References from draft-seitz-ace-oauth-authz
These dependencies are extracted using heuristics looking for strings with particular prefixes. Notably, this means that references to I-Ds by title only are not reflected here. If it's really important, please inspect the documents' references sections directly.
Document | Title | Status | Type | Downref |
---|---|---|---|---|
BCP 14 |
References Referenced by |
normatively references | ||
draft-bormann-core-ace-aif |
An Authorization Information Format (AIF) for ACE
References Referenced by |
normatively references | ||
draft-ietf-ace-actors |
An architecture for authorization in constrained environments
References Referenced by |
informatively references | ||
draft-ietf-core-block |
Block-Wise Transfers in the Constrained Application Protocol (CoAP)
References Referenced by |
Proposed Standard | informatively references | |
draft-ietf-cose-msg |
CBOR Object Signing and Encryption (COSE)
References Referenced by |
Proposed Standard | normatively references | |
draft-ietf-oauth-introspection |
OAuth 2.0 Token Introspection
References Referenced by |
Proposed Standard | normatively references | |
draft-ietf-oauth-pop-architecture |
OAuth 2.0 Proof-of-Possession (PoP) Security Architecture
References Referenced by |
Informational | normatively references | |
draft-ietf-oauth-pop-key-distribution |
OAuth 2.0 Proof-of-Possession: Authorization Server to Client Key Distribution
References Referenced by |
Proposed Standard | normatively references | |
draft-selander-ace-object-security |
Object Security of CoAP (OSCOAP)
References Referenced by |
normatively references | ||
draft-somaraju-ace-multicast |
Security for Low-Latency Group Communication
References Referenced by |
informatively references | ||
draft-wahlstroem-ace-oauth-introspection |
OAuth 2.0 Introspection over the Constrained Application Protocol (CoAP)
References Referenced by |
normatively references | ||
RFC 2119 |
Key words for use in RFCs to Indicate Requirement Levels
References Referenced by |
Best Current Practice | normatively references | |
RFC 4680 |
TLS Handshake Message for Supplemental Data
References Referenced by |
Proposed Standard | informatively references | |
RFC 4949 |
Internet Security Glossary, Version 2
References Referenced by |
Informational | informatively references | |
RFC 5246 |
The Transport Layer Security (TLS) Protocol Version 1.2
References Referenced by |
Proposed Standard | informatively references | |
RFC 6347 |
Datagram Transport Layer Security Version 1.2
References Referenced by |
Proposed Standard | normatively references | |
RFC 6690 |
Constrained RESTful Environments (CoRE) Link Format
References Referenced by |
Proposed Standard | informatively references | |
RFC 6749 |
The OAuth 2.0 Authorization Framework
References Referenced by |
Proposed Standard | informatively references | |
RFC 6819 |
OAuth 2.0 Threat Model and Security Considerations
References Referenced by |
Informational | informatively references | |
RFC 7049 |
Concise Binary Object Representation (CBOR)
References Referenced by |
Proposed Standard | informatively references | |
RFC 7159 |
The JavaScript Object Notation (JSON) Data Interchange Format
References Referenced by |
Proposed Standard | informatively references | |
RFC 7228 |
Terminology for Constrained-Node Networks
References Referenced by |
Informational | informatively references | |
RFC 7231 |
Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content
References Referenced by |
Proposed Standard | informatively references | |
RFC 7252 |
The Constrained Application Protocol (CoAP)
References Referenced by |
Proposed Standard | informatively references | |
RFC 7519 |
JSON Web Token (JWT)
References Referenced by |
Proposed Standard | informatively references |