Hello ACE,

We have recently submitted a new draft "Notification of Revoked Access
Tokens in the Authentication and Authorization for Constrained
Environments (ACE) Framework".

https://tools.ietf.org/html/draft-tiloca-ace-revoked-token-notification

The document describes how an Authorization Server can notify Clients
and Resource Servers of revoked but yet not expired Access Tokens. This
is achieved by means of device-specific Token Revocation List (TRL)
resources at the AS, that the associated device can access and observe
by using resource observation for CoAP.

This approach complements token introspection at the AS, and does not
require additional endpoints on Clients and Resource Servers.

Comments are very welcome.

Best,
/Marco


-------- Forwarded Message --------
Subject:        New Version Notification for
draft-tiloca-ace-revoked-token-notification-00.txt
Date:   Mon, 4 Nov 2019 11:25:56 -0800
From:   [email protected]
To:     Ludwig Seitz <[email protected]>, Grace Lewis
<[email protected]>, Sebastian Echeverria <[email protected]>,
Marco Tiloca <[email protected]>, Francesca Palombini
<[email protected]>




A new version of I-D, draft-tiloca-ace-revoked-token-notification-00.txt
has been successfully submitted by Marco Tiloca and posted to the
IETF repository.

Name: draft-tiloca-ace-revoked-token-notification
Revision: 00
Title: Notification of Revoked Access Tokens in the Authentication and
Authorization for Constrained Environments (ACE) Framework
Document date: 2019-11-04
Group: Individual Submission
Pages: 10
URL:
https://www.ietf.org/internet-drafts/draft-tiloca-ace-revoked-token-notification-00.txt
Status:
https://datatracker.ietf.org/doc/draft-tiloca-ace-revoked-token-notification/
Htmlized:
https://tools.ietf.org/html/draft-tiloca-ace-revoked-token-notification-00
Htmlized:
https://datatracker.ietf.org/doc/html/draft-tiloca-ace-revoked-token-notification


Abstract:
This document specifies a method of the Authentication and
Authorization for Constrained Environments (ACE) framework, which
allows an Authorization Server to notify Clients and Resource Servers
(i.e., registered devices) about revoked Access Tokens. The method
relies on resource observation for the Constrained Application
Protocol (CoAP), with Clients and Resource Servers observing a
dedicated, device-specific Token Revocation List on the Authorization
Server. Resulting unsolicited notifications of revoked Access Tokens
complement alternative approaches such as token introspection, while
not requiring additional endpoints on Clients and Resource Servers.



Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

The IETF Secretariat

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
Ace mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ace

Reply via email to