{"draft":"draft-ietf-ace-oauth-authz-46","doc_id":"RFC9200","title":"Authentication and Authorization for Constrained Environments Using the OAuth 2.0 Framework (ACE-OAuth)","authors":["L. Seitz","G. Selander","E. Wahlstroem","S. Erdtman","H. Tschofenig"],"format":["HTML","TEXT","PDF","XML"],"page_count":"72","pub_status":"PROPOSED STANDARD","status":"PROPOSED STANDARD","source":"Authentication and Authorization for Constrained Environments","abstract":"This specification defines a framework for authentication and\r\nauthorization in Internet of Things (IoT) environments called\r\nACE-OAuth. The framework is based on a set of building blocks\r\nincluding OAuth 2.0 and the Constrained Application Protocol (CoAP),\r\nthus transforming a well-known and widely used authorization solution\r\ninto a form suitable for IoT devices. Existing specifications are\r\nused where possible, but extensions are added and profiles are\r\ndefined to better serve the IoT use cases.","pub_date":"August 2022","keywords":["CoAP","OAuth 2.0","Access Control","Authorization","Internet of Things"],"obsoletes":[],"obsoleted_by":[],"updates":[],"updated_by":[],"see_also":[],"doi":"10.17487\/RFC9200","errata_url":null}