<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version  (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-ace-group-oscore-profile-03" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.21.0 -->
  <front>
    <title abbrev="Group OSCORE Profile of ACE">The Group Object Security for Constrained RESTful Environments (Group OSCORE) Profile of the Authentication and Authorization for Constrained Environments (ACE) Framework</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-ace-group-oscore-profile-03"/>
    <author initials="M." surname="Tiloca" fullname="Marco Tiloca">
      <organization>RISE AB</organization>
      <address>
        <postal>
          <street>Isafjordsgatan 22</street>
          <city>Kista</city>
          <code>16440 Stockholm</code>
          <country>Sweden</country>
        </postal>
        <email>marco.tiloca@ri.se</email>
      </address>
    </author>
    <author initials="R." surname="Höglund" fullname="Rikard Höglund">
      <organization>RISE AB</organization>
      <address>
        <postal>
          <street>Isafjordsgatan 22</street>
          <city>Kista</city>
          <code>16440 Stockholm</code>
          <country>Sweden</country>
        </postal>
        <email>rikard.hoglund@ri.se</email>
      </address>
    </author>
    <author initials="F." surname="Palombini" fullname="Francesca Palombini">
      <organization>Ericsson AB</organization>
      <address>
        <postal>
          <street>Torshamnsgatan 23</street>
          <city>Kista</city>
          <code>16440 Stockholm</code>
          <country>Sweden</country>
        </postal>
        <email>francesca.palombini@ericsson.com</email>
      </address>
    </author>
    <date year="2024" month="October" day="21"/>
    <area>Security</area>
    <workgroup>ACE Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document specifies a profile for the Authentication and Authorization for Constrained Environments (ACE) framework. The profile uses Group Object Security for Constrained RESTful Environments (Group OSCORE) to provide communication security between a client and one or multiple resource servers that are members of an OSCORE group. The profile securely binds an OAuth 2.0 access token to the public key of the client associated with the private key used by that client in the OSCORE group. The profile uses Group OSCORE to achieve server authentication, as well as proof-of-possession for the client's public key. Also, it provides proof of the client's membership to the OSCORE group by binding the access token to information from the Group OSCORE Security Context, thus allowing the resource server(s) to verify the client's membership upon receiving a message protected with Group OSCORE from the client. Effectively, the profile enables fine-grained access control paired with secure group communication, in accordance with the Zero Trust principles.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Authentication and Authorization for Constrained Environments Working Group mailing list (ace@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/ace/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/ace-wg/ace-group-oscore-profile"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="intro">
      <name>Introduction</name>
      <t>A number of applications rely on a group communication model where a client can access a resource hosted by multiple resource servers at once, e.g., over IP multicast. Typical examples include switching of luminaries, actuators control, and distribution of software updates. Secure communication in the group can be achieved by sharing a set of keying material, which is typically provided upon joining the group.</t>
      <t>For some of such applications, it may be just fine to enforce access control in a straightforward fashion. That is, any client authorized to join the group, hence to obtain the group keying material, can be also implicitly authorized to perform any action at any resource of any server in the group. An example of application where such implicit authorization might serve well is a simple lighting scenario, where the lightbulbs are the servers, while the user account on an app on the user's phone is the client. In this case, it might be fine to not require additional authorization evidence from any user account, if it is acceptable that any current group member is also authorized to switch on and off any light, or to check the status of any light.</t>
      <t>However, in different instances of such applications, the approach above is not desirable, as different group members are intended to have different access rights to resources of other group members. For instance, enforcing access control in accordance with a more fine-grained approach is required in the two following use cases.</t>
      <t>As a first case, an application provides control of smart locks acting as servers in the group, where: a first type of client, e.g., a user account of a child, is allowed to only query the status of the smart locks; while a second type of client, e.g., a user account of a parent, is allowed to both query and change the status of the smart locks. Further similar applications concern the enforcement of different sets of permissions in groups with sensor/actuator devices, e.g., thermostats acting as servers. Also, some group members may even be intended as servers only. Hence, they must be prevented from acting as clients altogether and from accessing resources at other servers in the group, especially when attempting to perform non-safe operations.</t>
      <t>As a second case, building automation scenarios often rely on servers that, under different circumstances, enforce different level of priority for processing received commands. For instance, BACnet deployments consider multiple classes of clients, e.g., a normal light switch (C1) and an emergency fire panel (C2). Then, a C1 client is not allowed to override a command from a C2 client, until the latter relinquishes control at its higher priority. That is: i) only C2 clients should be able to adjust the minimum required level of priority on the servers, so rightly locking out C1 clients if needed; and ii) when a server is set to accept only high-priority commands, only C2 clients should be able to perform such commands otherwise allowed also to C1 clients. Given the different maximum authority of different clients, fine-grained access control would effectively limit the execution of high- and emergency-priority commands only to devices that are in fact authorized to perform such actions. Besides, it would prevent a misconfigured or compromised device from initiating a high-priority command and lock out normal control.</t>
      <t>In the cases above, being a legitimate group member and storing the group keying material is not supposed to imply any particular access rights. Instead, access control to the secure group communication channel and access control to the resource space provided by servers in the group should remain logically separated domains.</t>
      <t>This is aligned with the Zero Trust paradigm <xref target="NIST-800-207"/>, which focuses on resource protection and builds on the premise that trust is never granted implicitly, but must be continually evaluated. In particular, Zero Trust protections involve "minimizing access to resources (such as data and compute resources and applications/services) to only those subjects and assets identified as needing access as well as continually authenticating and authorizing the identity and security posture of each access request."</t>
      <t>Furthermore, <xref target="NIST-800-207"/> highlights how the Zero Trust goal is to "prevent unauthorized access to data and services coupled with making the access control enforcement as granular as possible", to "enforce least privileges needed to perform the action in the request."</t>
      <t>As a step in this direction, one can be tempted to introduce a different security group for each different set of access rights. However, this inconveniently results in additional keying material to distribute and manage. In particular, if the access rights pertaining to a node change, this requires to evict the node from the group, after which the node has to join a different group aligned with its new access rights. Moreover, the keying material of both groups would have to be renewed for their current members. Overall, this would have a non negligible impact on operations and performance.</t>
      <t>Instead, a fine-grained yet flexible access control model can be enforced within the same group, by using the Authentication and Authorization for Constrained Environments (ACE) framework <xref target="RFC9200"/>. That is, a client has to first obtain authorization credentials in the form of an access token, and upload it to the intended resource server(s) in the group before accessing the target resources hosted therein.</t>
      <t>The ACE framework delegates to separate profile documents how to secure communications between the client and the resource servers. However each of the current profiles of ACE defined in <xref target="RFC9202"/><xref target="RFC9203"/><xref target="RFC9431"/><xref target="I-D.ietf-ace-edhoc-oscore-profile"/> relies on a security protocol that cannot be used to protect one-to-many group messages, for example sent over IP multicast.</t>
      <t>This document specifies the "coap_group_oscore" profile of the ACE framework, where a client uses the Constrained Application Protocol (CoAP) <xref target="RFC7252"/><xref target="I-D.ietf-core-groupcomm-bis"/> to communicate with one or multiple resource servers that are members of an application group and share a common set of resources. This profile uses Group Object Security for Constrained RESTful Environments (Group OSCORE) <xref target="I-D.ietf-core-oscore-groupcomm"/> as the security protocol to protect messages exchanged between the client and the resource servers. Hence, it requires that both the client and the resource servers have previously joined the same OSCORE group.</t>
      <t>That is, this profile describes how access control is enforced for a client after it has joined an OSCORE group, to access resources hosted by other members in that group. The process for joining the OSCORE group through the respective Group Manager as defined in <xref target="I-D.ietf-ace-key-groupcomm-oscore"/> takes place before the process described in this document, and is out of the scope of this profile.</t>
      <t>The client proves its access to be authorized to the resource server(s) by using an access token bound to a key (the proof-of-possession key). This profile uses Group OSCORE to achieve server authentication and proof-of-possession for the client's public key used in the OSCORE group in question. Note that proof-of-possession is not achieved through a dedicated protocol element, but instead after the first message exchange protected with Group OSCORE.</t>
      <t>Furthermore, this profile provides proof of the client's membership to the OSCORE group, by binding the access token to information from the pre-established Group OSCORE Security Context, as well as to the client's authentication credential used in the group and including the client's public key. This allows the resource server(s) to verify the client's group membership upon reception of a message protected with Group OSCORE from that client.</t>
      <t>OSCORE <xref target="RFC8613"/> specifies how to use COSE <xref target="RFC9052"/><xref target="RFC9053"/> to secure CoAP messages. Group OSCORE builds on OSCORE to provide secure group communication, and ensures source authentication: by means of digital signatures embedded in the protected message (when using the group mode); or by protecting a message with pairwise keying material derived from the asymmetric keys of the two peers exchanging the message (when using the pairwise mode).</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <t>Readers are expected to be familiar with the terms and concepts related to CBOR <xref target="RFC8949"/>, COSE <xref target="RFC9052"/><xref target="RFC9053"/>, CoAP <xref target="RFC7252"/>, OSCORE <xref target="RFC8613"/>, and Group OSCORE <xref target="I-D.ietf-core-oscore-groupcomm"/>. These especially include:</t>
        <ul spacing="normal">
          <li>
            <t>Group Manager, as the entity responsible for a set of groups where communications among members are secured with Group OSCORE.</t>
          </li>
          <li>
            <t>Authentication credential, as the set of information associated with an entity, including that entity's public key and parameters associated with the public key. Examples of authentication credentials are CBOR Web Tokens (CWTs) and CWT Claims Sets (CCSs) <xref target="RFC8392"/>, X.509 certificates <xref target="RFC5280"/>, and C509 certificates <xref target="I-D.ietf-cose-cbor-encoded-cert"/>.  </t>
            <t>
Members of an OSCORE group have an associated authentication credential in the format used within the group. As per <xref section="2.4" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>, an authentication credential provides the public key as well as the comprehensive set of information related to the public key algorithm, including, e.g., the used elliptic curve (when applicable).</t>
          </li>
        </ul>
        <t>Readers are also expected to be familiar with the terms and concepts described in the ACE framework for authentication and authorization <xref target="RFC9200"/>, as well as in the OSCORE profile of ACE <xref target="RFC9203"/>. The terminology for entities in the considered architecture is defined in OAuth 2.0 <xref target="RFC6749"/>. In particular, this includes client (C), resource server (RS), and authorization server (AS).</t>
        <t>Note that the term "endpoint" is used here following its OAuth definition <xref target="RFC6749"/>, aimed at denoting resources such as /token and /introspect at the AS, and /authz-info at the RS. This document does not use the CoAP definition of "endpoint", which is "An entity participating in the CoAP protocol".</t>
        <t>Additionally, this document makes use of the following terminology.</t>
        <ul spacing="normal">
          <li>
            <t>Pairwise-only group: an OSCORE group that uses only the pairwise mode of Group OSCORE (see <xref section="8" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>).</t>
          </li>
        </ul>
        <t>Examples throughout this document are expressed in CBOR diagnostic notation as defined in <xref section="8" sectionFormat="of" target="RFC8949"/> and <xref section="G" sectionFormat="of" target="RFC8610"/>. Diagnostic notation comments are often used to provide a textual representation of the parameters' keys and values.</t>
        <t>In the CBOR diagnostic notation used in this document, constructs of the form e'SOME_NAME' are replaced by the value assigned to SOME_NAME in the CDDL model shown in <xref target="fig-cddl-model"/> of <xref target="sec-cddl-model"/>. For example, {e'context_id_param': h'abcd0000', e'salt_input_param': h'00} stands for {71: h'abcd0000', 72: h'00}.</t>
        <t>Note to RFC Editor: Please delete the paragraph immediately preceding this note. Also, in the CBOR diagnostic notation used in this document, please replace the constructs of the form e'SOME_NAME' with the value assigned to SOME_NAME in the CDDL model shown in <xref target="fig-cddl-model"/> of <xref target="sec-cddl-model"/>. Finally, please delete this note.</t>
      </section>
    </section>
    <section anchor="sec-protocol-overview">
      <name>Protocol Overview</name>
      <t>This section provides an overview of this profile, i.e., of how to use the ACE framework for authentication and authorization <xref target="RFC9200"/> to secure communications between a client and one or more resource servers using Group OSCORE <xref target="I-D.ietf-core-oscore-groupcomm"/>.</t>
      <t>Note that this profile of ACE describes how access control can be enforced for a node after it has joined an OSCORE group, to access resources hosted by other members in that group.</t>
      <t>In particular, the process of joining the OSCORE group through the respective Group Manager as defined in <xref target="I-D.ietf-ace-key-groupcomm-oscore"/> must take place before the process described in this document, and is out of the scope of this profile.</t>
      <t>An overview of the protocol flow for this profile is shown in <xref target="fig-protocol-overview"/>, where it is assumed that both the resource servers RS1 and RS2 are associated with the same authorization server AS. It is also assumed that the client C, as well as RS1 and RS2 have previously joined an OSCORE group with Group Identifier (gid) 0xabcd0000, and that they got assigned Sender ID (sid) 0x00, 0x01, and 0x02 in the group, respectively. The names of messages coincide with those of <xref target="RFC9200"/> when applicable, and messages in square brackets are optional.</t>
      <figure anchor="fig-protocol-overview">
        <name>Protocol Overview.</name>
        <artset>
          <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="960" width="576" viewBox="0 0 576 960" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 8,48 L 8,672" fill="none" stroke="black"/>
              <path d="M 8,704 L 8,720" fill="none" stroke="black"/>
              <path d="M 8,768 L 8,816" fill="none" stroke="black"/>
              <path d="M 8,848 L 8,864" fill="none" stroke="black"/>
              <path d="M 8,912 L 8,944" fill="none" stroke="black"/>
              <path d="M 256,48 L 256,136" fill="none" stroke="black"/>
              <path d="M 256,152 L 256,200" fill="none" stroke="black"/>
              <path d="M 256,216 L 256,328" fill="none" stroke="black"/>
              <path d="M 256,344 L 256,392" fill="none" stroke="black"/>
              <path d="M 256,408 L 256,440" fill="none" stroke="black"/>
              <path d="M 256,456 L 256,488" fill="none" stroke="black"/>
              <path d="M 256,504 L 256,568" fill="none" stroke="black"/>
              <path d="M 256,624 L 256,776" fill="none" stroke="black"/>
              <path d="M 256,792 L 256,944" fill="none" stroke="black"/>
              <path d="M 352,48 L 352,136" fill="none" stroke="black"/>
              <path d="M 352,152 L 352,200" fill="none" stroke="black"/>
              <path d="M 352,240 L 352,328" fill="none" stroke="black"/>
              <path d="M 352,344 L 352,392" fill="none" stroke="black"/>
              <path d="M 352,432 L 352,592" fill="none" stroke="black"/>
              <path d="M 352,624 L 352,944" fill="none" stroke="black"/>
              <path d="M 568,48 L 568,944" fill="none" stroke="black"/>
              <path d="M 32,64 L 48,64" fill="none" stroke="black"/>
              <path d="M 200,64 L 232,64" fill="none" stroke="black"/>
              <path d="M 32,96 L 80,96" fill="none" stroke="black"/>
              <path d="M 184,96 L 232,96" fill="none" stroke="black"/>
              <path d="M 8,144 L 72,144" fill="none" stroke="black"/>
              <path d="M 184,144 L 560,144" fill="none" stroke="black"/>
              <path d="M 16,208 L 384,208" fill="none" stroke="black"/>
              <path d="M 528,208 L 568,208" fill="none" stroke="black"/>
              <path d="M 8,256 L 48,256" fill="none" stroke="black"/>
              <path d="M 200,256 L 248,256" fill="none" stroke="black"/>
              <path d="M 16,304 L 72,304" fill="none" stroke="black"/>
              <path d="M 192,304 L 256,304" fill="none" stroke="black"/>
              <path d="M 8,336 L 72,336" fill="none" stroke="black"/>
              <path d="M 184,336 L 560,336" fill="none" stroke="black"/>
              <path d="M 16,400 L 384,400" fill="none" stroke="black"/>
              <path d="M 528,400 L 568,400" fill="none" stroke="black"/>
              <path d="M 8,448 L 48,448" fill="none" stroke="black"/>
              <path d="M 200,448 L 344,448" fill="none" stroke="black"/>
              <path d="M 16,496 L 64,496" fill="none" stroke="black"/>
              <path d="M 184,496 L 352,496" fill="none" stroke="black"/>
              <path d="M 8,528 L 24,528" fill="none" stroke="black"/>
              <path d="M 208,528 L 248,528" fill="none" stroke="black"/>
              <path d="M 248,576 L 344,576" fill="none" stroke="black"/>
              <path d="M 16,640 L 40,640" fill="none" stroke="black"/>
              <path d="M 232,640 L 256,640" fill="none" stroke="black"/>
              <path d="M 16,784 L 40,784" fill="none" stroke="black"/>
              <path d="M 232,784 L 352,784" fill="none" stroke="black"/>
              <path d="M 224,528 L 248,576" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="568,336 556,330.4 556,341.6" fill="black" transform="rotate(0,560,336)"/>
              <polygon class="arrowhead" points="568,144 556,138.4 556,149.6" fill="black" transform="rotate(0,560,144)"/>
              <polygon class="arrowhead" points="352,576 340,570.4 340,581.6" fill="black" transform="rotate(0,344,576)"/>
              <polygon class="arrowhead" points="352,448 340,442.4 340,453.6" fill="black" transform="rotate(0,344,448)"/>
              <polygon class="arrowhead" points="256,528 244,522.4 244,533.6" fill="black" transform="rotate(0,248,528)"/>
              <polygon class="arrowhead" points="256,256 244,250.4 244,261.6" fill="black" transform="rotate(0,248,256)"/>
              <polygon class="arrowhead" points="240,64 228,58.4 228,69.6" fill="black" transform="rotate(0,232,64)"/>
              <polygon class="arrowhead" points="40,96 28,90.4 28,101.6" fill="black" transform="rotate(180,32,96)"/>
              <polygon class="arrowhead" points="24,784 12,778.4 12,789.6" fill="black" transform="rotate(180,16,784)"/>
              <polygon class="arrowhead" points="24,640 12,634.4 12,645.6" fill="black" transform="rotate(180,16,640)"/>
              <polygon class="arrowhead" points="24,496 12,490.4 12,501.6" fill="black" transform="rotate(180,16,496)"/>
              <polygon class="arrowhead" points="24,400 12,394.4 12,405.6" fill="black" transform="rotate(180,16,400)"/>
              <polygon class="arrowhead" points="24,304 12,298.4 12,309.6" fill="black" transform="rotate(180,16,304)"/>
              <polygon class="arrowhead" points="24,208 12,202.4 12,213.6" fill="black" transform="rotate(180,16,208)"/>
              <g class="text">
                <text x="8" y="36">C</text>
                <text x="256" y="36">RS1</text>
                <text x="352" y="36">RS2</text>
                <text x="564" y="36">AS</text>
                <text x="24" y="68">[</text>
                <text x="92" y="68">Resource</text>
                <text x="160" y="68">Request</text>
                <text x="240" y="68">]</text>
                <text x="24" y="100">[</text>
                <text x="100" y="100">AS</text>
                <text x="144" y="100">Request</text>
                <text x="240" y="100">]</text>
                <text x="100" y="116">Creation</text>
                <text x="160" y="116">Hints</text>
                <text x="100" y="148">POST</text>
                <text x="148" y="148">/token</text>
                <text x="56" y="164">(aud:</text>
                <text x="108" y="164">"RS1",</text>
                <text x="156" y="164">sid:</text>
                <text x="200" y="164">0x00,</text>
                <text x="60" y="180">gid:</text>
                <text x="128" y="180">0xabcd0000,</text>
                <text x="196" y="180">...)</text>
                <text x="420" y="212">Access</text>
                <text x="472" y="212">token</text>
                <text x="508" y="212">T1</text>
                <text x="384" y="228">+</text>
                <text x="420" y="228">Access</text>
                <text x="496" y="228">Information</text>
                <text x="76" y="260">POST</text>
                <text x="144" y="260">/authz-info</text>
                <text x="108" y="276">(access_token:</text>
                <text x="184" y="276">T1)</text>
                <text x="100" y="308">2.01</text>
                <text x="152" y="308">Created</text>
                <text x="100" y="340">POST</text>
                <text x="148" y="340">/token</text>
                <text x="56" y="356">(aud:</text>
                <text x="108" y="356">"RS2",</text>
                <text x="156" y="356">sid:</text>
                <text x="200" y="356">0x00,</text>
                <text x="60" y="372">gid:</text>
                <text x="128" y="372">0xabcd0000,</text>
                <text x="196" y="372">...)</text>
                <text x="420" y="404">Access</text>
                <text x="472" y="404">token</text>
                <text x="508" y="404">T2</text>
                <text x="384" y="420">+</text>
                <text x="420" y="420">Access</text>
                <text x="496" y="420">Information</text>
                <text x="76" y="452">POST</text>
                <text x="144" y="452">/authz-info</text>
                <text x="108" y="468">(access_token:</text>
                <text x="184" y="468">T2)</text>
                <text x="92" y="500">2.01</text>
                <text x="144" y="500">Created</text>
                <text x="56" y="532">Group</text>
                <text x="108" y="532">OSCORE</text>
                <text x="168" y="532">Request</text>
                <text x="64" y="548">(kid:</text>
                <text x="112" y="548">0x00,</text>
                <text x="68" y="564">gid:</text>
                <text x="136" y="564">0xabcd0000)</text>
                <text x="256" y="596">|</text>
                <text x="312" y="612">/proof-of-possession/</text>
                <text x="72" y="644">Group</text>
                <text x="124" y="644">OSCORE</text>
                <text x="188" y="644">Response</text>
                <text x="96" y="660">(kid:</text>
                <text x="144" y="660">0x01)</text>
                <text x="88" y="692">/proof-of-possession/</text>
                <text x="32" y="740">/Mutual</text>
                <text x="124" y="740">authentication</text>
                <text x="40" y="756">between</text>
                <text x="80" y="756">C</text>
                <text x="104" y="756">and</text>
                <text x="140" y="756">RS1/</text>
                <text x="72" y="788">Group</text>
                <text x="124" y="788">OSCORE</text>
                <text x="188" y="788">Response</text>
                <text x="96" y="804">(kid:</text>
                <text x="144" y="804">0x02)</text>
                <text x="88" y="836">/proof-of-possession/</text>
                <text x="32" y="884">/Mutual</text>
                <text x="124" y="884">authentication</text>
                <text x="40" y="900">between</text>
                <text x="80" y="900">C</text>
                <text x="104" y="900">and</text>
                <text x="140" y="900">RS2/</text>
                <text x="120" y="932">...</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art" align="center"><![CDATA[
C                             RS1         RS2                        AS
|                              |           |                          |
| [--- Resource Request ---->] |           |                          |
|                              |           |                          |
| [<------ AS Request -------] |           |                          |
|       Creation Hints         |           |                          |
|                              |           |                          |
+-------- POST /token ----------------------------------------------->|
|   (aud: "RS1", sid: 0x00,    |           |                          |
|    gid: 0xabcd0000, ...)     |           |                          |
|                              |           |                          |
|<---------------------------------------------- Access token T1 -----+
|                              |               + Access Information   |
|                              |           |                          |
+----- POST /authz-info ------>|           |                          |
|     (access_token: T1)       |           |                          |
|                              |           |                          |
|<------- 2.01 Created --------+           |                          |
|                              |           |                          |
+-------- POST /token ----------------------------------------------->|
|   (aud: "RS2", sid: 0x00,    |           |                          |
|    gid: 0xabcd0000, ...)     |           |                          |
|                              |           |                          |
|<---------------------------------------------- Access token T2 -----+
|                              |               + Access Information   |
|                              |           |                          |
+----- POST /authz-info ------------------>|                          |
|     (access_token: T2)       |           |                          |
|                              |           |                          |
|<------ 2.01 Created ---------------------+                          |
|                              |           |                          |
+-- Group OSCORE Request --+-->|           |                          |
|    (kid: 0x00,            \  |           |                          |
|     gid: 0xabcd0000)       \ |           |                          |
|                             `----------->|                          |
|                              |           |                          |
|                           /proof-of-possession/                     |
|                              |           |                          |
|<--- Group OSCORE Response ---+           |                          |
|        (kid: 0x01)           |           |                          |
|                              |           |                          |
/proof-of-possession/          |           |                          |
|                              |           |                          |
|                              |           |                          |
/Mutual authentication         |           |                          |
 between C and RS1/            |           |                          |
|                              |           |                          |
|<--- Group OSCORE Response ---------------+                          |
|        (kid: 0x02)           |           |                          |
|                              |           |                          |
/proof-of-possession/          |           |                          |
|                              |           |                          |
|                              |           |                          |
/Mutual authentication         |           |                          |
 between C and RS2/            |           |                          |
|                              |           |                          |
|            ...               |           |                          |
|                              |           |                          |
]]></artwork>
        </artset>
      </figure>
      <section anchor="sec-protocol-overview-pre-conditions">
        <name>Pre-Conditions</name>
        <t>Using Group OSCORE and this profile requires that both the client and the resource servers have previously joined the same OSCORE group. This especially includes the derivation of the Group OSCORE Security Context and the assignment of unique Sender IDs to use in the group. Nodes can join the OSCORE group through the respective Group Manager by using the approach defined in <xref target="I-D.ietf-ace-key-groupcomm-oscore"/>, which is also based on ACE.</t>
        <t>After the client and resource servers have joined the group, this profile provides access control for accessing resources on those resource servers, by securely communicating with Group OSCORE.</t>
        <t>As a pre-requisite for this profile, the client has to have successfully joined the OSCORE group where also the resource servers (RSs) are members. Depending on the limited information initially available, the client may have to first discover the exact OSCORE group used by the RSs for the resources of interest, e.g., by using the approach defined in <xref target="I-D.tiloca-core-oscore-discovery"/>.</t>
      </section>
      <section anchor="sec-protocol-overview-token-retrieval">
        <name>Requesting an Access Token</name>
        <t>This profile requires that the client requests an access token from the AS for the resource(s) that it wants to access at the RS(s), by using the /token endpoint as specified in <xref section="5.8" sectionFormat="of" target="RFC9200"/>.</t>
        <t>In general, different RSs can be associated with different ASs, even if the RSs are members of the same OSCORE group. However, assuming proper configurations and trust relations, it is possible for multiple RSs associated with the same AS to be part of a single audience (i.e., a group-audience, see <xref section="6.9" sectionFormat="of" target="RFC9200"/>). In such a case, the client can request a single access token intended for the group-audience, hence to all the RSs included therein. A particular group-audience might be defined as including all the RSs in the OSCORE group.</t>
        <t>In the Access Token Request to the AS, the client <bcp14>MUST</bcp14> include the Group Identifier of the OSCORE group and its own Sender ID in that group. The AS <bcp14>MUST</bcp14> specify these pieces of information in the access token.</t>
        <t>Furthermore, in the Access Token Request to the AS, the client <bcp14>MUST</bcp14> also include: its own authentication credential used in the OSCORE group; and a proof-of-possession (PoP) evidence to prove possession of the corresponding private key to the AS. The PoP evidence is computed over a PoP input uniquely related to the secure communication association between the client and the AS. The AS <bcp14>MUST</bcp14> include also the authentication credential specified by the client in the access token.</t>
        <t>If the request from the client is granted, then the AS can send back the issued access token in the Access Token Response to the client, or instead upload the access token directly to the RS as described in the alternative workflow defined in <xref target="I-D.ietf-ace-workflow-and-params"/>. This document focuses on the former option (also shown in the example in <xref target="fig-protocol-overview"/>), while the latter option is not detailed further here.</t>
        <t>The Access Token Request and Response exchanged between the client and the AS <bcp14>MUST</bcp14> be confidentiality-protected and ensure authenticity. In this profile, it is <bcp14>RECOMMENDED</bcp14> to use OSCORE <xref target="RFC8613"/> between the client and the AS, to reduce the number of libraries that the client has to support. Other protocols fulfilling the security requirements defined in Sections <xref target="RFC9200" section="5" sectionFormat="bare"/> and <xref target="RFC9200" section="6" sectionFormat="bare"/> of <xref target="RFC9200"/> <bcp14>MAY</bcp14> alternatively be used, such as TLS <xref target="RFC8446"/> or DTLS <xref target="RFC9147"/>.</t>
      </section>
      <section anchor="sec-protocol-overview-token-posting">
        <name>Access Token Uploading</name>
        <t>After having retrieved the access token from the AS, the client uploads the access token to the RS, by sending a POST request to the /authz-info endpoint and using the mechanisms specified in <xref section="5.10" sectionFormat="of" target="RFC9200"/>. When using this profile, the communication that C has with the /authz-info endpoint is not protected.</t>
        <t>If the access token is valid, the RS replies to the POST request with a 2.01 (Created) response. Also, the RS associates the received access token with the Group OSCORE Security Context identified by the Group Identifier specified in the access token (see <xref section="2.1.3" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>). In practice, the RS maintains a collection of Security Contexts with associated authorization information, for all the clients that it is currently communicating with. The authorization information is a policy that is used as input when processing requests from those clients.</t>
        <t>Finally, the RS stores the association between i) the authorization information from the access token; and ii) the Group Identifier of the OSCORE group together with the Sender ID and the authentication credential of the client in that group (see <xref section="2" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>). This binds the access token to the Group OSCORE Security Context of the OSCORE group.</t>
        <t>Finally, when the client communicates with the RS using the Group OSCORE Security Context, the RS verifies that the client is a legitimate member of the OSCORE group and especially the exact group member with the same Sender ID associated with the access token. This occurs when verifying a request protected with Group OSCORE, since the request includes the client's Sender ID and either it embeds a signature computed also over that Sender ID (if protected with the group mode), or it is protected by means of pairwise symmetric keying material derived from the asymmetric keys of the two peers (if protected with the pairwise mode).</t>
        <t>The above has considered an access token intended for a single RS. However, as discussed in <xref target="sec-protocol-overview-token-retrieval"/>, an access token can be intended for a group-audience including multiple RSs in the OSCORE group. In such a case, the client could efficiently upload the access token to many or all of those RSs at once (e.g., over IP multicast), after which each RS individually performs the same steps described above.</t>
      </section>
      <section anchor="sec-protocol-overview-communication">
        <name>Secure Communication</name>
        <t>The client can send a request protected with Group OSCORE <xref target="I-D.ietf-core-oscore-groupcomm"/> to the RS. This can be a unicast request targeting the RS, or a one-to-many group request (e.g., over IP multicast) targeting the OSCORE group where the RS is also a member. To this end, the client uses the Group OSCORE Security Context already established upon joining the OSCORE group, e.g., by using the approach defined in <xref target="I-D.ietf-ace-key-groupcomm-oscore"/>. The RS may send a response back to the client, protecting it by means of the same Group OSCORE Security Context.</t>
      </section>
    </section>
    <section anchor="sec-c-as-comm">
      <name>Client-AS Communication</name>
      <t>This section details the Access Token POST Request that the client sends to the /token endpoint of the AS, as well as the related Access Token Response.</t>
      <t>The access token <bcp14>MUST</bcp14> be bound to the public key of the client as proof-of-possession key (PoP) key, which is included in the client's authentication credential specified in the 'cnf' claim of the access token.</t>
      <section anchor="sec-c-as-comm-preliminary-ops">
        <name>Preliminary Operations</name>
        <t>The following considers a client that is a member of an OSCORE group G with GID* as current Group Identifier (GID), within which the client currently has SID* as Sender ID and uses a public authentication credential AUTH_CRED_C that specifies the PoP key K.</t>
        <t>The client <bcp14>MUST</bcp14> perform the following steps, before requesting an access token to be bound to AUTH_CRED_C (hence to the PoP key K) and to be associated with the client's membership in group G through the values GID* and SID*.</t>
        <ol spacing="normal" type="1"><li>
            <t>The client checks whether it is a member of any two OSCORE groups G1 and G2 such that all the following conditions hold.  </t>
            <ul spacing="normal">
              <li>
                <t>Both groups have GID* as current GID.</t>
              </li>
              <li>
                <t>The client uses SID* as Sender ID in both groups.</t>
              </li>
              <li>
                <t>The client uses the same AUTH_CRED_C in both groups.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>If such two groups G1 and G2 are found at Step 2, then the client moves to Step 3. Otherwise, the client terminates this algorithm and proceeds with requesting the access token as defined in <xref target="sec-c-as-token-endpoint"/>.</t>
          </li>
          <li>
            <t>The client can choose to terminate this algorithm and perform it again later on.  </t>
            <t>
Alternatively, the client can alter its current group memberships, in order to ensure that two groups like G1 and G2 cannot be determined. To this end, the client has two available options.  </t>
            <ul spacing="normal">
              <li>
                <t>The client leaves some of the OSCORE groups that could be determined as groups like G1 and G2 (see <xref section="9.11" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm-oscore"/>).</t>
              </li>
              <li>
                <t>The client obtains a new Sender ID in some of the OSCORE groups that could be determined as groups like G1 and G2. To this end, the client can request a new Sender ID in a group to the Group Manager responsible for that group (see <xref section="9.2" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm-oscore"/>), or re-join a group thereby obtaining a new Sender ID in that group (see <xref section="6" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm-oscore"/>).</t>
              </li>
            </ul>
            <t>
Finally, the client moves to Step 1.</t>
          </li>
        </ol>
      </section>
      <section anchor="sec-c-as-token-endpoint">
        <name>C-to-AS: POST to Token Endpoint</name>
        <t>The Client-to-AS request is specified in <xref section="5.8.1" sectionFormat="of" target="RFC9200"/>. The client <bcp14>MUST</bcp14> send this POST request to the /token endpoint over a secure channel that guarantees authentication, message integrity, and confidentiality.</t>
        <t>The POST request is formatted as the analogous Client-to-AS request in the OSCORE profile of ACE (see <xref section="3.1" sectionFormat="of" target="RFC9203"/>), with the following additional parameters that <bcp14>MUST</bcp14> be included in the payload.</t>
        <ul spacing="normal">
          <li>
            <t>'context_id', defined in <xref target="context_id"/> of this document. This parameter specifies the GID, i.e., the ID Context of an OSCORE group that includes as members both the client and the RS(s) in the audience for which the access token is asked to be issued. In particular, the client wishes to communicate with the RS(s) in that audience using the Group OSCORE Security Context associated with that OSCORE group.</t>
          </li>
          <li>
            <t>'salt_input', defined in <xref target="salt_input"/> of this document. This parameter includes the Sender ID that the client has in the OSCORE group whose GID is specified in the 'context_id' parameter above.</t>
          </li>
          <li>
            <t>'req_cnf', defined in <xref section="3.1" sectionFormat="of" target="RFC9201"/>. This parameter follows the syntax from <xref section="3.1" sectionFormat="of" target="RFC8747"/>, and its inner confirmation value specifies the authentication credential that the client uses in the OSCORE group. The public key included in the authentication credential will be used as the PoP key bound to the access token.  </t>
            <t>
At the time of writing this specification, acceptable formats of authentication credentials in Group OSCORE are CBOR Web Tokens (CWTs) and CWT Claims Sets (CCSs) <xref target="RFC8392"/>, X.509 certificates <xref target="RFC5280"/>, and C509 certificates <xref target="I-D.ietf-cose-cbor-encoded-cert"/>.  </t>
            <t>
Further formats may be available in the future, and would be acceptable to use as long as they comply with the criteria compiled in <xref section="2.4" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>. In particular, an authentication credential has to explicitly include the public key as well as the comprehensive set of information related to the public key algorithm, including, e.g., the used elliptic curve (when applicable).  </t>
            <t>
[ As to CWTs and CCSs, the CWT Confirmation Methods 'kcwt' and 'kccs' are under pending registration requested by draft-ietf-ace-edhoc-oscore-profile. ]  </t>
            <t>
[ As to X.509 certificates, the CWT Confirmation Methods 'x5bag' and '5chain' are under pending registration requested by draft-ietf-ace-edhoc-oscore-profile. ]  </t>
            <t>
[ As to C509 certificates, the CWT Confirmation Methods 'c5b'and 'c5c' are under pending registration requested by draft-ietf-ace-edhoc-oscore-profile. ]</t>
          </li>
        </ul>
        <t>In addition, the client computes its proof-of-possession (PoP) evidence, in order to prove to the AS the possession of its own private key used in the OSCORE group. This allows the AS to verify that the client indeed owns the private key associated with the public key of the authentication credential that the client allegedly uses in the OSCORE group.</t>
        <t>To this end, the client <bcp14>MUST</bcp14> use as PoP input the byte representation of an information that uniquely represents the secure communication association between the client and the AS. It is <bcp14>RECOMMENDED</bcp14> that the client uses the following as PoP input.</t>
        <ul spacing="normal">
          <li>
            <t>If the client and the AS communicate over TLS 1.2 <xref target="RFC5246"/> or DTLS 1.2 <xref target="RFC6347"/>, the PoP input is an exporter value computed as defined in <xref section="4" sectionFormat="of" target="RFC5705"/>, using the following inputs:  </t>
            <ul spacing="normal">
              <li>
                <t>The exporter label "EXPORTER-ACE-PoP-Input-Client-AS", defined in <xref target="iana-tls-exporter-label"/> of this document.</t>
              </li>
              <li>
                <t>The empty 'context value', i.e., a 'context value' of zero-length.</t>
              </li>
              <li>
                <t>32 as length value in bytes.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>If the client and the AS communicate over TLS 1.3 <xref target="RFC8446"/> or DTLS 1.3 <xref target="RFC9147"/>, the PoP input is an exporter value computed as defined in <xref section="7.5" sectionFormat="of" target="RFC8446"/>, using the following inputs:  </t>
            <ul spacing="normal">
              <li>
                <t>The exporter label "EXPORTER-ACE-PoP-Input-Client-AS", defined in <xref target="iana-tls-exporter-label"/> of this document.</t>
              </li>
              <li>
                <t>The empty 'context_value', i.e., a 'context_value' of zero-length.</t>
              </li>
              <li>
                <t>32 as 'key_length' in bytes.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>If the client and the AS communicate over OSCORE <xref target="RFC8613"/>, the PoP input is the output PRK of an HKDF-Extract step <xref target="RFC5869"/>, i.e., PRK = HMAC-Hash(salt, IKM).  </t>
            <t>
In particular, given the OSCORE Security Context CTX shared between the client and the AS, then the following applies.  </t>
            <ul spacing="normal">
              <li>
                <t>'salt' takes (x1 | x2), where | denotes byte string concatenation, while x1 and x2 are defined as follows.      </t>
                <ul spacing="normal">
                  <li>
                    <t>x1 is the binary representation of a CBOR data item. If CTX does not specify an OSCORE ID Context, the CBOR data item is the CBOR simple value <tt>null</tt> (0xf6). Otherwise, the CBOR data item is a CBOR byte string, with value the OSCORE ID Context specified in CTX.</t>
                  </li>
                  <li>
                    <t>x2 is the binary representation of a CBOR byte string. The value of the CBOR byte string is the OSCORE Sender ID of the client, which the client stores in its Sender Context of CTX and the AS stores in its Recipient Context of CTX.</t>
                  </li>
                </ul>
              </li>
              <li>
                <t>'IKM' is the OSCORE Master Secret specified in CTX.</t>
              </li>
              <li>
                <t>The used HKDF is the HKDF Algorithm specified in CTX.</t>
              </li>
            </ul>
            <t>
The following shows an example of input to the HMAC-Hash() function.  </t>
            <t>
On the client side, the OSCORE Security Context shared with the AS includes:  </t>
            <artwork><![CDATA[
ID Context: 0x37cbf3210017a2d3 (8 bytes)

Sender ID: 0x01 (1 byte)

Master Secret: 0x0102030405060708090a0b0c0d0e0f10 (16 bytes)
]]></artwork>
            <t>
Then, the following holds.  </t>
            <artwork><![CDATA[
x1 (Raw value) (8 bytes)
0x37cbf3210017a2d3

x1 (CBOR Data Item) (9 bytes)
0x4837cbf3210017a2d3

x2 (Raw value) (1 bytes)
0x01

x2 (CBOR Data Item) (2 bytes)
0x4101

salt (11 bytes)
0x4837cbf3210017a2d34101

IKM (16 bytes)
0x0102030405060708090a0b0c0d0e0f10
]]></artwork>
          </li>
        </ul>
        <t>After that, the client computes the PoP evidence as follows.</t>
        <ul spacing="normal">
          <li>
            <t>If the OSCORE group is not a pairwise-only group, the PoP evidence <bcp14>MUST</bcp14> be a signature. The client computes the signature by using the same private key and signature algorithm it uses for signing messages in the OSCORE group. The client's private key is the one associated with the client's authentication credential used in the OSCORE group and specified in the 'req_cnf' parameter above.</t>
          </li>
          <li>
            <t>If the OSCORE group is a pairwise-only group, the PoP evidence <bcp14>MUST</bcp14> be a MAC computed as follows, by using the HKDF Algorithm HKDF SHA-256, which consists of composing the HKDF-Extract and HKDF-Expand steps <xref target="RFC5869"/>.  </t>
            <t>
MAC = HKDF(salt, IKM, info, L)  </t>
            <t>
The input parameters of HKDF are as follows.  </t>
            <ul spacing="normal">
              <li>
                <t>salt takes as value the empty byte string.</t>
              </li>
              <li>
                <t>IKM is computed as a cofactor Diffie-Hellman shared secret (see Section 5.7.1.2 of <xref target="NIST-800-56A"/>), using the ECDH algorithm that is used as Pairwise Key Agreement Algorithm in the OSCORE group. The client uses its own Diffie-Hellman private key and the Diffie-Hellman public key of the AS. For X25519 and X448, the procedure is described in <xref section="5" sectionFormat="of" target="RFC7748"/>.      </t>
                <t>
The client's private key is the one associated with the client's authentication credential used in the OSCORE group and specified in the 'req_cnf' parameter above. The client may obtain the Diffie-Hellman public key of the AS during its registration process at the AS.</t>
              </li>
              <li>
                <t>info takes as value the PoP input.</t>
              </li>
              <li>
                <t>L is equal to 8, i.e., the size of the MAC, in bytes.</t>
              </li>
            </ul>
          </li>
        </ul>
        <t>Finally, the client <bcp14>MUST</bcp14> include one of the two following parameters in the payload of the POST request to the AS.</t>
        <ul spacing="normal">
          <li>
            <t>'client_cred_verify', defined in <xref target="client_cred_verify"/> of this document, specifying the client's PoP evidence as a signature, which is computed as defined above. This parameter <bcp14>MUST</bcp14> be included if and only if the OSCORE group is not a pairwise-only group.</t>
          </li>
          <li>
            <t>'client_cred_verify_mac', defined in <xref target="client_cred_verify_mac"/> of this document, specifying the client's PoP evidence as a MAC, which is computed as defined above. This parameter <bcp14>MUST</bcp14> be included if and only if the OSCORE group is a pairwise-only group.</t>
          </li>
        </ul>
        <t>An example of such a request is shown in <xref target="fig-example-C-to-AS-symm"/>.</t>
        <figure anchor="fig-example-C-to-AS-symm">
          <name>Example C-to-AS POST /token Request for an Access Token Bound to an Asymmetric Key.</name>
          <artwork><![CDATA[
Header: POST (Code=0.02)
Uri-Host: "as.example.com"
Uri-Path: "token"
Content-Format: 19 (application/ace+cbor)
Payload:
{
  / audience /        5 : "tempSensor4711",
  / scope /           9 : "read",
    e'context_id_param' : h'abcd0000',
    e'salt_input_param' : h'00',
  e'client_cred_verify' : h'c5a6...f100' / elided for brevity /,
  / req_cnf /         4 : {
    e'kccs' : {
      / sub / 2 : "42-50-31-FF-EF-37-32-39",
      / cnf / 8 : {
        / COSE_Key / 1 : {
          / kty /  1 : 2 / EC2 /,
          / crv / -1 : 1 / P-256 /,
          / x /   -2 : h'd7cc072de2205bdc1537a543d53c60a6
                         acb62eccd890c7fa27c9e354089bbe13',
          / y /   -3 : h'f95e1d4b851a2cc80fff87d8e23f22af
                         b725d535e515d020731e79a3b4e47120'
        }
      }
    }
  }
}
]]></artwork>
        </figure>
        <t>In the example above, the client specifies that its authentication credential in the OSCORE group is the CCS shown in <xref target="fig-client-auth-cred"/>.</t>
        <figure anchor="fig-client-auth-cred">
          <name>Example of client Authentication Credential as CWT Claims Set (CCS).</name>
          <artwork><![CDATA[
{
  / sub / 2 : "42-50-31-FF-EF-37-32-39",
  / cnf / 8 : {
    / COSE_Key / 1 : {
      / kty /  1 : 2 / EC2 /,
      / crv / -1 : 1 / P-256 /,
      / x /   -2 : h'd7cc072de2205bdc1537a543d53c60a6
                     acb62eccd890c7fa27c9e354089bbe13',
      / y /   -3 : h'f95e1d4b851a2cc80fff87d8e23f22af
                     b725d535e515d020731e79a3b4e47120'
    }
  }
}
]]></artwork>
        </figure>
        <t>[</t>
        <t>TODO: Specify how C requests a new access token that dynamically updates its access rights. (See <xref target="sec-as-update-access-rights"/> for pre-requirements and a high-level direction)</t>
        <t>]</t>
        <section anchor="context_id">
          <name>'context_id' Parameter</name>
          <t>The 'context_id' parameter is an <bcp14>OPTIONAL</bcp14> parameter of the Access Token Request message defined in <xref section="5.8.1" sectionFormat="of" target="RFC9200"/>. This parameter provides a value that the client wishes to use with the RS as a hint for a security context. Its exact content is profile specific.</t>
        </section>
        <section anchor="salt_input">
          <name>'salt_input' Parameter</name>
          <t>The 'salt_input' parameter is an <bcp14>OPTIONAL</bcp14> parameter of the Access Token Request message defined in <xref section="5.8.1" sectionFormat="of" target="RFC9200"/>. This parameter provides a value that the client wishes to use as part of a salt with the RS, for deriving cryptographic keying material. Its exact content is profile specific.</t>
        </section>
        <section anchor="client_cred_verify">
          <name>'client_cred_verify' Parameter</name>
          <t>The 'client_cred_verify' parameter is an <bcp14>OPTIONAL</bcp14> parameter of the Access Token Request message defined in <xref section="5.8.1." sectionFormat="of" target="RFC9200"/>. This parameter provides a signature computed by the client to prove the possession of its own private key.</t>
        </section>
        <section anchor="client_cred_verify_mac">
          <name>'client_cred_verify_mac' Parameter</name>
          <t>The 'client_cred_verify_mac' parameter is an <bcp14>OPTIONAL</bcp14> parameter of the Access Token Request message defined in <xref section="5.8.1." sectionFormat="of" target="RFC9200"/>. This parameter provides a Message Authentication Code (MAC) computed by the client to prove the possession of its own private key.</t>
        </section>
      </section>
      <section anchor="sec-as-c-token">
        <name>AS-to-C: Response</name>
        <t>After having verified the POST request to the /token endpoint and that the client is authorized to obtain an access token corresponding to its Access Token Request, the AS <bcp14>MUST</bcp14> verify the proof-of-possession (PoP) evidence. In particular, the AS proceeds as follows.</t>
        <ul spacing="normal">
          <li>
            <t>As PoP input, the AS uses the same value used by the client in <xref target="sec-c-as-token-endpoint"/>.</t>
          </li>
          <li>
            <t>As public key of the client, the AS uses the one included in the authentication credential specified in the 'req_cnf' parameter of the Access Token Request.  </t>
            <t>
This requires the AS to support the format of the authentication credential specified in the 'req_cnf' parameter, i.e., the format of authentication credential that is used in the OSCORE group where the client uses that authentication credential. Practically, this is not an issue, since an RS supporting this profile is expected to be registered only at an AS that supports the formats of authentication credential that the RS supports.</t>
          </li>
          <li>
            <t>If the Access Token Request includes the 'client_cred_verify' parameter, this specifies the PoP evidence as a signature. Then, the AS verifies the signature by using the public key of the client.  </t>
            <t>
This requires the AS to support the signature algorithm and curve (when applicable) that are used in the OSCORE group where the client uses the authentication credential specified in the 'req_cnf' parameter of the Access Token Request. Practically, this is not an issue, since an RS supporting this profile is expected to be registered only at an AS that supports the signature algorithms and curves (when applicable) that the RS supports.</t>
          </li>
          <li>
            <t>If the Access Token Request includes the 'client_cred_verify_mac' parameter, this specifies the PoP evidence as a Message Authentication Code (MAC).  </t>
            <t>
Then, the AS recomputes the MAC through the same process taken by the client when preparing the value of the 'client_cred_verify_mac' parameter for the access token (see <xref target="sec-c-as-token-endpoint"/>), with the difference that the AS uses its own Diffie-Hellman private key and the Diffie-Hellman public key of the client. The verification succeeds if and only if the recomputed MAC is equal to the MAC conveyed as PoP evidence in the Access Token Request.  </t>
            <t>
This requires the AS to support the ECDH algorithm that is used as Pairwise Key Agreement Algorithm in the OSCORE group where the client uses the authentication credential specified in the 'req_cnf' parameter of the Access Token Request. Practically, this is not an issue, since an RS supporting this profile is expected to be registered only at an AS that supports the ECDH algorithms that the RS supports.</t>
          </li>
        </ul>
        <t>If both the 'client_cred_verify' and 'client_cred_verify_mac' parameters are present, or if the verification of the PoP evidence fails, the AS considers the client request invalid.</t>
        <t>If the client request was invalid or not authorized, the AS returns an error response as described in <xref section="5.8.3" sectionFormat="of" target="RFC9200"/>.</t>
        <t>If all verifications are successful, the AS responds as defined in <xref section="5.8.2" sectionFormat="of" target="RFC9200"/>. In particular:</t>
        <ul spacing="normal">
          <li>
            <t>The AS can signal that the use of Group OSCORE is <bcp14>REQUIRED</bcp14> for a specific access token by including the 'ace_profile' parameter with the value "coap_group_oscore" in the Access Token Response. The client <bcp14>MUST</bcp14> use Group OSCORE towards all the resource servers for which this access token is valid. Usually, it is assumed that constrained devices will be pre-configured with the necessary profile, so that this kind of profile signaling can be omitted.</t>
          </li>
          <li>
            <t>The AS <bcp14>MUST NOT</bcp14> include the 'rs_cnf' parameter defined in <xref target="RFC9201"/>. In general, the AS may not be aware of the authentication credentials (and public keys included thereof) that the RSs use in the OSCORE group. Also, the client is able to retrieve the authentication credentials of other group members from the responsible Group Manager, both upon joining the group or later on as a group member, as defined in <xref target="I-D.ietf-ace-key-groupcomm-oscore"/>.</t>
          </li>
          <li>
            <t>According to this document, the AS includes the 'access_token' parameter specifying the issued access token in the Access Token Response. An alternative workflow where the access token is uploaded by the AS directly to the RS is described in <xref target="I-D.ietf-ace-workflow-and-params"/>.</t>
          </li>
        </ul>
        <t>The AS <bcp14>MUST</bcp14> include the following information as metadata of the issued access token. The use of CBOR web tokens (CWT) as specified in <xref target="RFC8392"/> is <bcp14>RECOMMENDED</bcp14>.</t>
        <ul spacing="normal">
          <li>
            <t>The profile "coap_group_oscore". If the access token is a CWT, this is specified in the 'ace_profile' claim of the access token, as per <xref section="5.10" sectionFormat="of" target="RFC9200"/>.</t>
          </li>
          <li>
            <t>The salt input specified in the 'salt_input' parameter of the Access Token Request. If the access token is a CWT, the content of the 'salt_input' parameter <bcp14>MUST</bcp14> be specified in the 'salt_input' claim of the access token, defined in <xref target="salt_input_claim"/> of this document.</t>
          </li>
          <li>
            <t>The Context ID input specified in the 'context_id' parameter of the Access Token Request. If the access token is a CWT, the content of the 'context_id' parameter <bcp14>MUST</bcp14> be specified in the 'context_id' claim of the access token, defined in <xref target="context_id_claim"/> of this document.</t>
          </li>
          <li>
            <t>The authentication credential that the client uses in the OSCORE group and specified in the 'req_cnf' parameter of the Access Token Request.  </t>
            <t>
If the access token is a CWT, the client's authentication credential <bcp14>MUST</bcp14> be specified in the 'cnf' claim, which follows the syntax from <xref section="3.1" sectionFormat="of" target="RFC8747"/>. In particular, the 'cnf' claim includes the same authentication credential specified in the 'req_cnf' parameter of the Access Token Request (see <xref target="sec-c-as-token-endpoint"/>).</t>
          </li>
        </ul>
        <t><xref target="fig-example-AS-to-C"/> shows an example of such an AS response. The access token has been truncated for readability.</t>
        <figure anchor="fig-example-AS-to-C">
          <name>Example AS-to-C Access Token Response with the Group OSCORE Profile.</name>
          <artwork><![CDATA[
Header: Created (Code=2.01)
Content-Format: 19 (application/ace+cbor)
Payload:
{
  / access_token / 1 : h'8343a1010aa2044c...00', / elided for brevity /
  / ace_profile / 38 : e'coap_group_oscore',
  / expires_in /   2 : 3600
}
]]></artwork>
        </figure>
        <t><xref target="fig-example-AS-to-C-CWT"/> shows an example CWT Claims Set, containing the client's public key in the group (as PoP key), as specified by the inner confirmation value in the 'cnf' claim.</t>
        <figure anchor="fig-example-AS-to-C-CWT">
          <name>Example CWT Claims Set.</name>
          <artwork><![CDATA[
{
  / aud /           3 : "tempSensorInLivingRoom",
  / iat /           6 : 1719820800,
  / exp /           4 : 2035353600,
  / scope /         9 : "temperature_g firmware_p",
  e'context_id_claim' : h'abcd0000',
  e'salt_input_claim' : h'00',
  / cnf /           8 : {
    e'kccs' : {
      / sub / 2 : "42-50-31-FF-EF-37-32-39",
      / cnf / 8 : {
        / COSE_Key / 1 : {
          / kty /  1 : 2 / EC2 /,
          / crv / -1 : 1 / P-256 /,
          / x /   -2 : h'd7cc072de2205bdc1537a543d53c60a6
                         acb62eccd890c7fa27c9e354089bbe13',
          / y /   -3 : h'f95e1d4b851a2cc80fff87d8e23f22af
                         b725d535e515d020731e79a3b4e47120'
        }
      }
    }
  }
}
]]></artwork>
        </figure>
        <t>The same CWT Claims Set as in <xref target="fig-example-AS-to-C-CWT"/> and encoded in CBOR is shown in <xref target="fig-example-AS-to-C-CWT-encoding"/>, using the value abbreviations defined in <xref target="RFC9200"/> and <xref target="RFC8747"/>. The bytes in hexadecimal are reported in the first column, while their corresponding CBOR meaning is reported after the "#" sign on the second column, for easiness of readability.</t>
        <t>Editor's note: it should be checked (and in case fixed) that the values used below (which are not yet registered) are the final values registered by IANA.</t>
        <figure anchor="fig-example-AS-to-C-CWT-encoding">
          <name>Example CWT Claims Set Using CBOR Encoding.</name>
          <artwork><![CDATA[
A7                                      # map(7)
   03                                   # unsigned(3)
   76                                   # text(22)
      74656D7053656E736F72496E4C6976696E67526F6F6D
      # "tempSensorInLivingRoom"
   06                                   # unsigned(6)
   1A 66826200                          # unsigned(1719820800)
   04                                   # unsigned(4)
   1A 79510800                          # unsigned(2035353600)
   09                                   # unsigned(9)
   78 18                                # text(24)
      74656D70657261747572655F67206669726D776172655F70
      # "temperature_g firmware_p"
   18 33                                # unsigned(51)
   44                                   # bytes(4)
      ABCD0000
   18 34                                # unsigned(52)
   41                                   # bytes(1)
      00
   08                                   # unsigned(8)
   A1                                   # map(1)
      0E                                # unsigned(14)
      A2                                # map(2)
         02                             # unsigned(2)
         77                             # text(23)
            34322D35302D33312D46462D45462D33372D33322D3339
            # "42-50-31-FF-EF-37-32-39"
         08                             # unsigned(8)
         A1                             # map(1)
            01                          # unsigned(1)
            A4                          # map(4)
               01                       # unsigned(1)
               02                       # unsigned(2)
               20                       # negative(0)
               01                       # unsigned(1)
               21                       # negative(1)
               58 20                    # bytes(32)
                  D7CC072DE2205BDC1537A543D53C60A6
                  ACB62ECCD890C7FA27C9E354089BBE13
               22                       # negative(2)
               58 20                    # bytes(32)
                  F95E1D4B851A2CC80FFF87D8E23F22AF
                  B725D535E515D020731E79A3B4E47120
]]></artwork>
        </figure>
        <section anchor="sec-as-update-access-rights">
          <name>Update of Access Rights</name>
          <t>[</t>
          <t>TODO: Specify how the AS issues an access token that dynamically updates the access rights of C. (See below for pre-requirements and a high-level direction)</t>
          <t>(This should be specified with content in the present section, as well as in <xref target="sec-c-as-token-endpoint"/> and <xref target="sec-rs-update-access-rights"/>).</t>
          <t>At the moment, this profile does not support the dynamic update of access rights for the client like other transport profiles of ACE do.</t>
          <t>This can be enabled by building on concepts defined in <xref target="I-D.ietf-ace-workflow-and-params"/>:</t>
          <ul spacing="normal">
            <li>
              <t>"Token series" - In this profile, it would be specialized as a set of consecutive access tokens issued by the AS for the pair (C, AUD), where C is the client whose public authentication credential is bound to those access tokens, while AUD is the audience for which C requests those access tokens.</t>
            </li>
            <li>
              <t>"token_series_id" - At the time of writing, <xref target="I-D.ietf-ace-workflow-and-params"/> describes the intended direction for defining this new prospective parameter, to be used in the Access Token Request/Response exchange between C and the AS.  </t>
              <t>
This parameter is meant to specify the unique identifier of a token series. In parallel, it is planned to define a new, corresponding claim to include into access tokens.</t>
            </li>
          </ul>
          <t>At a high-level, the above can enable the dynamic update of access rights as follows:</t>
          <ul spacing="normal">
            <li>
              <t>Each access token in a token series includes the claim "token_series_id", with value the identifier of the token series that the access token belongs to.</t>
            </li>
            <li>
              <t>When issuing the first access token in a token series, the AS includes the parameter "token_series_id" in the Access Token Response to the client, with value the identifier of the token series that the access token belongs to.</t>
            </li>
            <li>
              <t>When C requests from the AS an access token that dynamically updates its current access rights to access protected resources at the same audience, C sends to the AS an Access Token Request such that:  </t>
              <ul spacing="normal">
                <li>
                  <t>It includes the parameter "token_series_id", with value the identifier of the token series for which the new access token is requested.</t>
                </li>
                <li>
                  <t>It does <em>not</em> include the parameters "context_id", "salt_input", and "client_cred_verify" or "client_cred_verify_mac".</t>
                </li>
              </ul>
            </li>
            <li>
              <t>If the AS issues the new access token that dynamically updated the access rights of C, then the access token includes the claim "token_series_id", with value the identifier of the same token series for which the access token has been issued.</t>
            </li>
          </ul>
          <t>When receiving the new access token, the RS uses the value of the claim "token_series_id", and identifies the stored old access token that has to be superseded by the new one, as both belonging to the same token series.</t>
          <t>]</t>
        </section>
        <section anchor="context_id_claim">
          <name>'context_id' Claim</name>
          <t>The 'context_id' claim provides a value that the client requesting the access token wishes to use with the RS, as a hint for a security context.</t>
          <t>This parameter specifies the value of the Context ID input, encoded as a CBOR byte string.</t>
        </section>
        <section anchor="salt_input_claim">
          <name>'salt_input' Claim</name>
          <t>The 'salt_input' claim provides a value that the client requesting the access token wishes to use as a part of a salt with the RS, e.g., for deriving cryptographic material.</t>
          <t>This parameter specifies the value of the salt input, encoded as a CBOR byte string.</t>
        </section>
      </section>
    </section>
    <section anchor="sec-c-rs-comm">
      <name>Client-RS Communication</name>
      <t>This section details the POST request and response to the /authz-info endpoint between the client and the RS.</t>
      <t>The proof-of-possession required to bind the access token to the client is explicitly performed when the RS receives and verifies a request from the client protected with Group OSCORE, either with the group mode (see <xref section="7" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>) or with the pairwise mode (see <xref section="8" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>).</t>
      <t>In particular, the RS uses the client's public key bound to the access token, either when verifying the signature of the request (if protected with the group mode), or when verifying the request as integrity-protected with pairwise keying material derived from the two peers' authentication credentials and asymmetric keys (if protected with the pairwise mode). In either case, the RS also authenticates the client.</t>
      <t>Similarly, when receiving a protected response from the RS, the client uses the RS's public key either when verifying the signature of the response (if protected with the group mode), or when verifying the response as integrity-protected with pairwise keying material derived from the two peers' authentication credentials and asymmetric keys (if protected with the pairwise mode). In either case, the client also authenticates the RS. Mutual authentication is only achieved after the client has successfully verified the protected response from the RS.</t>
      <t>Therefore, an attacker using a stolen access token cannot generate a valid Group OSCORE message as protected through the client's private key, and thus cannot prove possession of the PoP key bound to the access token. Also, if a client legitimately owns an access token but has not joined the OSCORE group, it cannot generate a valid Group OSCORE message, as it does not store the necessary keying material shared among the group members.</t>
      <t>Furthermore, a client C1 is supposed to obtain a valid access token from the AS, as specifying its own authentication credential (and the public key included thereof) associated with its own private key used in the OSCORE group, together with its own Sender ID in that OSCORE group (see <xref target="sec-c-as-token-endpoint"/>). This allows the RS receiving the access token to verify with the Group Manager of that OSCORE group whether such a client indeed has that Sender ID and uses that authentication credential in the OSCORE group.</t>
      <t>As a consequence, a different client C2, also member of the same OSCORE group, is not able to impersonate C1, by: i) getting a valid access token, specifying the Sender ID of C1 and a different (made-up) authentication credential; ii) successfully posting the access token to the RS; and then iii) attempting to communicate using Group OSCORE and impersonating C1, while also blaming C1 for the consequences of the interaction with the RS.</t>
      <section anchor="sec-c-rs-authz">
        <name>C-to-RS POST to /authz-info Endpoint</name>
        <t>The client uploads the access token to the /authz-info endpoint of the RS, as defined in <xref section="5.10.1" sectionFormat="of" target="RFC9200"/>.</t>
      </section>
      <section anchor="sec-rs-c-created">
        <name>RS-to-C: 2.01 (Created)</name>
        <t>The RS <bcp14>MUST</bcp14> verify the validity of the access token as defined in <xref section="5.10.1" sectionFormat="of" target="RFC9200"/>, with the following additions.</t>
        <ul spacing="normal">
          <li>
            <t>The RS checks that the claims 'context_id', 'salt_input', and 'cnf' are included in the access token.  </t>
            <t>
If any of these claims are missing or malformed, the RS <bcp14>MUST</bcp14> consider the access token invalid, and <bcp14>MUST</bcp14> reply to the client with an error response code equivalent to the CoAP code 4.00 (Bad Request).  </t>
            <t>
Otherwise, the RS retrieves:  </t>
            <ul spacing="normal">
              <li>
                <t>GID* as the GID of the OSCORE group, specified in the 'context_id' claim.</t>
              </li>
              <li>
                <t>SID* as the Sender ID that the client has in the OSCORE group, specified in the 'salt_input' claim.</t>
              </li>
              <li>
                <t>AUTH_CRED_C* as the authentication credential that the client uses in the OSCORE group, specified in the inner confirmation value of the 'cnf' claim.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>The RS builds GROUPS as the set of OSCORE groups such that all the following conditions hold, for each group G in the set.  </t>
            <ul spacing="normal">
              <li>
                <t>The RS is a member of the group G.</t>
              </li>
              <li>
                <t>The group G has GID* as current GID.</t>
              </li>
              <li>
                <t>The audience targeted by the access token is consistent with using the group G for accessing protected resources hosted by the RS.</t>
              </li>
            </ul>
            <t>
If no such group is found, the RS <bcp14>MUST</bcp14> consider the access token invalid, and <bcp14>MUST</bcp14> reply to the client with an error response code equivalent to the CoAP code 4.00 (Bad Request).  </t>
            <t>
Otherwise, for each of the N &gt;= 1 groups G in the set GROUPS, the RS <bcp14>MUST</bcp14> request to the corresponding Group Manager the authentication credential that the client uses in G, specifying SID* in the request sent to the Group Manager (see <xref section="9.3" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm-oscore"/>).  </t>
            <t>
When receiving a successful response from each of the Group Managers, the RS <bcp14>MUST</bcp14> check whether the client's authentication credential AUTH_CRED_C retrieved from the Group Manager is equal to AUTH_CRED_C* retrieved from the access token.  </t>
            <t>
If any of the following conditions hold, the RS <bcp14>MUST</bcp14> consider the access token invalid, and <bcp14>MUST</bcp14> reply to the client with an error response code equivalent to the CoAP code 5.03 (Service Unavailable).  </t>
            <ul spacing="normal">
              <li>
                <t>None or more than one of the Group Managers provide the RS with a successful response where the conveyed AUTH_CRED_C is equal to AUTH_CRED_C*.</t>
              </li>
              <li>
                <t>After having performed a maximum, pre-configured amount of attempts, or after a maximum, pre-configured amount of time has elapsed, less than N Group Managers have sent a successful response to the RS.</t>
              </li>
            </ul>
            <t>
The process above is successful if and only if the RS receives a successful response from all the N Group Managers, and exactly one of such responses conveys AUTH_CRED_C equal to AUTH_CRED_C*. This ensures that there is only one OSCORE group G* such that: the client and the RS are both its members; it has GID* as current GID; and the client uses SID* as Sender ID in the group. In turn, this will ensure that the RS can bound the access token to such single OSCORE group G*.</t>
          </li>
        </ul>
        <t>If the operations above are successful, the access token is valid, and further checks on its content are successful, then the RS associates the authorization information from the access token with the Group OSCORE Security Context of the OSCORE group G*.</t>
        <t>In particular, the RS associates the authorization information from the access token with the quartet (GID, SaltInput, AuthCred, AuthCredGM), where:</t>
        <ul spacing="normal">
          <li>
            <t>GID is the Group Identifier of G* (i.e.,  GID*).</t>
          </li>
          <li>
            <t>SaltInput is the Sender ID that the client uses in G* (i.e., SID*).</t>
          </li>
          <li>
            <t>AuthCred is the authentication credential that the client uses in G* (i.e., AUTH_CRED_C*).</t>
          </li>
          <li>
            <t>AuthCredGM is the authentication credential of the Group Manager responsible for G* (see <xref section="2.1.6" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>).</t>
          </li>
        </ul>
        <t>The RS <bcp14>MUST</bcp14> keep this association up-to-date over time, as the quartet (GID, SaltInput, AuthCred, AuthCredGM) associated with the access token might change. In particular:</t>
        <ul spacing="normal">
          <li>
            <t>If the OSCORE group is rekeyed (see <xref section="12.2" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/> and <xref section="11" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm-oscore"/>), the Group Identifier also changes in the group, and the new one replaces the current 'GID' value in the quartet (GID, SaltInput, AuthCred, AuthCredGM).</t>
          </li>
          <li>
            <t>If the client requests and obtains a new OSCORE Sender ID from the Group Manager (see <xref section="2.6.3.1" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/> and <xref section="9.2" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm-oscore"/>), the new Sender ID replaces the current 'SaltInput' value in the quartet (GID, SaltInput, AuthCred, AuthCredGM).</t>
          </li>
          <li>
            <t>If the Group Manager of the OSCORE group changes its authentication credential, the new authentication credential of the Group Manager replaces the current 'AuthCredGM' value in the quartet (GID, SaltInput, AuthCred, AuthCredGM).  </t>
            <t>
In order to obtain the latest authentication credential of the Group Manager, the RS can re-join the group (see <xref section="6" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm-oscore"/>) or send a dedicated request to the Group Manager (see <xref section="9.3" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm-oscore"/>).</t>
          </li>
        </ul>
        <t>As defined in <xref target="sec-client-public-key-change"/>, a possible change of the client's authentication credential requires the client to upload to the RS a new access token bound to the new authentication credential.</t>
        <t>Finally, the RS <bcp14>MUST</bcp14> send a 2.01 (Created) response to the client, as defined in <xref section="5.10.1" sectionFormat="of" target="RFC9200"/>.</t>
      </section>
      <section anchor="sec-client-rs-secure-communication">
        <name>Client-RS Secure Communication</name>
        <t>When previously joining the OSCORE group, both the client and the RS have already established the related Group OSCORE Security Context to communicate as group members. Therefore, they can simply start to securely communicate using Group OSCORE, without deriving any additional keying material or security association.</t>
        <t>If either of the client or the RS deletes an access token (e.g., when the access token has expired or has been revoked), it <bcp14>MUST NOT</bcp14> delete the related Group OSCORE Security Context. The client <bcp14>MAY</bcp14> request a new access token from the AS, to be uploaded to the RS for re-enabling access to protected resources for the client.</t>
        <section anchor="client-side">
          <name>Client Side</name>
          <t>After having received the 2.01 (Created) response from the RS, following the POST request to the /authz-info endpoint, the client starts the communication with the RS, by sending a request protected with Group OSCORE using the Group OSCORE Security Context <xref target="I-D.ietf-core-oscore-groupcomm"/>.</t>
          <t>When communicating with the RS to access the resources as specified by the authorization information, the client <bcp14>MUST</bcp14> use the Group OSCORE Security Context of the pertinent OSCORE group, whose GID was specified in the 'context_id' parameter of the Access Token Request.</t>
        </section>
        <section anchor="resource-server-side">
          <name>Resource Server Side</name>
          <t>After successful validation of the access token as defined in <xref target="sec-rs-c-created"/> and after having sent the 2.01 (Created) response, the RS can start to communicate with the client using Group OSCORE <xref target="I-D.ietf-core-oscore-groupcomm"/>.</t>
          <t>When processing an incoming request protected with Group OSCORE, the RS <bcp14>MUST</bcp14> consider as valid client's authentication credential only the one associated with the stored access token. As defined in <xref target="sec-client-public-key-change"/>, a possible change of the client's authentication credential requires the client to upload to the RS a new access token bound to the new authentication credential.</t>
          <t>For every incoming request, if Group OSCORE verification succeeds, the verification of access rights is performed as described in <xref target="sec-c-rs-access-rights"/>.</t>
          <t>If the RS receives a request protected with a Group OSCORE Security Context CTX, the target resource requires authorization, and the RS does not store a valid access token related to CTX, then the RS <bcp14>MUST</bcp14> reply with a 4.01 (Unauthorized) error response protected with CTX.</t>
        </section>
      </section>
      <section anchor="sec-rs-update-access-rights">
        <name>Update of Access Rights</name>
        <t>[</t>
        <t>TODO: Specify the processing on the RS when receiving an access token that dynamically updates the access rights of C. (See <xref target="sec-as-update-access-rights"/> for pre-requirements and a high-level direction)</t>
        <t>]</t>
      </section>
      <section anchor="sec-c-rs-access-rights">
        <name>Access Rights Verification</name>
        <t>The RS <bcp14>MUST</bcp14> follow the procedures defined in <xref section="5.10.2" sectionFormat="of" target="RFC9200"/>. If an RS receives a request protected with Group OSCORE from a client, the RS processes the request according to <xref target="I-D.ietf-core-oscore-groupcomm"/>.</t>
        <t>If the Group OSCORE verification succeeds and the target resource requires authorization, the RS retrieves the authorization information from the access token associated with the Group OSCORE Security Context.</t>
        <t>In particular, the RS retrieves the access token associated with the quartet (GID, SaltInput, AuthCred, AuthCredGM), where:</t>
        <ul spacing="normal">
          <li>
            <t>GID is the Group Identifier of the OSCORE group, which is specified in the 'kid context' parameter of the CoAP OSCORE option in the received request. The RS maintains GID in its Common Context within the Group OSCORE Security Context associated with the OSCORE group (see <xref section="2" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>).</t>
          </li>
          <li>
            <t>SaltInput is the Sender ID that the client has in the OSCORE group, which is specified in the 'kid' parameter of the CoAP OSCORE option in the received request. The RS maintains SaltInput in its Recipient Context associated with the client, within the Group OSCORE Security Context associated with the OSCORE group (see <xref section="2" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>).</t>
          </li>
          <li>
            <t>AuthCred is the authentication credential that the client uses in the OSCORE group. The RS maintains AuthCred in its Recipient Context associated with the client, within the Group OSCORE Security Context associated with the OSCORE group (see <xref section="2" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>).</t>
          </li>
          <li>
            <t>AuthCredGM is the authentication credential of the Group Manager responsible for the OSCORE group. The RS maintains AuthCredGM in its Common Context within the Group OSCORE Security Context associated with the OSCORE group (see <xref section="2" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>).</t>
          </li>
        </ul>
        <t>Then, the RS <bcp14>MUST</bcp14> verify that the action requested on the resource is authorized.</t>
        <t>If the RS has no valid access token for the client, the RS <bcp14>MUST</bcp14> reject the request and <bcp14>MUST</bcp14> reply to the client with a 4.01 (Unauthorized) error response.</t>
        <t>If the RS has an access token for the client but no actions are authorized on the target resource, the RS <bcp14>MUST</bcp14> reject the request and <bcp14>MUST</bcp14> reply to the client with a 4.03 (Forbidden) error response.</t>
        <t>If the RS has an access token for the client but the requested action is not authorized, the RS <bcp14>MUST</bcp14> reject the request and <bcp14>MUST</bcp14> reply to the client with a 4.05 (Method Not Allowed) error response.</t>
      </section>
      <section anchor="sec-multiple-pop-keys">
        <name>Storing Multiple Access Tokens per PoP Key</name>
        <t>According to <xref section="5.10.1" sectionFormat="of" target="RFC9200"/>, an RS is recommended to store only one access token per proof-of-possession (PoP) key, and to supersede such an access token when receiving and successfully validating a new one bound to the same PoP key.</t>
        <t>However, when using the profile specified in this document, an RS might practically have to deviate from that recommendation and store multiple access tokens bound to the same PoP key, i.e., to the same public authentication credential of a client.</t>
        <t>For example, this can occur in the following cases.</t>
        <ul spacing="normal">
          <li>
            <t>The RS is the single RS associated with an audience AUD1, and also belongs to a group-audience AUD2 (see <xref section="6.9" sectionFormat="of" target="RFC9200"/>).  </t>
            <t>
A client C with public authentication credential AUTH_CRED_C can request two access tokens T1 and T2 from the AS, such that:  </t>
            <ul spacing="normal">
              <li>
                <t>T1 targets AUD1 and has scope SCOPE1;</t>
              </li>
              <li>
                <t>T2 targets AUD2 and has scope SCOPE2 different from SCOPE1.</t>
              </li>
            </ul>
            <t>
Both T1 and T2 are going to be bound to the same PoP key specified by AUTH_CRED_C.  </t>
            <t>
In fact, if the AS issues access tokens targeting a group-audience, then the above can possibly be the case when using any transport profile of ACE that supports asymmetric PoP keys. If so, the RS should be ready to store at minimum one access token per PoP key per audience it belongs to.</t>
          </li>
          <li>
            <t>The RS is a member of two OSCORE groups G1 and G2. In particular, the same format of public authentication credentials is used in both OSCORE groups.  </t>
            <t>
A client C with public authentication credential AUTH_CRED_C of such format, also member of the two OSCORE group G1 and G2, can conveniently use AUTH_CRED_C as its public authentication credential in both those groups. Therefore, C can request two access tokens T1 and T2 from the AS, such that:  </t>
            <ul spacing="normal">
              <li>
                <t>T1 targets RS and reflects the membership of C in G1, as per its claims "context_id" and "salt_input";</t>
              </li>
              <li>
                <t>T2 targets RS and reflects the membership of C in G2, as per its claims "context_id" and "salt_input".</t>
              </li>
            </ul>
            <t>
Both T1 and T2 are going to be bound to the same PoP key specified by AUTH_CRED_C.  </t>
            <t>
When using the profile specified in this document, the RS should be ready to store at minimum one access token per PoP key per OSCORE group it is a member of (although, per the previous point, even this can be limiting).</t>
          </li>
          <li>
            <t>The RS uses both the profile specified in this document and a different transport profile of ACE that also relies on asymmetric PoP keys, e.g., the EDHOC and OSCORE profile defined in <xref target="I-D.ietf-ace-edhoc-oscore-profile"/>.  </t>
            <t>
In such a case, a client C with public authentication credential AUTH_CRED_C can request two access tokens T1 and T2 from the AS, such that:  </t>
            <ul spacing="normal">
              <li>
                <t>T1 targets RS and is meant to be used according to the Group OSCORE profile defined in this document;</t>
              </li>
              <li>
                <t>T2 targets RS and is meant to be used according to the EDHOC and OSCORE profile defined in <xref target="I-D.ietf-ace-edhoc-oscore-profile"/>.</t>
              </li>
            </ul>
            <t>
Both T1 and T2 are going to be bound to the same PoP key specified by AUTH_CRED_C.  </t>
            <t>
When using multiple transport profiles of ACE that rely on asymmetric PoP keys, it is reasonable that the RS is capable to store at minimum one access token per PoP key per used profile (although, per the previous points, even this can be limiting).</t>
          </li>
        </ul>
        <t>In order to keep the same spirit of the recommendation in <xref section="5.10.1" sectionFormat="of" target="RFC9200"/> without impeding cases such as those outlined in the examples above, the following defines a more fine-grained recommendations for the storage of access tokens at an RS when this profile is used.</t>
        <ul spacing="normal">
          <li>
            <t>As to access tokens issued in accordance with this profile (i.e., specifying the profile "coap_group_oscore"), it is <bcp14>RECOMMENDED</bcp14> that an RS stores only one access token that:  </t>
            <ul spacing="normal">
              <li>
                <t>is bound to a specific PoP key; and</t>
              </li>
              <li>
                <t>targets a specific audience; and</t>
              </li>
              <li>
                <t>is related to a specific OSCORE group.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>As to access tokens issued in accordance with a different profile P that an RS may use in parallel with the profile defined in this document, it is <bcp14>RECOMMENDED</bcp14> that an RS stores only one access token that:  </t>
            <ul spacing="normal">
              <li>
                <t>is issued in accordance with the profile P; and</t>
              </li>
              <li>
                <t>is bound to a specific PoP key; and</t>
              </li>
              <li>
                <t>targets a specific audience; and</t>
              </li>
              <li>
                <t>is related to a specific secure association used by the client to protect communications with the RS.</t>
              </li>
            </ul>
          </li>
        </ul>
        <t>In accordance with these recommendations, if an access token T_NEW does not differ in any of the respects above from an existing access token T_OLD stored at the RS, then T_NEW will supersede T_OLD by replacing the corresponding authorization information.</t>
        <t>Not complying with these recommendations can additionally complicate (constrained) implementations of RSs, with respect to required storage and the validation of a protected request against the applicable, stored access tokens associated with the same client. That is, it increases the strain on an RS in determining the actual permissions of a client, e.g., if access tokens contradict each other and thus might lead the RS to enforce wrong permissions. Moreover, if one of the access tokens expires earlier than others, the resulting permissions may offer insufficient protection.</t>
      </section>
    </section>
    <section anchor="sec-client-public-key-change">
      <name>Change of Client's Authentication Credential in the Group</name>
      <t>During its membership in the OSCORE group, the client might change the authentication credential that it uses in the group. When this happens, the client uploads the new authentication credential to the Group Manager, as defined in <xref section="9.4" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm-oscore"/>.</t>
      <t>After that, and in order to continue communicating with the RS, the client <bcp14>MUST</bcp14> perform the following actions.</t>
      <ol spacing="normal" type="1"><li>
          <t>The client requests a new access token T_NEW to the AS, as defined in <xref target="sec-c-as-comm"/>. In particular, when sending the Access Token Request as defined in <xref target="sec-c-as-token-endpoint"/>, the client specifies:  </t>
          <ul spacing="normal">
            <li>
              <t>The current Group Identifier of the OSCORE group, as value of the 'context_id' parameter.</t>
            </li>
            <li>
              <t>The current Sender ID that it has in the OSCORE group, as value of the 'salt_input' parameter.</t>
            </li>
            <li>
              <t>The new authentication credential that it uses in the OSCORE group, as inner confirmation value of the 'req_cnf' parameter.</t>
            </li>
            <li>
              <t>The proof-of-possession (PoP) evidence corresponding to the public key of the new authentication credential, as value of the 'client_cred_verify' or 'client_cred_verify_mac' parameter.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>After receiving the Access Token Response from the AS (see <xref target="sec-as-c-token"/>), the client performs the same exchanges with the RS as defined in <xref target="sec-c-rs-comm"/>.</t>
        </li>
      </ol>
      <t>When receiving the new access token T_NEW, the RS performs the same steps defined in <xref target="sec-rs-c-created"/>, with the following addition in case the new access token is successfully verified and stored:</t>
      <ul spacing="normal">
        <li>
          <t>The RS deletes any stored access token T_OLD such that the associated quartet (GID, SaltInput, AuthCred, AuthCredGM) differs from the same quartet associated with T_NEW only as to the value of AuthCred.</t>
        </li>
      </ul>
    </section>
    <section anchor="sec-comm-as">
      <name>Secure Communication with the AS</name>
      <t>As specified in the ACE framework (see Sections <xref target="RFC9200" section="5.8" sectionFormat="bare"/> and <xref target="RFC9200" section="5.9" sectionFormat="bare"/> of <xref target="RFC9200"/>), the requesting entity (client and/or RS) and the AS communicate via the /token or /introspect endpoint. The use of CoAP and OSCORE <xref target="RFC8613"/> for this communication is <bcp14>RECOMMENDED</bcp14> in this profile. Other protocols fulfilling the security requirements defined in Sections <xref target="RFC9200" section="5" sectionFormat="bare"/> and <xref target="RFC9200" section="6" sectionFormat="bare"/> of <xref target="RFC9200"/> (such as HTTP and DTLS or TLS) <bcp14>MAY</bcp14> be used instead.</t>
      <t>If OSCORE <xref target="RFC8613"/> is used, the requesting entity and the AS are expected to have a pre-established Security Context in place. How this Security Context is established is out of the scope of this profile. Furthermore, the requesting entity and the AS communicate using OSCORE through the /token endpoint as specified in <xref section="5.8" sectionFormat="of" target="RFC9200"/>, and through the /introspect endpoint as specified in <xref section="5.9" sectionFormat="of" target="RFC9200"/>.</t>
    </section>
    <section anchor="sec-discard-context">
      <name>Discarding the Security Context</name>
      <t>As members of an OSCORE group, the client and the RS may independently leave the group or be forced to, e.g., if compromised or suspected so. Upon leaving the OSCORE group, the client or RS also discards the Group OSCORE Security Context, which may anyway be renewed by the Group Manager through a group rekeying process (see <xref section="12.2" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>).</t>
      <t>The client or RS can acquire a new Group OSCORE Security Context, by re-joining the OSCORE group, e.g., by using the approach defined in <xref target="I-D.ietf-ace-key-groupcomm-oscore"/>. In such a case, the client <bcp14>SHOULD</bcp14> request a new access token to be uploaded to the RS.</t>
    </section>
    <section anchor="sec-multiple-profiles">
      <name>Guidelines on Using Multiple Profiles</name>
      <t>When using the profile defined in this document, access tokens are to be bound to a Group OSCORE Security Context, which is used to protect communications between the client and the RS(s) in the targeted audience by using the security protocol Group OSCORE.</t>
      <t>After having obtained an access token T1 for this profile and uploaded it to the RS (RSs) pertaining to the targeted audience, the client might want to establish a separate, pairwise OSCORE association with that RS (with one RS among those RSs). In order to do that, the client can ask the AS for a different access token T2 intended for that RS (for one RS among those RSs), as per the OSCORE profile defined in <xref target="RFC9203"/>.</t>
      <t>Since the ACE framework does not allow the client to negotiate with the AS the profile to use, the client has instead to choose the use of the OSCORE profile, and to explicitly indicate it to the AS when requesting T2.</t>
      <t>To this end, the client may indicate its wish for an access token aligned with the Group OSCORE profile or with the OSCORE profile, by specifying one of two different audiences in the 'audience' parameter of the Access Token Request to the AS. Assuming a proper configuration of the access policies at the AS, this is still conducive to a consistent evaluation of what is specified in the 'scope' parameter of the Access Token Request against the access policies at the AS.</t>
      <t>For example, an RS registered at the AS can be associated with two audiences:</t>
      <ul spacing="normal">
        <li>
          <t>"AUD_GP_OSC", which the client can use to request an access token for the Group OSCORE profile and targeting (also) that RS. That is, the client specifies this audience when requesting the access token T1.</t>
        </li>
        <li>
          <t>"AUD_OSC", which the client can use to request an access token for the OSCORE profile and targeting only that RS. That is, the client specifies this audience when requesting the access token T2.</t>
        </li>
      </ul>
      <t>Note that an RS has to be able to store at least one access token per PoP key. When specifically considering the Group OSCORE profile and the OSCORE profile, the RS can always store both corresponding access tokens T1 and T2, since they are always bound to different PoP keys. That is:</t>
      <ul spacing="normal">
        <li>
          <t>In the Group OSCORE profile, the PoP key is the client's public key, which is included in the client's authentication credential specified in the 'cnf' claim of the access token.</t>
        </li>
        <li>
          <t>In the OSCORE profile, the PoP key is fundamentally an OSCORE Master Secret, which is specified within the OSCORE_Input_Material object of the 'cnf' claim of the access token.</t>
        </li>
      </ul>
      <t>The same approach discussed above can be used in case the profile used for the access token T2 is instead the EDHOC and OSCORE profile defined in <xref target="I-D.ietf-ace-edhoc-oscore-profile"/>. In such a case, the same PoP key might be bound to both T1 and T2, i.e., if the client's public key is included both in the authentication credential that the client uses in the OSCORE group and in the authentication credential that the client uses as CRED_I (CRED_R) when running the EDHOC protocol in the forward (reverse) message flow.</t>
      <t><xref target="sec-multiple-pop-keys"/> provides considerations and recommendations on storing multiple access tokens per PoP key when using the Group OSCORE profile, also in parallel with alternative profiles.</t>
    </section>
    <section anchor="sec-cbor-mappings">
      <name>CBOR Mappings</name>
      <t>The new parameters defined in this document <bcp14>MUST</bcp14> be mapped to CBOR types as specified in <xref target="_table-cbor-mappings-parameters"/>, using the given integer abbreviation for the map key.</t>
      <table align="center" anchor="_table-cbor-mappings-parameters">
        <name>CBOR Mappings for New Parameters.</name>
        <thead>
          <tr>
            <th align="left">Parameter name</th>
            <th align="left">CBOR Key</th>
            <th align="left">Value Type</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">context_id</td>
            <td align="left">TBD</td>
            <td align="left">byte string</td>
          </tr>
          <tr>
            <td align="left">salt_input</td>
            <td align="left">TBD</td>
            <td align="left">byte string</td>
          </tr>
          <tr>
            <td align="left">client_cred_verify</td>
            <td align="left">TBD</td>
            <td align="left">byte string</td>
          </tr>
          <tr>
            <td align="left">client_cred_verify_mac</td>
            <td align="left">TBD</td>
            <td align="left">byte string</td>
          </tr>
        </tbody>
      </table>
      <t>The new claims defined in this document <bcp14>MUST</bcp14> be mapped to CBOR types as specified in <xref target="_table-cbor-mappings-claims"/>, using the given integer abbreviation for the map key.</t>
      <table align="center" anchor="_table-cbor-mappings-claims">
        <name>CBOR Mappings for New Claims.</name>
        <thead>
          <tr>
            <th align="left">Claim name</th>
            <th align="left">CBOR Key</th>
            <th align="left">Value Type</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">context_id</td>
            <td align="left">TBD</td>
            <td align="left">byte string</td>
          </tr>
          <tr>
            <td align="left">salt_input</td>
            <td align="left">TBD</td>
            <td align="left">byte string</td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="sec-security-considerations">
      <name>Security Considerations</name>
      <t>This document specifies a profile for the Authentication and Authorization for Constrained Environments (ACE) framework <xref target="RFC9200"/>. Thus, the general security considerations from the ACE framework also apply to this profile.</t>
      <t>The proof-of-possession (PoP) key bound to an access token is always an asymmetric key, i.e., the public key included in the authentication credential that the client uses in the OSCORE group. This means that there is never a same shared secret used as PoP key with possible multiple RSs. Therefore, it is possible and safe for the AS to issue an access token for an audience that includes multiple RSs (i.e., a group-audience, see <xref section="6.9" sectionFormat="of" target="RFC9200"/>).</t>
      <t>In such a case, as per <xref section="6.1" sectionFormat="of" target="RFC9200"/>, the AS has to ensure the integrity protection of the access token by protecting it through an asymmetric signature. In addition, the used group-audience has to correctly identify all the RSs that are intended recipients of the access token, and for which the single scope specified in the access token applies. As a particular case, the audience can be the name of the OSCORE group, if the access token is intended for all the RSs in that group.</t>
      <t>Furthermore, this document inherits the general security considerations about Group OSCORE <xref target="I-D.ietf-core-oscore-groupcomm"/>, as to the specific use of Group OSCORE according to this profile.</t>
      <t>Group OSCORE is designed to secure point-to-point as well as point-to-multipoint communications, providing a secure binding between a single request and multiple corresponding responses. In particular, Group OSCORE fulfills the same security requirements of OSCORE.</t>
      <t>Group OSCORE ensures source authentication of messages both in group mode (see <xref section="7" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>) and in pairwise mode (see <xref section="8" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>).</t>
      <t>When protecting an outgoing message in group mode, the sender uses its private key to compute a digital signature, which is embedded in the protected message. The group mode can be used to protect messages sent to multiple recipients (e.g., over IP multicast) or to a single recipient.</t>
      <t>When protecting an outgoing message in pairwise mode, the sender uses a pairwise symmetric key, which is derived from the asymmetric keys of the two peers exchanging the message. The pairwise mode can be used to protect only messages intended for a single recipient.</t>
    </section>
    <section anchor="sec-privacy-considerations">
      <name>Privacy Considerations</name>
      <t>This document specifies a profile for the Authentication and Authorization for Constrained Environments (ACE) framework <xref target="RFC9200"/>. Thus the general privacy considerations from the ACE framework also apply to this profile.</t>
      <t>As this profile uses Group OSCORE, the privacy considerations from <xref target="I-D.ietf-core-oscore-groupcomm"/> apply to this document as well.</t>
      <t>An unprotected response to an unauthorized request may disclose information about the RS and/or its existing relationship with the client. It is advisable to include as little information as possible in an unencrypted response. However, since both the client and the RS share a Group OSCORE Security Context, unauthorized, yet protected requests are followed by protected responses, which can thus include more detailed information.</t>
      <t>Although it may be encrypted, the access token is sent in the clear to the /authz-info endpoint at the RS. Thus, if the client uses the same single access token from multiple locations with multiple resource servers, it can risk being tracked through the access token's value.</t>
      <t>Note that, even though communications are protected with Group OSCORE, some information might still leak, due to the observable size, source address, and destination address of exchanged messages.</t>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <t>This document has the following actions for IANA.</t>
      <t>Note to RFC Editor: Please replace "[RFC-XXXX]" with the RFC number of this document and delete this paragraph.</t>
      <section anchor="iana-ace-oauth-profile">
        <name>ACE Profiles Registry</name>
        <t>IANA is asked to add the following entry to the "ACE Profiles" registry within the "Authentication and Authorization for Constrained Environments (ACE)" registry group, following the procedure specified in <xref section="8.8" sectionFormat="of" target="RFC9200"/>.</t>
        <ul spacing="normal">
          <li>
            <t>Name: coap_group_oscore</t>
          </li>
          <li>
            <t>Description: Profile to secure communications between constrained nodes using the Authentication and Authorization for Constrained Environments framework, by enabling authentication and fine-grained authorization of members of an OSCORE group that use a pre-established Group OSCORE Security Context to communicate with Group OSCORE.</t>
          </li>
          <li>
            <t>CBOR Value: TBD (value between 1 and 255)</t>
          </li>
          <li>
            <t>Reference: [RFC-XXXX]</t>
          </li>
        </ul>
      </section>
      <section anchor="iana-oauth-params">
        <name>OAuth Parameters Registry</name>
        <t>IANA is asked to add the following entries to the "OAuth Parameters" registry, following the procedure specified in <xref section="11.2" sectionFormat="of" target="RFC6749"/>.</t>
        <ul spacing="normal">
          <li>
            <t>Name: context_id</t>
          </li>
          <li>
            <t>Parameter Usage Location: token request</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
          <li>
            <t>Reference: <xref target="context_id"/> of [RFC-XXXX]</t>
          </li>
        </ul>
        <t><br/></t>
        <ul spacing="normal">
          <li>
            <t>Name: salt_input</t>
          </li>
          <li>
            <t>Parameter Usage Location: token request</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
          <li>
            <t>Reference: <xref target="salt_input"/> of [RFC-XXXX]</t>
          </li>
        </ul>
        <t><br/></t>
        <ul spacing="normal">
          <li>
            <t>Name: client_cred_verify</t>
          </li>
          <li>
            <t>Parameter Usage Location: token request</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
          <li>
            <t>Reference: <xref target="client_cred_verify"/> of [RFC-XXXX]</t>
          </li>
        </ul>
        <t><br/></t>
        <ul spacing="normal">
          <li>
            <t>Name: client_cred_verify_mac</t>
          </li>
          <li>
            <t>Parameter Usage Location: token request</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
          <li>
            <t>Reference: <xref target="client_cred_verify_mac"/> of [RFC-XXXX]</t>
          </li>
        </ul>
      </section>
      <section anchor="iana-token-cbor-mappings">
        <name>OAuth Parameters CBOR Mappings Registry</name>
        <t>IANA is asked to add the following entries to the "OAuth Parameters CBOR Mappings" registry within the "Authentication and Authorization for Constrained Environments (ACE)" registry group, following the procedure specified in <xref section="8.10" sectionFormat="of" target="RFC9200"/>.</t>
        <ul spacing="normal">
          <li>
            <t>Name: context_id</t>
          </li>
          <li>
            <t>CBOR Key: TBD</t>
          </li>
          <li>
            <t>Value Type: byte string</t>
          </li>
          <li>
            <t>Reference: <xref target="context_id"/> of [RFC-XXXX]</t>
          </li>
          <li>
            <t>Original Specification: [RFC-XXXX]</t>
          </li>
        </ul>
        <t><br/></t>
        <ul spacing="normal">
          <li>
            <t>Name: salt_input</t>
          </li>
          <li>
            <t>CBOR Key: TBD</t>
          </li>
          <li>
            <t>Value Type: byte string</t>
          </li>
          <li>
            <t>Reference: <xref target="salt_input"/> of [RFC-XXXX]</t>
          </li>
          <li>
            <t>Original Specification: [RFC-XXXX]</t>
          </li>
        </ul>
        <t><br/></t>
        <ul spacing="normal">
          <li>
            <t>Name: client_cred_verify</t>
          </li>
          <li>
            <t>CBOR Key: TBD</t>
          </li>
          <li>
            <t>Value Type: byte string</t>
          </li>
          <li>
            <t>Reference: <xref target="client_cred_verify"/> of [RFC-XXXX]</t>
          </li>
          <li>
            <t>Original Specification: [RFC-XXXX]</t>
          </li>
        </ul>
        <t><br/></t>
        <ul spacing="normal">
          <li>
            <t>Name: client_cred_verify_mac</t>
          </li>
          <li>
            <t>CBOR Key: TBD</t>
          </li>
          <li>
            <t>Value Type: byte string</t>
          </li>
          <li>
            <t>Reference: <xref target="client_cred_verify_mac"/> of [RFC-XXXX]</t>
          </li>
          <li>
            <t>Original Specification: [RFC-XXXX]</t>
          </li>
        </ul>
      </section>
      <section anchor="iana-token-cwt-claims">
        <name>CBOR Web Token (CWT) Claims Registry</name>
        <t>IANA is asked to add the following entries to the "CBOR Web Token (CWT) Claims" registry, following the procedure specified in <xref section="9.1" sectionFormat="of" target="RFC8392"/>.</t>
        <ul spacing="normal">
          <li>
            <t>Claim Name: context_id</t>
          </li>
          <li>
            <t>Claim Description: Client provided Context ID</t>
          </li>
          <li>
            <t>JWT Claim Name: N/A</t>
          </li>
          <li>
            <t>Claim Key: TBD</t>
          </li>
          <li>
            <t>Claim Value Type: byte string</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
          <li>
            <t>Reference: <xref target="context_id_claim"/> of [RFC-XXXX]</t>
          </li>
        </ul>
        <t><br/></t>
        <ul spacing="normal">
          <li>
            <t>Claim Name: salt_input</t>
          </li>
          <li>
            <t>Claim Description: Client provided salt input</t>
          </li>
          <li>
            <t>JWT Claim Name: N/A</t>
          </li>
          <li>
            <t>Claim Key: TBD</t>
          </li>
          <li>
            <t>Claim Value Type: byte string</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
          <li>
            <t>Reference: <xref target="salt_input_claim"/> of [RFC-XXXX]</t>
          </li>
        </ul>
      </section>
      <section anchor="iana-tls-exporter-label">
        <name>TLS Exporter Label Registry</name>
        <t>IANA is asked to add the following entry to the "TLS Exporter Label" registry within the "Transport Layer Security (TLS) Parameters" registry group, following the procedure specified in <xref section="6" sectionFormat="of" target="RFC5705"/> and updated in <xref section="12" sectionFormat="of" target="RFC8447"/>.</t>
        <ul spacing="normal">
          <li>
            <t>Value: EXPORTER-ACE-PoP-Input-Client-AS</t>
          </li>
          <li>
            <t>DTLS-OK: Y</t>
          </li>
          <li>
            <t>Recommended: N</t>
          </li>
          <li>
            <t>Reference: <xref target="sec-c-as-token-endpoint"/> of [RFC-XXXX]</t>
          </li>
        </ul>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="I-D.ietf-core-groupcomm-bis">
          <front>
            <title>Group Communication for the Constrained Application Protocol (CoAP)</title>
            <author fullname="Esko Dijk" initials="E." surname="Dijk">
              <organization>IoTconsultancy.nl</organization>
            </author>
            <author fullname="Chonggang Wang" initials="C." surname="Wang">
              <organization>InterDigital</organization>
            </author>
            <author fullname="Marco Tiloca" initials="M." surname="Tiloca">
              <organization>RISE AB</organization>
            </author>
            <date day="24" month="April" year="2024"/>
            <abstract>
              <t>   This document specifies the use of the Constrained Application
   Protocol (CoAP) for group communication, including the use of UDP/IP
   multicast as the default underlying data transport.  Both unsecured
   and secured CoAP group communication are specified.  Security is
   achieved by use of the Group Object Security for Constrained RESTful
   Environments (Group OSCORE) protocol.  The target application area of
   this specification is any group communication use cases that involve
   resource-constrained devices or networks that support CoAP.  This
   document replaces and obsoletes RFC 7390, while it updates RFC 7252
   and RFC 7641.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-groupcomm-bis-11"/>
        </reference>
        <reference anchor="I-D.ietf-core-oscore-groupcomm">
          <front>
            <title>Group Object Security for Constrained RESTful Environments (Group OSCORE)</title>
            <author fullname="Marco Tiloca" initials="M." surname="Tiloca">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Göran Selander" initials="G." surname="Selander">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Francesca Palombini" initials="F." surname="Palombini">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Rikard Höglund" initials="R." surname="Höglund">
              <organization>RISE AB</organization>
            </author>
            <date day="26" month="September" year="2024"/>
            <abstract>
              <t>   This document defines the security protocol Group Object Security for
   Constrained RESTful Environments (Group OSCORE), providing end-to-end
   security of CoAP messages exchanged between members of a group, e.g.,
   sent over IP multicast.  In particular, the described protocol
   defines how OSCORE is used in a group communication setting to
   provide source authentication for CoAP group requests, sent by a
   client to multiple servers, and for protection of the corresponding
   CoAP responses.  Group OSCORE also defines a pairwise mode where each
   member of the group can efficiently derive a symmetric pairwise key
   with any other member of the group for pairwise OSCORE communication.
   Group OSCORE can be used between endpoints communicating with CoAP or
   CoAP-mappable HTTP.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-oscore-groupcomm-23"/>
        </reference>
        <reference anchor="I-D.ietf-ace-key-groupcomm-oscore">
          <front>
            <title>Key Management for OSCORE Groups in ACE</title>
            <author fullname="Marco Tiloca" initials="M." surname="Tiloca">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Jiye Park" initials="J." surname="Park">
              <organization>Universitaet Duisburg-Essen</organization>
            </author>
            <author fullname="Francesca Palombini" initials="F." surname="Palombini">
              <organization>Ericsson AB</organization>
            </author>
            <date day="6" month="March" year="2023"/>
            <abstract>
              <t>   This document defines an application profile of the ACE framework for
   Authentication and Authorization, to request and provision keying
   material in group communication scenarios that are based on CoAP and
   are secured with Group Object Security for Constrained RESTful
   Environments (Group OSCORE).  This application profile delegates the
   authentication and authorization of Clients, that join an OSCORE
   group through a Resource Server acting as Group Manager for that
   group.  This application profile leverages protocol-specific
   transport profiles of ACE to achieve communication security, server
   authentication and proof-of-possession for a key owned by the Client
   and bound to an OAuth 2.0 Access Token.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ace-key-groupcomm-oscore-16"/>
        </reference>
        <reference anchor="RFC5246">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
            <author fullname="T. Dierks" initials="T." surname="Dierks"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2008"/>
            <abstract>
              <t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol. The TLS protocol provides communications security over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5246"/>
          <seriesInfo name="DOI" value="10.17487/RFC5246"/>
        </reference>
        <reference anchor="RFC5705">
          <front>
            <title>Keying Material Exporters for Transport Layer Security (TLS)</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="March" year="2010"/>
            <abstract>
              <t>A number of protocols wish to leverage Transport Layer Security (TLS) to perform key establishment but then use some of the keying material for their own purposes. This document describes a general mechanism for allowing that. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5705"/>
          <seriesInfo name="DOI" value="10.17487/RFC5705"/>
        </reference>
        <reference anchor="RFC5869">
          <front>
            <title>HMAC-based Extract-and-Expand Key Derivation Function (HKDF)</title>
            <author fullname="H. Krawczyk" initials="H." surname="Krawczyk"/>
            <author fullname="P. Eronen" initials="P." surname="Eronen"/>
            <date month="May" year="2010"/>
            <abstract>
              <t>This document specifies a simple Hashed Message Authentication Code (HMAC)-based key derivation function (HKDF), which can be used as a building block in various protocols and applications. The key derivation function (KDF) is intended to support a wide range of applications and requirements, and is conservative in its use of cryptographic hash functions. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5869"/>
          <seriesInfo name="DOI" value="10.17487/RFC5869"/>
        </reference>
        <reference anchor="RFC6347">
          <front>
            <title>Datagram Transport Layer Security Version 1.2</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="January" year="2012"/>
            <abstract>
              <t>This document specifies version 1.2 of the Datagram Transport Layer Security (DTLS) protocol. The DTLS protocol provides communications privacy for datagram protocols. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. The DTLS protocol is based on the Transport Layer Security (TLS) protocol and provides equivalent security guarantees. Datagram semantics of the underlying transport are preserved by the DTLS protocol. This document updates DTLS 1.0 to work with TLS version 1.2. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6347"/>
          <seriesInfo name="DOI" value="10.17487/RFC6347"/>
        </reference>
        <reference anchor="RFC6749">
          <front>
            <title>The OAuth 2.0 Authorization Framework</title>
            <author fullname="D. Hardt" initials="D." role="editor" surname="Hardt"/>
            <date month="October" year="2012"/>
            <abstract>
              <t>The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf. This specification replaces and obsoletes the OAuth 1.0 protocol described in RFC 5849. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6749"/>
          <seriesInfo name="DOI" value="10.17487/RFC6749"/>
        </reference>
        <reference anchor="RFC7252">
          <front>
            <title>The Constrained Application Protocol (CoAP)</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s. The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
              <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types. CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7252"/>
          <seriesInfo name="DOI" value="10.17487/RFC7252"/>
        </reference>
        <reference anchor="RFC7748">
          <front>
            <title>Elliptic Curves for Security</title>
            <author fullname="A. Langley" initials="A." surname="Langley"/>
            <author fullname="M. Hamburg" initials="M." surname="Hamburg"/>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <date month="January" year="2016"/>
            <abstract>
              <t>This memo specifies two elliptic curves over prime fields that offer a high level of practical security in cryptographic applications, including Transport Layer Security (TLS). These curves are intended to operate at the ~128-bit and ~224-bit security level, respectively, and are generated deterministically based on a list of required properties.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7748"/>
          <seriesInfo name="DOI" value="10.17487/RFC7748"/>
        </reference>
        <reference anchor="RFC8392">
          <front>
            <title>CBOR Web Token (CWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties. The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection. A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value. CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8392"/>
          <seriesInfo name="DOI" value="10.17487/RFC8392"/>
        </reference>
        <reference anchor="RFC8610">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="C. Vigano" initials="C." surname="Vigano"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8610"/>
          <seriesInfo name="DOI" value="10.17487/RFC8610"/>
        </reference>
        <reference anchor="RFC8613">
          <front>
            <title>Object Security for Constrained RESTful Environments (OSCORE)</title>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="J. Mattsson" initials="J." surname="Mattsson"/>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <author fullname="L. Seitz" initials="L." surname="Seitz"/>
            <date month="July" year="2019"/>
            <abstract>
              <t>This document defines Object Security for Constrained RESTful Environments (OSCORE), a method for application-layer protection of the Constrained Application Protocol (CoAP), using CBOR Object Signing and Encryption (COSE). OSCORE provides end-to-end protection between endpoints communicating using CoAP or CoAP-mappable HTTP. OSCORE is designed for constrained nodes and networks supporting a range of proxy operations, including translation between different transport protocols.</t>
              <t>Although an optional functionality of CoAP, OSCORE alters CoAP options processing and IANA registration. Therefore, this document updates RFC 7252.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8613"/>
          <seriesInfo name="DOI" value="10.17487/RFC8613"/>
        </reference>
        <reference anchor="RFC8447">
          <front>
            <title>IANA Registry Updates for TLS and DTLS</title>
            <author fullname="J. Salowey" initials="J." surname="Salowey"/>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document describes a number of changes to TLS and DTLS IANA registries that range from adding notes to the registry all the way to changing the registration policy. These changes were mostly motivated by WG review of the TLS- and DTLS-related registries undertaken as part of the TLS 1.3 development process.</t>
              <t>This document updates the following RFCs: 3749, 5077, 4680, 5246, 5705, 5878, 6520, and 7301.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8447"/>
          <seriesInfo name="DOI" value="10.17487/RFC8447"/>
        </reference>
        <reference anchor="RFC8747">
          <front>
            <title>Proof-of-Possession Key Semantics for CBOR Web Tokens (CWTs)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="L. Seitz" initials="L." surname="Seitz"/>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="March" year="2020"/>
            <abstract>
              <t>This specification describes how to declare in a CBOR Web Token (CWT) (which is defined by RFC 8392) that the presenter of the CWT possesses a particular proof-of-possession key. Being able to prove possession of a key is also sometimes described as being the holder-of-key. This specification provides equivalent functionality to "Proof-of-Possession Key Semantics for JSON Web Tokens (JWTs)" (RFC 7800) but using Concise Binary Object Representation (CBOR) and CWTs rather than JavaScript Object Notation (JSON) and JSON Web Tokens (JWTs).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8747"/>
          <seriesInfo name="DOI" value="10.17487/RFC8747"/>
        </reference>
        <reference anchor="RFC8949">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="94"/>
          <seriesInfo name="RFC" value="8949"/>
          <seriesInfo name="DOI" value="10.17487/RFC8949"/>
        </reference>
        <reference anchor="RFC9052">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
              <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="96"/>
          <seriesInfo name="RFC" value="9052"/>
          <seriesInfo name="DOI" value="10.17487/RFC9052"/>
        </reference>
        <reference anchor="RFC9053">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Initial Algorithms</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines a set of algorithms that can be used with the CBOR Object Signing and Encryption (COSE) protocol (RFC 9052).</t>
              <t>This document, along with RFC 9052, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9053"/>
          <seriesInfo name="DOI" value="10.17487/RFC9053"/>
        </reference>
        <reference anchor="RFC9200">
          <front>
            <title>Authentication and Authorization for Constrained Environments Using the OAuth 2.0 Framework (ACE-OAuth)</title>
            <author fullname="L. Seitz" initials="L." surname="Seitz"/>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>This specification defines a framework for authentication and authorization in Internet of Things (IoT) environments called ACE-OAuth. The framework is based on a set of building blocks including OAuth 2.0 and the Constrained Application Protocol (CoAP), thus transforming a well-known and widely used authorization solution into a form suitable for IoT devices. Existing specifications are used where possible, but extensions are added and profiles are defined to better serve the IoT use cases.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9200"/>
          <seriesInfo name="DOI" value="10.17487/RFC9200"/>
        </reference>
        <reference anchor="RFC9201">
          <front>
            <title>Additional OAuth Parameters for Authentication and Authorization for Constrained Environments (ACE)</title>
            <author fullname="L. Seitz" initials="L." surname="Seitz"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>This specification defines new parameters and encodings for the OAuth 2.0 token and introspection endpoints when used with the framework for Authentication and Authorization for Constrained Environments (ACE). These are used to express the proof-of-possession (PoP) key the client wishes to use, the PoP key that the authorization server has selected, and the PoP key the resource server uses to authenticate to the client.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9201"/>
          <seriesInfo name="DOI" value="10.17487/RFC9201"/>
        </reference>
        <reference anchor="RFC9203">
          <front>
            <title>The Object Security for Constrained RESTful Environments (OSCORE) Profile of the Authentication and Authorization for Constrained Environments (ACE) Framework</title>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <author fullname="L. Seitz" initials="L." surname="Seitz"/>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="M. Gunnarsson" initials="M." surname="Gunnarsson"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>This document specifies a profile for the Authentication and Authorization for Constrained Environments (ACE) framework. It utilizes Object Security for Constrained RESTful Environments (OSCORE) to provide communication security and proof-of-possession for a key owned by the client and bound to an OAuth 2.0 access token.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9203"/>
          <seriesInfo name="DOI" value="10.17487/RFC9203"/>
        </reference>
        <reference anchor="NIST-800-56A" target="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-56Ar3.pdf">
          <front>
            <title>Recommendation for Pair-Wise Key-Establishment Schemes Using Discrete Logarithm Cryptography - NIST Special Publication 800-56A, Revision 3</title>
            <author initials="E." surname="Barker" fullname="Elaine Barker">
              <organization/>
            </author>
            <author initials="L." surname="Chen" fullname="Lily Chen">
              <organization/>
            </author>
            <author initials="A." surname="Roginsky" fullname="Allen Roginsky">
              <organization/>
            </author>
            <author initials="A." surname="Vassilev" fullname="Apostol Vassilev">
              <organization/>
            </author>
            <author initials="R." surname="Davis" fullname="Richard Davis">
              <organization/>
            </author>
            <date year="2018" month="April"/>
          </front>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="I-D.tiloca-core-oscore-discovery">
          <front>
            <title>Discovery of OSCORE Groups with the CoRE Resource Directory</title>
            <author fullname="Marco Tiloca" initials="M." surname="Tiloca">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Christian Amsüss" initials="C." surname="Amsüss">
         </author>
            <author fullname="Peter Van der Stok" initials="P." surname="Van der Stok">
         </author>
            <date day="4" month="September" year="2024"/>
            <abstract>
              <t>   Group communication over the Constrained Application Protocol (CoAP)
   can be secured by means of Group Object Security for Constrained
   RESTful Environments (Group OSCORE).  At deployment time, devices may
   not know the exact security groups to join, the respective Group
   Manager, or other information required to perform the joining
   process.  This document describes how a CoAP endpoint can use
   descriptions and links of resources registered at the CoRE Resource
   Directory to discover security groups and to acquire information for
   joining them through the respective Group Manager.  A given security
   group may protect multiple application groups, which are separately
   announced in the Resource Directory as sets of endpoints sharing a
   pool of resources.  This approach is consistent with, but not limited
   to, the joining of security groups based on the ACE framework for
   Authentication and Authorization in constrained environments.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-tiloca-core-oscore-discovery-16"/>
        </reference>
        <reference anchor="I-D.ietf-cose-cbor-encoded-cert">
          <front>
            <title>CBOR Encoded X.509 Certificates (C509 Certificates)</title>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Göran Selander" initials="G." surname="Selander">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Shahid Raza" initials="S." surname="Raza">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Joel Höglund" initials="J." surname="Höglund">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Martin Furuhed" initials="M." surname="Furuhed">
              <organization>Nexus Group</organization>
            </author>
            <date day="8" month="July" year="2024"/>
            <abstract>
              <t>   This document specifies a CBOR encoding of X.509 certificates.  The
   resulting certificates are called C509 Certificates.  The CBOR
   encoding supports a large subset of RFC 5280 and all certificates
   compatible with the RFC 7925, IEEE 802.1AR (DevID), CNSA, RPKI, GSMA
   eUICC, and CA/Browser Forum Baseline Requirements profiles.  When
   used to re-encode DER encoded X.509 certificates, the CBOR encoding
   can in many cases reduce the size of RFC 7925 profiled certificates
   with over 50% while also significantly reducing memory and code size
   compared to ASN.1.  The CBOR encoded structure can alternatively be
   signed directly ("natively signed"), which does not require re-
   encoding for the signature to be verified.  The document also
   specifies C509 Certificate Signing Requests, C509 COSE headers, a
   C509 TLS certificate type, and a C509 file format.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cose-cbor-encoded-cert-11"/>
        </reference>
        <reference anchor="I-D.ietf-ace-edhoc-oscore-profile">
          <front>
            <title>Ephemeral Diffie-Hellman Over COSE (EDHOC) and Object Security for Constrained Environments (OSCORE) Profile for Authentication and Authorization for Constrained Environments (ACE)</title>
            <author fullname="Göran Selander" initials="G." surname="Selander">
              <organization>Ericsson</organization>
            </author>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Marco Tiloca" initials="M." surname="Tiloca">
              <organization>RISE</organization>
            </author>
            <author fullname="Rikard Höglund" initials="R." surname="Höglund">
              <organization>RISE</organization>
            </author>
            <date day="21" month="October" year="2024"/>
            <abstract>
              <t>   This document specifies a profile for the Authentication and
   Authorization for Constrained Environments (ACE) framework.  It
   utilizes Ephemeral Diffie-Hellman Over COSE (EDHOC) for achieving
   mutual authentication between an ACE-OAuth Client and Resource
   Server, and it binds an authentication credential of the Client to an
   ACE-OAuth access token.  EDHOC also establishes an Object Security
   for Constrained RESTful Environments (OSCORE) Security Context, which
   is used to secure communications when accessing protected resources
   according to the authorization information indicated in the access
   token.  This profile can be used to delegate management of
   authorization information from a resource-constrained server to a
   trusted host with less severe limitations regarding processing power
   and memory.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ace-edhoc-oscore-profile-06"/>
        </reference>
        <reference anchor="I-D.ietf-ace-workflow-and-params">
          <front>
            <title>Alternative Workflow and OAuth Parameters for the Authentication and Authorization for Constrained Environments (ACE) Framework</title>
            <author fullname="Marco Tiloca" initials="M." surname="Tiloca">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Göran Selander" initials="G." surname="Selander">
              <organization>Ericsson AB</organization>
            </author>
            <date day="8" month="July" year="2024"/>
            <abstract>
              <t>   This document updates the Authentication and Authorization for
   Constrained Environments Framework (ACE, RFC 9200) as follows.
   First, it defines a new, alternative workflow that the Authorization
   Server can use for uploading an access token to a Resource Server on
   behalf of the Client.  Second, it defines new parameters and
   encodings for the OAuth 2.0 token endpoint at the Authorization
   Server.  Third, it defines a method for the ACE framework to enforce
   bidirectional access control by means of a single access token.
   Fourth, it amends two of the requirements on profiles of the
   framework.  Finally, it deprecates the original payload format of
   error responses that convey an error code, when CBOR is used to
   encode message payloads.  For such error responses, it defines a new
   payload format aligned with RFC 9290, thus updating in this respect
   also the profiles of ACE defined in RFC 9202, RFC 9203, and RFC 9431.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ace-workflow-and-params-02"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC9147">
          <front>
            <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>This document specifies version 1.3 of the Datagram Transport Layer Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability. Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
              <t>This document obsoletes RFC 6347.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9147"/>
          <seriesInfo name="DOI" value="10.17487/RFC9147"/>
        </reference>
        <reference anchor="RFC9202">
          <front>
            <title>Datagram Transport Layer Security (DTLS) Profile for Authentication and Authorization for Constrained Environments (ACE)</title>
            <author fullname="S. Gerdes" initials="S." surname="Gerdes"/>
            <author fullname="O. Bergmann" initials="O." surname="Bergmann"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="L. Seitz" initials="L." surname="Seitz"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>This specification defines a profile of the Authentication and Authorization for Constrained Environments (ACE) framework that allows constrained servers to delegate client authentication and authorization. The protocol relies on DTLS version 1.2 or later for communication security between entities in a constrained network using either raw public keys or pre-shared keys. A resource-constrained server can use this protocol to delegate management of authorization information to a trusted host with less-severe limitations regarding processing power and memory.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9202"/>
          <seriesInfo name="DOI" value="10.17487/RFC9202"/>
        </reference>
        <reference anchor="RFC9431">
          <front>
            <title>Message Queuing Telemetry Transport (MQTT) and Transport Layer Security (TLS) Profile of Authentication and Authorization for Constrained Environments (ACE) Framework</title>
            <author fullname="C. Sengul" initials="C." surname="Sengul"/>
            <author fullname="A. Kirby" initials="A." surname="Kirby"/>
            <date month="July" year="2023"/>
            <abstract>
              <t>This document specifies a profile for the Authentication and Authorization for Constrained Environments (ACE) framework to enable authorization in a publish-subscribe messaging system based on Message Queuing Telemetry Transport (MQTT). Proof-of-Possession keys, bound to OAuth 2.0 access tokens, are used to authenticate and authorize MQTT Clients. The protocol relies on TLS for confidentiality and MQTT server (Broker) authentication.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9431"/>
          <seriesInfo name="DOI" value="10.17487/RFC9431"/>
        </reference>
        <reference anchor="NIST-800-207" target="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-207.pdf">
          <front>
            <title>Zero Trust Architecture - NIST Special Publication 800-207</title>
            <author initials="S." surname="Rose" fullname="Scott Rose">
              <organization/>
            </author>
            <author initials="O." surname="Borchert" fullname="Oliver Borchert">
              <organization/>
            </author>
            <author initials="S." surname="Mitchell" fullname="Stu Mitchell">
              <organization/>
            </author>
            <author initials="S." surname="Connelly" fullname="Sean Connelly">
              <organization/>
            </author>
            <date year="2020" month="August"/>
          </front>
        </reference>
      </references>
    </references>
    <section anchor="profile-requirements">
      <name>Profile Requirements</name>
      <t>This appendix lists the specifications of this profile based on the requirements of the ACE framework, as requested in <xref section="C" sectionFormat="of" target="RFC9200"/>.</t>
      <ul spacing="normal">
        <li>
          <t>Optionally, define new methods for the client to discover the necessary permissions and AS for accessing a resource, different from the one proposed in <xref target="RFC9200"/>: Not specified.</t>
        </li>
        <li>
          <t>Optionally, specify new grant types: Not specified.</t>
        </li>
        <li>
          <t>Optionally, define the use of client certificates as client credential type: Not specified.</t>
        </li>
        <li>
          <t>Specify the communication protocol the client and RS must use: CoAP.</t>
        </li>
        <li>
          <t>Specify the security protocol the client and RS must use to protect their communication: Group OSCORE, by using a pre-established Group OSCORE Security Context.</t>
        </li>
        <li>
          <t>Specify how the client and the RS mutually authenticate: Explicitly, by possession of a common Group OSCORE Security Context, and by either: usage of digital signatures embedded in messages, if protected with the group mode of Group OSCORE; or protection of messages with the pairwise mode of Group OSCORE, by using pairwise symmetric keys derived from the asymmetric keys of the two peers exchanging the message. Note that mutual authentication is not completed before the client has verified a Group OSCORE response using the corresponding Group OSCORE Security Context.</t>
        </li>
        <li>
          <t>Specify the proof-of-possession protocol(s) and how to select one, if several are available. Also specify which key types (e.g., symmetric/asymmetric) are supported by a specific proof-of- possession protocol: Group OSCORE algorithms; asymmetric keys verified and distributed by a Group Manager.</t>
        </li>
        <li>
          <t>Specify a unique ace_profile identifier: coap_group_oscore.</t>
        </li>
        <li>
          <t>If introspection is supported, specify the communication and security protocol for introspection: HTTP/CoAP (+ TLS/DTLS/OSCORE).</t>
        </li>
        <li>
          <t>Specify the communication and security protocol for interactions between the client and AS: HTTP/CoAP (+ TLS/DTLS/OSCORE).</t>
        </li>
        <li>
          <t>Specify if/how the /authz-info endpoint is protected, including how error responses are protected: Not protected.</t>
        </li>
        <li>
          <t>Optionally, define other methods of token transport than the /authz-info endpoint: Not defined.</t>
        </li>
      </ul>
    </section>
    <section anchor="sec-cddl-model" removeInRFC="true">
      <name>CDDL Model</name>
      <figure anchor="fig-cddl-model">
        <name>CDDL model</name>
        <artwork type="CDDL" align="left"><![CDATA[
; ACE Profiles
coap_group_oscore = 5

; OAuth Parameters CBOR Mappings
context_id_param = 71
salt_input_param = 72
client_cred_verify = 73
client_cred_verify_mac = 74

; CBOR Web Token (CWT) Claims
context_id_claim = 51
salt_input_claim = 52

; CWT Confirmation Methods
kccs = 14
]]></artwork>
      </figure>
    </section>
    <section anchor="sec-document-updates" removeInRFC="true">
      <name>Document Updates</name>
      <section anchor="sec-02-03">
        <name>Version -02 to -03</name>
        <ul spacing="normal">
          <li>
            <t>Lowercase "client", "resource server", "authorization server", and "access token".</t>
          </li>
          <li>
            <t>Consistent update of section numbers for external references.</t>
          </li>
          <li>
            <t>Mentioned that this profile can also use the ACE alternative workflow.</t>
          </li>
          <li>
            <t>Clarified that the client may ask for a new access token after the old one becomes invalid.</t>
          </li>
          <li>
            <t>Enforced uniqueness pre-requirements on the client's group membership before requesting an access token.</t>
          </li>
          <li>
            <t>Added checks on uniqueness of clients' group membership at the RS.</t>
          </li>
          <li>
            <t>Clarified the process of access right verification.</t>
          </li>
          <li>
            <t>Added fine-grained recommendations on storing multiple access tokens bound to the same PoP key.</t>
          </li>
          <li>
            <t>Added guidelines on using multiple profiles.</t>
          </li>
          <li>
            <t>Fixes in the IANA considerations.</t>
          </li>
          <li>
            <t>Editorial fixes and improvements.</t>
          </li>
        </ul>
      </section>
      <section anchor="sec-01-02">
        <name>Version -01 to -02</name>
        <ul spacing="normal">
          <li>
            <t>CBOR diagnostic notation uses placeholders from a CDDL model.</t>
          </li>
          <li>
            <t>Renamed the claim 'contextId_input' to 'context_id'.</t>
          </li>
          <li>
            <t>Revised examples.</t>
          </li>
          <li>
            <t>Placeholders and early direction for dynamic update of access rights.</t>
          </li>
          <li>
            <t>Added text on storing multiple access tokens per PoP key on the RS.</t>
          </li>
          <li>
            <t>Fixes in the IANA considerations.</t>
          </li>
          <li>
            <t>Editorial fixes and improvements.</t>
          </li>
        </ul>
      </section>
      <section anchor="sec-00-01">
        <name>Version -00 to -01</name>
        <ul spacing="normal">
          <li>
            <t>Deleting an access token does not delete the Group OSCORE Security Context.</t>
          </li>
          <li>
            <t>Distinct computation of the PoP input when C and the AS use (D)TLS 1.2 or 1.3.</t>
          </li>
          <li>
            <t>Revised computation of the PoP input when C and the AS use OSCORE.</t>
          </li>
          <li>
            <t>Revised computation of the PoP evidence when the OSCORE group is a pairwise-only group.</t>
          </li>
          <li>
            <t>Clarified requirements on the AS for verifying the PoP evidence.</t>
          </li>
          <li>
            <t>Renamed the TLS Exporter Label for computing the PoP input.</t>
          </li>
          <li>
            <t>Editorial fixes and improvements.</t>
          </li>
        </ul>
      </section>
    </section>
    <section numbered="false" anchor="acknowldegment">
      <name>Acknowledgments</name>
      <t><contact fullname="Ludwig Seitz"/> contributed as a co-author of initial versions of this document.</t>
      <t>The authors sincerely thank <contact fullname="Christian Amsüss"/>, <contact fullname="Tim Hollebeek"/>, <contact fullname="Benjamin Kaduk"/>, <contact fullname="John Preuß Mattsson"/>, <contact fullname="Dave Robin"/>, <contact fullname="Jim Schaad"/>, and <contact fullname="Göran Selander"/> for their comments and feedback.</t>
      <t>The work on this document has been partly supported by the Sweden's Innovation Agency VINNOVA and the Celtic-Next projects CRITISEC and CYPRESS; and by the H2020 project SIFIS-Home (Grant agreement 952652).</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
