<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.3.8) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-ace-coap-pubsub-profile-03" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="ACE CoAP Pub-Sub Profile">CoAP Publish-Subscribe Profile for Authentication and Authorization for Constrained Environments (ACE)</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-ace-coap-pubsub-profile-03"/>
    <author initials="F." surname="Palombini" fullname="Francesca Palombini">
      <organization>Ericsson</organization>
      <address>
        <email>francesca.palombini@ericsson.com</email>
      </address>
    </author>
    <author initials="C." surname="Sengul" fullname="Cigdem Sengul">
      <organization>Brunel University</organization>
      <address>
        <email>csengul@acm.org</email>
      </address>
    </author>
    <author initials="M." surname="Tiloca" fullname="Marco Tiloca">
      <organization>RISE AB</organization>
      <address>
        <email>marco.tiloca@ri.se</email>
      </address>
    </author>
    <date year="2026" month="February" day="09"/>
    <area>Security</area>
    <workgroup>ACE Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 75?>

<t>This document defines an application profile of the Authentication and Authorization for Constrained Environments (ACE) framework, to enable secure group communication in the Publish-Subscribe (Pub-Sub) architecture for the Constrained Application Protocol (CoAP) [draft-ietf-core-coap-pubsub], where Publishers and Subscribers communicate through a Broker. This profile relies on protocol-specific transport profiles of ACE to achieve communication security, server authentication, and proof of possession of a key owned by the Client and bound to an OAuth 2.0 access token. This document specifies the provisioning and enforcement of authorization information for Clients to act as Publishers and/or Subscribers, as well as the provisioning of keying material and security parameters that Clients use for protecting their communications end-to-end through the Broker.</t>
      <t>Note to RFC Editor: Please replace "[draft-ietf-core-coap-pubsub]" with the RFC number of that document and delete this paragraph.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Authentication and Authorization for Constrained Environments Working Group mailing list (ace@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/ace/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/ace-wg/pubsub-profile"/>.</t>
    </note>
  </front>
  <middle>
    <?line 80?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>In a publish-subscribe (Pub-Sub) scenario, devices acting as Publishers and/or Subscribers <!--with limited reachability--> communicate via a Broker that enforces store-and-forward messaging between those. This effectively enables a form of group communication, where all the Publishers and Subscribers participating in the same Pub-Sub topic are considered members of the same application group associated with that topic.</t>
      <t>The specification at <xref target="I-D.ietf-core-coap-pubsub"/> defines a Pub-Sub architecture for the Constrained Application Protocol (CoAP) <xref target="RFC7252"/>.</t>
      <t>Building on the Authentication and Authorization for Constrained Environments (ACE) framework <xref target="RFC9200"/>, the document <xref target="RFC9594"/> defines how to request, distribute, and renew keying material and configuration parameters to protect message exchanges in a group communication environment. That is, candidate group members that act as ACE Clients and are authorized to join a group can interact with a Key Distribution Center (KDC) that acts as ACE Resource Server and is responsible for the group. The KDC provides the necessary keying material and parameters to communicate with other group members.</t>
      <t>While <xref target="RFC9594"/> defines the operations and interface available at the KDC, as well as general message formats for the interactions between Clients and the KDC, it delegates details on the communication and security approaches used in a group to separate application profiles. These are specialized instances of <xref target="RFC9594"/> that target a particular group communication approach and define how communications in the group are protected, as well as the specific keying material and configuration parameters provided to group members.</t>
      <t>This document specifies an application profile of <xref target="RFC9594"/>. Message exchanges among the participants as well as message formats and processing follow what is specified in <xref target="RFC9594"/>, and enable secure Pub-Sub communication where a group of Publishers and Subscribers securely communicate through a Broker using CoAP as per <xref target="I-D.ietf-core-coap-pubsub"/>.</t>
      <t>In particular, this document specifies the provisioning and enforcement of authorization information for Clients to act as Publishers and/or Subscribers at the Broker, as well as the provisioning of keying material and security parameters that Clients use for protecting end-to-end their communications via the Broker.</t>
      <t>In order to protect the Pub-Sub operations at the Broker as well as the provisioning of keying material and security parameters, this profile leverages protocol-specific transport profiles of ACE (e.g., <xref target="RFC9202"/><xref target="RFC9203"/>), in order to achieve communication security, server authentication, and proof of possession of a key owned by the Client and bound to an OAuth 2.0 access token.</t>
      <t>The content of published messages that are circulated by the Broker is protected end-to-end between the corresponding Publisher and the intended Subscribers. To this end, this profile relies on COSE <xref target="RFC9052"/><xref target="RFC9053"/> and on keying material provided to the Publishers and Subscribers participating in the same Pub-Sub topic. In particular, source authentication of published topic data is achieved by means of the corresponding Publisher signing such content with its own private key.</t>
      <t><xref target="fig-document-relationships"/> overviews the relationships between this document and other related documents mentioned above.</t>
      <figure anchor="fig-document-relationships">
        <name>Overview of Document Relationships</name>
        <artset>
          <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="720" width="576" viewBox="0 0 576 720" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 8,32 L 8,80" fill="none" stroke="black"/>
              <path d="M 8,128 L 8,176" fill="none" stroke="black"/>
              <path d="M 8,304 L 8,368" fill="none" stroke="black"/>
              <path d="M 8,464 L 8,576" fill="none" stroke="black"/>
              <path d="M 24,184 L 24,296" fill="none" stroke="black"/>
              <path d="M 24,376 L 24,456" fill="none" stroke="black"/>
              <path d="M 176,304 L 176,368" fill="none" stroke="black"/>
              <path d="M 192,32 L 192,80" fill="none" stroke="black"/>
              <path d="M 192,128 L 192,176" fill="none" stroke="black"/>
              <path d="M 264,240 L 264,368" fill="none" stroke="black"/>
              <path d="M 280,464 L 280,576" fill="none" stroke="black"/>
              <path d="M 304,64 L 304,224" fill="none" stroke="black"/>
              <path d="M 304,384 L 304,544" fill="none" stroke="black"/>
              <path d="M 352,528 L 352,576" fill="none" stroke="black"/>
              <path d="M 424,528 L 424,576" fill="none" stroke="black"/>
              <path d="M 464,240 L 464,368" fill="none" stroke="black"/>
              <path d="M 568,304 L 568,560" fill="none" stroke="black"/>
              <path d="M 8,32 L 192,32" fill="none" stroke="black"/>
              <path d="M 200,64 L 304,64" fill="none" stroke="black"/>
              <path d="M 8,80 L 192,80" fill="none" stroke="black"/>
              <path d="M 8,128 L 192,128" fill="none" stroke="black"/>
              <path d="M 8,176 L 192,176" fill="none" stroke="black"/>
              <path d="M 272,238 L 456,238" fill="none" stroke="black"/>
              <path d="M 272,242 L 456,242" fill="none" stroke="black"/>
              <path d="M 8,304 L 176,304" fill="none" stroke="black"/>
              <path d="M 472,304 L 568,304" fill="none" stroke="black"/>
              <path d="M 8,368 L 176,368" fill="none" stroke="black"/>
              <path d="M 272,366 L 456,366" fill="none" stroke="black"/>
              <path d="M 272,370 L 456,370" fill="none" stroke="black"/>
              <path d="M 8,464 L 280,464" fill="none" stroke="black"/>
              <path d="M 352,528 L 424,528" fill="none" stroke="black"/>
              <path d="M 288,544 L 304,544" fill="none" stroke="black"/>
              <path d="M 432,560 L 568,560" fill="none" stroke="black"/>
              <path d="M 8,576 L 280,576" fill="none" stroke="black"/>
              <path d="M 352,576 L 424,576" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="480,304 468,298.4 468,309.6" fill="black" transform="rotate(180,472,304)"/>
              <polygon class="arrowhead" points="312,384 300,378.4 300,389.6" fill="black" transform="rotate(270,304,384)"/>
              <polygon class="arrowhead" points="312,224 300,218.4 300,229.6" fill="black" transform="rotate(90,304,224)"/>
              <polygon class="arrowhead" points="32,456 20,450.4 20,461.6" fill="black" transform="rotate(90,24,456)"/>
              <polygon class="arrowhead" points="32,184 20,178.4 20,189.6" fill="black" transform="rotate(270,24,184)"/>
              <circle cx="264" cy="240" r="6" class="opendot" fill="white" stroke="black"/>
              <circle cx="264" cy="368" r="6" class="opendot" fill="white" stroke="black"/>
              <circle cx="464" cy="240" r="6" class="opendot" fill="white" stroke="black"/>
              <circle cx="464" cy="368" r="6" class="opendot" fill="white" stroke="black"/>
              <g class="text">
                <text x="48" y="52">Pub-Sub</text>
                <text x="132" y="52">architecture</text>
                <text x="32" y="68">for</text>
                <text x="68" y="68">CoAP</text>
                <text x="104" y="68">(a)</text>
                <text x="372" y="100">Authorization,</text>
                <text x="484" y="100">provisioning</text>
                <text x="548" y="100">of</text>
                <text x="340" y="116">keying</text>
                <text x="404" y="116">material</text>
                <text x="456" y="116">and</text>
                <text x="508" y="116">security</text>
                <text x="360" y="132">parameters,</text>
                <text x="424" y="132">and</text>
                <text x="484" y="132">end-to-end</text>
                <text x="56" y="148">Transport</text>
                <text x="132" y="148">profiles</text>
                <text x="356" y="148">protection</text>
                <text x="412" y="148">of</text>
                <text x="464" y="148">published</text>
                <text x="528" y="148">topic</text>
                <text x="28" y="164">of</text>
                <text x="60" y="164">ACE,</text>
                <text x="104" y="164">e.g.,</text>
                <text x="156" y="164">(c)(d)</text>
                <text x="332" y="164">data</text>
                <text x="368" y="164">can</text>
                <text x="396" y="164">be</text>
                <text x="432" y="164">based</text>
                <text x="468" y="164">on</text>
                <text x="496" y="164">...</text>
                <text x="64" y="228">Details</text>
                <text x="120" y="228">about</text>
                <text x="180" y="228">security</text>
                <text x="48" y="244">and</text>
                <text x="92" y="244">secure</text>
                <text x="176" y="244">communication</text>
                <text x="56" y="260">among</text>
                <text x="96" y="260">ACE</text>
                <text x="164" y="260">participants</text>
                <text x="48" y="276">are</text>
                <text x="104" y="276">specified</text>
                <text x="156" y="276">in</text>
                <text x="184" y="276">...</text>
                <text x="288" y="276">&gt;&gt;&gt;</text>
                <text x="324" y="276">This</text>
                <text x="380" y="276">document</text>
                <text x="432" y="276">&lt;&lt;&lt;</text>
                <text x="32" y="324">ACE</text>
                <text x="88" y="324">framework</text>
                <text x="144" y="324">for</text>
                <text x="292" y="324">CoAP</text>
                <text x="384" y="324">publish-subscribe</text>
                <text x="76" y="340">authentication</text>
                <text x="152" y="340">and</text>
                <text x="304" y="340">profile</text>
                <text x="352" y="340">for</text>
                <text x="384" y="340">ACE</text>
                <text x="72" y="356">authorization</text>
                <text x="144" y="356">(b)</text>
                <text x="52" y="404">Used</text>
                <text x="84" y="404">to</text>
                <text x="120" y="404">build</text>
                <text x="160" y="404">...</text>
                <text x="352" y="404">Instanced</text>
                <text x="404" y="404">by</text>
                <text x="432" y="404">the</text>
                <text x="360" y="420">application</text>
                <text x="440" y="420">profile</text>
                <text x="344" y="436">defined</text>
                <text x="388" y="436">in</text>
                <text x="416" y="436">...</text>
                <text x="32" y="484">Key</text>
                <text x="100" y="484">provisioning</text>
                <text x="168" y="484">for</text>
                <text x="208" y="484">group</text>
                <text x="452" y="484">Used</text>
                <text x="484" y="484">to</text>
                <text x="528" y="484">protect</text>
                <text x="72" y="500">communication</text>
                <text x="152" y="500">using</text>
                <text x="192" y="500">ACE</text>
                <text x="224" y="500">(e)</text>
                <text x="472" y="500">published</text>
                <text x="536" y="500">topic</text>
                <text x="452" y="516">data</text>
                <text x="516" y="516">end-to-end</text>
                <text x="24" y="532">-</text>
                <text x="64" y="532">General</text>
                <text x="128" y="532">message</text>
                <text x="192" y="532">formats</text>
                <text x="444" y="532">in</text>
                <text x="472" y="532">...</text>
                <text x="24" y="548">-</text>
                <text x="76" y="548">Operations</text>
                <text x="136" y="548">and</text>
                <text x="192" y="548">interface</text>
                <text x="244" y="548">at</text>
                <text x="264" y="548">a</text>
                <text x="380" y="548">COSE</text>
                <text x="48" y="564">Key</text>
                <text x="116" y="564">Distribution</text>
                <text x="196" y="564">Center</text>
                <text x="248" y="564">(KDC)</text>
                <text x="388" y="564">(f)(g)</text>
                <text x="16" y="612">(a)</text>
                <text x="40" y="612">:</text>
                <text x="160" y="612">[I-D.ietf-core-coap-pubsub]</text>
                <text x="16" y="628">(b)</text>
                <text x="40" y="628">:</text>
                <text x="88" y="628">[RFC9200]</text>
                <text x="16" y="644">(c)</text>
                <text x="40" y="644">:</text>
                <text x="88" y="644">[RFC9202]</text>
                <text x="16" y="660">(d)</text>
                <text x="40" y="660">:</text>
                <text x="88" y="660">[RFC9203]</text>
                <text x="16" y="676">(e)</text>
                <text x="40" y="676">:</text>
                <text x="88" y="676">[RFC9594]</text>
                <text x="16" y="692">(f)</text>
                <text x="40" y="692">:</text>
                <text x="88" y="692">[RFC9052]</text>
                <text x="16" y="708">(g)</text>
                <text x="40" y="708">:</text>
                <text x="88" y="708">[RFC9053]</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art" align="center"><![CDATA[
+----------------------+
| Pub-Sub architecture |
| for CoAP (a)         |-------------+
+----------------------+             |
                                     | Authorization, provisioning of
                                     | keying material and security
+----------------------+             | parameters, and end-to-end
| Transport profiles   |             | protection of published topic
| of ACE, e.g., (c)(d) |             | data can be based on ...
+----------------------+             |
  ^                                  |
  |                                  |
  | Details about security           v
  | and secure communication    o========================o
  | among ACE participants      |                        |
  | are specified in ...        | >>> This document <<<  |
  |                             |                        |
+--------------------+          |                        |<-----------+
| ACE framework for  |          | CoAP publish-subscribe |            |
| authentication and |          | profile for ACE        |            |
| authorization (b)  |          |                        |            |
+--------------------+          o========================o            |
  |                                  ^                                |
  | Used to build ...                | Instanced by the               |
  |                                  | application profile            |
  |                                  | defined in ...                 |
  v                                  |                                |
+---------------------------------+  |                                |
| Key provisioning for group      |  |                Used to protect |
| communication using ACE (e)     |  |                published topic |
|                                 |  |                data end-to-end |
| - General message formats       |  |     +--------+ in ...          |
| - Operations and interface at a |--+     | COSE   |                 |
|   Key Distribution Center (KDC) |        | (f)(g) |-----------------+
+---------------------------------+        +--------+

(a) : [I-D.ietf-core-coap-pubsub]
(b) : [RFC9200]
(c) : [RFC9202]
(d) : [RFC9203]
(e) : [RFC9594]
(f) : [RFC9052]
(g) : [RFC9053]
]]></artwork>
        </artset>
      </figure>
      <t>Note to RFC Editor: At the bottom of <xref target="fig-document-relationships"/>, "[I-D.ietf-core-coap-pubsub]" is the reference label that the present document is currently using for that referred document. Before publishing as an RFC, please replace that reference label with the one eventually used for the (RFC resulting from) the referred document. Then, please delete this note.</t>
      <!--While this profile focuses on the Pub-Sub architecture for CoAP, {{mqtt-pubsub}} of this document describes how this profile can be applicable to MQTT {{MQTT-OASIS-Standard-v5}}. Similar adaptations can also extend to further transport protocols and Pub-Sub architectures.-->

<section anchor="terminology">
        <name>Terminology</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

<t>Readers are expected to be familiar with:</t>
        <ul spacing="normal">
          <li>
            <t>The terms and concepts described in the ACE framework for Authentication and Authorization <xref target="RFC9200"/>. The terminology for entities in the considered architecture is defined in OAuth 2.0 <xref target="RFC6749"/>. In particular, this includes Client, Resource Server (RS), and Authorization Server (AS).</t>
          </li>
          <li>
            <t>The Authorization Information Format (AIF) <xref target="RFC9237"/> used to express authorization information.</t>
          </li>
          <li>
            <t>The terms and concept related to the message formats and processing specified in <xref target="RFC9594"/>, for provisioning and renewing keying material in group communication scenarios. These include the abbreviations REQx and OPTx denoting the numbered mandatory-to-address and optional-to-address requirements, respectively.</t>
          </li>
          <li>
            <t>The terms and concepts described in CDDL <xref target="RFC8610"/>, CBOR <xref target="RFC8949"/>, and COSE <xref target="RFC9052"/><xref target="RFC9053"/><xref target="RFC9338"/>.</t>
          </li>
          <li>
            <t>The terms and concepts described in CoAP <xref target="RFC7252"/>. Note that the term "endpoint" is used here following its OAuth definition <xref target="RFC6749"/>, aimed at denoting resources such as <tt>/token</tt> and <tt>/introspect</tt> at the AS, and <tt>/authz-info</tt> at the RS. The CoAP definition, which is "[a]n entity participating in the CoAP protocol" <xref target="RFC7252"/>, is not used in this document.</t>
          </li>
          <li>
            <t>The terms and concepts of Pub-Sub group communication with CoAP, as described in <xref target="I-D.ietf-core-coap-pubsub"/>.</t>
          </li>
        </ul>
        <t>A party interested in participating in group communication as well as already participating as a group member is interchangeably denoted as "Client", "Pub-Sub client", or "node".</t>
        <ul spacing="normal">
          <li>
            <t>Group: a set of nodes that share common keying material and security parameters to protect their communications with one another. That is, the term refers to a "security group".  </t>
            <t>
This is not to be confused with an "application group", which has relevance at the application level and whose members are in this case the Clients acting as Publishers and/or Subscribers for a topic.</t>
          </li>
        </ul>
        <t>Examples throughout this document are expressed in CBOR diagnostic notation as defined in <xref section="8" sectionFormat="of" target="RFC8949"/> and <xref section="G" sectionFormat="of" target="RFC8610"/>. Diagnostic notation comments are often used to provide a textual representation of the parameters' keys and values.</t>
      </section>
    </section>
    <section anchor="overview">
      <name>Application Profile Overview</name>
      <t>This document describes how to use <xref target="RFC9200"/> and <xref target="RFC9594"/> to perform authentication, authorization, and key distribution operations as overviewed in <xref section="2" sectionFormat="of" target="RFC9594"/>, where the considered group is the security group composed of the Pub-Sub clients that exchange end-to-end protected content through the Broker.</t>
      <t>Pub-Sub clients communicate within their application groups, each of which is mapped to a topic. Depending on the application, a topic may consist of one or more sub-topics, which in turn may have their own sub-topics and so on, thus forming a hierarchy. A security group <bcp14>SHOULD</bcp14> be associated with a single application group. However, the same application group <bcp14>MAY</bcp14> be associated with multiple security groups. Further details and considerations on the mapping between the two types of groups are out of the scope of this document.</t>
      <t>This profile considers the architecture shown in <xref target="archi"/>. A Client can act as a Publisher, or a Subscriber, or both, e.g., by publishing to some topics and subscribing to others. However, for the simplicity of presentation, this profile describes Publisher and Subscriber Clients separately.</t>
      <t>Both Publishers and Subscribers act as ACE Clients. The Broker acts as an ACE RS and corresponds to the Dispatcher in <xref target="RFC9594"/>. The Key Distribution Center (KDC) also acts as an ACE RS and builds on what is defined for the KDC in <xref target="RFC9594"/>. From a high-level point of view, the Clients interact with the KDC in order to join security groups, thereby obtaining the group keying material to protect end-to-end and verify the content published in the associated topics.</t>
      <figure anchor="archi">
        <name>Architecture for Pub-Sub with Authorization Server and Key Distribution Center</name>
        <artset>
          <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="336" width="400" viewBox="0 0 400 336" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 8,240 L 8,320" fill="none" stroke="black"/>
              <path d="M 48,160 L 48,232" fill="none" stroke="black"/>
              <path d="M 80,192 L 80,232" fill="none" stroke="black"/>
              <path d="M 112,32 L 112,112" fill="none" stroke="black"/>
              <path d="M 112,240 L 112,320" fill="none" stroke="black"/>
              <path d="M 192,120 L 192,160" fill="none" stroke="black"/>
              <path d="M 240,32 L 240,112" fill="none" stroke="black"/>
              <path d="M 272,32 L 272,112" fill="none" stroke="black"/>
              <path d="M 288,240 L 288,320" fill="none" stroke="black"/>
              <path d="M 336,120 L 336,192" fill="none" stroke="black"/>
              <path d="M 392,32 L 392,112" fill="none" stroke="black"/>
              <path d="M 392,240 L 392,320" fill="none" stroke="black"/>
              <path d="M 112,32 L 240,32" fill="none" stroke="black"/>
              <path d="M 272,32 L 392,32" fill="none" stroke="black"/>
              <path d="M 112,112 L 240,112" fill="none" stroke="black"/>
              <path d="M 272,112 L 392,112" fill="none" stroke="black"/>
              <path d="M 48,160 L 96,160" fill="none" stroke="black"/>
              <path d="M 144,160 L 192,160" fill="none" stroke="black"/>
              <path d="M 80,192 L 224,192" fill="none" stroke="black"/>
              <path d="M 272,192 L 336,192" fill="none" stroke="black"/>
              <path d="M 8,240 L 112,240" fill="none" stroke="black"/>
              <path d="M 288,240 L 392,240" fill="none" stroke="black"/>
              <path d="M 120,256 L 176,256" fill="none" stroke="black"/>
              <path d="M 224,256 L 280,256" fill="none" stroke="black"/>
              <path d="M 120,288 L 176,288" fill="none" stroke="black"/>
              <path d="M 224,288 L 280,288" fill="none" stroke="black"/>
              <path d="M 8,320 L 112,320" fill="none" stroke="black"/>
              <path d="M 288,320 L 392,320" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="344,120 332,114.4 332,125.6" fill="black" transform="rotate(270,336,120)"/>
              <polygon class="arrowhead" points="288,288 276,282.4 276,293.6" fill="black" transform="rotate(0,280,288)"/>
              <polygon class="arrowhead" points="288,256 276,250.4 276,261.6" fill="black" transform="rotate(0,280,256)"/>
              <polygon class="arrowhead" points="200,120 188,114.4 188,125.6" fill="black" transform="rotate(270,192,120)"/>
              <polygon class="arrowhead" points="128,288 116,282.4 116,293.6" fill="black" transform="rotate(180,120,288)"/>
              <polygon class="arrowhead" points="128,256 116,250.4 116,261.6" fill="black" transform="rotate(180,120,256)"/>
              <polygon class="arrowhead" points="88,232 76,226.4 76,237.6" fill="black" transform="rotate(90,80,232)"/>
              <polygon class="arrowhead" points="56,232 44,226.4 44,237.6" fill="black" transform="rotate(90,48,232)"/>
              <g class="text">
                <text x="176" y="52">Authorization</text>
                <text x="328" y="52">Key</text>
                <text x="172" y="68">Server</text>
                <text x="332" y="68">Distribution</text>
                <text x="172" y="84">(AS)</text>
                <text x="332" y="84">Center</text>
                <text x="328" y="100">(KDC)</text>
                <text x="120" y="164">(A)</text>
                <text x="248" y="196">(B)</text>
                <text x="200" y="260">(O)</text>
                <text x="56" y="276">Pub-Sub</text>
                <text x="340" y="276">Broker</text>
                <text x="52" y="292">Client</text>
                <text x="200" y="292">(C)</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art" align="center"><![CDATA[
             +---------------+   +--------------+
             | Authorization |   |     Key      |
             |    Server     |   | Distribution |
             |     (AS)      |   |    Center    |
             |               |   |    (KDC)     |
             +---------------+   +--------------+
                       ^                 ^
                       |                 |
     +------ (A) ------+                 |
     |                                   |
     |   +------------------ (B) --------+
     |   |
     v   v
+------------+                     +------------+
|            |<------- (O) ------->|            |
|  Pub-Sub   |                     |   Broker   |
|  Client    |<------- (C) ------->|            |
|            |                     |            |
+------------+                     +------------+
]]></artwork>
        </artset>
      </figure>
      <t>Both Publishers and Subscribers <bcp14>MUST</bcp14> use the same protocol for interacting with the Broker and participating in Pub-Sub communications. When using the profile defined in this document, such a protocol <bcp14>MUST</bcp14> be CoAP <xref target="RFC7252"/>, which is used as described in <xref target="I-D.ietf-core-coap-pubsub"/> (REQ22). <!--What is specified in this document can apply to other protocols for Pub-Sub communications such as MQTT {{MQTT-OASIS-Standard-v5}}, or to further transport protocols-->.</t>
      <t>All Publishers and Subscribers <bcp14>MUST</bcp14> use CoAP when communicating with the KDC.</t>
      <t>Furthermore, both Publishers and Subscribers <bcp14>MUST</bcp14> use the same transport profile of ACE (e.g., <xref target="RFC9202"/> for DTLS, or <xref target="RFC9203"/> for OSCORE) in their interaction with the Broker. In order to reduce the number of libraries that Clients have to support, it is <bcp14>RECOMMENDED</bcp14> that the same transport profile of ACE is used also for the interaction between the Clients and the KDC (REQ24).</t>
      <t>Except for the end-to-end protection of published topic data (see <xref target="oscon"/>), all communications between the involved entities (Clients, Broker, KDC, Authorization Server) <bcp14>MUST</bcp14> occur and be secured in accordance with the protocol-specific transport profile of ACE used.</t>
      <t>For each Client, the Client and the Broker <bcp14>MUST</bcp14> have a secure communication association, which they establish with the help of the AS and using a transport profile of ACE. This is shown by the interactions A and C in <xref target="archi"/>. During this process, the Client obtains an access token from the AS and uploads it to the Broker, thus providing an evidence of the topics that it is authorised to participate in, and with which permissions.</t>
      <t>For each Client, the Client and the KDC <bcp14>MUST</bcp14> have a secure communication association, which they also establish with the help of the AS and using a transport profile of ACE (REQ24). This is shown by the interactions A and B in <xref target="archi"/>. During this process, the Client obtains an access token from the AS and uploads it to the KDC, thus providing an evidence of the security groups that it can join, as associated with the topics of interest at the Broker. Based on the permissions specified in the access token, the Client can request the KDC to join a security group, after which the Client obtains from the KDC the keying material to use for communicating with the other group members. This builds on the process for joining security groups with ACE, as defined in <xref target="RFC9594"/> and further specified in this document.</t>
      <t>In addition, this profile allows an anonymous Client to perform some of the discovery operations defined in <xref section="2.3" sectionFormat="of" target="I-D.ietf-core-coap-pubsub"/> through the Broker, as shown by the interaction O in <xref target="archi"/>. That is, an anonymous Client can discover:</t>
      <ul spacing="normal">
        <li>
          <t>the Broker itself, by relying on the resource type "core.ps" (see <xref section="2.3.1" sectionFormat="of" target="I-D.ietf-core-coap-pubsub"/>); and</t>
        </li>
        <li>
          <t>topics of interest at the Broker (i.e., the corresponding topic resources hosted at the Broker), by relying on the resource type "core.ps.conf" (see <xref section="2.3.3" sectionFormat="of" target="I-D.ietf-core-coap-pubsub"/>).</t>
        </li>
      </ul>
      <t>However, an anonymous Client is not allowed to access topic resources at the Broker and obtain from those any additional information or metadata about the corresponding topic (e.g., the topic status, the URI of the topic-data resource where to publish or subscribe for that topic, or the URI to the KDC).</t>
      <t>As highlighted in <xref target="associations"/>, each Client maintains two different security associations pertaining to the Pub-Sub group communication. On the one hand, the Client has a pairwise security association with the Broker, which, as an ACE RS, verifies that the Client is authorised to perform data operations (i.e., publish, subscribe, read, delete) on a certain set of topics (Security Association 1). As discussed above, this security association is set up with the help of the AS and using a transport profile of ACE, when the Client obtains the access token to upload to the Broker.</t>
      <t>On the other hand, separately for each topic, all the Publishers and Subscribers for that topic have a common, group security association, through which the published topic data sent through the Broker is protected end-to-end (Security Association 2). As discussed above, this security association is set up and maintained as the different Clients request the KDC to join the security group, upon which they obtain from the KDC the corresponding group keying material to use for protecting end-to-end and verifying the content of their Pub-Sub group communication.</t>
      <figure anchor="associations">
        <name>Security Associations between Publisher, Broker, and Subscriber</name>
        <artset>
          <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="240" width="544" viewBox="0 0 544 240" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 8,32 L 8,112" fill="none" stroke="black"/>
              <path d="M 40,120 L 40,208" fill="none" stroke="black"/>
              <path d="M 72,120 L 72,160" fill="none" stroke="black"/>
              <path d="M 104,32 L 104,112" fill="none" stroke="black"/>
              <path d="M 216,32 L 216,112" fill="none" stroke="black"/>
              <path d="M 248,120 L 248,160" fill="none" stroke="black"/>
              <path d="M 288,120 L 288,160" fill="none" stroke="black"/>
              <path d="M 320,32 L 320,112" fill="none" stroke="black"/>
              <path d="M 432,32 L 432,112" fill="none" stroke="black"/>
              <path d="M 464,120 L 464,160" fill="none" stroke="black"/>
              <path d="M 504,120 L 504,208" fill="none" stroke="black"/>
              <path d="M 536,32 L 536,112" fill="none" stroke="black"/>
              <path d="M 8,32 L 104,32" fill="none" stroke="black"/>
              <path d="M 216,32 L 320,32" fill="none" stroke="black"/>
              <path d="M 432,32 L 536,32" fill="none" stroke="black"/>
              <path d="M 8,112 L 104,112" fill="none" stroke="black"/>
              <path d="M 216,112 L 320,112" fill="none" stroke="black"/>
              <path d="M 432,112 L 536,112" fill="none" stroke="black"/>
              <path d="M 72,160 L 112,160" fill="none" stroke="black"/>
              <path d="M 200,160 L 248,160" fill="none" stroke="black"/>
              <path d="M 288,160 L 336,160" fill="none" stroke="black"/>
              <path d="M 424,160 L 464,160" fill="none" stroke="black"/>
              <path d="M 40,208 L 224,208" fill="none" stroke="black"/>
              <path d="M 312,208 L 504,208" fill="none" stroke="black"/>
              <g class="text">
                <text x="56" y="68">Publisher</text>
                <text x="268" y="68">Broker</text>
                <text x="484" y="68">Subscriber</text>
                <text x="156" y="164">Security</text>
                <text x="380" y="164">Security</text>
                <text x="152" y="180">Association</text>
                <text x="208" y="180">1</text>
                <text x="376" y="180">Association</text>
                <text x="432" y="180">1</text>
                <text x="268" y="212">Security</text>
                <text x="264" y="228">Association</text>
                <text x="320" y="228">2</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art" align="center"><![CDATA[
+-----------+             +------------+             +------------+
|           |             |            |             |            |
| Publisher |             |   Broker   |             | Subscriber |
|           |             |            |             |            |
|           |             |            |             |            |
+-----------+             +------------+             +------------+
    |   |                     |    |                     |    |
    |   |                     |    |                     |    |
    |   '----- Security ------'    '------ Security -----'    |
    |        Association 1               Association 1        |
    |                                                         |
    '----------------------- Security ------------------------'
                           Association 2
]]></artwork>
        </artset>
      </figure>
      <t>In summary, this profile specifies the following functionalities.</t>
      <ol spacing="normal" type="1"><li>
          <t>A Client obtains the authorization to participate in a Pub-Sub topic at the Broker with certain permissions. This pertains to operations defined in <xref target="I-D.ietf-core-coap-pubsub"/> for taking part in Pub-Sub communication with CoAP.</t>
        </li>
        <li>
          <t>A Client obtains the authorization to join a security group with certain permissions. This allows the Client to obtain from the KDC the group keying material for communicating with other group members, i.e., to protect end-to-end and verify the content published at the Broker on topics associated with the security group.</t>
        </li>
        <li>
          <t>A Client obtains from the KDC the authentication credentials of other group members, and provides or updates the KDC with its own authentication credential.</t>
        </li>
        <li>
          <t>A Client leaves the group or is removed from the group by the KDC.</t>
        </li>
        <li>
          <t>The KDC renews and redistributes the group keying material (rekeying), e.g., due to a membership change in the group.</t>
        </li>
      </ol>
      <t><xref target="groupcomm_requirements"/> compiles the list of requirements for this application profile of ACE and how they are fulfilled, consistently with the list of requirements defined in <xref section="A" sectionFormat="of" target="RFC9594"/>.</t>
    </section>
    <section anchor="authorisation">
      <name>Getting Authorisation to Join a Pub-Sub security group</name>
      <t><xref target="message-flow"/> provides a high level overview of the message flow for a Client getting authorisation to join a group. Square brackets denote optional steps. The message flow is expanded in the subsequent sections.</t>
      <figure anchor="message-flow">
        <name>Authorisation Flow</name>
        <artset>
          <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="576" width="576" viewBox="0 0 576 576" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 16,48 L 16,560" fill="none" stroke="black"/>
              <path d="M 456,48 L 456,152" fill="none" stroke="black"/>
              <path d="M 456,184 L 456,328" fill="none" stroke="black"/>
              <path d="M 456,360 L 456,392" fill="none" stroke="black"/>
              <path d="M 456,424 L 456,448" fill="none" stroke="black"/>
              <path d="M 456,488 L 456,560" fill="none" stroke="black"/>
              <path d="M 520,48 L 520,392" fill="none" stroke="black"/>
              <path d="M 520,424 L 520,456" fill="none" stroke="black"/>
              <path d="M 520,488 L 520,560" fill="none" stroke="black"/>
              <path d="M 560,48 L 560,560" fill="none" stroke="black"/>
              <path d="M 32,64 L 112,64" fill="none" stroke="black"/>
              <path d="M 352,64 L 440,64" fill="none" stroke="black"/>
              <path d="M 32,96 L 160,96" fill="none" stroke="black"/>
              <path d="M 312,96 L 440,96" fill="none" stroke="black"/>
              <path d="M 32,112 L 168,112" fill="none" stroke="black"/>
              <path d="M 304,112 L 440,112" fill="none" stroke="black"/>
              <path d="M 16,160 L 72,160" fill="none" stroke="black"/>
              <path d="M 416,160 L 512,160" fill="none" stroke="black"/>
              <path d="M 24,176 L 72,176" fill="none" stroke="black"/>
              <path d="M 424,176 L 520,176" fill="none" stroke="black"/>
              <path d="M 16,224 L 80,224" fill="none" stroke="black"/>
              <path d="M 384,224 L 448,224" fill="none" stroke="black"/>
              <path d="M 24,240 L 80,240" fill="none" stroke="black"/>
              <path d="M 384,240 L 448,240" fill="none" stroke="black"/>
              <path d="M 32,288 L 48,288" fill="none" stroke="black"/>
              <path d="M 416,288 L 440,288" fill="none" stroke="black"/>
              <path d="M 16,336 L 88,336" fill="none" stroke="black"/>
              <path d="M 408,336 L 512,336" fill="none" stroke="black"/>
              <path d="M 24,352 L 88,352" fill="none" stroke="black"/>
              <path d="M 416,352 L 520,352" fill="none" stroke="black"/>
              <path d="M 16,400 L 104,400" fill="none" stroke="black"/>
              <path d="M 408,400 L 552,400" fill="none" stroke="black"/>
              <path d="M 24,416 L 104,416" fill="none" stroke="black"/>
              <path d="M 408,416 L 552,416" fill="none" stroke="black"/>
              <path d="M 16,464 L 72,464" fill="none" stroke="black"/>
              <path d="M 480,464 L 552,464" fill="none" stroke="black"/>
              <path d="M 24,480 L 104,480" fill="none" stroke="black"/>
              <path d="M 432,480 L 560,480" fill="none" stroke="black"/>
              <path d="M 16,528 L 152,528" fill="none" stroke="black"/>
              <path d="M 304,528 L 448,528" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="560,464 548,458.4 548,469.6" fill="black" transform="rotate(0,552,464)"/>
              <polygon class="arrowhead" points="560,416 548,410.4 548,421.6" fill="black" transform="rotate(0,552,416)"/>
              <polygon class="arrowhead" points="560,400 548,394.4 548,405.6" fill="black" transform="rotate(0,552,400)"/>
              <polygon class="arrowhead" points="520,336 508,330.4 508,341.6" fill="black" transform="rotate(0,512,336)"/>
              <polygon class="arrowhead" points="520,160 508,154.4 508,165.6" fill="black" transform="rotate(0,512,160)"/>
              <polygon class="arrowhead" points="456,528 444,522.4 444,533.6" fill="black" transform="rotate(0,448,528)"/>
              <polygon class="arrowhead" points="456,240 444,234.4 444,245.6" fill="black" transform="rotate(0,448,240)"/>
              <polygon class="arrowhead" points="456,224 444,218.4 444,229.6" fill="black" transform="rotate(0,448,224)"/>
              <polygon class="arrowhead" points="448,288 436,282.4 436,293.6" fill="black" transform="rotate(0,440,288)"/>
              <polygon class="arrowhead" points="448,96 436,90.4 436,101.6" fill="black" transform="rotate(0,440,96)"/>
              <polygon class="arrowhead" points="448,64 436,58.4 436,69.6" fill="black" transform="rotate(0,440,64)"/>
              <polygon class="arrowhead" points="40,288 28,282.4 28,293.6" fill="black" transform="rotate(180,32,288)"/>
              <polygon class="arrowhead" points="40,112 28,106.4 28,117.6" fill="black" transform="rotate(180,32,112)"/>
              <polygon class="arrowhead" points="40,64 28,58.4 28,69.6" fill="black" transform="rotate(180,32,64)"/>
              <polygon class="arrowhead" points="32,480 20,474.4 20,485.6" fill="black" transform="rotate(180,24,480)"/>
              <polygon class="arrowhead" points="32,416 20,410.4 20,421.6" fill="black" transform="rotate(180,24,416)"/>
              <polygon class="arrowhead" points="32,352 20,346.4 20,357.6" fill="black" transform="rotate(180,24,352)"/>
              <polygon class="arrowhead" points="32,240 20,234.4 20,245.6" fill="black" transform="rotate(180,24,240)"/>
              <polygon class="arrowhead" points="32,176 20,170.4 20,181.6" fill="black" transform="rotate(180,24,176)"/>
              <g class="text">
                <text x="28" y="36">Client</text>
                <text x="460" y="36">Broker</text>
                <text x="524" y="36">AS</text>
                <text x="560" y="36">KDC</text>
                <text x="24" y="68">[</text>
                <text x="160" y="68">Discovery</text>
                <text x="212" y="68">of</text>
                <text x="248" y="68">Topic</text>
                <text x="308" y="68">Resource</text>
                <text x="448" y="68">]</text>
                <text x="24" y="100">[</text>
                <text x="204" y="100">Resource</text>
                <text x="272" y="100">Request</text>
                <text x="448" y="100">]</text>
                <text x="24" y="116">[</text>
                <text x="188" y="116">AS</text>
                <text x="248" y="116">Information</text>
                <text x="448" y="116">]</text>
                <text x="136" y="164">Authorisation</text>
                <text x="224" y="164">Request</text>
                <text x="300" y="164">(Audience:</text>
                <text x="376" y="164">Broker)</text>
                <text x="136" y="180">Authorisation</text>
                <text x="228" y="180">Response</text>
                <text x="308" y="180">(Audience:</text>
                <text x="384" y="180">Broker)</text>
                <text x="116" y="228">Upload</text>
                <text x="156" y="228">of</text>
                <text x="224" y="228">authorisation</text>
                <text x="328" y="228">information</text>
                <text x="144" y="244">Establishment</text>
                <text x="212" y="244">of</text>
                <text x="252" y="244">secure</text>
                <text x="328" y="244">association</text>
                <text x="24" y="292">[</text>
                <text x="96" y="292">Discovery</text>
                <text x="148" y="292">of</text>
                <text x="176" y="292">KDC</text>
                <text x="208" y="292">and</text>
                <text x="244" y="292">name</text>
                <text x="276" y="292">of</text>
                <text x="324" y="292">security</text>
                <text x="384" y="292">group</text>
                <text x="448" y="292">]</text>
                <text x="152" y="340">Authorisation</text>
                <text x="240" y="340">Request</text>
                <text x="316" y="340">(Audience:</text>
                <text x="380" y="340">KDC)</text>
                <text x="152" y="356">Authorisation</text>
                <text x="244" y="356">Response</text>
                <text x="324" y="356">(Audience:</text>
                <text x="388" y="356">KDC)</text>
                <text x="140" y="404">Upload</text>
                <text x="180" y="404">of</text>
                <text x="248" y="404">authorisation</text>
                <text x="352" y="404">information</text>
                <text x="168" y="420">Establishment</text>
                <text x="236" y="420">of</text>
                <text x="276" y="420">secure</text>
                <text x="352" y="420">association</text>
                <text x="112" y="468">Request</text>
                <text x="156" y="468">to</text>
                <text x="188" y="468">join</text>
                <text x="224" y="468">the</text>
                <text x="276" y="468">security</text>
                <text x="336" y="468">group</text>
                <text x="376" y="468">for</text>
                <text x="408" y="468">the</text>
                <text x="448" y="468">topic</text>
                <text x="140" y="484">Keying</text>
                <text x="204" y="484">material</text>
                <text x="256" y="484">for</text>
                <text x="288" y="484">the</text>
                <text x="340" y="484">security</text>
                <text x="400" y="484">group</text>
                <text x="196" y="532">Resource</text>
                <text x="264" y="532">Request</text>
                <text x="176" y="548">(Publication/Subscription</text>
                <text x="292" y="548">to</text>
                <text x="320" y="548">the</text>
                <text x="364" y="548">topic)</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art" align="center"><![CDATA[
Client                                                Broker    AS  KDC
 |                                                      |       |    |
 |[<---------- Discovery of Topic Resource ----------->]|       |    |
 |                                                      |       |    |
 |[----------------- Resource Request ---------------->]|       |    |
 |[<----------------- AS Information ------------------]|       |    |
 |                                                      |       |    |
 |                                                      |       |    |
 +------- Authorisation Request (Audience: Broker) ------------>|    |
 |<------ Authorisation Response (Audience: Broker) ------------+    |
 |                                                      |       |    |
 |                                                      |       |    |
 +-------- Upload of authorisation information -------->|       |    |
 |<------- Establishment of secure association -------->|       |    |
 |                                                      |       |    |
 |                                                      |       |    |
 |[<-- Discovery of KDC and name of security group --->]|       |    |
 |                                                      |       |    |
 |                                                      |       |    |
 +--------- Authorisation Request (Audience: KDC) ------------->|    |
 |<-------- Authorisation Response (Audience: KDC) -------------+    |
 |                                                      |       |    |
 |                                                      |       |    |
 +----------- Upload of authorisation information ------------------>|
 |<---------- Establishment of secure association ------------------>|
 |                                                      |       |    |
 |                                                      |       |    |
 +------- Request to join the security group for the topic --------->|
 |<---------- Keying material for the security group ----------------+
 |                                                      |       |    |
 |                                                      |       |    |
 +----------------- Resource Request ------------------>|       |    |
 |       (Publication/Subscription to the topic)        |       |    |
 |                                                      |       |    |
]]></artwork>
        </artset>
      </figure>
      <t>As shown in <xref target="message-flow"/>, after a Client obtains authorisation information for participating in a Pub-Sub topic with name TOPICNAME (see <xref target="auth-request"/> and <xref target="as-response"/>), the Client uploads that information to the Broker as per the specific transport profile of ACE used, e.g., <xref target="RFC9202"/> or <xref target="RFC9203"/>.</t>
      <t>Following that, the Client can perform the optional discovery of the KDC and security group name at the Broker, by accessing the topic resource corresponding to the topic in question (see <xref target="kdc-discovery"/>).</t>
      <t>In order to ensure that the Client can seamlessly access the right topic resource at the Broker, it is <bcp14>RECOMMENDED</bcp14> that a Broker implementing this application profile uses the path /ps/TOPICNAME to host the topic resource for the topic with name TOPICNAME. Alternatively, the Client might not know the right topic resource to target and thus would attempt to access different ones (e.g., based on the result of an early discovery of topic resources, see <xref target="topic-discovery"/>), until it finds the right one specifying TOPICNAME as value of the 'topic-name' parameter in the resource representation.</t>
      <t>Separately, after the Client obtains authorisation information for joining the security group at the KDC (see <xref target="auth-request"/> and <xref target="as-response"/>), the Client uploads that information to the KDC (see <xref target="token-post"/>). Following that, the Client can join the security group at the KDC and thus obtain the corresponding keying material (see <xref target="join"/>).</t>
      <t>Once the steps above have been completed, the Client can take part in the secure group communication for the topic TOPICNAME, e.g., by publishing data to the topic through a request targeting the topic-data resource at the Broker.</t>
      <t>Note that the overview in <xref target="message-flow"/> shows the specific sequence of steps where the Client: first associates with the Broker for participating in a topic; then discovers the KDC and the name of the security group through the Broker; and finally associates with the KDC, through which it joins the security group. However, if the Client is early aware about how to reach the KDC and about the name of the security group, the Client can instead: first associate with the KDC and join the security group, and then associate with the Broker for participating in the topic.</t>
      <t>Since <xref target="RFC9200"/> recommends the use of CoAP and CBOR, this document describes the exchanges assuming that CoAP and CBOR are used. However, using HTTP instead of CoAP is possible, by leveraging the corresponding parameters and methods. Analogously, JSON <xref target="RFC8259"/> can be used instead of CBOR, by relying on the conversion method specified in Sections <xref target="RFC8949" section="6.1" sectionFormat="bare"/> and <xref target="RFC8949" section="6.2" sectionFormat="bare"/> of <xref target="RFC8949"/>. In case JSON is used, the Content-Format of the message has to be specified accordingly. Exact definitions of these exchanges are out of scope for this document.</t>
      <section anchor="topic-discovery">
        <name>Topic Discovery at the Broker (Optional)</name>
        <t>The discovery of a topic at the Broker can be performed by discovering the corresponding topic resource hosted at the Broker. For example, the Client can send a lookup request to /.well-known/core at the Broker, specifying as lookup criterion the resource type "core.ps.conf" (see <xref section="2.3.3" sectionFormat="of" target="I-D.ietf-core-coap-pubsub"/>).</t>
        <t>Although the links to the topic resources are also specified in the representation of the collection resource at the Broker (see <xref section="2.4" sectionFormat="of" target="I-D.ietf-core-coap-pubsub"/>), the Client is not supposed to access such a resource, as intended for administrative operations that are out of the scope of this document.</t>
      </section>
      <section anchor="AS-discovery">
        <name>AS Discovery at the Broker (Optional)</name>
        <t>Complementary to what is defined in <xref section="5.1" sectionFormat="of" target="RFC9200"/> for AS discovery, the Broker <bcp14>MAY</bcp14> send the address of the AS to the Client in the 'AS' parameter of the AS Request Creation Hints, as a response to an Unauthorised Resource Request (see <xref section="5.2" sectionFormat="of" target="RFC9200"/>). An example using the CBOR diagnostic notation and CoAP is given below.</t>
        <figure anchor="AS-info-ex">
          <name>AS Request Creation Hints Example</name>
          <artwork align="left"><![CDATA[
    4.01 Unauthorized
    Content-Format: 19 (application/ace+cbor)
    Payload:
    {
     / AS / 1 : "coaps://as.example.com/token"
    }
]]></artwork>
        </figure>
      </section>
      <section anchor="kdc-discovery">
        <name>KDC Discovery at the Broker (Optional)</name>
        <t>Once a Client has obtained an access token from the AS and accordingly established a secure association with the Broker, the Client has the permission to access the topic resources at the Broker that pertain to the topics on which the Client is authorised to operate.</t>
        <t>In particular the Client is authorised to retrieve the representation of a topic resource, from which the Client can retrieve information related to the topic in question, as specified in <xref section="2.5" sectionFormat="of" target="I-D.ietf-core-coap-pubsub"/>.</t>
        <t>This profile extends the set of CoAP Pub-Sub Parameters that is possible to specify within the representation of a topic resource, as originally defined in <xref section="3" sectionFormat="of" target="I-D.ietf-core-coap-pubsub"/>. In particular, this profile defines the following two parameters that the Broker can specify in a response to a request that targets a topic resource (see <xref section="2.5" sectionFormat="of" target="I-D.ietf-core-coap-pubsub"/>). Note that, when these parameters are transported in their respective fields of the message payload, the Content-Format "application/core-pubsub+cbor" defined in <xref target="I-D.ietf-core-coap-pubsub"/> <bcp14>MUST</bcp14> be used.</t>
        <ul spacing="normal">
          <li>
            <t>'kdc_uri', with value the URI of the group-membership resource at the KDC, where Clients can send a request to join the security group associated with the topic in question. The URI is encoded as a CBOR text string. Clients will have to obtain an access token from the AS to upload to the KDC, before starting the process to join the security group at the KDC.</t>
          </li>
          <li>
            <t>'sec_gp', specifying the name of the security group associated with the topic in question, as a stable and invariant identifier. The name of the security group is encoded as a CBOR text string.</t>
          </li>
        </ul>
        <t>Furthermore, the Resource Type (rt=) Link Target Attribute value "core.ps.gm" is registered in <xref target="core_rt"/> (REQ10), and can be used to describe group-membership resources at the KDC, e.g., by using a CoRE link-format document <xref target="RFC6690"/>. As an alternative to the discovery approach defined above and provided by the Broker, applications can use this common resource type to discover links to group-membership resources at the KDC for joining security groups associated with Pub-Sub topics.</t>
      </section>
      <section anchor="auth-request">
        <name>Authorisation Request/Response for the KDC and the Broker</name>
        <t>A Client sends two Authorisation Requests to the AS, targeting two different audiences, i.e., the Broker and the KDC.</t>
        <t>As to the former, the AS handles Authorisation Requests related to a topic for which the Client is allowed to perform topic data operations at the Broker, as corresponding to an application group.</t>
        <t>As to the latter, the AS handles Authorization Requests for security groups that the Client is allowed to join, in order to obtain the group keying material for protecting end-to-end and verifying the content of exchanged messages on the associated Pub-Sub topics.</t>
        <t>This section builds on <xref section="3" sectionFormat="of" target="RFC9594"/> and defines only additions or modifications to that specification.</t>
        <t>Both Authorisation Requests include the following fields (see <xref section="3.1" sectionFormat="of" target="RFC9594"/>):</t>
        <ul spacing="normal">
          <li>
            <t>'scope': Optional. If present, it specifies the following information, depending on the specifically targeted audience.  </t>
            <t>
If the audience is the Broker, the scope specifies the names of the topics that the Client wishes to access, together with the corresponding requested permissions.  </t>
            <t>
If the audience is the KDC, the scope specifies the names of the security groups that the Client wishes to join, together with the corresponding requested permissions.  </t>
            <t>
This parameter is encoded as a CBOR byte string, whose value is the binary encoding of a CBOR array. The format of the encoded scope <bcp14>MUST</bcp14> follow the data model AIF-PUBSUB-GROUPCOMM defined in <xref target="scope"/>.  </t>
            <t>
The textual format specified in <xref section="3.1" sectionFormat="of" target="RFC9594"/> is not used in this application profile (OPT1).</t>
          </li>
          <li>
            <t>'audience': Required identifier corresponding to either the Broker or the KDC.</t>
          </li>
        </ul>
        <t>Other additional parameters can be included if necessary, as defined in <xref target="RFC9200"/>.</t>
        <t>When using this profile, it is expected that a one-to-one mapping is enforced between the application group and the security group (see <xref target="overview"/>). If this is not the case, the correct access policies for both sets of scopes have to be available to the AS.</t>
        <section anchor="scope">
          <name>Format of Scope</name>
          <t>Building on <xref section="3.1" sectionFormat="of" target="RFC9594"/>, this section defines the exact format and encoding of scope used in this profile.</t>
          <t>To this end, this profile uses the Authorization Information Format (AIF) <xref target="RFC9237"/> (REQ1). With reference to the generic AIF model</t>
          <artwork><![CDATA[
      AIF-Generic<Toid, Tperm> = [* [Toid, Tperm]]
]]></artwork>
          <t>the value of the CBOR byte string used as scope encodes the CBOR array [* [Toid, Tperm]], where each [Toid, Tperm] element corresponds to one scope entry.</t>
          <t>Furthermore, this document defines the new AIF data model AIF-PUBSUB-GROUPCOMM that this profile <bcp14>MUST</bcp14> use to format and encode scope entries.</t>
          <t>In particular, the following holds for each scope entry.</t>
          <t>The object identifier ("Toid") is specialized as a CBOR data item specifying the name of the group pertaining to the scope entry.</t>
          <t>The permission set ("Tperm") is specialized as a CBOR unsigned integer with value R, specifying the permissions that the Client wishes to have in the group indicated by "Toid".</t>
          <t>More specifically, the following applies when, as defined in this document, a scope entry includes a set of permissions for user-related operations performed by a Pub-Sub Client.</t>
          <ul spacing="normal">
            <li>
              <t>The object identifier ("Toid") is a CBOR text string, specifying the name of one application group (topic) or of the corresponding security group to which the scope entry pertains.</t>
            </li>
            <li>
              <t>The permission set ("Tperm") is a CBOR unsigned integer, whose value R specifies the operations that the Client wishes to or has been authorised to perform on the resources at the Broker associated with the application group (topic) indicated by "Toid", or on the resources at the KDC associated with the security group indicated by "Toid" (REQ1). The value R is computed as follows.  </t>
              <ul spacing="normal">
                <li>
                  <t>Each operation (i.e., permission detail) in the permission set is converted into the corresponding numeric identifier X taken from the following set.      </t>
                  <ul spacing="normal">
                    <li>
                      <t>Admin (0): This operation is reserved for scope entries that express permissions for Administrators of Pub-Sub groups, which are not specified in this document.</t>
                    </li>
                    <li>
                      <t>AppGroup (1): This operation is indicated as wished/authorised when "Toid" specifies the name of an application group (topic), while it is indicated as not wished/authorised when Toid specifies the name of a security group.</t>
                    </li>
                    <li>
                      <t>Publish (2): This operation concerns the publication of data to the topic in question, performed by means of a PUT request sent by a Publisher Client to the corresponding topic-data resource at the Broker.</t>
                    </li>
                    <li>
                      <t>Read (3): This operation concerns both: i) the subscription at the topic-data resource for the topic in question at the Broker, performed by means of a GET request with the CoAP Observe Option set to 0 and sent by a Subscriber Client; and ii) the simple reading of the latest data published to the topic in question, performed by means of a simple GET request sent to the same topic-data resource.</t>
                    </li>
                    <li>
                      <t>Delete (4): This operation concerns the deletion of the topic-data resource for the topic in question at the Broker, performed by means of a DELETE request sent to that resource.          </t>
                      <t>
If a Client wishes to have authorised only the Delete operation on an application group, then the Client does not need to join the corresponding security group, hence it does not need to request an access token for interacting with the KDC.          </t>
                      <t>
If a Client wishes to have authorised the Delete operation on a security group, then the AS and the KDC ignore the wish for that operation when processing the scope entry in question.</t>
                    </li>
                  </ul>
                </li>
                <li>
                  <t>The set of N numeric identifiers is converted into the single value R, by taking two to the power of each numeric identifier X_1, X_2, ..., X_N, and then computing the inclusive OR of the binary representations of all the power values.</t>
                </li>
              </ul>
              <t>
Since this application profile considers user-related operations, the "Admin" operation is indicated as not wished/authorised. That is, the scope entries <bcp14>MUST</bcp14> have the least significant bit of "Tperm" set to 0.</t>
            </li>
          </ul>
          <t>If the "Toid" of a scope entry in an access token specifies the name of an application group (i.e., the "AppGroup" operation is indicated as authorised), the Client has also the permission to retrieve the configuration of the application group (topic) whose name is indicated by "Toid", by sending a GET or FETCH request to the corresponding topic resource at the Broker.</t>
          <t>The specific interactions between the Client and the Broker are defined in <xref target="I-D.ietf-core-coap-pubsub"/>.</t>
          <t>The following CDDL <xref target="RFC8610"/> notation defines a scope entry that uses the AIF-PUBSUB-GROUPCOMM data model and expresses a set of permissions.</t>
          <figure anchor="scope-aif">
            <name>Pub-Sub scope using the AIF format</name>
            <artwork align="center"><![CDATA[
  AIF-PUBSUB-GROUPCOMM = AIF-Generic<pubsub-group, pubsub-perm>
   pubsub-group = tstr ; name of Pub-Sub topic or of
                       ; the associated security group

   pubsub-perm = uint .bits pubsub-perm-details

   pubsub-perm-details = &(
    Admin: 0,
    AppGroup: 1,
    Publish: 2,
    Read: 3,
    Delete: 4
   )

   scope_entry = [pubsub-group, pubsub-perm]
]]></artwork>
          </figure>
          <t>As per the guidelines in <xref target="RFC9237"/>, <xref target="aif"/> and <xref target="content_formats"/> register the specific instance of "Toid" and "Tperm" as media type parameters and a corresponding Content-Format (REQ2).</t>
        </section>
      </section>
      <section anchor="as-response">
        <name>Authorization response</name>
        <t>The AS responds with an Authorization Response as defined in <xref section="5.8.2" sectionFormat="of" target="RFC9200"/> and <xref section="3.2" sectionFormat="of" target="RFC9594"/>, with the following additions:</t>
        <ul spacing="normal">
          <li>
            <t>In the Authorization Response, the AS <bcp14>MUST</bcp14> include the 'expires_in' parameter.</t>
          </li>
          <li>
            <t>In the Authorization Response, the AS <bcp14>MUST</bcp14> include the 'scope' parameter, when the value included in the access token differs from the one specified by the Client in the Authorization Request.  In such a case, the second element of each scope entry specifies the set of operations that the Client is authorised for that scope entry, encoded as specified in <xref target="auth-request"/>.</t>
          </li>
        </ul>
        <t>Furthermore, the AS <bcp14>MAY</bcp14> use the extended format of scope defined in <xref section="7" sectionFormat="of" target="RFC9594"/> for the 'scope' claim of the access token. In such a case, the AS <bcp14>MUST</bcp14> use the CBOR tag with tag number TAG_NUMBER, associated with the CoAP Content-Format CF_ID for the media type "application/aif+cbor" registered in <xref target="content_formats"/> of this document (REQ28).</t>
        <t>Note to RFC Editor: In the previous paragraph, please replace "TAG_NUMBER" with the CBOR tag number computed as TN(ct) in <xref section="4.3" sectionFormat="of" target="RFC9277"/>, where ct is the ID assigned to the CoAP Content-Format registered in <xref target="content_formats"/> of this document.  Then, please replace "CF_ID" with the ID assigned to that CoAP Content-Format.  Finally, please delete this paragraph.</t>
        <t>This indicates that the binary encoded scope follows the scope semantics defined for this application profile in <xref target="scope"/> of this document.</t>
      </section>
      <section anchor="token-post">
        <name>Token Transfer to the KDC</name>
        <t>The Client transfers its access token to the KDC using one of the methods defined in the <xref section="3.3" sectionFormat="of" target="RFC9594"/>. This typically includes sending a POST request to the /authz-info endpoint. However, if the DTLS transport profile of ACE <xref target="RFC9202"/> is used and the Client uses a symmetric proof-of-possession (PoP) key in the DTLS handshake, the Client <bcp14>MAY</bcp14> provide the access token to the KDC in the "psk_identity" field of the DTLS ClientKeyExchange message when using DTLS 1.2 <xref target="RFC6347"/>, or in the "identity" field of a PskIdentity within the PreSharedKeyExtension of the ClientHello message when using DTLS 1.3 <xref target="RFC9147"/>. In addition to that, the following applies.</t>
        <t>In the Token Transfer Response to the Publishers, i.e., the Clients whose scope of the access token includes the "Publish" permission for at least one scope entry, the KDC <bcp14>MUST</bcp14> include the parameter 'kdcchallenge' in the CBOR map. 'kdcchallenge' is a nonce N_S generated by the KDC. As to the N_S value, it is <bcp14>RECOMMENDED</bcp14> to be at least 8-byte long and it is <bcp14>RECOMMENDED</bcp14> to be a random value. Later when joining the group, the Publisher can use the 'kdcchallenge' nonce as part of proving possession of its private key (see <xref target="RFC9594"/>). If a Publisher provides the access token to the KDC through an /authz-info endpoint, the Client <bcp14>MUST</bcp14> support the parameter 'kdcchallenge' (REQ30).</t>
        <t>If 'sign_info' is included in the Token Transfer Request, the KDC <bcp14>SHOULD</bcp14> include the 'sign_info' parameter in the Token Transfer Response. Note that the joining node may have obtained such information by alternative means, e.g., the 'sign_info' may have been pre-configured (OPT3).</t>
        <t>The following applies for each element 'sign_info_entry'.</t>
        <ul spacing="normal">
          <li>
            <t>'sign_alg' <bcp14>MUST</bcp14> take its value from the "Value" column of one of the recommended algorithms in the "COSE Algorithms" registry <xref target="IANA.cose_algorithms"/> (REQ3).</t>
          </li>
          <li>
            <t>'sign_parameters' is a CBOR array.  Its format and value are the same of the COSE capabilities array for the algorithm indicated in 'sign_alg' under the "Capabilities" column of the "COSE Algorithms" registry <xref target="IANA.cose_algorithms"/> (REQ4).</t>
          </li>
          <li>
            <t>'sign_key_parameters' is a CBOR array.  Its format and value are the same of the COSE capabilities array for the COSE key type of the keys used with the algorithm indicated in 'sign_alg', as specified for that key type in the "Capabilities" column of the "COSE Key Types" registry <xref target="IANA.cose_key-type"/> (REQ5).</t>
          </li>
          <li>
            <t>'cred_fmt' takes value from the "Label" column of the "COSE Header Parameters" registry <xref target="IANA.cose_header-parameters"/> (REQ6). Acceptable values denote a format of authentication credential that <bcp14>MUST</bcp14> explicitly provide the public key as well as the comprehensive set of information related to the public key algorithm, including, e.g., the used elliptic curve (when applicable).  </t>
            <t>
Acceptable formats of authentication credentials include CBOR Web Tokens (CWTs) and CWT Claims Sets (CCSs) <xref target="RFC8392"/>, X.509 certificates <xref target="RFC7925"/>, and C509 certificates <xref target="I-D.ietf-cose-cbor-encoded-cert"/>. Future formats would be acceptable to use as long as they comply with the criteria defined above.</t>
          </li>
        </ul>
        <t>This application profile does not define additional parameters to be used in the exchange of Token Transfer Request and Response (OPT2).</t>
      </section>
    </section>
    <section anchor="kdc-interface">
      <name>Client Group Communication Interface at the KDC</name>
      <t>In order to enable secure group communication for the Pub-Sub Clients, the KDC provides the resources listed in <xref target="tab-kdc-resources"/>.</t>
      <t>The entry of each resource specifies the CoAP methods by means of which it is admitted to access that resource, for nodes with different roles in the group or as non members. Except for accessing the /ace-group resource with the FETCH method (to retrieve security group names through their group identifiers) and the /ace-group/GROUPNAME resource with the POST method (to join the security group with name GROUPNAME), all other operations are admitted only to current members of the security group with name GROUPNAME (REQ11).</t>
      <t>Each resource is marked as <bcp14>REQUIRED</bcp14> or <bcp14>OPTIONAL</bcp14> to be hosted at the KDC (REQ9).</t>
      <table align="center" anchor="tab-kdc-resources">
        <name>Resources at the KDC</name>
        <thead>
          <tr>
            <th align="left">KDC resource</th>
            <th align="left">Description</th>
            <th align="left">Operations</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">/ace-group</td>
            <td align="left">
              <bcp14>REQUIRED</bcp14>. Contains a set of group names, each corresponding to one of the specified group identifiers.</td>
            <td align="left">FETCH (All Clients)</td>
          </tr>
          <tr>
            <td align="left">/ace-group/GROUPNAME</td>
            <td align="left">
              <bcp14>REQUIRED</bcp14>. Contains symmetric group keying material associated with GROUPNAME.</td>
            <td align="left">GET, POST (All Clients)</td>
          </tr>
          <tr>
            <td align="left">/ace-group/GROUPNAME/creds</td>
            <td align="left">
              <bcp14>REQUIRED</bcp14>. Contains the authentication credentials of all the Publishers of the group with name GROUPNAME.</td>
            <td align="left">GET, FETCH (All Clients)</td>
          </tr>
          <tr>
            <td align="left">/ace-group/GROUPNAME/num</td>
            <td align="left">
              <bcp14>REQUIRED</bcp14>. Contains the current version number for the symmetric group keying material of the group with name GROUPNAME.</td>
            <td align="left">GET (All Clients)</td>
          </tr>
          <tr>
            <td align="left">/ace-group/GROUPNAME/nodes/NODENAME</td>
            <td align="left">
              <bcp14>REQUIRED</bcp14>. Contains the group keying material for that group member NODENAME in GROUPNAME.</td>
            <td align="left">GET, DELETE (All Clients). POST (Publishers).</td>
          </tr>
          <tr>
            <td align="left">/ace-group/GROUPNAME/nodes/NODENAME/cred</td>
            <td align="left">
              <bcp14>REQUIRED</bcp14>. Contains the authentication credential for NODENAME in the group GROUPNAME.</td>
            <td align="left">POST (Publishers)</td>
          </tr>
          <tr>
            <td align="left">/ace-group/GROUPNAME/kdc-cred</td>
            <td align="left">
              <bcp14>REQUIRED</bcp14> if the group rekeying scheme used requires the use of a KDC authentication credential. Contains the authentication credential of the KDC for the group with name GROUPNAME.</td>
            <td align="left">GET (All Clients)</td>
          </tr>
          <tr>
            <td align="left">/ace-group/GROUPNAME/policies</td>
            <td align="left">
              <bcp14>OPTIONAL</bcp14>. Contains the group policies of the group with name GROUPNAME.</td>
            <td align="left">GET (All Clients)</td>
          </tr>
        </tbody>
      </table>
      <t>The use of these resources follows what is defined in <xref target="RFC9594"/>, and only additions or modifications to that specification are defined in this document. With respect to <xref target="RFC9594"/>, this document does not define new operations for Clients interacting with the KDC (REQ12).</t>
      <t>Consistent with what is defined in <xref section="4.1.2" sectionFormat="of" target="RFC9594"/>, some error responses from the KDC can convey error-specific information according to the problem-details format specified in <xref target="RFC9290"/>. This application profile does not define additional identifiers of error types as values of the 'error-id' field within the Custom Problem Detail entry 'ace-groupcomm-error' (OPT5).</t>
      <section anchor="join">
        <name>Joining a Security Group</name>
        <t>This section describes the interactions between a Client and the KDC to join a security group. Source authentication of a message sent within the group is ensured by means of a digital signature embedded in the message. Subscribers must be able to retrieve Publishers' authentication credentials from a trusted repository, to verify source authentication of received messages. Hence, on joining a security group, a Publisher is expected to provide its own authentication credential to the KDC.</t>
        <t>On a successful join, the Clients receive from the KDC the symmetric COSE Key <xref target="RFC9052"/> that is used as the shared group key to protect the payload of a published topic data.</t>
        <t>The message exchange between the joining node and the KDC follows what is defined in <xref section="4.3.1.1" sectionFormat="of" target="RFC9594"/>, and only additions or modifications to that specification are defined in this document.</t>
        <figure anchor="join-flow">
          <name>Join Flow</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="144" width="320" viewBox="0 0 320 144" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 32,48 L 32,112" fill="none" stroke="black"/>
                <path d="M 304,48 L 304,112" fill="none" stroke="black"/>
                <path d="M 32,64 L 72,64" fill="none" stroke="black"/>
                <path d="M 248,64 L 296,64" fill="none" stroke="black"/>
                <path d="M 40,96 L 72,96" fill="none" stroke="black"/>
                <path d="M 256,96 L 304,96" fill="none" stroke="black"/>
                <polygon class="arrowhead" points="304,64 292,58.4 292,69.6" fill="black" transform="rotate(0,296,64)"/>
                <polygon class="arrowhead" points="48,96 36,90.4 36,101.6" fill="black" transform="rotate(180,40,96)"/>
                <g class="text">
                  <text x="28" y="36">Client</text>
                  <text x="304" y="36">KDC</text>
                  <text x="100" y="68">Join</text>
                  <text x="152" y="68">Request</text>
                  <text x="212" y="68">(CoAP)</text>
                  <text x="100" y="100">Join</text>
                  <text x="156" y="100">Response</text>
                  <text x="220" y="100">(CoAP)</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
   Client                              KDC
      |                                 |
      +----- Join Request (CoAP) ------>|
      |                                 |
      |<---- Join Response (CoAP) ------+
      |                                 |
]]></artwork>
          </artset>
        </figure>
        <section anchor="join-request">
          <name>Join Request</name>
          <t>After establishing a secure communication association with the KDC, the Client sends a Join Request to the KDC as described in <xref section="4.3" sectionFormat="of" target="RFC9594"/>. More specifically, the Client sends a POST request to the /ace-group/GROUPNAME endpoint, with Content-Format "application/ace-groupcomm+cbor". The payload contains the following information formatted as a CBOR map, which <bcp14>MUST</bcp14> be encoded as defined in <xref section="4.3.1" sectionFormat="of" target="RFC9594"/>:</t>
          <ul spacing="normal">
            <li>
              <t>'scope': It <bcp14>MUST</bcp14> be present and its value <bcp14>MUST</bcp14> indicate the group that the Client is attempting to join, i.e., the group name, and the permissions that the Client wishes to have in the group. This value corresponds to one scope entry, as defined in <xref target="scope"/>.</t>
            </li>
            <li>
              <t>'get_creds': It <bcp14>MAY</bcp14> be present if the Client wishes to join as a Subscriber and wants to retrieve the public keys of all the Publishers upon joining. Otherwise, this parameter <bcp14>MUST NOT</bcp14> be present. If the parameter is present, the parameter <bcp14>MUST</bcp14> encode the CBOR simple value <tt>null</tt> (0xf6). Note that the parameter 'role_filter' is not necessary, as the KDC returns the authentication credentials of Publishers by default.</t>
            </li>
            <li>
              <t>'client_cred': The use of this parameter is detailed in <xref target="client_cred"/>.</t>
            </li>
            <li>
              <t>'cnonce': It specifies a nonce N_C generated by the Client. As to the N_C value, it is <bcp14>RECOMMENDED</bcp14> to be at least 8-byte long and it is <bcp14>RECOMMENDED</bcp14> to be a random value. Join Requests include a new 'cnonce' at each join attempt.</t>
            </li>
            <li>
              <t>'client_cred_verify': The use of this parameter is detailed in <xref target="pop"/>.</t>
            </li>
          </ul>
          <t>As a Publisher Client has its own authentication credential to use in a group, it <bcp14>MUST</bcp14> support the 'client_cred' and 'client_cred_verify' parameters (REQ30).</t>
          <t>For this application profile, the 'creds_repo' parameter is not relevant, since the KDC always acts as repository of the Publishers' authentication credentials. Consequently, no encoding is defined for this parameter (OPT6).</t>
          <t>This application profile does not define the functionalities that are implemented at the resource possibly hosted by the Client at the URI indicated in the 'control_uri' parameter (OPT7), if included in the Join Request.</t>
          <section anchor="client_cred">
            <name>Client Credential in 'client_cred'</name>
            <t>One of the following cases can occur when a new Client attempts to join a security group.</t>
            <ul spacing="normal">
              <li>
                <t>The joining node is not a Publisher, i.e., it is not going to send data to the application group.  In this case, the joining node is not required to provide its own authentication credential to the KDC. In case the joining node still provides an authentication credential in the 'client_cred' parameter of the Join Request (see <xref target="join-request"/>), the KDC silently ignores that parameter, as well as the related parameter 'client_cred_verify' if present.</t>
              </li>
              <li>
                <t>The joining node wishes to join as a Publisher and the KDC has not previously acquired an authentication credential of the joining node. Then, the joining node <bcp14>MUST</bcp14> provide a compatible authentication credential in the 'client_cred' parameter of the Join Request (see <xref target="join-request"/>).</t>
              </li>
              <li>
                <t>The joining node wishes to join as a Publisher and the KDC already acquired the authentication credential of the joining node, either during a past group joining process or when establishing a secure communication association using asymmetric proof-of-possession keys.  </t>
                <t>
If the joining node's authentication credential as well as the included public key are compatible with the signature algorithm used in the security group and with possible associated parameters, then the authentication credential can be used in the group. In this case, the joining node <bcp14>MAY</bcp14> choose not to provide again its authentication credential to the KDC, in order to limit the size of the Join Request.  </t>
                <t>
If the joining node chooses to do so, then the following applies when composing the Join Request: the value of the 'client_cred' parameter specifies an empty authentication credential, i.e., its value is set to the empty CBOR byte string (0x40); the 'client_cred_verify' parameter is omitted. In case the 'client_cred' parameter specifies the empty CBOR byte string (0x40), the KDC silently ignores the 'client_cred_verify' parameter if present.</t>
              </li>
            </ul>
            <t>The joining node <bcp14>MUST</bcp14> provide the KDC with its own authentication credential again, if it has previously provided the KDC with multiple authentication credentials intended for different security groups.</t>
            <t>If the joining node provides its authentication credential, the KDC performs the consistency checks above and, in case of success, considers it as the authentication credential associated with the joining node in the group.</t>
          </section>
          <section anchor="pop">
            <name>Proof of Possession through 'client_cred_verify'</name>
            <t>The 'client_cred_verify' parameter contains the proof-of-possession (PoP) evidence and is computed by the joining node to prove the possession of its own private key. The PoP evidence is computed as defined below (REQ14).</t>
            <t>The joining node signs the scope, concatenated with N_S and further concatenated with N_C, by using the private key corresponding to the public key included in the authentication credential that is specified in the 'client_cred' parameter.</t>
            <t>The N_S may be either of the following:</t>
            <ul spacing="normal">
              <li>
                <t>The nonce received from the KDC in the 'kdcchallenge' parameter of the 2.01 (Created) response to the Token Transfer Request (see <xref target="token-post"/>).</t>
              </li>
              <li>
                <t>If the provisioning of the access token to the KDC has relied on the DTLS profile of ACE <xref target="RFC9202"/> and the access token was specified in the "psk_identity" field of the ClientKeyExchange message when using DTLS 1.2 <xref target="RFC6347"/>, then N_S is an exporter value computed as defined in <xref section="4" sectionFormat="of" target="RFC5705"/> (REQ15).  </t>
                <t>
Specifically, N_S is exported from the DTLS session between the joining node and the KDC, using an empty context value (i.e., a context value of zero-length), 32 as length value in bytes, and the exporter label "EXPORTER-ACE-Sign-Challenge-coap-pubsub-app" defined in <xref target="tls_exporter"/> of this document.  </t>
                <t>
The same as above holds if TLS 1.2 <xref target="RFC5246"/> was used instead of DTLS 1.2, as per <xref target="RFC9430"/>.</t>
              </li>
              <li>
                <t>If the provisioning of the access token to the KDC has relied on the DTLS profile of ACE <xref target="RFC9202"/> and the access token was specified in the "identity" field of a PskIdentity within the PreSharedKeyExtension of the ClientHello message when using DTLS 1.3 <xref target="RFC9147"/>, then N_S is an exporter value computed as defined in <xref section="7.5" sectionFormat="of" target="RFC8446"/> (REQ15).  </t>
                <t>
Specifically, N_S is exported from the DTLS session between the joining node and the KDC, using an empty 'context_value' (i.e., a 'context_value' of zero length), 32 as 'key_length' in bytes, and the exporter label "EXPORTER-ACE-Sign-Challenge-coap-pubsub-app" defined in <xref target="tls_exporter"/> of this document.  </t>
                <t>
The same as above holds if TLS 1.3 <xref target="RFC8446"/> was used instead of DTLS 1.3, as per <xref target="RFC9430"/>.</t>
              </li>
              <li>
                <t>If the Join Request is a retry in response to an error response from the KDC, which included a new 'kdcchallenge' parameter, then N_S <bcp14>MUST</bcp14> be the new value from this parameter.</t>
              </li>
            </ul>
            <t>It is up to applications or future specifications to define how N_S is computed in further alternative settings.</t>
          </section>
        </section>
        <section anchor="join-response">
          <name>Join Response</name>
          <t>Upon receiving the Join Request, the KDC processes it as defined in <xref section="4.3.1" sectionFormat="of" target="RFC9594"/> and returns a success or error response.</t>
          <t>If the joining node is not requesting to join the group exclusively as a Subscriber and the 'client_cred' parameter does not specify the empty CBOR byte string (0x40), the KDC verifies the signature in the 'client_cred_verify' parameter. As PoP input, the KDC uses the value of the 'scope' parameter from the Join Request as a CBOR byte string, concatenated with N_S encoded as a CBOR byte string, concatenated with N_C encoded as a CBOR byte string.</t>
          <t>As public key of the joining node, the KDC uses the one included in the authentication credential retrieved from the 'client_cred' parameter of the Join Request. The KDC verifies the signature used as PoP evidence by means of the public key of the joining node, according to the signature algorithm used in the group and possible corresponding parameters.</t>
          <t>Instead, if the joining node is not requesting to join the group exclusively as a Subscriber and the 'client_cred' parameter specifies the empty CBOR byte string (0x40), the KDC verifies that it is storing exactly one eligible authentication credential for the joining node (e.g., of the format accepted in the group).</t>
          <t>In case an error occurs when processing the Join Request, the KDC and the joining node follow what is defined in <xref section="4.3.1" sectionFormat="of" target="RFC9594"/>, complemented by what is defined in <xref target="join-error"/> of the present document.</t>
          <t>In case of success, the KDC responds with a Join Response, whose payload is formatted as a CBOR map and <bcp14>MUST</bcp14> contain the following fields as per <xref section="4.3.1" sectionFormat="of" target="RFC9594"/>:</t>
          <ul spacing="normal">
            <li>
              <t>'gkty': this field specifies the key type "Group_PubSub_Keying_Material" (REQ18) registered in <xref target="iana-ace-groupcomm-key"/> for the 'key' parameter.</t>
            </li>
            <li>
              <t>'key': this field specifies the keying material to use for secure communication in the group (REQ17). This field has as value a CBOR map that includes the following parameters.  </t>
              <ul spacing="normal">
                <li>
                  <t>'group_key': this parameter is identified by the CBOR unsigned integer 0 used as map key. Its value is a COSE_Key object as defined in <xref target="RFC9052"/> and conveying the group key to use in the security group.      </t>
                  <t>
The COSE_Key object <bcp14>MUST</bcp14> contain the following parameters:      </t>
                  <ul spacing="normal">
                    <li>
                      <t>'kty', with value 4 (Symmetric).</t>
                    </li>
                    <li>
                      <t>'alg', with value the identifier of the AEAD algorithm used in the security group. The value is taken from the "Value" column of the "COSE Algorithms" registry <xref target="IANA.cose_algorithms"/>.</t>
                    </li>
                    <li>
                      <t>'Base IV', with value the Base Initialization Vector (Base IV) to use in the security group with this group key.</t>
                    </li>
                    <li>
                      <t>'k', with value the symmetric encryption key to use as group key.</t>
                    </li>
                    <li>
                      <t>'kid', with value the identifier of the COSE_Key object, hence of the group key.          </t>
                      <t>
This value is used as Group Identifier (Gid) of the security group, as long as the present key is used as group key in the security group. Consistent with the CBOR type of the 'kid' parameter, the Gid of the security group is encoded as a CBOR byte string (REQ13).</t>
                    </li>
                  </ul>
                </li>
                <li>
                  <t>'group_SenderId': this parameter is identified by the CBOR unsigned integer 1 used as map key. Its value is the Client's Sender ID encoded as a CBOR byte string. This parameter <bcp14>MUST</bcp14> be included if the Client is joining the security group as a Publisher and <bcp14>MUST NOT</bcp14> be included otherwise. A Publisher Client <bcp14>MUST</bcp14> support the 'group_SenderId' parameter (REQ29).      </t>
                  <t>
The Sender ID <bcp14>MUST</bcp14> be unique within the security group. The KDC <bcp14>MUST</bcp14> only assign an available Sender ID that has not been used in the security group since the last time when the current Gid value was assigned to the group (i.e., since the latest group rekeying, see <xref target="rekeying"/>). The KDC <bcp14>MUST NOT</bcp14> assign a Sender ID to the joining node if the node is not joining the group as a Publisher.      </t>
                  <t>
The Sender ID can be short in length. Its maximum length in bytes is the length in bytes of the AEAD nonce for the AEAD algorithm, minus 6. This means that, when using AES-CCM-16-64-128 as AEAD algorithm in the security group, the maximum length of Sender IDs is 7 bytes.</t>
                </li>
                <li>
                  <t>'cred_fmt': this parameter is identified by the CBOR unsigned integer 2 used as map key. Its value specifies the format of authentication credentials used in the group and is taken from the "Label" column of the "COSE Header Parameters" registry <xref target="IANA.cose_header-parameters"/>.      </t>
                  <t>
At the time of writing this specification, acceptable formats of authentication credentials are CBOR Web Tokens (CWTs) and CWT Claims Sets (CCSs) <xref target="RFC8392"/>, X.509 certificates <xref target="RFC7925"/>, and C509 certificates <xref target="I-D.ietf-cose-cbor-encoded-cert"/>. Further formats may be available in the future and would be acceptable to use as long as they comply with the criteria defined above (REQ6).</t>
                </li>
                <li>
                  <t>'sign_alg': this parameter is identified by the CBOR unsigned integer 3 used as map key. Its value specifies the Signature Algorithm used to sign messages in the group and is taken from the "Value" column of the "COSE Algorithms" registry <xref target="IANA.cose_algorithms"/>.</t>
                </li>
                <li>
                  <t>'sign_params': this parameter is identified by the CBOR unsigned integer 4 used as map key. Its value specifies the parameters of the Signature Algorithm and is encoded as a CBOR array including the following two elements:      </t>
                  <ul spacing="normal">
                    <li>
                      <t>'sign_alg_capab' is a CBOR array, with the same format and value of the COSE capabilities array for the Signature Algorithm indicated in 'sign_alg', as specified for that algorithm in the "Capabilities" column of the "COSE Algorithms" registry <xref target="IANA.cose_algorithms"/>.</t>
                    </li>
                    <li>
                      <t>'sign_key_type_capab' is a CBOR array, with the same format and value of the COSE capabilities array for the COSE key type of the keys used with the Signature Algorithm indicated in 'sign_alg', as specified for that key type in the "Capabilities" column of the "COSE Key Types" registry <xref target="IANA.cose_key-type"/>.</t>
                    </li>
                  </ul>
                </li>
              </ul>
            </li>
            <li>
              <t>'num', specifying the version number of the keying material specified in the 'key' field. The initial value of the version number <bcp14>MUST</bcp14> be set to 0 upon creating the group (REQ16).</t>
            </li>
            <li>
              <t>'exi', which <bcp14>MUST</bcp14> be present.</t>
            </li>
            <li>
              <t>'ace_groupcomm_profile', which <bcp14>MUST</bcp14> be present and has value "coap_group_pubsub_app" (PROFILE_TBD), which is registered in <xref target="iana-profile"/> (REQ19).</t>
            </li>
            <li>
              <t>'creds', which <bcp14>MUST</bcp14> be present if the 'get_creds' parameter was present in the Join Request and <bcp14>MUST NOT</bcp14> be present otherwise. It specifies the authentication credentials of all the Publishers in the security group.</t>
            </li>
            <li>
              <t>'peer_roles', which <bcp14>MAY</bcp14> be omitted even if 'creds' is present, since: i) each authentication credential conveyed in the 'creds' parameter is associated with a Client authorised to be Publisher in the group; and ii) it is irrelevant whether such a Client is also authorised to be Subscriber in the group. If 'creds' is not present, 'peer_roles' <bcp14>MUST NOT</bcp14> be present.</t>
            </li>
            <li>
              <t>'peer_identifiers', which <bcp14>MUST</bcp14> be present if 'creds' is also present and <bcp14>MUST NOT</bcp14> be present otherwise. The identifiers are the Publisher Sender IDs, whose corresponding authentication credentials are specified in the 'creds' parameter (REQ25).</t>
            </li>
            <li>
              <t>'kdc_cred', which <bcp14>MUST</bcp14> be present if the group rekeying scheme used requires the use of a KDC authentication credential. It is encoded as a CBOR byte string, with value the original binary representation of the KDC's authentication credential (REQ8).</t>
            </li>
            <li>
              <t>'kdc_nonce', which <bcp14>MUST</bcp14> be present if 'kdc_cred' is present. It is encoded as a CBOR byte string, with value a nonce N_KDC generated by the KDC. As to the N_KDC value, it is <bcp14>RECOMMENDED</bcp14> to be at least 8-byte long and it is <bcp14>RECOMMENDED</bcp14> to be a random value.</t>
            </li>
            <li>
              <t>'kdc_cred_verify', which <bcp14>MUST</bcp14> be present if 'kdc_cred' is present. It is encoded as a CBOR byte string, with value the PoP evidence that the KDC computes to prove the possession of its own private key. The KDC <bcp14>MUST</bcp14> compute the specified PoP evidence as a signature by using the signature algorithm used in the group, as well as its own private key associated with the authentication credential specified in the 'kdc_cred' parameter (REQ21).</t>
            </li>
            <li>
              <t>'group_rekeying', which <bcp14>MAY</bcp14> be omitted if the KDC uses the "Point-to-Point" group rekeying scheme registered in <xref section="11.13" sectionFormat="of" target="RFC9594"/> as the default rekeying scheme in the group (OPT9). In any other case, the 'group_rekeying' parameter <bcp14>MUST</bcp14> be included.</t>
            </li>
          </ul>
          <t>The 'group_policies' parameter is not expected to be included in the Join Response (REQ20). This application profile does not define the functionalities that are possibly implemented at the resource hosted by the Client at the URI indicated in the 'control_group_uri' parameter (OPT10), if included in the Join Response.</t>
          <t>After sending a successful Join Response, the KDC adds the Client to the list of current members of the security group, if that Client is not already a group member. Also, the Client is assigned a name NODENAME and a sub-resource /ace-group/GROUPNAME/nodes/NODENAME at the KDC. Furthermore, the KDC associates NODENAME with the Client's access token and with the secure communication association that the KDC has with the Client.</t>
          <t>If the Client is a Publisher, its authentication credential used in the group is either: the one retrieved from the 'client_cred' parameter of the Join Request, if the parameter did not specify the empty CBOR byte string (0x40); or, otherwise, the one that the KDC acquired from previous interactions with the joining node and is currently storing. The KDC associates the Client's authentication credential with the tuple containing NODENAME, GROUPNAME, the current Gid, the newly assigned Publisher's Sender ID, and the Client's access token. The KDC <bcp14>MUST</bcp14> keep this association updated over time.</t>
          <t>Note that, as long as the secure communication association between the Client and the KDC persists, the same Client re-joining the group is recognized by the KDC by virtue of such a secure communication association. As a consequence, the re-joining Client keeps the same NODENAME and the associated subresource /ace-group/GROUPNAME/nodes/NODENAME. Also, if the Client is a Publisher, it receives a new Sender ID according to the same criteria defined above.</t>
          <t>If the application requires backward security, the KDC <bcp14>MUST</bcp14> generate updated security parameters and group keying material, and provide it to the current group members upon the new node's joining (see <xref target="rekeying"/>). In such a case, the joining node is not able to access secure communication in the Pub-Sub group prior to its joining.</t>
          <t>Upon receiving the Join Response, the joining node retrieves the KDC's authentication credential from the 'kdc_cred' parameter (if present). The joining node <bcp14>MUST</bcp14> verify the signature used as PoP evidence, which is specified by the 'kdc_cred_verify' parameter of the Join Response (REQ21).</t>
        </section>
        <section anchor="join-error">
          <name>Join Error Handling</name>
          <t>The KDC <bcp14>MUST</bcp14> reply with a 4.00 (Bad Request) error response (OPT4) to the Join Request in the following cases:</t>
          <ul spacing="normal">
            <li>
              <t>The joining node is not requesting to join the group exclusively as a Subscriber and the 'client_cred' parameter is not present in the Join Request.</t>
            </li>
            <li>
              <t>The joining node is not requesting to join the group exclusively as a Subscriber, the 'client_cred' parameter does not specify the empty CBOR byte string (0x40), and any of the following conditions holds:  </t>
              <ul spacing="normal">
                <li>
                  <t>The value of the 'client_cred' parameter is not an eligible authentication credential (e.g., it is not of the format accepted in the group) (OPT8).</t>
                </li>
                <li>
                  <t>The 'client_cred_verify' parameter is not present in the Join Request.</t>
                </li>
              </ul>
            </li>
            <li>
              <t>The joining node is not requesting to join the group exclusively as a Subscriber, the 'client_cred' parameter specifies the empty CBOR byte string (0x40), and any of the following conditions holds:  </t>
              <ul spacing="normal">
                <li>
                  <t>The KDC does not store an eligible authentication credential for the joining node (e.g., of the format accepted in the group).</t>
                </li>
                <li>
                  <t>The KDC stores multiple eligible authentication credentials for the joining node (e.g., of the format accepted in the group).</t>
                </li>
              </ul>
            </li>
            <li>
              <t>The 'scope' parameter is not present in the Join Request, or it is present and specifies any set of permissions not included in the list defined in <xref target="scope"/>.</t>
            </li>
          </ul>
          <t>A 4.00 (Bad Request) error response from the KDC to the joining node <bcp14>MAY</bcp14> have content format "application/ace-groupcomm+cbor" and contain a CBOR map as payload.</t>
          <t>The CBOR map <bcp14>MAY</bcp14> include the 'kdcchallenge' parameter. If present, this parameter is a CBOR byte string, with value a newly generated 'kdcchallenge' value that the Client can use when preparing a new Join Request. In such a case, the KDC <bcp14>MUST</bcp14> store the newly generated value as the 'kdcchallenge' value associated with the joining node, which replaces the currently stored value (if any).</t>
          <t>Upon receiving the Join Response, if 'kdc_cred' is present but the Client cannot verify the PoP evidence, the Client <bcp14>MUST</bcp14> stop processing the Join Response and <bcp14>MAY</bcp14> send a new Join Request to the KDC.</t>
          <t>The KDC <bcp14>MUST</bcp14> return a 5.03 (Service Unavailable) error response to a Client that sends a Join Request to join the security group as Publisher, in case there are currently no Sender IDs available to assign. The response <bcp14>MUST</bcp14> have Content-Format set to "application/concise-problem-details+cbor" and is formatted as defined in <xref section="4.1.2" sectionFormat="of" target="RFC9594"/>. Within the Custom Problem Detail entry 'ace-groupcomm-error', the value of the 'error-id' field <bcp14>MUST</bcp14> be set to 4 ("No available individual keying material").</t>
        </section>
      </section>
      <section anchor="other-group-operations-through-the-kdc">
        <name>Other Group Operations through the KDC</name>
        <section anchor="query">
          <name>Obtaining Latest Information on the Group, Group Keying Material, and Sender ID</name>
          <t>A Client can access the following resources at the KDC, in order to retrieve latest information about the group or the group keying material.</t>
          <ul spacing="normal">
            <li>
              <t>'/ace-group': All Clients can send a FETCH request to retrieve a set of group names associated with their group identifiers specified in the request payload. Each element of the CBOR array 'gid' is a CBOR byte string (REQ13), which encodes the Gid of the group (see <xref target="join-response"/>) for which the group name and the URI to the group-membership resource are provided in the returned response.</t>
            </li>
            <li>
              <t>'/ace-group/GROUPNAME':  All group member Clients can send a GET request to retrieve the symmetric group keying material of the group with the name GROUPNAME. The value of the GROUPNAME URI path and the group name in the access token scope ('gname') <bcp14>MUST</bcp14> coincide (REQ7).  </t>
              <t>
The KDC processes the Key Distribution Request according to <xref section="4.3.2" sectionFormat="of" target="RFC9594"/>. The Key Distribution Response is formatted as defined in <xref section="4.3.2" sectionFormat="of" target="RFC9594"/>, with the following additions.  </t>
              <ul spacing="normal">
                <li>
                  <t>The 'key' field is formatted as defined in <xref target="join-response"/> of this document, with the difference that it does not include the 'group_SenderId' parameter.</t>
                </li>
                <li>
                  <t>The 'exi' field <bcp14>MUST</bcp14> be present.</t>
                </li>
                <li>
                  <t>The 'ace_groupcomm_profile' field <bcp14>MUST</bcp14> be present and has value "coap_group_pubsub_app" (PROFILE_TBD).</t>
                </li>
              </ul>
              <t>
Upon receiving the Key Distribution Response, the requesting group member retrieves the updated security parameters and group keying material. If they differ from the currently stored ones, then the group member uses the received ones thereafter for the security processing of published topic data, i.e., for encryption operations when acting as Publisher and for decryption operations when acting as Subscriber.  </t>
              <t>
This application profile does not specify policies that instruct group members to retain messages and for how long, if those messages are unsuccessfully decrypted (OPT11).</t>
            </li>
            <li>
              <t>'/ace-group/GROUPNAME/creds': The KDC acts as a repository of authentication credentials for the Publishers that are member of the security group with name GROUPNAME. The members of the group that are Subscribers can send GET/FETCH requests to this resource in order to retrieve the authentication credentials of all or a subset of the group members that are Publishers. The KDC silently ignores the Sender IDs included in the 'get_creds' parameter of the request that are not associated with any current Publisher group member (REQ26).  </t>
              <t>
The response from the KDC <bcp14>MAY</bcp14> omit the parameter 'peer_roles', since: i) each authentication credential conveyed in the 'creds' parameter is associated with a Client authorised to be Publisher in the group; and ii) it is irrelevant whether such a Client is also authorised to be Subscriber in the group. If 'creds' is not present, 'peer_roles' <bcp14>MUST NOT</bcp14> be present.</t>
            </li>
            <li>
              <t>'/ace-group/GROUPNAME/num': All group member Clients can send a GET request to this resource in order to retrieve the current version number for the symmetric group keying material of the group with name GROUPNAME.</t>
            </li>
            <li>
              <t>'/ace-group/GROUPNAME/kdc-cred': All group member Clients can send a GET request to this resource in order to retrieve the current authentication credential of the KDC.</t>
            </li>
            <li>
              <t>'/ace-group/GROUPNAME/nodes/NODENAME': A group member can send a Key Distribution Request to the KDC by sending a GET request to this resource to retrieve the latest group keying material as well as its Sender ID that it has in the group (if Publisher).  </t>
              <t>
The KDC processes the Key Distribution Request according to <xref section="4.8.1" sectionFormat="of" target="RFC9594"/>. The Key Distribution Response is formatted as defined in <xref section="4.8.1" sectionFormat="of" target="RFC9594"/>, with the following additions.  </t>
              <ul spacing="normal">
                <li>
                  <t>The 'key' field is formatted as defined in <xref target="join-response"/> of this document. If the requesting group member is not a Publisher Client, then the 'key' field does not include the 'group_SenderId' parameter.</t>
                </li>
                <li>
                  <t>The 'exi' field <bcp14>MUST</bcp14> be present.</t>
                </li>
              </ul>
              <t>
Upon receiving the Key Distribution Response, the group member retrieves the updated security parameters, group keying material, and Sender ID (if the 'key' field includes the 'group_SenderId' parameter). If they differ from the currently stored ones, then the group member uses the received ones thereafter for the security processing of published topic data, i.e., for encryption operations when acting as Publisher and for decryption operations when acting as Subscriber.  </t>
              <t>
This application profile does not specify policies that instruct group members to retain messages and for how long, if those messages are unsuccessfully decrypted (OPT11).</t>
            </li>
          </ul>
        </section>
        <section anchor="sec-key-renewal-request">
          <name>Requesting a New Sender ID</name>
          <t>A Publisher group member with node name NODENAME may at some point exhaust its Sender Sequence Numbers used for protecting its published topic data (see <xref target="oscon"/>).</t>
          <t>When this happens, the Publisher <bcp14>MUST</bcp14> send a Key Renewal Request message to the KDC, as per <xref section="4.8.2.1" sectionFormat="of" target="RFC9594"/>. That is, it sends a CoAP POST request to the endpoint /ace-group/GROUPNAME/nodes/NODENAME at the KDC.</t>
          <t>Upon receiving the Key Renewal Request, the KDC processes it as defined in <xref section="4.8.2" sectionFormat="of" target="RFC9594"/>, with the addition that the KDC takes one of the following actions.</t>
          <ul spacing="normal">
            <li>
              <t>The KDC rekeys the group. That is, the KDC generates new group keying material for that group (see <xref target="rekeying"/>) and replies to the Publisher with a group rekeying message as defined in <xref target="rekeying"/>, providing the new group keying material. Then, the KDC rekeys the rest of the group, as discussed in <xref target="rekeying"/>.  </t>
              <t>
The KDC <bcp14>SHOULD</bcp14> perform a group rekeying if one is already scheduled to occur within a time frame that is acceptably short, as per application-specific policies at the KDC. For instance, a group rekeying could be already upcoming in accordance with an application-specific rekeying period or scheduling, or as a reaction to a recent change in the group membership. If a group rekeying is not already scheduled to occur within an acceptably short time frame, the KDC <bcp14>SHOULD NOT</bcp14> rekey the group when receiving a Key Renewal Request (OPT12).</t>
            </li>
            <li>
              <t>The KDC determines and assigns a new Sender ID for the Publisher (REQ27), and it replies with a Key Renewal Response formatted as defined in <xref section="4.8.2" sectionFormat="of" target="RFC9594"/>. The CBOR Map in the response payload includes only the parameter 'group_SenderId' registered in <xref section="16.3" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm-oscore"/>, which specifies the new Sender ID of the Publisher encoded as a CBOR byte string (REQ27).  </t>
              <t>
The KDC <bcp14>MUST</bcp14> assign a new Sender ID that has not been used in the group since the latest time when the current Gid value was assigned to the group (i.e., since the latest group rekeying, see <xref target="rekeying"/>).  </t>
              <t>
The KDC <bcp14>MUST</bcp14> return a 5.03 (Service Unavailable) error response in case there are currently no Sender IDs available to assign in the group. The response <bcp14>MUST</bcp14> have Content-Format set to "application/concise-problem-details+cbor" and is formatted as defined in <xref section="4.1.2" sectionFormat="of" target="RFC9594"/>. Within the Custom Problem Detail entry 'ace-groupcomm-error', the value of the 'error-id' field <bcp14>MUST</bcp14> be set to 4 ("No available individual keying material").</t>
            </li>
          </ul>
        </section>
        <section anchor="updating-authentication-credentials">
          <name>Updating Authentication Credentials</name>
          <t>A Publisher group member with node name NODENAME can contact the KDC to upload a new authentication credential to use in the security group with name GROUPNAME, and replace the currently stored one.</t>
          <t>To this end, the Publisher sends a CoAP POST request to its associated sub-resource /ace-group/GROUPNAME/nodes/NODENAME/cred at the KDC (see <xref section="4.9.1" sectionFormat="of" target="RFC9594"/>).</t>
          <t>Following a successful processing of the request, the KDC replaces the stored authentication credential of this Client for the group GROUPNAME with the one specified in the request.</t>
          <t>This application profile does not specify a method for the group member to provide other group members with the identifier of its new authentication credential (OPT13).</t>
        </section>
        <section anchor="sec-group-leaving">
          <name>Leaving a Group</name>
          <t>A group member with node name NODENAME can actively request to leave the security group with name GROUPNAME.</t>
          <t>To this end, the Client sends a CoAP DELETE request to the associated sub-resource /ace-group/GROUPNAME/nodes/NODENAME at the KDC (see <xref section="4.8.3" sectionFormat="of" target="RFC9594"/>).</t>
          <t>The KDC can also remove a group member due to any of the reasons described in <xref section="5" sectionFormat="of" target="RFC9594"/>.</t>
        </section>
      </section>
    </section>
    <section anchor="rekeying">
      <name>Group Rekeying Process</name>
      <t>Rekeying a group consists in the KDC generating and distributing a new symmetric key, which is used as group key from then on to protect the publication of topic data with COSE (see <xref target="oscon"/>).</t>
      <t>The KDC <bcp14>MUST</bcp14> perform a group rekeying as described in <xref section="6" sectionFormat="of" target="RFC9594"/>. Reasons that can trigger a group rekeying include a change in the group membership, or the current group keying material approaching its expiration time. In addition, the KDC <bcp14>MAY</bcp14> rekey the group for other reasons, e.g., according to an application-specific rekeying period or scheduling.</t>
      <t>Upon generating the new group key and before starting its distribution:</t>
      <ul spacing="normal">
        <li>
          <t>The KDC <bcp14>MUST</bcp14> increment the version number of the group keying material.</t>
        </li>
        <li>
          <t>The KDC <bcp14>MUST</bcp14> generate a new Group Identifier (Gid) for the group. This is used as the identifier of the new group key, when providing it to the current group members through the group rekeying and to Clients (re-)joining the security group thereafter (see <xref target="join-response"/>).  </t>
          <t>
That is, the value of the new Gid is specified by the 'kid' parameter of the COSE_Key Object that is used to encode the new group key.</t>
        </li>
      </ul>
      <t>When rekeying the group, the KDC <bcp14>MUST</bcp14> preserve the current value of the Sender ID of each member in that group.</t>
      <t>The default rekeying scheme is "Point-to-Point" (see <xref section="6.1" sectionFormat="of" target="RFC9594"/>), according to which the KDC individually targets each node to rekey, using the pairwise secure communication association with that node.</t>
      <t>In particular, a group rekeying message <bcp14>MUST</bcp14> have Content-Format set to "application/ace-groupcomm+cbor" and have the same format used for the Join Response message defined in <xref target="join-response"/>, with the following differences:</t>
      <ul spacing="normal">
        <li>
          <t>Within the 'key' field, only the parameter 'group_key' is present.</t>
        </li>
        <li>
          <t>The fields 'kdc_cred' ,'kdc_nonce', 'kdc_cred_verify', and 'group_rekeying' are not present.</t>
        </li>
        <li>
          <t>The fields 'creds' and 'peer_identifiers' <bcp14>SHOULD</bcp14> be present, if the group rekeying is performed due to one or multiple Clients joining the group as Publishers. Following the same semantics used in the Join Response message, the two parameters specify the authentication credentials and Sender IDs of such Clients. Like in the Join Response message, the 'peer_roles' parameter <bcp14>MAY</bcp14> be omitted.</t>
        </li>
      </ul>
      <t>This application profile does not define additional information to include in rekeying messages for the "Point-to-Point" group rekeying scheme (OPT14).</t>
    </section>
    <section anchor="protected_communication">
      <name>Pub-Sub Protected Communication</name>
      <t>In the diagram shown in <xref target="pubsub-3"/>, (D) corresponds to the publication on a topic at the Broker, by using a CoAP PUT request. The Publisher protects the published topic data end-to-end for the Subscribers by using COSE (<xref target="RFC9052"/><xref target="RFC9053"/><xref target="RFC9338"/>), as detailed in <xref target="oscon"/>.</t>
      <t>In the same diagram, (E) corresponds to the subscription of a Subscriber to the same topic, by means of a CoAP GET request with the Observe option set to 0 (register) <xref target="RFC7641"/>, as per <xref target="I-D.ietf-core-coap-pubsub"/>. Finally, (F) corresponds to the Observe notification response from the Broker to the Subscriber, where the published topic data is conveyed as originally protected end-to-end with COSE by the Publisher.</t>
      <figure anchor="pubsub-3">
        <name>Secure Pub-Sub Communication between Publisher and Subscriber</name>
        <artset>
          <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="176" width="520" viewBox="0 0 520 176" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 8,32 L 8,160" fill="none" stroke="black"/>
              <path d="M 104,32 L 104,160" fill="none" stroke="black"/>
              <path d="M 216,32 L 216,160" fill="none" stroke="black"/>
              <path d="M 288,32 L 288,160" fill="none" stroke="black"/>
              <path d="M 408,32 L 408,160" fill="none" stroke="black"/>
              <path d="M 512,32 L 512,160" fill="none" stroke="black"/>
              <path d="M 8,32 L 104,32" fill="none" stroke="black"/>
              <path d="M 216,32 L 288,32" fill="none" stroke="black"/>
              <path d="M 408,32 L 512,32" fill="none" stroke="black"/>
              <path d="M 120,64 L 136,64" fill="none" stroke="black"/>
              <path d="M 184,64 L 200,64" fill="none" stroke="black"/>
              <path d="M 304,96 L 328,96" fill="none" stroke="black"/>
              <path d="M 376,96 L 392,96" fill="none" stroke="black"/>
              <path d="M 304,128 L 328,128" fill="none" stroke="black"/>
              <path d="M 376,128 L 392,128" fill="none" stroke="black"/>
              <path d="M 8,160 L 104,160" fill="none" stroke="black"/>
              <path d="M 216,160 L 288,160" fill="none" stroke="black"/>
              <path d="M 408,160 L 512,160" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="400,128 388,122.4 388,133.6" fill="black" transform="rotate(0,392,128)"/>
              <polygon class="arrowhead" points="312,96 300,90.4 300,101.6" fill="black" transform="rotate(180,304,96)"/>
              <polygon class="arrowhead" points="208,64 196,58.4 196,69.6" fill="black" transform="rotate(0,200,64)"/>
              <g class="text">
                <text x="160" y="68">(D)</text>
                <text x="56" y="100">Publisher</text>
                <text x="252" y="100">Broker</text>
                <text x="352" y="100">(E)</text>
                <text x="460" y="100">Subscriber</text>
                <text x="352" y="132">(F)</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art" align="center"><![CDATA[
+-----------+             +--------+              +------------+
|           |             |        |              |            |
|           | --- (D) --> |        |              |            |
|           |             |        |              |            |
| Publisher |             | Broker | <--- (E) --- | Subscriber |
|           |             |        |              |            |
|           |             |        | ---- (F) --> |            |
|           |             |        |              |            |
+-----------+             +--------+              +------------+
]]></artwork>
        </artset>
      </figure>
      <t><xref target="flow"/> provides a more detailed example of such a secure Pub-Sub communication. All the messages exchanged between a Client and the Broker are protected with the secure communication association between that Client and the Broker. In addition, COSE is used to protect end-to-end the published topic data, which is conveyed in a PUT request from the Publisher to the topic-data resource at the Broker and in a 2.05 (Content) response from that resource to a Subscriber.</t>
      <t>The example also shows a delete operation, where the Publisher deletes the topic-data resource by sending a CoAP DELETE request to the URI of that resource. In case of success, the Broker replies with a 2.02 (Deleted) response. Consequently, the Broker also unsubscribes all the Clients subscribed to that topic-data resource, by removing them from the list of observers and sending them a final 4.04 (Not Found) error response as per <xref section="3.2" sectionFormat="of" target="RFC7641"/>.</t>
      <figure anchor="flow">
        <name>Example of Secure Pub-Sub Communication using CoAP</name>
        <artset>
          <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="320" width="568" viewBox="0 0 568 320" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
              <path d="M 8,48 L 8,304" fill="none" stroke="black"/>
              <path d="M 296,48 L 296,304" fill="none" stroke="black"/>
              <path d="M 560,48 L 560,304" fill="none" stroke="black"/>
              <path d="M 8,64 L 40,64" fill="none" stroke="black"/>
              <path d="M 256,64 L 288,64" fill="none" stroke="black"/>
              <path d="M 16,96 L 64,96" fill="none" stroke="black"/>
              <path d="M 184,96 L 296,96" fill="none" stroke="black"/>
              <path d="M 304,128 L 320,128" fill="none" stroke="black"/>
              <path d="M 544,128 L 560,128" fill="none" stroke="black"/>
              <path d="M 296,176 L 344,176" fill="none" stroke="black"/>
              <path d="M 464,176 L 552,176" fill="none" stroke="black"/>
              <path d="M 8,224 L 24,224" fill="none" stroke="black"/>
              <path d="M 272,224 L 288,224" fill="none" stroke="black"/>
              <path d="M 16,256 L 48,256" fill="none" stroke="black"/>
              <path d="M 168,256 L 296,256" fill="none" stroke="black"/>
              <path d="M 296,288 L 344,288" fill="none" stroke="black"/>
              <path d="M 480,288 L 552,288" fill="none" stroke="black"/>
              <polygon class="arrowhead" points="560,288 548,282.4 548,293.6" fill="black" transform="rotate(0,552,288)"/>
              <polygon class="arrowhead" points="560,176 548,170.4 548,181.6" fill="black" transform="rotate(0,552,176)"/>
              <polygon class="arrowhead" points="312,128 300,122.4 300,133.6" fill="black" transform="rotate(180,304,128)"/>
              <polygon class="arrowhead" points="296,224 284,218.4 284,229.6" fill="black" transform="rotate(0,288,224)"/>
              <polygon class="arrowhead" points="296,64 284,58.4 284,69.6" fill="black" transform="rotate(0,288,64)"/>
              <polygon class="arrowhead" points="24,256 12,250.4 12,261.6" fill="black" transform="rotate(180,16,256)"/>
              <polygon class="arrowhead" points="24,96 12,90.4 12,101.6" fill="black" transform="rotate(180,16,96)"/>
              <g class="text">
                <text x="40" y="36">Publisher</text>
                <text x="300" y="36">Broker</text>
                <text x="524" y="36">Subscriber</text>
                <text x="68" y="68">0.03</text>
                <text x="104" y="68">PUT</text>
                <text x="184" y="68">ps/data/1bd0d6d</text>
                <text x="92" y="100">2.01</text>
                <text x="144" y="100">Created</text>
                <text x="348" y="132">0.01</text>
                <text x="384" y="132">GET</text>
                <text x="468" y="132">/ps/data/1bd0d6d</text>
                <text x="368" y="148">Observe:0</text>
                <text x="372" y="180">2.05</text>
                <text x="424" y="180">Content</text>
                <text x="388" y="196">Observe:</text>
                <text x="448" y="196">10001</text>
                <text x="52" y="228">0.04</text>
                <text x="100" y="228">DELETE</text>
                <text x="196" y="228">/ps/data/1bd0d6d</text>
                <text x="76" y="260">2.02</text>
                <text x="128" y="260">Deleted</text>
                <text x="372" y="292">4.04</text>
                <text x="408" y="292">Not</text>
                <text x="448" y="292">Found</text>
              </g>
            </svg>
          </artwork>
          <artwork type="ascii-art" align="center"><![CDATA[
Publisher                         Broker                    Subscriber
|                                   |                                |
+---- 0.03 PUT ps/data/1bd0d6d ---->|                                |
|                                   |                                |
|<------ 2.01 Created --------------+                                |
|                                   |                                |
|                                   |<-- 0.01 GET /ps/data/1bd0d6d --+
|                                   |    Observe:0                   |
|                                   |                                |
|                                   +------ 2.05 Content ----------->|
|                                   |       Observe: 10001           |
|                                   |                                |
+-- 0.04 DELETE /ps/data/1bd0d6d -->|                                |
|                                   |                                |
|<---- 2.02 Deleted ----------------+                                |
|                                   |                                |
|                                   +------ 4.04 Not Found --------->|
|                                   |                                |
]]></artwork>
        </artset>
      </figure>
      <section anchor="oscon">
        <name>Using COSE to Protect the Published Topic Data</name>
        <t>The Publisher uses the symmetric COSE Key received from the KDC to protect the payload of the Publish operation (see <xref section="3.2.1" sectionFormat="of" target="I-D.ietf-core-coap-pubsub"/>). Specifically, the Publisher creates a COSE_Encrypt0 object <xref target="RFC9052"/><xref target="RFC9053"/> by means of the COSE Key currently used as group key (REQ23). The encryption algorithm and Base IV to use are specified by the 'alg' and 'Base IV' parameters of the COSE Key, together with its key identifier in the 'kid' parameter.</t>
        <t>Also, the Publisher uses its private key corresponding to the public key sent to the KDC, in order to countersign the COSE_Encrypt0 object as specified in <xref target="RFC9338"/> (REQ23). The countersignature is specified in the 'Countersignature version 2' parameter, within the 'unprotected' field of the COSE_Encrypt0 object.</t>
        <t>Finally, the Publisher sends the COSE_Encrypt0 object conveying the countersignature to the Broker, as payload of the PUT request sent to the topic-data of the topic targeted by the Publish operation.</t>
        <t>Upon receiving a response from the topic-data resource at the Broker, the Subscriber uses the 'kid' parameter from the 'Countersignature version 2' parameter within the 'unprotected' field of the COSE_Encrypt0 object, in order to retrieve the Publisher's public key from the KDC (see <xref target="query"/>) or from its local storage. Then, the Subscriber uses that public key to verify the countersignature.</t>
        <t>In case of successful verification, the Subscriber uses the 'kid' parameter from the 'unprotected' field of the COSE_Encrypt0 object, in order to retrieve the COSE Key used as current group key from its local storage. Then, the Subscriber uses that group key to verify and decrypt the COSE_Encrypt0 object. In case of successful verification, the Subscriber delivers the received topic data to the application.</t>
        <t>The COSE_Encrypt0 object is constructed as follows.</t>
        <t>The 'protected' field <bcp14>MUST</bcp14> include:</t>
        <ul spacing="normal">
          <li>
            <t>The 'alg' parameter, with value the identifier of the AEAD algorithm specified in the 'alg' parameter of the COSE Key used as current group key.</t>
          </li>
        </ul>
        <t>The 'unprotected' field <bcp14>MUST</bcp14> include:</t>
        <ul spacing="normal">
          <li>
            <t>The 'kid' parameter, with the same value specified in the 'kid' parameter of the COSE Key used as current group key. This value represents the current Group ID (Gid) of the security group associated with the application group (topic).</t>
          </li>
          <li>
            <t>The 'Partial IV' parameter, with value set to the current Sender Sequence Number of the Publisher. All leading bytes of value zero <bcp14>SHALL</bcp14> be removed when encoding the Partial IV, except in the case of Partial IV with value 0, which is encoded to the byte string 0x00.  </t>
            <t>
The Publisher <bcp14>MUST</bcp14> initialize the Sender Sequence Number to 0 upon joining the security group and <bcp14>MUST</bcp14> reset it to 0 upon receiving a new group key as the result of a group rekeying (see <xref target="rekeying"/>). The Publisher <bcp14>MUST</bcp14> increment its Sender Sequence Number value by 1, after having completed an encryption operation by means of the current group key.  </t>
            <t>
When the Publisher exhausts its Sender Sequence Numbers, the Publisher <bcp14>MUST NOT</bcp14> protect further topic data by using the current group key while still retaining its current Sender ID, and it <bcp14>MUST</bcp14> send a Key Renewal Request message to the KDC (see <xref target="sec-key-renewal-request"/>). This will result in the KDC rekeying the group and distributing a new group key, or in the KDC providing the Publisher with a new Sender ID. The Publisher <bcp14>MUST</bcp14> reset its Sender Sequence Number to 0 upon receiving a new Sender ID from the KDC.</t>
          </li>
          <li>
            <t>The 'Countersignature version 2' parameter, specifying the countersignature of the COSE_Encrypt0 object. In particular:  </t>
            <ul spacing="normal">
              <li>
                <t>The 'protected' field includes the 'alg' parameter, with value the identifier of the Signature Algorithm used in the security group.</t>
              </li>
              <li>
                <t>The 'unprotected' field includes the 'kid' parameter, with value the Publisher's Sender ID that the Publisher obtained from the KDC when joining the security group, as the value of the 'group_SenderId' parameter of the Join Response (see <xref target="join-response"/>).</t>
              </li>
              <li>
                <t>The 'signature' field, with value the countersignature.</t>
              </li>
            </ul>
            <t>
The countersignature is computed as defined in <xref target="RFC9338"/>, by using the private key of the Publisher as signing key and by means of the Signature Algorithm used in the group. The fields of the Countersign_structure are populated as follows:  </t>
            <ul spacing="normal">
              <li>
                <t>'context' takes "CounterSignature".</t>
              </li>
              <li>
                <t>'body_protected' takes the serialized parameters from the 'protected' field of the COSE_Encrypt0 object, i.e., the 'alg' parameter.</t>
              </li>
              <li>
                <t>'sign_protected' takes the serialized parameters from the 'protected' field of the 'Countersignature version 2' parameter, i.e., the 'alg' parameter.</t>
              </li>
              <li>
                <t>'external_aad is not supplied.</t>
              </li>
              <li>
                <t>'payload' is the ciphertext of the COSE_Encrypt0 object (see below).</t>
              </li>
            </ul>
          </li>
        </ul>
        <t>The 'ciphertext' field specifies the ciphertext computed over the topic data to publish. The ciphertext is computed as defined in <xref target="RFC9052"/><xref target="RFC9053"/>, by using the current group key as encryption key, the AEAD Nonce computed as defined in <xref target="ssec-aead-nonce"/>, the topic data to publish as plaintext, and the Enc_structure populated as follows:</t>
        <ul spacing="normal">
          <li>
            <t>'context' takes "Encrypt0".</t>
          </li>
          <li>
            <t>'protected' takes the serialization of the protected parameter 'alg' from the 'protected' field of the COSE_Encrypt0 object.</t>
          </li>
          <li>
            <t>'external_aad is not supplied.</t>
          </li>
        </ul>
      </section>
      <section anchor="ssec-aead-nonce">
        <name>AEAD Nonce</name>
        <t>This section defines how to generate the AEAD nonce used for encrypting and decrypting the COSE_Encrypt0 object protecting the published topic data. This construction is analogous to that used to generate the AEAD nonce in the OSCORE security protocol (see <xref section="5.2" sectionFormat="of" target="RFC8613"/>).</t>
        <t>The AEAD nonce for producing or consuming the COSE_Encrypt0 object is constructed as defined below and also shown in <xref target="fig-aead-nonce"/>.</t>
        <ol spacing="normal" type="1"><li>
            <t>Left-pad the Partial IV (PIV) with zeroes to exactly 5 bytes.</t>
          </li>
          <li>
            <t>Left-pad the Sender ID of the Publisher that generated the Partial IV (ID_PIV) with zeroes to exactly the nonce length of the AEAD algorithm minus 6 bytes.</t>
          </li>
          <li>
            <t>Concatenate the size of the ID_PIV (a single byte S) with the padded ID_PIV and the padded PIV.</t>
          </li>
          <li>
            <t>XOR the result from the previous step with the Base IV.</t>
          </li>
        </ol>
        <figure anchor="fig-aead-nonce">
          <name>AEAD Nonce Construction</name>
          <artwork align="center"><![CDATA[
     <- nonce length minus 6 B -> <-- 5 bytes -->
+---+-------------------+--------+---------+-----+
| S |      padding      | ID_PIV | padding | PIV |-----+
+---+-------------------+--------+---------+-----+     |
                                                       |
 <---------------- nonce length ---------------->      |
+------------------------------------------------+     |
|                    Base IV                     |-->(XOR)
+------------------------------------------------+     |
                                                       |
 <---------------- nonce length ---------------->      |
+------------------------------------------------+     |
|                     Nonce                      |<----+
+------------------------------------------------+
]]></artwork>
        </figure>
        <t>The construction above only supports AEAD algorithms that use nonces with length equal or greater than 7 bytes. At the same time, it makes it easy to verify that the nonces will be unique when used with the same group key, even though this is shared and used by all the Publishers in the security group. In fact:</t>
        <ul spacing="normal">
          <li>
            <t>Since Publisher's Sender IDs are unique within the security group and they are not reassigned until a group rekeying occurs (see <xref target="join-response"/> and <xref target="rekeying"/>), two Publisher Clients cannot share the same tuple (S, padded ID_PIV) by construction.</t>
          </li>
          <li>
            <t>Since a Publisher increments by 1 its Sender Sequence Number after each use that it makes of the current group key, the Publisher  never reuses the same tuple (S, padded ID_PIV, padded PIV) together with the same group key.</t>
          </li>
          <li>
            <t>Therefore neither the same Publisher reuses the same AEAD nonce with the same group key, nor any two Publishers use the same AEAD nonce with the same group key.</t>
          </li>
        </ul>
      </section>
      <section anchor="ssec-replay-checks">
        <name>Replay Checks</name>
        <t>In order to protect from replay of published topic data, every Subscriber maintains a Replay Window for each different Publisher in the same group. It is <bcp14>RECOMMENDED</bcp14> that the Replay Window has a default size of 32.</t>
        <t>Upon receiving a topic data published by a given Publisher P, the Subscriber retrieves the Sender ID of P conveyed as 'kid' in the 'Countersignature version 2' parameter of the COSE_Encrypt0 object (see <xref target="oscon"/>) and determines the Replay Window W_P associated with P.</t>
        <t>The Subscriber <bcp14>MUST</bcp14> verify that, according to W_P, the Sender Sequence Number SN_P specified by the 'Partial IV' parameter of the COSE_Encrypt0 object has not been received before from P.</t>
        <t>If the verification above fails, the Subscriber <bcp14>MUST</bcp14> stop processing the COSE_Encrypt0 object conveying the topic data. If the value of SN_P is strictly smaller than the currently smallest value in W_P, then the Subscriber <bcp14>MUST</bcp14> stop processing the COSE_Encrypt0 object.</t>
        <t>If the verification above succeeds, the Subscriber proceeds with processing the COSE_Encrypt0 object, by verifying the countersignature from P using P's public key as well as by decrypting and verifying the COSE_Encrypt0 object using the group key. If both operations succeed, the Subscriber updates W_P as follows:</t>
        <ul spacing="normal">
          <li>
            <t>If SN_P is strictly greater than the currently largest value in W_P, then W_P is updated in order to set SN_P as its largest value.</t>
          </li>
          <li>
            <t>SN_P is marked to denote that it has been received.</t>
          </li>
        </ul>
        <t>The operation of validating the 'Partial IV' and updating the Replay Window <bcp14>MUST</bcp14> be atomic.</t>
        <t>Upon installing a new group key (e.g., due to a group rekeying performed by the KDC, see <xref target="rekeying"/>) or upon receiving published topic data from a given Publisher for the first time, the Subscriber initializes the Replay Window corresponding to that Publisher, i.e., the smallest value of the Replay Window is set to 0.</t>
        <!--# Applicability to the MQTT Pub-Sub Profile {#mqtt-pubsub}

This section describes how this profile can be applicable to the MQTT protocol {{MQTT-OASIS-Standard-v5}}.

The MQTT clients would go through steps similar to those performed by the CoAP clients, and the payload of the MQTT PUBLISH messages is protected using COSE. The MQTT clients need to use CoAP for communicating with the KDC, in order to join security groups and be part of the pairwise rekeying initiated by the KDC.

The discovery of the AS is defined in {{Section 2.4.1 of RFC9431}} for MQTT v5 clients, and it is not supported for MQTT v3 clients. $SYS/ has been widely adopted as a prefix to topics that contain server-specific information or control APIs, and may be used for discovering topics and the KDC.

In the Join Response from the KDC to a Client (see {{join-response}}), the 'ace_groupcomm_profile' parameter has value "mqtt_pubsub_app", which is registered in {{iana-profile}}.

Both Publishers and Subscribers MUST authorise to the Broker with their respective tokens, as described in {{RFC9431}}. A Publisher sends PUBLISH messages for a given topic and protects the payload with the corresponding key for the associated security group. A Subscriber may send SUBSCRIBE messages with one or multiple topic filters. A topic filter may correspond to multiple topics. The Broker forwards all PUBLISH messages to all authorised Subscribers, including the retained messages.
-->

</section>
    </section>
    <section anchor="operational-considerations">
      <name>Operational Considerations</name>
      <t>This section compiles the operational considerations that hold for this document.</t>
      <section anchor="logging">
        <name>Logging</name>
        <t>When performing its normal operations, the KDC is expected to produce and store timestamped logs about the following:</t>
        <ul spacing="normal">
          <li>
            <t>Any event that has resulted in the KDC sending an error response, as a reply to a request received at any of the resources exported by the interface specified in this document.  </t>
            <t>
The logged information contains a description of the error occurred in the context of the present application profile, together with a description of the event related to the error and relevant metadata about the Client that has sent the request. For instance, possible metadata include: addressing information of the Client; when applicable, the Sender ID that is assigned to the Client in the group; when applicable, (an identifier of) the authentication credential of the Client (i.e., that the Client uses in the group or has used to authenticate itself to the KDC when establishing their secure communication association).  </t>
            <t>
Note that, if the error response uses the format problem-details defined in <xref target="RFC9290"/>, then the optional "detail" entry in the response payload is meant to convey the diagnostic description of the error, which is meant to be part of the log entry for this event. This is consistent with <xref section="4.1.2" sectionFormat="of" target="RFC9594"/>, which states that the diagnostic description of the error should be logged.</t>
          </li>
          <li>
            <t>Any event consisting in a successfully performed operation that is triggered by a request received at any of the resources exported by the interface specified in this document.  </t>
            <t>
Such events include:  </t>
            <ul spacing="normal">
              <li>
                <t>A Client joining or re-joining a group.</t>
              </li>
              <li>
                <t>The upload of a new authentication credential for use within the group.</t>
              </li>
              <li>
                <t>The acquisition of a new Sender ID for use within the group.</t>
              </li>
              <li>
                <t>A Client leaving a group.</t>
              </li>
            </ul>
            <t>
The logged information contains a description of the operation performed in the context of the present application profile, together with relevant metadata about the Client that has sent the request. For instance, possible metadata include: addressing information of the Client; when applicable, the Sender ID that is assigned to the Client in the group; when applicable, (an identifier of) the authentication credential of the Client (i.e., that the Client uses in the group or has used to authenticate itself to the KDC when establishing their secure communication association).</t>
          </li>
          <li>
            <t>The execution and successful/unsuccessful completion of a group rekeying instance.  </t>
            <t>
The logged information includes:  </t>
            <ul spacing="normal">
              <li>
                <t>The reason for the group rekeying (e.g., scheduled/periodic occurrence, group joining of a new member, group leaving of a current member).</t>
              </li>
              <li>
                <t>A description of the group rekeying operations performed (e.g., a list of steps performed throughout the rekeying process).</t>
              </li>
              <li>
                <t>The outcome of the group rekeying instance.</t>
              </li>
              <li>
                <t>In case of success, the version number of the newly established group keying material and the newly established Group Identifier (Gid).</t>
              </li>
            </ul>
          </li>
          <li>
            <t>The addition of a group member to the group or the eviction of a group member from the group.  </t>
            <t>
The logged information also contains relevant metadata about the Client that has been added to or removed from the group. For instance, possible metadata include: addressing information of the Client; when applicable, the Sender ID that is currently (was latest) assigned to the Client added to (removed from) the group; when applicable, (an identifier of) the authentication credential of the Client added to (removed from) the group (i.e., that the Client uses in the group or has used to authenticate itself to the KDC when establishing their secure communication association).</t>
          </li>
          <li>
            <t>The creation, (re-)configuration, or termination of a group.</t>
          </li>
        </ul>
        <t>In addition to what is compiled above, the KDC could log additional information. Further details about what the KDC logs, with what granularity, and based on what triggering events and conditions are application-specific and left to operators to define.</t>
        <t>The KDC <bcp14>MUST NOT</bcp14> log any secret or confidential information pertaining to a group, such as:</t>
        <ul spacing="normal">
          <li>
            <t>The group key used in the group as symmetric encryption key.</t>
          </li>
          <li>
            <t>The Base Initialization Vector (Base IV) to use in the security group with the group key.</t>
          </li>
          <li>
            <t>The private key associated with the KDC’s authentication credential used in the group, if any.</t>
          </li>
          <li>
            <t>Rekeying messages that are exchanged in the group.</t>
          </li>
          <li>
            <t>If applicable, administrative keying material used to protect the group rekeying process.</t>
          </li>
        </ul>
        <t>It is up to the application to specify for how long a log entry is retained from the time of its creation and until its deletion. Different retention policies could be enforced for different groups. For a given group, oldest log entries are expected to be those deleted first, and different retention policies could be enforced depending on whether the group currently exists or has been deleted.</t>
        <t>It is out of the scope of this document what specific semantics and data model are used by the KDC for producing and processing the logs. Specific semantics and data models can be defined by applications and future specifications.</t>
        <t>The KDC is expected to make the logs that it produces available for secure access by authorized external management applications and operators.</t>
        <t>In particular, logged information could be retrieved in the following ways.</t>
        <ul spacing="normal">
          <li>
            <t>By accessing logs at the KDC through polling. This can occur in an occasional, regular, or event-driven way.</t>
          </li>
          <li>
            <t>Through notifications sent by the KDC according to an operator-defined frequency.</t>
          </li>
          <li>
            <t>Through notifications asynchronously sent by the KDC, throttling them in order to prevent congestion and duplication and to not create attack vectors.</t>
          </li>
        </ul>
        <t>Some of the logged information can be privacy-sensitive. This especially holds for the metadata about a Client, i.e., addressing information of the Client and, when applicable, (an identifier of) the authentication credential of the Client (i.e., that the Client uses in the group or has used to authenticate itself to the KDC when establishing their secure communication association). If external management applications and operators obtain such metadata, they become able to track a given Client, as to its interactions with one or multiple KDCs and its membership in groups under such KDC(s).</t>
        <t>Therefore, the logged information that is effectively provided to external management applications and operators <bcp14>SHOULD</bcp14> be redacted by the KDC, by omitting any privacy-sensitive information element that could enable or facilitate the impairment of Clients' privacy, e.g., by tracking Clients across different groups and different KDCs. Exceptions could apply, e.g., if the KDC can verify that the management application or operator in question is specifically authorized to obtain such privacy-sensitive information and appropriately entitled to obtain it according to enforced privacy policies.</t>
        <t>It is out of the scope of this document to provide operational considerations about the production, storage, processing, and sharing of logs at the Broker.</t>
      </section>
      <section anchor="administration-of-groups">
        <name>Administration of Groups</name>
        <t>It is out of the scope of this document how groups are created, (re-)configured, and terminated at the KDC. Specific methods, tools, and data models to perform such operations and administer groups at the KDC can be defined by applications and future specifications.</t>
        <t>It is out of the scope of this document to provide operational considerations about how application groups (topics) are created, (re-)configured, and terminated at the Broker, as well as about the store-and-forward of published topic data via the Broker.</t>
      </section>
      <section anchor="access-control">
        <name>Access Control</name>
        <t>Building on the ACE framework <xref target="RFC9200"/> and the foundation provided in <xref target="RFC9594"/>, this application profile enforces access control for Clients that interact with the interface at the KDC specified in this document and with the interface at the Broker specified in <xref target="I-D.ietf-core-coap-pubsub"/>.</t>
        <t>In particular, the granularity of such access control takes into account the resource specifically targeted at the KDC or at the Broker, the operation requested by sending a request to that resource, and the specific role(s) that the requesting Client is authorized to have according to its corresponding access token uploaded to the KDC or to the Broker.</t>
        <t>Furthermore, the interactions that a Client has with the KDC and with the Broker are secured as per the specific transport profile of ACE used (e.g., <xref target="RFC9202"/> and <xref target="RFC9203"/>).</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Security considerations for this profile are inherited from <xref target="RFC9594"/>, the ACE framework for Authentication and Authorization <xref target="RFC9200"/>, and the specific transport profile of ACE used, such as <xref target="RFC9202"/> and <xref target="RFC9203"/>.</t>
      <t>The following security considerations also apply for this profile.</t>
      <t>Consistent with the intended group-confidentiality model, each Client in a security group is able to decrypt the data published in the topic(s) associated with that group, by using the symmetric group key that is shared with all the other group members.</t>
      <t>At the same time, source authentication of the published topic data is achieved by means of a digital signature, which the Publisher of the data in question computes with its private key and embeds in the published topic data. This ensures integrity of the published topic data as well as its origin, thus preventing a group member from impersonating another one.</t>
      <t>To this end, both Publishers and Subscribers rely on asymmetric cryptography, while Subscribers must be able to access the public keys of the Publishers to a specific topic in order to verify the signature over the published topic data. This might make the message exchange quite heavy for small constrained devices.</t>
      <t>The Broker is only trusted with verifying that a Publisher is authorised to publish on a certain topic and with distributing that data only to the Subscribers authorised to obtain it. However, the Broker is not trusted with the published topic data in itself, which the Broker cannot read or modify as it does not have access to the group key required for decrypting the data.</t>
      <t>With respect to the reuse of nonces for proof-of-possession input, the same considerations apply as in <xref target="I-D.ietf-ace-key-groupcomm-oscore"/>, with the difference that the KDC of the present document is considered instead of the Group Manager defined therein.</t>
      <t>Access tokens might have to be revoked before their expiration time. <xref target="RFC9770"/> provides a list of possible circumstances where this can happen, and it specifies a method that an Authorization Server can use in order to notify the KDC, the Broker, and the Clients about pertaining access tokens that have been revoked but are not expired yet.</t>
      <t>Aligned with <xref target="rekeying"/>, the KDC performs a group rekeying when one or more members leave the group, thus preserving forward security. In particular, Clients can be excluded from future communications related to a topic, by appropriately rekeying the group associated with the topic in question. According to the specific application requirements, the KDC can also rekey the group upon a new node's joining, in case backward security has also to be preserved (see <xref target="join-response"/>). The KDC can also rekey the group for further reasons, e.g., according to an application-specific rekeying period or scheduling.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>Note to RFC Editor: Please replace "[RFC-XXXX]" with the RFC number of this document and delete this paragraph.</t>
      <t>This document has the following actions for IANA.</t>
      <section anchor="iana-ace-groupcomm-key">
        <name>ACE Groupcomm Key Types</name>
        <t>IANA is asked to register the following entry in the "ACE Groupcomm Key Types" registry defined in <xref section="11.8" sectionFormat="of" target="RFC9594"/>.</t>
        <ul spacing="normal">
          <li>
            <t>Name: Group_PubSub_Keying_Material</t>
          </li>
          <li>
            <t>Key Type Value: GROUPCOMM_KEY_TBD (suggested value: 2)</t>
          </li>
          <li>
            <t>Profile: coap_group_pubsub_app (<xref target="iana-profile"/> of [RFC-XXXX]).</t>
          </li>
          <li>
            <t>Description: Encoded as described in <xref target="join-response"/> of [RFC-XXXX].</t>
          </li>
          <li>
            <t>References: <xref target="RFC9052"/>, <xref target="RFC9053"/>, [RFC-XXXX]</t>
          </li>
        </ul>
      </section>
      <section anchor="iana-profile">
        <name>ACE Groupcomm Profiles</name>
        <t>IANA is asked to register the following entries in the "ACE Groupcomm Profiles" registry defined in <xref section="11.9" sectionFormat="of" target="RFC9594"/>.</t>
        <ul spacing="normal">
          <li>
            <t>Name: coap_group_pubsub_app</t>
          </li>
          <li>
            <t>Description: Application profile to provision keying material for participating in group communication based on the Pub-Sub architecture <xref target="I-D.ietf-core-coap-pubsub"/> for CoAP <xref target="RFC7252"/> and protected with COSE <xref target="RFC9052"/><xref target="RFC9053"/><xref target="RFC9338"/>.</t>
          </li>
          <li>
            <t>CBOR Value: TBD (suggested value: 2)</t>
          </li>
          <li>
            <t>Reference: [RFC-XXXX]</t>
          </li>
        </ul>
      </section>
      <section anchor="core_rt">
        <name>CoRE Resource Type</name>
        <t>IANA is asked to register the following entry in the "Resource Type (rt=) Link Target Attribute Values" registry within the "Constrained Restful Environments (CoRE) Parameters" registry group.</t>
        <ul spacing="normal">
          <li>
            <t>Value: "core.ps.gm"</t>
          </li>
          <li>
            <t>Description: Group-membership resource for Pub-Sub communication.</t>
          </li>
          <li>
            <t>Reference: [RFC-XXXX]</t>
          </li>
        </ul>
        <t>Clients can use this resource type to discover a group membership resource at the KDC.</t>
      </section>
      <section anchor="aif">
        <name>AIF Media-Type Sub-Parameters</name>
        <t>For the media-types "application/aif+cbor" and "application/aif+json" defined in <xref section="5.1" sectionFormat="of" target="RFC9237"/>, IANA is requested to register the following entries for the two media-type parameters Toid and Tperm, in the respective sub-registry defined in <xref section="5.2" sectionFormat="of" target="RFC9237"/> within the "MIME Media Type Sub-Parameter" registry group.</t>
        <ul spacing="normal">
          <li>
            <t>Parameter: Toid</t>
          </li>
          <li>
            <t>Name: pubsub-topic</t>
          </li>
          <li>
            <t>Description/Specification: Name of one application group (topic) or of a corresponding security group.</t>
          </li>
          <li>
            <t>Reference: [RFC-XXXX]</t>
          </li>
        </ul>
        <t><br/></t>
        <ul spacing="normal">
          <li>
            <t>Parameter: Tperm</t>
          </li>
          <li>
            <t>Name: pubsub-perm</t>
          </li>
          <li>
            <t>Description/Specification: Permissions pertaining to application groups (topics) or to corresponding security groups.</t>
          </li>
          <li>
            <t>Reference: [RFC-XXXX]</t>
          </li>
        </ul>
      </section>
      <section anchor="content_formats">
        <name>CoAP Content-Formats</name>
        <t>IANA is asked to register the following entries to the "CoAP Content-Formats" registry within the "Constrained RESTful Environments (CoRE) Parameters" registry group.</t>
        <ul spacing="normal">
          <li>
            <t>Content Type: application/aif+cbor;toid=pubsub-topic;tperm=pubsub-perm</t>
          </li>
          <li>
            <t>Content Coding: -</t>
          </li>
          <li>
            <t>ID: 294 (suggested)</t>
          </li>
          <li>
            <t>Reference: [RFC-XXXX]</t>
          </li>
        </ul>
        <t><br/></t>
        <ul spacing="normal">
          <li>
            <t>Content Type: application/aif+json;toid=pubsub-topic;tperm=pubsub-perm</t>
          </li>
          <li>
            <t>Content Coding: -</t>
          </li>
          <li>
            <t>ID: 295 (suggested)</t>
          </li>
          <li>
            <t>Reference: [RFC-XXXX]</t>
          </li>
        </ul>
      </section>
      <section anchor="tls_exporter">
        <name>TLS Exporter Labels</name>
        <t>IANA is asked to register the following entry to the "TLS Exporter Labels" registry defined in <xref section="6" sectionFormat="of" target="RFC5705"/> and updated in <xref section="12" sectionFormat="of" target="RFC8447"/>.</t>
        <ul spacing="normal">
          <li>
            <t>Value: EXPORTER-ACE-Sign-Challenge-coap-pubsub-app</t>
          </li>
          <li>
            <t>DTLS-OK: Y</t>
          </li>
          <li>
            <t>Recommended: N</t>
          </li>
          <li>
            <t>Reference: <xref target="pop"/> of [RFC-XXXX]</t>
          </li>
        </ul>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="IANA.cose_algorithms" target="https://www.iana.org/assignments/cose">
          <front>
            <title>COSE Algorithms</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="IANA.cose_key-type" target="https://www.iana.org/assignments/cose">
          <front>
            <title>COSE Key Types</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="IANA.cose_header-parameters" target="https://www.iana.org/assignments/cose">
          <front>
            <title>COSE Header Parameters</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="I-D.ietf-core-coap-pubsub">
          <front>
            <title>A publish-subscribe architecture for the Constrained Application Protocol (CoAP)</title>
            <author fullname="Jaime Jimenez" initials="J." surname="Jimenez">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Michael Koster" initials="M." surname="Koster">
              <organization>Dogtiger Labs</organization>
            </author>
            <author fullname="Ari Keränen" initials="A." surname="Keränen">
              <organization>Ericsson</organization>
            </author>
            <date day="28" month="February" year="2025"/>
            <abstract>
              <t>   This document describes a publish-subscribe architecture for the
   Constrained Application Protocol (CoAP), extending the capabilities
   of CoAP communications for supporting endpoints with long breaks in
   connectivity and/or up-time.  CoAP clients publish on and subscribe
   to a topic via a corresponding topic resource at a CoAP server acting
   as broker.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-coap-pubsub-18"/>
        </reference>
        <reference anchor="RFC5246">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
            <author fullname="T. Dierks" initials="T." surname="Dierks"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2008"/>
            <abstract>
              <t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol. The TLS protocol provides communications security over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5246"/>
          <seriesInfo name="DOI" value="10.17487/RFC5246"/>
        </reference>
        <reference anchor="RFC5705">
          <front>
            <title>Keying Material Exporters for Transport Layer Security (TLS)</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="March" year="2010"/>
            <abstract>
              <t>A number of protocols wish to leverage Transport Layer Security (TLS) to perform key establishment but then use some of the keying material for their own purposes. This document describes a general mechanism for allowing that. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5705"/>
          <seriesInfo name="DOI" value="10.17487/RFC5705"/>
        </reference>
        <reference anchor="RFC6347">
          <front>
            <title>Datagram Transport Layer Security Version 1.2</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="January" year="2012"/>
            <abstract>
              <t>This document specifies version 1.2 of the Datagram Transport Layer Security (DTLS) protocol. The DTLS protocol provides communications privacy for datagram protocols. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. The DTLS protocol is based on the Transport Layer Security (TLS) protocol and provides equivalent security guarantees. Datagram semantics of the underlying transport are preserved by the DTLS protocol. This document updates DTLS 1.0 to work with TLS version 1.2. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6347"/>
          <seriesInfo name="DOI" value="10.17487/RFC6347"/>
        </reference>
        <reference anchor="RFC6690">
          <front>
            <title>Constrained RESTful Environments (CoRE) Link Format</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <date month="August" year="2012"/>
            <abstract>
              <t>This specification defines Web Linking using a link format for use by constrained web servers to describe hosted resources, their attributes, and other relationships between links. Based on the HTTP Link Header field defined in RFC 5988, the Constrained RESTful Environments (CoRE) Link Format is carried as a payload and is assigned an Internet media type. "RESTful" refers to the Representational State Transfer (REST) architecture. A well-known URI is defined as a default entry point for requesting the links hosted by a server. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6690"/>
          <seriesInfo name="DOI" value="10.17487/RFC6690"/>
        </reference>
        <reference anchor="RFC6749">
          <front>
            <title>The OAuth 2.0 Authorization Framework</title>
            <author fullname="D. Hardt" initials="D." role="editor" surname="Hardt"/>
            <date month="October" year="2012"/>
            <abstract>
              <t>The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf. This specification replaces and obsoletes the OAuth 1.0 protocol described in RFC 5849. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6749"/>
          <seriesInfo name="DOI" value="10.17487/RFC6749"/>
        </reference>
        <reference anchor="RFC7252">
          <front>
            <title>The Constrained Application Protocol (CoAP)</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s. The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
              <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types. CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7252"/>
          <seriesInfo name="DOI" value="10.17487/RFC7252"/>
        </reference>
        <reference anchor="RFC7641">
          <front>
            <title>Observing Resources in the Constrained Application Protocol (CoAP)</title>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <date month="September" year="2015"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a RESTful application protocol for constrained nodes and networks. The state of a resource on a CoAP server can change over time. This document specifies a simple protocol extension for CoAP that enables CoAP clients to "observe" resources, i.e., to retrieve a representation of a resource and keep this representation updated by the server over a period of time. The protocol follows a best-effort approach for sending new representations to clients and provides eventual consistency between the state observed by each client and the actual resource state at the server.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7641"/>
          <seriesInfo name="DOI" value="10.17487/RFC7641"/>
        </reference>
        <reference anchor="RFC7925">
          <front>
            <title>Transport Layer Security (TLS) / Datagram Transport Layer Security (DTLS) Profiles for the Internet of Things</title>
            <author fullname="H. Tschofenig" initials="H." role="editor" surname="Tschofenig"/>
            <author fullname="T. Fossati" initials="T." surname="Fossati"/>
            <date month="July" year="2016"/>
            <abstract>
              <t>A common design pattern in Internet of Things (IoT) deployments is the use of a constrained device that collects data via sensors or controls actuators for use in home automation, industrial control systems, smart cities, and other IoT deployments.</t>
              <t>This document defines a Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) 1.2 profile that offers communications security for this data exchange thereby preventing eavesdropping, tampering, and message forgery. The lack of communication security is a common vulnerability in IoT products that can easily be solved by using these well-researched and widely deployed Internet security protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7925"/>
          <seriesInfo name="DOI" value="10.17487/RFC7925"/>
        </reference>
        <reference anchor="RFC8392">
          <front>
            <title>CBOR Web Token (CWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties. The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection. A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value. CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8392"/>
          <seriesInfo name="DOI" value="10.17487/RFC8392"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC8447">
          <front>
            <title>IANA Registry Updates for TLS and DTLS</title>
            <author fullname="J. Salowey" initials="J." surname="Salowey"/>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document describes a number of changes to TLS and DTLS IANA registries that range from adding notes to the registry all the way to changing the registration policy. These changes were mostly motivated by WG review of the TLS- and DTLS-related registries undertaken as part of the TLS 1.3 development process.</t>
              <t>This document updates the following RFCs: 3749, 5077, 4680, 5246, 5705, 5878, 6520, and 7301.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8447"/>
          <seriesInfo name="DOI" value="10.17487/RFC8447"/>
        </reference>
        <reference anchor="RFC8610">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="C. Vigano" initials="C." surname="Vigano"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8610"/>
          <seriesInfo name="DOI" value="10.17487/RFC8610"/>
        </reference>
        <reference anchor="RFC8949">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="94"/>
          <seriesInfo name="RFC" value="8949"/>
          <seriesInfo name="DOI" value="10.17487/RFC8949"/>
        </reference>
        <reference anchor="RFC9052">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
              <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="96"/>
          <seriesInfo name="RFC" value="9052"/>
          <seriesInfo name="DOI" value="10.17487/RFC9052"/>
        </reference>
        <reference anchor="RFC9053">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Initial Algorithms</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines a set of algorithms that can be used with the CBOR Object Signing and Encryption (COSE) protocol (RFC 9052).</t>
              <t>This document, along with RFC 9052, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9053"/>
          <seriesInfo name="DOI" value="10.17487/RFC9053"/>
        </reference>
        <reference anchor="RFC9147">
          <front>
            <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>This document specifies version 1.3 of the Datagram Transport Layer Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability. Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
              <t>This document obsoletes RFC 6347.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9147"/>
          <seriesInfo name="DOI" value="10.17487/RFC9147"/>
        </reference>
        <reference anchor="RFC9200">
          <front>
            <title>Authentication and Authorization for Constrained Environments Using the OAuth 2.0 Framework (ACE-OAuth)</title>
            <author fullname="L. Seitz" initials="L." surname="Seitz"/>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>This specification defines a framework for authentication and authorization in Internet of Things (IoT) environments called ACE-OAuth. The framework is based on a set of building blocks including OAuth 2.0 and the Constrained Application Protocol (CoAP), thus transforming a well-known and widely used authorization solution into a form suitable for IoT devices. Existing specifications are used where possible, but extensions are added and profiles are defined to better serve the IoT use cases.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9200"/>
          <seriesInfo name="DOI" value="10.17487/RFC9200"/>
        </reference>
        <reference anchor="RFC9237">
          <front>
            <title>An Authorization Information Format (AIF) for Authentication and Authorization for Constrained Environments (ACE)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Information about which entities are authorized to perform what operations on which constituents of other entities is a crucial component of producing an overall system that is secure. Conveying precise authorization information is especially critical in highly automated systems with large numbers of entities, such as the Internet of Things.</t>
              <t>This specification provides a generic information model and format for representing such authorization information, as well as two variants of a specific instantiation of that format for use with Representational State Transfer (REST) resources identified by URI path.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9237"/>
          <seriesInfo name="DOI" value="10.17487/RFC9237"/>
        </reference>
        <reference anchor="RFC9277">
          <front>
            <title>On Stable Storage for Items in Concise Binary Object Representation (CBOR)</title>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>This document defines a stored ("file") format for Concise Binary Object Representation (CBOR) data items that is friendly to common systems that recognize file types, such as the Unix file(1) command.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9277"/>
          <seriesInfo name="DOI" value="10.17487/RFC9277"/>
        </reference>
        <reference anchor="RFC9290">
          <front>
            <title>Concise Problem Details for Constrained Application Protocol (CoAP) APIs</title>
            <author fullname="T. Fossati" initials="T." surname="Fossati"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="October" year="2022"/>
            <abstract>
              <t>This document defines a concise "problem detail" as a way to carry machine-readable details of errors in a Representational State Transfer (REST) response to avoid the need to define new error response formats for REST APIs for constrained environments. The format is inspired by, but intended to be more concise than, the problem details for HTTP APIs defined in RFC 7807.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9290"/>
          <seriesInfo name="DOI" value="10.17487/RFC9290"/>
        </reference>
        <reference anchor="RFC9338">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Countersignatures</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="December" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. CBOR Object Signing and Encryption (COSE) defines a set of security services for CBOR. This document defines a countersignature algorithm along with the needed header parameters and CBOR tags for COSE. This document updates RFC 9052.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="96"/>
          <seriesInfo name="RFC" value="9338"/>
          <seriesInfo name="DOI" value="10.17487/RFC9338"/>
        </reference>
        <reference anchor="RFC9430">
          <front>
            <title>Extension of the Datagram Transport Layer Security (DTLS) Profile for Authentication and Authorization for Constrained Environments (ACE) to Transport Layer Security (TLS)</title>
            <author fullname="O. Bergmann" initials="O." surname="Bergmann"/>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <date month="July" year="2023"/>
            <abstract>
              <t>This document updates "Datagram Transport Layer Security (DTLS) Profile for Authentication and Authorization for Constrained Environments (ACE)" (RFC 9202) by specifying that the profile applies to TLS as well as DTLS.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9430"/>
          <seriesInfo name="DOI" value="10.17487/RFC9430"/>
        </reference>
        <reference anchor="RFC9594">
          <front>
            <title>Key Provisioning for Group Communication Using Authentication and Authorization for Constrained Environments (ACE)</title>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <author fullname="M. Tiloca" initials="M." surname="Tiloca"/>
            <date month="September" year="2024"/>
            <abstract>
              <t>This document defines how to use the Authentication and Authorization for Constrained Environments (ACE) framework to distribute keying material and configuration parameters for secure group communication. Candidate group members that act as Clients and are authorized to join a group can do so by interacting with a Key Distribution Center (KDC) acting as the Resource Server, from which they obtain the keying material to communicate with other group members. While defining general message formats as well as the interface and operations available at the KDC, this document supports different approaches and protocols for secure group communication. Therefore, details are delegated to separate application profiles of this document as specialized instances that target a particular group communication approach and define how communications in the group are protected. Compliance requirements for such application profiles are also specified.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9594"/>
          <seriesInfo name="DOI" value="10.17487/RFC9594"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC8613">
          <front>
            <title>Object Security for Constrained RESTful Environments (OSCORE)</title>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="J. Mattsson" initials="J." surname="Mattsson"/>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <author fullname="L. Seitz" initials="L." surname="Seitz"/>
            <date month="July" year="2019"/>
            <abstract>
              <t>This document defines Object Security for Constrained RESTful Environments (OSCORE), a method for application-layer protection of the Constrained Application Protocol (CoAP), using CBOR Object Signing and Encryption (COSE). OSCORE provides end-to-end protection between endpoints communicating using CoAP or CoAP-mappable HTTP. OSCORE is designed for constrained nodes and networks supporting a range of proxy operations, including translation between different transport protocols.</t>
              <t>Although an optional functionality of CoAP, OSCORE alters CoAP options processing and IANA registration. Therefore, this document updates RFC 7252.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8613"/>
          <seriesInfo name="DOI" value="10.17487/RFC8613"/>
        </reference>
        <reference anchor="RFC8259">
          <front>
            <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format. It was derived from the ECMAScript Programming Language Standard. JSON defines a small set of formatting rules for the portable representation of structured data.</t>
              <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="90"/>
          <seriesInfo name="RFC" value="8259"/>
          <seriesInfo name="DOI" value="10.17487/RFC8259"/>
        </reference>
        <reference anchor="RFC9202">
          <front>
            <title>Datagram Transport Layer Security (DTLS) Profile for Authentication and Authorization for Constrained Environments (ACE)</title>
            <author fullname="S. Gerdes" initials="S." surname="Gerdes"/>
            <author fullname="O. Bergmann" initials="O." surname="Bergmann"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="L. Seitz" initials="L." surname="Seitz"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>This specification defines a profile of the Authentication and Authorization for Constrained Environments (ACE) framework that allows constrained servers to delegate client authentication and authorization. The protocol relies on DTLS version 1.2 or later for communication security between entities in a constrained network using either raw public keys or pre-shared keys. A resource-constrained server can use this protocol to delegate management of authorization information to a trusted host with less-severe limitations regarding processing power and memory.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9202"/>
          <seriesInfo name="DOI" value="10.17487/RFC9202"/>
        </reference>
        <reference anchor="RFC9203">
          <front>
            <title>The Object Security for Constrained RESTful Environments (OSCORE) Profile of the Authentication and Authorization for Constrained Environments (ACE) Framework</title>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <author fullname="L. Seitz" initials="L." surname="Seitz"/>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="M. Gunnarsson" initials="M." surname="Gunnarsson"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>This document specifies a profile for the Authentication and Authorization for Constrained Environments (ACE) framework. It utilizes Object Security for Constrained RESTful Environments (OSCORE) to provide communication security and proof-of-possession for a key owned by the client and bound to an OAuth 2.0 access token.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9203"/>
          <seriesInfo name="DOI" value="10.17487/RFC9203"/>
        </reference>
        <reference anchor="RFC9770">
          <front>
            <title>Notification of Revoked Access Tokens in the Authentication and Authorization for Constrained Environments (ACE) Framework</title>
            <author fullname="M. Tiloca" initials="M." surname="Tiloca"/>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <author fullname="S. Echeverria" initials="S." surname="Echeverria"/>
            <author fullname="G. Lewis" initials="G." surname="Lewis"/>
            <date month="June" year="2025"/>
            <abstract>
              <t>This document specifies a method of the Authentication and Authorization for Constrained Environments (ACE) framework, which allows an authorization server to notify clients and resource servers (i.e., registered devices) about revoked access tokens. As specified in this document, the method allows clients and resource servers (RSs) to access a Token Revocation List (TRL) on the authorization server by using the Constrained Application Protocol (CoAP), with the possible additional use of resource observation. Resulting (unsolicited) notifications of revoked access tokens complement alternative approaches such as token introspection, while not requiring additional endpoints on clients and RSs.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9770"/>
          <seriesInfo name="DOI" value="10.17487/RFC9770"/>
        </reference>
        <reference anchor="I-D.ietf-cose-cbor-encoded-cert">
          <front>
            <title>CBOR Encoded X.509 Certificates (C509 Certificates)</title>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Göran Selander" initials="G." surname="Selander">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Shahid Raza" initials="S." surname="Raza">
              <organization>University of Glasgow</organization>
            </author>
            <author fullname="Joel Höglund" initials="J." surname="Höglund">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Martin Furuhed" initials="M." surname="Furuhed">
              <organization>IN Groupe</organization>
            </author>
            <date day="25" month="January" year="2026"/>
            <abstract>
              <t>   This document specifies a CBOR encoding of X.509 certificates.  The
   resulting certificates are called C509 certificates.  The CBOR
   encoding supports a large subset of RFC 5280, common certificate
   profiles and is extensible.

   Two types of C509 certificates are defined.  One type is an
   invertible CBOR re-encoding of DER encoded X.509 certificates with
   the signature field copied from the DER encoding.  The other type is
   identical except that the signature is over the CBOR encoding instead
   of the DER encoding, avoiding the use of ASN.1.  Both types of
   certificates have the same semantics as X.509 and the same reduced
   size compared to X.509.

   The document also specifies CBOR encoded data structures for
   certificate (signing) requests and certificate request templates, new
   COSE headers, as well as a TLS certificate type and a file format for
   C509.  This document updates RFC 6698; the TLSA selectors registry is
   extended to include C509 certificates.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cose-cbor-encoded-cert-16"/>
        </reference>
        <reference anchor="I-D.ietf-ace-key-groupcomm-oscore">
          <front>
            <title>Key Management for Group Object Security for Constrained RESTful Environments (Group OSCORE) Using Authentication and Authorization for Constrained Environments (ACE)</title>
            <author fullname="Marco Tiloca" initials="M." surname="Tiloca">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Francesca Palombini" initials="F." surname="Palombini">
              <organization>Ericsson AB</organization>
            </author>
            <date day="24" month="January" year="2026"/>
            <abstract>
              <t>   This document defines an application profile of the Authentication
   and Authorization for Constrained Environments (ACE) framework, to
   request and provision keying material in group communication
   scenarios that are based on the Constrained Application Protocol
   (CoAP) and are secured with Group Object Security for Constrained
   RESTful Environments (Group OSCORE).  This application profile
   delegates the authentication and authorization of Clients, which join
   an OSCORE group through a Resource Server acting as Group Manager for
   that group.  This application profile leverages protocol-specific
   transport profiles of ACE to achieve communication security, server
   authentication, and proof of possession for a key owned by the Client
   and bound to an OAuth 2.0 access token.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ace-key-groupcomm-oscore-19"/>
        </reference>
      </references>
    </references>
    <?line 1216?>

<section anchor="groupcomm_requirements">
      <name>Requirements on Application Profiles</name>
      <t>This section lists how this application profile of ACE addresses the requirements defined in <xref section="A" sectionFormat="of" target="RFC9594"/>.</t>
      <section anchor="mandatory-to-address-requirements">
        <name>Mandatory-to-Address Requirements</name>
        <ul spacing="normal">
          <li>
            <t>REQ1: Specify the format and encoding of scope. This includes defining the set of possible roles and their identifiers, as well as the corresponding encoding to use in the scope entries according to the used scope format: see <xref target="scope"/>.</t>
          </li>
          <li>
            <t>REQ2: If scope uses AIF, register its specific instance of "Toid" and "Tperm" as media type parameters and a corresponding Content-Format, as per the guidelines in <xref target="RFC9237"/>: see <xref target="aif"/> and <xref target="content_formats"/>.</t>
          </li>
          <li>
            <t>REQ3: If used, specify the acceptable values for the 'sign_alg' parameter: values from the "Value" column of the "COSE Algorithms" registry <xref target="IANA.cose_algorithms"/>.</t>
          </li>
          <li>
            <t>REQ4: If used, specify the acceptable values and structure for the 'sign_parameters' parameter: values and structure from the COSE algorithm capabilities as specified in the "COSE Algorithms" registry <xref target="IANA.cose_algorithms"/>.</t>
          </li>
          <li>
            <t>REQ5: If used, specify the acceptable values and structure for the 'sign_key_parameters' parameter: values and structure from the COSE key type capabilities as specified in the "COSE Key Types" registry <xref target="IANA.cose_key-type"/>.</t>
          </li>
          <li>
            <t>REQ6: Specify the acceptable formats for authentication credentials and, if applicable, the acceptable values for the 'cred_fmt' parameter: acceptable formats explicitly provide the public key as well as the comprehensive set of information related to the public key algorithm (see <xref target="token-post"/> and <xref target="join-response"/>). Consistent acceptable values for 'cred_fmt' are taken from the "Label" column of the "COSE Header Parameters" registry <xref target="IANA.cose_header-parameters"/>.</t>
          </li>
          <li>
            <t>REQ7: If the value of the GROUPNAME URI path and the group name in the access token scope ('gname') are not required to coincide, specify the mechanism to map the GROUPNAME value in the URI to the group name: not applicable, since a perfect matching is required.</t>
          </li>
          <li>
            <t>REQ8: Define whether the KDC has an authentication credential as required for the correct group operation and if this has to be provided through the 'kdc_cred' parameter: optional, see <xref target="join-response"/>.</t>
          </li>
          <li>
            <t>REQ9: Specify if any part of the KDC interface as defined in <xref target="RFC9594"/> is not supported by the KDC: part of the KDC interface is optional to support, see <xref target="kdc-interface"/>.</t>
          </li>
          <li>
            <t>REQ10: Register a Resource Type for the group-membership resources, which is used to discover the correct URL for sending a Join Request to the KDC: the Resource Type (rt=) Link Target Attribute value "core.ps.gm" is registered in <xref target="core_rt"/>.</t>
          </li>
          <li>
            <t>REQ11: Define what specific actions (e.g., CoAP methods) are allowed on each resource accessible through the KDC interface, depending on: whether the Client is a current group member; the roles that a Client is authorised to take as per the obtained access token; and the roles that the Client has as a current group member: see <xref target="kdc-interface"/>.</t>
          </li>
          <li>
            <t>REQ12: Categorize possible newly defined operations for Clients into primary operations expected to be minimally supported and secondary operations, and provide accompanying considerations: no new operations are defined.</t>
          </li>
          <li>
            <t>REQ13: Specify the encoding of group identifiers: CBOR byte string, with value used also to identify the current group key used in the security group (see <xref target="join-response"/> and <xref target="query"/>).</t>
          </li>
          <li>
            <t>REQ14: Specify the approaches used to compute and verify the PoP evidence to include in the 'client_cred_verify' parameter and which of those approaches is used in which case: see <xref target="pop"/>.</t>
          </li>
          <li>
            <t>REQ15: Specify how the nonce N_S is generated, if the access token is not provided to the KDC through the Token Transfer Request sent to the /authz-info endpoint (e.g., the access token is instead transferred during the establishment of a secure communication association): see <xref target="pop"/>.</t>
          </li>
          <li>
            <t>REQ16: Define the initial value of the version number for the group keying material: the initial value <bcp14>MUST</bcp14> be set to 0 (see <xref target="join-response"/>).</t>
          </li>
          <li>
            <t>REQ17: Specify the format of the group keying material that is conveyed in the 'key' parameter: see <xref target="join-response"/>.</t>
          </li>
          <li>
            <t>REQ18: Specify the acceptable values of the 'gkty' parameter. For each of them, register a corresponding entry in the "ACE Groupcomm Key Types" IANA registry if such an entry does not exist already: Group_PubSub_Keying_Material, see <xref target="join-response"/> and <xref target="iana-ace-groupcomm-key"/>.</t>
          </li>
          <li>
            <t>REQ19: Specify and register the application profile identifier: coap_group_pubsub_app (see <xref target="join-response"/> and <xref target="iana-profile"/>).</t>
          </li>
          <li>
            <t>REQ20: If used, specify the format and default values of the entries of the CBOR map to include in the 'group_policies' parameter: not applicable.</t>
          </li>
          <li>
            <t>REQ21: Specify the approaches used to compute and verify the PoP evidence to include in the 'kdc_cred_verify' parameter and which of those approaches is used in which case. If external signature verifiers are supported, specify how those provide a nonce to the KDC to be used for computing the PoP evidence: see <xref target="join-response"/>.</t>
          </li>
          <li>
            <t>REQ22: Specify the communication protocol that members of the group use to communicate with each other (e.g., CoAP for group communication): CoAP <xref target="RFC7252"/>, used for Pub-Sub communications as defined in <xref target="I-D.ietf-core-coap-pubsub"/>.</t>
          </li>
          <li>
            <t>REQ23: Specify the security protocol that members of the group use to protect the group communication (e.g., Group OSCORE). This must provide encryption, integrity, and replay protection: Publishers in a group use a symmetric group key to protect published topic data as a COSE_Encrypt0 object, per the AEAD algorithm specified by the KDC. A Publisher also produces a COSE countersignature of the COSE_Encrypt0 object by using its private key, per the signature algorithm specified by the KDC.</t>
          </li>
          <li>
            <t>REQ24: Specify how the communication is secured between the Client and the KDC. Optionally, specify a transport profile of ACE <xref target="RFC9200"/> to use between the Client and the KDC: ACE transport profile such as for DTLS <xref target="RFC9202"/> or OSCORE <xref target="RFC9203"/>.</t>
          </li>
          <li>
            <t>REQ25: Specify the format of the node identifiers of group members: the Sender ID defined in <xref target="join-response"/>.</t>
          </li>
          <li>
            <t>REQ26: Specify policies at the KDC to handle node identifiers that are included in the 'get_creds' parameter but are not associated with any current group member: see <xref target="query"/>.</t>
          </li>
          <li>
            <t>REQ27: Specify the format of (newly generated) individual keying material for group members or of the information to derive such keying material, as well as the corresponding CBOR map key that has to be registered in the "ACE Groupcomm Parameters" registry: see <xref target="sec-key-renewal-request"/>.</t>
          </li>
          <li>
            <t>REQ28: Specify which CBOR tag is used for identifying the semantics of binary scopes, or register a new CBOR tag if a suitable one does not exist already: see <xref target="as-response"/> and <xref target="content_formats"/>.</t>
          </li>
          <li>
            <t>REQ29: Categorize newly defined parameters according to the same criteria of <xref section="8" sectionFormat="of" target="RFC9594"/>: a Publisher Client <bcp14>MUST</bcp14> support 'group_SenderId' in 'key'; see <xref target="join-response"/>.</t>
          </li>
          <li>
            <t>REQ30: Define whether Clients must, should, or may support the conditional parameters defined in <xref section="8" sectionFormat="of" target="RFC9594"/> and under which circumstances: a Publisher Client <bcp14>MUST</bcp14> support the client_cred' and 'client_cred_verify' parameters (see <xref target="join-request"/>). A Publisher Client that provides the access token to the KDC through the /authz-info endpoint <bcp14>MUST</bcp14> support the parameter 'kdcchallenge' (see <xref target="token-post"/>).</t>
          </li>
        </ul>
      </section>
      <section anchor="optional-to-address-requirements">
        <name>Optional-to-Address Requirements</name>
        <ul spacing="normal">
          <li>
            <t>OPT1: Optionally, if the textual format of scope is used, specify CBOR values to use for abbreviating the role identifiers in the group: not applicable.</t>
          </li>
          <li>
            <t>OPT2: Optionally, specify the additional parameters used in the exchange of Token Transfer Request and Response: none are defined.</t>
          </li>
          <li>
            <t>OPT3: Optionally, specify the negotiation of parameter values for signature algorithm and signature keys, if the 'sign_info' parameter is not used: see <xref target="token-post"/>.</t>
          </li>
          <li>
            <t>OPT4: Optionally, specify possible or required payload formats for specific error cases: see <xref target="join-error"/>.</t>
          </li>
          <li>
            <t>OPT5: Optionally, specify additional identifiers of error types as values of the 'error-id' field within the Custom Problem Detail entry 'ace-groupcomm-error': none are defined.</t>
          </li>
          <li>
            <t>OPT6: Optionally, specify the encoding of the 'creds_repo' parameter if the default one is not used: no encoding is defined.</t>
          </li>
          <li>
            <t>OPT7: Optionally, specify the functionalities implemented at the resource hosted by the Client at the URI indicated in the 'control_uri' parameter, including the encoding of exchanged messages and other details: no functionalities are defined.</t>
          </li>
          <li>
            <t>OPT8: Optionally, specify the behavior of the POST handler of group-membership resources, for the case when it fails to retrieve an authentication credential for the specific Client: The KDC <bcp14>MUST</bcp14> reply with a 4.00 (Bad Request) error response to the Join Request (see <xref target="join-error"/>).</t>
          </li>
          <li>
            <t>OPT9: Optionally, define a default group rekeying scheme to refer to in case the 'rekeying_scheme' parameter is not included in the Join Response: the "Point-to-Point" rekeying scheme registered in <xref section="11.13" sectionFormat="of" target="RFC9594"/>.</t>
          </li>
          <li>
            <t>OPT10: Optionally, specify the functionalities implemented at the resource hosted by the Client at the URI indicated in the 'control_group_uri' parameter, including the encoding of exchanged messages and other details: no functionalities are defined.</t>
          </li>
          <li>
            <t>OPT11: Optionally, specify policies that instruct Clients to retain messages and for how long, if those are unsuccessfully decrypted: no such policies are specified.</t>
          </li>
          <li>
            <t>OPT12: Optionally, specify for the KDC to perform a group rekeying when receiving a Key Renewal Request, together with or instead of renewing individual keying material: the KDC <bcp14>SHOULD</bcp14> perform a group rekeying if one is already scheduled to occur within an acceptably short time frame, otherwise it <bcp14>SHOULD NOT</bcp14> (see <xref target="sec-key-renewal-request"/>).</t>
          </li>
          <li>
            <t>OPT13: Optionally, specify how the identifier of a group member's authentication credential is included in requests sent to other group members: no such method is defined.</t>
          </li>
          <li>
            <t>OPT14: Optionally, specify additional information to include in rekeying messages for the "Point-to-Point" group rekeying scheme (see <xref section="6" sectionFormat="of" target="RFC9594"/>): no additional information is defined.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="sec-document-updates" removeInRFC="true">
      <name>Document Updates</name>
      <section anchor="sec-02-03">
        <name>Version -02 to -03</name>
        <ul spacing="normal">
          <li>
            <t>Updated introduction: clarified relationships between this document and related documents.</t>
          </li>
          <li>
            <t>Ensured consistency with RFC 9594 when using an optimized Join Request for re-joining a group (presence of the 'client_cred' parameter).</t>
          </li>
          <li>
            <t>Added the "Operational Considerations" section.</t>
          </li>
          <li>
            <t>Clarifications:  </t>
            <ul spacing="normal">
              <li>
                <t>Secure communications required as per the transport profile of ACE used.</t>
              </li>
              <li>
                <t>Explicitly mentioned the rationale for computing a proof-of-possession (PoP) evidence.</t>
              </li>
              <li>
                <t>Reasons for and flexibility of group rekeying.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Editorial fixes and improvements.</t>
          </li>
        </ul>
      </section>
      <section anchor="sec-01-02">
        <name>Version -01 to -02</name>
        <ul spacing="normal">
          <li>
            <t>Clarified high-level description of the authorisation flow.</t>
          </li>
          <li>
            <t>Clarified relation between a group rekeying and a Key Renewal Request.</t>
          </li>
          <li>
            <t>Editorial fixes and improvements.</t>
          </li>
        </ul>
      </section>
      <section anchor="sec-00-01">
        <name>Version -00 to -01</name>
        <ul spacing="normal">
          <li>
            <t>Clarified recommendations about randomness and size of nonces.</t>
          </li>
          <li>
            <t>Clarified generation of N_S if TLS is used with the KDC instead of DTLS.</t>
          </li>
          <li>
            <t>Added missing references to REQ and OPT requirements.</t>
          </li>
          <li>
            <t>Updated IANA considerations:  </t>
            <ul spacing="normal">
              <li>
                <t>Suggested values for IANA registrations.</t>
              </li>
              <li>
                <t>Renamed TLS Exporter Label.</t>
              </li>
              <li>
                <t>Fixed content types in the CoAP Content-Formats registrations.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Updated references.</t>
          </li>
          <li>
            <t>Editorial fixes and improvements.</t>
          </li>
        </ul>
      </section>
      <section anchor="sec-00">
        <name>Version -00</name>
        <ul spacing="normal">
          <li>
            <t>Imported content from draft-ietf-ace-pubsub-profile-11.</t>
          </li>
          <li>
            <t>Removed content about MQTT.</t>
          </li>
          <li>
            <t>New document title.</t>
          </li>
        </ul>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors wish to thank <contact fullname="Rikard Höglund"/>, <contact fullname="Ari Keränen"/>, <contact fullname="John Preuß Mattsson"/>, <contact fullname="Jim Schaad"/>, <contact fullname="Ludwig Seitz"/>, and <contact fullname="Göran Selander"/> for the useful discussion and reviews that helped shape this document.</t>
      <t>This work was supported by the Sweden's Innovation Agency VINNOVA within the EUREKA CELTIC-NEXT projects CRITISEC and CYPRESS; and by the H2020 project SIFIS-Home (Grant agreement 952652).</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
