<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.2.6 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>

<rfc ipr="trust200902" docName="draft-birkholz-attestation-terminology-01" category="info">

  <front>
    <title abbrev="RATS Terminology">Reference Terminology for Remote Attestation Procedures</title>

    <author initials="H." surname="Birkholz" fullname="Henk Birkholz">
      <organization abbrev="Fraunhofer SIT">Fraunhofer SIT</organization>
      <address>
        <postal>
          <street>Rheinstrasse 75</street>
          <city>Darmstadt</city>
          <code>64295</code>
          <country>Germany</country>
        </postal>
        <email>henk.birkholz@sit.fraunhofer.de</email>
      </address>
    </author>
    <author initials="M." surname="Wiseman" fullname="Monty Wiseman">
      <organization abbrev="GE Global Research">GE Global Research</organization>
      <address>
        <postal>
          <street></street>
          <city></city>
          <region></region>
          <code></code>
          <country>USA</country>
        </postal>
        <email>monty.wiseman@ge.com</email>
      </address>
    </author>
    <author initials="H." surname="Tschofenig" fullname="Hannes Tschofenig">
      <organization abbrev="ARM Ltd.">ARM Ltd.</organization>
      <address>
        <postal>
          <street>110 Fulbourn Rd</street>
          <city>Cambridge</city>
          <code>CB1 9NJ</code>
          <country>UK</country>
        </postal>
        <email>hannes.tschofenig@gmx.net</email>
      </address>
    </author>

    <date year="2018" month="January" day="04"/>

    <area>Security</area>
    
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>This document is intended to illustrate and remediate the impedance mismatch of terms related to
remote attestation procedures used in different domains today. New terms defined by this document
provide a consolidated basis to support future work on attestation procedures in the IETF and
beyond.</t>



    </abstract>


  </front>

  <middle>


<section anchor="introduction" title="Introduction">

<t>During its evolution, the term Remote Attestation has been used in multiple contexts and multiple
scopes and in consequence accumulated various connotations with slightly different semantic meaning.
Correspondingly, Remote Attestation Procedures (RATS) are employed in various usage scenarios and
different environments.</t>

<t>In order to better understand and grasp the intend and meaning of specific RATS in the scope of the
security area - including the requirements that are addressed by them - this document provides an
overview of existing work, its background, and common terminology. As the contribution, from that
state-of-the-art a set of terms that provides a stable basis for future work on RATS in the IETF is
derived.</t>

<t>The primary application of RATS is to increase the trust and confidence in the integrity of the
object characteristics and properties of a system entity that is intended to interact and exchange
data with other system entities remotely. How an objects’s characteristics are attested remotely and
which characteristics are actually chosen to be attested varies with the requirements of the use
cases, or -– in essence –- depends on the risk that is intended to be mitigated via RATS.
Effectively, RATS are a vital tool to be used to increase the confidence in the level of trust of a
system that is supposed to be a trusted system.</t>

<t>In the remainder of this document a system that is capable to provide an appropriate amount of
information about its integrity is considered to be a trustworthy system - or simply trustworthy.</t>

<t>The primary characteristics of a trustworthy system are commonly based on information about the
integrity of its intended composition, its enrolled and subsequently installed software components,
and the scope of known valid states that a trustworthy system is supposed to operate in.</t>

<t>It is important to note that the activity of attestation itself in principle only provides the
evidence that proves the integrity of a (subset) of a system’s object characteristics. The provided
evidence is used as a basis for further activities. Specific RATS define the higher semantic context
about how the evidence is utilized and what RATS actually can accomplish; and what they cannot
accomplish, correspondingly. Hence, this document is also intended to provide a map of terms,
concepts and applications that illustrate the ecosystem of current applications of RATS.</t>

<t>In essence, a prerequisite for providing an adequate set of terms and definitions in the domain of
RATS is a general understanding and a common definitions of “what” RATS can accomplish “how” RATS
can to be used.</t>

<t>Please note that this document is still missing multiple reference and is considered “under
construction”. The majority of definitions is still only originating from IETF work. Future
iterations will pull in more complementary definitions from other SDO (e.g. Global Platform, TCG,
etc.) and a general structure template to highlight semantic relationships and capable of resolving
potential discrepancies will be introduced. A section of context awareness will provide further
insight on how attestation procedures are vital to ongoing work in the IETF (e.g. I2NSF &amp; tokbind).
The definitions in the section about RATS are still self-describing in this version. Additional explanatory text will be added to provide more context and coherence.</t>

<section anchor="requirements-notation" title="Requirements notation">

<t>The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL NOT”,
“SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “NOT RECOMMENDED”, “MAY”, and
“OPTIONAL” in this document are to be interpreted as described in RFC
2119, BCP 14 <xref target="RFC2119"/>.</t>

</section>
</section>
<section anchor="basic-roles-of-rats" title="Basic Roles of RATS">

<t>The use of the term Remote Attestation Procedures always implies the involvement of at least two
parties that each take on a specific role in corresponding RATS – the Attestee role and the Verifier
role. Depending on the object characteristics attested and the nature of the parties, information is
exchanged via specific types of Interconnects between them. The type of interconnect ranges from GIO
pins, to a bus component, to the Internet, or from a direct physical connection, to a wireless
association, to a world wide mesh of peers. In other words, virtually every kind communication path
(Interconnect) can be used by system entities that take on the role of Attestee and Verifier (in
fact, a single party can take on both roles at the same time, but there is only a limited use to
this architecture).</t>

<t><list style="hanging">
  <t hangText='Attestee:'>
  The role that designates the subject of the remote attestation. A system entity that is the
provider of evidence takes on the role of an Attestee.</t>
  <t hangText='Verifier:'>
  The role that designates the system entity that is the appraiser of the evidence provided by the
Attestee. A system entity that is the consumer of evidence takes on the role of a Verifier.</t>
  <t hangText='Interconnect:'>
  A channel of communication between Attestee and Verifier that enables the appraisal of evidence
created by the Attestee by a remote Verifier.</t>
</list></t>

</section>
<section anchor="computing-context" title="Computing Context">

<t>This section introduces the term Computing Context in order to simplify the definition of RATS
terminology.</t>

<t>The number of approaches and solutions to create things that provide the same capabilities as a
“simple physical device” continuously increases. Examples include but are not limited to: the
compartmentalization of physical resources, the separation of software instances with different
dependencies in dedicated containers, and the nesting of virtual components via hardware-based and
software-based solutions.</t>

<t>System entities are composed of system entities. In essence, every physical or logical device is a
composite of system entities. In consequence, a composite device also constitutes a system entity.
Every component in that composite is a potential Computing Context capable of taking on the roles of
Attestee or Verifier. The scope and application of these roles can range from:</t>

<t><list style="symbols">
  <t>continuous mutual attestation procedures of every system entity inside a composite device, to</t>
  <t>sporadic remote attestation of unknown parties via heterogeneous Interconnects.</t>
</list></t>

<t>Analogously, the increasing number of features and functions that constitute components of a device
start to blur the lines that are required to categorize each solution and approach precisely. To
address this increasingly challenging categorization, the term Computing Context defines the
characteristics of the system entities that can take on the role of an Attestee and/or the role of a
Verifier. This approach is intended to provide a stable basis of definitions for future solutions
that continuous to remain viable long-term.</t>

<t><list style="hanging">
  <t hangText='Computing Context :'>
  An umbrella term that combines the scope of the definitions of endpoint [ref NEA], device [ref
1ar], and thing [ref t2trg], including hardware-based and software-based sub-contexts that
constitute independent, isolated and distinguishable slices of a Computing Context created by
compartmentalization mechanisms, such as Trusted Execution Environments (TEE), Hardware Security
Modules (HSM) or Virtual Network Function (VNF) contexts.</t>
</list></t>

<section anchor="formal-semantic-relationships" title="Formal Semantic Relationships">

<t>The formal semantic relationship of a Computing Context and the definitions provided by RFC 4949 is
a as follows.</t>

<t>The scope of the term computing context encompasses</t>

<t><list style="symbols">
  <t>an information system,</t>
  <t>an object and in consequence a system component or a composite of system sub-components, and</t>
  <t>a system entity or a composite of system entities.</t>
</list></t>

<t>Analogously, a sub-context is a subsystem and as with system components, computing contexts can be
nested and therefore be physical system components or logical (“virtual”) system (sub-)components.</t>

<t>The formal semantic relationship is based on the following definitions from RFC 4949.</t>

<t><list style="hanging">
  <t hangText='(Information) System:'>
  An organized assembly of computing and communication resources and procedures – i.e., equipment and services, together with their supporting infrastructure, facilities, and personnel – that create, collect, record, process, store, transport, retrieve, display, disseminate, control, or dispose of information to accomplish a specified set of functions.</t>
  <t hangText='Object:'>
  A system component that contains or receives information.</t>
  <t hangText='Subsystem:'>
  A collection of related system components that together perform a system function or deliver a system service.</t>
  <t hangText='System Component:'>
  A collection of system resources that (a) forms a physical or logical part of the system, (b) has specified functions and interfaces, and (c) is treated (e.g., by policies or specifications) as existing independently of other parts of the system. (See: subsystem.)</t>
  <t>An identifiable and self-contained part of a Target of Evaluation.</t>
  <t hangText='System Entity:'>
  An active part of a system – […] (see: subsystem) – that has a specific set of capabilities.</t>
</list></t>

</section>
<section anchor="characteristics-of-a-computing-context" title="Characteristics of a Computing Context">

<t>While the semantic relationships highlighted above constitute the fundamental basis to provide a
define Computing Context, the following list of object characteristics is intended to improve the
application of the term and provide a better understanding of its meaning:</t>

<t>A computing context:</t>

<t><list style="symbols">
  <t>provides its own independent environment in regard to executing and running software,</t>
  <t>provides its own isolated control plane state (by potentially interacting with other Computing</t>
  <t>Contexts) and may provide a dedicated management interface by which control plane behavior can be effected,</t>
  <t>can be identified uniquely and therefore reliably differentiated in a given scope, and</t>
  <t>does not necessarily has to include a network interface with associated network addresses (as required, e.g. by the definition of an endpoint) – although it is very likely to have (access to) one.</t>
</list></t>

<t>In contrast, a docker [ref docker, find a more general term here] context is not a distinguishable
isolated slice of an information system and therefore is not an independent Computing Context. [more
feedback on this statement is required as the capabilities of docker-like functions evolve
continuously]</t>

<t>Examples include: a smart phone, a nested virtual machine, a virtualized firewall function running distributed on a cluster of physical and virtual nodes, or a trust-zone.</t>

</section>
</section>
<section anchor="computing-context-identity" title="Computing Context Identity">

<t>The identity of a Computing Context provides the basis for creating evidence about data origin authenticity. Confidence in
the identity assurance level [NIST SP-800-63-3] or the assurance levels for identity authentication
<xref target="RFC4949"/> impacts the confidence in the evidence an Attestee provides.</t>

</section>
<section anchor="attestation-workflow" title="Attestation Workflow">

<t>This section introduces terms and definitions that are required to illustrate the scope and the
granularity of RATS workflows in the domain of security automation. Terms defined in the following sections will be based on this workflow-related definitions.</t>

<t>In general, RATS are composed of iterative activities that can be conducted in intervals. It is
neither a generic set of actions nor simply a task, because the actual actions to be conducted by
RATS can vary significantly depending on the protocols employed and types of Computing Contexts
involved.</t>

<t><list style="hanging">
  <t hangText='Activity:'>
  A sequence of actions conducted by Computing Contexts that compose a remote attestation procedure. The actual composition of actions can vary, depending on the characteristics of the Computing
Context they are conducted by/in and the protocols used to utilize an Interconnect. A single
activity provides only a minimal amount of semantic context, e.g.defined  by the activity’s
requirements imposed on the Computing Context, or via the set of actions it is composed of.
Example: The conveyance of cryptographic evidence or the appraisal of evidence via imperative
guidance.</t>
  <t hangText='Task:'>
  “A piece of work to be done or undertaken.”</t>
  <t>In the scope of RATS, a task is a procedure to be conducted. Example: A Verifier can be tasked
with the appraisal of evidence originating from a specific type of Computing Contexts providing
appropriate identities.</t>
  <t hangText='Action:'>
  “The accomplishment of a thing usually over a period of time, in stages, or with the possibility
of repetition.”</t>
  <t>In the scope of RATS, an action is the execution of an operation or function in the scope of an
activity conducted by a Computing Context. A single action provides no semantic context by itself,
although it can limit potential semantic contexts of RATS to a specific scope. Example: Signing an
existing public key via a specific openssl library, transmitting data, or receiving data are
actions.</t>
  <t hangText='Procedure:'>
  “A series of actions that are done in a certain way or order.”</t>
  <t>In the scope of RATS, a procedure is a composition of activities (sequences of actions) that is
intended to create a well specified result with a well established semantic context.
Example: The activities of attestation, conveyance and verification compose a remote attestation procedure.</t>
</list></t>

</section>
<section anchor="reference-use-cases" title="Reference Use Cases">

<t>This document provides NNN prominent examples of use cases attestation procedures are intended to address:</t>

<t><list style="symbols">
  <t>Verification of the source integrity of a computing context via data integrity proofing of installed software instances that are executed, and</t>
  <t>Verification of the identity proofing of a computing context.</t>
</list></t>

<t>These use case summary highlighted above is based in the following terms defined in RFC4949 and
complementary sources of terminology:</t>

<t><list style="hanging">
  <t hangText='Assurance:'>
  An attribute of an information system that provides grounds for having confidence that the system
operates such that the system’s security policy is enforced <xref target="RFC4949"></xref> (see Trusted System below).</t>
  <t>In common criteria, assurance is the basis for the metric level of assurance, which represents the
“confidence that a system’s principal security features are reliably implemented”.</t>
  <t>The NIST Handbook [get ref from 4949] notes that the levels of assurance defined in Common Criteria
represent “a degree of confidence, not a true measure of how secure the system actually is. This
distinction is necessary because it is extremely difficult–and in many cases, virtually
impossible–to know exactly how secure a system is.”</t>
  <t>Historically, assurance was well-defined in the Orange Book
[http://csrc.nist.gov/publications/history/dod85.pdf] as “guaranteeing or providing
confidence that the security policy has been implemented correctly and that the protection-relevant
elements of the system do, indeed, accurately mediate and enforce the intent of that policy.  By
extension, assurance must include a guarantee that the trusted portion of the system works only as
intended.”</t>
  <t hangText='Confidence:'>
  The definition of correctness integrity in <xref target="RFC4949"></xref> notes that “source integrity refers to
confidence in data values”.
Hence, confidence in an attestation procedure is referring to the degree of trustworthiness of an
attestation activity that produces evidence (attestee), of an conveyance activity that transfers
evidence (interconnect), and of a verification activity that appraises evidence (verifier), in respect to correctness integrity.</t>
  <t hangText='Identity:'>
  [pull relevant rfc4949 parts here]</t>
  <t hangText='Identity Proofing:'>
  A process that vets and verifies the information that is used to establish the identity of a system entity.</t>
  <t hangText='Source Integrity:'>
  The property that data is trustworthy (i.e., worthy of reliance or trust), based on the trustworthiness of its sources and the trustworthiness of any procedures used for handling data in the system.</t>
  <t hangText='Data Integrity:'>
  (a) The property that data has not been changed, destroyed, or lost in an unauthorized or accidental manner. (See: data integrity service. Compare: correctness integrity, source integrity.)</t>
  <t>(b) The property that information has not been modified or destroyed in an unauthorized manner.</t>
  <t hangText='Correctness:'>
  The property of a system that is guaranteed as the result of formal verification activities.</t>
  <t hangText='Correctness integrity:'>
  The property that the information represented by data is accurate and consistent.</t>
  <t hangText='Verification:'>
  (a) The process of examining information to establish the truth of a claimed fact or value.</t>
  <t>(b) The process of comparing two levels of system specification for proper correspondence, such as comparing a security model with a top-level specification, a top-level specification with source code, or source code with object code.</t>
</list></t>

<section anchor="the-lying-endpoint-problem" title="The Lying Endpoint Problem">

<t>A very prominent goal of attestation procedures – and therefore a suitable example used as reference in this document - is to address the “lying endpoint problem”.</t>

<t>Information created, relayed, or, in essence, emitted by a computing context does not have to be correct. There can be multiple reasons why that is the case and the “lying endpoint problem” represents a scenario, in which the reason is the compromization of computing contexts with malicious intend. A compromised computing context could try to “pretend” to be integer, while actually feeding manipulated information into a security domain, therefore compromising the effectiveness of automated security functions. Attestation – and remote attestation procedures specifically – is an approach intended to identify compromised software instances in computing contexts.</t>

<t>Per definition, a “lying endpoint” cannot be “trusted system”.</t>

<t><list style="hanging">
  <t hangText='Trusted System:'>
  A system that operates as expected, according to design and policy, doing what is required – despite environmental disruption, human user and operator errors, and attacks by hostile parties – and not doing other things.</t>
</list></t>

<t>Remote attestation procedures are intended to enable the consumer of information emitted by an computing context to assess the validity and integrity of the information transferred. The approach is based on the assumption that if evidence can be provided in order to prove the integrity of every software instance installed involved in the activity of creating the emitted information in question, the emitted information can be considered valid and integer.</t>

<t>In contrast, such evidence has to be impossible to create if the software instances used in a computing context are compromised. Attestation activities that are intended to create this evidence therefore also to also provide guarantees about the validity of the evidence they can create.</t>

</section>
<section anchor="who-am-i-a-talking-to" title="Who am I a talking to?">

<t>[working title, write up use case here, ref teep requirements]</t>

</section>
</section>
<section anchor="trustworthiness" title="Trustworthiness">

<t>A “lying endpoint” is not trustworthy.</t>

<t><list style="hanging">
  <t hangText='Trusted System:'>
  A system that operates as expected, according to design and policy, doing what is required – despite environmental disruption, human user and operator errors, and attacks by hostile parties – and not doing other things.</t>
  <t hangText='Trustworthy:'>
  pull in text here</t>
</list></t>

</section>
<section anchor="remote-attestation" title="Remote Attestation">

<t><list style="hanging">
  <t hangText='Attestation:'>
  An object integrity authentication facilitated via the creation of a claim about the properties of an attestee, such that the claim can be used as evidence.</t>
  <t hangText='Conveyance:'>
  The transfer of evidence from the attestee to the verifier.</t>
  <t hangText='Verification:'>
  The appraisal of evidence by evaluating it against declarative guidance.</t>
  <t hangText='Remote Attestation:'>
  A procedure composed of the activities attestation, conveyance and verification.</t>
</list></t>

<section anchor="building-block-terms" title="Building Block Terms">

<t>[working title, pulled from various sources, vital]</t>

<t><list style="hanging">
  <t hangText='Attestation Identity Key (AIK):'>
  A special purpose signature (therefore asymmetric) key that supports identity related operations. The private portion of the key pair is maintained confidential to the computing context via appropriate measures (that have a direct impact on the level of confidence). The public portion of the key pair may be included in AIK credentials that provide a claim about the computing context.</t>
  <t hangText='Claim:'>
  A piece of information asserted about a subject. A claim is represented as a name/value pair consisting of a Claim Name and a Claim Value <xref target="RFC7519"/></t>
  <t>In the context of SACM, a claim is also specialized as an attribute/value pair that is intended to be related to a statement <xref target="I-D.ietf-sacm-terminology"/>.</t>
  <t hangText='Computing Context Characteristics:'>
  The composition, configuration and state of a computing context.</t>
  <t hangText='Evidence:'>
  A trustworthy set of claims about an computing context’s characteristics.</t>
  <t hangText='Identity:'>
  A set of claims that is intended to be related to an entity. [merge with RFC4949 defintion above]</t>
  <t hangText='Integrity Measurements:'>
  Metrics of computing context characteristics (i.e. composition, configuration and state) that affect the confidence in the trustworthiness of a computing context. Digests of integrity measurements can be stored in shielded locations (e.g. a PCR of a TPM).</t>
  <t hangText='Reference Integrity Measurements:'>
  Signed measurements about a computing context’s characteristics that are provided by a vendor or manufacturer and are intended to be used as declarative guidannce <xref target="I-D.ietf-sacm-terminology"/> (e.g. a signed CoSWID).</t>
  <t hangText='Trustworthiness:'>
  The qualities of computing context characteristics that guarantee a specific behavior specified by declarative guidance. Trustworthiness is not an absolute property but defined with respect to a computing context, corresponding declarative guidance, and has a scope of confidence. A trusted system is trustworthy. [refactor defintion with RFC4949 terms]</t>
  <t>Trustworthy Computing Context: a computing context that guarantees trustworthy behavior and/or composition (with respect to certain declarative guidance and a scope of confideence). A trustworthy computing context is a trusted system.</t>
  <t>Trustworthy Statement: evidence that trustworthy conveyed by a computing context that is not necessarily trustworthy. [update with tamper related terms]</t>
</list></t>

</section>
</section>
<section anchor="iana-considerations" title="IANA considerations">

<t>This document will include requests to IANA:</t>

<t><list style="symbols">
  <t>first item</t>
  <t>second item</t>
</list></t>

</section>
<section anchor="security-considerations" title="Security Considerations">

<t>There are always some.</t>

</section>
<section anchor="acknowledgements" title="Acknowledgements">

<t>Maybe.</t>

</section>
<section anchor="change-log" title="Change Log">

<t>No changes yet.</t>

</section>


  </middle>

  <back>

    <references title='Normative References'>





<reference  anchor="RFC2119" target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author initials='S.' surname='Bradner' fullname='S. Bradner'><organization /></author>
<date year='1997' month='March' />
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference  anchor="RFC4949" target='https://www.rfc-editor.org/info/rfc4949'>
<front>
<title>Internet Security Glossary, Version 2</title>
<author initials='R.' surname='Shirey' fullname='R. Shirey'><organization /></author>
<date year='2007' month='August' />
<abstract><t>This Glossary provides definitions, abbreviations, and explanations of terminology for information system security. The 334 pages of entries offer recommendations to improve the comprehensibility of written material that is generated in the Internet Standards Process (RFC 2026). The recommendations follow the principles that such writing should (a) use the same term or definition whenever the same concept is mentioned; (b) use terms in their plainest, dictionary sense; (c) use terms that are already well-established in open publications; and (d) avoid terms that either favor a particular vendor or favor a particular technology or mechanism over other, competing techniques that already exist or could be developed.  This memo provides information for the Internet community.</t></abstract>
</front>
<seriesInfo name='FYI' value='36'/>
<seriesInfo name='RFC' value='4949'/>
<seriesInfo name='DOI' value='10.17487/RFC4949'/>
</reference>




    </references>

    <references title='Informative References'>





<reference anchor="I-D.ietf-sacm-terminology">
<front>
<title>Security Automation and Continuous Monitoring (SACM) Terminology</title>

<author initials='H' surname='Birkholz' fullname='Henk Birkholz'>
    <organization />
</author>

<author initials='J' surname='Lu' fullname='Jarrett Lu'>
    <organization />
</author>

<author initials='J' surname='Strassner' fullname='John Strassner'>
    <organization />
</author>

<author initials='N' surname='Cam-Winget' fullname='Nancy Cam-Winget'>
    <organization />
</author>

<author initials='A' surname='Montville' fullname='Adam Montville'>
    <organization />
</author>

<date month='December' day='10' year='2017' />

<abstract><t>This memo documents terminology used in the documents produced by SACM (Security Automation and Continuous Monitoring).</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-ietf-sacm-terminology-14' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-ietf-sacm-terminology-14.txt' />
</reference>



<reference  anchor="RFC7519" target='https://www.rfc-editor.org/info/rfc7519'>
<front>
<title>JSON Web Token (JWT)</title>
<author initials='M.' surname='Jones' fullname='M. Jones'><organization /></author>
<author initials='J.' surname='Bradley' fullname='J. Bradley'><organization /></author>
<author initials='N.' surname='Sakimura' fullname='N. Sakimura'><organization /></author>
<date year='2015' month='May' />
<abstract><t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties.  The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t></abstract>
</front>
<seriesInfo name='RFC' value='7519'/>
<seriesInfo name='DOI' value='10.17487/RFC7519'/>
</reference>




    </references>



  </back>

<!-- ##markdown-source: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-->

</rfc>

