@techreport{maler-ace-oauth-uma-00, number = {draft-maler-ace-oauth-uma-00}, type = {Internet-Draft}, institution = {Internet Engineering Task Force}, publisher = {Internet Engineering Task Force}, note = {Work in Progress}, url = {https://datatracker.ietf.org/doc/draft-maler-ace-oauth-uma/00/}, author = {Hannes Tschofenig and Eve Maler and Erik Wahlstroem and Samuel Erdtman}, title = {{Authentication and Authorization for Constrained Environments Using OAuth and UMA}}, pagetotal = 22, year = 2015, month = mar, day = 9, abstract = {Authentication and authorization are fundamental security features used in Internet and Web applications. Providing the same level of security functionality to the Internet of Things (IoT) environment as well is a logical enhancement and reduces the risk of unauthorized access to personal data. IoT devices, however, have limitations in terms of processing power, memory, user interface, Internet connectivity, etc. Since many use cases span Web and IoT environments and the question of "Web" vs. "IoT" can in some cases be considered a continuum, it is required to find security solutions that can accommodate the capabilities and constraints of both environments without significant compromises. Thus, an approach of adapting already standardized and deployed authentication and authorization technologies is worth examining. This document describes how the Web Authorization Protocol (OAuth) in combination with User-Managed Access (UMA) can be used for an IoT environment to bring Web-scale authorization services to the IoT world.}, }