_CRED_C was used as CRED_I, then RS MUST respond with an error response code equivalent to the CoAP code 4.00 (Bad Request). RS may provide additional information in the payload of the error response, in order to clarify what went wrong.</t>
      <t>Otherwise, if all the steps above are successful, RS stores the access token and MUST generate a nonce N2 very unlikely to have been previously used with the same pair of authentication credentials (AUTH_CRED_C, AUTH_CRED_RS). When using this profile, it is RECOMMENDED to use a 64-bit long random number as the nonce's value. Then, RS MUST reply to the POST request with a 2.01 (Created) response, for which RS MUST use the Content-Format "application/ace+cbor" defined in <xref section="8.16" sectionFormat="of" target="I-D.ietf-ace-oauth-authz"/>. The payload of the response MUST be a CBOR map, which MUST specify N2 using the "nonce2" parameter defined in <xref section="4.2.1" sectionFormat="of" target="I-D.ietf-ace-oscore-profile"/>.</t>
      <t><xref target="fig-rs-c-edhoc-key-update"/> shows an example of the response sent by RS to C.</t>
      <figure anchor="fig-rs-c-edhoc-key-update">
        <name>Example of RS-to-C 2.01 (Created) response using EDHOC-KeyUpdate</name>
        <artwork><![CDATA[
   Header: Created (Code=2.01)
   Content-Format: "application/ace+cbor"
   Payload:
     {
       "nonce2": h'25a8991cd700ac01'
     }
]]></artwork>
      </figure>
      <t>Once they have exchanged N1 and N2, both C and RS build a CBOR byte string EXTENDED_NONCE as follows.</t>
      <t>First, RAW_STRING is prepared as the concatenation of N1 and N2, in this order: RAW_STRING = N1 | N2, where | denotes byte string concatenation, and N1 and N2 are the two nonces encoded as CBOR byte strings. Then, the resulting RAW_STRING is wrapped into the CBOR byte string EXTENDED_NONCE.</t>
      <t>An example is given in <xref target="fig-edhoc-key-update-string"/>, with reference to the values of N1 and N2 shown in <xref target="fig-post-edhoc-key-update"/> and <xref target="fig-rs-c-edhoc-key-update"/>.</t>
      <figure anchor="fig-edhoc-key-update-string">
        <name>Example of EXTENDED_NONCE construction, with N1 and N2 encoded in CBOR</name>
        <artwork><![CDATA[
   N1 and N2 expressed in CBOR diagnostic notation
   N1 = h'018a278f7faab55a'
   N2 = h'25a8991cd700ac01'

   N1 and N2 as CBOR encoded byte strings
   N1 = 0x48018a278f7faab55a
   N2 = 0x4825a8991cd700ac01

   RAW_STRING = 0x48 018a278f7faab55a 48 25a8991cd700ac01

   EXTENDED_NONCE expressed in CBOR diagnostic notation
   EXTENDED_NONCE = h'48018a278f7faab55a4825a8991cd700ac01'

   EXTENDED_NONCE as CBOR encoded byte string
   EXTENDED_NONCE = 0x52 48018a278f7faab55a4825a8991cd700ac01
]]></artwork>
      </figure>
      <t>If JSON is used instead of CBOR, then RAW_STRING is the Base64 encoding of the concatenation of the same parameters, each of them prefixed by their size encoded in 1 byte. When using JSON, the nonces have a maximum size of 255 bytes. An example is given in <xref target="fig-edhoc-key-update-string-json"/>, where the nonces and RAW_STRING are encoded in Base64.</t>
      <figure anchor="fig-edhoc-key-update-string-json">
        <name>Example of EXTENDED_NONCE construction, with N1 and N2 encoded in JSON</name>
        <artwork><![CDATA[
   N1 and N2 values
   N1 = 0x018a278f7faab55a (8 bytes)
   N2 = 0x25a8991cd700ac01 (8 bytes)

   Input to Base64 encoding:
   0x08 018a278f7faab55a 08 25a8991cd700ac01

   RAW_STRING = b64'CAGKJ49/qrVaCCWomRzXAKwB'

   EXTENDED_NONCE expressed in CBOR diagnostic notation
   EXTENDED_NONCE = h'08018a278f7faab55a0825a8991cd700ac01'

   EXTENDED_NONCE as CBOR encoded byte string
   EXTENDED_NONCE = 0x52 08018a278f7faab55a0825a8991cd700ac01
]]></artwork>
      </figure>
      <t>Once computed the CBOR byte string EXTENDED_NONCE, both C and RS perform the following steps.</t>
      <ol spacing="normal" type="1"><li>C and RS refer to the stored state of a completed EDHOC execution where the authentication credential AUTH_CRED_C was used as CRED_I. In case of multiple matches, the state of the latest completed EDHOC execution is considered.</li>
        <li>With reference to the EDHOC state determined at the previous step, C and RS invoke the EDHOC-KeyUpdate function (see <xref section="4.2.2" sectionFormat="of" target="I-D.ietf-lake-edhoc"/>), specifying the CBOR byte string EXTENDED_NONCE as "context" argument. This results in updating the secret key PRK_out to be considered from here on for this EDHOC state.</li>
        <li>With reference to the same EDHOC state as above, C and RS update the secret key PRK_Exporter as per <xref section="4.2.1" sectionFormat="of" target="I-D.ietf-lake-edhoc"/>. In particular, the key PRK_out derived at step 2 is specified as "PRK_out" argument. This results in updating the secret key PRK_Exporter to be considered from here on for this EDHOC state.</li>
        <li>C and RS establish a new OSCORE Security Context as defined in <xref target="edhoc-exec"/>, just like if they had completed an EDHOC execution. Note that, since C and RS have not re-run the EDHOC protocol, they preserve their same OSCORE identifiers, i.e., their OSCORE Sender/Recipient IDs.</li>
        <li>RS associates the posted access token with the OSCORE Security Context established at step 4. In case C has in fact re-posted a still valid access token, RS also discards the old OSCORE Security Context previously associated with that access token.</li>
        <li>Hereafter, C and RS use the OSCORE Security Context established at step 4 to protect their communications.</li>
      </ol>
    </section>
    <section anchor="secure-comm-as">
      <name>Secure Communication with AS</name>
      <t>As specified in the ACE framework (see Sections <xref target="I-D.ietf-ace-oauth-authz" section="5.8" sectionFormat="bare"/> and <xref target="I-D.ietf-ace-oauth-authz" section="5.9" sectionFormat="bare"/> of <xref target="I-D.ietf-ace-oauth-authz"/>), the requesting entity (RS and/or C) and AS communicates via the /introspect or /token endpoint. When using this profile, the use of CoAP <xref target="RFC7252"/> and OSCORE <xref target="RFC8613"/> for this communication is RECOMMENDED. Other protocols fulfilling the security requirements defined in <xref section="5" sectionFormat="of" target="I-D.ietf-ace-oauth-authz"/> (such as HTTP and DTLS or TLS) MAY be used instead.</t>
      <t>If OSCORE is used, the requesting entity and AS need to have a OSCORE Security Context in place. While this can be pre-installed, the requesting entity and AS can establish such an OSCORE Security Context, for example, by running the EDHOC protocol, as shown between C and AS by the examples in <xref target="example-without-optimization"/>, <xref target="example-with-optimization"/> and <xref target="example-without-optimization-as-posting"/>. The requesting entity and AS communicate through the /introspect endpoint as specified in <xref section="5.9" sectionFormat="of" target="I-D.ietf-ace-oauth-authz"/> and through the /token endpoint as specified in <xref section="5.8" sectionFormat="of" target="I-D.ietf-ace-oauth-authz"/>.</t>
      <t>Furthermore, as defined in <xref target="as-c"/> and shown by the example in <xref target="example-without-optimization-as-posting"/>, AS may upload the access token to the /authz-info endpoint at RS, on behalf of C. In such a case, that exchange between AS and RS is not protected, just like when C uploads the access token to RS by itself.</t>
    </section>
    <section anchor="discard-context">
      <name>Discarding the Security Context</name>
      <t>There are a number of cases where C or RS have to discard the OSCORE Security Context, and possibly establish a new one.</t>
      <t>C MUST discard the current OSCORE Security Context shared with RS when any of the following occurs.</t>
      <ul spacing="normal">
        <li>The OSCORE Sender Sequence Number space of C gets exhausted.</li>
        <li>The access token associated with the OSCORE Security Context becomes invalid, for example due to expiration or revocation.</li>
        <li>C receives a number of 4.01 (Unauthorized) responses to OSCORE-protected requests sent to RS and protected using the same OSCORE Security Context. The exact number of such received responses needs to be specified by the application.</li>
        <li>C receives a nonce N2 in the 2.01 (Created) response to an unprotected POST request to the /authz-info endpoint at RS, when re-posting a still valid access token associated with the existing OSCORE Security context together with a nonce N1, in order to trigger the use of the EDHOC-KeyUpdate function (see <xref target="edhoc-key-update"/>).</li>
        <li>The authentication credential of C (of RS) becomes invalid (e.g., due to expiration or revocation), and it was used as CRED_I (CRED_R) in the EDHOC execution whose PRK_out was used to establish the OSCORE Security Context.</li>
      </ul>
      <t>RS MUST discard the current OSCORE Security Context shared with C when any of the following occurs:</t>
      <ul spacing="normal">
        <li>The OSCORE Sender Sequence Number space of RS gets exhausted.</li>
        <li>The access token associated with the OSCORE Security Context becomes invalid, for example due to expiration or revocation.</li>
        <li>The current OSCORE Security Context shared with C has been successfully replaced  with a newer one, following an unprotected POST request to the /authz-info endpoint at RS that re-posted a still valid access token together with a nonce N1, in order to trigger the use of the EDHOC-KeyUpdate function (see <xref target="edhoc-key-update"/>).</li>
        <li>The authentication credential of C (of RS) becomes invalid (e.g., due to expiration or revocation), and it was used as CRED_I (CRED_R) in the EDHOC execution whose PRK_out was used to establish the OSCORE Security Context.</li>
      </ul>
      <t>After a new access token is successfully uploaded to RS, and a new OSCORE Security Context is established between C and RS, messages still in transit that were protected with the previous OSCORE Security Context might not be successfully verified by the recipient, since the old OSCORE Security Context might have been discarded. This means that messages sent shortly before C has uploaded the new access token to RS might not be successfully accepted by the recipient.</t>
      <t>Furthermore, implementations may want to cancel CoAP observations at RS, if registered before the new OSCORE Security Context has been established. Alternatively, applications need to implement a mechanism to ensure that, from then on, messages exchanged within those observations are going to be protected with the newly derived OSCORE Security Context.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This document specifies a profile for the Authentication and Authorization for Constrained Environments (ACE) framework <xref target="I-D.ietf-ace-oauth-authz"/>. Thus, the general security considerations from the ACE framework also apply to this profile.</t>
      <t>Furthermore, the security considerations from OSCORE <xref target="RFC8613"/> and from EDHOC <xref target="I-D.ietf-lake-edhoc"/> also apply to this specific use of the OSCORE and EDHOC protocols.</t>
      <t>As previously stated, once completed the EDHOC execution, C and RS are mutually authenticated through their respective authentication credentials, whose retrieval has been facilitated by AS. Also once completed the EDHOC execution, C and RS have established a long-term secret key PRK_out enjoying forward secrecy. This is in turn used by C and RS to establish an OSCORE Security Context.</t>
      <t>Furthermore, RS achieves confirmation that C has PRK_out (proof-of-possession) when completing the EDHOC execution. Rather, C achieves confirmation that RS has PRK_out (proof-of-possession) either when receiving the optional EDHOC message_4 from RS, or when successfully verifying a response from RS protected with the established OSCORE Security Context.</t>
      <t>OSCORE is designed to secure point-to-point communication, providing a secure binding between a request and the corresponding response(s). Thus, the basic OSCORE protocol is not intended for use in point-to-multipoint communication (e.g., enforced via multicast or a publish-subscribe model). Implementers of this profile should make sure that their use case of OSCORE corresponds to the expected one, in order to prevent weakening the security assurances provided by OSCORE.</t>
      <t>As defined in <xref target="edhoc-key-update"/>, C can (re-)post an access token to RS and contextually exchange two nonces N1 and N2, in order to efficiently use the EDHOC-KeyUpdate function rather than re-running the EDHOC protocol with RS. The use of nonces guarantees uniqueness of the new PRK_out derived by running EDHOC_KeyUpdate. Consequently, it ensures uniqueness of the AEAD (nonce, key) pairs later used by C and RS, when protecting their communications with the OSCORE Security Context established after updating PRK_out. Thus, it is REQUIRED that the exchanged nonces are not reused with the same pair of authentication credentials (AUTH_CRED_C, AUTH_CRED_RS), even in case of reboot. When using this profile, it is RECOMMENDED to use a 64-bit long random numbers as a nonce's value. Considering the birthday paradox, the average collision for each nonce will happen after 2^32 messages, which amounts to considerably more issued access token than it would be expected for intended applications. If applications use something else, such as a counter, they need to guarantee that reboot and loss of state on either node does not yield reuse of nonces. If that is not guaranteed, nodes are susceptible to reuse of AEAD (nonce, key) pairs, especially since an on-path attacker can cause the use of a previously exchanged nonce N1 by replaying the corresponding C-to-RS message.</t>
      <t>When using this profile, it is RECOMMENDED that RS stores only one access token per client. The use of multiple access tokens for a single client increases the strain on RS, since it must consider every access token associated with the client and calculate the actual permissions that client has. Also, access tokens indicating different or disjoint permissions from each other may lead RS to enforce wrong permissions.  If one of the access tokens expires earlier than others, the resulting permissions may offer insufficient protection. Developers SHOULD avoid using multiple access tokens for a same client. Furthermore, RS MUST NOT store more than one access token per client per PoP-key (i.e., per client's authentication credential).</t>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>This document specifies a profile for the Authentication and Authorization for Constrained Environments (ACE) framework <xref target="I-D.ietf-ace-oauth-authz"/>. Thus, the general privacy considerations from the ACE framework also apply to this profile.</t>
      <t>Furthermore, the privacy considerations from OSCORE <xref target="RFC8613"/> and from EDHOC <xref target="I-D.ietf-lake-edhoc"/> also apply to this specific use of the OSCORE and EDHOC protocols.</t>
      <t>An unprotected response to an unauthorized request may disclose information about RS and/or its existing relationship with C. It is advisable to include as little information as possible in an unencrypted response. When an OSCORE Security Context already exists between C and RS, more detailed information may be included.</t>
      <t>Except for the case where C attempts to update its access rights, the (encrypted) access token is sent in an unprotected POST request to the /authz-info endpoint at RS. Thus, if C uses the same single access token from multiple locations, it can risk being tracked by the access token's value even when the access token is encrypted.</t>
      <t>As defined in <xref target="edhoc-key-update"/>, C can (re-)post an access token to RS and contextually exchange two nonces N1 and N2, in order to efficiently use the EDHOC-KeyUpdate function rather than re-running the EDHOC protocol with RS. Since the exchanged nonces are also sent in the clear, using random nonces is best for privacy, as opposed to, e.g., a counter that might leak some information about C.</t>
      <t>The identifiers used in OSCORE, i.e., the OSCORE Sender/Recipient IDs, are negotiated by C and RS during the EDHOC execution. That is, the EDHOC Connection Identifier C_I of C is going to be the OSCORE Recipient ID of C (the OSCORE Sender ID of RS). Conversely, the EDHOC Connection Identifier C_R of RS is going to be the OSCORE Recipient ID of RS (the OSCORE Sender ID of C). These OSCORE identifiers are privacy sensitive (see <xref section="12.8" sectionFormat="of" target="RFC8613"/>). In particular, they could reveal information about C, or may be used for correlating different requests from C, e.g., across different networks that C has joined and left over time. This can be mitigated if C and RS dynamically update their OSCORE identifiers, e.g., by using the method defined in <xref target="I-D.ietf-core-oscore-key-update"/>.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has the following actions for IANA.</t>
      <t>Note to RFC Editor: Please replace all occurrences of "[RFC-XXXX]" with
the RFC number of this specification and delete this paragraph.</t>
      <section anchor="iana-ace-oauth-profile">
        <name>ACE OAuth Profile Registry</name>
        <t>IANA is asked to add the following entry to the "ACE OAuth Profile"
Registry following the procedure specified in <xref target="I-D.ietf-ace-oauth-authz"/>.</t>
        <ul spacing="normal">
          <li>Profile name: coap_edhoc_oscore</li>
          <li>Profile Description: Profile for delegating client authentication and
authorization in a constrained environment by establishing an OSCORE Security Context <xref target="RFC8613"/> between resource-constrained nodes, through the execution of the authenticated key establishment protocol EDHOC <xref target="I-D.ietf-lake-edhoc"/>.</li>
          <li>Profile ID:  TBD (value between 1 and 255)</li>
          <li>Change Controller: IESG</li>
          <li>Reference:  [RFC-XXXX]</li>
        </ul>
      </section>
      <section anchor="iana-oauth-params">
        <name>OAuth Parameters Registry</name>
        <t>IANA is asked to add the following entries to the "OAuth Parameters" registry.</t>
        <ul spacing="normal">
          <li>Name: "edhoc_info"</li>
          <li>Parameter Usage Location: token request, token response</li>
          <li>Change Controller: IESG</li>
          <li>Specification Document(s): [RFC-XXXX]</li>
        </ul>
        <t> </t>
        <ul spacing="normal">
          <li>Name: "token_uploaded"</li>
          <li>Parameter Usage Location: token response</li>
          <li>Change Controller: IESG</li>
          <li>Specification Document(s): [RFC-XXXX]</li>
        </ul>
      </section>
      <section anchor="iana-oauth-cbor-mappings">
        <name>OAuth Parameters CBOR Mappings Registry</name>
        <t>IANA is asked to add the following entries to the "OAuth Parameters CBOR Mappings" following the procedure specified in <xref target="I-D.ietf-ace-oauth-authz"/>.</t>
        <ul spacing="normal">
          <li>Name: "edhoc_info"</li>
          <li>CBOR Key: TBD</li>
          <li>Value Type: map</li>
          <li>Specification Document(s): [RFC-XXXX]</li>
        </ul>
        <t> </t>
        <ul spacing="normal">
          <li>Name: "token_uploaded"</li>
          <li>CBOR Key: TBD</li>
          <li>Value Type: simple value "true" / simple type "false"</li>
          <li>Specification Document(s): [RFC-XXXX]</li>
        </ul>
      </section>
      <section anchor="iana-token-json-claims">
        <name>JSON Web Token Claims Registry</name>
        <t>IANA is asked to add the following entries to the "JSON Web Token Claims" registry following the procedure specified in <xref target="RFC7519"/>.</t>
        <ul spacing="normal">
          <li>Claim Name: "edhoc_info"</li>
          <li>Claim Description: Information for EDHOC execution</li>
          <li>Change Controller: IETF</li>
          <li>Reference: [RFC-XXXX]</li>
        </ul>
      </section>
      <section anchor="iana-token-cwt-claims">
        <name>CBOR Web Token Claims Registry</name>
        <t>IANA is asked to add the following entries to the "CBOR Web Token Claims" registry following the procedure specified in <xref target="RFC8392"/>.</t>
        <ul spacing="normal">
          <li>Claim Name: "edhoc_info"</li>
          <li>Claim Description: Information for EDHOC execution</li>
          <li>JWT Claim Name: "edhoc_info"</li>
          <li>Claim Key: TBD</li>
          <li>Claim Value Type(s): map</li>
          <li>Change Controller: IESG</li>
          <li>Specification Document(s): [RFC-XXXX]</li>
        </ul>
      </section>
      <section anchor="iana-jwt-confirmation-methods">
        <name>JWT Confirmation Methods Registry</name>
        <t>IANA is asked to add the following entries to the "JWT Confirmation Methods" registry following the procedure specified in <xref target="RFC7800"/>.</t>
        <ul spacing="normal">
          <li>Confirmation Method Value: "x5bag"</li>
          <li>Confirmation Method Description: An unordered bag of X.509 certificates</li>
          <li>Change Controller: IESG</li>
          <li>Specification Document(s): [RFC-XXXX]</li>
        </ul>
        <t> </t>
        <ul spacing="normal">
          <li>Confirmation Method Value: "x5chain"</li>
          <li>Confirmation Method Description: An ordered chain of X.509 certificates</li>
          <li>Change Controller: IESG</li>
          <li>Specification Document(s): [RFC-XXXX]</li>
        </ul>
        <t> </t>
        <ul spacing="normal">
          <li>Confirmation Method Value: "x5t"</li>
          <li>Confirmation Method Description: Hash of an X.509 certificate</li>
          <li>Change Controller: IESG</li>
          <li>Specification Document(s): [RFC-XXXX]</li>
        </ul>
        <t> </t>
        <ul spacing="normal">
          <li>Confirmation Method Value: "x5u"</li>
          <li>Confirmation Method Description: URI pointing to an X.509 certificate</li>
          <li>Change Controller: IESG</li>
          <li>Specification Document(s): [RFC-XXXX]</li>
        </ul>
        <t> </t>
        <ul spacing="normal">
          <li>Confirmation Method Value: "c5b"</li>
          <li>Confirmation Method Description: An unordered bag of C509 certificates</li>
          <li>Change Controller: IESG</li>
          <li>Specification Document(s): [RFC-XXXX]</li>
        </ul>
        <t> </t>
        <ul spacing="normal">
          <li>Confirmation Method Value: "c5c"</li>
          <li>Confirmation Method Description: An ordered chain of C509 certificates</li>
          <li>Change Controller: IESG</li>
          <li>Specification Document(s): [RFC-XXXX]</li>
        </ul>
        <t> </t>
        <ul spacing="normal">
          <li>Confirmation Method Value: "c5t"</li>
          <li>Confirmation Method Description: Hash of an C509 certificate</li>
          <li>Change Controller: IESG</li>
          <li>Specification Document(s): [RFC-XXXX]</li>
        </ul>
        <t> </t>
        <ul spacing="normal">
          <li>Confirmation Method Value: "c5u"</li>
          <li>Confirmation Method Description: URI pointing to a COSE_C509 containing an ordered chain of certificates</li>
          <li>Change Controller: IESG</li>
          <li>Specification Document(s): [RFC-XXXX]</li>
        </ul>
        <t> </t>
        <ul spacing="normal">
          <li>Confirmation Method Value: "kcwt"</li>
          <li>Confirmation Method Description: A CBOR Web Token (CWT) containing a COSE_Key in a 'cnf' claim</li>
          <li>Change Controller: IESG</li>
          <li>Specification Document(s): [RFC-XXXX]</li>
        </ul>
        <t> </t>
        <ul spacing="normal">
          <li>Confirmation Method Value: "kccs"</li>
          <li>Confirmation Method Description: A CWT Claims Set (CCS) containing a COSE_Key in a 'cnf' claim</li>
          <li>Change Controller: IESG</li>
          <li>Specification Document(s): [RFC-XXXX]</li>
        </ul>
        <t> </t>
      </section>
      <section anchor="iana-cwt-confirmation-methods">
        <name>CWT Confirmation Methods Registry</name>
        <t>IANA is asked to add the following entries to the "CWT Confirmation Methods" registry following the procedure specified in <xref target="RFC8747"/>.</t>
        <ul spacing="normal">
          <li>Confirmation Method Name: x5bag</li>
          <li>Confirmation Method Description: An unordered bag of X.509 certificates</li>
          <li>JWT Confirmation Method Name: "x5bag"</li>
          <li>Confirmation Key: TBD</li>
          <li>Confirmation Value Type(s): COSE_X509</li>
          <li>Change Controller: IESG</li>
          <li>Specification Document(s): [RFC-XXXX]</li>
        </ul>
        <t> </t>
        <ul spacing="normal">
          <li>Confirmation Method Name: x5chain</li>
          <li>Confirmation Method Description: An ordered chain of X.509 certificates</li>
          <li>JWT Confirmation Method Name: "x5chain"</li>
          <li>Confirmation Key: TBD</li>
          <li>Confirmation Value Type(s): COSE_X509</li>
          <li>Change Controller: IESG</li>
          <li>Specification Document(s): [RFC-XXXX]</li>
        </ul>
        <t> </t>
        <ul spacing="normal">
          <li>Confirmation Method Name: x5t</li>
          <li>Confirmation Method Description: Hash of an X.509 certificate</li>
          <li>JWT Confirmation Method Name: "x5t"</li>
          <li>Confirmation Key: TBD</li>
          <li>Confirmation Value Type(s): COSE_CertHash</li>
          <li>Change Controller: IESG</li>
          <li>Specification Document(s): [RFC-XXXX]</li>
        </ul>
        <t> </t>
        <ul spacing="normal">
          <li>Confirmation Method Name: x5u</li>
          <li>Confirmation Method Description: URI pointing to an X.509 certificate</li>
          <li>JWT Confirmation Method Name: "x5u"</li>
          <li>Confirmation Key: TBD</li>
          <li>Confirmation Value Type(s): uri</li>
          <li>Change Controller: IESG</li>
          <li>Specification Document(s): [RFC-XXXX]</li>
        </ul>
        <t> </t>
        <ul spacing="normal">
          <li>Confirmation Method Name: c5b</li>
          <li>Confirmation Method Description: An unordered bag of C509 certificates</li>
          <li>JWT Confirmation Method Name: "c5b"</li>
          <li>Confirmation Key: TBD</li>
          <li>Confirmation Value Type(s): COSE_C509</li>
          <li>Change Controller: IESG</li>
          <li>Specification Document(s): [RFC-XXXX]</li>
        </ul>
        <t> </t>
        <ul spacing="normal">
          <li>Confirmation Method Name: c5c</li>
          <li>Confirmation Method Description: An ordered chain of C509 certificates</li>
          <li>JWT Confirmation Method Name: "c5c"</li>
          <li>Confirmation Key: TBD</li>
          <li>Confirmation Value Type(s): COSE_C509</li>
          <li>Change Controller: IESG</li>
          <li>Specification Document(s): [RFC-XXXX]</li>
        </ul>
        <t> </t>
        <ul spacing="normal">
          <li>Confirmation Method Name: c5t</li>
          <li>Confirmation Method Description: Hash of an C509 certificate</li>
          <li>JWT Confirmation Method Name: "c5t"</li>
          <li>Confirmation Key: TBD</li>
          <li>Confirmation Value Type(s): COSE_CertHash</li>
          <li>Change Controller: IESG</li>
          <li>Specification Document(s): [RFC-XXXX]</li>
        </ul>
        <t> </t>
        <ul spacing="normal">
          <li>Confirmation Method Name: c5u</li>
          <li>Confirmation Method Description: URI pointing to a COSE_C509 containing an ordered chain of certificates</li>
          <li>JWT Confirmation Method Name: "c5u"</li>
          <li>Confirmation Key: TBD</li>
          <li>Confirmation Value Type(s): uri</li>
          <li>Change Controller: IESG</li>
          <li>Specification Document(s): [RFC-XXXX]</li>
        </ul>
        <t> </t>
        <ul spacing="normal">
          <li>Confirmation Method Name: kcwt</li>
          <li>Confirmation Method Description: A CBOR Web Token (CWT) containing a COSE_Key in a 'cnf' claim</li>
          <li>JWT Confirmation Method Name: "kcwt"</li>
          <li>Confirmation Key: TBD</li>
          <li>Confirmation Value Type(s): COSE_Messages</li>
          <li>Change Controller: IESG</li>
          <li>Specification Document(s): [RFC-XXXX]</li>
        </ul>
        <t> </t>
        <ul spacing="normal">
          <li>Confirmation Method Name: kccs</li>
          <li>Confirmation Method Description: A CWT Claims Set (CCS) containing a COSE_Key in a 'cnf' claim</li>
          <li>JWT Confirmation Method Name: "kccs"</li>
          <li>Confirmation Key: TBD</li>
          <li>Confirmation Value Type(s): map / #6(map)</li>
          <li>Change Controller: IESG</li>
          <li>Specification Document(s): [RFC-XXXX]</li>
        </ul>
      </section>
      <section anchor="iana-edhoc-ead">
        <name>EDHOC External Authorization Data Registry</name>
        <t>IANA is asked to add the following entry to the "EDHOC External Authorization Data" registry defined in <xref section="9.5" sectionFormat="of" target="I-D.ietf-lake-edhoc"/>.</t>
        <ul spacing="normal">
          <li>Label: TBD</li>
          <li>Message: EDHOC message_1</li>
          <li>Description: "ead_value" specifies an access token</li>
          <li>Reference: [RFC-XXXX]</li>
        </ul>
      </section>
      <section anchor="iana-edhoc-parameters">
        <name>EDHOC Information Registry</name>
        <t>It is requested that IANA create a new registry entitled "EDHOC Information" registry. The registry is to be created with registration policy Expert Review <xref target="RFC8126"/>. Guidelines for the experts are provided in <xref target="iana-expert-review"/>. It should be noted that in addition to the expert review, some portions of the registry require a specification, potentially on Standards Track, be supplied as well.</t>
        <t>The columns of the registry are:</t>
        <ul spacing="normal">
          <li>
            <t>Name: A descriptive name that enables easier reference to this item. Because a core goal of this document is for the resulting representations to be compact, it is RECOMMENDED that the name be short.  </t>
            <t>
This name is case sensitive. Names may not match other registered names in a case-insensitive manner unless the Designated Experts determine that there is a compelling reason to allow an exception. The name is not used in the CBOR encoding.</t>
          </li>
          <li>
            <t>CBOR Value: The value to be used as CBOR abbreviation of the item.  </t>
            <t>
The value MUST be unique. The value can be a positive integer, a negative integer or a string. Integer values between -256 and 255 and strings of length 1 are to be registered by Standards Track documents (Standards Action). Integer values from -65536 to -257 and from 256 to 65535 and strings of maximum length 2 are to be registered by public specifications (Specification Required). Integer values greater than 65535 and strings of length greater than 2 are subject to the Expert Review policy. Integer values less than -65536 are marked as private use.</t>
          </li>
          <li>CBOR Type: The CBOR type of the item, or a pointer to the registry that defines its type, when that depends on another item.</li>
          <li>Registry: The registry that values of the item may come from, if one exists.</li>
          <li>Description: A brief description of this item.</li>
          <li>Specification: A pointer to the public specification for the item, if one exists.</li>
        </ul>
        <t>This registry will be initially populated by the values in <xref target="fig-cbor-key-edhoc-params"/>. The "Specification" column for all of these entries will be this document and <xref target="I-D.ietf-lake-edhoc"/>.</t>
      </section>
      <section anchor="iana-expert-review">
        <name>Expert Review Instructions</name>
        <t>The IANA registry established in this document is defined to use the registration policy Expert Review. This section gives some general guidelines for what the experts should be looking for, but they are being designated as experts for a reason so they should be given substantial latitude.</t>
        <t>Expert reviewers should take into consideration the following points:</t>
        <ul spacing="normal">
          <li>Point squatting should be discouraged. Reviewers are encouraged to get sufficient information for registration requests to ensure that the usage is not going to duplicate one that is already registered and that the point is likely to be used in deployments. The zones tagged as private use are intended for testing purposes and closed environments; code points in other ranges should not be assigned for testing.</li>
          <li>Specifications are required for the Standards Action range of point assignment. Specifications should exist for Specification Required ranges, but early assignment before a specification is available is considered to be permissible. Specifications are needed for the first-come, first-serve range if they are expected to be used outside of closed environments in an interoperable way. When specifications are not provided, the description provided needs to have sufficient information to identify what the point is being used for.</li>
          <li>Experts should take into account the expected usage of fields when approving point assignment. The fact that there is a range for Standards Track documents does not mean that a Standards Track document cannot have points assigned outside of that range. The length of the encoded value should be weighed against how many code points of that length are left, the size of device it will be used on, and the number of code points left that encode to that size.</li>
        </ul>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC6749" target="https://www.rfc-editor.org/info/rfc6749">
          <front>
            <title>The OAuth 2.0 Authorization Framework</title>
            <author fullname="D. Hardt" initials="D." role="editor" surname="Hardt">
              <organization/>
            </author>
            <date month="October" year="2012"/>
            <abstract>
              <t>The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf.  This specification replaces and obsoletes the OAuth 1.0 protocol described in RFC 5849.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6749"/>
          <seriesInfo name="DOI" value="10.17487/RFC6749"/>
        </reference>
        <reference anchor="RFC7252" target="https://www.rfc-editor.org/info/rfc7252">
          <front>
            <title>The Constrained Application Protocol (CoAP)</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby">
              <organization/>
            </author>
            <author fullname="K. Hartke" initials="K." surname="Hartke">
              <organization/>
            </author>
            <author fullname="C. Bormann" initials="C." surname="Bormann">
              <organization/>
            </author>
            <date month="June" year="2014"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks.  The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s.  The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
              <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types.  CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7252"/>
          <seriesInfo name="DOI" value="10.17487/RFC7252"/>
        </reference>
        <reference anchor="RFC7519" target="https://www.rfc-editor.org/info/rfc7519">
          <front>
            <title>JSON Web Token (JWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones">
              <organization/>
            </author>
            <author fullname="J. Bradley" initials="J." surname="Bradley">
              <organization/>
            </author>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura">
              <organization/>
            </author>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties.  The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7519"/>
          <seriesInfo name="DOI" value="10.17487/RFC7519"/>
        </reference>
        <reference anchor="RFC7800" target="https://www.rfc-editor.org/info/rfc7800">
          <front>
            <title>Proof-of-Possession Key Semantics for JSON Web Tokens (JWTs)</title>
            <author fullname="M. Jones" initials="M." surname="Jones">
              <organization/>
            </author>
            <author fullname="J. Bradley" initials="J." surname="Bradley">
              <organization/>
            </author>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig">
              <organization/>
            </author>
            <date month="April" year="2016"/>
            <abstract>
              <t>This specification describes how to declare in a JSON Web Token (JWT) that the presenter of the JWT possesses a particular proof-of- possession key and how the recipient can cryptographically confirm proof of possession of the key by the presenter.  Being able to prove possession of a key is also sometimes described as the presenter being a holder-of-key.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7800"/>
          <seriesInfo name="DOI" value="10.17487/RFC7800"/>
        </reference>
        <reference anchor="RFC8126" target="https://www.rfc-editor.org/info/rfc8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton">
              <organization/>
            </author>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <author fullname="T. Narten" initials="T." surname="Narten">
              <organization/>
            </author>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters.  To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper.  For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed.  This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
        <reference anchor="RFC8392" target="https://www.rfc-editor.org/info/rfc8392">
          <front>
            <title>CBOR Web Token (CWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones">
              <organization/>
            </author>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem">
              <organization/>
            </author>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman">
              <organization/>
            </author>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig">
              <organization/>
            </author>
            <date month="May" year="2018"/>
            <abstract>
              <t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties.  The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection.  A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value.  CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8392"/>
          <seriesInfo name="DOI" value="10.17487/RFC8392"/>
        </reference>
        <reference anchor="RFC8610" target="https://www.rfc-editor.org/info/rfc8610">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz">
              <organization/>
            </author>
            <author fullname="C. Vigano" initials="C." surname="Vigano">
              <organization/>
            </author>
            <author fullname="C. Bormann" initials="C." surname="Bormann">
              <organization/>
            </author>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049).  Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8610"/>
          <seriesInfo name="DOI" value="10.17487/RFC8610"/>
        </reference>
        <reference anchor="RFC8613" target="https://www.rfc-editor.org/info/rfc8613">
          <front>
            <title>Object Security for Constrained RESTful Environments (OSCORE)</title>
            <author fullname="G. Selander" initials="G." surname="Selander">
              <organization/>
            </author>
            <author fullname="J. Mattsson" initials="J." surname="Mattsson">
              <organization/>
            </author>
            <author fullname="F. Palombini" initials="F." surname="Palombini">
              <organization/>
            </author>
            <author fullname="L. Seitz" initials="L." surname="Seitz">
              <organization/>
            </author>
            <date month="July" year="2019"/>
            <abstract>
              <t>This document defines Object Security for Constrained RESTful Environments (OSCORE), a method for application-layer protection of the Constrained Application Protocol (CoAP), using CBOR Object Signing and Encryption (COSE).  OSCORE provides end-to-end protection between endpoints communicating using CoAP or CoAP-mappable HTTP. OSCORE is designed for constrained nodes and networks supporting a range of proxy operations, including translation between different transport protocols.</t>
              <t>Although an optional functionality of CoAP, OSCORE alters CoAP options processing and IANA registration.  Therefore, this document updates RFC 7252.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8613"/>
          <seriesInfo name="DOI" value="10.17487/RFC8613"/>
        </reference>
        <reference anchor="RFC8742" target="https://www.rfc-editor.org/info/rfc8742">
          <front>
            <title>Concise Binary Object Representation (CBOR) Sequences</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann">
              <organization/>
            </author>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document describes the Concise Binary Object Representation (CBOR) Sequence format and associated media type "application/cbor-seq".  A CBOR Sequence consists of any number of encoded CBOR data items, simply concatenated in sequence.</t>
              <t>Structured syntax suffixes for media types allow other media types to build on them and make it explicit that they are built on an existing media type as their foundation.  This specification defines and registers "+cbor-seq" as a structured syntax suffix for CBOR Sequences.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8742"/>
          <seriesInfo name="DOI" value="10.17487/RFC8742"/>
        </reference>
        <reference anchor="RFC8747" target="https://www.rfc-editor.org/info/rfc8747">
          <front>
            <title>Proof-of-Possession Key Semantics for CBOR Web Tokens (CWTs)</title>
            <author fullname="M. Jones" initials="M." surname="Jones">
              <organization/>
            </author>
            <author fullname="L. Seitz" initials="L." surname="Seitz">
              <organization/>
            </author>
            <author fullname="G. Selander" initials="G." surname="Selander">
              <organization/>
            </author>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman">
              <organization/>
            </author>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig">
              <organization/>
            </author>
            <date month="March" year="2020"/>
            <abstract>
              <t>This specification describes how to declare in a CBOR Web Token (CWT) (which is defined by RFC 8392) that the presenter of the CWT possesses a particular proof-of-possession key. Being able to prove possession of a key is also sometimes described as being the holder-of-key. This specification provides equivalent functionality to "Proof-of-Possession Key Semantics for JSON Web Tokens (JWTs)" (RFC 7800) but using Concise Binary Object Representation (CBOR) and CWTs rather than JavaScript Object Notation (JSON) and JSON Web Tokens (JWTs).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8747"/>
          <seriesInfo name="DOI" value="10.17487/RFC8747"/>
        </reference>
        <reference anchor="RFC8949" target="https://www.rfc-editor.org/info/rfc8949">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann">
              <organization/>
            </author>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman">
              <organization/>
            </author>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049.  It does not create a new version of the format.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="94"/>
          <seriesInfo name="RFC" value="8949"/>
          <seriesInfo name="DOI" value="10.17487/RFC8949"/>
        </reference>
        <reference anchor="I-D.ietf-ace-oauth-authz" target="https://www.ietf.org/archive/id/draft-ietf-ace-oauth-authz-46.txt">
          <front>
            <title>Authentication and Authorization for Constrained Environments (ACE) using the OAuth 2.0 Framework (ACE-OAuth)</title>
            <author fullname="Ludwig Seitz">
              <organization>Combitech</organization>
            </author>
            <author fullname="Goeran Selander">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Erik Wahlstroem">
	 </author>
            <author fullname="Samuel Erdtman">
              <organization>Spotify AB</organization>
            </author>
            <author fullname="Hannes Tschofenig">
              <organization>Arm Ltd.</organization>
            </author>
            <date day="8" month="November" year="2021"/>
            <abstract>
              <t>   This specification defines a framework for authentication and
   authorization in Internet of Things (IoT) environments called ACE-
   OAuth.  The framework is based on a set of building blocks including
   OAuth 2.0 and the Constrained Application Protocol (CoAP), thus
   transforming a well-known and widely used authorization solution into
   a form suitable for IoT devices.  Existing specifications are used
   where possible, but extensions are added and profiles are defined to
   better serve the IoT use cases.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ace-oauth-authz-46"/>
        </reference>
        <reference anchor="I-D.ietf-ace-oauth-params" target="https://www.ietf.org/archive/id/draft-ietf-ace-oauth-params-16.txt">
          <front>
            <title>Additional OAuth Parameters for Authorization in Constrained Environments (ACE)</title>
            <author fullname="Ludwig Seitz">
              <organization>Combitech</organization>
            </author>
            <date day="7" month="September" year="2021"/>
            <abstract>
              <t>   This specification defines new parameters and encodings for the OAuth
   2.0 token and introspection endpoints when used with the framework
   for authentication and authorization for constrained environments
   (ACE).  These are used to express the proof-of-possession key the
   client wishes to use, the proof-of-possession key that the
   Authorization Server has selected, and the key the Resource Server
   uses to authenticate to the client.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ace-oauth-params-16"/>
        </reference>
        <reference anchor="I-D.ietf-lake-edhoc" target="https://www.ietf.org/archive/id/draft-ietf-lake-edhoc-15.txt">
          <front>
            <title>Ephemeral Diffie-Hellman Over COSE (EDHOC)</title>
            <author fullname="Göran Selander">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="John Preuß Mattsson">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Francesca Palombini">
              <organization>Ericsson AB</organization>
            </author>
            <date day="10" month="July" year="2022"/>
            <abstract>
              <t>   This document specifies Ephemeral Diffie-Hellman Over COSE (EDHOC), a
   very compact and lightweight authenticated Diffie-Hellman key
   exchange with ephemeral keys.  EDHOC provides mutual authentication,
   forward secrecy, and identity protection.  EDHOC is intended for
   usage in constrained scenarios and a main use case is to establish an
   OSCORE security context.  By reusing COSE for cryptography, CBOR for
   encoding, and CoAP for transport, the additional code size can be
   kept very low.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lake-edhoc-15"/>
        </reference>
        <reference anchor="I-D.ietf-core-oscore-edhoc" target="https://www.ietf.org/archive/id/draft-ietf-core-oscore-edhoc-04.txt">
          <front>
            <title>Profiling EDHOC for CoAP and OSCORE</title>
            <author fullname="Francesca Palombini">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Marco Tiloca">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Rikard Hoeglund">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Stefan Hristozov">
              <organization>Fraunhofer AISEC</organization>
            </author>
            <author fullname="Goeran Selander">
              <organization>Ericsson</organization>
            </author>
            <date day="11" month="July" year="2022"/>
            <abstract>
              <t>   The lightweight authenticated key exchange protocol EDHOC can be run
   over CoAP and used by two peers to establish an OSCORE Security
   Context.  This document further profiles this use of the EDHOC
   protocol, by specifying a number of additional and optional
   mechanisms.  These especially include an optimization approach for
   combining the execution of EDHOC with the first subsequent OSCORE
   transaction.  This combination reduces the number of round trips
   required to set up an OSCORE Security Context and to complete an
   OSCORE transaction using that Security Context.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-oscore-edhoc-04"/>
        </reference>
        <reference anchor="I-D.ietf-cose-x509" target="https://www.ietf.org/archive/id/draft-ietf-cose-x509-08.txt">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Header parameters for carrying and referencing X.509 certificates</title>
            <author fullname="Jim Schaad">
              <organization>August Cellars</organization>
            </author>
            <date day="14" month="December" year="2020"/>
            <abstract>
              <t>   The CBOR Signing And Encrypted Message (COSE) structure uses
   references to keys in general.  For some algorithms, additional
   properties are defined which carry parameters relating to keys as
   needed.  The COSE Key structure is used for transporting keys outside
   of COSE messages.  This document extends the way that keys can be
   identified and transported by providing attributes that refer to or
   contain X.509 certificates.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cose-x509-08"/>
        </reference>
        <reference anchor="I-D.ietf-cose-cbor-encoded-cert" target="https://www.ietf.org/archive/id/draft-ietf-cose-cbor-encoded-cert-04.txt">
          <front>
            <title>CBOR Encoded X.509 Certificates (C509 Certificates)</title>
            <author fullname="John Preuß Mattsson">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Göran Selander">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Shahid Raza">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Joel Höglund">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Martin Furuhed">
              <organization>Nexus Group</organization>
            </author>
            <date day="10" month="July" year="2022"/>
            <abstract>
              <t>   This document specifies a CBOR encoding of X.509 certificates.  The
   resulting certificates are called C509 Certificates.  The CBOR
   encoding supports a large subset of RFC 5280 and all certificates
   compatible with the RFC 7925, IEEE 802.1AR (DevID), CNSA, RPKI, GSMA
   eUICC, and CA/Browser Forum Baseline Requirements profiles.  When
   used to re-encode DER encoded X.509 certificates, the CBOR encoding
   can in many cases reduce the size of RFC 7925 profiled certificates
   with over 50%.  The CBOR encoded structure can alternatively be
   signed directly ("natively signed"), which does not require re-
   encoding for the signature to be verified.  The document also
   specifies C509 COSE headers, a C509 TLS certificate type, and a C509
   file format.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cose-cbor-encoded-cert-04"/>
        </reference>
        <reference anchor="I-D.ietf-ace-oscore-profile" target="https://www.ietf.org/archive/id/draft-ietf-ace-oscore-profile-19.txt">
          <front>
            <title>OSCORE Profile of the Authentication and Authorization for Constrained Environments Framework</title>
            <author fullname="Francesca Palombini">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Ludwig Seitz">
              <organization>Combitech</organization>
            </author>
            <author fullname="Göran Selander">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Martin Gunnarsson">
              <organization>RISE</organization>
            </author>
            <date day="6" month="May" year="2021"/>
            <abstract>
              <t>   This document specifies a profile for the Authentication and
   Authorization for Constrained Environments (ACE) framework.  It
   utilizes Object Security for Constrained RESTful Environments
   (OSCORE) to provide communication security and proof-of-possession
   for a key owned by the client and bound to an OAuth 2.0 access token.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ace-oscore-profile-19"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC4949" target="https://www.rfc-editor.org/info/rfc4949">
          <front>
            <title>Internet Security Glossary, Version 2</title>
            <author fullname="R. Shirey" initials="R." surname="Shirey">
              <organization/>
            </author>
            <date month="August" year="2007"/>
            <abstract>
              <t>This Glossary provides definitions, abbreviations, and explanations of terminology for information system security. The 334 pages of entries offer recommendations to improve the comprehensibility of written material that is generated in the Internet Standards Process (RFC 2026). The recommendations follow the principles that such writing should (a) use the same term or definition whenever the same concept is mentioned; (b) use terms in their plainest, dictionary sense; (c) use terms that are already well-established in open publications; and (d) avoid terms that either favor a particular vendor or favor a particular technology or mechanism over other, competing techniques that already exist or could be developed.  This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="FYI" value="36"/>
          <seriesInfo name="RFC" value="4949"/>
          <seriesInfo name="DOI" value="10.17487/RFC4949"/>
        </reference>
        <reference anchor="RFC8446" target="https://www.rfc-editor.org/info/rfc8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla">
              <organization/>
            </author>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol.  TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961.  This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC9110" target="https://www.rfc-editor.org/info/rfc9110">
          <front>
            <title>HTTP Semantics</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding">
              <organization/>
            </author>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham">
              <organization/>
            </author>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke">
              <organization/>
            </author>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes. </t>
              <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="97"/>
          <seriesInfo name="RFC" value="9110"/>
          <seriesInfo name="DOI" value="10.17487/RFC9110"/>
        </reference>
        <reference anchor="RFC9147" target="https://www.rfc-editor.org/info/rfc9147">
          <front>
            <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla">
              <organization/>
            </author>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig">
              <organization/>
            </author>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu">
              <organization/>
            </author>
            <date month="April" year="2022"/>
            <abstract>
              <t>This document specifies version 1.3 of the Datagram Transport Layer Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability.  Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
              <t>This document obsoletes RFC 6347.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9147"/>
          <seriesInfo name="DOI" value="10.17487/RFC9147"/>
        </reference>
        <reference anchor="I-D.ietf-core-oscore-key-update" target="https://www.ietf.org/archive/id/draft-ietf-core-oscore-key-update-02.txt">
          <front>
            <title>Key Update for OSCORE (KUDOS)</title>
            <author fullname="Rikard Höglund">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Marco Tiloca">
              <organization>RISE AB</organization>
            </author>
            <date day="11" month="July" year="2022"/>
            <abstract>
              <t>   Object Security for Constrained RESTful Environments (OSCORE) uses
   AEAD algorithms to ensure confidentiality and integrity of exchanged
   messages.  Due to known issues allowing forgery attacks against AEAD
   algorithms, limits should be followed on the number of times a
   specific key is used for encryption or decryption.  This document
   defines how two OSCORE peers must follow these limits and what steps
   they must take to preserve the security of their communications.
   Therefore, this document updates RFC8613.  Furthermore, this document
   specifies Key Update for OSCORE (KUDOS), a lightweight procedure that
   two peers can use to update their keying material and establish a new
   OSCORE Security Context.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-oscore-key-update-02"/>
        </reference>
      </references>
    </references>
    <section anchor="examples">
      <name>Examples</name>
      <t>This appendix provides examples where this profile of ACE is used. In particular:</t>
      <ul spacing="normal">
        <li>
          <xref target="example-without-optimization"/> does not make use of use of any optimization.</li>
        <li>
          <xref target="example-with-optimization"/> makes use of the optimizations defined in this specification, hence reducing the roundtrips of the interactions between the Client and the Resource Server.</li>
        <li>
          <xref target="example-without-optimization-as-posting"/> does not make use of any optimization, but consider an alternative workflow where AS uploads the access token to RS.</li>
      </ul>
      <t>All these examples build on the following assumptions, as relying on expected early procedures performed at AS. These include the registration of RSs by the respective Resource Owners as well as the registrations of Clients authorized to request access token for those RSs.</t>
      <ul spacing="normal">
        <li>AS knows the authentication credential AUTH_CRED_C of the Client C.</li>
        <li>The Client knows the authentication credential AUTH_CRED_AS of AS.</li>
        <li>AS knows the authentication credential AUTH_CRED_RS of RS.</li>
        <li>
          <t>RS knows the authentication credential AUTH_CRED_AS of AS.  </t>
          <t>
This is relevant in case AS and RS actually require a secure association (e.g., for RS to perform token introspection at AS, or for AS to upload an access token to RS on behalf of the Client).</t>
        </li>
      </ul>
      <t>As a result of the assumptions above, it is possible to limit the transport of AUTH_CRED_C and AUTH_CRED_RS by value only to the following two cases, and only when the Client requests an access token for RS in question for the first time when considering the pair (AUTH_CRED_C, AUTH_CRED_RS).</t>
      <ul spacing="normal">
        <li>In the Token Response from AS to the Client, where AUTH_CRED_RS is specified by the 'rs_cnf' parameter.</li>
        <li>
          <t>In the access token, where AUTH_CRED_C is specified by the 'cnf' claim.  </t>
          <t>
Note that, even under the circumstances mentioned above, AUTH_CRED_C might rather be indicated by reference. This is possible if RS can effectively use such a reference from the access token to retrieve AUTH_CRED_C (e.g., from a trusted repository of authentication credentials reachable through a non-constrained link), and if AS is in turn aware of that.</t>
        </li>
      </ul>
      <t>In any other case, it is otherwise possible to indicate both AUTH_CRED_C and AUTH_CRED_RS by reference, when performing the ACE access control workflow as well as later on when the Client and RS run EDHOC.</t>
      <section anchor="example-without-optimization">
        <name>Workflow without Optimizations</name>
        <t>The example below considers the simplest (though least efficient) interaction between the Client and RS. That is: first C uploads the access token to RS; then C and RS run EDHOC; and, finally, the Client accesses the protected resource at RS.</t>
        <artwork><![CDATA[
    C                                 AS                             RS
    |                                  |                              |
    |  EDHOC message_1 to /edhoc       |                              |
M01 |--------------------------------->|                              |
    |                                  |                              |
    |                                  |                              |
    |  EDHOC message_2                 |                              |
M02 |<---------------------------------|                              |
    |  ID_CRED_R identifies            |                              |
    |     CRED_R = AUTH_CRED_AS        |                              |
    |     by reference                 |                              |
    |                                  |                              |
    |                                  |                              |
    |  EDHOC message_3 to /edhoc       |                              |
M03 |--------------------------------->|                              |
    |  ID_CRED_I identifies            |                              |
    |     CRED_I = AUTH_CRED_C         |                              |
    |     by reference                 |                              |
    |                                  |                              |
    |                                  |                              |
    |  Token request to /token         |                              |
    |  (OSCORE-protected message)      |                              |
M04 |--------------------------------->|                              |
    |  'req_cnf' identifies            |                              |
    |     AUTH_CRED_C by reference     |                              |
    |                                  |                              |
    |                                  |                              |
    |  Token response                  |                              |
    |  (OSCORE-protected message)      |                              |
M05 |<---------------------------------|                              |
    |  'rs_cnf' specifies              |                              |
    |     AUTH_CRED_RS by value        |                              |
    |                                  |                              |
    |  'ace_profile' =                 |                              |
    |             coap_edhoc_oscore    |                              |
    |                                  |                              |
    |  'edhoc_info' specifies:         |                              |
    |     {                            |                              |
    |       id     : h'01',            |                              |
    |       suite  : 2,                |                              |
    |       methods: 3                 |                              |
    |     }                            |                              |
    |                                  |                              |
    |  In the access token:            |                              |
    |     * the 'cnf' claim specifies  |                              |
    |       AUTH_CRED_C by value       |                              |
    |     * the 'edhoc_info' claim     |                              |
    |       specifies the same as      |                              |
    |       'edhoc_info' above         |                              |
    |                                  |                              |

 // Possibly after chain verification, the Client adds AUTH_CRED_RS
 // to the set of its trusted peer authentication credentials,
 // relying on AS as trusted provider

    |                                  |                              |
    |  Token upload to /authz-info     |                              |
    |  (unprotected message)           |                              |
M06 |---------------------------------------------------------------->|
    |                                  |                              |

 // Possibly after chain verification, RS adds AUTH_CRED_C
 // to the set of its trusted peer authentication credentials,
 // relying on AS as trusted provider

    |                                  |                              |
    |   2.01 (Created)                 |                              |
    |   (unprotected message)          |                              |
M07 |<----------------------------------------------------------------|
    |                                  |                              |
    |                                  |                              |
    |  EDHOC message_1 to /edhoc       |                              |
    |  (no access control is enforced) |                              |
M08 |---------------------------------------------------------------->|
    |                                  |                              |
    |                                  |                              |
    |  EDHOC message_2                 |                              |
M09 |<----------------------------------------------------------------|
    |  ID_CRED_R identifies            |                              |
    |     CRED_R = AUTH_CRED_RS        |                              |
    |     by reference                 |                              |
    |                                  |                              |
    |                                  |                              |
    |  EDHOC message_3 to /edhoc       |                              |
    |  (no access control is enforced) |                              |
M10 |---------------------------------------------------------------->|
    |  ID_CRED_I identifies            |                              |
    |     CRED_I = AUTH_CRED_C         |                              |
    |     by reference                 |                              |
    |                                  |                              |
    |                                  |                              |
    |  Access to protected resource    |                              |
    |  (OSCORE-protected message)      |                              |
    |  (access control is enforced)    |                              |
M11 |---------------------------------------------------------------->|
    |                                  |                              |
    |  Response                        |                              |
    |  (OSCORE-protected message)      |                              |
M12 |<----------------------------------------------------------------|
    |                                  |                              |

 // Later on, the access token expires ...
 //  - The Client and RS delete their OSCORE Security Context and
 //    purge the EDHOC session used to derive it (unless the same
 //    session is also used for other reasons).
 //  - RS retains AUTH_CRED_C as still valid,
 //    and AS knows about it.
 //  - The Client retains AUTH_CRED_RS as still valid,
 //    and AS knows about it.

    |                                  |                              |
    |                                  |                              |

 // Time passes ...

    |                                  |                              |
    |                                  |                              |

 // The Client asks for a new access token; now all the
 // authentication credentials can be indicated by reference

 // The price to pay is on AS, about remembering that at least
 // one access token has been issued for the pair (Client, RS)
 // and considering the pair (AUTH_CRED_C, AUTH_CRED_RS)

    |                                  |                              |
    |  Token request to /token         |                              |
    |  (OSCORE-protected message)      |                              |
M13 |--------------------------------->|                              |
    |  'req_cnf' identifies            |                              |
    |     CRED_I = AUTH_CRED_C         |                              |
    |     by reference                 |                              |
    |                                  |                              |
    |                                  |                              |
    |  Token response                  |                              |
    |  (OSCORE-protected message)      |                              |
M14 |<---------------------------------|                              |
    |  'rs_cnf' identifies             |                              |
    |     AUTH_CRED_RS by reference    |                              |
    |                                  |                              |
    |  'ace_profile' =                 |                              |
    |             coap_edhoc_oscore    |                              |
    |                                  |                              |
    |  'edhoc_info' specifies:         |                              |
    |     {                            |                              |
    |       id     : h'05',            |                              |
    |       suite  : 2,                |                              |
    |       methods: 3                 |                              |
    |     }                            |                              |
    |                                  |                              |
    |  In the access token:            |                              |
    |     * the 'cnf' claim specifies  |                              |
    |       AUTH_CRED_C by reference   |                              |
    |     * the 'edhoc_info' claim     |                              |
    |       specifies the same as      |                              |
    |       'edhoc_info' above         |                              |
    |                                  |                              |
    |                                  |                              |
    |  Token upload to /authz-info     |                              |
    |  (unprotected message)           |                              |
M15 |---------------------------------------------------------------->|
    |                                  |                              |
    |                                  |                              |
    |  2.01 (Created)                  |                              |
    |  (unprotected message)           |                              |
M16 |<----------------------------------------------------------------|
    |                                  |                              |
    |                                  |                              |
    |  EDHOC message_1 to /edhoc       |                              |
    |  (no access control is enforced) |                              |
M17 |---------------------------------------------------------------->|
    |                                  |                              |
    |                                  |                              |
    |  EDHOC message_2                 |                              |
    |  (no access control is enforced) |                              |
M18 |<----------------------------------------------------------------|
    |  ID_CRED_R specifies             |                              |
    |     CRED_R = AUTH_CRED_RS        |                              |
    |     by reference                 |                              |
    |                                  |                              |
    |                                  |                              |
    |  EDHOC message_3 to /edhoc       |                              |
    |  (no access control is enforced) |                              |
M19 |---------------------------------------------------------------->|
    |  ID_CRED_I identifies            |                              |
    |     CRED_I = AUTH_CRED_C         |                              |
    |     by reference                 |                              |
    |                                  |                              |
    |                                  |                              |
    |  Access to protected resource /r |                              |
    |  (OSCORE-protected message)      |                              |
    |  (access control is enforced)    |                              |
M20 |---------------------------------------------------------------->|
    |                                  |                              |
    |                                  |                              |
    |  Response                        |                              |
    |  (OSCORE-protected message)      |                              |
M21 |<----------------------------------------------------------------|
    |                                  |                              |
]]></artwork>
      </section>
      <section anchor="example-with-optimization">
        <name>Workflow with Optimizations</name>
        <t>The example below builds on the example in <xref target="example-without-optimization"/>, while additionally relying on the two following optimizations.</t>
        <ul spacing="normal">
          <li>The access token is not separately uploaded to the /authz-info endpoint at RS, but rather included in the EAD_1 field of EDHOC message_1 sent by the C to RS.</li>
          <li>The Client uses the EDHOC+OSCORE request defined in <xref target="I-D.ietf-core-oscore-edhoc"/> is used, when running EDHOC both with AS and with RS.</li>
        </ul>
        <t>These two optimizations used together result in the most efficient interaction between the C and RS, as consisting of only two roundtrips to upload the access token, run EDHOC and access the protected resource at RS.</t>
        <t>Also, a further optimization is used upon uploading a second access token to RS, following the expiration of the first one. That is, after posting the second access token, the Client and RS do not run EDHOC again, but rather EDHOC-KeyUpdate() and EDHOC-Exporter() building on the same, previously completed EDHOC execution.</t>
        <artwork><![CDATA[
    C                                 AS                             RS
    |                                  |                              |
    |  EDHOC message_1 to /edhoc       |                              |
M01 |--------------------------------->|                              |
    |                                  |                              |
    |                                  |                              |
    |  EDHOC message_2                 |                              |
M02 |<---------------------------------|                              |
    |  ID_CRED_R identifies            |                              |
    |     CRED_R = AUTH_CRED_AS        |                              |
    |     by reference                 |                              |
    |                                  |                              |
    |                                  |                              |
    |  EDHOC+OSCORE request to /token  |                              |
M03 |--------------------------------->|                              |
    |  * EDHOC message_3               |                              |
    |      ID_CRED_I identifies        |                              |
    |         CRED_I = AUTH_CRED_C     |                              |
    |         by reference             |                              |
    |  --- --- ---                     |                              |
    |  * OSCORE-protected part         |                              |
    |      Token request               |                              |
    |         'req_cnf' identifies     |                              |
    |         AUTH_CRED_C by reference |                              |
    |                                  |                              |
    |                                  |                              |
    |  Token response                  |                              |
    |  (OSCORE-protected message)      |                              |
M04 |<---------------------------------|                              |
    |  'rs_cnf' specifies              |                              |
    |     AUTH_CRED_RS by value        |                              |
    |                                  |                              |
    |  'ace_profile' =                 |                              |
    |             coap_edhoc_oscore    |                              |
    |                                  |                              |
    |  'edhoc_info' specifies:         |                              |
    |     {                            |                              |
    |       id     : h'01',            |                              |
    |       suite  : 2,                |                              |
    |       methods: 3                 |                              |
    |     }                            |                              |
    |                                  |                              |
    |  In the access token:            |                              |
    |     * the 'cnf' claim specifies  |                              |
    |       AUTH_CRED_C by value       |                              |
    |     * the 'edhoc_info' claim     |                              |
    |       specifies the same as      |                              |
    |       'edhoc_info' above         |                              |
    |                                  |                              |

 // Possibly after chain verification, the Client adds AUTH_CRED_RS
 // to the set of its trusted peer authentication credentials,
 // relying on AS as trusted provider

    |                                  |                              |
    |  EDHOC message_1 to /edhoc       |                              |
    |  (no access control is enforced) |                              |
M05 |---------------------------------------------------------------->|
    |  Access token specified in EAD_1 |                              |
    |                                  |                              |

 // Possibly after chain verification, RS adds AUTH_CRED_C
 // to the set of its trusted peer authentication credentials,
 // relying on AS as trusted provider

    |                                  |                              |
    |  EDHOC message_2                 |                              |
M06 |<----------------------------------------------------------------|
    |  ID_CRED_R identifies            |                              |
    |     CRED_R = AUTH_CRED_RS        |                              |
    |     by reference                 |                              |
    |                                  |                              |
    |                                  |                              |
    |  EDHOC+OSCORE request to /r      |                              |
M07 |---------------------------------------------------------------->|
    |  * EDHOC message_3               |                              |
    |      ID_CRED_I identifies        |                              |
    |         CRED_I = AUTH_CRED_C     |                              |
    |         by reference             |                              |
    |  --- --- ---                     |                              |
    |  * OSCORE-protected part         |                              |
    |      Application request to /r   |                              |
    |                                  |                              |

 // After the EDHOC processing is completed, access control
 // is enforced on the rebuilt OSCORE-protected request,
 // like if it had been sent stand-alone

    |                                  |                              |
    |  Response                        |                              |
    |  (OSCORE-protected message)      |                              |
M08 |<----------------------------------------------------------------|
    |                                  |                              |

 // Later on, the access token expires ...
 //  - The Client and RS delete their OSCORE Security Context
 //    but do not purge the EDHOC session used to derive it.
 //  - RS retains AUTH_CRED_C as still valid,
 //    and AS knows about it.
 //  - The Client retains AUTH_CRED_RS as still valid,
 //    and AS knows about it.

    |                                  |                              |
    |                                  |                              |

 // Time passes ...

    |                                  |                              |
    |                                  |                              |

 // The Client asks for a new access token; now all the
 // authentication credentials can be indicated by reference

 // The price to pay is on AS, about remembering that at least
 // one access token has been issued for the pair (Client, RS)
 // and considering the pair (AUTH_CRED_C, AUTH_CRED_RS)

    |                                  |                              |
    |  Token request to /token         |                              |
    |  (OSCORE-protected message)      |                              |
M09 |--------------------------------->|                              |
    |  'req_cnf' identifies            |                              |
    |     CRED_I = AUTH_CRED_C         |                              |
    |     by reference                 |                              |
    |                                  |                              |
    |  Token response                  |                              |
    |  (OSCORE-protected message)      |                              |
M10 |<---------------------------------|                              |
    |  'rs_cnf' identifies             |                              |
    |     AUTH_CRED_RS by reference    |                              |
    |                                  |                              |
    |  'ace_profile' =                 |                              |
    |             coap_edhoc_oscore    |                              |
    |                                  |                              |
    |  'edhoc_info' specifies:         |                              |
    |     {                            |                              |
    |       id     : h'05',            |                              |
    |       suite  : 2,                |                              |
    |       methods: 3                 |                              |
    |     }                            |                              |
    |                                  |                              |
    |  In the access token:            |                              |
    |     * the 'cnf' claim specifies  |                              |
    |       AUTH_CRED_C by reference   |                              |
    |     * the 'edhoc_info' claim     |                              |
    |       specifies the same as      |                              |
    |       'edhoc_info' above         |                              |
    |                                  |                              |
    |                                  |                              |
    |  Token upload to /authz-info     |                              |
    |  (unprotected message)           |                              |
M11 |---------------------------------------------------------------->|
    |   Payload {                      |                              |
    |     access_token: access token   |                              |
    |     nonce_1: N1  // nonce        |                              |
    |   }                              |                              |
    |                                  |                              |
    |                                  |                              |
    |  2.01 (Created)                  |                              |
    |  (unprotected message)           |                              |
M12 |<----------------------------------------------------------------|
    |   Payload {                      |                              |
    |     nonce_2: N2  // nonce        |                              |
    |   }                              |                              |
    |                                  |                              |

 // The Client and RS first run EDHOC-KeyUpdate(N1 | N2), and
 // then EDHOC-Exporter() to derive a new OSCORE Master Secret and
 // OSCORE Master Salt, from which a new OSCORE Security Context is
 // derived. The Sender/Recipient IDs are the same C_I and C_R from
 // the previous EDHOC execution

    |                                  |                              |
    |  Access to protected resource /r |                              |
    |  (OSCORE-protected message)      |                              |
    |  (access control is enforced)    |                              |
M13 |---------------------------------------------------------------->|
    |                                  |                              |
    |                                  |                              |
    |  Response                        |                              |
    |  (OSCORE-protected message)      |                              |
M14 |<----------------------------------------------------------------|
    |                                  |                              |
]]></artwork>
      </section>
      <section anchor="example-without-optimization-as-posting">
        <name>Workflow without Optimizations (AS token posting)</name>
        <t>The example below builds on the example in <xref target="example-without-optimization"/>, but assumes that AS is uploading the access token to RS on behalf of C.</t>
        <t>In order to save roundtrips between the Client and RS, further, more efficient interactions can be seamlessly considered, e.g., as per the example in <xref target="example-with-optimization"/>.</t>
        <artwork><![CDATA[
    C                                 AS                             RS
    |                                  |                              |
    |                                  | Establish secure association |
    |                                  | (e.g., OSCORE using EDHOC)   |
    |                                  |<---------------------------->|
    |                                  |                              |
    |                                  |                              |
    |  EDHOC message_1 to /edhoc       |                              |
M01 |--------------------------------->|                              |
    |                                  |                              |
    |                                  |                              |
    |  EDHOC message_2                 |                              |
M02 |<---------------------------------|                              |
    |  ID_CRED_R identifies            |                              |
    |     CRED_R = AUTH_CRED_AS        |                              |
    |     by reference                 |                              |
    |                                  |                              |
    |                                  |                              |
    |  EDHOC message_3 to /edhoc       |                              |
M03 |--------------------------------->|                              |
    |  ID_CRED_I identifies            |                              |
    |     CRED_I = AUTH_CRED_C         |                              |
    |     by reference                 |                              |
    |                                  |                              |
    |                                  |                              |
    |  Token request to /token         |                              |
    |  (OSCORE-protected message)      |                              |
M04 |--------------------------------->|                              |
    |  'req_cnf' identifies            |                              |
    |     AUTH_CRED_C by reference     |                              |
    |                                  |                              |
    |                                  |                              |
    |                                  |  Token upload to /authz-info |
    |                                  |  (OSCORE-protected message)  |
M05 |                                  |----------------------------->|
    |                                  |  In the access token:        |
    |                                  |     * the 'cnf' claim        |
    |                                  |       specifies AUTH_CRED_C  |
    |                                  |       by value               |
    |                                  |     * the 'edhoc_info'       |
    |                                  |       claim specifies        |
    |                                  |         {                    |
    |                                  |           id     : h'01',    |
    |                                  |           suite  : 2,        |
    |                                  |           methods: 3         |
    |                                  |         }                    |
    |                                  |                              |

 // Possibly after chain verification, RS adds AUTH_CRED_C
 // to the set of its trusted peer authentication credentials,
 // relying on AS as trusted provider

    |                                  |                              |
    |                                  |  2.01 (Created)              |
    |                                  |  (OSCORE-protected message)  |
M06 |                                  |<-----------------------------|
    |                                  |                              |
    |                                  |                              |
    |  Token response                  |                              |
    |  (OSCORE-protected message)      |                              |
M07 |<---------------------------------|                              |
    |  'rs_cnf' specifies              |                              |
    |     AUTH_CRED_RS by value        |                              |
    |                                  |                              |
    |  'ace_profile' =                 |                              |
    |             coap_edhoc_oscore    |                              |
    |                                  |                              |
    |  'token_uploaded' = true         |                              |
    |                                  |                              |
    |  'edhoc_info' specifies:         |                              |
    |     {                            |                              |
    |       id     : h'01',            |                              |
    |       suite  : 2,                |                              |
    |       methods: 3                 |                              |
    |     }                            |                              |
    |                                  |                              |


 // Possibly after chain verification, the Client adds AUTH_CRED_RS
 // to the set of its trusted peer authentication credentials,
 // relying on AS as trusted provider

    |                                  |                              |
    |  EDHOC message_1 to /edhoc       |                              |
    |  (no access control is enforced) |                              |
M08 |---------------------------------------------------------------->|
    |                                  |                              |
    |                                  |                              |
    |  EDHOC message_2                 |                              |
M09 |<----------------------------------------------------------------|
    |  ID_CRED_R identifies            |                              |
    |     CRED_R = AUTH_CRED_RS        |                              |
    |     by reference                 |                              |
    |                                  |                              |
    |                                  |                              |
    |  EDHOC message_3 to /edhoc       |                              |
    |  (no access control is enforced) |                              |
M10 |---------------------------------------------------------------->|
    |  ID_CRED_I identifies            |                              |
    |     CRED_I = AUTH_CRED_C         |                              |
    |     by reference                 |                              |
    |                                  |                              |
    |                                  |                              |
    |  Access to protected resource    |                              |
    |  (OSCORE-protected message)      |                              |
    |  (access control is enforced)    |                              |
M11 |---------------------------------------------------------------->|
    |                                  |                              |
    |                                  |                              |
    |  Response                        |                              |
    |  (OSCORE-protected message)      |                              |
M12 |<----------------------------------------------------------------|
    |                                  |                              |

 // Later on, the access token expires ...
 //  - The Client and RS delete their OSCORE Security Context and
 //    purge the EDHOC session used to derive it (unless the same
 //    session is also used for other reasons).
 //  - RS retains AUTH_CRED_C as still valid,
 //    and AS knows about it.
 //  - The Client retains AUTH_CRED_RS as still valid,
 //    and AS knows about it.

    |                                  |                              |
    |                                  |                              |

 // Time passes ...

    |                                  |                              |
    |                                  |                              |

 // The Client asks for a new access token; now all the
 // authentication credentials can be indicated by reference

 // The price to pay is on AS, about remembering that at least
 // one access token has been issued for the pair (Client, RS)
 // and considering the pair (AUTH_CRED_C, AUTH_CRED_RS)

    |                                  |                              |
    |  Token request to /token         |                              |
    |  (OSCORE-protected message)      |                              |
M13 |--------------------------------->|                              |
    |  'req_cnf' identifies            |                              |
    |     CRED_I = AUTH_CRED_C         |                              |
    |     by reference                 |                              |
    |                                  |                              |
    |                                  |                              |
    |                                  |  Token upload to /authz-info |
    |                                  |  (OSCORE-protected message)  |
M14 |                                  |----------------------------->|
    |                                  |  In the access token:        |
    |                                  |     * the 'cnf' claim        |
    |                                  |       specifies AUTH_CRED_C  |
    |                                  |       by reference           |
    |                                  |     * the 'edhoc_info'       |
    |                                  |       claim specifies        |
    |                                  |         {                    |
    |                                  |           id     : h'05',    |
    |                                  |           suite  : 2,        |
    |                                  |           methods: 3         |
    |                                  |         }                    |
    |                                  |                              |
    |                                  |                              |
    |                                  |  2.01 (Created)              |
    |                                  |  (OSCORE-protected message)  |
M15 |                                  |<-----------------------------|
    |                                  |                              |
    |                                  |                              |
    |  Token response                  |                              |
    |  (OSCORE-protected message)      |                              |
M16 |<---------------------------------|                              |
    |  'rs_cnf' specifies              |                              |
    |     AUTH_CRED_RS by reference    |                              |
    |                                  |                              |
    |  'ace_profile' =                 |                              |
    |             coap_edhoc_oscore    |                              |
    |                                  |                              |
    |  'token_uploaded' = true         |                              |
    |                                  |                              |
    |  'edhoc_info' specifies:         |                              |
    |     {                            |                              |
    |       id     : h'05',            |                              |
    |       suite  : 2,                |                              |
    |       methods: 3                 |                              |
    |     }                            |                              |
    |                                  |                              |
    |                                  |                              |
    |  EDHOC message_1 to /edhoc       |                              |
    |  (no access control is enforced) |                              |
M17 |---------------------------------------------------------------->|
    |                                  |                              |
    |                                  |                              |
    |  EDHOC message_2                 |                              |
    |  (no access control is enforced) |                              |
M18 |<----------------------------------------------------------------|
    |  ID_CRED_R specifies             |                              |
    |     CRED_R = AUTH_CRED_RS        |                              |
    |     by reference                 |                              |
    |                                  |                              |
    |                                  |                              |
    |  EDHOC message_3 to /edhoc       |                              |
    |  (no access control is enforced) |                              |
M19 |---------------------------------------------------------------->|
    |  ID_CRED_I identifies            |                              |
    |     CRED_I = AUTH_CRED_C         |                              |
    |     by reference                 |                              |
    |                                  |                              |
    |                                  |                              |
    |  Access to protected resource /r |                              |
    |  (OSCORE-protected message)      |                              |
    |  (access control is enforced)    |                              |
M20 |---------------------------------------------------------------->|
    |                                  |                              |
    |                                  |                              |
    |  Response                        |                              |
    |  (OSCORE-protected message)      |                              |
M21 |<----------------------------------------------------------------|
    |                                  |                              |
]]></artwork>
      </section>
    </section>
    <section numbered="false" anchor="acknowldegment">
      <name>Acknowledgments</name>
      <t>Work on this document has in part been supported by the H2020 project SIFIS-Home (grant agreement 952652).</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
