<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.17 (Ruby 2.6.10) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-shahzad-scim-device-model-01" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="SCIM Device Schema Extensions">Device Schema Extensions to the SCIM model</title>

    <author initials="M." surname="Shahzad" fullname="Muhammad Shahzad">
      <organization>North Carolina State University</organization>
      <address>
        <postal>
          <street>Department of Computer Science</street> <street>890 Oval Drive</street> <street>Campus Box 8206</street>
          <city>Raleigh, NC</city>
          <code>27695-8206</code>
          <country>USA</country>
        </postal>
        <email>mshahza@ncsu.edu</email>
      </address>
    </author>
    <author initials="H." surname="Iqbal" fullname="Hassan Iqbal">
      <organization>North Carolina State University</organization>
      <address>
        <postal>
          <street>Department of Computer Science</street> <street>890 Oval Drive</street> <street>Campus Box 8206</street>
          <city>Raleigh, NC</city>
          <code>27695-8206</code>
          <country>USA</country>
        </postal>
        <email>hiqbal@ncsu.edu</email>
      </address>
    </author>
    <author initials="E." surname="Lear" fullname="Eliot Lear">
      <organization>Cisco Systems</organization>
      <address>
        <postal>
          <street>Richtistrasse 7</street>
          <city>Wallisellen</city>
          <code>CH-8304</code>
          <country>Switzerland</country>
        </postal>
        <phone>+41 44 878 9200</phone>
        <email>lear@cisco.com</email>
      </address>
    </author>

    <date year="2022" month="November" day="07"/>

    
    
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>The initial core schema for SCIM (System for Cross Identity
Management) was designed for provisioning users.  This memo specifies
schema extensions that enables provisioning of devices, using various
underlying bootstrapping systems, such as Wifi EasyConnect, RFC 8366
vouchers, and BLE passcodes.</t>



    </abstract>



  </front>

  <middle>


<section anchor="introduction"><name>Introduction</name>

<t>The Internet of Things presents a management challenge in many
dimensions.  One of them is the ability to onboard and manage large
number of devices.  There are many models for bootstrapping trust
between devices and network deployments.  Indeed it is expected that
different manufacturers will make use of different methods.</t>

<t>SCIM (System for Cross Identity Management) <xref target="RFC7643"/> <xref target="RFC7644"/>
defines a protocol and a schema for provisioning of users.  However,
it can easily be extended to provision devices.  The protocol and core
schema were designed to permit just such extensions.  Bulk operations
are supported.  This is good because often devices are procured in
bulk.</t>

<section anchor="why-scim-for-devices"><name>Why SCIM for devices?</name>
<t>Some might ask why SCIM is well suited for this purpose and not, for
example, NETCONF or RESTCONF with YANG.  After all, there are all sorts
of existing models available.  The answer is that the only information
being passed about the device is neither state nor device configuration
information, but only information necessary to bootstrap trust so that
the device may establish connectivity.</t>

</section>
<section anchor="protocol-participants"><name>Protocol Participants</name>

<t>In the normal SCIM model, it was presumed that large federated
deployments would be SCIM clients who provision and remove employees
and contractors as they are enter and depart those deployments, and
federated services such as sales, payment, or conferencing services
would be the servers.</t>

<t>In the device model, the roles are reversed, and may be somewhat more
varied.  A deployment network management system gateway (NMS gateway)
plays the role of the server, receiving information about devices that
are expected to be connected to its network.  That server will apply
appropriate local policies regarding whether/how the device should be
connected.</t>

<t>The client may be one of a number of entities:</t>

<t><list style="symbols">
  <t>A vendor who is authorized to add devices to a network as part of
a sales transaction.  This is similar to the sales integration
sometimes envisioned by Bootstrapping Remote Key Infrastructure
(BRSKI) <xref target="RFC8995"/>.</t>
  <t>A client application that administrators or employees use to add,
remove, or get information about devices.  An example might be an
tablet or phone app that scans Easyconnect QR codes.</t>
</list></t>

</section>
<section anchor="schema-description"><name>Schema Description</name>

<t>RFC 7643 does not prescribe a language to describe a schema. We
have chosen the JSON schema language <xref target="I-D.bhutton-json-schema"/> for
this purpose.  This implies that use of XML for this device extension
is not supported.</t>

<t>Several additional schemas specify specific onboarding mechanisms,
such as BLE and Wifi Easy Connect.</t>

</section>
<section anchor="terminology"><name>Terminology</name>
<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

</section>
</section>
<section anchor="the-device-schema"><name>The Device Schema</name>

<t>The core device schema contains only those elements that any device
may need.  Not all elements are optional.</t>

<figure><artwork><![CDATA[
<CODE BEGINS>
{
  "$schema": "https://json-schema.org/draft/2020-12/schema",
  "$id": "https://json-schema.org/draft/2020-12/schema",
  "type": "object",
  "title": "SCIM zigbee device core schema",
  
  "required": [
    "schemas",
    "id",
    "adminState",
    "connectivity",
    "meta"
  ],

  "properties": {
    "schemas": {
      "$id": "#/properties/schemas",
      "type": "array",
      "item": {
        "type": "string"
      },
      "description": "This is a default attribute of SCIM which contains the list of schema URIs that are present in the SCIM JSON object. It contains URI of core schema and extension schema. It may also include URI for applications schema depending on use-case.",
      "examples": ["urn:ietf:params:scim:schemas:core:2.0:Device"]
    },
    "id": {
      "$id": "#/properties/id",
      "type": "string",
      "title": "ID",
      "uniqueItems": true,
      "description": "It represents a unique device ID, formated as 128 bit UUID format. It provides a uniform way of uniquely identifying the device in the scope of the application.",
      "examples": ["e9e30dba-f08f-4109-8486-d5c6a3312345"],
      "pattern": "^[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}$"
    },
    "displayName": {
      "$id": "#/properties/displayName",
      "type": "string",
      "title": "Display Name",
      "description": "Human readable name of the device, suitable for displaying to end-users.",
      "examples": ["BLE Heart Monitor"]
    },
    "adminState": {
      "$id": "#/properties/adminState",
      "type": "boolean",
      "title": "Admin State",
      "default": false,
      "description": "A mutable boolean value indicating the device administrative status. If set TRUE, the commands (such as connect, disconnect, subscribe) that control app sends to the controller for the devices will be processeed by the controller. If set FALSE, any command comming from the control app for the device will be rejected by the controller."
    },
    "connectivity": {
      "$id": "#/properties/connectivity",
      "type": "array",
      "items": {
        "type": "string"
      },
      "title": "Connectivity",
      "description": "It represents the communication technology supported by the device such as BLE, WiFi, LoRa, Zigbee.",
      "examples": ["BLE", "Zigbee"]
    },
    "mudUrl": {
      "$id": "#/properties/mudurl",
      "type": "string",
      "format": "iri-reference",
      "title": "MUD URL",
      "description": "A URL to MUD file of the device (RFC 8520). It is added for future use. Current usage is not defined yet."
    }
  },

  "meta": {
    "type": "object",
    "title": "MetaData",

    "required": [
      "resourceType",
      "created",
      "lastModified",
      "version",
      "location"
    ],

    "properties": {

      "resourceType": {
        "type": "string",
        "title": "Resource type",
        "enum": ["Device"],
        "description": "The name of the resource type of the resource. This attribute has a mutability of readOnly.",
        "readOnly": true
      },

      "created": {
        "type": "string",
        "format": "dateTime",
        "title": "Created",
        "description": "The DateTime that the resource was added to the service provider. This attribute MUST be a DateTime."
      },

      "lastModified": {
        "type": "string",
        "format": "dateTime",
        "title": "Last modified",
        "description": "The most recent DateTime that the details of this resource were updated at the service provider. If this resource has never been modified since its initial creation, the value MUST be the same as the value of created."
      },

      "version": {
        "type": "string",
        "title": "Version",
        "description": "The version of the resource being returned. This value must be the same as the entity-tag (ETag) HTTP response header (see Sections 2.1 and 2.3 of [RFC7232])."
      },

      "location": {
        "type": "string",
        "format": "iri-reference",
        "title": "Location",
        "description": "The URI of the resource being returned. This value MUST be the same as the Content-Location HTTP response header (see Section 3.1.4.2 of [RFC7231])."
      }
    }    
  }
}
<CODE ENDS>
]]></artwork></figure>

</section>
<section anchor="the-endpoint-extension-schema"><name>The Endpoint Extension Schema</name>

<t>Sometimes devices require and application gateway interface to manage
them.  This is the case with BLE and Zigbee non-IP devices.  SCIM
clients MUST NOT specify this to describe native IP-based devices.</t>

<t>The device schema is a base schema upon which specific onboarding
technology schemas are built.  It is described below.</t>

<figure><artwork><![CDATA[
<CODE BEGINS>
{
    "urn:ietf:params:scim:schemas:extension:Endpoints:2.0:Device":{
        "type": "object",
        "$id": "urn:ietf:params:scim:schemas:extension:endpoints:2.0:Device",
        "title": "Endpoints extension schema for partner application",
        "description": "Endpoint schema contains URLs and root certificates for the partner application and URLs for enterprise endpoints.",
        "required": [
          "onboarding",
          "deviceControl",
          "dataReceiver"
        ],
  
        "properties": {
  
          "onboarding": {
            "type": "object",
            "$id": "#/properties/onboarding",
            "title": "Onboarding",
            "description": "Onboarding application attributes.",
  
            "required": [
              "onboardingAppUrl",
              "onboardingAppRootCertificate",
                    "onboardingEnterpriseEndpoint"
            ],
  
            "properties": {
              "onboardingAppUrl": {
                "$id": "#/properties/onboardingAppUrl",
                "type": "string",
                "format": "iri-reference",
                "title": "Onboarding application URL",
                "description": "The URL of the onboarding application which can be used to access the application. This attribute is provided by the onboarding application when it creates the SCIM object for the device.",
                "examples": ["https//example.com/onboardingapp/"]
              },
              "onboardingAppRootCertificate": {
                "$id": "#/properties/onboardingAppRootCertificate",
                "type": "string",
                "title": "The root certificate of onboarding application",
                "description": "This attribute comprises of the root certificate signed by the root CA. Onboarding application provides this attribute when it creates the SCIM object for the device."
              },
              "onboardingEnterpriseEndpoint": {
                "$id": "#/properties/onboardingEnterpriseEndpoint",
                "type": "string",
                "format": "iri-reference",
                "title": "Enterprise endpoint for onboarding app",
                "description": "The URL of the enterprise endpoint which oboarding app uses to reach enterprise network gateway. This attribute is already known to the onboarding app and adds it to the SCIM object, when it creates the SCIM object for the device.",
                "examples": ["https//enterprise.com/onboardingapp_endpoint/"]
              }
            }
          },
  
          "deviceControl": {
            "type": "object",
            "$id": "#/properties/deviceControl",
            "title": "Device Control",
            "description": "Device controll application attributes.",
  
            "required": [
              "deviceControlApps",
                    "deviceControlEnterpriseEndpoint"
            ],
  
            "properties": {
              
              "deviceControlApps": {
                "type": "array",
                "items": {
                  "type": "object"
                },
                "title": "Device control apps",
                "description": "The list of device control apps where each list entry contains i) URL and ii) root certificate for each device control app that can control the device.",
                "properties": {
                  "deviceControlAppUrl": {
                    "$id": "#/properties/deviceControlAppUrl",
                    "type": "string",
                    "format": "iri-reference",
                    "title": "Device control app url",
                    "description": "The URL of the device control application which can be used to access the app. This attribute is provided by the onboarding application when it creates the SCIM object for the device.",
                    "examples": ["https//example.com/device_control_app1/"]
                  },
                  "deviceControlAppRootCertificate": {
                    "$id": "#/properties/deviceControlAppRootCertificate",
                    "type": "string",
                    "title": "Device control root certificate",
                    "description": "This attribute comprises of the root certificate signed by the root CA. This attribute is already known to the onboarding app and adds it to the SCIM object, when it creates the SCIM object for the device."
                  }
                }
              },
              
              "deviceControlEnterpriseEndpoint": {
                "$id": "#/properties/deviceControlEnterpriseEndpoint",
                "type": "string",
                "format": "iri-reference",
                "title": "Device control enterprise endpoint",
                "description": "The URL of the enterprise endpoint which device control apps uses to reach enterprise network gateway. When enterprise receives the SCIM object from onboarding app, it adds this attribute to the object and sends back the object as response back to the onboarding app.",
                "examples": ["https//enterprise.com/device_control_endpoint/"]
              }
            }
          },
  
          "dataReceiver": {
            "type": "object",
            "$id": "#/properties/dataReceiver",
            "title": "Data Receiver",
            "description": "Data receiver application attributes.",
  
            "required": [
              "dataReceiverApps",
                    "dataReceiverEnterpriseEndpoint"
            ],
  
            "properties": {
              
              "dataReceiverApps": {
                "type": "array",
                "items": {
                  "type": "object"
                },
                "title": "Data receiver apps",
                "description": "The list of data receiver apps where each list entry contains i) URL and ii) root certificate for each of the data receiver app.",
                "properties": {
                  "dataReceiverAppUrl": {
                    "$id": "#/properties/dataReceiverAppUrl",
                    "type": "string",
                    "format": "iri-reference",
                    "title": "Data receiver app URL",
                    "description": "The URL of the data receiver application which can be used to access the application. This attribute is provided by the device control app when it communicates with the controller. Controller will add this in the SCIM object locally stored in the SCIM server.",
                    "examples": ["https//example.com/dataReceoiverapp1/"]
                  },
                  "dataReceiverAppRootCertificate": {
                    "$id": "#/properties/dataReceiverAppRootCertificate",
                    "type": "string",
                    "title": "Data receiver root certificate",
                    "description": "This attribute comprises of the root certificate signed by the root CA. This attribute is provided by the device control app when it communicates with the controller. Controller will add this in the SCIM object locally stored in the SCIM server."
                  }
                }
              },
              
              "dataReceiverEnterpriseEndpoint": {
                "$id": "#/properties/dataReceiverEnterpriseEndpoint",
                "type": "string",
                "format": "iri-reference",
                "title": "Data receiver enterprise endpoint",
                "description": "The URL of the enterprise endpoint which data receiver apps uses to reach enterprise network gateway. When enterprise receives the SCIM object from onboarding app, it adds this attribute to the object and sends back the object as response back to the onboarding app.",
                "examples": ["https//enterprise.com/data_receiver_endpoint/"]
              }
            }
          }
        }
    }
}}
<CODE ENDS>
]]></artwork></figure>

</section>
<section anchor="the-ble-device-extension"><name>The BLE Device Extension</name>

<t>This schema extends the Device schema to specify how the device is to
be authenticated, as well as well as a URL to a control interface for
the device.</t>

<figure><artwork><![CDATA[
<CODE BEGINS>
{
    "urn:ietf:params:scim:schemas:extension:Ble:2.0:Device":{
      "type": "object",
      "$id": "#/properties/urn:ietf:params:scim:schemas:extension:Ble:2.0:Device",
      "title": "Device extension schema for BLE",
      "description": "Extension schema for devices that support BLE. It contains the attributes that are specific BLE devices only.",

      "required": [
        "versionSupport",
        "deviceMacAddress",
        "addressType",
        "pairingMethods"
      ],
      
      "properties": {
        "versionSupport": {
          "$id": "#/properties/versionSupport",
          "type": "array",
          "items": {
            "type": "string"
          },
          "title": "Version support",
          "description": "Provides a list of all the BLE versions supported by the device.",
          "examples": ["4.1", "4.2", "5.0", "5.1", "5.2", "5.3"]
        },
        "deviceMacAddress": {
          "$id": "#/properties/deviceMacAddress",
          "type": "string",
          "title": "Device MAC address",
          "description": "It is the public MAC address assigned by the manufacturer. It is unique 48 bit value.",
          "examples": ["01:23:45:67:89:AB"],
          "pattern": "^[0-9A-Fa-f]{2}:[0-9A-Fa-f]{2}:[0-9A-Fa-f]{2}:[0-9A-Fa-f]{2}:[0-9A-Fa-f]{2}:[0-9A-Fa-f]{2}$"
        },
        "addressType": {
          "$id": "#/properties/addressType",
          "type": "boolean",
          "title": "Address type",
          "default": false,
          "description": "AddressType flag is taken from the BLE core specifications 5.3. If FALSE, the device is using public MAC address. If TRUE, device is using Random address which is resolved using IRK. "
        },
        "irk": {
          "$id": "#/properties/irk",
          "type": "string",
          "title": "Identity resolving key",
          "description": "Identity resolving key, which is unique for every device. It is used to resolve random address."
        },
        "pairingMethods": {
          "$id": "#/properties/pairingMethods",
          "type": "array",
          "item":{
            "type": "string"
          },
          "title": "Pairing methods",
          "examples": ["urn:ietf:params:scim:schemas:extension:pairingNull:2.0:Device", "urn:ietf:params:scim:schemas:extension:pairingJustWorks:2.0:Device", "urn:ietf:params:scim:schemas:extension:pairingPassKey:2.0:Device", "urn:ietf:params:scim:schemas:extension:pairingOOB:2.0:Device"]
        },
        
        "urn:ietf:params:scim:schemas:extension:pairingNull:2.0:Device": {
          "type": "null",
          "title": "Extension for null pairing method",
          "description": "This pairing method is for the BLE devices that do not use any pairing method and connects with the nearest device when powered up. There is no attribute for this method."
        },
        "urn:ietf:params:scim:schemas:extension:pairingJustWorks:2.0:Device": {
          "type": "object",
          "title": "Extension for just works pairing method.",
          "properties": {
            "key": {
              "type": "null",
              "title": "Key",
              "description": "Just works does not have any key value. For completeness, it is added with a key value 'null'."
            }
          }
        },
        "urn:ietf:params:scim:schemas:extension:pairingPassKey:2.0:Device": {
          "type": "object",
          "title": "Extension for pass key pairing method.",
          "properties": {
            "key": {
              "type": "integer",
              "title": "Key",
              "description": "A six digit passkey for ble device",
              "pattern": "^[0-9]{6}$"
            }
          }
        },
        "urn:ietf:params:scim:schemas:extension:pairingOOB:2.0:Device": {
          "type": "object",
          "title": "Extension for out of band pairing method.",
          "required": [
            "key",
            "randNumber"
          ],
          "properties": {
            "key": {
              "type": "string",
              "title": "Key",
              "description": "A key value retrieved from out of band source such as NFC."
            },
            "randNumber": {
              "type": "integer",
              "title": "Random number",
              "description": "Nonce added to the key."
            },
            "confirmationNumber": {
              "type": "integer",
              "title": "Confirmation number",
              "description": "Some solutions require confirmation number RESTful message exchange."
            }
          }
        }
      }
    }
}
<CODE ENDS>
]]></artwork></figure>

</section>
<section anchor="wifi-easyconnect-extension"><name>Wifi EasyConnect Extension</name>

<t>This schema extends the device schema to enable Wifi EasyConnect
(otherwise known as Device Provisioning Protocol).</t>

<figure><artwork><![CDATA[
<CODE BEGINS>
{
    "urn:ietf:params:scim:schemas:extension:Wifi:2.0:Device":{
      "type": "object",
      "$id": "urn:ietf:params:scim:schemas:extension:Wifi:2.0:Device",
      "title": "Device extension schema for WiFi",
      "description": "Extension schema for devices that support WiFi. It contains the attributes that are specific WiFi devices only.",

      "required": [
        "versionSupport",
        "bootstrapKey"
      ],
      
      "properties": {
        "versionSupport": {
          "$id": "#/properties/versionSupport",
          "type": "array",
          "items": {
            "type": "string"
          },
          "title": "Version support",
          "description": "Provides a list of all the WiFi versions supported by the device.",
          "examples": ["802.11ax"]
        },
        "bootstrappingMethod": {
          "$id": "#/properties/bootstrappingMethod",
          "type": "array",
          "items": {
            "type": "string"
          },
          "title": "Bootstrapping method",
          "description": "The list of all the bootstrapping methods available on the enrollee device.",
          "examples": ["QR", "NFC"]
        },
        "bootstrapKey": {
          "$id": "#/properties/bootstrapKey",
          "type": "string",
          "title": "Bootstrap key",
          "description": "This key is Elliptic-Curve Diffie–Hellman (ECDH) public key. The base64 encoded length for P-256, P-384, and P-521 is 80, 96, and 120 characters.",
          "examples": ["MDkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDIgADURzxmttZoIRIPWGoQMV00XHWCAQIhXruVWOz0NjlkIA="]
        },
        "deviceMacAddress": {
          "$id": "#/properties/deviceMacAddress",
          "type": "string",
          "title": "Device MAC address",
          "description": "The MAC address assigned by the manufacturer. It is unique 48 bit value.",
          "examples": ["01:23:45:67:89:AB"],
          "pattern": "^[0-9A-Fa-f]{2}:[0-9A-Fa-f]{2}:[0-9A-Fa-f]{2}:[0-9A-Fa-f]{2}:[0-9A-Fa-f]{2}:[0-9A-Fa-f]{2}$"
        },
        "classChannel": {
          "$id": "#/properties/classChannel",
          "type": "array",
          "items": {
            "type": "string"
          },
          "title": "Class channel",
          "description": "A list of global operating class and channel shared as bootstrapping information. It is formatted as class/channel.",
          "examples": ["81/1", "115/36"]
        },
         "serialNumber": {
          "$id": "#/properties/serialNumber",
          "type": "string",
          "title": "Serial number",
          "description": "An alphanumeric serial number that may also be passed as bootstrapping information.",
          "examples": ["4774LH2b4044"]
        }
      }
    }
}
<CODE ENDS>
]]></artwork></figure>

</section>
<section anchor="zigbee-extension"><name>Zigbee Extension</name>

<t>This schema extends the device schema to enable provisioning of
Zigbee devices.</t>

<figure><artwork><![CDATA[
{  
    "urn:ietf:params:scim:schemas:extension:zigbee:2.0:Device":{
        "type": "object",
        "$id": "urn:ietf:params:scim:schemas:extension:zigbee:2.0:Device",
        "title": "Device extension schema for zigbee.",
        "description": "Extension schema for devices that support zigbee. It contains the attributes that are specific zigbee devices only.",

        "required": [
            "versionSupport",
            "deviceEui64Address"
        ],
        
        "properties": {
            "versionSupport": {
            "$id": "#/properties/versionSupport",
            "type": "array",
            "items": {
                "type": "string"
            },
            "title": "Version support",
            "description": "Provides a list of all the zigbee versions supported by the device.",
            "examples": ["3.0"]
            },
            "deviceEui64Address": {
            "$id": "#/properties/deviceEui64Address",
            "type": "string",
            "title": "EUI-64 address",
            "description": "The EUI-64 (Extended Unique Identifier) device address.",
            "examples": ["50325FFFFEE76728"],
            "pattern": "^[0-9A-Fa-f]{16}$"
            }
        }
    }
}
  
]]></artwork></figure>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>Because provisioning operations are senstive, each client must be
appropriately authenticated.  Certain objects may be read-only or
not visible based on who is connected.</t>

<t>[ More to be added here. ]</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>TBD</t>

</section>
<section anchor="changes-from-earlier-versions"><name>Changes from Earlier Versions</name>

<t>Draft -01:</t>

<t><list style="symbols">
  <t>Doh! We forgot the core device schemea!</t>
</list></t>

<t>Draft -00:</t>

<t><list style="symbols">
  <t>Initial revision</t>
</list></t>

</section>


  </middle>

  <back>


    <references title='Normative References'>





<reference anchor='RFC7643' target='https://www.rfc-editor.org/info/rfc7643'>
<front>
<title>System for Cross-domain Identity Management: Core Schema</title>
<author fullname='P. Hunt' initials='P.' role='editor' surname='Hunt'><organization/></author>
<author fullname='K. Grizzle' initials='K.' surname='Grizzle'><organization/></author>
<author fullname='E. Wahlstroem' initials='E.' surname='Wahlstroem'><organization/></author>
<author fullname='C. Mortimore' initials='C.' surname='Mortimore'><organization/></author>
<date month='September' year='2015'/>
<abstract><t>The System for Cross-domain Identity Management (SCIM) specifications are designed to make identity management in cloud-based applications and services easier.  The specification suite builds upon experience with existing schemas and deployments, placing specific emphasis on simplicity of development and integration, while applying existing authentication, authorization, and privacy models.  Its intent is to reduce the cost and complexity of user management operations by providing a common user schema and extension model as well as binding documents to provide patterns for exchanging this schema using HTTP.</t><t>This document provides a platform-neutral schema and extension model for representing users and groups and other resource types in JSON format.  This schema is intended for exchange and use with cloud service providers.</t></abstract>
</front>
<seriesInfo name='RFC' value='7643'/>
<seriesInfo name='DOI' value='10.17487/RFC7643'/>
</reference>



<reference anchor='RFC7644' target='https://www.rfc-editor.org/info/rfc7644'>
<front>
<title>System for Cross-domain Identity Management: Protocol</title>
<author fullname='P. Hunt' initials='P.' role='editor' surname='Hunt'><organization/></author>
<author fullname='K. Grizzle' initials='K.' surname='Grizzle'><organization/></author>
<author fullname='M. Ansari' initials='M.' surname='Ansari'><organization/></author>
<author fullname='E. Wahlstroem' initials='E.' surname='Wahlstroem'><organization/></author>
<author fullname='C. Mortimore' initials='C.' surname='Mortimore'><organization/></author>
<date month='September' year='2015'/>
<abstract><t>The System for Cross-domain Identity Management (SCIM) specification is an HTTP-based protocol that makes managing identities in multi-domain scenarios easier to support via a standardized service. Examples include, but are not limited to, enterprise-to-cloud service providers and inter-cloud scenarios.  The specification suite seeks to build upon experience with existing schemas and deployments, placing specific emphasis on simplicity of development and integration, while applying existing authentication, authorization, and privacy models.  SCIM's intent is to reduce the cost and complexity of user management operations by providing a common user schema, an extension model, and a service protocol defined by this document.</t></abstract>
</front>
<seriesInfo name='RFC' value='7644'/>
<seriesInfo name='DOI' value='10.17487/RFC7644'/>
</reference>


<reference anchor='I-D.bhutton-json-schema'>
   <front>
      <title>JSON Schema: A Media Type for Describing JSON Documents</title>
      <author fullname='Austin Wright' initials='A.' surname='Wright'>
         </author>
      <author fullname='Henry Andrews' initials='H.' surname='Andrews'>
         </author>
      <author fullname='Ben Hutton' initials='B.' surname='Hutton'>
         <organization>Postman</organization>
      </author>
      <author fullname='Greg Dennis' initials='G.' surname='Dennis'>
         </author>
      <date day='10' month='June' year='2022'/>
      <abstract>
	 <t>   JSON Schema defines the media type &quot;application/schema+json&quot;, a JSON-
   based format for describing the structure of JSON data.  JSON Schema
   asserts what a JSON document must look like, ways to extract
   information from it, and how to interact with it.  The &quot;application/
   schema-instance+json&quot; media type provides additional feature-rich
   integration with &quot;application/schema+json&quot; beyond what can be offered
   for &quot;application/json&quot; documents.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-bhutton-json-schema-01'/>
   <format target='https://www.ietf.org/archive/id/draft-bhutton-json-schema-01.txt' type='TXT'/>
</reference>



<reference anchor='RFC2119' target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author fullname='S. Bradner' initials='S.' surname='Bradner'><organization/></author>
<date month='March' year='1997'/>
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference anchor='RFC8174' target='https://www.rfc-editor.org/info/rfc8174'>
<front>
<title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
<author fullname='B. Leiba' initials='B.' surname='Leiba'><organization/></author>
<date month='May' year='2017'/>
<abstract><t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='8174'/>
<seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>




    </references>

    <references title='Informative References'>





<reference anchor='RFC8995' target='https://www.rfc-editor.org/info/rfc8995'>
<front>
<title>Bootstrapping Remote Secure Key Infrastructure (BRSKI)</title>
<author fullname='M. Pritikin' initials='M.' surname='Pritikin'><organization/></author>
<author fullname='M. Richardson' initials='M.' surname='Richardson'><organization/></author>
<author fullname='T. Eckert' initials='T.' surname='Eckert'><organization/></author>
<author fullname='M. Behringer' initials='M.' surname='Behringer'><organization/></author>
<author fullname='K. Watsen' initials='K.' surname='Watsen'><organization/></author>
<date month='May' year='2021'/>
<abstract><t>This document specifies automated bootstrapping of an Autonomic Control Plane.  To do this, a Secure Key Infrastructure is bootstrapped.  This is done using manufacturer-installed X.509 certificates, in combination with a manufacturer's authorizing service, both online and offline.  We call this process the Bootstrapping Remote Secure Key Infrastructure (BRSKI) protocol. Bootstrapping a new device can occur when using a routable address and a cloud service, only link-local connectivity, or limited/disconnected networks. Support for deployment models with less stringent security requirements is included. Bootstrapping is complete when the cryptographic identity of the new key infrastructure is successfully deployed to the device.  The established secure connection can be used to deploy a locally issued certificate to the device as well.</t></abstract>
</front>
<seriesInfo name='RFC' value='8995'/>
<seriesInfo name='DOI' value='10.17487/RFC8995'/>
</reference>




    </references>



  </back>

<!-- ##markdown-source:
H4sIAAAAAAAAA+1d6XLbxpb+j6q8Q0eTqmvPkBRJybLMmrvQJB0x1mYtcZbr
STWBJgkLBBgskmmXbs07zBvOk8w5p7uBxkZRspyk7lxVYpGNXs/6nYPuVrPZ
tGI39kSPDcW1awt2bs/FgrPRh1j4kRv4EYsDFs/hwWB8xBaBIzyLTyahuO7J
orp2lhPYPl9Az07Ip3EzmvP5R+40I9tdNB1q1KTumu2OFSWThRthu4vVEpqM
RxevLJvHYhaEqx6LYsey3GXYY3GYRHG33X7R7lpXYnUThA7U9mMR+iJuDnEk
y4pi7ju/cC/woauViKyl22M/x4HdYFEQxqGYRvBptcAP7yyLJ/E8CHsWazLm
+lGPHbXYuZytxeBHruIomfPFgju5R0E467Fj6HPOBjwMPNfn7DyGebNL370W
YeTGK6oYwagi7tHnJtBsycN4IfyYBVM2CBbLBFYANHSFbwtVaf9Fm51cc48N
Q+hKFQ441I3Yy+AD2++296jUhkF67Ix7wp3NG+x4IEuBtj3Wfb734lkzqxok
fowUvTzvUwHwzPV6bCG58zffjpKWcBKgBT0mchy02PjXCfcMYhzwKOK+UfzP
Qoi5i0uqpsOoxQ4FDw0yjDw3iLNCIsLAjeyAna+iWCwic8nszLXnsQvfgHiC
PTcmNzho7u+0d41FvOWe50bC84Sfn+/5jRt/FKEHEk4PlnOS8v/Y7bDdXbb/
fJ+9APUwl+TB9P5m46xadrCwrGazyfgEp2GDrlyAaru+G7tAXzsIBYukIk+D
UOr3E7kUKhiEQRSxsQP8Qn4ecZ/PBHLvKbvhEXNE5M584VDdZRhcu6jRrj9j
SQQi0GLsYu5GbCEWAYuWwnanLiinGlAYFmfOYyZ8PvFElO8HhESaDlDgJMKS
ax66QRJZie8AVVZYNAmCGJe3XOK3SHICFD6x5wxm+RaGZSMerQaB7ws7brCz
VwO2v7O3Z10HUAdm2mBAXvbycMSWwCvkUdSShFu4juMJywKTEwZOYscwMevP
xo+kqLZIOGFYsz/DdYgIKBUxzhYp3Zg958jjGTIBy1eW4y4UHYBeJ77ALsD+
LpgbkR3mE9cD4qNZDvxJwEOHJiv7ZB4PZ8Lyk8UE1CijFpFeAHc5/I/DSEse
Eafy9CILa01EfCOEr9vTELAesLdXULb0ghVOH/sdA+GB5W6MExQfgK0xfEUW
wlKmUxgUlglDJlOQtyQE6rIb1/Og6EqgXNAss4oCbLGD1L5D+JgpfJ8+fQ08
fL63u3N7m33Zvb21HDF1fZw/yhF4gMCjpXBTzIsSpoX1ILgRYLoaFqzNBmsn
eOR6KzYRUlYdXGaQtc7TOj8eapYW9BvkQ6oq2IMIFzDEe6C7FNJMFaCvl4l3
xQKow2Nyq8jBKFkuwdYKR6sU/DcLAgfmZnNJ09hkXkjTsYH6wCjfmkCXQOG3
85VUcSSCqvtXlPLyj3UeLEBwwKzGoEJX7EY3hYFvwErBjNxYKX6ME1om4TKA
iZDcBKBj8MQSH8BoewIs8+hicHL8CgwmOxudy89g1+bsx/7xt7Cm/hS9AGhG
A0VeiS3HYWDVkQU8Eh/AkCK/lBzza7B1aDAU9bkfAZ2lzoAxQcUJfGCe68NE
FkRKkHHsADUcZs4nQSLrSUpgU1+4ODwYcHRkfkolYKc/dWeJZIll9NlgE+il
OBJ0BKSNeEham6qbVDVYk9QWY+wFXzEBo07AB8xxNLRT7jWIPbDNOtWSdQq+
07XdJQdNrOEbGCpalI9z8QwQ10CNRaONdilZKJWV9oNNhYPyJhzL0HV2EyQe
ipjsxfZcWTo3dQD5HYJ9vwYlWWBTARZeaoBPHicA/edkyVbEVeETq6GGQ1gA
nqDcGOOSMbbSKTHQTinW2qBH4PCh1pJT/QZKFTIIDYpNHkA1sNIFIEWwFPU8
JZGmvaQOlgCOUdoToiEAMWkoW0tWIAKduEGiLVC70RGRQvaNyac20zD50iGx
GSzmBjp6cnx0rr88tZYeX0Xp4Mr2q7k2YBq2ADGANZnSJUVXKzvJElE2tcUB
zlZJkfzuxpGeGikMLEKOIW0zuAJvZcG/YbAMXRR+L7BBfJYA7ACaRTCRGTge
nMjNXKCObM+DG5OK0VzR2krHbUnXKOVG0zCQDo6zzGWRfYdBehYi8j67BlML
LEU5A52UYN39KNfBHSdbeIDdKHqjYKM0BVOEQlzKCCgc2AVOTtuwnJG7ANsR
6kBHVnVBLmdKwRHDAa9j8Mzg4nwp6jCByQrwp+k7z0DygVivQbbH/hRwHmg4
OT3s4snLs/PXY3RWfwX/tP/ixbPb25ZaoyIK0t21JVdJHbmzAHCGA5DiABlS
rSLfKUnQwO6l1pH0zwB41AoISij4MmmKlUmfoMHETtDkIGoJJa7ECcmJROAA
I0JNip/szRnTwMhSwd9QRHboLolmVbYIcRY6aeYEMH9wC2R8oAmOD6bHnyWI
YWBRTlYsvWaLvRXWnINZsdE+SI397vzkWDvytDW4/3Fz2JrMkzgO/Ob7CP6R
dQAboBcy/VMqBUAMVymPBiU/HB1m/kyJdeqZLVcuIPPEQAU0EqAlwBEXaQAf
5cCRQrsrjXptDd3IgwkAgcBkwKiWNmkIPdHSpFiVKbCKSoRwwQ+8YLYyqUzK
BSExw5g4YltHl+cXWw35mx2f0Oez0ZvL8dloiJ/PD/qHh+kHS9U4Pzi5PBxm
n7KWg5Ojo9HxUDaGUpYrsraO+j9uSfO4dXJ6MT457h9uIaiV5APwQcYPDZO0
R6hgIfAfLRKPLM1xBCjs5eCUdXYVkut2Oi9SWLffeQ6wDq2OLwcjXyu/ok9B
owXxDnaCeMHmSzfmHvqQCG3Sjc8QT6DMSmuUy17kgLyB5iku0oZNihu6Mw5R
oRxf+izhCekopeoCyJZtLLR1viDncAwygxNL6yJBgqUUF5jWP/SP9Z+Dk+GI
vRx9Oz4+/4v16StQz61v5OhbPbY1j+Nl1NveNuS7BfHnNiVbtrvtbrvZ6W6r
+g3Z2nUe2DJeLQU2DSbvQQZ1IeaNsJTgwEd3NhEiA0hpJClrU4tQ/Jq4gEGh
0c9fUYi6pRREVoLvMEX9kWwf5RDSIhMJpYVgmPkWfn4HJTQOui0Rog+BkT4V
RkpLMor823bWYrswI2P1PAz5yigHxLswuzOqgsUG1d7ST26zRk5mI7Gi9kEc
KDfliQfSEUNbQJFkg4i0N3PXnmcSh5YPcCHFlkoaL8/GWuoI6lOkKZVPoTUy
lZJ9LTaOs96gKXZkhv6oVqmhS+3vWPpsUCbww77tJY6gxmgiDb8V6V4ABIHj
ppDKR5PatDnYW4N8ygUhR37eSkK/54p42gOvzRdRD7OEPcWKHk6u1221e1Jb
t97JPm4NobmLq5lclblkPNAiPR4apYnv/pqIMWYRtigDKWrZCUQKhRHpy6Za
K8ZDioMWXNo81unuswnA8MvL8VA9IDoTnHaE6gAfMESKGJpSfxhdUBg8pXyH
GbRIlkc2LFyDR4M5teQXL8RO25nw5rS9P23udtovmvu7+3tN55m9x3d2Ot2d
3Wdb77LGS5BSEdKS/+vndvMFNHz3af+2mX7e3eBzp3v7zVaBlY4bIQQ+5gtx
J0/Nuvdh7lC2Y4WGBVYeJIDZgZvcQUxECT9NUUnsBgW99JACaNkrMSQAlOg0
ZR6hjuTo4g8EYtSjwHcB3pXE2jCAd5GibCsNSkDA6QnuV5Gij+1YsaEyRVBh
CupeL+19tkgkAdQQ7Jp7CUqhQwKXl00Dy7qA4zCoTgCNjsGKAeS8OLscyajL
DhZAeYAwTzQasnWizsEspvocJROJGJ5Ky0cBZkCxC3SI7RWeVw88iC4knBNp
yEDBzkQmRyBAFxLT5xulM3zVPzwfNcivqynSb1zlNAwWZjOaRH6wdKxQvJdh
WHmkojLk3N1dIlDlG+9wXtG9vVcqOIPq0daaQ81cMGI6xgHoK5FsBqQ1XTTe
yhBxA+DwK7fBDoMz3mA/EeBYp14IVGWtkmotEucy9O6kKVRLoNoGxkVab3zk
hm4zFDL7IKp07uhyCI7zsJ5qfXyM0os1p65XsDvsCeWrn3XbT8lbIHpwHJV8
myYYbqK/bbFBElJONYkwLlIBi0yIOmwl4lTe8NetBk8EpzLYVAX9cquB6kMe
E8xTz8owjwqjIAltge/3jKXbYGCB6UaJB1HzUeDguwGzmN4hBaYRw5QEkUyW
vMsmUMR/1ZNYK/sN85Fe65lqzuLcIlD0/GRBYqcRivmwBPny3iQ0ey0WtmR8
moHCOac3CGh35XsAaIBO6gTikFZuTrpUYRZTm0vk35gWmZw70PDCXYhqUg2K
fK2mw1B1kmVpU2pgblLKtc7LyDSeRkdhiTQU6VLOQHfb2qpcdU7EHn3ph9A7
ZhELElxNgEUQxZTWAz0tE8MB5XK9SAqFGxnEwaR4snQkkoxr6DMuNkPh8TFL
AWQSfjpJFgGgF5QUTF8FIv8ooY1dS7eu6SuTZDBPmcdVTzGIkEyvobrW4Pvr
3fdF3a+mpRqgpFcyzx8KsIw+BuEkNnLSC0zAVyxJvmNqxnzGnowu+OwpO7i4
OMUulxDiACFBt4CKTwAysHNhy8Cn2+pQ7NRt7eAcfsa3UN2d7rundWKoDdgD
RLDGy+TkUHd/B9lUBLgpyeqkABABhIxxUw97N8XYTqvT2m11DWJ1csRS7gn/
IRf1lXWr0iKj4+H5X4xkCaVpRr6zDFxQpHQTSm1eJ5/jOU+TuxoYKhcm3xUa
SVmdtKfk1ZTblMySuX18f7MwssqEdiDklS+2dEJP4hHwxH5zfGqkZDFIt/Qr
FZ2yS9OGpMVmWtSXGHp82pxwfHulO5KEyKeqKLuA1XRBAhxRSYWKfKRlgjKV
vsSswiRxvRjf9xLiyNJ1E+EFN3dlrjCKXhfhp+mGnmZiZAb8vSr9yCMSeqQw
3IZDiaqhKlUpnVQpLyJfIEMU54tcGmSd0qVyWswlAuyTb9rDAJCajRBmiv2J
KA0mKoaiFtQUKwmZVnUxH6lnXcQFZXhGDzIZMOvT/JE0AxmoFJ8B9juj11Ii
3MqevEuzfqpeOSdXN3bOGt7BcZPrOeRetxaTqyf1dQocy2rmCa+hh6ZwoZc6
ShdW3F8uL0OvOIdilTOQiUEmEuXqpUajVBS0xG3l2xSZVMOo9dOuqHQnT+pW
vNb7pVU28IJZd2Vm51iYC8SMdpV+8lD7yaC6M5Wo5T76xyRSryhtTC2UMnFF
8OpGGrilEXDtKADdcEsKoa0oy/FK9SjkHVqVy8uFyvRCYHtbleEmMYNVMPK2
Dp+zn9t7CusDhWQDmd9EYFIhuKD36nnbijytpvRmgpHjItCOFC5KEVVxNLXt
R7GYHg/6LVYjnmkmOM6Pc18ZuBf/KuzGQ/hX0c1vqfCjsiMksuR5/QDlr/Cw
SvMDs2c0AATagEW4pytrpfcoKDBZZQq4h9H7il35+MpSBcD5mUts6jgRyoG5
R1uKQOPL2Yl0JWVT8YumSJXNyBfkvt6WPFEBdDwKKFiDY3LvByR8rqtXkI5h
uiWM0riPBxByswVjGNW6/FzNL+H1N5hbtYWoyT4bNSry0BXtFZPLdcqGrIKT
Rla+kohVCq/fsDrlLlCzcH8VqjVVE7g1O4Px7lMyF6ifLnwuuQCC6di43Ld6
lQEIQhfepaHrGVfJrFrURrXvVJx68JZjWb09p2r3sOl38ZQla6az3paXOXAf
MPf7gjha3l1ATrb/RS3wF5hCp8I040+VJlUIz0bIjlpuIkibBjUbClWdkBRV
cHNpeRx098dw8JVcrzCpd4PF9f7gs/DjXT39lhCyIEUVwO9R4WOVq9kcRL5F
aTAqyL3CVWKBL6vzokabwUnUCnGGFkzZEgVSvlqfcPsq9yTKMr3yWZVEPxhj
FqzYI4JMM3v1OBjT7LEeYkItVlutiDCxsmJn+Ij40pjpenhpVPxt0GVxZn9M
cFlky/2xZamHR4OWGt8UR3g4iMzz5AEYstzB7wYhi1SpSwPWMdBEkLXK+cjZ
wIpgIQUA6aYa2tMUz0tbmAbZHih5wMNxpKk394gqW05HPbwVi+JAnhfLasgz
Ip+BRpUMBEisB2DRvAh9JhRd39mjIdGcfPzxgOgfWcy+JGBd79PugVfXd/Sb
wtWcqH1xtFp2Xv8Cq9rI/aIJ82Csmn3R2yC+sm7Xbn/ALQYqYkk3QNTufMAm
brpXX55nltQf5jYPxEG6CaFwwo92JFi43SqBUj8mu+DQQRs6EWz85npDI0/t
SraBQh7JSqPUbCPB5+0jeOmJ6h0EtaC+Ur0fNlrVpvPCATJz/wDtVU2bFHcL
VLUwD3vqrbPYTf5sB6GMNETIDoikuz5QZHRXgd5AmE6kOnrQ+7jO5aiFjQ7Y
1xG3+44DKpYDxFtcll0U904uuYt28Eie/E+NfraFMp1QHUwtTqlgvSsZW7+K
9ZFFXUxRt3maVLfQe2Ffm2ZgaddFTg5Os0MhOn7Ag2Sx0ny1nqhuI3XBnOUN
2W6rg5uld1td/PWs1Za/OvKXKtwxLdjtWrZvwoB1snKHkyxp1VF/wHhlN+UN
6Wpr1jKZAPo2W4KlyqMm89IKvdNaHejZlQd3aEfcWsq2O73uTm/3WW/veW//
Ra//Mrc1mJVP0vSbr+hwTPe293hfv9mq4Zypk5swrUaHDX6VDpvkGaaYXdpB
zepPnVTxsZ/Ng009PiOu8isAFelRDFQKeapNWTt1PA0EmXbGquMceY8m75Qp
ywa1kEdUipXPAGjAkFqIJDhSm269a5AmWW189rrF6tjghlcbkR/rPURN0ktT
5KRwPleiaNiKqlLZppEtUKkCpRzA+ujTrqmmqIhX0YGFOTq16khR8AabUKXQ
5H6mPLe3sIqkmxjyUzkDfXvNOoOwIaBQazpOPC8HLDbGP6qD75IofgvQO/qs
Xk7BNL4Wq8/q4+TkZcUZziJVDUn4PEoVBUdz1Yd6dWqSQS0UaqzJljnOrtcY
QtT5BqgI+jWMCbYIijkBnchJ6JqcVbGlujQFT1kZ0bYvAMBFcXqoDOOoZYDH
AcDQ0AtJzB/SWR8jMkqvMZB91yrfI8hWHd2rUuh1lKebkDBgLJKz6GrX5S23
0MJV7WCsl4T8nF4XLWQVz7/LpppeakHXVCBH8TYGCRHYK7qUBs0ALBTsX0Nd
mCVPuBB7eVaf/Qkn96diBqQ2Qnw4Dys0+zE4iJcq0XK+IP/ohpby25N7s7DP
IvcDc9wZcATnjdOma9E8jQwq+ijCtnef9nIo6wuxq2BEH4NVeDUMxBITtDfr
uVX/NmmrhCawOvR4TLf65OhSxL+fIwJ1GbR7S0CmeaGAPgXiNpl6Mqijzsbo
E6nHrwYlBV1Dg88UZQUz5TVJdy/pOPDpyLVxfg7WeOd86WIzdW3Q48x7YPS4
8ezptjmAjYmE7Po0jl3ui+6PmyYeiGxEx1zFB7xNZ1ba7nBHdi2XZqvMsllW
8eLIDdJs6xJtTjHRJm+8LN1PaT0J8IatG8yTyu0iIHwq8D01ry7U98I9zZJo
n5dDw5k8MIn2wBHumTjD8+CPkTnDfu6ZOsMmj5o7S68FRJP1ryRYNUvXJMGI
IZ+VBdtvd1udDv9Qm+fKXZQqw82NyFzV7nehdf62us1iGlGi9KSiF+MGThb4
6tURvQrciPRvzuhWsVeDu2n/uowJ1hO9BAE2TJqkxLo7V0ImHjEE/Bp5Hj6w
m4MkhDhg6E6nrvjf//6fA+F5eKPMk9FgePBU55jQKdOFpXhAc28XiIaX6jkM
7wSGmAAt1mmz+2yvAb929nflnWenzWfdDo61326wF3uysNNt423CeMdm/tqZ
MrWPhlc3o5sfD14HP40/vm8P+m9+HKvPw/4bezie9YeXZx8/LOL4p2B8Nj59
+23w5uj7dvuHg7dQeTz/IUy+f3vysX383rsa9//8T5AYRhb8P88F2x4segDg
yRelvT3VN86YDX4XezbAGaDUV0yhhPG1GZt5wYR7+kplsGC0DplvkT2xCPRI
XtGVt3XGpZpaCGSButCLetpWvaz3NZ1tervS6Tzb3tmrUyAghghd7lVD8err
68wGD9Gcc+qgEqqXaIqXLC5htckCGtksMptKzJReGYe3LKmbltdRde1bqufP
dw8PupPd9u5ujmIbQnjLUqfv63H7/dF64fJwPUR2IF8P/kljuE2xsbxR8csf
gy+PY/a1EQ7/WLyL6XPAuOrsfnA8d/1kBSBfn75Yh4NTNzZK3L1d7ZOyGqYN
N0Zbm9dYD9UfANbXm9x6o5trWWF4K1IEmwH3e0F3xbx7gveiedhptYt7bEqT
r+DkZsSvaFjHgOqklJF+uxw3AelVwpJqYKJaPBnpPztwKZGHfEUH8DJ8ml2y
p16vrSXVs/ZO99kr+BmNnu897+4XgMgaKNJZm+Y0DDB+ygzvubCTEF8mDoC/
rpP+MYPapMlL9YcM8uY1/SsIUvnBoOA1KA255VlfLC6v9DFvL/dW+U1KLcZw
qydYFrUlLNLXkeOhnCZd6RuEFubycXC64JCuWaFdvXQNuXmr+d9/ZkdBeq+x
zLnRLcPs7+8sa9w/7m+wbPA8L4eWNaDkVSSTjyMewppCpjStlly6B/rzR6wJ
ONMC6v87Y8Ng/jV7S+9/ZkGstmsW7jIW/OusZVu1HKtroEIhqW/9H3/+Xwkp
agAA

-->

</rfc>

