References to RFC 8747
These dependencies are extracted using heuristics looking for strings with particular prefixes. Notably, this means that references to I-Ds by title only are not reflected here. If it's really important, please inspect the documents' references sections directly.
Showing RFCs and active Internet-Drafts, sorted by reference type, then document name.
| Document | Title | Status | Type | Downref |
|---|---|---|---|---|
| draft-bft-rats-kat | An EAT-based Key Attestation Token References Referenced by | normatively references | ||
| draft-ietf-ace-authcred-dtls-profile | Additional Formats of Authentication Credentials for the Datagram Transport Layer Security (DTLS) Profile for Authentication and Authorization for Constrained Environments (ACE) References Referenced by | normatively references | ||
| draft-ietf-ace-edhoc-oscore-profile | Ephemeral Diffie-Hellman Over COSE (EDHOC) and Object Security for Constrained Environments (OSCORE) Profile for Authentication and Authorization for Constrained Environments (ACE) References Referenced by | normatively references | ||
| draft-ietf-ace-group-oscore-profile | The Group Object Security for Constrained RESTful Environments (Group OSCORE) Profile of the Authentication and Authorization for Constrained Environments (ACE) Framework References Referenced by | normatively references | ||
| draft-ietf-ace-workflow-and-params | Short Distribution Chain (SDC) Workflow and New OAuth Parameters for the Authentication and Authorization for Constrained Environments (ACE) Framework References Referenced by | normatively references | ||
| draft-ietf-spice-sd-cwt | Selective Disclosure CBOR Web Tokens (SD-CWT) References Referenced by | normatively references | ||
| draft-ietf-teep-protocol | Trusted Execution Environment Provisioning (TEEP) Protocol References Referenced by | Proposed Standard | normatively references | |
| draft-romann-iotops-mud-constrained | Using MUD in Constrained Environments References Referenced by | normatively references | ||
| draft-tschofenig-cose-cwt-chain | CBOR Object Signing and Encryption (COSE): Header Parameters for Carrying and Referencing Chains of CBOR Web Tokens (CWTs) References Referenced by | normatively references | ||
| RFC 9124 | A Manifest Information Model for Firmware Updates in Internet of Things (IoT) Devices References Referenced by | Informational | normatively references | |
| RFC 9200 | Authentication and Authorization for Constrained Environments Using the OAuth 2.0 Framework (ACE-OAuth) References Referenced by | Proposed Standard | normatively references | |
| RFC 9201 | Additional OAuth Parameters for Authentication and Authorization for Constrained Environments (ACE) References Referenced by | Proposed Standard | normatively references | |
| RFC 9202 | Datagram Transport Layer Security (DTLS) Profile for Authentication and Authorization for Constrained Environments (ACE) References Referenced by | Proposed Standard | normatively references | |
| RFC 9431 | Message Queuing Telemetry Transport (MQTT) and Transport Layer Security (TLS) Profile of Authentication and Authorization for Constrained Environments (ACE) Framework References Referenced by | Proposed Standard | normatively references | |
| draft-bormann-cbor-edn-mapkey | CBOR: Generating Numeric Map Labels from Textual EDN References Referenced by | informatively references | ||
| draft-irtf-t2trg-rest-iot | Guidance on RESTful Design for Internet of Things Systems References Referenced by | Informational | informatively references | |
| RFC 9203 | The Object Security for Constrained RESTful Environments (OSCORE) Profile of the Authentication and Authorization for Constrained Environments (ACE) Framework References Referenced by | Proposed Standard | informatively references |