References from draft-maler-ace-oauth-uma
These dependencies are extracted using heuristics looking for strings with particular prefixes. Notably, this means that references to I-Ds by title only are not reflected here. If it's really important, please inspect the documents' references sections directly.
Document | Title | Status | Type | Downref |
---|---|---|---|---|
BCP 14 |
References Referenced by |
normatively references | ||
draft-hardjono-oauth-umacore |
User-Managed Access (UMA) Profile of OAuth 2.0
References Referenced by |
normatively references | ||
draft-iab-smart-object-architecture |
Architectural Considerations in Smart Object Networking
References Referenced by |
Informational | informatively references | |
draft-ietf-ace-usecases |
Use Cases for Authentication and Authorization in Constrained Environments
References Referenced by |
Informational | informatively references | |
draft-ietf-jose-json-web-signature |
JSON Web Signature (JWS)
References Referenced by |
Proposed Standard | normatively references | |
draft-ietf-oauth-dyn-reg |
OAuth 2.0 Dynamic Client Registration Protocol
References Referenced by |
Proposed Standard | normatively references | |
draft-ietf-oauth-introspection |
OAuth 2.0 Token Introspection
References Referenced by |
Proposed Standard | normatively references | |
draft-ietf-oauth-json-web-token |
JSON Web Token (JWT)
References Referenced by |
Proposed Standard | normatively references | |
draft-ietf-oauth-pop-architecture |
OAuth 2.0 Proof-of-Possession (PoP) Security Architecture
References Referenced by |
Informational | normatively references | |
draft-tschofenig-ace-oauth-bt |
The OAuth 2.0 Bearer Token Usage over the Constrained Application Protocol (CoAP)
References Referenced by |
normatively references | ||
draft-tschofenig-ace-oauth-iot |
The OAuth 2.0 Internet of Things (IoT) Client Credentials Grant
References Referenced by |
normatively references | ||
draft-wahlstroem-ace-oauth-introspection |
OAuth 2.0 Introspection over the Constrained Application Protocol (CoAP)
References Referenced by |
normatively references | ||
RFC 2119 |
Key words for use in RFCs to Indicate Requirement Levels
References Referenced by |
Best Current Practice | normatively references | |
RFC 6749 |
The OAuth 2.0 Authorization Framework
References Referenced by |
Proposed Standard | normatively references | |
RFC 6750 |
The OAuth 2.0 Authorization Framework: Bearer Token Usage
References Referenced by |
Proposed Standard | normatively references | |
RFC 6819 |
OAuth 2.0 Threat Model and Security Considerations
References Referenced by |
Informational | normatively references | |
RFC 7228 |
Terminology for Constrained-Node Networks
References Referenced by |
Informational | informatively references | |
RFC 7252 |
The Constrained Application Protocol (CoAP)
References Referenced by |
Proposed Standard | normatively references |