Skip to main content

Datagram Transport Layer Security (DTLS) Profile for Authentication and Authorization for Constrained Environments (ACE)

The information below is for an old version of the document.
Document Type This is an older version of an Internet-Draft that was ultimately published as an RFC.
Authors Stefanie Gerdes , Olaf Bergmann , Carsten Bormann , Göran Selander , Ludwig Seitz
Last updated 2018-09-06 (Latest revision 2018-03-05)
Replaces draft-gerdes-ace-dtls-authorize
Stream Internet Engineering Task Force (IETF)
Expired & archived
Stream WG state WG Document
Associated WG milestone
Feb 2021
Submit DTLS Profile for ACE to the IESG for publication as a proposed standard
Document shepherd (None)
IESG IESG state Expired
Consensus boilerplate Unknown
Telechat date (None)
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:


This specification defines a profile for delegating client authentication and authorization in a constrained environment by establishing a Datagram Transport Layer Security (DTLS) channel between resource-constrained nodes. The protocol relies on DTLS for communication security between entities in a constrained network using either raw public keys or pre-shared keys. A resource- constrained node can use this protocol to delegate management of authorization information to a trusted host with less severe limitations regarding processing power and memory.


Stefanie Gerdes
Olaf Bergmann
Carsten Bormann
Göran Selander
Ludwig Seitz

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)