<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.2.3 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>

<rfc ipr="trust200902" docName="draft-backman-secevent-token-00" category="info">

  <front>
    <title abbrev="secevent-token">Security Event Token (SET)</title>

    <author initials="A." surname="Backman" fullname="Annabelle Backman">
      <organization>Amazon</organization>
      <address>
        <email>richanna@amazon.com</email>
      </address>
    </author>
    <author initials="W." surname="Denniss" fullname="William Denniss">
      <organization>Google</organization>
      <address>
        <email>wdenniss@google.com</email>
      </address>
    </author>
    <author initials="M." surname="Ansari" fullname="Morteza Ansari">
      <organization>Cisco</organization>
      <address>
        <email>morteza.ansari@cisco.com</email>
      </address>
    </author>
    <author initials="M." surname="Jones" fullname="Michael B. Jones">
      <organization>Microsoft</organization>
      <address>
        <email>mbj@microsoft.com</email>
        <uri>http://self-issued.info/</uri>
      </address>
    </author>

    <date year="2017" month="November" day="21"/>

    <area>Security</area>
    <workgroup>secevent</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>This specification defines the Security Event Token, which may be
distributed via a protocol such as HTTP.  The Security Event Token
(SET) specification profiles the JSON Web Token (JWT), which can be
optionally signed and/or encrypted.  A SET describes a statement of
fact from the perspective of an issuer that it intends to share with
one or more receivers.</t>



    </abstract>


  </front>

  <middle>


<section anchor="intro" title="Introduction">
<t>This specification defines an extensible Security Event Token (SET)
format which may be exchanged using protocols such as HTTP.  The
specification builds on the JSON Web Token (JWT) format <xref target="RFC7519"></xref> in
order to provide a self-contained token that can be optionally signed
using JSON Web Signature (JWS) <xref target="RFC7515"></xref> and/or encrypted using JSON
Web Encryption (JWE) <xref target="RFC7516"></xref>.</t>

<t>This specification profiles the use of JWT for the purpose of issuing
security event tokens (SETs).  This specification defines a base
format upon which profiling specifications define actual events and
their meanings.  Unless otherwise specified, this specification uses
non-normative example events intended to demonstrate how events may
be constructed.</t>

<t>This specification is scoped to security and identity related events.
While security event tokens may be used for other purposes, the
specification only considers security and privacy concerns relevant
to identity and personal information.</t>

<t>Security Events are not commands issued between parties.  A security
event is a statement of fact from the perspective of an issuer about
the state of a security subject (e.g., a web resource, token, IP
address, the issuer itself) that the issuer controls or is aware of,
that has changed in some way (explicitly or implicitly).  A security
subject MAY be permanent (e.g., a user account) or temporary (e.g.,
an HTTP session) in nature.  A state change could describe a direct
change of entity state, an implicit change of state or other higher-
level security statements such as:</t>

<t><list style="symbols">
  <t>The creation, modification, removal of a resource.</t>
  <t>The resetting or suspension of an account.</t>
  <t>The revocation of a security token prior to its expiry.</t>
  <t>The logout of a user session.  Or,</t>
  <t>A cumulative conclusion such as to indicate that a user has taken
over an email identifier that may have been used in the past by
another user.</t>
</list></t>

<t>While subject state changes are often triggered by a user-agent or
security-subsystem, the issuance and transmission of an event often
occurs asynchronously and in a back-channel to the action which
caused the change that generated the security event.  Subsequently,
an Event Receiver, having received a SET, validates and interprets
the received SET and takes its own independent actions, if any.  For
example, having been informed of a personal identifier being
associated with a different security subject (e.g., an email address
is being used by someone else), the Event Receiver may choose to
ensure that the new user is not granted access to resources
associated with the previous user.  Or, the Event Receiver may not
have any relationship with the subject, and no action is taken.</t>

<t>While Event Receivers will often take actions upon receiving SETs,
security events cannot be assumed to be commands or requests.  The
intent of this specification is to define a way of exchanging
statements of fact that Event Receivers may interpret for their own
purposes.  As such, SETs have no capability for error signaling other
to ensure the validation of a received SET.</t>

<section anchor="conv" title="Notational Conventions">
<t>The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL NOT”,
“SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “NOT RECOMMENDED”, “MAY”, and
“OPTIONAL” in this document are to be interpreted as described in
<xref target="RFC2119"></xref>.  These keywords are capitalized when used to unambiguously
specify requirements of the protocol or application features and
behavior that affect the inter-operability and security of
implementations.  When these words are not capitalized, they are
meant in their natural-language sense.</t>

<t>For purposes of readability, examples are not URL encoded.
Implementers MUST percent encode URLs as described in Section 2.1 of
<xref target="RFC3986"></xref>.</t>

<t>Throughout this document, all figures MAY contain spaces and extra
line-wrapping for readability and space limitations.  Similarly, some
URIs contained within examples have been shortened for space and
readability reasons.</t>

</section>
<section anchor="defn" title="Definitions">
<t>The following definitions are used with SETs:</t>

<t><list style="hanging">
  <t hangText='Security Event Token (SET)'><vspace blankLines='0'/>
  A SET is a JWT <xref target="RFC7519"></xref> that contains an event payload describing
a security event.</t>
  <t hangText='Event Transmitter'><vspace blankLines='0'/>
  A service provider that delivers SETs to other providers known as
Event Receivers.</t>
  <t hangText='Event Receiver'><vspace blankLines='0'/>
  An Event Receiver is an entity that receives SETs through some
distribution method.  An Event Receiver is the same entity
referred as “recipient” or “receiver” in and related
specifications.  <xref target="RFC7519"></xref></t>
  <t hangText='Subject'><vspace blankLines='0'/>
  A SET describes an event or state change that has occurred about a
Subject.  A Subject may be a principal (e.g., Section 4.1.2
<xref target="RFC7519"></xref>), a web resource, an entity such as an IP address, or
the issuer itself that a SET might reference.</t>
  <t hangText='Profiling Specification'><vspace blankLines='0'/>
  A specification that uses the SET Token specification to define one or
more event types and the associated claims included.</t>
</list></t>

</section>
</section>
<section anchor="set" title="The Security Event Token (SET)">
<t>A SET is a data structure that encodes an “event payload” describing a
security event, wrapped in an “envelope” providing metadata and context
for the security event.  The SET envelope is a JWT Claims Set as defined in
<xref target="RFC7519"></xref>, consisting of a JSON object containing a set of claims.  The
event payload is a JSON object contained within the SET envelope, itself
containing claims that express information about the event, e.g. the type
of event, the subject of the event, and other information defined in a
Profiling Specification.</t>

<t>This specification defines a core set of claims for use in SET envelopes
and event payloads, however Profiling Specifications MAY define additional
claims of both types.  It is RECOMMENDED that Profiling Specifications
define claims to be used in the event payload rather than the envelope.  If
a Profiling Specification does define envelope claims, those claims SHOULD
be registered in the JWT Token Claims Registry <xref target="IANA.JWT.Claims"></xref> or have
Public Claim Names as defined in Section 4.2 of <xref target="RFC7519"></xref>.</t>

<section anchor="claims" title="SET Claims">
<t>This specification profiles the following claims defined in <xref target="RFC7519"></xref> for
use in the SET envelope:</t>

<t><list style="hanging">
  <t hangText='iss'><vspace blankLines='0'/>
  A case-sensitive string identifying the principal that issued the SET,
as defined by Section 4.1.1 of <xref target="RFC7519"></xref>.  This claim is REQUIRED.</t>
  <t hangText='aud'><vspace blankLines='0'/>
  A case-sensitive string or array of case-sensitive strings identifying
the audience for the SET, as defined by Section 4.1.3 of <xref target="RFC7519"></xref>.  This
claim is RECOMMENDED.</t>
  <t hangText='exp'><vspace blankLines='0'/>
  As defined by Section 4.1.4 of <xref target="RFC7519"></xref>, this claim is the time after
which the JWT MUST NOT be accepted for processing.  In the context of a SET
however, this notion does not apply since a SET reflects something that
has already been processed and is historical in nature.  Use of this claim
is NOT RECOMMENDED.</t>
  <t hangText='iat'><vspace blankLines='0'/>
  A value identifying the time at which the SET was issued, as defined by
Section 4.1.6 of <xref target="RFC7519"></xref>.  This claim is REQUIRED.</t>
  <t hangText='jti'><vspace blankLines='0'/>
  A unique identifier for an event, as defined by Section 4.1.7 of
<xref target="RFC7519"></xref>.  This claim is REQUIRED.</t>
</list></t>

<t>This specification defines the following new claims for use in the SET
envelope:</t>

<t><list style="hanging">
  <t hangText='event'><vspace blankLines='0'/>
  A JSON object known as the “event payload”, whose contents identify the
type of event contained within the SET and contain additional information 
defined as part of an event type definition in a Profiling Specification.</t>
</list></t>

<t>This specification defines the following claims for use in event payloads:</t>

<t><list style="hanging">
  <t hangText='event_type'><vspace blankLines='0'/>
  A string containing a URI that uniquely identifies an event type
defined by a Profiling Specification.  This claim is REQUIRED.</t>
  <t hangText='event_id'><vspace blankLines='0'/>
  A string that identifies a specific “real world” event or state change
to which this event is related. Recipients MAY use this claim to correlate
events across different SETs received at different times and/or by different
systems. The value of this claim MUST be unique with respect to the
transmitter to a specific “real world” event or state change, however
recipients MUST NOT interpret a difference in “event_id” values as a
guarantee that two events are not related.  This claim is OPTIONAL.</t>
  <t hangText='event_subject'><vspace blankLines='0'/>
  A Subject Identifier that identifies the subject of the event.  (See:
<xref target="subject"></xref>) This claim is REQUIRED.</t>
  <t hangText='event_time'><vspace blankLines='0'/>
  A number identifying the date and time at which the event is believed to
  have occurred or will occur in the future.  Its value MUST take the form
  of a NumericDate value, as defined in Section 2 of <xref target="RFC7519"></xref>.  This claim
  is OPTIONAL, however if it is not present then the recipient MUST
  interpret that to mean that no event time is being asserted, either
  because there is no specific event time, the transmitter does not wish to
  share it, or the transmitter does not know its value.</t>
</list></t>

<t>Both the SET envelope and event payload MAY contain additional claims, such
as those defined in a Profiling Specification.  The format and meaning of
these claims is out of scope of this specification.  Implementations SHOULD
ignore any claims in the SET envelope or event payload that they do not
understand.</t>

<t>The following is a non-normative example showing a SET envelope expressing
a hypothetical event with two additional claims in the event payload:</t>

<figure title="Example SET With Event Claims In Payload" anchor="figset"><artwork><![CDATA[
{
  "jti": "3d0c3cf797584bd193bd0fb1bd4e7d30",
  "iss": "https://transmitter.example.com",
  "aud": [ "https://receiver.example.com" ],
  "iat": 1458496025,
  "event": {
    "event_type": "https://secevent.example.com/example_event",
    "event_subject": {
      "identifier_type": "urn:ietf:params:secevent:subject:email",
      "email": "user@example.com"
    },
    "event_time": 1458492425,
    "claim_1": "foo",
    "claim_2": "bar"
  }
}
]]></artwork></figure>

<t>The payload in this example contains the following:</t>

<t><list style="symbols">
  <t>An “event_type” claim whose value is the URI identifying the
hypothetical event type.</t>
  <t>An “event_subject” claim whose value identifies a subject via email
address.</t>
  <t>An “event_time” claim whose value is the time at which the event occured.</t>
  <t>Two claims “claim_1” and “claim_2” that are defined by the hypothetical 
event type’s Profiling Specification.</t>
</list></t>

</section>
<section anchor="subject" title="Subject Identifiers">
<t>The Subject Identifier provides a common syntax for expressing the subject
of a security event.  A Subject Identifier is a JSON object representing an
instance of a Subject Identifier Type.  A Subject Identifier Type defines a
way of identifying the subject of an event. Typically this is done by
defining a set of one or more claims about a subject that when taken
together collectively identify that subject.  Each Subject Identifier Type
MUST have a name which MUST be registered in the IANA “SET Subject
Identifier Types” registry established by <xref target="iana-sit"></xref>.</t>

<t>A Subject Identifier MUST contain an “identifier_type” claim, whose value is
a string containing the name of the Subject Identifier’s Subject Identifier
Type.  All other claims within the Subject Identifier MUST be defined by the
Subject Identifier Type.</t>

<t>The names of the Subject Identifier Types defined below are registered in
the IANA “SET Subject Identifier Types” registry established by <xref target="iana-sit"></xref>.</t>

<section anchor="implicit-subject-identifier-type" title="Implicit Subject Identifier Type">
<t>The “Implicit” Subject Identifier Type indicates that the recipient is to be
determined implicitly, either from other claims in the SET envelope or event
payload, or through some other context.  For example, there may be event
types for which the only logical subject is the transmitter itself, in which
case the subject is implicitly known from the “iss” claim in the SET
envelope.</t>

<t>The Implicit Subject Identifier Type has the name “implicit”.  This type
contains no additional claims.</t>

<t>The following is a non-normative example of a Subject Identifier
representing an instance of the Implicit Subject Identifier Type:</t>

<figure title="An Instance of the Implicit Subject Identifier Type" anchor="figimplicit"><artwork><![CDATA[
{
  "identifier_type": "implicit"
}
]]></artwork></figure>

</section>
<section anchor="email-subject-identifier-type" title="Email Subject Identifier Type">
<t>The “Email” Subject Identifier Type identifies a subject by email address.
It has the name “email”, and contains a single additional claim:</t>

<t><list style="hanging">
  <t hangText='email'><vspace blankLines='0'/>
  A string containing an email address.  Its value SHOULD conform to
<xref target="RFC5322"></xref>.  This claim is REQUIRED.</t>
</list></t>

<t>The following is a non-normative example of a Subject Identifier
representing an instance of the Email Subject Identifier Type:</t>

<figure title="An Instance of the Email Subject Identifier Type" anchor="figemail"><artwork><![CDATA[
{
  "identifier_type": "email",
  "email": "user@example.com"
}
]]></artwork></figure>

</section>
<section anchor="phone-number-subject-identifier-type" title="Phone Number Subject Identifier Type">
<t>The “Phone Number” Subject Identifier Type identifies a subject by phone
number. It has the name “phone_number”, and contains a single claim:</t>

<t><list style="hanging">
  <t hangText='phone_number'><vspace blankLines='0'/>
  A string containing a phone number.  It SHOULD be formatted according to
<xref target="E.164"></xref>.  This claim is REQUIRED.</t>
</list></t>

<t>The following is a non-normative example of a Subject Identifier
representing an instance of the Phone Number Subject Identifier Type:</t>

<figure title="An Instance of the Phone Number Subject Identifier Type" anchor="figphone"><artwork><![CDATA[
{
  "identifier_type": "phone_number",
  "phone_number": "+1 206 555 0123"
}
]]></artwork></figure>

</section>
<section anchor="issuer-and-subject-subject-identifier-type" title="Issuer and Subject Subject Identifier Type">
<t>The “Issuer and Subject” Subject Identifier Type identifies a subject by an
issuer and subject pair.  It has the name “iss-sub”, and contains two
claims:</t>

<t><list style="hanging">
  <t hangText='iss'><vspace blankLines='0'/>
  A case-sensitive string identifying the principal who is responsible for
assignment of the identifier in the “sub” claim, as defined by Section 4.1.1
of <xref target="RFC7519"></xref>.  This claim is REQUIRED.</t>
  <t hangText='sub'><vspace blankLines='0'/>
  A case-sensitive string containing an identifier that identifies a subject
within the context of the principal identified by the “iss” claim, as
defined by Section 4.1.2 of <xref target="RFC7519"></xref>.  This claim is REQUIRED.</t>
</list></t>

<t>The following is a non-normative example of a Subject Identifier
representing an instance of the Issuer and Subject Subject Identifier Type:</t>

<figure title="An Instance of the Issuer and Subject Subject Identifier Type" anchor="figisssub"><artwork><![CDATA[
{
  "identifier_type": "iss-sub",
  "iss": "http://id.example.com",
  "sub": "example.user.1234"
}
]]></artwork></figure>

</section>
</section>
<section anchor="set-type" title="Explicit Typing of SETs">
<t>This specification registers the “application/secevent+jwt” media
type.  SETs MAY include this media type in the “typ” header parameter of
the JWT containing the SET to explicitly declare that the JWT is a SET.
This MUST be included if the SET could be used in an application context
in which it could be confused with other kinds of JWTs.  Profiling
Specifications MAY declare that this is REQUIRED for SETs containing events
defined by the Profiling Specification.</t>

<t>Per the definition of “typ” in Section 4.1.9 of <xref target="RFC7515"></xref>, it is
RECOMMENDED that the “application/” prefix be omitted.  Therefore,
the “typ” value used SHOULD be “secevent+jwt”.</t>

</section>
<section anchor="construction" title="Security Event Token Construction">
<t>A SET is a JWT, and therefore it’s construction follows that described in
<xref target="RFC7519"></xref>.</t>

<t>While this specification uses JWT to convey a SET, implementers SHALL
NOT use SETs to convey authentication or authorization assertions.</t>

<t>The following is the example JWT Claims Set from <xref target="figset"></xref>, expressed as
an unsigned JWT.  The JOSE Header is:</t>

<figure><artwork><![CDATA[
{"typ":"secevent+jwt","alg":"none"}
]]></artwork></figure>

<t>Base64url encoding of the octets of the UTF-8 representation of the
JOSE Header yields:</t>

<figure><artwork><![CDATA[
eyJ0eXAiOiJzZWNldmVudCtqd3QiLCJhbGciOiJub25lIn0
]]></artwork></figure>

<t>The example JWT Claims Set is encoded as follows:</t>

<figure><artwork><![CDATA[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]]></artwork></figure>

<t>The encoded JWS signature is the empty string.  Concatenating the
parts yields the following complete JWT:</t>

<figure title="Example Unsecured Security Event Token" anchor="figsetencoded"><artwork><![CDATA[
eyJ0eXAiOiJzZWNldmVudCtqd3QiLCJhbGciOiJub25lIn0.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.
]]></artwork></figure>

<t>For the purpose of a simpler example in Figure 5, an unsecured token
was shown.  When SETs are not signed or encrypted, the Event Receiver
MUST employ other mechanisms such as TLS and HTTP to provide
integrity, confidentiality, and issuer validation, as needed by the
application.</t>

<t>When validation (i.e. auditing), or additional transmission security
is required, JWS signing and/or JWE encryption MAY be used.  To
create and or validate a signed and/or encrypted SET, follow the
instructions in Section 7 of <xref target="RFC7519"></xref>.</t>

</section>
</section>
<section anchor="related-events" title="Related Events">
<t>In order to accommodate use cases that require communicating multiple
related security events to an Event Receiver, this section defines the
“Related Events” event type.  A Related Events event is essentially a
container for two or more events that are related to one another, in that
they represent or express different aspects of the same event or state
change.  The Related Events event SHOULD NOT be used to combine unrelated
events into a single set, and MUST NOT be used as a general purpose batch
transmission mechanism.  Profiling Specifications that require an event
grouping mechanism with these or other semantics are encouraged to define
additional event types for their use cases.</t>

<t>The event type for the Related Events event is the URN
“urn:ietf:secevents:related_events”.</t>

<t>The Related Events event has a single additional event payload claim:</t>

<t><list style="hanging">
  <t hangText='events'><vspace blankLines='0'/>
  An array of event payloads, as defined in this document.  These event
payloads can be referred to as Nested Events for the Related Events event.
This claim is REQUIRED.</t>
</list></t>

<section anchor="related-events-proc" title="Processing Related Events">
<t>Nested Events can inherit the “event_id”, “event_subject”, and “event_time”
claims from the Related Events payload.  Transmitters MAY omit some, all, or
none of these claims from a Nested Event.  Transmitters MAY omit claims from
some Nested Events and include them in others within the same Related Events
event. When a claim is omitted, recipients MUST use the value of the
corresponding claim in the Related Event event’s payload.</t>

<t>The following is a non-normative example of a SET containing a Related
Events event:</t>

<figure title="Example SET Containing A Related Events Event" anchor="figrelated"><artwork><![CDATA[
{
  "jti": "1c0038c2-02db-40de-ad50-122a64724166",
  "iss": "https://transmitter.example.com",
  "aud": [ "https://receiver.example.com" ],
  "iat": 1510666261,
  "event": {
    "event_type": "urn:ietf:secevent:related_events",
    "event_subject": {
      "identifier_type": "email",
      "email": "user@example.com"
    },
    "event_id": "container",
    "event_time": 1510662661,
    "events": [
      {
        "event_id": "nested_1",
        "event_type": "http://specs.example.com/set_profile/event_1"
      },
      {
        "event_id": "nested_2",
        "event_type": "http://specs.example.com/set_profile/event_2",
        "event_time": 151059061
      }
    ]
  }
}
]]></artwork></figure>

<t>The following table demonstrates how Nested Events inherit values for
omitted claims:</t>

<figure title="Example of Event Payloads Inheriting Values for Omitted Claims" anchor="figomitted"><artwork><![CDATA[
         +-----------+------------+-------------------------------+         
         | Event ID  | Event Time | Event Subject                 |
         +-----------+------------+-------------------------------+
         | container | 151062661  | {                             |
         +-----------+            |   "identifier_type": "email", |
         | nested_1  |            |   "email": "user@example.com" |
         +-----------+------------+ }                             |
         | nested_2  | 151059061  |                               |
         +-----------+------------+-------------------------------+
]]></artwork></figure>

<t>Since the Nested Event with event ID “nested_1” omits the “event_time”
claim, it inherits the event time from the Related Events event payload.
Similarly, since both Nested Events “nested_1” and “nested_2” omit the
“event_subject” claim, both inherit the event subject from the Related
Events event payload.</t>

</section>
</section>
<section anchor="profile-req" title="Requirements for SET Profiles">
<t>Profiling Specifications for SETs define the syntax and semantics of
SETs conforming to that SET profile and rules for validating those
SETs.  The syntax defined by Profiling Specifications includes what
SET envelope and event payload claims are used by SETs expressing and
event defined by the profile.</t>

<t>Defining the semantics of the SET contents for SETs utilizing the
profile is equally important.  Possibly most important is defining
the procedures used to validate the SET issuer and to obtain the keys
controlled by the issuer that were used for cryptographic operations
used in the JWT representing the SET.  For instance, some profiles
may define an algorithm for retrieving the SET issuer’s keys that
uses the “iss” claim value as its input.  Likewise, if the profile
allows (or requires) that the JWT be unsecured, the means by which
the integrity of the JWT is ensured MUST be specified.</t>

<t>Profiling Specifications MUST define how the event Subject is
identified in the SET, as well as how to differentiate between the
event Subject’s Issuer and the SET Issuer, if applicable.  It is NOT
RECOMMENDED for Profiling Specifications to use the “sub” claim 
defined in <xref target="RFC7519"></xref> in cases in which the Subject is not globally
unique and has a different Issuer from the SET itself.</t>

<t>Profiling Specifications MUST clearly specify the steps that a
recipient of a SET utilizing that profile MUST perform to validate
that the SET is both syntactically and semantically valid.</t>

<section anchor="extensions" title="Extending Events">
<t>As needs change and new use cases develop, it may be desirable to augment
existing event definitions with new claims. In order to avoid collisions,
Profiling Specifications that extend existing events with additional event
payload claims SHOULD use Collision-Resistant Names as defined in Section 2
of <xref target="RFC7519"></xref> for the names of the new claims.</t>

</section>
</section>
<section anchor="security" title="Security Considerations">

<section anchor="c-and-i" title="Confidentiality and Integrity">
<t>SETs may often contain sensitive information.  Therefore, methods for
distribution of events SHOULD require the use of a transport-layer
security mechanism when distributing events.  Parties MUST support
TLS 1.2 <xref target="RFC5246"></xref> and MAY support additional transport-layer
mechanisms meeting its security requirements.  When using TLS, the
client MUST perform a TLS/SSL server certificate check, per
<xref target="RFC6125"></xref>.  Implementation security considerations for TLS can be
found in “Recommendations for Secure Use of TLS and DTLS” <xref target="RFC7525"></xref>.</t>

<t>Security Events distributed through third-parties or that carry
personally identifiable information, SHOULD be encrypted using JWE
<xref target="RFC7516"></xref> or secured for confidentiality by other means.</t>

<t>Unless integrity of the JWT is ensured by other means, it MUST be
signed using JWS <xref target="RFC7515"></xref> so that individual events can be
authenticated and validated by the Event Receiver.</t>

</section>
<section anchor="delivery" title="Delivery">
<t>This specification does not define a delivery mechanism by itself.
In addition to confidentiality and integrity (discussed above),
implementers and Profiling Specifications MUST consider the
consequences of delivery mechanisms that are not secure and/or not
assured.  For example, while a SET may be end-to-end secured using
JWE encrypted SETs, without TLS there is no assurance that the
correct endpoint received the SET and that it could be successfully
processed.</t>

</section>
<section anchor="sequencing" title="Sequencing">
<t>As defined in this specification, there is no defined way to order
multiple SETs in a sequence.  Depending on the type and nature of SET
event, order may or may not matter.  For example, in provisioning,
event order is critical – an object could not be modified before it
was created.  In other SET types, such as a token revocation, the
order of SETs for revoked tokens does not matter.  If however, the
event was described as a log-in or logged-out status for a user
subject, then order becomes important.</t>

<t>Profiling Specifications and implementers SHOULD take caution when
using timestamps such as “iat” to define order.  Distributed systems
will have some amount of clock-skew and thus time by itself will not
guarantee order.</t>

<t>Specifications profiling SET SHOULD define a mechanism for detecting
order or sequence of events.</t>

</section>
<section anchor="timing" title="Timing Issues">
<t>When SETs are delivered asynchronously and/or out-of-band with
respect to the original action that incurred the security event, it
is important to consider that a SET might be delivered to an Event
Receiver in advance or well behind the process that caused the event.
For example, a user having been required to logout and then log back
in again, may cause a logout SET to be issued that may arrive at the
same time as the user-agent accesses a web site having just logged-
in.  If timing is not handled properly, the effect would be to
erroneously treat the new user session as logged out.  Profiling
Specifications SHOULD be careful to anticipate timing and subject
selection information.  For example, it might be more appropriate to
cancel a “session” rather than a “user”.  Alternatively, the
specification could use timestamps that allows new sessions to be
started immediately after a stated logout event time.</t>

</section>
<section anchor="not-id-tokens" title="Distinguishing SETs from ID Tokens">
<t>Because <xref target="RFC7519"></xref> states that “all claims that are not understood by
implementations MUST be ignored”, there is a consideration that a SET
token might be confused with ID Token <xref target="OpenID.Core"></xref> if a SET is
mistakenly or intentionally used in a context requiring an ID Token.
If a SET could otherwise be interpreted as a valid ID Token (because
it includes the required claims for an ID Token and valid issuer and
audience claim values for an ID Token) then that SET profile MUST
require that the “exp” claim not be present in the SET.  Because
“exp” is a required claim in ID Tokens, valid ID Token
implementations will reject such a SET if presented as if it were an
ID Token.</t>

<t>Excluding “exp” from SETs that could otherwise be confused with ID
Tokens is actually defense in depth.  In any OpenID Connect contexts
in which an attacker could attempt to substitute a SET for an ID
Token, the SET would actually already be rejected as an ID Token
because it would not contain the correct “nonce” claim value for the
ID Token to be accepted in contexts for which substitution is
possible.</t>

<t>Note that the use of explicit typing, as described in Section 2.2,
will not achieve disambiguation between ID Tokens and SETs, as the ID
Token validation rules do not use the “typ” header parameter value.</t>

</section>
<section anchor="not-access-tokens" title="Distinguishing SETs from Access Tokens">
<t>OAuth 2.0 <xref target="RFC6749"></xref> defines access tokens as being opaque.
Nonetheless, some implementations implement access tokens as JWTs.
Because the structure of these JWTs is implementation-specific,
ensuring that a SET cannot be confused with such an access token is
therefore likewise, in general, implementation specific.
Nonetheless, it is recommended that SET profiles employ the following
strategies to prevent possible substitutions of SETs for access
tokens in contexts in which that might be possible:</t>

<t><list style="symbols">
  <t>Prohibit use of the “exp” claim, as is done to prevent ID Token
confusion.</t>
  <t>Where possible, use a separate “aud” claim value to distinguish
between the Event Receiver and the protected resource that is the
audience of an access token.</t>
  <t>Modify access token validation systems to check for the presence
of the “events” claim as a means to detect security event tokens.
This is particularly useful if the same endpoint may receive both
types of tokens.</t>
  <t>Employ explicit typing, as described in Section 2.2, and modify
access token validation systems to use the “typ” header parameter
value.</t>
</list></t>

</section>
<section anchor="not-other-jwts" title="Distinguishing SETs from other kinds of JWTs">
<t>JWTs are now being used in application areas beyond the identity
applications in which they first appeared.  For instance, the Session
Initiation Protocol (SIP) Via Header Field <xref target="RFC8055"></xref> and Personal
Assertion Token (PASSporT) <xref target="I-D.ietf-stir-passport"></xref> specifications
both define JWT profiles that use mostly or completely different sets
of claims than are used by ID Tokens.  If it would otherwise be
possible for an attacker to substitute a SET for one of these (or
other) kinds of JWTs, then the SET profile must be defined in such a
way that any substituted SET will result in its rejection when
validated as the intended kind of JWT.</t>

<t>The most direct way to prevent confusion is to employ explicit
typing, as described in Section 2.2, and modify applicable token
validation systems to use the “typ” header parameter value.  This
approach can be employed for new systems but may not be applicable to
existing systems.</t>

<t>Another way to ensure that a SET is not confused with another kind of
JWT is to have the JWT validation logic reject JWTs containing an
“events” claim unless the JWT is intended to be a SET.  This approach
can be employed for new systems but may not be applicable to existing
systems.</t>

<t>For many use cases, the simplest way to prevent substitution is
requiring that the SET not include claims that are required for the
kind of JWT that might be the target of an attack.  For example, for
<xref target="RFC8055"></xref>, the “sip_callid” claim could be omitted and for
<xref target="I-D.ietf-stir-passport"></xref>, the “orig” claim could be omitted.</t>

<t>In many contexts, simple measures such as these will accomplish the
task, should confusion otherwise even be possible.  Note that this
topic is being explored in a more general fashion in JSON Web Token
Best Current Practices <xref target="I-D.sheffer-oauth-jwt-bcp"></xref>.  The proposed
best practices in that draft may also be applicable for particular
SET profiles and use cases.</t>

</section>
</section>
<section anchor="privacy" title="Privacy Considerations">
<t>If a SET needs to be retained for audit purposes, JWS MAY be used to
provide verification of its authenticity.</t>

<t>Event Transmitters SHOULD attempt to specialize feeds so that the
content is targeted to the specific business and protocol needs of an
Event Receiver.</t>

<t>When sharing personally identifiable information or information that
is otherwise considered confidential to affected users, Event
Transmitters and Receivers MUST have the appropriate legal agreements
and user consent or terms of service in place.</t>

<t>The propagation of subject identifiers can be perceived as personally
identifiable information.  Where possible, Event Transmitters and
Receivers SHOULD devise approaches that prevent propagation – for
example, the passing of a hash value that requires the Event Receiver
to know the subject.</t>

</section>
<section anchor="iana" title="IANA Considerations">

<section anchor="iana-sit" title="SET Subject Identifier Types Registry">
<t>This section establishes the IANA “SET Subject Identifier Types” registry
// TODO</t>

</section>
<section anchor="iana-claims" title="JSON Web Token Claims Registration">
<t>This specification registers the “event” claim in the IANA “JSON Web Token
Claims” registry <xref target="IANA.JWT.Claims"></xref> established by <xref target="RFC7519"></xref>.</t>

<section anchor="registry-contents" title="Registry Contents">
<t><list style="symbols">
  <t>Claim Name: “event”</t>
  <t>Claim Description: Security Event Payload</t>
  <t>Change Controller: IESG</t>
  <t>Specification Document(s): Section 2.1 of [[ this specification ]]</t>
</list></t>

</section>
</section>
<section anchor="iana-media-type" title="Media Type Registration">

<section anchor="registry-contents-1" title="Registry Contents">
<t>This section registers the “application/secevent+jwt” media type
<xref target="RFC2046"></xref> in the “Media Types” registry <xref target="IANA.MediaTypes"></xref> in the
manner described in <xref target="RFC6838"></xref>, which can be used to indicate that the
content is a SET.</t>

<t><list style="symbols">
  <t>Type name: application</t>
  <t>Subtype name: secevent+jwt</t>
  <t>Required parameters: n/a</t>
  <t>Optional parameters: n/a</t>
  <t>Encoding considerations: 8bit; A SET is a JWT; JWT values are
encoded as a series of base64url-encoded values (some of which may
be the empty string) separated by period (‘.’) characters.</t>
  <t>Security considerations: See the Security Considerations section
of [[ this specification ]]</t>
  <t>Interoperability considerations: n/a</t>
  <t>Published specification: Section 2.2 of [[ this specification ]]</t>
  <t>Applications that use this media type: TBD</t>
  <t>Fragment identifier considerations: n/a</t>
  <t>Additional information:</t>
  <t>Magic number(s): n/a</t>
  <t>File extension(s): n/a</t>
  <t>Macintosh file type code(s): n/a</t>
  <t>Person &amp; email address to contact for further information:
Michael B. Jones, mbj@microsoft.com</t>
  <t>Intended usage: COMMON</t>
  <t>Restrictions on usage: none</t>
  <t>Author: Michael B. Jones, mbj@microsoft.com</t>
  <t>Change controller: IESG</t>
  <t>Provisional registration?  No</t>
</list></t>

</section>
</section>
</section>


  </middle>

  <back>

    <references title='Normative References'>

<reference anchor="IANA.JWT.Claims" target="http://www.iana.org/assignments/jwt">
  <front>
    <title>JSON Web Token Claims</title>
    <author >
      <organization>IANA</organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="IANA.MediaTypes" target="http://www.iana.org/assignments/media-types">
  <front>
    <title>Media Types</title>
    <author >
      <organization>IANA</organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>




<reference  anchor="RFC2119" target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author initials='S.' surname='Bradner' fullname='S. Bradner'><organization /></author>
<date year='1997' month='March' />
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference  anchor="RFC3986" target='https://www.rfc-editor.org/info/rfc3986'>
<front>
<title>Uniform Resource Identifier (URI): Generic Syntax</title>
<author initials='T.' surname='Berners-Lee' fullname='T. Berners-Lee'><organization /></author>
<author initials='R.' surname='Fielding' fullname='R. Fielding'><organization /></author>
<author initials='L.' surname='Masinter' fullname='L. Masinter'><organization /></author>
<date year='2005' month='January' />
<abstract><t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource.  This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet.  The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier.  This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='STD' value='66'/>
<seriesInfo name='RFC' value='3986'/>
<seriesInfo name='DOI' value='10.17487/RFC3986'/>
</reference>



<reference  anchor="RFC5246" target='https://www.rfc-editor.org/info/rfc5246'>
<front>
<title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
<author initials='T.' surname='Dierks' fullname='T. Dierks'><organization /></author>
<author initials='E.' surname='Rescorla' fullname='E. Rescorla'><organization /></author>
<date year='2008' month='August' />
<abstract><t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol.  The TLS protocol provides communications security over the Internet.  The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5246'/>
<seriesInfo name='DOI' value='10.17487/RFC5246'/>
</reference>



<reference  anchor="RFC5322" target='https://www.rfc-editor.org/info/rfc5322'>
<front>
<title>Internet Message Format</title>
<author initials='P.' surname='Resnick' fullname='P. Resnick' role='editor'><organization /></author>
<date year='2008' month='October' />
<abstract><t>This document specifies the Internet Message Format (IMF), a syntax for text messages that are sent between computer users, within the framework of &quot;electronic mail&quot; messages.  This specification is a revision of Request For Comments (RFC) 2822, which itself superseded Request For Comments (RFC) 822, &quot;Standard for the Format of ARPA Internet Text Messages&quot;, updating it to reflect current practice and incorporating incremental changes that were specified in other RFCs.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5322'/>
<seriesInfo name='DOI' value='10.17487/RFC5322'/>
</reference>



<reference  anchor="RFC6125" target='https://www.rfc-editor.org/info/rfc6125'>
<front>
<title>Representation and Verification of Domain-Based Application Service Identity within Internet Public Key Infrastructure Using X.509 (PKIX) Certificates in the Context of Transport Layer Security (TLS)</title>
<author initials='P.' surname='Saint-Andre' fullname='P. Saint-Andre'><organization /></author>
<author initials='J.' surname='Hodges' fullname='J. Hodges'><organization /></author>
<date year='2011' month='March' />
<abstract><t>Many application technologies enable secure communication between two entities by means of Internet Public Key Infrastructure Using X.509 (PKIX) certificates in the context of Transport Layer Security (TLS). This document specifies procedures for representing and verifying the identity of application services in such interactions.   [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='6125'/>
<seriesInfo name='DOI' value='10.17487/RFC6125'/>
</reference>



<reference  anchor="RFC6749" target='https://www.rfc-editor.org/info/rfc6749'>
<front>
<title>The OAuth 2.0 Authorization Framework</title>
<author initials='D.' surname='Hardt' fullname='D. Hardt' role='editor'><organization /></author>
<date year='2012' month='October' />
<abstract><t>The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf.  This specification replaces and obsoletes the OAuth 1.0 protocol described in RFC 5849.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='6749'/>
<seriesInfo name='DOI' value='10.17487/RFC6749'/>
</reference>



<reference  anchor="RFC7519" target='https://www.rfc-editor.org/info/rfc7519'>
<front>
<title>JSON Web Token (JWT)</title>
<author initials='M.' surname='Jones' fullname='M. Jones'><organization /></author>
<author initials='J.' surname='Bradley' fullname='J. Bradley'><organization /></author>
<author initials='N.' surname='Sakimura' fullname='N. Sakimura'><organization /></author>
<date year='2015' month='May' />
<abstract><t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties.  The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t></abstract>
</front>
<seriesInfo name='RFC' value='7519'/>
<seriesInfo name='DOI' value='10.17487/RFC7519'/>
</reference>



<reference  anchor="RFC7525" target='https://www.rfc-editor.org/info/rfc7525'>
<front>
<title>Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
<author initials='Y.' surname='Sheffer' fullname='Y. Sheffer'><organization /></author>
<author initials='R.' surname='Holz' fullname='R. Holz'><organization /></author>
<author initials='P.' surname='Saint-Andre' fullname='P. Saint-Andre'><organization /></author>
<date year='2015' month='May' />
<abstract><t>Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) are widely used to protect data exchanged over application protocols such as HTTP, SMTP, IMAP, POP, SIP, and XMPP.  Over the last few years, several serious attacks on TLS have emerged, including attacks on its most commonly used cipher suites and their modes of operation.  This document provides recommendations for improving the security of deployed services that use TLS and DTLS. The recommendations are applicable to the majority of use cases.</t></abstract>
</front>
<seriesInfo name='BCP' value='195'/>
<seriesInfo name='RFC' value='7525'/>
<seriesInfo name='DOI' value='10.17487/RFC7525'/>
</reference>


<reference anchor="E.164" target="http://www.itu.int/rec/T-REC-E.164-201011-I/en">
  <front>
    <title>The international public telecommunication numbering plan</title>
    <author >
      <organization>International Telecommunication Union</organization>
    </author>
    <date year="2010"/>
  </front>
</reference>


    </references>

    <references title='Informative References'>





<reference anchor="I-D.ietf-stir-passport">
<front>
<title>Personal Assertion Token (PASSporT)</title>

<author initials='C' surname='Wendt' fullname='Chris Wendt'>
    <organization />
</author>

<author initials='J' surname='Peterson' fullname='Jon Peterson'>
    <organization />
</author>

<date month='February' day='9' year='2017' />

<abstract><t>This document defines a method for creating and validating a token that cryptographically verifies an originating identity, or more generally a URI or telephone number representing the originator of personal communications.  The PASSporT token is cryptographically signed to protect the integrity of the identity the originator and to verify the assertion of the identity information at the destination. The cryptographic signature is defined with the intention that it can confidently verify the originating persona even when the signature is sent to the destination party over an insecure channel.  PASSporT is particularly useful for many personal communications applications over IP networks and other multi-hop interconnection scenarios where the originating and destination parties may not have a direct trusted relationship.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-ietf-stir-passport-11' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-ietf-stir-passport-11.txt' />
</reference>



<reference anchor="I-D.sheffer-oauth-jwt-bcp">
<front>
<title>JSON Web Token Best Current Practices</title>

<author initials='Y' surname='Sheffer' fullname='Yaron Sheffer'>
    <organization />
</author>

<author initials='D' surname='Hardt' fullname='Dick Hardt'>
    <organization />
</author>

<author initials='M' surname='Jones' fullname='Michael Jones'>
    <organization />
</author>

<date month='July' day='3' year='2017' />

<abstract><t>JSON Web Tokens, also known as JWTs [RFC7519], are URL-safe JSON- based security tokens that contain a set of claims that can be signed and/or encrypted.  JWTs are being widely used and deployed as a simple security token format in numerous protocols and applications, both in the area of digital identity, and in other application areas. The goal of this Best Current Practices document is to provide actionable guidance leading to secure implementation and deployment of JWTs.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-sheffer-oauth-jwt-bcp-01' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-sheffer-oauth-jwt-bcp-01.txt' />
</reference>


<reference anchor="OpenID.Core" target="http://openid.net/specs/openid-connect-core-1_0.html">
  <front>
    <title>OpenID Connect Core 1.0</title>
    <author >
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>




<reference  anchor="RFC2046" target='https://www.rfc-editor.org/info/rfc2046'>
<front>
<title>Multipurpose Internet Mail Extensions (MIME) Part Two: Media Types</title>
<author initials='N.' surname='Freed' fullname='N. Freed'><organization /></author>
<author initials='N.' surname='Borenstein' fullname='N. Borenstein'><organization /></author>
<date year='1996' month='November' />
<abstract><t>This second document defines the general structure of the MIME media typing system and defines an initial set of media types.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='2046'/>
<seriesInfo name='DOI' value='10.17487/RFC2046'/>
</reference>



<reference  anchor="RFC6838" target='https://www.rfc-editor.org/info/rfc6838'>
<front>
<title>Media Type Specifications and Registration Procedures</title>
<author initials='N.' surname='Freed' fullname='N. Freed'><organization /></author>
<author initials='J.' surname='Klensin' fullname='J. Klensin'><organization /></author>
<author initials='T.' surname='Hansen' fullname='T. Hansen'><organization /></author>
<date year='2013' month='January' />
<abstract><t>This document defines procedures for the specification and registration of media types for use in HTTP, MIME, and other Internet protocols.  This memo documents an Internet Best Current Practice.</t></abstract>
</front>
<seriesInfo name='BCP' value='13'/>
<seriesInfo name='RFC' value='6838'/>
<seriesInfo name='DOI' value='10.17487/RFC6838'/>
</reference>



<reference  anchor="RFC7515" target='https://www.rfc-editor.org/info/rfc7515'>
<front>
<title>JSON Web Signature (JWS)</title>
<author initials='M.' surname='Jones' fullname='M. Jones'><organization /></author>
<author initials='J.' surname='Bradley' fullname='J. Bradley'><organization /></author>
<author initials='N.' surname='Sakimura' fullname='N. Sakimura'><organization /></author>
<date year='2015' month='May' />
<abstract><t>JSON Web Signature (JWS) represents content secured with digital signatures or Message Authentication Codes (MACs) using JSON-based data structures.  Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and an IANA registry defined by that specification.  Related encryption capabilities are described in the separate JSON Web Encryption (JWE) specification.</t></abstract>
</front>
<seriesInfo name='RFC' value='7515'/>
<seriesInfo name='DOI' value='10.17487/RFC7515'/>
</reference>



<reference  anchor="RFC7516" target='https://www.rfc-editor.org/info/rfc7516'>
<front>
<title>JSON Web Encryption (JWE)</title>
<author initials='M.' surname='Jones' fullname='M. Jones'><organization /></author>
<author initials='J.' surname='Hildebrand' fullname='J. Hildebrand'><organization /></author>
<date year='2015' month='May' />
<abstract><t>JSON Web Encryption (JWE) represents encrypted content using JSON-based data structures.  Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and IANA registries defined by that specification.  Related digital signature and Message Authentication Code (MAC) capabilities are described in the separate JSON Web Signature (JWS) specification.</t></abstract>
</front>
<seriesInfo name='RFC' value='7516'/>
<seriesInfo name='DOI' value='10.17487/RFC7516'/>
</reference>



<reference  anchor="RFC8055" target='https://www.rfc-editor.org/info/rfc8055'>
<front>
<title>Session Initiation Protocol (SIP) Via Header Field Parameter to Indicate Received Realm</title>
<author initials='C.' surname='Holmberg' fullname='C. Holmberg'><organization /></author>
<author initials='Y.' surname='Jiang' fullname='Y. Jiang'><organization /></author>
<date year='2017' month='January' />
<abstract><t>This specification defines a new Session Initiation Protocol (SIP) Via header field parameter, 'received-realm', which allows a SIP entity acting as an entry point to a transit network to indicate from which adjacent upstream network a SIP request is received by using a network realm value associated with the adjacent network.</t></abstract>
</front>
<seriesInfo name='RFC' value='8055'/>
<seriesInfo name='DOI' value='10.17487/RFC8055'/>
</reference>




    </references>


<section anchor="ack" title="Acknowledgments">
<t>The editors would like to thank the participants on the IETF secevent
mailing list and related working groups for their support of this
specification.</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

