@techreport{ietf-ace-dtls-authorize-18, number = {draft-ietf-ace-dtls-authorize-18}, type = {Internet-Draft}, institution = {Internet Engineering Task Force}, publisher = {Internet Engineering Task Force}, note = {Work in Progress}, url = {https://datatracker.ietf.org/doc/html/draft-ietf-ace-dtls-authorize-18}, author = {Stefanie Gerdes and Olaf Bergmann and Carsten Bormann and Göran Selander and Ludwig Seitz}, title = {{Datagram Transport Layer Security (DTLS) Profile for Authentication and Authorization for Constrained Environments (ACE)}}, pagetotal = 29, year = 2021, month = jun, day = 4, abstract = {This specification defines a profile of the ACE framework that allows constrained servers to delegate client authentication and authorization. The protocol relies on DTLS version 1.2 for communication security between entities in a constrained network using either raw public keys or pre-shared keys. A resource- constrained server can use this protocol to delegate management of authorization information to a trusted host with less severe limitations regarding processing power and memory.}, }