[an error occurred while processing this directive] [an error occurred while processing this directive]

Charter

Authentication and Authorization for Constrained Environments (ace)
-------------------------------------------------------------------

 Charter

 Current Status: Active

 Chairs:
     Daniel Migault 
     Loganaden Velvindron 

 Security Area Directors:
     Roman Danyliw 
     Benjamin Kaduk 

 Security Area Advisor:
     Benjamin Kaduk 

 Mailing Lists:
     General Discussion: ace@ietf.org
     To Subscribe:       https://www.ietf.org/mailman/listinfo/ace
     Archive:            https://mailarchive.ietf.org/arch/browse/ace/

Description of Working Group:

  The Authentication and Authorization for Constrained Environments (ace) WG
  has defined a standardized solution framework for authentication and
  authorization to enable authorized access to resources identified by a URI
  and hosted on a resource server in constrained environments.
  
  The access to the resource is mediated by an authorization server, which is
  not considered to be constrained.
  
  Profiles of this framework for application to security protocols commonly
  used in constrained environments, including CoAP+DTLS and CoAP+OSCORE, have
  also been standardized.  The Working Group is charged with maintenance of
  the framework and existing profiles thereof, and may undertake work to
  specify profiles of the framework for additional secure communications
  protocols and for additional support services providing authorized access
  to crypto keys (that are not necessarily limited to constrained endpoints,
  though the focus remains on deployment in ecosystems with a substantial
  portion of constrained devices).
  
  In addition to the ongoing maintenance work, the Working Group will extend
  the framework (originally designed to protect the exchange between single 
  client and single RS) as needed for applicability to group communications.
  The initial focus will be on using (D)TLS and (Group) OSCORE as the underlying
  communication security protocols. The Working Group will standardize
  procedures for requesting and distributing group keying material using the ACE
  framework as well as appropriated management interfaces.
  
  The Working Group will standardize a format for expressing authorization
  information for a given authenticated principal as received from an
  authorization manager.
  
  The Working Group will examine how to use Constrained Application Protocol
  (CoAP) as a transport medium for certificate enrollment protocols, such as
  EST and CMPv2, as well as a transport for authentication protocols such as
  EAP (in coordination with the EMU WG), and standardize as needed.


Goals and Milestones:
  Feb 2021 - Call for adoption of "Protecting EST Payloads with OSCORE"
  Jun 2021 - Submission to IESG of "CoAP Transport for CMPV2" (if adopted)
  Jul 2021 - Submission to the IESG of Pub-Sub Profile for Authentication and Authorization for Constrained Environments (ACE)
  Jul 2021 - Submission to the IESG of "An Authorization Information Format (AIF) for ACE"
  Jul 2021 - Submission to the IESG of "Key Provisioning for Group Communication using ACE"
  Jul 2021 - Submission to the IESG of "Protecting EST Payloads with OSCORE"
  Aug 2021 - Submission to the IESG of "EAP-based Authentication Service for CoAP"
  Sep 2021 - Submission to the IESG of "Key Management for OSCORE Groups in ACE"
  Dec 2021 - Submission to the IESG of "Admin Interface for the OSCORE Group Manager"
  Done     - Adoption call for "CoAP Transport for CMPV2"
  Done     - Submit DTLS Profile for ACE to the IESG for publication as a proposed standard
  Done     - Adoption call of "EAP-based Authentication Service for CoAP"
  Done     - Submission to the IESG of "OSCORE Profile of the Authentication and Authorization for Constrained Environments Framework"

[an error occurred while processing this directive]