The IESG has approved the following document:
- 'EAP-based Authentication Service for CoAP'
  (draft-ietf-ace-wg-coap-eap-14.txt) as Proposed Standard

This document is the product of the Authentication and Authorization for
Constrained Environments Working Group.

The IESG contact persons are Paul Wouters and Deb Cooley.

A URL of this Internet-Draft is:
https://datatracker.ietf.org/doc/draft-ietf-ace-wg-coap-eap/




Technical Summary

   This document specifies an authentication service that uses the
   Extensible Authentication Protocol (EAP) transported employing
   Constrained Application Protocol (CoAP) messages.  As such, it
   defines an EAP lower layer based on CoAP called CoAP-EAP.  One of the
   main goals is to authenticate a CoAP-enabled IoT device (EAP peer)
   that intends to join a security domain managed by a Controller (EAP
   authenticator).  Secondly, it allows deriving key material to protect
   CoAP messages exchanged between them based on Object Security for
   Constrained RESTful Environments (OSCORE), enabling the establishment
   of a security association between them.

Working Group Summary

No issues reported. EMU WG was consulted as well.

Document Quality

   There is at least one implementation.

Personnel

   The Document Shepherd for this document is Loganaden Velvindron. The
   Responsible Area Director is Paul Wouters.


_______________________________________________
Ace mailing list -- ace@ietf.org
To unsubscribe send an email to ace-le...@ietf.org

Reply via email to