►
From YouTube: IETF-ACE-20220912-1400
Description
ACE meeting session at IETF
2022/09/12 1400
https://datatracker.ietf.org/meeting//proceedings/
A
So
actually
I
am,
I
do
see
something
on
edge
dock
now,
where
christian
just
wrote
c
minutes
at,
and
I
guess
that's
it's
a
it's
a
different.
It's
it's
an
it's
another
edge
dog
document.
A
A
A
Okay,
so
maybe
yeah,
let's
start
now
so
again,
if
you
have
any
anything
to,
if
you
have
anything
to
say,
just
jump
into
the
discussion,
this
is
an
an
inter
meeting
of
ace.
It
is
subjected
of
the
note.
Well,
if
you're
not
aware
of
the
note
well,
we
should
have
had
a
fla
a
slide
on
that,
but
let
me
know
I
see
someone
in
a
queue.
B
Hello,
hello:
what
is
the.
A
A
So
that's
on
the
agenda,
but
now
I'm
unable
to
see
the
agenda
because.
A
So,
okay
right,
thank
you.
So
so
I
mean
what
we're
doing
is
a
status
of
the
working
group,
and
there
is
one
presentation
I
think,
which
is
from
marco
he's,
going
he's
going
to
make
an
update
on
the
key
group
com
and
key
group
from
oscar,
and
I
don't
know
if
goran
has
a
prison
intent
to
present
something.
A
A
So,
let's
start
with
the
update.
So
where
we
are,
I
mean
this
is
my
view.
I
am
happy.
If
you
I
mean,
if
you
have
a
other
things
to
add
so
cmpv2.
A
I
mean
the
draft
follows
what
is
being
done
on
cmpv3
with
lamps,
so
but
that's
currently
in
our
in
our
ad
to
handle
that
keygroup
com
is
going
to
be
updated
today
with
marco's
presentation,
but
currently
we
have
the
key
group
column
that
is
submitted
to
the
isg
at
I
mean
at
least
for
quite
a
long
time.
I
think
it's
200
days
something
like
that.
220
and
keegar
primo
score.
A
A
Okay,
I
see
cion
and
andrik
in
the
line.
B
A
Between
I
mean
it's,
a
problem
of
edge
node
edge
dark,
so
we
have
different
documents
that
are
linking
each
together
and
that's
a
that's
a
that's
all,
but
we
did
not
delete
anything
unless
is
there
is?
Is
there
anything
you're
missing.
A
Okay,
yeah.
C
Yeah
thanks
daniel,
I
was
just
wanted
to
ask
on
the
cmp
of
co-op
draft.
I
know
it
is
in
the
ad
review,
but
I
haven't
seen
any
any
updates
since
a
while
and
just
wanted
to
to
yeah
check
whether
I
missed
something
or
whether
there
is
still
work
on
going.
I
think
the
current
graph
version
is
outdated
in
the
meantime.
A
Yeah,
so
this
is
actually
we.
I
have
been
trying
to
reach
the
authors.
They
were
telling
us
that
they
they
were.
I
committed
to
submit
an
update,
but
that
was
three
months
ago
I
I
mean.
I
know
paul
asked
me
to
clarify
this
synchronization
with
cmpv3,
but
at
that
point
I
think
the
only
thing
we
were
we
were
trying
to
prevent
is
that
this
draft,
being
ahead
of
tmpv3
for
the
only
concern,
was
just
the
inf
registration
at
some
point.
B
A
So,
but
I
think
we
are
far
from
that,
I
I
do.
I
do
not
have
the
impression
that
this
document
is
going
to
be
moving
ahead,
but
I
don't
think
it's
blocking
for
cmpv3.
Am
I
correct.
C
Yeah,
currently,
it
is
blocking
the
clp
updates
draft
and
there
was
some
things
with
the
ayanna
registration
on
the
well-known
path
to
be
aligned
and
clarified,
based
on
the
ad
review
feedback.
We
did
that
in
some
months
ago
and
in
the
meantime,
cmp
updates,
where
this
is
the
iana
registration
is
done,
is
already
done
and
ready
for
publication,
but
also
waiting
for
a
cmp
updates
to
be
processed.
C
C
A
C
A
Okay,
so
I
take
that
on
my
side,
I
will
try
to
push
for
to
clarify
if
the
update
can
be
published.
I
we
know
I
I'm
planning
by
the
end
of
this
month,
this
month's
being
probably
july
or
june,
so
yeah.
I
will
try
to
make
that
and
worst
case.
I
will
try
to
see
if
we
can
put
you
as
a
co-author,
so
you
can
move
the
draft.
C
Yeah,
I'm
happy
to
support
that
because
also
for
the
lightweight
cmp
profile
document,
we
would
need
this
draft.
Otherwise
we
would
need
to
apply
changes
and
and
carve
out
the
cmp
related
stuff.
Okay,.
A
B
A
Yeah
and
I
will
also
try
to
push
our
ad
to
move
the
document
a
little
bit
faster.
C
I
I
think
the
the
token
was
with
more
to
update
with
regard
to
the
feedback
from
the
ad
review,
and
I
think
that
is
where,
where
the
draft
is
got
stuck,
yeah.
A
Yeah
yeah
yeah
yeah
that
that
is
correct,
but
I
want
him
to
be
aware
that
when
he
received
back
the
token
is
not
okay,
I
mean
we
should
speed
up
the
the
delay
between
the
the
the
query
response
and
that
kind
of
delay,
but
yeah.
A
I
will
do
that
right
after
the
meeting
and
okay
feel
free
to
to
contact
us
the
chairs.
If
there
is
anything
that
is
not,
as
you
expect.
C
A
Okay,
so
extended
dtls
authorized
so
to
for
that
purpose,
my
impression
is
that
we
are
just
missing
a
procedure
which
is
ipr
related,
so
we
are
trying
to
clarify
that
with
the
co-authors,
co-op
eep.
A
I
mean
it
has
been
submitted,
so
we're
basically
waiting
for
the
review
from
the
id,
and
so
the
current
working
group
is
work.
A
Okay,
so
the
current
working
group
is
is
focused
on
three
document,
which
is
the
revoked
token
notification,
os
core
gm
admin
and
the
pub
sub
profile.
I'm
wondering
if
sigdam
wants
to
say
something
about
the
pepsi
profile.
D
Sure
the
previous
version
basically
addressed
the
architectural
change
so
that
we
aligned
better
to
key
group
com
terminal
with
kdc
and
authorization
server.
It
also
handles
the
previous
issues
about
authorization
requests
and
it
was
kind
of
left
there.
Now
I'm
working
to
align
the
document
further
with
keygroup
com,
to
explain
how
we
interface
to
the
kdc
beyond
join
request
and
response.
D
Currently,
the
remit
of
the
document
is
just
explaining
authorization
to
be
able
to
participate
in
a
group
plus
key
requests
and
responses,
but
the
interface
requires
to
understand
how
to
evict
group
members
as
well
as
re-keying,
which
is
not
addressed
in
the
current
document.
So
that's
one
of
the
things
that
I'm
working
on
to
define
and
in
summary,
basically
making
sure
that
we,
the
profile,
addresses
all
the
requests
required
conditions
that
the
profile
needs
to
meet
to
be
able
to
be
considered
as
key
group
com
profile.
D
D
Hopefully
once
I
align
the
document,
but
will
there
will
be
still
to
do's
in
those
document
and
then
I'm
hoping
yet
another
version
after
I
get
the
you
know
the
working
group
comments
on
or
francesca's
comments
on
the
changes
that
need
to
be
made
for
those
to
do
so.
That's
my
update
at
the
moment.
D
I
actually
now
looking
at
how
the
kdc
interface
works
would
like
to
put
mqtt
on
a
kind
of
a
secondary
stage.
It
may
be
a
solution
drafted
because
compared
to
the
mqtt
ttls
profile,
where
http
based
handshake
is
supported.
D
This
is
basically
requiring
a
coab
based
kdc
interaction
that
needs
to
be
supported
to
provision
the
clients
with
the
correct
keys
and
etc
all
the
time,
which
might
be
a
stretch.
D
A
No,
so
I'm
I
I'm
going
to
ask
logan
to
maybe
confirm
that
we
have.
A
Okay,
I
don't
see
all
the
slides
I'm
going
to
do
a
refresh.
A
Okay,
so
we
have
all
the
presentations
before
we
do
the
presentation
I'd
like
to
see
the
noteworld
slide.
Maybe
logan
can
you
you
probably
have
to
validate
the
noteworld
slide.
A
Well,
I
don't
see
any
so
please
please
be
aware
that
the
note
was
la
and
the
noteworth
applied
to
this
meeting
and
I
suppose
it's
gonna
be
solved
when
marco
will
present
his
presentation.
So
go
ahead.
Marco.
F
Yes,
thanks
for
what
it's
worth,
I
do
see
the
not
12
slides.
Oh.
A
F
A
I
have
to
so,
how
do
we
go
there?
Should
I
go
in
the
presentation
view
or.
A
So
so
marco,
I
expect
you
to
show
the
not
well,
and
then
you
go
on
with
your
slide.
F
F
A
F
Sure
here
it
is
so.
This
is
a
consolidated
joint
update
of
the
two
drafts,
keeger
komm
and
kyro
kamal
score.
I
submitted
an
update
for
both
of
them
last
week
about
kickercon.
Yes,
it
has
been
in
a
review
since
end
of
last
year.
I
think-
and
I
had
a
few
updates
in
the
queue
for
a
while,
and
I
hesitated
because
I
didn't
want
to
confuse
paul,
but
I
had
the
opportunity
in
philadelphia
to
discuss
about
this
with
daniel
and
paul
and
it
was
fine
to
incorporate
anywhere
anyway.
F
F
It
was
mainly
about
two
conceptual
updates
named
update
one
and
two
in
the
mail
one
about
a
change
in
the
way
it
is
possible
to
optionally
signaling,
the
scope,
semantics
and
the
access
token,
and
now
considering
only
seaboard
tags
like
building
on
what
is
defined
in
in
seabor
file
magic
and
then
update
you
about
relaxing
a
bit
the
restrictions
on
the
toid
parameter
when
using
a
aif
to
express
a
scope.
F
Anything
else
was
pretty
much
editorial
and
in
the
queue
since
euron's
review
of
the
other
document,
keyground
oscar,
and
that
was
also
reminded
in
that
mail
and
on
the
first
update
again,
we
were
having
already
the
optional
possibility
to
explicitly
signal
the
semantics
of
scope
in
the
access
token.
Only
where
I
can
remind
that
scope
is
basically
by
string
wrapping
an
array
of
scope
entries,
let's
say
one
per
group
and
then
in
turn,
can
be
relying
on
aif
on
a
more
simple
textual
format.
F
Now
the
old
approach
was
about
having
one
sieber
tag
once
and
for
all,
registered
and
used
to
signal
the
fact
that
we
were
doing
this
kind
of
thing
at
all
and
then
having
basically
another
layer
of
wrapping
where,
together
we
scope,
we
were
transmitting
also
an
integer
to
be
registered
for
the
specific
semantics
of
scope
to
use.
But
then,
at
some
point
we
had
an
alternative
proposal
from
christian
thanks
a
lot.
F
I
think
it
was
really
good
idea
was
issue
144
now
adopted
here,
where,
basically,
we
got
rid
of
the
integer
there's
only
one
zebra
tag
pair
semantics
to
be
possibly
registered
and
used
to
tag
a
scope
to
indicate
its
semantic.
F
I
said
possibly
register
because
in
most
of
the
cases
I
expect
the
tag
to
be
already
registered
anyway,
because,
especially
if
you
use
aaf
and
define
related
media
type
parameters
for
the
toid
and
the
perm
of
the
specific
data
model
that
is
supposed
to
result
in
the
registration
of
a
content
format
which,
in
turn
as
per
rfc
9277,
will
result
in
the
registration
of
an
associated
seaboard
tag
and
that's
the
silver
tag.
We
would
use
to
signal
that
semantics
of
scope,
so
the
notation
becomes
clear
and
and
the
practical
signaling
becomes
simpler.
F
That
was
update
one
and
as
to
update
two.
I
said
it
was
about
relaxing
the
expected
encoding
of
toid,
especially
if
aaf
is
used
to
describe
scope
entries.
We
were
really
strict
to
expect
uid
to
be
no
matter
what
a
sieber
text
string.
I
relaxed
it
a
bit
in
saying
that.
Well,
that's
indeed
the
case
to
expect
in
case
we
define
an
af
data
model
intended
like
in
this
document
to
cover
the
roles
that
joining
nodes
want
to
have
in
the
group.
F
So
nothing
changes
for
the
main
cases
we
have
had
in
mind
all
along
meaning
joining
nodes,
but
it's
something
useful
for
a
data
model
used
in
oscore
gm
admin
which
in
turn
extends
the
data
model
defined
first
of
all,
in
keygroup
score,
where
we
can
have
scope
entries
for
admin
users
to
define
operations
that
they
can
perform
as
administrators
of
groups
where
tyd
out
of
a
discussion
at
itf
113,
maybe
not
necessarily
receiver
by
string
but
something
different
to
express
patterns
of
group
names
rather
than
an
exact
name
or
as
an
extreme
case,
even
a
wild
card.
F
But
again
nothing
really
changes
practically
for
the
the
main
case.
We
care
the
most
about
joining
nodes
yeah.
I
don't
go
through
this
just
for
the
reference.
This
is
a
list
of
the
editorial
related
updates.
Where
consistent
with
the
number
of
other
documents
and
the
meaning
of
the
parameters,
I
renamed
parameters,
messages
and
some
specific
uri
path,
segments,
okay
and
that
was
keygroup
calm
on
keygram
oscar.
We
actually
had
the
first
revision
already
for
the
july
meeting,
which
was
mostly
about
addressing
the
working
group,
was
called
comments
we
received
from
yoran.
F
Thank
you
very
much
for
that,
and
it
was
mostly
about
restructuring
the
table
of
content
of
the
document
and
I'm
pretty
happy
with
the
current
results.
I
I
think
it
reads
way
better
than
before,
and
also
about
giving
some
clarification
of
what
exactly
peak
from
the
cosi
algorithm
registry
to
refer
to
an
hkdf
algorithm.
F
There
was
also
a
revision
of
the
af
data
model
defined
here
to
work
exactly
as
it
was
supposed
to
work
already
for
the
sake
of
this
document,
meaning
joining
nodes
but
written
in
a
way
that
it
can
be
extended
and,
in
fact,
is
extended
in
the
asgm
admin
document.
Where,
again,
the
same
data
model
is
extended
to
make
it
possible
to
have
some
scope
entries.
F
Instead
expressing
an
authorized
operations
for
group
administrators
and
like
we
discussed
also
in
vienna,
you
may
in
principle,
have
a
single
scope,
in
the
same
token,
containing
a
mix
of
scope
entries
for
a
joining
node
and
some
other
scope
entries
instead
for
an
administrator
and
they
can
be
distinguished
and
and
they
can
potentially
also
coexist.
F
F
But
then
I
made
a
second
update
last
week.
F
This
is
a
relatively
minor
update
and
it
was
mostly
to
ensure
consistency
with
the
one
I
presented
before
for
key
group
com,
so
mostly
alignment
in
names
in
your
ipad
segments
and
so
on
and
adapting
the
text
related
to
the
optional
signaling
of
the
scope,
cementing
semantics
with
the
zebra
tag,
and
I
also
noted
that
some
text
related
to
when
the
dtls
profile
is
used
between
the
joining
of
the
group
manager
requires
some
clarification
and
now
in
case
the
access
token
is
specifically
transported.
F
During
the
details.
Details
handshake
message,
rather
than
before
separately,
I
specified
clearly
where
exactly
the
token
should
be
put
in
which
exact
message,
depending
on
using
version
one
two
and
one
three
of
dtls
consistent
with
what
the
dtls
profile
says
and
that's
it
so
to
summarize
on
keyground,
I
have
no
other
pending
actions,
I'm
aware
on,
and
we
wait
for
the
id
review
for
keyboard
commascore,
it's
most
important,
consistent
with
key
group
com.
F
Again,
I
don't
have
pending
actions
here
either,
but
I
just
wonder
if
there
were
more
comments
to
be
expected
from
yorano
or
anyone
other
than
that
yeah
we
mentioned
before
the
need
to
sync
with
core
that
was
suggested
by
francesca
some
time
ago.
It
was
about
requesting
publication
at
the
same
time,
of
three
documents:
kira
kamos
korenas
and
two
documents
in
core.
Where
for
core
group
on
this
is
one
of
those
it's
a
working
group.
F
F
We
have
a
pending
action
for
us
as
authors
to
work
on
a
new
version
anyway,
where
we
plan
to
specify
better
how
response
messages
are
supposed
to
be
a
handle,
so
we
expect
at
least
one
more
revision
on
the
good
side.
That
update
is,
I
believe,
not
supposed
at
all
to
have
any
impact
on
keygroup
common
score
anyway,
and
that
should
be
the
last
slide.
Yes,
thank
you.
A
Yeah
yeah,
please
go
ahead,
I
suspect
xian
is
not
in
the
queue.
Are
you
in
the
queue.
A
So
I
will
remove
you
from
the
queue
see
them
go
ahead.
D
Sorry,
thank
you,
marco.
This
is
not
a
question
related
to
the
presentation
now,
but
a
general
question
to
the
ace
key
group
com
now
that
I'm
reading
it
in
detail
and
fresh
in
my
memory
in
the
return
response
joint
response,
there
is
a
credits
parameter
and
if
you
have
the
credits
you
have
to
have
peer,
you
must
have
the
peer
roles
and
peer
ids
for
the
specific
profile
for
the
pops
up.
D
There
are
very
distinct
roles
like
pubs
are
only
the
ones
who
have
the
credits,
and
subscribers
can
only
are
the
only
ones
who
would
be
asking.
So
the
peer
roles
is
a
kind
of
a
space-taking
thing
when
the
profile
is
very
clear
when
and
which
roles
could
be
asked
for
so
it
would
be
an
area
of
pop
up
for
the
all
the
keys
received.
D
Possibly
could
this
be
avoided,
or
why
was
the
payrolls
a
must,
and
could
it
be
a
may
or
should
or
something
more
than
moved.
D
D
So,
when
you
return
the
response-
and
you
have,
the
credits
parameter
that
I,
the
peer
roles
would
be
only
containing
basically
for
each
of
the
credentials
returned
which
to
me
is
a
space-taking
thing,
because
the
profile
defines
very
well
which
role
is
allowed
to
do
that
anyway.
So
I
was
thinking
whether
there
was
a
reason
behind
making
that
a
must
basically.
F
D
Yeah,
I
can
definitely
see
the
the
role
of
the
ids,
which
makes
a
but
yeah
in
this.
I
guess
I
provided
the
exception
now
in
this
one.
There
cannot
be
anything
else,
but
the
pub
role
anyway
for
this,
and
so
it
will
be
just
sending
redundant
information
in
an
array
that
is
as
long
as
the
publisher
list
for
that
particular
group.
F
Please
send
me
a
mail
describing
this
and
I
will
check
again
the
detail
in
case
well,
I'd
like
to
hear
from
more
people
in
the
working
group
and
if
it's
fine
to
you
to
postpone
possibly
an
update
to
when
processing
the
the
ad
review
just
to
avoid
yet
another
submission.
Only
about
this
around
this
time
interval.
D
F
E
Yeah
I
I
just
wanted
to
briefly
comment
on
marco's
update.
I've
looked
at
the
update
and
my
comments
are
are
addressed.
Well,
I,
like
the
new
structure,
very
well
very
much,
and
so
that
was
the
only
thing
I
wanted
to
say.
I
don't
have
any
more
input
at
the
moment
and
yeah
that's.
It
looks
good.
F
Okay,
so
so
I
restate,
I
don't
have
any
pending
actions
left
on
on
kyogre
como
score
either
it's
up
to
the
chairs
about
proceeding
this.
A
Yeah,
so
what
I'm
hearing
is
that
I
mean
the
document
is
ready
to
move
to
the
isg.
A
Okay
sure
so
well
carsten
is
is
here,
I'm
wondering
what
would
you
like?
What
would
be
the
easiest
way?
I
can
help
in
that.
B
Yeah
sorry,
I
have
been
listening
with
about
0.6
years.
A
So
so
so
the
question
was:
how
can
we
ease
the
the
proceeding
of
the
the
the
group
come
over
score
because
it
needs
some
synchronization
with
the
core
working
group?
So
I'm
wondering
what
would
be
the
the
way
to
move
that
forward.
B
Well,
let
me
remember
which
of
the
documents.
This
was
many
documents
that.
B
Yeah,
maybe
you
can
say
it-
I
mean
we
discussed
this
this
morning,
but
I
don't
understand
my
notes.
So
please
go
ahead.
A
A
I
would
probably
so
I
would
probably
move
send
it
to
the
isg
and
or
do
you
want
to
have
a
review,
because
I
mean
I
mean
I
guess
the.
F
That
was
my
next
question.
I
was
ready
to
expect
the
shepherd
review
together
with
shepherd
up,
but
it's
of
course
up
to
you.
A
Okay,
yeah
yeah.
No,
no
sure
I
mean
the
shepherd
review,
that's
we.
We
have
to
do
that
to
move
that
forward,
but
I'm
wondering
I
mean
we
can
write
the
shepherd
review
to
move
that
and
let
then
leave
it
to
the
80
to
handle
the
synchronization
with
with
with
core
all
we
can.
I
I
I
am
more
in
favor
or
something
that
is
a
little
bit
more
proactive
and
say:
yeah
core
has
reviewed
the
document,
so
I
was
basically
thinking.
A
Do
you
think
we
should
have
two
two
weeks
period
open
to
core.
B
A
B
The
the
best
way
to
actually
get
some
synchronization
here
is
to
to
use
the
fact
that
we
don't
have
a
sharepoint
for
that
yet,
and
we
might
actually
find
someone
in
core
who
was
shipping
okay,
this
document,
so
we
have
essentially
both
working
groups
in
in
the
loop.
A
F
E
Okay,
so
I'm
I'm
going
to
talk
about
the
new
profile
of
the
ace
award
framework,
which
was
recently
published
as
rc
9200.
E
Together
with
the
two
profiles,
the
details,
profile,
knight,
d202
and
the
oscar
profile
9203,
so
you
can,
you
can
show
slide
two
here.
It's
a
slide.
You
see
at
the
bottom
here
on
on
this
screen.
E
If
you
compare
with
the
previous
profiles,
starting
with
the
oscar
profile
and
that
is
using
the
oauth
framework
to
define
the
access
to
resources
on
the
resource
server
with
an
access
token
associated
to
a
symmetric
key
and
then
uses
all
score
to
protect
the
communication
and
authenticate
the
client
and
server
are
using
this
symmetric
key
now.
E
This
profile
instead
is
associating
the
access
rights
to
an
asymmetric,
key
or
or
rather
authentication
credentials,
authentic,
an
authentication,
credential
and
uses
ad
hoc
to
to
authenticate
and
to
derive
a
shared
secret,
which
is
used
to
set
up
our
score.
So
it's
very
much
like
that.
The
atls
profile
is
already
doing
in
case
of
public
keys,
but
it's
using
ad
hoc
and
oscor
instead
of
the
dtls
handshake
and
tls,
and
the
record
layer
protocol.
E
So
the
difference
between
this
new
draft
and
9203
the
oscar
profile
is
that
it
supports
a
more
strict
trust
model
where
you're
using
public
keys
instead
of
shared
secret
keys
and
the
difference
with
the
dtls
profile
is
that
it
supports
a
lower
overhead
compared
with
using
adhoc
instead
of
dtls
for
the
handshake
next
slide.
Please.
E
E
E
E
E
And
it
supports
the
use
of
authentication
credentials
in
the
same
way
as
ad
hoc,
so
you
can
either
include
them
in
the
access
token
or
you
could
reference
them,
which
is
useful
because
you
could
lower
your
overhead
size
of
the
access
token,
and
it
specifies
a
data
structure
called
ethic
information
which
provides
information
about
the
the
particular
application
profile
of
ethoc.
That's
used
and
like
what
method
is
being
supported
on
his
message
for
being
used
and
so
on,
and
those
that
information
may
be
included
in
the
message
exchange
before
running
it.
E
E
So,
for
example,
instead
of
doing
the
post
to
authorization
info,
you
could
include
the
access
token
in
nethold
message,
one
directly
in
the
external
authorization
data
field,
and
so
that's
one.
It's
one.
One
round
trip
less,
that's
analogous
to
what
is
done
in
the
dtls
profile,
with
the
psk
identity
and
also
it's
incorporating
the
ad
hoc
and
oscor
combi
combined
protocol,
which
is
in
the
core
draft
so
and
and
that
could
be
combined
with
the
access
token
provisioning.
E
So
you
actually
have
a
two-round
trip
for
provisioning,
the
access
tokens
authenticating
and
sending
the
first
oscore
access
request
oscar
protected
access
request.
E
There
is
also
an
interesting
alternate
flow
where
in
the
aes
is
provisioning.
The
author
access
token
instead
of
the
client.
E
So
there
are
some
some
examples
of
papers
who
have
been
studying
this
for
for
more
efficient
provisioning
of
access
rights.
E
E
And
yeah,
so
that's
next
steps.
This
is
already
very
detailed.
We
think
this
is
more
or
less
ready
for
for
someone
to
review.
It
is
a
minor
update
on
information
about
support
for
kudos
that
we
might
want
to
add,
but
otherwise
we
don't
have
any
other
proposed
technical
additions,
comments,
questions.
B
A
I
mean
the
this
document
is
a
candidate
for
to
be
adopted,
so
I
mean
I'm
wondering
who's.
Read
the
document
who's
interested
in
reviewing
the
document
who's
interested
in
contributing
to
that
document.
E
A
So
I
mean
the
on
vacation.
Is
that
a
one
week
or
I
mean
I,
I
can
start
a
call
for
adoption
on
the
mailing
list.
Is
it
more
appropriate
to
do
it
now
or
should
we
wait
a
little
bit.
A
A
Regarding
the
who
is
going
to
work
on
that
document,
because
I
can
see
marco
john
and
guerin-
but
I
mean
marco-
is
a
modern
buzzy
with
the
token
and
and
the
admin
draft,
so
I
would
prefer
to
make
sure
that
he's
not
too
much
involved
into
that
document,
so
that
I
mean
the
other
document
are
not
going
to
be
slowed.
E
Yeah
yeah,
I'm
definitely
going
to
be
involved
in
this
in
this
draft
and
progress
it
so.
F
Oh
there's
a
comment
in
the
chat
from
christian
read:
it
can
review
later.
F
A
Okay
right,
so
I
will
check
with
my
co-chair
and
issue
the
call
for
adoption
and
then
yeah.
That's
that's
why
we
are
so
now
regarding
the
milestone
I'd
like
to
understand,
so
I
I
mean
so
for
core.
I
mean
the
key
group
come.
What
remains
to
be
done
is
ask
for
a
shepherd,
so
I'm
considering
that
people
in
core
are
so
involved
that
the
chairs
will
have
to
to
select
among
the
the
candidates
one
of
the
shepherd
brighter.
A
So
that
seems
to
be
done
for
now,
I'm
wondering
about
the
pub
sub.
Can
we
see
that
to
be
sent
to
the
ihe
by
the
end
of
the
year.
D
It
will
depend
on
how
we
resolve
the
to
douche
I'll.
Let
you
let
me
do
a
another
version
and
then
I'll,
let
the
group
know
how
my
discussion
with
my
co-author
francesca
has
gone
and
then
I'll
be
speaking
more
surely.
A
D
A
D
A
D
A
Okay,
perfect
and
now
we
and
and
we
have
the
token
in
admin,
so
what
would
be
a
reasonable
target
from
for
those
documents?
Marco.
F
Gm
admin
is
more
advanced.
I
think
after
one
two
iterations
more,
it
should
be
ready
for
working.
Your
plus
call
that's
what
I'm
hoping
for
at
least
revloc
token
notification
requires
some
more
work.
Of
course
it's
not
as
that
mature,
but
it's
progressing
well.
I
think
so.
A
Three
iterations:
it
means
tomorrow
after
tomorrow
and
the.
F
End
of
the
week
after
the
london
meeting,
okay
somewhere
in
between
the
london
and
was
that
yokohama
meeting.
A
F
A
Yeah
yeah,
no,
no,
I
mean
no.
I
mean
it's
just
for
me
to
to
have
an
a
timeline
being
said
right.
Okay,
so
perfect,.
E
E
E
A
Okay
right
yeah,
so
let's
go
back
to
the
to
the
mailing
list
with
that.
Okay
right,
then,
I
wish
you
happy
evening
epi
morning,
depending
on
where
you
are.
A
F
A
So
it's
unlikely
that
we
meet
and
we
probably
work
with
interim
meetings.