References from draft-ietf-ace-oauth-authz

This is an experimental product. These dependencies are extracted using heuristics looking for strings with particular prefixes. Notably, this means that references to I-Ds by title only are not reflected here. If it's really important, please inspect the documents' references sections directly.

Reference type help

Document Title Status Type Downref
BCP 14 Key words for use in RFCs to Indicate Requirement Levels
Refs Ref'd by
Best Current Practice normatively references
draft-erdtman-ace-rpcc Raw-Public-Key and Pre-Shared-Key as OAuth client credentials
Refs Ref'd by
informatively references
draft-gerdes-ace-dcaf-authorize Delegated CoAP Authentication and Authorization Framework (DCAF)
Refs Ref'd by
Possible Reference Possible Downref
draft-ietf-ace-actors An architecture for authorization in constrained environments
Refs Ref'd by
informatively references
draft-ietf-ace-cbor-web-token CBOR Web Token (CWT)
Refs Ref'd by
normatively references Possible Downref
draft-ietf-ace-cwt-proof-of-possession Proof-of-Possession Key Semantics for CBOR Web Tokens (CWTs)
Refs Ref'd by
normatively references Possible Downref
draft-ietf-core-object-security Object Security for Constrained RESTful Environments (OSCORE)
Refs Ref'd by
informatively references
draft-ietf-core-resource-directory CoRE Resource Directory
Refs Ref'd by
Proposed Standard informatively references
draft-ietf-oauth-device-flow OAuth 2.0 Device Flow for Browserless and Input Constrained Devices
Refs Ref'd by
Proposed Standard informatively references
draft-ietf-oauth-discovery OAuth 2.0 Authorization Server Metadata
Refs Ref'd by
Proposed Standard informatively references
draft-ietf-oauth-native-apps OAuth 2.0 for Native Apps
Refs Ref'd by
Best Current Practice informatively references
draft-ietf-oauth-pop-key-distribution OAuth 2.0 Proof-of-Possession: Authorization Server to Client Key Distribution
Refs Ref'd by
Proposed Standard informatively references
FYI 36 Internet Security Glossary, Version 2
Refs Ref'd by
Informational informatively references
RFC 2119 Key words for use in RFCs to Indicate Requirement Levels
Refs Ref'd by
Best Current Practice informatively references
RFC 3986 Uniform Resource Identifier (URI): Generic Syntax
Refs Ref'd by
Internet Standard normatively references
RFC 4949 Internet Security Glossary, Version 2
Refs Ref'd by
Informational informatively references
RFC 5246 The Transport Layer Security (TLS) Protocol Version 1.2
Refs Ref'd by
Proposed Standard informatively references
RFC 6347 Datagram Transport Layer Security Version 1.2
Refs Ref'd by
Proposed Standard normatively references
RFC 6690 Constrained RESTful Environments (CoRE) Link Format
Refs Ref'd by
Proposed Standard informatively references
RFC 6749 The OAuth 2.0 Authorization Framework
Refs Ref'd by
Proposed Standard informatively references
RFC 6819 OAuth 2.0 Threat Model and Security Considerations
Refs Ref'd by
Informational informatively references
RFC 7049 Concise Binary Object Representation (CBOR)
Refs Ref'd by
Proposed Standard informatively references
RFC 7159 The JavaScript Object Notation (JSON) Data Interchange Format
Refs Ref'd by
Proposed Standard informatively references
RFC 7228 Terminology for Constrained-Node Networks
Refs Ref'd by
Informational informatively references
RFC 7231 Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content
Refs Ref'd by
Proposed Standard informatively references
RFC 7252 The Constrained Application Protocol (CoAP)
Refs Ref'd by
Proposed Standard informatively references
RFC 7519 JSON Web Token (JWT)
Refs Ref'd by
Proposed Standard informatively references
RFC 7521 Assertion Framework for OAuth 2.0 Client Authentication and Authorization Grants
Refs Ref'd by
Proposed Standard informatively references
RFC 7591 OAuth 2.0 Dynamic Client Registration Protocol
Refs Ref'd by
Proposed Standard informatively references
RFC 7641 Observing Resources in the Constrained Application Protocol (CoAP)
Refs Ref'd by
Proposed Standard informatively references
RFC 7662 OAuth 2.0 Token Introspection
Refs Ref'd by
Proposed Standard normatively references
RFC 7744 Use Cases for Authentication and Authorization in Constrained Environments
Refs Ref'd by
Informational informatively references
RFC 7800 Proof-of-Possession Key Semantics for JSON Web Tokens (JWTs)
Refs Ref'd by
Proposed Standard informatively references
RFC 7959 Block-Wise Transfers in the Constrained Application Protocol (CoAP)
Refs Ref'd by
Proposed Standard informatively references
RFC 8152 CBOR Object Signing and Encryption (COSE)
Refs Ref'd by
Proposed Standard informatively references
STD 66 Uniform Resource Identifier (URI): Generic Syntax
Refs Ref'd by
Internet Standard normatively references