<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version  (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-tiloca-lake-app-profiles-03" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.21.0 -->
  <front>
    <title abbrev="EDHOC Application Profiles">Coordinating the Use of Application Profiles for Ephemeral Diffie-Hellman Over COSE (EDHOC)</title>
    <seriesInfo name="Internet-Draft" value="draft-tiloca-lake-app-profiles-03"/>
    <author initials="M." surname="Tiloca" fullname="Marco Tiloca">
      <organization>RISE AB</organization>
      <address>
        <postal>
          <street>Isafjordsgatan 22</street>
          <city>Kista</city>
          <code>16440 Stockholm</code>
          <country>Sweden</country>
        </postal>
        <email>marco.tiloca@ri.se</email>
      </address>
    </author>
    <author initials="R." surname="Höglund" fullname="Rikard Höglund">
      <organization>RISE AB</organization>
      <address>
        <postal>
          <street>Isafjordsgatan 22</street>
          <city>Kista</city>
          <code>16440 Stockholm</code>
          <country>Sweden</country>
        </postal>
        <email>rikard.hoglund@ri.se</email>
      </address>
    </author>
    <date year="2024" month="October" day="21"/>
    <area>Security</area>
    <workgroup>LAKE Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>The lightweight authenticated key exchange protocol Ephemeral Diffie-Hellman Over COSE (EDHOC) requires certain parameters to be agreed out-of-band, in order to ensure its successful completion. To this end, application profiles specify the intended use of EDHOC to allow for the relevant processing and verifications to be made. This document defines a number of means to coordinate the use and discovery of EDHOC application profiles. Also, it defines a canonical, CBOR-based representation that can be used to describe, distribute, and store EDHOC application profiles. Finally, this document defines a set of well-known EDHOC application profiles.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
  Lightweight Authenticated Key Exchange Working Group mailing list (lake@ietf.org),
  which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/lake/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
  <eref target="https://gitlab.com/crimson84/draft-tiloca-lake-app-profiles"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="intro">
      <name>Introduction</name>
      <t>Ephemeral Diffie-Hellman Over COSE (EDHOC) <xref target="RFC9528"/> is a lightweight authenticated key exchange protocol, especially intended for use in constrained scenarios.</t>
      <t>In order to successfully run EDHOC, the two peers acting as Initiator and Responder have to agree on certain parameters. Some of those are in-band and communicated through the protocol execution, during which a few of them may even be negotiated. However, other parameters have to be known out-of-band, before running the EDHOC protocol.</t>
      <t>As discussed in <xref section="3.9" sectionFormat="of" target="RFC9528"/>, applications can use EDHOC application profiles, which specify the intended usage of EDHOC to allow for the relevant processing and verifications to be made. In particular, an EDHOC application profile may include both in-band and out-of-band parameters.</t>
      <t>This document defines a number of means to coordinate the use and discovery of EDHOC application profiles, that is:</t>
      <ul spacing="normal">
        <li>
          <t>The new IANA registry "EDHOC Application Profiles" defined in <xref target="iana-edhoc-application-profiles"/>, where to register integer identifiers of EDHOC application profiles to use as corresponding Profile IDs.</t>
        </li>
        <li>
          <t>The new parameter "ed-prof" defined in <xref target="web-linking"/>. This parameter is employed to specify an EDHOC application profile identified by its Profile ID, and can be used as target attribute in a web link <xref target="RFC8288"/> to an EDHOC resource, or as filter criteria in a discovery request to discover EDHOC resources.  </t>
          <t>
For instance, the target attribute can be used in a link-format document <xref target="RFC6690"/> describing EDHOC resources at a server, when EDHOC is transferred over CoAP <xref target="RFC7252"/> (see <xref section="A.2" sectionFormat="of" target="RFC9528"/> as well as <xref target="I-D.ietf-core-oscore-edhoc"/>).</t>
        </li>
        <li>
          <t>The new parameter "app_prof" defined in <xref target="sec-edhoc-information-object"/> for the EDHOC_Information object specified in <xref target="I-D.ietf-ace-edhoc-oscore-profile"/>. This parameter is employed to specify a set of EDHOC application profiles, each identified by its Profile ID.  </t>
          <t>
For instance, the parameter can be used in the EDHOC and OSCORE profile <xref target="I-D.ietf-ace-edhoc-oscore-profile"/> of the ACE framework for authentication and authorization in constrained environments (ACE) <xref target="RFC9200"/>, in order to indicate the EDHOC application profiles supported by an ACE resource server.</t>
        </li>
        <li>
          <t>Additional parameters that provide information about an EDHOC application profile. A subset of these parameters are to be used as target attributes in a web link to an EDHOC resource, or as filter criteria in a discovery request to discover EDHOC resources (see <xref target="sec-parameters-web-linking"/>). Another subset of these parameters are to be used as elements of the EDHOC_Information object (see <xref target="sec-parameters-edhoc-info-object"/>).</t>
        </li>
      </ul>
      <t>In order to ensure the applicability of such parameters beyond transport- or setup-specific scenarios, this document also defines a canonical, CBOR-based representation that can be used to describe, distribute, and store EDHOC application profiles as CBOR data items (see <xref target="sec-app-profile-cbor"/>). The defined representation is transport- and setup-independent, and avoids the need to reinvent an encoding for the available options to run the EDHOC protocol or the selection logic to apply on those.</t>
      <t>The CBOR-based representation of an EDHOC application profile can be, for example: retrieved as a result of a discovery process; or retrieved/provided during the retrieval/provisioning of an EDHOC peer's public authentication credential; or obtained during the execution of a device on-boarding/registration workflow.</t>
      <t>Finally, this document defines a set of well-known EDHOC application profiles (see <xref target="sec-well-known-app-profiles"/>). These application profiles are meant to reflect what is most common and expected to be supported by EDHOC peers, while they are not to be intended as "default" application profiles or as a deviation from what is mandatory to support for EDHOC peers (see <xref section="8" sectionFormat="of" target="RFC9528"/>).</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <t>The reader is expected to be familiar with terms and concepts defined in EDHOC <xref target="RFC9528"/>, and with the use of EDHOC with CoAP <xref target="RFC7252"/> and OSCORE <xref target="RFC8613"/> defined in <xref target="I-D.ietf-core-oscore-edhoc"/>.</t>
        <t>Concise Binary Object Representation (CBOR) <xref target="RFC8949"/> and Concise Data Definition Language (CDDL) <xref target="RFC8610"/> are used in this document. CDDL predefined type names, especially bstr for CBOR byte strings and tstr for CBOR text strings, are used extensively in this document.</t>
        <t>CBOR data items are represented using the CBOR extended diagnostic notation as defined in <xref section="8" sectionFormat="of" target="RFC8949"/> and <xref section="G" sectionFormat="of" target="RFC8610"/> ("diagnostic notation"). Diagnostic notation comments are used to provide a textual representation of the parameters' keys and values.</t>
        <t>In the CBOR diagnostic notation used in this document, constructs of the form e'SOME_NAME' are replaced by the value assigned to SOME_NAME in the CDDL model shown in <xref target="fig-cddl-model"/> of <xref target="sec-cddl-model"/>. For example, {e'methods' : [0, 1, 2, 3], e'cipher_suites': 3} stands for {1 : [0, 1, 2, 3], 2 : 3}.</t>
        <t>Note to RFC Editor: Please delete the paragraph immediately preceding this note. Also, in the CBOR diagnostic notation used in this document, please replace the constructs of the form e'SOME_NAME' with the value assigned to SOME_NAME in the CDDL model shown in <xref target="fig-cddl-model"/> of <xref target="sec-cddl-model"/>. Finally, please delete this note.</t>
      </section>
    </section>
    <section anchor="identifying-edhoc-application-profiles-by-profile-id">
      <name>Identifying EDHOC Application Profiles by Profile ID</name>
      <t>This section defines two means to identify EDHOC application profiles by their Profile IDs, i.e., the parameter "ed-prof" for web linking (see <xref target="web-linking"/>) and the parameter "app_prof" of the EDHOC_Information object (see <xref target="sec-edhoc-information-object"/>).</t>
      <section anchor="web-linking">
        <name>Web Linking</name>
        <t><xref section="6" sectionFormat="of" target="I-D.ietf-core-oscore-edhoc"/> defines a number of target attributes that can be used in a web link <xref target="RFC8288"/> with resource type "core.edhoc" (see <xref section="10.10" sectionFormat="of" target="RFC9528"/>). This is the case, e.g., when using a link-format document <xref target="RFC6690"/> describing EDHOC resources at a server, when EDHOC is transferred over CoAP <xref target="RFC7252"/> as defined in <xref section="A.2" sectionFormat="of" target="RFC9528"/>. This allows a client to obtain relevant information about the EDHOC application profile(s) to be used with a certain EDHOC resource.</t>
        <t>In the same spirit, this section defines the following additional parameter, which can be optionally specified as a target attribute with the same name in the link to the respective EDHOC resource, or among the filter criteria in a discovery request from a client.</t>
        <ul spacing="normal">
          <li>
            <t>'ed-prof', specifying an EDHOC application profile supported by the server. This parameter <bcp14>MUST</bcp14> specify a single value, which is taken from the 'Profile ID' column of the "EDHOC Application Profiles" registry defined in <xref target="iana-edhoc-application-profiles"/> of this document. This parameter <bcp14>MAY</bcp14> occur multiple times, with each occurrence specifying an EDHOC application profile.</t>
          </li>
        </ul>
        <t>When specifying the parameter 'ed-prof' in a link to an EDHOC resource, the target attribute rt="core.edhoc" <bcp14>MUST</bcp14> be included.</t>
        <t>If a link to an EDHOC resource includes occurrences of the target attribute 'ed-prof', then the following applies.</t>
        <ul spacing="normal">
          <li>
            <t>The link <bcp14>MUST NOT</bcp14> include other target attributes that provide information about an EDHOC application profile (see, e.g., <xref section="6" sectionFormat="of" target="I-D.ietf-core-oscore-edhoc"/> and <xref target="sec-parameters-web-linking"/> of this document), with the exception of the target attribute 'ed-ead' that <bcp14>MAY</bcp14> be included.  </t>
            <t>
The recipient <bcp14>MUST</bcp14> ignore other target attributes that provide information about an EDHOC application profile, with the exception of the target attribute 'ed-ead'.</t>
          </li>
          <li>
            <t>If the link includes occurrences of the target attribute 'ed-ead', the link provides the following information: when using the target EDHOC resource as per the EDHOC application profile indicated by any occurrence of the target attribute 'ed-prof', the server supports the EAD items that are specified in the definition of that EDHOC application profile, as well as the EAD items indicated by the occurrences of the target attribute 'ed-ead'.</t>
          </li>
        </ul>
        <t>The example in <xref target="fig-web-link-example"/> shows how a CoAP client discovers two EDHOC resources at a CoAP server, and obtains information about the application profile corresponding to each of those resources. The Link Format notation from <xref section="5" sectionFormat="of" target="RFC6690"/> is used.</t>
        <t>The example assumes the existence of an EDHOC application profile identified by the integer Profile ID 500, which is supported by the EDHOC resource at /edhoc-alt and whose definition includes the support for the EAD items with EAD label 111 and 222.</t>
        <t>Therefore, the link to the EDHOC resource at /edhoc-alt indicates that, when using that EDHOC resource as per the EDHOC application profile with Profile ID 500, the server supports the EAD items with EAD label 111, 222, and 333.</t>
        <figure anchor="fig-web-link-example">
          <name>The Web Link.</name>
          <artwork align="center"><![CDATA[
REQ: GET /.well-known/core

RES: 2.05 Content
    </sensors/temp>;osc,
    </sensors/light>;if=sensor,
    </.well-known/edhoc>;rt=core.edhoc;ed-csuite=0;ed-csuite=2;
        ed-method=0;ed-cred-t=1;ed-cred-t=3;ed-idcred-t=4;
        ed-i;ed-r;ed-comb-req,
    </edhoc-alt>;rt=core.edhoc;ed-prof=500;ed-ead=333
]]></artwork>
        </figure>
      </section>
      <section anchor="sec-edhoc-information-object">
        <name>EDHOC_Information Object</name>
        <t><xref section="3.4" sectionFormat="of" target="I-D.ietf-ace-edhoc-oscore-profile"/> defines the EDHOC_Information object, as including information that guides two peers towards executing the EDHOC protocol, and defines an initial set of its parameters.</t>
        <t>This document defines the new parameter "app_prof" of the EDHOC_Information object, as summarized in <xref target="_table-cbor-key-edhoc-params"/> and described further below.</t>
        <table align="center" anchor="_table-cbor-key-edhoc-params">
          <name>EDHOC_Information Parameter "app_prof"</name>
          <thead>
            <tr>
              <th align="left">Name</th>
              <th align="left">CBOR label</th>
              <th align="left">CBOR type</th>
              <th align="left">Registry</th>
              <th align="left">Description</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">app_prof</td>
              <td align="left">18</td>
              <td align="left">int or array</td>
              <td align="left">EDHOC Application Profiles Registry</td>
              <td align="left">Set of supported EDHOC Application Profiles</td>
            </tr>
          </tbody>
        </table>
        <ul spacing="normal">
          <li>
            <t>app_prof: This parameter specifies a set of supported EDHOC application profiles, identified by their Profile ID. If the set is composed of a single EDHOC application profile, its Profile ID is encoded as an integer. Otherwise, the set is encoded as an array of integers, where each array element encodes one Profile ID. In JSON, the "app_prof" value is an integer or an array of integers. In CBOR, "app_prof" is an integer or an array of integers, and has label 18. The integer values are taken from the 'Profile ID' column of the "EDHOC Application Profiles" registry defined in <xref target="iana-edhoc-application-profiles"/> of this document.</t>
          </li>
        </ul>
        <section anchor="use-in-the-edhoc-and-oscore-profile-of-the-ace-framework">
          <name>Use in the EDHOC and OSCORE Profile of the ACE Framework</name>
          <t><xref section="3" sectionFormat="of" target="I-D.ietf-ace-edhoc-oscore-profile"/> defines how the EDHOC_Information object can be used within the workflow of the EDHOC and OSCORE transport profile of the ACE framework for authentication and authorization in constrained environments (ACE) <xref target="RFC9200"/>.</t>
          <t>In particular, the AS-to-C Access Token Response includes the parameter "edhoc_info", with value an EDHOC_Information object. This allows the ACE authorization server (AS) to provide the ACE client (C) with information about how to run the EDHOC protocol with the ACE resource server (RS) for which the access token is issued.</t>
          <t>Similarly, the access token includes the corresponding claim "edhoc_info", with value an EDHOC_Information object. This allows the AS to provide the ACE RS with information about how to run the EDHOC protocol with the ACE client, according to the issued access token.</t>
          <t>In turn, the EDHOC_Information object can include the parameter "app_prof" defined in this document. This parameter indicates a set of EDHOC application profiles associated with the EDHOC resource to use at the RS, which is either implied or specified by the parameter "uri_path" within the same EDHOC_Information object.</t>
          <t>If the EDHOC_Information object specified as value of "edhoc_info" includes the "app_prof" parameter, then the following applies.</t>
          <ul spacing="normal">
            <li>
              <t>The object <bcp14>MUST NOT</bcp14> include other parameters that provide information pertaining to an EDHOC application profile, with the exception of the parameter "eads" that <bcp14>MAY</bcp14> be included.  </t>
              <t>
C and RS <bcp14>MUST</bcp14> ignore other parameters present in the EDHOC_Information object, with the exception of the parameter "eads".  </t>
              <t>
At the time of writing this document, such parameters are: "methods", "cipher_suites", "message_4", "comb_req", "osc_ms_len", "osc_salt_len", "osc_version", "cred_types", "id_cred_types", "initiator", and "responder" (which are all defined in <xref section="3.4" sectionFormat="of" target="I-D.ietf-ace-edhoc-oscore-profile"/>), as well as those defined in <xref target="sec-parameters-edhoc-info-object"/> of this document.</t>
            </li>
            <li>
              <t>If the EDHOC_Information object specified in the parameter "edhoc_info" of the AS-to-C Access Token Response includes the parameter "eads", the object provides the following information.  </t>
              <t>
When using the target EDHOC resource as per any EDHOC application profile indicated by the parameter "app_prof", the ACE RS for which the access token is issued supports the EAD items that are specified in the definition of that EDHOC application profile, as well as the EAD items indicated by the parameter "eads".</t>
            </li>
            <li>
              <t>If the EDHOC_Information object specified in the claim "edhoc_info" of the access token includes the parameter "eads", the object provides the following information.  </t>
              <t>
When using the target EDHOC resource as per any EDHOC application profile indicated by the parameter "app_prof", the ACE client to which the access token is issued supports the EAD items that are specified in the definition of that EDHOC application profile, as well as the EAD items indicated by the parameter "eads".</t>
            </li>
          </ul>
        </section>
      </section>
    </section>
    <section anchor="sec-parameters-web-linking">
      <name>Additional Parameters for Web Linking</name>
      <t>Building on what is defined and prescribed in <xref section="6" sectionFormat="of" target="I-D.ietf-core-oscore-edhoc"/>, this section defines additional parameters for web linking <xref target="RFC8288"/>, which can be used to obtain relevant pieces of information from the EDHOC application profile associated with an EDHOC resource.</t>
      <t>These parameters can be optionally specified as target attributes with the same name in a link with resource type "core.edhoc" (see <xref section="10.10" sectionFormat="of" target="RFC9528"/>) targeting an EDHOC resource, or as filter criteria in a discovery request from a client.</t>
      <t>When specifying any of the parameters defined below in a link to an EDHOC resource, the target attribute rt="core.edhoc" <bcp14>MUST</bcp14> be included.</t>
      <ul spacing="normal">
        <li>
          <t>'ed-max-msgsize', specifying the admitted maximum size of EDHOC messages in bytes. This parameter <bcp14>MUST</bcp14> specify a single unsigned integer value.</t>
        </li>
        <li>
          <t>'ed-coap-cf', specifying that CoAP messages have to include the CoAP Content-Format Option with value 64 (application/edhoc+cbor-seq) or 65 (application/cid-edhoc+cbor-seq) as appropriate, when the message payload includes exclusively an EDHOC message possibly prepended by an EDHOC connection identifier (see Sections <xref target="RFC9528" section="3.4.1" sectionFormat="bare"/> and <xref target="RFC9528" section="A.2" sectionFormat="bare"/> of <xref target="RFC9528"/>). A value <bcp14>MUST NOT</bcp14> be given to this parameter and any present value <bcp14>MUST</bcp14> be ignored by the recipient.</t>
        </li>
        <li>
          <t>'ed-idep-t', specifying a type of endpoint identity for EDHOC supported by the server. This parameter <bcp14>MUST</bcp14> specify a single value, which is taken from the 'CBOR Label' column of the "EDHOC Endpoint Identity Types" Registry defined in <xref target="sec-edhoc-endpoint-identity-types"/> of this document. This parameter <bcp14>MAY</bcp14> occur multiple times, with each occurrence specifying a type of endpoint identity for EDHOC.</t>
        </li>
        <li>
          <t>'ed-tp', specifying a means for transporting EDHOC messages supported by the server. This parameter <bcp14>MUST</bcp14> specify a single value, which is taken from the 'Transport ID' column of the "EDHOC Transports" Registry defined in <xref target="sec-edhoc-transports"/> of this document. This parameter <bcp14>MAY</bcp14> occur multiple times, with each occurrence specifying a means for transporting EDHOC messages.</t>
        </li>
      </ul>
    </section>
    <section anchor="sec-parameters-edhoc-info-object">
      <name>Additional Parameters of the EDHOC_Information Object</name>
      <t>This section defines additional parameters of the EDHOC_Information object defined in <xref section="3.4" sectionFormat="of" target="I-D.ietf-ace-edhoc-oscore-profile"/>. These parameters are summarized in <xref target="_table-cbor-key-edhoc-params-2"/> and described further below.</t>
      <t>Editor's note: these parameters can better be defined directly in <xref section="3.4" sectionFormat="of" target="I-D.ietf-ace-edhoc-oscore-profile"/>.</t>
      <table align="center" anchor="_table-cbor-key-edhoc-params-2">
        <name>EDHOC_Information Parameters</name>
        <thead>
          <tr>
            <th align="left">Name</th>
            <th align="left">CBOR label</th>
            <th align="left">CBOR type</th>
            <th align="left">Registry</th>
            <th align="left">Description</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">max_msgsize</td>
            <td align="left">14</td>
            <td align="left">uint</td>
            <td align="left"> </td>
            <td align="left">Maximum size of EDHOC messages in bytes</td>
          </tr>
          <tr>
            <td align="left">coap_cf</td>
            <td align="left">15</td>
            <td align="left">True of False</td>
            <td align="left"> </td>
            <td align="left">Requested use of the CoAP Content-Format Option in CoAP messages whose payload includes exclusively an EDHOC message, possibly prepended by an EDHOC connection identifier</td>
          </tr>
          <tr>
            <td align="left">id_ep_types</td>
            <td align="left">16</td>
            <td align="left">int or array</td>
            <td align="left">EDHOC Endpoint Identity Types Registry</td>
            <td align="left">Set of supported types of endpoint identities for EDHOC</td>
          </tr>
          <tr>
            <td align="left">transports</td>
            <td align="left">17</td>
            <td align="left">int or array</td>
            <td align="left">EDHOC Transports Registry</td>
            <td align="left">Set of supported means for transporting EDHOC messages</td>
          </tr>
        </tbody>
      </table>
      <ul spacing="normal">
        <li>
          <t>max_msgsize: This parameter specifies the admitted maximum size of EDHOC messages in bytes. In JSON, the "max_msgsize" value is an unsigned integer. In CBOR, "max_msgsize" is an unsigned integer and has label 14.</t>
        </li>
        <li>
          <t>coap_cf: This parameter specifies whether it is required that CoAP messages include the CoAP Content-Format Option with value 64 (application/edhoc+cbor-seq) or 65 (application/cid-edhoc+cbor-seq) as appropriate, when the message payload includes exclusively an EDHOC message possibly prepended by an EDHOC connection identifier (see Sections <xref target="RFC9528" section="3.4.1" sectionFormat="bare"/> and <xref target="RFC9528" section="A.2" sectionFormat="bare"/> of <xref target="RFC9528"/>). In JSON, the "coap_cf" value is a boolean. In CBOR, "coap_cf" is the simple value <tt>true</tt> (0xf5) or <tt>false</tt> (0xf4), and has label 15.</t>
        </li>
        <li>
          <t>id_ep_types: This parameter specifies a set of supported types of endpoint identities for EDHOC. If the set is composed of a single type of endpoint identity, this is encoded as an integer. Otherwise, the set is encoded as an array, where each array element encodes one type of endpoint identity as an integer. In JSON, the "id_ep_types" value is an integer or an array of integers. In CBOR, "id_ep_types" is an integer or an array of integers, and has label 16. The integer values are taken from the 'CBOR Label' column of the "EDHOC Endpoint Identity Types" registry defined in <xref target="iana-edhoc-endpoint-identity-types"/> of this document.</t>
        </li>
        <li>
          <t>transports: This parameter specifies a set of supported means for transporting EDHOC messages. If the set is composed of a single means for transporting EDHOC messages, this is encoded as an integer. Otherwise, the set is encoded as an array, where each array element encodes one means for transporting EDHOC messages as an integer. In JSON, the "transports" value is an integer or an array of integers. In CBOR, "transports" is an integer or an array of integers, and has label 17. The integer values are taken from the 'Transport ID' column of the "EDHOC Transports" Registry defined in <xref target="sec-edhoc-transports"/> of this document.</t>
        </li>
      </ul>
    </section>
    <section anchor="sec-app-profile-cbor">
      <name>Representation of an EDHOC Application Profile</name>
      <t>This section defines the EDHOC_Application_Profile object, which can be used as a canonical representation of EDHOC application profiles for their description, distribution, and storage.</t>
      <t>An EDHOC_Application_Profile object is encoded as a CBOR map <xref target="RFC8949"/>. Each element of the CBOR map is an element of the CBOR-encoded EDHOC_Information object defined in <xref section="3.4" sectionFormat="of" target="I-D.ietf-ace-edhoc-oscore-profile"/>, and thus uses the corresponding CBOR abbreviations from the 'CBOR label' column of the "EDHOC Information" registry defined in <xref target="I-D.ietf-ace-edhoc-oscore-profile"/>.</t>
      <t>The CBOR map encoding an EDHOC_Application_Profile object <bcp14>MUST</bcp14> include the element "app_prof" defined in this document. The value of the element "app_prof" is the unique identifier of the EDHOC application profile described by the EDHOC_Application_Profile object, taken from the 'Profile ID' column of the "EDHOC Application Profiles" registry defined in this document, and encoded as a CBOR integer.</t>
      <t>The CBOR map <bcp14>MUST</bcp14> include the following elements defined for the EDHOC_Information object: "methods" and "cred_types".</t>
      <t>The CBOR map <bcp14>MUST NOT</bcp14> include the following elements defined for the EDHOC_Information object: "session_id", "uri_path", "initiator", and "responder".</t>
      <t>The CBOR map <bcp14>MAY</bcp14> include other elements defined for the EDHOC_Information object. These also comprise the new parameters defined in <xref target="sec-parameters-edhoc-info-object"/> of this document.</t>
      <t>Furthermore, consistent with Sections <xref target="RFC9528" section="8" sectionFormat="bare"/> and <xref target="RFC9528" section="A.1" sectionFormat="bare"/> of <xref target="RFC9528"/> and with <xref section="5.4" sectionFormat="of" target="RFC8613"/>, the following applies:</t>
      <ul spacing="normal">
        <li>
          <t>If the element "cipher_suites" is not present in the CBOR map, this indicates that the EDHOC application profile uses the EDHOC cipher suites 2 and 3.</t>
        </li>
        <li>
          <t>If the element "id_cred_types" is not present in the CBOR map, this indicates that the EDHOC application profile uses "kid" as type of authentication credential identifiers for EDHOC.</t>
        </li>
        <li>
          <t>If the element "osc_ms_len" is not present in the CBOR map, this indicates that, when using EDHOC to key OSCORE <xref target="RFC8613"/>, the size of the OSCORE Master Secret in bytes is equal to the size of the key length for the application AEAD Algorithm of the selected cipher suite for the EDHOC session.</t>
        </li>
        <li>
          <t>If the element "osc_salt_len" is not present in the CBOR map, this indicates that, when using EDHOC to key OSCORE, the size of the OSCORE Master Salt in bytes is 8.</t>
        </li>
        <li>
          <t>If the element "osc_version" is not present in the CBOR map, this indicates that, when using EDHOC to key OSCORE, the OSCORE Version Number has value 1.</t>
        </li>
        <li>
          <t>The absence of any other elements in the CBOR map <bcp14>MUST NOT</bcp14> result in assuming any value.</t>
        </li>
      </ul>
      <t>If an element is present in the CBOR map and the information that it specifies is intrinsically a set of one or more co-existing alternatives, then all the specified alternatives apply for the EDHOC application profile in question.</t>
      <t>For example, the element "cipher_suites" with value the CBOR array [0, 2] means that, in order to adhere to the EDHOC application profile in question, an EDHOC peer has to implement both the EDHOC cipher suites 0 and 2, because either of them can be used by another EDHOC peer also adhering to the same EDHOC application profile.</t>
      <t>The CDDL grammar describing the EDHOC_Application_Profile object is:</t>
      <artwork><![CDATA[
EDHOC_Application_Profile = {
      1 => int / array,    ; methods
      9 => int / array,    ; cred_types
     18 => int,            ; app_prof
   * int / tstr => any
}
]]></artwork>
    </section>
    <section anchor="sec-well-known-app-profiles">
      <name>Well-known EDHOC Application Profiles</name>
      <t>This section defines a set of well-known EDHOC application profiles that are meant to reflect what is most common and expected to be supported by EDHOC peers.</t>
      <t>The well-known application profiles are <em>not</em> to be intended as "default" profiles to use, in case no other indication is provided to EDHOC peers.</t>
      <t>In particular, an EDHOC peer <bcp14>MUST NOT</bcp14> assume that, unless otherwise indicated, any of such profiles is used when running EDHOC through a well-known EDHOC resource, such as the resource at /.well-known/edhoc when EDHOC messages are transported as payload of CoAP messages (see <xref section="A.2" sectionFormat="of" target="RFC9528"/>).</t>
      <t>Building on the above, the well-known application profiles are <em>not</em> intended to deviate from what is mandatory to support for EDHOC peers, which is defined by the compliance requirements in <xref section="8" sectionFormat="of" target="RFC9528"/>.</t>
      <t>The rest of this section defines the well-known application profiles, each of which is represented by means of an EDHOC_Application_Profile object (see <xref target="sec-app-profile-cbor"/>) using the CBOR extended diagnostic notation.</t>
      <t>An entry for each well-known application profile is also registered at the "EDHOC Application Profiles" registry defined in <xref target="iana-edhoc-application-profiles"/> of this document.</t>
      <section anchor="well-known-application-profile-wk-minimalcs2">
        <name>Well-Known Application Profile WK-MINIMAL_CS_2</name>
        <artwork><![CDATA[
{
        e'methods' : 3, / EDHOC Method Type 3 /
  e'cipher_suites' : 2, / EDHOC Cipher Suite 2 /
     e'cred_types' : 1, / CWT Claims Set (CCS) /
  e'id_cred_types' : 4, / kid /
       e'app_prof' : e'APP-PROF-WK-MINIMAL-CS-2'
}
]]></artwork>
        <t>This application profile is aligned with the example trace of EDHOC compiled in <xref section="3" sectionFormat="of" target="RFC9529"/>.</t>
      </section>
      <section anchor="well-known-application-profile-wk-minimalcs0">
        <name>Well-Known Application Profile WK-MINIMAL_CS_0</name>
        <artwork><![CDATA[
{
        e'methods' : 3, / EDHOC Method Type 3 /
  e'cipher_suites' : 0, / EDHOC Cipher Suite 0 /
     e'cred_types' : 1, / CWT Claims Set (CCS) /
  e'id_cred_types' : 4, / kid /
       e'app_prof' : e'APP-PROF-WK-MINIMAL-CS-0'
}
]]></artwork>
      </section>
      <section anchor="well-known-application-profile-wk-basiccs2x509">
        <name>Well-Known Application Profile WK-BASIC_CS_2_X509</name>
        <artwork><![CDATA[
{
        e'methods' : [0, 3], / EDHOC Method Types 0 and 3 /
  e'cipher_suites' : 2, / EDHOC Cipher Suite 2 /
     e'cred_types' : [1, 2], / CWT Claims Set (CCS)
                               and X.509 certificate /
  e'id_cred_types' : [4, 34], / kid and x5t /
       e'app_prof' : e'APP-PROF-WK-BASIC-CS-2-X509'
}
]]></artwork>
        <t>This application profile is aligned with the example trace of EDHOC compiled in <xref section="3" sectionFormat="of" target="RFC9529"/>.</t>
      </section>
      <section anchor="well-known-application-profile-wk-basiccs0x509">
        <name>Well-Known Application Profile WK-BASIC_CS_0_X509</name>
        <artwork><![CDATA[
{
        e'methods' : [0, 3], / EDHOC Method Types 0 and 3 /
  e'cipher_suites' : 0, / EDHOC Cipher Suite 0 /
     e'cred_types' : [1, 2], / CWT Claims Set (CCS)
                               and X.509 certificate /
  e'id_cred_types' : [4, 34], / kid and x5t /
       e'app_prof' : e'APP-PROF-WK-BASIC-CS-0-X509'
}
]]></artwork>
        <t>This application profile is aligned with the example trace of EDHOC compiled in <xref section="2" sectionFormat="of" target="RFC9529"/>.</t>
      </section>
      <section anchor="well-known-application-profile-wk-basiccs2c509">
        <name>Well-Known Application Profile WK-BASIC_CS_2_C509</name>
        <artwork><![CDATA[
{
        e'methods' : [0, 3], / EDHOC Method Types 0 and 3 /
  e'cipher_suites' : 2, / EDHOC Cipher Suite 2 /
     e'cred_types' : [1, e'c509_cert'], / CWT Claims Set (CCS)
                                          and C509 certificate /
  e'id_cred_types' : [4, e'c5t'], / kid and c5t /
       e'app_prof' : e'APP-PROF-WK-BASIC-CS-2-C509'
}
]]></artwork>
      </section>
      <section anchor="well-known-application-profile-wk-basiccs0c509">
        <name>Well-Known Application Profile WK-BASIC_CS_0_C509</name>
        <artwork><![CDATA[
{
        e'methods' : [0, 3], / EDHOC Method Types 0 and 3 /
  e'cipher_suites' : 0, / EDHOC Cipher Suite 0 /
     e'cred_types' : [1, e'c509_cert'], / CWT Claims Set (CCS)
                                          and C509 certificate /
  e'id_cred_types' : [4, e'c5t'], / kid and c5t /
       e'app_prof' : e'APP-PROF-WK-BASIC-CS-0-C509'
}
]]></artwork>
      </section>
      <section anchor="well-known-application-profile-wk-intermediatecs2">
        <name>Well-Known Application Profile WK-INTERMEDIATE_CS_2</name>
        <artwork><![CDATA[
{
        e'methods' : [0, 3], / EDHOC Method Types 0 and 3 /
  e'cipher_suites' : 2, / EDHOC Cipher Suite 2 /
     e'cred_types' : [1, 2, e'c509_cert'], / CWT Claims Set (CCS),
                                             X.509 certificate,
                                             and C509 certificate /
  e'id_cred_types' : [4, 14, 34, 33, e'c5t', e'c5c'], / kid, kccs,
                                                        x5t, x5chain,
                                                        c5t, and c5c /
       e'app_prof' : e'APP-PROF-WK-INTERMEDIATE-CS-2'
}
]]></artwork>
        <t>This application profile is aligned with the example trace of EDHOC compiled in <xref section="3" sectionFormat="of" target="RFC9529"/>.</t>
      </section>
      <section anchor="well-known-application-profile-wk-intermediatecs0">
        <name>Well-Known Application Profile WK-INTERMEDIATE_CS_0</name>
        <artwork><![CDATA[
{
        e'methods' : [0, 3], / EDHOC Method Types 0 and 3 /
  e'cipher_suites' : 0, / EDHOC Cipher Suite 0 /
     e'cred_types' : [1, 2, e'c509_cert'], / CWT Claims Set (CCS),
                                             X.509 certificate,
                                             and C509 certificate /
  e'id_cred_types' : [4, 14, 34, 33, e'c5t', e'c5c'], / kid, kccs,
                                                        x5t, x5chain,
                                                        c5t, and c5c /
       e'app_prof' : e'APP-PROF-WK-INTERMEDIATE-CS-0'
}
]]></artwork>
        <t>This application profile is aligned with the example trace of EDHOC compiled in <xref section="2" sectionFormat="of" target="RFC9529"/>.</t>
      </section>
      <section anchor="well-known-application-profile-wk-advanced">
        <name>Well-Known Application Profile WK-ADVANCED</name>
        <artwork><![CDATA[
{
        e'methods' : [0, 1, 2, 3], / EDHOC Method Types
                                     0, 1, 2, and 3 /
  e'cipher_suites' : [0, 1, 2, 3], / EDHOC Cipher Suites
                                     0, 1, 2, and 3 /
     e'cred_types' : [1, 0, 2, e'c509_cert'], / CWT Claims Set (CCS),
                                                CWT, X.509 certificate,
                                                and C509 certificate /
  e'id_cred_types' : [4, 14, 13, 34, 33, e'c5t', e'c5c'], / kid, kccs,
                                                            kcwt, x5t,
                                                            x5chain,
                                                            c5t, and
                                                            c5c /
       e'app_prof' : e'APP-PROF-WK-ADVANCED'
}
]]></artwork>
        <t>This application profile is aligned with the example traces of EDHOC compiled in Sections <xref target="RFC9529" section="2" sectionFormat="bare"/> and <xref target="RFC9529" section="3" sectionFormat="bare"/> of <xref target="RFC9529"/>.</t>
      </section>
    </section>
    <section anchor="sec-edhoc-well-known-app-profiles">
      <name>EDHOC Well-known Application Profiles</name>
      <t>This document defines the following identifiers of well-known EDHOC application profiles.</t>
      <table align="center" anchor="_table-edhoc-well-known-app-profiles">
        <name>EDHOC Well-known Application Profiles</name>
        <thead>
          <tr>
            <th align="left">Profile ID</th>
            <th align="left">Name</th>
            <th align="left">Description</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">0</td>
            <td align="left">WK-MINIMAL-CS-2</td>
            <td align="left">Method 3; Cipher Suite 2; CCS; kid</td>
            <td align="left">[RFC-XXXX]</td>
          </tr>
          <tr>
            <td align="left">1</td>
            <td align="left">WK-MINIMAL-CS-0</td>
            <td align="left">Method 3; Cipher Suite 0; CCS; kid</td>
            <td align="left">[RFC-XXXX]</td>
          </tr>
          <tr>
            <td align="left">2</td>
            <td align="left">WK-BASIC-CS-2-X509</td>
            <td align="left">Methods (0, 3); Cipher Suite 2; (CCS, X.509 certificates); (kid, x5t)</td>
            <td align="left">[RFC-XXXX]</td>
          </tr>
          <tr>
            <td align="left">3</td>
            <td align="left">WK-BASIC-CS-0-X509</td>
            <td align="left">Methods (0, 3); Cipher Suite 0; (CCS, X.509 certificates); (kid, x5t)</td>
            <td align="left">[RFC-XXXX]</td>
          </tr>
          <tr>
            <td align="left">4</td>
            <td align="left">WK-BASIC-CS-2-C509</td>
            <td align="left">Methods (0, 3); Cipher Suite 2; (CCS, C509 certificates); (kid, c5t)</td>
            <td align="left">[RFC-XXXX]</td>
          </tr>
          <tr>
            <td align="left">5</td>
            <td align="left">WK-BASIC-CS_0-C509</td>
            <td align="left">Methods (0, 3); Cipher Suite 0; (CCS, C509 certificates); (kid, c5t)</td>
            <td align="left">[RFC-XXXX]</td>
          </tr>
          <tr>
            <td align="left">6</td>
            <td align="left">WK-INTERMEDIATE-CS-2</td>
            <td align="left">Methods (0, 3); Cipher Suite 2; (CCS, X.509/C509 certificates); (kid, kccs, x5t, x5chain, c5t, c5c)</td>
            <td align="left">[RFC-XXXX]</td>
          </tr>
          <tr>
            <td align="left">7</td>
            <td align="left">WK-INTERMEDIATE-CS-0</td>
            <td align="left">Methods (0, 3); Cipher Suite 0; (CCS, X.509/C509 certificates); (kid, kccs, x5t, x5chain, c5t, c5c)</td>
            <td align="left">[RFC-XXXX]</td>
          </tr>
          <tr>
            <td align="left">8</td>
            <td align="left">WK-ADVANCED</td>
            <td align="left">Methods (0, 1, 2, 3); Cipher Suites (0, 1, 2, 3); (CCS, CWT, X.509/C509 certificates); (kid, kccs, kcwt, x5t, x5chain, c5t, c5c)</td>
            <td align="left">[RFC-XXXX]</td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="sec-edhoc-endpoint-identity-types">
      <name>EDHOC Endpoint Identity Types</name>
      <t>This document defines the following identifier of type of endpoint identity for EDHOC.</t>
      <table align="center" anchor="_table-edhoc-endpoint-identity-types">
        <name>EDHOC Endpoint Identity Types</name>
        <thead>
          <tr>
            <th align="left">Name</th>
            <th align="left">CBOR label</th>
            <th align="left">Description</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">EUI-64</td>
            <td align="left">0</td>
            <td align="left">An EUI-64 identity</td>
            <td align="left">[RFC-XXXX]<xref target="RFC4291"/></td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="sec-edhoc-transports">
      <name>EDHOC Transports</name>
      <t>This document defines the following identifiers of means for transporting EDHOC messages.</t>
      <table align="center" anchor="_table-edhoc-transports">
        <name>EDHOC Transports</name>
        <thead>
          <tr>
            <th align="left">Transport ID</th>
            <th align="left">Name</th>
            <th align="left">Description</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">0</td>
            <td align="left">CoAP over UDP</td>
            <td align="left">EDHOC messages are transported as payload of CoAP messages, in turn transported over UDP</td>
            <td align="left">
              <xref target="RFC7252"/>, <xref section="A.2" sectionFormat="of" target="RFC9528"/></td>
          </tr>
          <tr>
            <td align="left">1</td>
            <td align="left">CoAP over TCP</td>
            <td align="left">EDHOC messages are transported as payload of CoAP messages, in turn transported over TCP</td>
            <td align="left">
              <xref target="RFC7252"/><xref target="RFC8323"/></td>
          </tr>
          <tr>
            <td align="left">2</td>
            <td align="left">CoAP over WebSockets</td>
            <td align="left">EDHOC messages are transported as payload of CoAP messages, in turn transported over WebSockets</td>
            <td align="left">
              <xref target="RFC7252"/><xref target="RFC8323"/></td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="sec-security-considerations">
      <name>Security Considerations</name>
      <t>TBD</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has the following actions for IANA.</t>
      <t>Note to RFC Editor: Please replace all occurrences of "[RFC-XXXX]" with the RFC number of this specification and delete this paragraph.</t>
      <section anchor="iana-media-type">
        <name>Media Type Registrations</name>
        <t>IANA is asked to register the media type "application/edhoc-app-profile+cbor-seq". This registration follows the procedures specified in <xref target="RFC6838"/>.</t>
        <t>Type name: application</t>
        <t>Subtype name: edhoc-app-profile+cbor-seq</t>
        <t>Required parameters: N/A</t>
        <t>Optional parameters: N/A</t>
        <t>Encoding considerations: Must be encoded as a CBOR sequence <xref target="RFC8742"/> of CBOR maps <xref target="RFC8949"/>. Each element of each CBOR map is also defined as an element of the CBOR-encoded EDHOC_Information object from <xref section="3.4" sectionFormat="of" target="I-D.ietf-ace-edhoc-oscore-profile"/>.</t>
        <t>Security considerations: See <xref target="sec-security-considerations"/> of [RFC-XXXX].</t>
        <t>Interoperability considerations: N/A</t>
        <t>Published specification: [RFC-XXXX]</t>
        <t>Applications that use this media type: Applications that need to describe, distribute, and store a representation of an EDHOC application profile (see <xref section="3.9" sectionFormat="of" target="RFC9528"/>).</t>
        <t>Fragment identifier considerations: N/A</t>
        <t>Additional information: N/A</t>
        <t>Person &amp; email address to contact for further information: LAKE WG mailing list (lake@ietf.org) or IETF Applications and Real-Time Area (art@ietf.org)</t>
        <t>Intended usage: COMMON</t>
        <t>Restrictions on usage: None</t>
        <t>Author/Change controller: IETF</t>
        <t>Provisional registration: No</t>
      </section>
      <section anchor="iana-content-format">
        <name>CoAP Content-Formats Registry</name>
        <t>IANA is asked to add the following entry to the "CoAP Content-Formats" registry within the "Constrained RESTful Environments (CoRE) Parameters" registry group.</t>
        <t>Content Type: application/edhoc-app-profile+cbor-seq</t>
        <t>Content Coding: -</t>
        <t>ID: TBD</t>
        <t>Reference: [RFC-XXXX]</t>
      </section>
      <section anchor="iana-target-attributes">
        <name>Target Attributes Registry</name>
        <t>IANA is asked to register the following entries in the "Target Attributes" registry within the "Constrained RESTful Environments (CoRE) Parameters", as per <xref target="RFC9423"/>.</t>
        <ul spacing="normal">
          <li>
            <t>Attribute Name: ed-max-msgsize</t>
          </li>
          <li>
            <t>Brief Description: The admitted maximum size of EDHOC messages in bytes</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
          <li>
            <t>Reference: [RFC-XXXX]</t>
          </li>
        </ul>
        <t><br/></t>
        <ul spacing="normal">
          <li>
            <t>Attribute Name: ed-coap-cf</t>
          </li>
          <li>
            <t>Brief Description: Requested use of the CoAP Content-Format Option in CoAP messages whose payload includes exclusively an EDHOC message, possibly prepended by an EDHOC connection identifier</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
          <li>
            <t>Reference: [RFC-XXXX]</t>
          </li>
        </ul>
        <t><br/></t>
        <ul spacing="normal">
          <li>
            <t>Attribute Name: ed-idep-t</t>
          </li>
          <li>
            <t>Brief Description: A supported type of endpoint identity for EDHOC</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
          <li>
            <t>Reference: [RFC-XXXX]</t>
          </li>
        </ul>
        <t><br/></t>
        <ul spacing="normal">
          <li>
            <t>Attribute Name: ed-tp</t>
          </li>
          <li>
            <t>Brief Description: A supported means for transporting EDHOC messages</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
          <li>
            <t>Reference: [RFC-XXXX]</t>
          </li>
        </ul>
        <t><br/></t>
        <ul spacing="normal">
          <li>
            <t>Attribute Name: ed-prof</t>
          </li>
          <li>
            <t>Brief Description: A supported EDHOC application profile</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
          <li>
            <t>Reference: [RFC-XXXX]</t>
          </li>
        </ul>
      </section>
      <section anchor="iana-edhoc-information-registry">
        <name>EDHOC Information Registry</name>
        <t>IANA is asked to register the following entries in the "EDHOC Information" registry defined in <xref target="I-D.ietf-ace-edhoc-oscore-profile"/>.</t>
        <ul spacing="normal">
          <li>
            <t>Name: max_msgsize</t>
          </li>
          <li>
            <t>CBOR label: 14</t>
          </li>
          <li>
            <t>CBOR type: uint</t>
          </li>
          <li>
            <t>Registry:</t>
          </li>
          <li>
            <t>Description: The admitted maximum size of EDHOC messages in bytes</t>
          </li>
          <li>
            <t>Specification: [RFC-XXXX]<xref target="RFC9528"/></t>
          </li>
        </ul>
        <t><br/></t>
        <ul spacing="normal">
          <li>
            <t>Name: coap_cf</t>
          </li>
          <li>
            <t>CBOR label: 15</t>
          </li>
          <li>
            <t>CBOR type: True or False</t>
          </li>
          <li>
            <t>Registry:</t>
          </li>
          <li>
            <t>Description: Requested use of the CoAP Content-Format Option in CoAP messages whose payload includes exclusively an EDHOC message, possibly prepended by an EDHOC connection identifier</t>
          </li>
          <li>
            <t>Specification: [RFC-XXXX]<xref target="RFC9528"/></t>
          </li>
        </ul>
        <t><br/></t>
        <ul spacing="normal">
          <li>
            <t>Name: id_ep_types</t>
          </li>
          <li>
            <t>CBOR label: 16</t>
          </li>
          <li>
            <t>CBOR type: int or array</t>
          </li>
          <li>
            <t>Registry: EDHOC Endpoint Identity Types</t>
          </li>
          <li>
            <t>Description: Set of supported types of endpoint identities for EDHOC</t>
          </li>
          <li>
            <t>Specification: [RFC-XXXX]</t>
          </li>
        </ul>
        <t><br/></t>
        <ul spacing="normal">
          <li>
            <t>Name: transports</t>
          </li>
          <li>
            <t>CBOR label: 17</t>
          </li>
          <li>
            <t>CBOR type: int or array</t>
          </li>
          <li>
            <t>Registry: EDHOC Transports Registry</t>
          </li>
          <li>
            <t>Description: Set of supported means for transporting EDHOC messages</t>
          </li>
          <li>
            <t>Specification: [RFC-XXXX]</t>
          </li>
        </ul>
        <t><br/></t>
        <ul spacing="normal">
          <li>
            <t>Name: app_prof</t>
          </li>
          <li>
            <t>CBOR label: 18</t>
          </li>
          <li>
            <t>CBOR type: int or array</t>
          </li>
          <li>
            <t>Registry: EDHOC Application Profiles Registry</t>
          </li>
          <li>
            <t>Description: Set of supported EDHOC Application Profiles</t>
          </li>
          <li>
            <t>Specification: [RFC-XXXX]<xref target="RFC9528"/></t>
          </li>
        </ul>
      </section>
      <section anchor="iana-edhoc-application-profiles">
        <name>EDHOC Application Profiles Registry</name>
        <t>IANA is requested to create a new "EDHOC Application Profiles" registry within the "Ephemeral Diffie-Hellman Over COSE (EDHOC)" registry group defined in <xref target="RFC9528"/>.</t>
        <t>The registration policy is either "Private Use", "Standards Action with Expert Review", or "Specification Required" per <xref section="4.6" sectionFormat="of" target="RFC8126"/>. "Expert Review" guidelines are provided in <xref target="iana-expert-review"/>.</t>
        <t>All assignments according to "Standards Action with Expert Review" are made on a "Standards Action" basis per <xref section="4.9" sectionFormat="of" target="RFC8126"/>, with Expert Review additionally required per <xref section="4.5" sectionFormat="of" target="RFC8126"/>. The procedure for early IANA allocation of Standards Track code points defined in <xref target="RFC7120"/> also applies. When such a procedure is used, IANA will ask the designated expert(s) to approve the early allocation before registration. In addition, WG chairs are encouraged to consult the expert(s) early during the process outlined in <xref section="3.1" sectionFormat="of" target="RFC7120"/>.</t>
        <t>The columns of this registry are:</t>
        <ul spacing="normal">
          <li>
            <t>Profile ID: This field contains the value used to identify the EDHOC application profile. These values <bcp14>MUST</bcp14> be unique. The value can be a positive integer or a negative integer. Different ranges of values use different registration policies <xref target="RFC8126"/>. Integer values from -24 to 23 are designated as "Standards Action With Expert Review". Integer values from -65536 to -25 and from 24 to 65535 are designated as "Specification Required". Integer values smaller than -65536 and greater than 65535 are marked as "Private Use".</t>
          </li>
          <li>
            <t>Name: This field contains the name of the EDHOC application profile.</t>
          </li>
          <li>
            <t>Description: This field contains a short description of the EDHOC application profile.</t>
          </li>
          <li>
            <t>Reference: This field contains a pointer to the public specification for the EDHOC application profile.</t>
          </li>
        </ul>
        <t>This registry has been initially populated with the values in <xref target="_table-edhoc-well-known-app-profiles"/>.</t>
      </section>
      <section anchor="iana-edhoc-endpoint-identity-types">
        <name>EDHOC Endpoint Identity Types Registry</name>
        <t>IANA is requested to create a new "EDHOC Endpoint Identity Types" registry within the "Ephemeral Diffie-Hellman Over COSE (EDHOC)" registry group defined in <xref target="RFC9528"/>.</t>
        <t>The registration policy is either "Private Use", "Standards Action with Expert Review", or "Specification Required" per <xref section="4.6" sectionFormat="of" target="RFC8126"/>. "Expert Review" guidelines are provided in <xref target="iana-expert-review"/>.</t>
        <t>All assignments according to "Standards Action with Expert Review" are made on a "Standards Action" basis per <xref section="4.9" sectionFormat="of" target="RFC8126"/>, with Expert Review additionally required per <xref section="4.5" sectionFormat="of" target="RFC8126"/>. The procedure for early IANA allocation of Standards Track code points defined in <xref target="RFC7120"/> also applies. When such a procedure is used, IANA will ask the designated expert(s) to approve the early allocation before registration. In addition, WG chairs are encouraged to consult the expert(s) early during the process outlined in <xref section="3.1" sectionFormat="of" target="RFC7120"/>.</t>
        <t>The columns of this registry are:</t>
        <ul spacing="normal">
          <li>
            <t>Name: This field contains the name of the EDHOC endpoint identity type.</t>
          </li>
          <li>
            <t>CBOR Label: The value to be used to identify this EDHOC endpoint identity type. These values <bcp14>MUST</bcp14> be unique. The value can be a positive integer or a negative integer. Different ranges of values use different registration policies <xref target="RFC8126"/>. Integer values from -24 to 23 are designated as "Standards Action With Expert Review". Integer values from -65536 to -25 and from 24 to 65535 are designated as "Specification Required". Integer values smaller than -65536 and greater than 65535 are marked as "Private Use".</t>
          </li>
          <li>
            <t>Description: This field contains a short description of the EDHOC endpoint identity type.</t>
          </li>
          <li>
            <t>Reference: This field contains a pointer to the public specification for the EDHOC endpoint identity type.</t>
          </li>
        </ul>
        <t>This registry has been initially populated with the values in <xref target="_table-edhoc-endpoint-identity-types"/>.</t>
      </section>
      <section anchor="iana-edhoc-transports">
        <name>EDHOC Transport Registry</name>
        <t>IANA is requested to create a new "EDHOC Transport" registry within the "Ephemeral Diffie-Hellman Over COSE (EDHOC)" registry group defined in <xref target="RFC9528"/>.</t>
        <t>The registration policy is either "Private Use", "Standards Action with Expert Review", or "Specification Required" per <xref section="4.6" sectionFormat="of" target="RFC8126"/>. "Expert Review" guidelines are provided in <xref target="iana-expert-review"/>.</t>
        <t>All assignments according to "Standards Action with Expert Review" are made on a "Standards Action" basis per <xref section="4.9" sectionFormat="of" target="RFC8126"/>, with Expert Review additionally required per <xref section="4.5" sectionFormat="of" target="RFC8126"/>. The procedure for early IANA allocation of Standards Track code points defined in <xref target="RFC7120"/> also applies. When such a procedure is used, IANA will ask the designated expert(s) to approve the early allocation before registration. In addition, WG chairs are encouraged to consult the expert(s) early during the process outlined in <xref section="3.1" sectionFormat="of" target="RFC7120"/>.</t>
        <t>The columns of this registry are:</t>
        <ul spacing="normal">
          <li>
            <t>Transport ID: The value to be used to identify this means for transporting EDHOC messages. These values <bcp14>MUST</bcp14> be unique. The value can be a positive integer or a negative integer. Different ranges of values use different registration policies <xref target="RFC8126"/>. Integer values from -24 to 23 are designated as "Standards Action With Expert Review". Integer values from -65536 to -25 and from 24 to 65535 are designated as "Specification Required". Integer values smaller than -65536 and greater than 65535 are marked as "Private Use".</t>
          </li>
          <li>
            <t>Name: This field contains the name of the means for transporting EDHOC messages.</t>
          </li>
          <li>
            <t>Description: This field contains a short description of the means used for transporting EDHOC messages.</t>
          </li>
          <li>
            <t>Reference: This field contains a pointer to the public specification for the means used for transporting EDHOC messages.</t>
          </li>
        </ul>
        <t>This registry has been initially populated with the values in <xref target="_table-edhoc-transports"/>.</t>
      </section>
      <section anchor="iana-expert-review">
        <name>Expert Review Instructions</name>
        <t>"Standards Action with Expert Review" and "Specification Required" are two of the registration policies defined for the IANA registries established in this document. This section gives some general guidelines for what the experts should be looking for, but they are being designated as experts for a reason so they should be given substantial latitude.</t>
        <t>Expert reviewers should take into consideration the following points:</t>
        <ul spacing="normal">
          <li>
            <t>Clarity and correctness of registrations. Experts are expected to check the clarity of purpose and use of the requested entries. Experts need to make sure that the object of registration (i.e., an EDHOC application profile, an EDHOC endpoint identity type, or a means for transporting EDHOC messages) is clearly defined in the corresponding specification. Entries that do not meet these objective of clarity and completeness must not be registered.</t>
          </li>
          <li>
            <t>Point squatting should be discouraged. Reviewers are encouraged to get sufficient information for registration requests to ensure that the usage is not going to duplicate one that is already registered and that the point is likely to be used in deployments. The zones tagged as "Private Use" are intended for testing purposes and closed environments. Code points in other ranges should not be assigned for testing.</t>
          </li>
          <li>
            <t>Specifications are required for the "Standards Action With Expert Review" range of point assignment. Specifications should exist for "Specification Required" ranges, but early assignment before a specification is available is considered to be permissible. When specifications are not provided, the description provided needs to have sufficient information to identify what the point is being used for.</t>
          </li>
          <li>
            <t>Experts should take into account the expected usage of fields when approving point assignment. Documents published via Standards Action can also register points outside the Standards Action range. The length of the encoded value should be weighed against how many code points of that length are left, the size of device it will be used on, and the number of code points left that encode to that size.</t>
          </li>
        </ul>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC4291">
          <front>
            <title>IP Version 6 Addressing Architecture</title>
            <author fullname="R. Hinden" initials="R." surname="Hinden"/>
            <author fullname="S. Deering" initials="S." surname="Deering"/>
            <date month="February" year="2006"/>
            <abstract>
              <t>This specification defines the addressing architecture of the IP Version 6 (IPv6) protocol. The document includes the IPv6 addressing model, text representations of IPv6 addresses, definition of IPv6 unicast addresses, anycast addresses, and multicast addresses, and an IPv6 node's required addresses.</t>
              <t>This document obsoletes RFC 3513, "IP Version 6 Addressing Architecture". [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4291"/>
          <seriesInfo name="DOI" value="10.17487/RFC4291"/>
        </reference>
        <reference anchor="RFC6690">
          <front>
            <title>Constrained RESTful Environments (CoRE) Link Format</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <date month="August" year="2012"/>
            <abstract>
              <t>This specification defines Web Linking using a link format for use by constrained web servers to describe hosted resources, their attributes, and other relationships between links. Based on the HTTP Link Header field defined in RFC 5988, the Constrained RESTful Environments (CoRE) Link Format is carried as a payload and is assigned an Internet media type. "RESTful" refers to the Representational State Transfer (REST) architecture. A well-known URI is defined as a default entry point for requesting the links hosted by a server. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6690"/>
          <seriesInfo name="DOI" value="10.17487/RFC6690"/>
        </reference>
        <reference anchor="RFC6838">
          <front>
            <title>Media Type Specifications and Registration Procedures</title>
            <author fullname="N. Freed" initials="N." surname="Freed"/>
            <author fullname="J. Klensin" initials="J." surname="Klensin"/>
            <author fullname="T. Hansen" initials="T." surname="Hansen"/>
            <date month="January" year="2013"/>
            <abstract>
              <t>This document defines procedures for the specification and registration of media types for use in HTTP, MIME, and other Internet protocols. This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="13"/>
          <seriesInfo name="RFC" value="6838"/>
          <seriesInfo name="DOI" value="10.17487/RFC6838"/>
        </reference>
        <reference anchor="RFC7120">
          <front>
            <title>Early IANA Allocation of Standards Track Code Points</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <date month="January" year="2014"/>
            <abstract>
              <t>This memo describes the process for early allocation of code points by IANA from registries for which "Specification Required", "RFC Required", "IETF Review", or "Standards Action" policies apply. This process can be used to alleviate the problem where code point allocation is needed to facilitate desired or required implementation and deployment experience prior to publication of an RFC, which would normally trigger code point allocation. The procedures in this document are intended to apply only to IETF Stream documents.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="100"/>
          <seriesInfo name="RFC" value="7120"/>
          <seriesInfo name="DOI" value="10.17487/RFC7120"/>
        </reference>
        <reference anchor="RFC7252">
          <front>
            <title>The Constrained Application Protocol (CoAP)</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s. The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
              <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types. CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7252"/>
          <seriesInfo name="DOI" value="10.17487/RFC7252"/>
        </reference>
        <reference anchor="RFC8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
        <reference anchor="RFC8288">
          <front>
            <title>Web Linking</title>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
            <date month="October" year="2017"/>
            <abstract>
              <t>This specification defines a model for the relationships between resources on the Web ("links") and the type of those relationships ("link relation types").</t>
              <t>It also defines the serialisation of such links in HTTP headers with the Link header field.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8288"/>
          <seriesInfo name="DOI" value="10.17487/RFC8288"/>
        </reference>
        <reference anchor="RFC8323">
          <front>
            <title>CoAP (Constrained Application Protocol) over TCP, TLS, and WebSockets</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="S. Lemay" initials="S." surname="Lemay"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <author fullname="B. Silverajan" initials="B." surname="Silverajan"/>
            <author fullname="B. Raymor" initials="B." role="editor" surname="Raymor"/>
            <date month="February" year="2018"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP), although inspired by HTTP, was designed to use UDP instead of TCP. The message layer of CoAP over UDP includes support for reliable delivery, simple congestion control, and flow control.</t>
              <t>Some environments benefit from the availability of CoAP carried over reliable transports such as TCP or Transport Layer Security (TLS). This document outlines the changes required to use CoAP over TCP, TLS, and WebSockets transports. It also formally updates RFC 7641 for use with these transports and RFC 7959 to enable the use of larger messages over a reliable transport.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8323"/>
          <seriesInfo name="DOI" value="10.17487/RFC8323"/>
        </reference>
        <reference anchor="RFC8610">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="C. Vigano" initials="C." surname="Vigano"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8610"/>
          <seriesInfo name="DOI" value="10.17487/RFC8610"/>
        </reference>
        <reference anchor="RFC8613">
          <front>
            <title>Object Security for Constrained RESTful Environments (OSCORE)</title>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="J. Mattsson" initials="J." surname="Mattsson"/>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <author fullname="L. Seitz" initials="L." surname="Seitz"/>
            <date month="July" year="2019"/>
            <abstract>
              <t>This document defines Object Security for Constrained RESTful Environments (OSCORE), a method for application-layer protection of the Constrained Application Protocol (CoAP), using CBOR Object Signing and Encryption (COSE). OSCORE provides end-to-end protection between endpoints communicating using CoAP or CoAP-mappable HTTP. OSCORE is designed for constrained nodes and networks supporting a range of proxy operations, including translation between different transport protocols.</t>
              <t>Although an optional functionality of CoAP, OSCORE alters CoAP options processing and IANA registration. Therefore, this document updates RFC 7252.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8613"/>
          <seriesInfo name="DOI" value="10.17487/RFC8613"/>
        </reference>
        <reference anchor="RFC8742">
          <front>
            <title>Concise Binary Object Representation (CBOR) Sequences</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document describes the Concise Binary Object Representation (CBOR) Sequence format and associated media type "application/cbor-seq". A CBOR Sequence consists of any number of encoded CBOR data items, simply concatenated in sequence.</t>
              <t>Structured syntax suffixes for media types allow other media types to build on them and make it explicit that they are built on an existing media type as their foundation. This specification defines and registers "+cbor-seq" as a structured syntax suffix for CBOR Sequences.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8742"/>
          <seriesInfo name="DOI" value="10.17487/RFC8742"/>
        </reference>
        <reference anchor="RFC8949">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="94"/>
          <seriesInfo name="RFC" value="8949"/>
          <seriesInfo name="DOI" value="10.17487/RFC8949"/>
        </reference>
        <reference anchor="RFC9200">
          <front>
            <title>Authentication and Authorization for Constrained Environments Using the OAuth 2.0 Framework (ACE-OAuth)</title>
            <author fullname="L. Seitz" initials="L." surname="Seitz"/>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>This specification defines a framework for authentication and authorization in Internet of Things (IoT) environments called ACE-OAuth. The framework is based on a set of building blocks including OAuth 2.0 and the Constrained Application Protocol (CoAP), thus transforming a well-known and widely used authorization solution into a form suitable for IoT devices. Existing specifications are used where possible, but extensions are added and profiles are defined to better serve the IoT use cases.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9200"/>
          <seriesInfo name="DOI" value="10.17487/RFC9200"/>
        </reference>
        <reference anchor="RFC9423">
          <front>
            <title>Constrained RESTful Environments (CoRE) Target Attributes Registry</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="April" year="2024"/>
            <abstract>
              <t>The Constrained RESTful Environments (CoRE) specifications apply web technologies to constrained environments. One such important technology is Web Linking (RFC 8288), which CoRE specifications use as the basis for a number of discovery protocols, such as the Link Format (RFC 6690) in the Constrained Application Protocol's (CoAP's) resource discovery process (Section 7.2 of RFC 7252) and the Resource Directory (RD) (RFC 9176).</t>
              <t>Web Links can have target attributes, the names of which are not generally coordinated by the Web Linking specification (Section 2.2 of RFC 8288). This document introduces an IANA registry for coordinating names of target attributes when used in CoRE. It updates the "RD Parameters" IANA registry created by RFC 9176 to coordinate with this registry.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9423"/>
          <seriesInfo name="DOI" value="10.17487/RFC9423"/>
        </reference>
        <reference anchor="RFC9528">
          <front>
            <title>Ephemeral Diffie-Hellman Over COSE (EDHOC)</title>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <date month="March" year="2024"/>
            <abstract>
              <t>This document specifies Ephemeral Diffie-Hellman Over COSE (EDHOC), a very compact and lightweight authenticated Diffie-Hellman key exchange with ephemeral keys. EDHOC provides mutual authentication, forward secrecy, and identity protection. EDHOC is intended for usage in constrained scenarios, and a main use case is to establish an Object Security for Constrained RESTful Environments (OSCORE) security context. By reusing CBOR Object Signing and Encryption (COSE) for cryptography, Concise Binary Object Representation (CBOR) for encoding, and Constrained Application Protocol (CoAP) for transport, the additional code size can be kept very low.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9528"/>
          <seriesInfo name="DOI" value="10.17487/RFC9528"/>
        </reference>
        <reference anchor="I-D.ietf-core-oscore-edhoc">
          <front>
            <title>Using Ephemeral Diffie-Hellman Over COSE (EDHOC) with the Constrained Application Protocol (CoAP) and Object Security for Constrained RESTful Environments (OSCORE)</title>
            <author fullname="Francesca Palombini" initials="F." surname="Palombini">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Marco Tiloca" initials="M." surname="Tiloca">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Rikard Höglund" initials="R." surname="Höglund">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Stefan Hristozov" initials="S." surname="Hristozov">
              <organization>Fraunhofer AISEC</organization>
            </author>
            <author fullname="Göran Selander" initials="G." surname="Selander">
              <organization>Ericsson</organization>
            </author>
            <date day="9" month="April" year="2024"/>
            <abstract>
              <t>   The lightweight authenticated key exchange protocol Ephemeral Diffie-
   Hellman Over COSE (EDHOC) can be run over the Constrained Application
   Protocol (CoAP) and used by two peers to establish a Security Context
   for the security protocol Object Security for Constrained RESTful
   Environments (OSCORE).  This document details this use of the EDHOC
   protocol, by specifying a number of additional and optional
   mechanisms.  These especially include an optimization approach for
   combining the execution of EDHOC with the first OSCORE transaction.
   This combination reduces the number of round trips required to set up
   an OSCORE Security Context and to complete an OSCORE transaction
   using that Security Context.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-oscore-edhoc-11"/>
        </reference>
        <reference anchor="I-D.ietf-ace-edhoc-oscore-profile">
          <front>
            <title>Ephemeral Diffie-Hellman Over COSE (EDHOC) and Object Security for Constrained Environments (OSCORE) Profile for Authentication and Authorization for Constrained Environments (ACE)</title>
            <author fullname="Göran Selander" initials="G." surname="Selander">
              <organization>Ericsson</organization>
            </author>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Marco Tiloca" initials="M." surname="Tiloca">
              <organization>RISE</organization>
            </author>
            <author fullname="Rikard Höglund" initials="R." surname="Höglund">
              <organization>RISE</organization>
            </author>
            <date day="21" month="October" year="2024"/>
            <abstract>
              <t>   This document specifies a profile for the Authentication and
   Authorization for Constrained Environments (ACE) framework.  It
   utilizes Ephemeral Diffie-Hellman Over COSE (EDHOC) for achieving
   mutual authentication between an ACE-OAuth Client and Resource
   Server, and it binds an authentication credential of the Client to an
   ACE-OAuth access token.  EDHOC also establishes an Object Security
   for Constrained RESTful Environments (OSCORE) Security Context, which
   is used to secure communications when accessing protected resources
   according to the authorization information indicated in the access
   token.  This profile can be used to delegate management of
   authorization information from a resource-constrained server to a
   trusted host with less severe limitations regarding processing power
   and memory.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ace-edhoc-oscore-profile-06"/>
        </reference>
        <reference anchor="COSE.Header.Parameters" target="https://www.iana.org/assignments/cose/cose.xhtml#header-parameters">
          <front>
            <title>COSE Header Parameters</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC9529">
          <front>
            <title>Traces of Ephemeral Diffie-Hellman Over COSE (EDHOC)</title>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
            <author fullname="M. Serafin" initials="M." surname="Serafin"/>
            <author fullname="M. Tiloca" initials="M." surname="Tiloca"/>
            <author fullname="M. Vučinić" initials="M." surname="Vučinić"/>
            <date month="March" year="2024"/>
            <abstract>
              <t>This document contains example traces of Ephemeral Diffie-Hellman Over COSE (EDHOC).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9529"/>
          <seriesInfo name="DOI" value="10.17487/RFC9529"/>
        </reference>
      </references>
    </references>
    <section anchor="sec-cddl-model" removeInRFC="true">
      <name>CDDL Model</name>
      <figure anchor="fig-cddl-model">
        <name>CDDL model</name>
        <artwork type="CDDL" align="left"><![CDATA[
; EDHOC Information
methods = 1
cipher_suites = 2
cred_types = 9
id_cred_types = 10
app_prof = 18

; EDHOC Application Profiles
APP-PROF-WK-MINIMAL-CS-2 = 0
APP-PROF-WK-MINIMAL-CS-0 = 1
APP-PROF-WK-BASIC-CS-2-X509 = 2
APP-PROF-WK-BASIC-CS-0-X509 = 3
APP-PROF-WK-BASIC-CS-2-C509 = 4
APP-PROF-WK-BASIC-CS-0-C509 = 5
APP-PROF-WK-INTERMEDIATE-CS-2 = 6
APP-PROF-WK-INTERMEDIATE-CS-0 = 7
APP-PROF-WK-ADVANCED = 8

; COSE Header Parameters
c5t = 22
c5c = 25

; EDHOC Authentication Credential Types
c509_cert = 3
]]></artwork>
      </figure>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors sincerely thank <contact fullname="Christian Amsüss"/>, <contact fullname="Göran Selander"/>, and <contact fullname="Brian Sipos"/> for their feedback and comments.</t>
      <t>This work was supported by the Sweden's Innovation Agency VINNOVA within the EUREKA CELTIC-NEXT project CYPRESS.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
