<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.30 (Ruby 3.4.8) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-cabanillas-nmop-authz-policy-sharing-model-01" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="authz-policy-sharing-model">Model for distributed authorization policy sharing</title>
    <seriesInfo name="Internet-Draft" value="draft-cabanillas-nmop-authz-policy-sharing-model-01"/>
    <author initials="L. C." surname="Rodríguez" fullname="Lucía Cabanillas Rodríguez">
      <organization>Telefónica</organization>
      <address>
        <email>lucia.cabanillasrodriguez@telefonica.com</email>
      </address>
    </author>
    <author initials="D." surname="Lopez" fullname="Diego Lopez">
      <organization>Telefónica</organization>
      <address>
        <email>diego.r.lopez@telefonica.com</email>
      </address>
    </author>
    <author initials="A." surname="Mendez" fullname="Ana Mendez">
      <organization>Telefónica</organization>
      <address>
        <email>ana.mendezperez@telefonica.com</email>
      </address>
    </author>
    <date year="2026" month="February" day="24"/>
    <area>Operations and Management</area>
    <workgroup>Network Management Operations</workgroup>
    <keyword>policy</keyword>
    <keyword>authorization</keyword>
    <keyword>lifecycle</keyword>
    <abstract>
      <?line 57?>
<t>This document defines mechanisms and conventions for the representation, lifecycle management, and distribution of authorization policies in distributed and automated environments. It specifies a consistent, machine-readable, and interoperable framework that enables policies to be validated, versioned, exchanged, and removed across heterogeneous systems and domains.</t>
      <t>The framework defines how authorization policies, expressed in declarative Policy-as-Code (PaC) languages, are encapsulated, managed, and distributed using YANG as the canonical representation format. This separation allows independent evolution of policy languages, enforcement architectures, and trust models.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://LuciaCabanillasRodriguez.github.io/authz-policy-sharing-model/draft-cabanillas-nmop-authz-policy-sharing-model.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-cabanillas-nmop-authz-policy-sharing-model/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Network Management Operations Working Group mailing list (<eref target="mailto:nmop@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/nmop/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/nmop/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/LuciaCabanillasRodriguez/authz-policy-sharing-model"/>.</t>
    </note>
  </front>
  <middle>
    <?line 62?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The increasing complexity and automation of distributed systems, such as programmable networks, multi-cloud platforms, and intent-based infrastructures, require scalable and interoperable mechanisms for managing authorization policies. In these environments, policies are no longer confined to static configuration files or manually managed. Instead, they are dynamic artifacts that must be created, validated, distributed, updated, and eliminated programmatically.</t>
      <t>Authorization policies increasingly govern not only access control but also operational behavior, compliance requirements, and governance constraints across multiple domains. These policies may be authored in one domain, distributed through another, and enforced in many. As a result, consistent handling of policies throughout their lifecycle becomes critical.</t>
      <t>Existing approaches often rely on system-specific policy formats and ad hoc distribution mechanisms, leading to several challenges:</t>
      <ul spacing="normal">
        <li>
          <t>Fragmentation: Incompatible representations and semantics hinder interoperability and auditability.</t>
        </li>
        <li>
          <t>Limited lifecycle control: Many systems lack standardized mechanisms for validation, versioning, and decommissioning.</t>
        </li>
        <li>
          <t>Trust ambiguity: In multi-domain environments, it is often unclear whether a policy source is authorized or trustworthy.</t>
        </li>
        <li>
          <t>Governance gaps: Systems frequently lack mechanisms to verify whether a policy author is permitted to define policies for a specific domain.</t>
        </li>
      </ul>
      <t>To address these challenges, this document defines a structured and interoperable framework for representing and managing authorization policies as governed artifacts. YANG is used as the canonical representation format for policy artifacts. A YANG-defined policy encapsulates its metadata together with embedded declarative Policy-as-Code content, which is treated as opaque executable logic. This structured representation enables schema-based validation, immutable semantic versioning, and verifiable lifecycle transitions while remaining agnostic to the underlying evaluation engine.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>", "<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as described in BCP 14 <xref target="RFC8174">RFC2119</xref> when, and only when, they appear in all capitals, as shown here.</t>
      <ul spacing="normal">
        <li>
          <t>Policy: A rule or set of rules that define behavior, access, or operational constraints within a system.</t>
        </li>
        <li>
          <t>Authorization policy: A policy that governs access or permissions based on user/agent, resource, or environmental attributes.</t>
        </li>
        <li>
          <t>Policy lifecycle: The set of stages through which a policy passes, including creation, validation, versioning, distribution, update, and removal.</t>
        </li>
        <li>
          <t>Policy-as-Code (PaC): A paradigm in which policies are represented as declarative code artifacts, allowing automation, versioning, and testing.</t>
        </li>
      </ul>
    </section>
    <section anchor="requirements-for-policy-management">
      <name>Requirements for Policy Management</name>
      <t>Systems that manage or exchange authorization policies across domains <bcp14>MUST</bcp14> satisfy the following requirements:</t>
      <ul spacing="normal">
        <li>
          <t>Granularity: Policies <bcp14>SHOULD</bcp14> be able to express fine-grained authorization rules over users, resources, and contextual conditions.</t>
        </li>
        <li>
          <t>Lifecycle control: Policies <bcp14>MUST</bcp14> support creation, versioning, validation, and removal.</t>
        </li>
        <li>
          <t>Interoperability: Policy representations <bcp14>SHOULD</bcp14> be portable and interpretable across different administrative domains.</t>
        </li>
        <li>
          <t>Verifiability: The framework <bcp14>MUST</bcp14> provide mechanisms to verify policy integrity and provenance.</t>
        </li>
      </ul>
    </section>
    <section anchor="policy-as-code-and-declarative-policy-languages">
      <name>Policy-as-Code and Declarative Policy Languages</name>
      <t>Declarative Policy-as-Code (PaC) languages, such as Rego <xref target="Rego"/>, Cedar <xref target="Cedar"/>, or ALFA <xref target="ALFA"/>, are widely used to express authorization logic in distributed systems. Although these languages differ in syntax, evaluation models, and execution environments, they share common lifecycle and governance requirements when used in distributed and multi-domain environments.</t>
      <t>This framework treats PaC content as opaque executable logic embedded within a YANG-defined policy artifact. The YANG representation does not interpret, validate, or constrain the internal semantics of the policy language. Instead, it provides a structured and interoperable container for lifecycle governance, version control, provenance binding, and distribution.</t>
      <t>By separating policy handling from policy semantics, including evaluation logic and decision outcomes, this framework enables interoperability without constraining innovation in policy languages or enforcement technologies.</t>
      <t>Example in Rego syntax:</t>
      <artwork><![CDATA[
package example
# Allow read access if the user has the "read" role
default allow = false
allow {
    input.user.role == "read"
}
]]></artwork>
      <t>The policy logic above is treated as opaque content by the YANG representation. Its evaluation behavior is determined exclusively by the target execution environment, while lifecycle and governance properties such as version and ownership are managed independently.</t>
    </section>
    <section anchor="policy-representation-in-yang">
      <name>Policy representation in YANG</name>
      <t>YANG provides a structured and schema-driven mechanism for representing authorization policies as managed and governed artifacts. In this framework, YANG serves as the canonical container format for policy definitions, encapsulating:</t>
      <ul spacing="normal">
        <li>
          <t>Policy metadata, including owner, description and version.</t>
        </li>
        <li>
          <t>The declarative language used to express the policy logic.</t>
        </li>
        <li>
          <t>The embedded Policy-as-Code (PaC) content, treated as opaque data.</t>
        </li>
        <li>
          <t>Optional leaf for validation and provenance.</t>
        </li>
      </ul>
      <t>Each policy instance <bcp14>MUST</bcp14> include a semantic version following a controlled versioning scheme (for example, Git-style tags such as <tt>v1.0.0</tt>). Version values <bcp14>MUST</bcp14> uniquely identify immutable policy content. Once a specific version is stored, it <bcp14>MUST NOT</bcp14> be modified. Any change to the policy logic or its governance metadata <bcp14>MUST</bcp14> result in the creation of a new version. Versioning is therefore a fundamental requirement of Policy-as-Code governance. Maintaining historical versions enables controlled updates, rollback to previous versions, auditability, and forensic analysis in case of misconfiguration or dispute.</t>
      <t>In addition, each policy instance <bcp14>MUST</bcp14> include an explicit owner attribute that identifies the authority responsible for the policy definition, ensuring accountability within and across domains. By associating a policy with a clearly identified authority, the framework enables governance controls and allows systems to determine whether the policy source is authorized within a given scope. The owner attribute <bcp14>MUST</bcp14> be expressed as a URI that uniquely identifies the authoritative entity responsible for the policy.</t>
      <t>The specific URI structure is determined by the administrative environment. Ownership metadata <bcp14>MAY</bcp14> be cryptographically linked to the policy provenance, enabling verification against the provenance signature key. This mechanism ensures that the policy origin and integrity can be independently verified and trusted.</t>
      <t>The YANG model below illustrates a simplified structure for representing authorization policies as managed artifacts:</t>
      <artwork><![CDATA[
module authz-policy {
    namespace "urn:ietf:params:xml:ns:yang:authz-policy";
    prefix pac;
    organization
        "IETF NMOP";
    contact
        "WG Web:   <https://datatracker.ietf.org/wg/nmop/>
        WG List:  <mailto:nmop@ietf.org>
    Authors:
        Lucía Cabanillas <mailto:lucia.cabanillasrodriguez@telefonica.com>
        Diego López <mailto:diego.r.lopez@telefonica.com>
        Ana Méndez Pérez <mailto:ana.mendezperez@telefonica.com>";
    import ietf-yang-provenance {
        prefix iyangprov;
    }
    description
        "Illustrative YANG model for representing authorization policies as managed artifacts";
    revision 2026-02-10 {
        description
            "Second revision";
        reference
            "RFC XXXX: Model for distributed authorization policy sharing";
     }
    container policy {
        leaf description {
            type string;
            description
                "Optional human-readable description of the policy";
        }
        leaf language {
            type enumeration {
                enum rego {
                    description "The policy is written in Rego syntax";
                }
                enum cedar {
                    description "The policy is written in Cedar syntax";
                }
                enum alfa {
                    description "The policy is defined in ALFA format";
                }
            }
            mandatory true;
            description
                "Specifies the language used to express the policy";
        }
        leaf pac {
            type string;
            mandatory true;
            description
                "Example:    package example
                # Allow read access if the user has the 'read' role
                default allow = false
                allow {
                    input.user.role ==\"read\"
                }";
        }
        leaf owner {
            type uri;
            mandatory true;
            description
                "URI identifying the authoritative entity responsible for this policy";
        }
        leaf version {
            type string;
            mandatory true;
            description
                "Semantic version of the policy following Git-style tags (e.g., v1.0.0)";
        }
        leaf policy-provenance {
            type iyangprov:provenance-signature;
            description
                "Signature proving provenance of the policy";
        }
    }
}
]]></artwork>
      <t>This YANG snippet demonstrates how policy content can be represented as structured data while keeping the logic in a declarative format. By explicitly indicating the language, management systems can validate and process policies appropriately, enabling interoperability between tools and engines.</t>
    </section>
    <section anchor="architecture-overview">
      <name>Architecture Overview</name>
      <t>Policy management in distributed environments relies on a set of functional components that cooperate to define, govern, distribute, evaluate, and enforce authorization policies across administrative domains <xref target="RFC2904"/>. This framework adopts that functional separation while introducing structured policy representation and lifecycle governance based on YANG.</t>
      <section anchor="functional-roles">
        <name>Functional Roles</name>
        <t>Policy Author: The entity (human or automated system/agent) responsible for creating the policy definition. The author produces a YANG-encoded policy document that includes metadata (description, version, language, owner) and the actual declarative rule.</t>
        <t>Policy Administration Point (PAP): The Policy Administration Point manages the lifecycle and governance of policy artifacts. Upon receiving a YANG-encoded policy, it performs schema validation and, where applicable, verifies provenance using cryptographic mechanisms such as those described in <xref target="I-D.ietf-opsawg-yang-provenance"/>.</t>
        <t>The PAP enforces version uniqueness and immutability, ensuring that existing versions are never modified. Any change to policy content or metadata results in the creation of a new version. The PAP maintains historical versions to support rollback and audit requirements.</t>
        <t>Before accepting or distributing a policy artifact, the Policy Administration Point (PAP) <bcp14>MAY</bcp14> perform an authorization verification step. In this step, the PAP queries a Policy Decision Point to determine whether the declared owner or submitting entity is authorized to define or modify policies within the relevant domain.</t>
        <t>All lifecycle events, including creation, update, activation, rollback, and decommissioning, <bcp14>MUST</bcp14> be recorded in an append-only accounting ledger to ensure traceability and auditability.</t>
        <t>Once validated and authorized, the PAP distributes the executable policy artifact to the appropriate decision components.</t>
        <t>Policy Decision Point (PDP): The Policy Decision Point evaluates policy logic at runtime. It receives validated policy artifacts and processes authorization requests based on contextual attributes, claims, or environmental information. The PDP produces authorization decisions such as Permit or Deny, optionally including obligations or advice.</t>
        <t>Policy Enforcement Point (PEP): The PEP enforces the decisions issued by the PDP. Enforcement may include granting or denying access, applying configurations, or triggering operational actions.</t>
      </section>
      <section anchor="functional-interaction">
        <name>Functional Interaction</name>
        <t>The interaction among the architectural components reflects a strict separation between policy governance and runtime decision-making. Policy artifacts are first validated, governed, and recorded as managed entities before being distributed for evaluation.</t>
        <t>The following diagram illustrates the logical interaction flow:</t>
        <artwork><![CDATA[
                     Policy Author
                           |
                           |  YANG-encoded policy artifact
                           v
        +-----------------------------------+     +-------------------------+
        | Policy Administration Point (PAP) |---->|    Accounting Ledger    |
        |-----------------------------------|     |-------------------------|
        | - Schema validation               |     | - create / update       |
        | - Provenance verification         |     | - rollback / remove     |
        | - Version enforcement             |     +-------------------------+
        | - Lifecycle state management      |
        |-----------------------------------|
        |  Governance Authorization Check   |
        |  (PAP -> PDP query)               |
        +------------------+----------------+
                           |
                           |  Authorized policy
                           v
              +-----------------------------------+
              | Policy Decision Point (PDP)       |
              |-----------------------------------|
              | - Runtime policy evaluation       |
              +------------------+----------------+
                                 |
                                 |  Authorization decision
                                 v
              +-----------------------------------+
              | Policy Enforcement Point (PEP)    |
              |-----------------------------------|
              | - Enforcement of decisions        |
              +-----------------------------------+

]]></artwork>
      </section>
    </section>
    <section anchor="other-models">
      <name>Other Models</name>
      <t>Existing data models demonstrate that YANG can be effectively used to carry authorization-related information in operational environments.</t>
      <t>The OpenConfig gNSI authorization model <xref target="OCgNSI"/> defines a YANG module that represents metadata associated with gRPC authorization policies installed on network devices. That model focuses on device-level state and observability, including policy versioning, creation time, and success/failure counters collected during authorization evaluation.</t>
      <t>This document is complementary to that approach. While the OpenConfig model concentrates on operational visibility for a specific enforcement technology, the framework defined here focuses on the representation, lifecycle management, provenance, and distribution of authorization policy artifacts across systems and administrative domains.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Ensuring the integrity, authenticity, and provenance of policy data is critical to prevent unauthorized modification. Policies <bcp14>SHOULD</bcp14> include cryptographic protection mechanisms that allow their origin and validity to be verified.</t>
      <t>The mechanisms defined in <xref target="I-D.ietf-opsawg-yang-provenance"/> — Applying COSE Signatures for YANG Data Provenance — provide a suitable foundation for these protections. That document specifies how COSE signatures <xref target="RFC9052"/> are used to include digital signatures within the YANG data, enabling, in this case, verifiable provenance and ensuring the integrity of the YANG-based distributed authorization policy sharing model proposed in this draft.</t>
      <t>When such provenance mechanisms are applied to policy definitions, each policy instance can include a verifiable signature providing proof of origin and integrity of the provided policy. By treating policies as signed, versioned artifacts, this framework reduces the risk associated with automated and cross-domain policy exchange, including the additional risks in multi-domain deployments such as determining whether a policy has been modified in transit and whether the policy issuer is authorized to define policies applicable to the receiving domain.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2904">
          <front>
            <title>AAA Authorization Framework</title>
            <author fullname="J. Vollbrecht" initials="J." surname="Vollbrecht"/>
            <author fullname="P. Calhoun" initials="P." surname="Calhoun"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="L. Gommans" initials="L." surname="Gommans"/>
            <author fullname="G. Gross" initials="G." surname="Gross"/>
            <author fullname="B. de Bruijn" initials="B." surname="de Bruijn"/>
            <author fullname="C. de Laat" initials="C." surname="de Laat"/>
            <author fullname="M. Holdrege" initials="M." surname="Holdrege"/>
            <author fullname="D. Spence" initials="D." surname="Spence"/>
            <date month="August" year="2000"/>
            <abstract>
              <t>This memo serves as the base requirements for Authorization of Internet Resources and Services (AIRS). It presents an architectural framework for understanding the authorization of Internet resources and services and derives requirements for authorization protocols. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2904"/>
          <seriesInfo name="DOI" value="10.17487/RFC2904"/>
        </reference>
        <reference anchor="RFC9052">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
              <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="96"/>
          <seriesInfo name="RFC" value="9052"/>
          <seriesInfo name="DOI" value="10.17487/RFC9052"/>
        </reference>
        <reference anchor="I-D.ietf-opsawg-yang-provenance">
          <front>
            <title>Applying COSE Signatures for YANG Data Provenance</title>
            <author fullname="Diego Lopez" initials="D." surname="Lopez">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Antonio Pastor" initials="A." surname="Pastor">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Alex Huang Feng" initials="A. H." surname="Feng">
              <organization>INSA-Lyon</organization>
            </author>
            <author fullname="Ana Méndez Pérez" initials="A. M." surname="Pérez">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <date day="3" month="November" year="2025"/>
            <abstract>
              <t>   This document defines a mechanism based on COSE signatures to provide
   and verify the provenance of YANG data, so it is possible to verify
   the origin and integrity of a dataset, even when those data are going
   to be processed and/or applied in workflows where a crypto-enabled
   data transport directly from the original data stream is not
   available.  As the application of evidence-based OAM automation and
   the use of tools such as AI/ML grow, provenance validation becomes
   more relevant in all scenarios, in support of the assuring the origin
   and integritu of datasets and/or data streams.  The use of compact
   signatures facilitates the inclusion of provenance strings in any
   YANG schema requiring them.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-yang-provenance-03"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="Rego" target="https://www.openpolicyagent.org/docs/latest/policy-language/">
          <front>
            <title>A Policy Language for Open Policy Agent</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="Cedar" target="https://docs.cedarpolicy.com/">
          <front>
            <title>Cedar Policy Language</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="ALFA" target="https://alfa.guide/alfa-authorization-language/">
          <front>
            <title>ALFA (Abbreviated Language For Authorization)</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="OCgNSI" target="https://www.netconfcentral.org/modules/openconfig-gnsi-authz/2024-02-13/source/raw/">
          <front>
            <title>OpenConfig gNSI Authorization Model</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
    <?line 318?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>This document is based on work partially funded by the iTrust6G project (Grant agreement N 101097083) and the ROBUST-6G project (Grant agreement N 101139068).</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
