The IESG has approved the following document: - 'EAP-based Authentication Service for CoAP' (draft-ietf-ace-wg-coap-eap-14.txt) as Proposed Standard
This document is the product of the Authentication and Authorization for Constrained Environments Working Group. The IESG contact persons are Paul Wouters and Deb Cooley. A URL of this Internet-Draft is: https://datatracker.ietf.org/doc/draft-ietf-ace-wg-coap-eap/ Technical Summary This document specifies an authentication service that uses the Extensible Authentication Protocol (EAP) transported employing Constrained Application Protocol (CoAP) messages. As such, it defines an EAP lower layer based on CoAP called CoAP-EAP. One of the main goals is to authenticate a CoAP-enabled IoT device (EAP peer) that intends to join a security domain managed by a Controller (EAP authenticator). Secondly, it allows deriving key material to protect CoAP messages exchanged between them based on Object Security for Constrained RESTful Environments (OSCORE), enabling the establishment of a security association between them. Working Group Summary No issues reported. EMU WG was consulted as well. Document Quality There is at least one implementation. Personnel The Document Shepherd for this document is Loganaden Velvindron. The Responsible Area Director is Paul Wouters. _______________________________________________ Ace mailing list -- ace@ietf.org To unsubscribe send an email to ace-le...@ietf.org