Skip to main content

Datagram Transport Layer Security (DTLS) Profile for Authentication and Authorization for Constrained Environments (ACE)
draft-ietf-ace-dtls-authorize-03

The information below is for an old version of the document.
Document Type This is an older version of an Internet-Draft that was ultimately published as an RFC.
Authors Stefanie Gerdes , Olaf Bergmann , Carsten Bormann , Göran Selander , Ludwig Seitz
Last updated 2018-09-06 (Latest revision 2018-03-05)
Replaces draft-gerdes-ace-dtls-authorize
Stream Internet Engineering Task Force (IETF)
Formats
Expired & archived
Reviews
Stream WG state WG Document
Associated WG milestone
Feb 2021
Submit DTLS Profile for ACE to the IESG for publication as a proposed standard
Document shepherd (None)
IESG IESG state Expired
Consensus boilerplate Unknown
Telechat date (None)
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:

Abstract

This specification defines a profile for delegating client authentication and authorization in a constrained environment by establishing a Datagram Transport Layer Security (DTLS) channel between resource-constrained nodes. The protocol relies on DTLS for communication security between entities in a constrained network using either raw public keys or pre-shared keys. A resource- constrained node can use this protocol to delegate management of authorization information to a trusted host with less severe limitations regarding processing power and memory.

Authors

Stefanie Gerdes
Olaf Bergmann
Carsten Bormann
Göran Selander
Ludwig Seitz

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)