Apologies, I missed the *AD note.....(both from Kaelin and Eliot).

I've checked the diff and subsequent message from Eliot pretty carefully
(especially the SHOULD/MUST change) and it all appears to be fine.  I
approve the changes.

I only have one comment wrt Author Addresses:  These are super specific.
In the case of the NC State authors, it appears that the address is a
department address, clearly already public.  For Eliot, that is your
personal address, no?  And the phone number?  I haven't seen too many phone
numbers on drafts/RFCs.  This is your call, but I think it would be
reasonable (and mostly the norm) to remove the actual street address and
phone number.

Deb



On Tue, Mar 24, 2026 at 5:52 AM Eliot Lear <[email protected]> wrote:

>
>
> > On 20 Mar 2026, at 15:32, Kaelin Foody <[email protected]>
> wrote:
> >
> > Hi *Deb, Eliot, all,
> >
> > *Deb - As AD, please review the following changes to this document.
> >
> > You may view them in the diff here:
> https://www.rfc-editor.org/authors/rfc9944-lastdiff.html.
> >
> > There is additional context in this email thread regarding these
> changes, but we have summarized them below:
> >
> > Section 1.3: Added sentence re: line wrapping per RFC 8792.
> > Section 6.3.1: Updated paragraph that appears after Table 2.
> > Section 7.6: Removed sentence in first paragraph (per inclusive language
> guidance).
> > Section 7.6.1:  Updated definition of telemetryEnterpriseEndpoint.
> > Section 7.6.2: Updated one line of sourcecode.
> >
> >
> > Eliot, authors - Thank you for your review and replies. You may find the
> updated files at the end of this email.
> >
> > A few follow-up questions:
> >
> >
> > i) For question 15 below, we have updated part a as requested. We want
> to confirm how to proceed with the following:
> >
> > For part b -- should pointers to BLE 5.3 be updated to 5.4 throughout?
>
> Go with 5.4.
> >
> > For part c -- is the “Current” text the correct reference?
>
> I need the text but probably the answer is “no” in relation to BLE.
> However, we have only tested against 5.4, and I will not make any claims
> about 5.5, which introduces new encrypted advertisement capabilities.
>
> >
> >> 15) <!-- [rfced] [BLE54]: Please review the following questions
> regarding this reference:
> >>
> >> a) We were unable to find "isRandom" mentioned in [BLE54] as seen
> >> below. Should this citation be updated?
> >>
> >> Original:
> >>
> >> isRandom:  A boolean flag taken from [BLE54].
> >>
> >>> You’re indeed correct. That flag itself is NOT taken from [BLE54].
> The description should be as follows:
> >>>
> >>> isRandom:A boolean flag. If FALSE, the device is using a public MAC
> address. If TRUE, the device uses a random address. If an Identifying
> Resolving Key (IRK) is present, the address represents a resolvable private
> address. Otherwise, the address is assumed to be a random static address.
> Non-resolvable private addresses are not supported by this specification.
> This attribute is not required. It is mutable and is returned by default.
> The default value is FALSE.  See Vol 6 Part B, Section 1.3 of [BLE54] for
> more information about different address types.
> >>>
> >>> We have one other issue to look at: we want to make sure we are
> pointing to the amended 5.4 spec.  The earlier one was withdrawn.  The
> Section # above is from the amended spec.
> >>
> >> b) We also note a few instances of "BLE core specifications 5.3"
> mentioned
> >> throughout this document. However, the Normative References section
> cites
> >> Version 5.4. Please review and let us know if/how to update accordingly.
> >>
> >> For example:
> >>
> >>        "description": "The isRandom flag is taken from the BLE
> >>            core specifications 5.3. If TRUE, device is using a
> >>            random address.  Default value is false.",
> >>
> >> c) Please review our updates to the text below. There are multiple
> volumes in
> >> [BLE54]; it appears Section 5.4.5 is referring to Volume 1, Part A,
> Section
> >> 5.4.5 of [BLE54]. Is this the correct section?
> >>
> >> Original:
> >>
> >> For more information about the use of the IRK, see Section 5.4.5 of
> >> [BLE54].
> >>
> >> Current:
> >>
> >> For more information about the use of the IRK, see Volume 1, Part A,
> >> Section 5.4.5 of [BLE54].
> >> -->
> >>
> >>> Yes.
> >
> >
> >
> > ii) To clarify, would you like these references below to remain as is
> (as two separate references)?
>
> Actually, I think they’re one big PDF, so a reference to the same doc is
> fine.
>
> >
> >> 16) <!-- [rfced] References:
> >>
> >> a) We note that [draft-brinckman-nipc] was replaced by
> [draft-ietf-asdf-nipc].
> >> Should these remain as two separate references? Or, would you like to
> remove
> >> the citation to [draft-brinckman-nipc] and only keep the
> >> reference to [draft-ietf-asdf-nipc]?
> >>> Yes.
> >
> >
> > iii) We have made the update below as requested. Please provide a
> reference for [OAUTHv2].
>
> RFC 6749.
>
>
> >
> >> OLD:
> >>
> >>> Note that either clientToken or certificateInfo is used for the
> authentication of the application. If certificateInfo is NOT present when
> an endpointApp object is created, then the server SHOULD return a
> clientToken. Otherwise, if the server accepts the certificateInfo object
> for authentication, it SHOULD NOT return a clientToken. If the server
> accepts and produces a clientToken, then control and telemetry servers MUST
> validate both. The SCIM client will know that this is the case based on the
> SCIM object that is returned.
> >>
> >>
> >> Now there’s a nice big SHOULD in the middle of that, but it leads to a
> question as to when that SHOULD doesn’t apply.  The obvious answer is with
> OAUTH.  So we think the following text would address that point:
> >>
> >> NEW:
> >>
> >>> If certificateInfo is provided by the client and is accepted by the
> server, the server MUST return that multivalued attribute in its response.
> Otherwise, the server is expected to return a clientToken.  If the server
> returns neither certificateInfo nor a clientToken, then external
> authentication such as [OAUTHv2] MUST be pre-arranged.  If the server
> accepts a certificate and produces a clientToken, then control and
> telemetry servers MUST validate both.
> >
> >
> > iv) We have added Sriram to the Acknowledgments. Please let us know if
> there is any additional text to include.
> >
> >> Finally, these matters were brought to our attention by Sriram Sekar
> who I would ask to be added to the acknowledgments.
> >
> >
> > v) Note that we have updated the expansion of NIPC to
> Non-Internet-Connected Physical Components (NIPC) per Rohit Mohan’s email.
>
>
> Ok
>
> >
> >> c) FYI - We have added expansions for the following abbreviations.
> Please review
> >> each expansion in the document carefully to ensure correctness.
> >>
> >> Certificate Authority (CA)
> >> Near Field Communication (NFC)
> >> Non-IP Device Control (NIPC)
> >> Universally Unique Identifier (UUID)
> >> -->
> >
> >
> > vi) Also note that we have added this Perhaps text to the document for
> now. We will discuss with the team whether RESTful should be marked as
> well-known (and not require expansion).
>
> Ok
>
> Thanks!
>
> Eliot
>
> >
> >> b) May we expand "RESTful" by providing a definition as follows?
> >>
> >> Original:
> >>
> >> confirmationNumber:  An integer which some solutions require in
> >>    RESTful message exchange.
> >>
> >> Perhaps:
> >>
> >>  confirmationNumber:  An integer that some solutions require in
> >>    a RESTful message exchange (where RESTful refers to the
> Representational
> >>    State Transfer (REST) architecture).
> >>
> >>> While I leave this to the RPC, might I suggest that RESTful now be
> consider one of those industry terms of art that doesn’t require expansion?
> >
> >
> >
> > — FILES (please refresh): —
> >
> > The updated files have been posted here:
> > https://www.rfc-editor.org/authors/rfc9944.txt
> > https://www.rfc-editor.org/authors/rfc9944.pdf
> > https://www.rfc-editor.org/authors/rfc9944.html
> > https://www.rfc-editor.org/authors/rfc9944.xml
> >
> > Diff files showing changes between the last and current version:
> > https://www.rfc-editor.org/authors/rfc9944-lastdiff.html
> > https://www.rfc-editor.org/authors/rfc9944-lastrfcdiff.html (side by
> side)
> >
> > Diff files showing changes made during AUTH48:
> > https://www.rfc-editor.org/authors/rfc9944-auth48diff.html
> > https://www.rfc-editor.org/authors/rfc9944-auth48rfcdiff.html (side by
> side)
> >
> > Diff files showing all changes:
> > https://www.rfc-editor.org/authors/rfc9944-diff.html
> > https://www.rfc-editor.org/authors/rfc9944-rfcdiff.html (side by side)
> >
> > The AUTH48 status page for this document is available here:
> > https://www.rfc-editor.org/auth48/rfc9944
> >
> >
> > Thank you,
> >
> > Kaelin Foody
> > RFC Production Center
> >
> >
> > On Mar 18, 2026, at 12:47 PM, Eliot Lear <lear=
> [email protected]> wrote:
> >>
> >> Hi RFC Editor and chairs and AD:
> >>
> >> In operational practice we have noticed two issues we would like to
> address in the RFC before it is closed.  The first has to do with the use
> of OAUTH as a means to authenticate SCIM connections.  Today we say in
> Section 6.3.1:
> >>
> >> OLD:
> >>
> >>> Note that either clientToken or certificateInfo is used for the
> authentication of the application. If certificateInfo is NOT present when
> an endpointApp object is created, then the server SHOULD return a
> clientToken. Otherwise, if the server accepts the certificateInfo object
> for authentication, it SHOULD NOT return a clientToken. If the server
> accepts and produces a clientToken, then control and telemetry servers MUST
> validate both. The SCIM client will know that this is the case based on the
> SCIM object that is returned.
> >>
> >>
> >> Now there’s a nice big SHOULD in the middle of that, but it leads to a
> question as to when that SHOULD doesn’t apply.  The obvious answer is with
> OAUTH.  So we think the following text would address that point:
> >>
> >> NEW:
> >>
> >>> If certificateInfo is provided by the client and is accepted by the
> server, the server MUST return that multivalued attribute in its response.
> Otherwise, the server is expected to return a clientToken.  If the server
> returns neither certificateInfo nor a clientToken, then external
> authentication such as [OAUTHv2] MUST be pre-arranged.  If the server
> accepts a certificate and produces a clientToken, then control and
> telemetry servers MUST validate both.
> >>
> >>
> >> This is a bit more crisp and prescriptive.
> >>
> >> Then in Section 7.6.1, we’ve noted one other issue:
> >>
> >>> telemetryEnterpriseEndpoint:A string representing a URL of the
> enterprise endpoint to reach an enterprise gateway for telemetry. When the
> enterprise receives the SCIM object from the onboarding application, it
> adds this attribute to it and sends it back as a response to the onboarding
> application. This attribute is optional, case sensitive, mutable, and
> returned by default. The uniqueness is enforced by the enterprise. An
> implementation MUST generate an exception if telemetryEnterpriseEndpoint is
> not returned and telemetry is required for the proper functioning of a
> device.
> >>
> >>
> >> It is possible that this service may be externalized.  That is, it’s
> there, but the SCIM implementation for $REASONs doesn’t know about it.  To
> address this point, we propose to replace the last sentence (“An
> implementation … a device.”) as follows:
> >>
> >> NEW:
> >>
> >>> This attribute is populated when the enterprise provides a telemetry
> endpoint (e.g., hosted by the enterprise gateway).  If a telemetry service
> is not known by the SCIM server, the attribute will not be returned.  In
> such cases, if the application requires telemetry, separate arrangements
> must be made.
> >>
> >>
> >> Two other points:
> >>
> >> To answer Kaelin’s earlier question, we propose to add a note in
> Section 1.3 as follows:
> >>
> >>> When JSON is presented in this memo, it is folded in accordance with
> RFC 8792.
> >>
> >>
> >> Also, we caught one error in an example in Section 7.6.2.
> >>
> >> OLD:
> >>
> >>> "telemetryEnterpriseEndpoint": "https://example.com/\
> >>
> >> NEW:
> >>
> >>> "telemetryEnterpriseEndpoint": "mqtts://example.com/\
> <http://example.com/%5C>
> >>
> >>
> >>
> >> Noting the change of URI scheme.
> >>
> >> Finally, these matters were brought to our attention by Sriram Sekar
> who I would ask to be added to the acknowledgments.
> >>
> >> Eliot
> >>
> >>> On 11 Mar 2026, at 19:39, [email protected] wrote:
> >>>
> >>> *****IMPORTANT*****
> >>>
> >>> Updated 2026/03/11
> >>>
> >>> RFC Author(s):
> >>> --------------
> >>>
> >>> Instructions for Completing AUTH48
> >>>
> >>> Your document has now entered AUTH48.  Once it has been reviewed and
> >>> approved by you and all coauthors, it will be published as an RFC.
> >>> If an author is no longer available, there are several remedies
> >>> available as listed in the FAQ (https://www.rfc-editor.org/faq/).
> >>>
> >>> You and you coauthors are responsible for engaging other parties
> >>> (e.g., Contributors or Working Group) as necessary before providing
> >>> your approval.
> >>>
> >>> Planning your review
> >>> ---------------------
> >>>
> >>> Please review the following aspects of your document:
> >>>
> >>> *  RFC Editor questions
> >>>
> >>> Please review and resolve any questions raised by the RFC Editor
> >>> that have been included in the XML file as comments marked as
> >>> follows:
> >>>
> >>> <!-- [rfced] ... -->
> >>>
> >>> These questions will also be sent in a subsequent email.
> >>>
> >>> *  Changes submitted by coauthors
> >>>
> >>> Please ensure that you review any changes submitted by your
> >>> coauthors.  We assume that if you do not speak up that you
> >>> agree to changes submitted by your coauthors.
> >>>
> >>> *  Content
> >>>
> >>> Please review the full content of the document, as this cannot
> >>> change once the RFC is published.  Please pay particular attention to:
> >>> - IANA considerations updates (if applicable)
> >>> - contact information
> >>> - references
> >>>
> >>> *  Copyright notices and legends
> >>>
> >>> Please review the copyright notice and legends as defined in
> >>> RFC 5378 and the Trust Legal Provisions
> >>> (TLP – https://trustee.ietf.org/license-info).
> >>>
> >>> *  Semantic markup
> >>>
> >>> Please review the markup in the XML file to ensure that elements of
> >>> content are correctly tagged.  For example, ensure that <sourcecode>
> >>> and <artwork> are set correctly.  See details at
> >>> <https://authors.ietf.org/rfcxml-vocabulary>.
> >>>
> >>> *  Formatted output
> >>>
> >>> Please review the PDF, HTML, and TXT files to ensure that the
> >>> formatted output, as generated from the markup in the XML file, is
> >>> reasonable.  Please note that the TXT will have formatting
> >>> limitations compared to the PDF and HTML.
> >>>
> >>>
> >>> Submitting changes
> >>> ------------------
> >>>
> >>> To submit changes, please reply to this email using ‘REPLY ALL’ as all
> >>> the parties CCed on this message need to see your changes. The parties
> >>> include:
> >>>
> >>> *  your coauthors
> >>>
> >>> *  [email protected] (the RPC team)
> >>>
> >>> *  other document participants, depending on the stream (e.g.,
> >>>    IETF Stream participants are your working group chairs, the
> >>>    responsible ADs, and the document shepherd).
> >>>
> >>> *  [email protected], which is a new archival mailing list
> >>>    to preserve AUTH48 conversations; it is not an active discussion
> >>>    list:
> >>>
> >>>   *  More info:
> >>>
> https://mailarchive.ietf.org/arch/msg/ietf-announce/yb6lpIGh-4Q9l2USxIAe6P8O4Zc
> >>>
> >>>   *  The archive itself:
> >>>      https://mailarchive.ietf.org/arch/browse/auth48archive/
> >>>
> >>>   *  Note: If only absolutely necessary, you may temporarily opt out
> >>>      of the archiving of messages (e.g., to discuss a sensitive
> matter).
> >>>      If needed, please add a note at the top of the message that you
> >>>      have dropped the address. When the discussion is concluded,
> >>>      [email protected] will be re-added to the CC list and
> >>>      its addition will be noted at the top of the message.
> >>>
> >>> You may submit your changes in one of two ways:
> >>>
> >>> An update to the provided XML file
> >>> — OR —
> >>> An explicit list of changes in this format
> >>>
> >>> Section # (or indicate Global)
> >>>
> >>> OLD:
> >>> old text
> >>>
> >>> NEW:
> >>> new text
> >>>
> >>> You do not need to reply with both an updated XML file and an explicit
> >>> list of changes, as either form is sufficient.
> >>>
> >>> We will ask a stream manager to review and approve any changes that
> seem
> >>> beyond editorial in nature, e.g., addition of new text, deletion of
> text,
> >>> and technical changes.  Information about stream managers can be found
> in
> >>> the FAQ.  Editorial changes do not require approval from a stream
> manager.
> >>>
> >>>
> >>> Approving for publication
> >>> --------------------------
> >>>
> >>> To approve your RFC for publication, please reply to this email stating
> >>> that you approve this RFC for publication.  Please use ‘REPLY ALL’,
> >>> as all the parties CCed on this message need to see your approval.
> >>>
> >>>
> >>> Files
> >>> -----
> >>>
> >>> The files are available here:
> >>> https://www.rfc-editor.org/authors/rfc9944.xml
> >>> https://www.rfc-editor.org/authors/rfc9944.html
> >>> https://www.rfc-editor.org/authors/rfc9944.pdf
> >>> https://www.rfc-editor.org/authors/rfc9944.txt
> >>>
> >>> Diff file of the text:
> >>> https://www.rfc-editor.org/authors/rfc9944-diff.html
> >>> https://www.rfc-editor.org/authors/rfc9944-rfcdiff.html (side by side)
> >>>
> >>> Diff of the XML:
> >>> https://www.rfc-editor.org/authors/rfc9944-xmldiff1.html
> >>>
> >>>
> >>> Tracking progress
> >>> -----------------
> >>>
> >>> The details of the AUTH48 status of your document are here:
> >>> https://www.rfc-editor.org/auth48/rfc9944
> >>>
> >>> Please let us know if you have any questions.
> >>>
> >>> Thank you for your cooperation,
> >>>
> >>> RFC Editor
> >>>
> >>> --------------------------------------
> >>> RFC9944 (draft-ietf-scim-device-model-18)
> >>>
> >>> Title            : Device Schema Extensions to the SCIM model
> >>> Author(s)        : M. Shahzad, H. Iqbal, E. Lear
> >>> WG Chair(s)      : Nancy Cam-Winget
> >>> Area Director(s) : Deb Cooley, Paul Wouters
> >>>
> >>>
> >>
> >
>
>
-- 
auth48archive mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to