{"draft":"draft-ietf-ace-dtls-authorize-18","doc_id":"RFC9202","title":"Datagram Transport Layer Security (DTLS) Profile for Authentication and Authorization for Constrained Environments (ACE)","authors":["S. Gerdes","O. Bergmann","C. Bormann","G. Selander","L. Seitz"],"format":["HTML","TEXT","PDF","XML"],"page_count":"23","pub_status":"PROPOSED STANDARD","status":"PROPOSED STANDARD","source":"Authentication and Authorization for Constrained Environments","abstract":"This specification defines a profile of the Authentication and\r\nAuthorization for Constrained Environments (ACE) framework that\r\nallows constrained servers to delegate client authentication and\r\nauthorization. The protocol relies on DTLS version 1.2 or later for\r\ncommunication security between entities in a constrained network\r\nusing either raw public keys or pre-shared keys. A\r\nresource-constrained server can use this protocol to delegate\r\nmanagement of authorization information to a trusted host with\r\nless-severe limitations regarding processing power and memory.","pub_date":"August 2022","keywords":["Internet of Thinks (IoT)","Internet of Things","IOT","OAuth","Access Token"],"obsoletes":[],"obsoleted_by":[],"updates":[],"updated_by":["RFC9430"],"see_also":[],"doi":"10.17487\/RFC9202","errata_url":null}