{"draft":"draft-ietf-ace-oauth-params-16","doc_id":"RFC9201","title":"Additional OAuth Parameters for Authentication and Authorization for Constrained Environments (ACE)","authors":["L. Seitz"],"format":["HTML","TEXT","PDF","XML"],"page_count":"11","pub_status":"PROPOSED STANDARD","status":"PROPOSED STANDARD","source":"Authentication and Authorization for Constrained Environments","abstract":"This specification defines new parameters and encodings for the OAuth\r\n2.0 token and introspection endpoints when used with the framework\r\nfor Authentication and Authorization for Constrained Environments\r\n(ACE). These are used to express the proof-of-possession (PoP) key\r\nthe client wishes to use, the PoP key that the authorization server\r\nhas selected, and the PoP key the resource server uses to\r\nauthenticate to the client.","pub_date":"August 2022","keywords":["CoAP","OAuth 2.0","Access Control","Authorization","Internet of Things"],"obsoletes":[],"obsoleted_by":[],"updates":[],"updated_by":[],"see_also":[],"doi":"10.17487\/RFC9201","errata_url":null}