ACE use cases

The information below is for an old version of the document
Document Type None Internet-Draft (ace WG)
Last updated 2015-01-13
Replaces draft-seitz-ace-usecases
Stream IETF
Intended RFC status Informational
Expired & archived
pdf htmlized bibtex
Additional URLs
- Mailing list discussion
Stream WG state (None)
Document shepherd Hannes Tschofenig
IESG IESG state Unknown state
Consensus Boilerplate Unknown
Telechat date
Responsible AD (None)
Send notices to "Hannes Tschofenig" <>

This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found at


Constrained devices are nodes with limited processing power, storage space and transmission capacities. These devices in many cases do not provide user interfaces and are often intended to interact without human intervention. This document comprises a collection of representative use cases for the application of authentication and authorization in constrained environments. These use cases aim at identifying authorization problems that arise during the lifecylce of a constrained device and are intended to provide a guideline for developing a comprehensive authentication and access control solution for this class of scenarios. Where specific details are relevant, it is assumed that the devices use the Constrained Application Protocol (CoAP) as communication protocol, however most conclusions apply generally.


Ludwig Seitz (
Stefanie Gerdes (
Göran Selander (
Mehdi Mani (
Sandeep Kumar (

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)