<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.2.3 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>

<rfc ipr="trust200902" docName="draft-backman-secevent-token-01" category="std">

  <front>
    <title abbrev="secevent-token">Security Event Token (SET)</title>

    <author initials="A." surname="Backman" fullname="Annabelle Backman">
      <organization>Amazon</organization>
      <address>
        <email>richanna@amazon.com</email>
      </address>
    </author>
    <author initials="W." surname="Denniss" fullname="William Denniss">
      <organization>Google</organization>
      <address>
        <email>wdenniss@google.com</email>
      </address>
    </author>
    <author initials="M." surname="Ansari" fullname="Morteza Ansari">
      <organization>Cisco</organization>
      <address>
        <email>morteza.ansari@cisco.com</email>
      </address>
    </author>
    <author initials="M." surname="Jones" fullname="Michael B. Jones">
      <organization>Microsoft</organization>
      <address>
        <email>mbj@microsoft.com</email>
        <uri>http://self-issued.info/</uri>
      </address>
    </author>

    <date year="2017" month="November" day="29"/>

    <area>Security</area>
    <workgroup>secevent</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>This specification defines the Security Event Token, which may be
distributed via a protocol such as HTTP.  The Security Event Token
(SET) specification profiles the JSON Web Token (JWT), which can be
optionally signed and/or encrypted.  A SET describes a statement of
fact from the perspective of an issuer that it intends to share with
one or more receivers.</t>



    </abstract>


  </front>

  <middle>


<section anchor="intro" title="Introduction">
<t>This specification defines an extensible Security Event Token (SET)
format which may be exchanged using protocols such as HTTP.  The
specification builds on the JSON Web Token (JWT) format <xref target="RFC7519"></xref> in
order to provide a self-contained token that can be optionally signed
using JSON Web Signature (JWS) <xref target="RFC7515"></xref> and/or encrypted using JSON
Web Encryption (JWE) <xref target="RFC7516"></xref>.</t>

<t>This specification profiles the use of JWT for the purpose of issuing
security event tokens (SETs).  This specification defines a base
format upon which profiling specifications define actual events and
their meanings.  Unless otherwise specified, this specification uses
non-normative example events intended to demonstrate how events may
be constructed.</t>

<t>This specification is scoped to security and identity related events.
While security event tokens may be used for other purposes, the
specification only considers security and privacy concerns relevant
to identity and personal information.</t>

<t>Security Events are not commands issued between parties.  A security
event is a statement of fact from the perspective of an issuer about
the state of a security subject (e.g., a web resource, token, IP
address, the issuer itself) that the issuer controls or is aware of,
that has changed in some way (explicitly or implicitly).  A security
subject MAY be permanent (e.g., a user account) or temporary (e.g.,
an HTTP session) in nature.  A state change could describe a direct
change of entity state, an implicit change of state or other higher-
level security statements such as:</t>

<t><list style="symbols">
  <t>The creation, modification, removal of a resource.</t>
  <t>The resetting or suspension of an account.</t>
  <t>The revocation of a security token prior to its expiry.</t>
  <t>The logout of a user session.  Or,</t>
  <t>A cumulative conclusion such as to indicate that a user has taken
over an email identifier that may have been used in the past by
another user.</t>
</list></t>

<t>While subject state changes are often triggered by a user-agent or
security-subsystem, the issuance and transmission of an event often
occurs asynchronously and in a back-channel to the action which
caused the change that generated the security event.  Subsequently,
an Event Receiver, having received a SET, validates and interprets
the received SET and takes its own independent actions, if any.  For
example, having been informed of a personal identifier being
associated with a different security subject (e.g., an email address
is being used by someone else), the Event Receiver may choose to
ensure that the new user is not granted access to resources
associated with the previous user.  Or, the Event Receiver may not
have any relationship with the subject, and no action is taken.</t>

<t>While Event Receivers will often take actions upon receiving SETs,
security events cannot be assumed to be commands or requests.  The
intent of this specification is to define a way of exchanging
statements of fact that Event Receivers may interpret for their own
purposes.  As such, SETs have no capability for error signaling other
to ensure the validation of a received SET.</t>

<section anchor="conv" title="Notational Conventions">
<t>The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL NOT”,
“SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “NOT RECOMMENDED”, “MAY”, and
“OPTIONAL” in this document are to be interpreted as described in
<xref target="RFC2119"></xref>.  These keywords are capitalized when used to unambiguously
specify requirements of the protocol or application features and
behavior that affect the inter-operability and security of
implementations.  When these words are not capitalized, they are
meant in their natural-language sense.</t>

<t>For purposes of readability, examples are not URL encoded.
Implementers MUST percent encode URLs as described in Section 2.1 of
<xref target="RFC3986"></xref>.</t>

<t>Throughout this document, all figures MAY contain spaces and extra
line-wrapping for readability and space limitations.  Similarly, some
URIs contained within examples have been shortened for space and
readability reasons.</t>

</section>
<section anchor="defn" title="Definitions">
<t>The following definitions are used with SETs:</t>

<t><list style="hanging">
  <t hangText='Security Event Token (SET)'><vspace blankLines='0'/>
  A SET is a JWT <xref target="RFC7519"></xref> that contains an event payload describing
a security event.</t>
  <t hangText='Event Transmitter'><vspace blankLines='0'/>
  A service provider that delivers SETs to other providers known as
Event Receivers.</t>
  <t hangText='Event Receiver'><vspace blankLines='0'/>
  An Event Receiver is an entity that receives SETs through some
distribution method.  An Event Receiver is the same entity
referred as “recipient” or “receiver” in and related
specifications.  <xref target="RFC7519"></xref></t>
  <t hangText='Subject'><vspace blankLines='0'/>
  A SET describes an event or state change that has occurred about a
Subject.  A Subject may be a principal (e.g., Section 4.1.2
<xref target="RFC7519"></xref>), a web resource, an entity such as an IP address, or
the issuer itself that a SET might reference.</t>
  <t hangText='Profiling Specification'><vspace blankLines='0'/>
  A specification that uses the SET Token specification to define one or
more event types and the associated claims included.</t>
</list></t>

</section>
</section>
<section anchor="set" title="The Security Event Token (SET)">
<t>A SET is a data structure that encodes an “event payload” describing a
security event, wrapped in an “envelope” providing metadata and context
for the security event.  The SET envelope is a JWT Claims Set as defined in
<xref target="RFC7519"></xref>, consisting of a JSON object containing a set of claims.  The
event payload is a JSON object contained within the SET envelope, itself
containing claims that express information about the event, e.g. the type
of event, the subject of the event, and other information defined in a
Profiling Specification.</t>

<t>This specification defines a core set of claims for use in SET envelopes
and event payloads, however Profiling Specifications MAY define additional
claims of both types.  It is RECOMMENDED that Profiling Specifications
define claims to be used in the event payload rather than the envelope.  If
a Profiling Specification does define envelope claims, those claims SHOULD
be registered in the JWT Token Claims Registry <xref target="IANA.JWT.Claims"></xref> or have
Public Claim Names as defined in Section 4.2 of <xref target="RFC7519"></xref>.</t>

<section anchor="claims" title="SET Claims">
<t>This specification profiles the following claims defined in <xref target="RFC7519"></xref> for
use in the SET envelope:</t>

<t><list style="hanging">
  <t hangText='iss'><vspace blankLines='0'/>
  A case-sensitive string identifying the principal that issued the SET,
as defined by Section 4.1.1 of <xref target="RFC7519"></xref>.  This claim is REQUIRED.</t>
  <t hangText='aud'><vspace blankLines='0'/>
  A case-sensitive string or array of case-sensitive strings identifying
the audience for the SET, as defined by Section 4.1.3 of <xref target="RFC7519"></xref>.  This
claim is RECOMMENDED.</t>
  <t hangText='exp'><vspace blankLines='0'/>
  As defined by Section 4.1.4 of <xref target="RFC7519"></xref>, this claim is the time after
which the JWT MUST NOT be accepted for processing.  In the context of a SET
however, this notion does not apply since a SET reflects something that
has already been processed and is historical in nature.  Use of this claim
is NOT RECOMMENDED.</t>
  <t hangText='iat'><vspace blankLines='0'/>
  A value identifying the time at which the SET was issued, as defined by
Section 4.1.6 of <xref target="RFC7519"></xref>.  This claim is REQUIRED.</t>
  <t hangText='jti'><vspace blankLines='0'/>
  A unique identifier for an event, as defined by Section 4.1.7 of
<xref target="RFC7519"></xref>.  This claim is REQUIRED.</t>
</list></t>

<t>This specification defines the following new claims for use in the SET
envelope:</t>

<t><list style="hanging">
  <t hangText='event'><vspace blankLines='0'/>
  A JSON object known as the “event payload”, whose contents identify the
type of event contained within the SET and contain additional information 
defined as part of an event type definition in a Profiling Specification.</t>
</list></t>

<t>This specification defines the following claims for use in event payloads:</t>

<t><list style="hanging">
  <t hangText='event_type'><vspace blankLines='0'/>
  A string containing a URI that uniquely identifies an event type
defined by a Profiling Specification.  This claim is REQUIRED.</t>
  <t hangText='event_id'><vspace blankLines='0'/>
  A string that identifies a specific “real world” event or state change
to which this event is related. Recipients MAY use this claim to correlate
events across different SETs received at different times and/or by different
systems. The value of this claim MUST be unique with respect to the
transmitter to a specific “real world” event or state change, however
recipients MUST NOT interpret a difference in “event_id” values as a
guarantee that two events are not related.  This claim is OPTIONAL.</t>
  <t hangText='event_subject'><vspace blankLines='0'/>
  A Subject Identifier that identifies the subject of the event.  (See:
  <xref target="subject"></xref>) This claim is RECOMMENDED. Profiling Specifications MAY use
  the JWT “sub” claim to identify the subject, in order to be compatible 
  with one or more other specifications (e.g. <xref target="OpenID.Core"></xref>).  Profiling Specifications
  that do so MUST reference the document that defines the semantics for the
  “sub” claim that the Profiling Specification is following, and MUST omit
  the “event_subject” payload claim.</t>
  <t hangText='event_time'><vspace blankLines='0'/>
  A number identifying the date and time at which the event is believed to
have occurred or will occur in the future.  Its value MUST take the form
of a NumericDate value, as defined in Section 2 of <xref target="RFC7519"></xref>.  This claim
is OPTIONAL, however if it is not present then the recipient MUST
interpret that to mean that no event time is being asserted, either
because there is no specific event time, the transmitter does not wish to
share it, or the transmitter does not know its value.</t>
</list></t>

<t>Both the SET envelope and event payload MAY contain additional claims, such
as those defined in a Profiling Specification.  The format and meaning of
these claims is out of scope of this specification.  Implementations SHOULD
ignore any claims in the SET envelope or event payload that they do not
understand.</t>

<t>The following is a non-normative example showing a SET envelope expressing
a hypothetical event with two additional claims in the event payload:</t>

<figure title="Example SET With Event Claims In Payload" anchor="figset"><artwork><![CDATA[
{
  "jti": "3d0c3cf797584bd193bd0fb1bd4e7d30",
  "iss": "https://transmitter.example.com",
  "aud": [ "https://receiver.example.com" ],
  "iat": 1458496025,
  "event": {
    "event_type": "https://secevent.example.com/example_event",
    "event_subject": {
      "identifier_type": "urn:ietf:params:secevent:subject:email",
      "email": "user@example.com"
    },
    "event_time": 1458492425,
    "claim_1": "foo",
    "claim_2": "bar"
  }
}
]]></artwork></figure>

<t>The payload in this example contains the following:</t>

<t><list style="symbols">
  <t>An “event_type” claim whose value is the URI identifying the
hypothetical event type.</t>
  <t>An “event_subject” claim whose value identifies a subject via email
address.</t>
  <t>An “event_time” claim whose value is the time at which the event occured.</t>
  <t>Two claims “claim_1” and “claim_2” that are defined by the hypothetical 
event type’s Profiling Specification.</t>
</list></t>

</section>
<section anchor="subject" title="Subject Identifiers">
<t>The Subject Identifier provides a common syntax for expressing the subject
of a security event.  A Subject Identifier is a JSON object representing an
instance of a Subject Identifier Type.  A Subject Identifier Type defines a
way of identifying the subject of an event. Typically this is done by
defining a set of one or more claims about a subject that when taken
together collectively identify that subject.  Each Subject Identifier Type
MUST have a name which MUST be registered in the IANA “SET Subject
Identifier Types” registry established by <xref target="iana-sit"></xref>.</t>

<t>A Subject Identifier MUST contain an “identifier_type” claim, whose value is
a string containing the name of the Subject Identifier’s Subject Identifier
Type.  All other claims within the Subject Identifier MUST be defined by the
Subject Identifier Type.</t>

<t>The names of the Subject Identifier Types defined below are registered in
the IANA “SET Subject Identifier Types” registry established by <xref target="iana-sit"></xref>.</t>

<section anchor="implicit-subject-identifier-type" title="Implicit Subject Identifier Type">
<t>The “Implicit” Subject Identifier Type indicates that the recipient is to be
determined implicitly, either from other claims in the SET envelope or event
payload, or through some other context.  For example, there may be event
types for which the only logical subject is the transmitter itself, in which
case the subject is implicitly known from the “iss” claim in the SET
envelope.</t>

<t>The Implicit Subject Identifier Type has the name “implicit”.  This type
contains no additional claims.</t>

<t>The following is a non-normative example of a Subject Identifier
representing an instance of the Implicit Subject Identifier Type:</t>

<figure title="An Instance of the Implicit Subject Identifier Type" anchor="figimplicit"><artwork><![CDATA[
{
  "identifier_type": "implicit"
}
]]></artwork></figure>

</section>
<section anchor="email-subject-identifier-type" title="Email Subject Identifier Type">
<t>The “Email” Subject Identifier Type identifies a subject by email address.
It has the name “email”, and contains a single additional claim:</t>

<t><list style="hanging">
  <t hangText='email'><vspace blankLines='0'/>
  A string containing an email address.  Its value SHOULD conform to
<xref target="RFC5322"></xref>.  This claim is REQUIRED.</t>
</list></t>

<t>The following is a non-normative example of a Subject Identifier
representing an instance of the Email Subject Identifier Type:</t>

<figure title="An Instance of the Email Subject Identifier Type" anchor="figemail"><artwork><![CDATA[
{
  "identifier_type": "email",
  "email": "user@example.com"
}
]]></artwork></figure>

</section>
<section anchor="phone-number-subject-identifier-type" title="Phone Number Subject Identifier Type">
<t>The “Phone Number” Subject Identifier Type identifies a subject by phone
number. It has the name “phone_number”, and contains a single claim:</t>

<t><list style="hanging">
  <t hangText='phone_number'><vspace blankLines='0'/>
  A string containing a phone number.  It SHOULD be formatted according to
<xref target="E.164"></xref>.  This claim is REQUIRED.</t>
</list></t>

<t>The following is a non-normative example of a Subject Identifier
representing an instance of the Phone Number Subject Identifier Type:</t>

<figure title="An Instance of the Phone Number Subject Identifier Type" anchor="figphone"><artwork><![CDATA[
{
  "identifier_type": "phone_number",
  "phone_number": "+1 206 555 0123"
}
]]></artwork></figure>

</section>
<section anchor="issuer-and-subject-subject-identifier-type" title="Issuer and Subject Subject Identifier Type">
<t>The “Issuer and Subject” Subject Identifier Type identifies a subject by an
issuer and subject pair.  It has the name “iss-sub”, and contains two
claims:</t>

<t><list style="hanging">
  <t hangText='iss'><vspace blankLines='0'/>
  A case-sensitive string identifying the principal who is responsible for
assignment of the identifier in the “sub” claim, as defined by Section 4.1.1
of <xref target="RFC7519"></xref>.  This claim is REQUIRED.</t>
  <t hangText='sub'><vspace blankLines='0'/>
  A case-sensitive string containing an identifier that identifies a subject
within the context of the principal identified by the “iss” claim, as
defined by Section 4.1.2 of <xref target="RFC7519"></xref>.  This claim is REQUIRED.</t>
</list></t>

<t>The following is a non-normative example of a Subject Identifier
representing an instance of the Issuer and Subject Subject Identifier Type:</t>

<figure title="An Instance of the Issuer and Subject Subject Identifier Type" anchor="figisssub"><artwork><![CDATA[
{
  "identifier_type": "iss-sub",
  "iss": "http://id.example.com",
  "sub": "example.user.1234"
}
]]></artwork></figure>

</section>
</section>
<section anchor="set-type" title="Explicit Typing of SETs">
<t>This specification registers the “application/secevent+jwt” media
type.  SETs MAY include this media type in the “typ” header parameter of
the JWT containing the SET to explicitly declare that the JWT is a SET.
This MUST be included if the SET could be used in an application context
in which it could be confused with other kinds of JWTs.  Profiling
Specifications MAY declare that this is REQUIRED for SETs containing events
defined by the Profiling Specification.</t>

<t>Per the definition of “typ” in Section 4.1.9 of <xref target="RFC7515"></xref>, it is
RECOMMENDED that the “application/” prefix be omitted.  Therefore,
the “typ” value used SHOULD be “secevent+jwt”.</t>

</section>
<section anchor="construction" title="Security Event Token Construction">
<t>A SET is a JWT, and therefore it’s construction follows that described in
<xref target="RFC7519"></xref>.</t>

<t>While this specification uses JWT to convey a SET, implementers SHALL
NOT use SETs to convey authentication or authorization assertions.</t>

<t>The following is the example JWT Claims Set from <xref target="figset"></xref>, expressed as
an unsigned JWT.  The JOSE Header is:</t>

<figure><artwork><![CDATA[
{"typ":"secevent+jwt","alg":"none"}
]]></artwork></figure>

<t>Base64url encoding of the octets of the UTF-8 representation of the
JOSE Header yields:</t>

<figure><artwork><![CDATA[
eyJ0eXAiOiJzZWNldmVudCtqd3QiLCJhbGciOiJub25lIn0
]]></artwork></figure>

<t>The example JWT Claims Set is encoded as follows:</t>

<figure><artwork><![CDATA[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]]></artwork></figure>

<t>The encoded JWS signature is the empty string.  Concatenating the
parts yields the following complete JWT:</t>

<figure title="Example Unsecured Security Event Token" anchor="figsetencoded"><artwork><![CDATA[
eyJ0eXAiOiJzZWNldmVudCtqd3QiLCJhbGciOiJub25lIn0.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.
]]></artwork></figure>

<t>For the purpose of a simpler example in Figure 5, an unsecured token
was shown.  When SETs are not signed or encrypted, the Event Receiver
MUST employ other mechanisms such as TLS and HTTP to provide
integrity, confidentiality, and issuer validation, as needed by the
application.</t>

<t>When validation (i.e. auditing), or additional transmission security
is required, JWS signing and/or JWE encryption MAY be used.  To
create and or validate a signed and/or encrypted SET, follow the
instructions in Section 7 of <xref target="RFC7519"></xref>.</t>

</section>
</section>
<section anchor="related-events" title="Related Events">
<t>In order to accommodate use cases that require communicating multiple
related security events to an Event Receiver, this section defines the
“Related Events” event type.  A Related Events event is essentially a
container for two or more events that are related to one another, in that
they represent or express different aspects of the same event or state
change.  The Related Events event SHOULD NOT be used to combine unrelated
events into a single set, and MUST NOT be used as a general purpose batch
transmission mechanism.  Profiling Specifications that require an event
grouping mechanism with these or other semantics are encouraged to define
additional event types for their use cases.</t>

<t>The event type for the Related Events event is the URN
“urn:ietf:secevents:related_events”.</t>

<t>The Related Events event has a single additional event payload claim:</t>

<t><list style="hanging">
  <t hangText='events'><vspace blankLines='0'/>
  An array of event payloads, as defined in this document.  These event
payloads can be referred to as Nested Events for the Related Events event.
This claim is REQUIRED.</t>
</list></t>

<section anchor="related-events-proc" title="Processing Related Events">
<t>Nested Events can inherit the “event_id”, “event_subject”, and “event_time”
claims from the Related Events payload.  Transmitters MAY omit some, all, or
none of these claims from a Nested Event.  Transmitters MAY omit claims from
some Nested Events and include them in others within the same Related Events
event. When a claim is omitted, recipients MUST use the value of the
corresponding claim in the Related Event event’s payload.</t>

<t>The following is a non-normative example of a SET containing a Related
Events event:</t>

<figure title="Example SET Containing A Related Events Event" anchor="figrelated"><artwork><![CDATA[
{
  "jti": "1c0038c2-02db-40de-ad50-122a64724166",
  "iss": "https://transmitter.example.com",
  "aud": [ "https://receiver.example.com" ],
  "iat": 1510666261,
  "event": {
    "event_type": "urn:ietf:secevent:related_events",
    "event_subject": {
      "identifier_type": "email",
      "email": "user@example.com"
    },
    "event_id": "container",
    "event_time": 1510662661,
    "events": [
      {
        "event_id": "nested_1",
        "event_type": "http://specs.example.com/set_profile/event_1"
      },
      {
        "event_id": "nested_2",
        "event_type": "http://specs.example.com/set_profile/event_2",
        "event_time": 151059061
      }
    ]
  }
}
]]></artwork></figure>

<t>The following table demonstrates how Nested Events inherit values for
omitted claims:</t>

<figure title="Example of Event Payloads Inheriting Values for Omitted Claims" anchor="figomitted"><artwork><![CDATA[
         +-----------+------------+-------------------------------+         
         | Event ID  | Event Time | Event Subject                 |
         +-----------+------------+-------------------------------+
         | container | 151062661  | {                             |
         +-----------+            |   "identifier_type": "email", |
         | nested_1  |            |   "email": "user@example.com" |
         +-----------+------------+ }                             |
         | nested_2  | 151059061  |                               |
         +-----------+------------+-------------------------------+
]]></artwork></figure>

<t>Since the Nested Event with event ID “nested_1” omits the “event_time”
claim, it inherits the event time from the Related Events event payload.
Similarly, since both Nested Events “nested_1” and “nested_2” omit the
“event_subject” claim, both inherit the event subject from the Related
Events event payload.</t>

</section>
</section>
<section anchor="profile-req" title="Requirements for SET Profiles">
<t>Profiling Specifications for SETs define the syntax and semantics of
SETs conforming to that SET profile and rules for validating those
SETs.  The syntax defined by Profiling Specifications includes what
SET envelope and event payload claims are used by SETs expressing and
event defined by the profile.</t>

<t>Defining the semantics of the SET contents for SETs utilizing the
profile is equally important.  Possibly most important is defining
the procedures used to validate the SET issuer and to obtain the keys
controlled by the issuer that were used for cryptographic operations
used in the JWT representing the SET.  For instance, some profiles
may define an algorithm for retrieving the SET issuer’s keys that
uses the “iss” claim value as its input.  Likewise, if the profile
allows (or requires) that the JWT be unsecured, the means by which
the integrity of the JWT is ensured MUST be specified.</t>

<t>Profiling Specifications MUST define how the event Subject is
identified in the SET, as well as how to differentiate between the
event Subject’s Issuer and the SET Issuer, if applicable.  It is NOT
RECOMMENDED for Profiling Specifications to use the “sub” claim 
defined in <xref target="RFC7519"></xref> in cases in which the Subject is not globally
unique and has a different Issuer from the SET itself.</t>

<t>Profiling Specifications MUST clearly specify the steps that a
recipient of a SET utilizing that profile MUST perform to validate
that the SET is both syntactically and semantically valid.</t>

<section anchor="extensions" title="Extending Events">
<t>As needs change and new use cases develop, it may be desirable to augment
existing event definitions with new claims. In order to avoid collisions,
Profiling Specifications that extend existing events with additional event
payload claims SHOULD use Collision-Resistant Names as defined in Section 2
of <xref target="RFC7519"></xref> for the names of the new claims.</t>

</section>
</section>
<section anchor="security" title="Security Considerations">

<section anchor="c-and-i" title="Confidentiality and Integrity">
<t>SETs may often contain sensitive information.  Therefore, methods for
distribution of events SHOULD require the use of a transport-layer
security mechanism when distributing events.  Parties MUST support
TLS 1.2 <xref target="RFC5246"></xref> and MAY support additional transport-layer
mechanisms meeting its security requirements.  When using TLS, the
client MUST perform a TLS/SSL server certificate check, per
<xref target="RFC6125"></xref>.  Implementation security considerations for TLS can be
found in “Recommendations for Secure Use of TLS and DTLS” <xref target="RFC7525"></xref>.</t>

<t>Security Events distributed through third-parties or that carry
personally identifiable information, SHOULD be encrypted using JWE
<xref target="RFC7516"></xref> or secured for confidentiality by other means.</t>

<t>Unless integrity of the JWT is ensured by other means, it MUST be
signed using JWS <xref target="RFC7515"></xref> so that individual events can be
authenticated and validated by the Event Receiver.</t>

</section>
<section anchor="delivery" title="Delivery">
<t>This specification does not define a delivery mechanism by itself.
In addition to confidentiality and integrity (discussed above),
implementers and Profiling Specifications MUST consider the
consequences of delivery mechanisms that are not secure and/or not
assured.  For example, while a SET may be end-to-end secured using
JWE encrypted SETs, without TLS there is no assurance that the
correct endpoint received the SET and that it could be successfully
processed.</t>

</section>
<section anchor="sequencing" title="Sequencing">
<t>As defined in this specification, there is no defined way to order
multiple SETs in a sequence.  Depending on the type and nature of SET
event, order may or may not matter.  For example, in provisioning,
event order is critical – an object could not be modified before it
was created.  In other SET types, such as a token revocation, the
order of SETs for revoked tokens does not matter.  If however, the
event was described as a log-in or logged-out status for a user
subject, then order becomes important.</t>

<t>Profiling Specifications and implementers SHOULD take caution when
using timestamps such as “iat” to define order.  Distributed systems
will have some amount of clock-skew and thus time by itself will not
guarantee order.</t>

<t>Specifications profiling SET SHOULD define a mechanism for detecting
order or sequence of events.</t>

</section>
<section anchor="timing" title="Timing Issues">
<t>When SETs are delivered asynchronously and/or out-of-band with
respect to the original action that incurred the security event, it
is important to consider that a SET might be delivered to an Event
Receiver in advance or well behind the process that caused the event.
For example, a user having been required to logout and then log back
in again, may cause a logout SET to be issued that may arrive at the
same time as the user-agent accesses a web site having just logged-
in.  If timing is not handled properly, the effect would be to
erroneously treat the new user session as logged out.  Profiling
Specifications SHOULD be careful to anticipate timing and subject
selection information.  For example, it might be more appropriate to
cancel a “session” rather than a “user”.  Alternatively, the
specification could use timestamps that allows new sessions to be
started immediately after a stated logout event time.</t>

</section>
<section anchor="not-id-tokens" title="Distinguishing SETs from ID Tokens">
<t>Because <xref target="RFC7519"></xref> states that “all claims that are not understood by
implementations MUST be ignored”, there is a consideration that a SET
token might be confused with ID Token <xref target="OpenID.Core"></xref> if a SET is
mistakenly or intentionally used in a context requiring an ID Token.
If a SET could otherwise be interpreted as a valid ID Token (because
it includes the required claims for an ID Token and valid issuer and
audience claim values for an ID Token) then that SET profile MUST
require that the “exp” claim not be present in the SET.  Because
“exp” is a required claim in ID Tokens, valid ID Token
implementations will reject such a SET if presented as if it were an
ID Token.</t>

<t>Excluding “exp” from SETs that could otherwise be confused with ID
Tokens is actually defense in depth.  In any OpenID Connect contexts
in which an attacker could attempt to substitute a SET for an ID
Token, the SET would actually already be rejected as an ID Token
because it would not contain the correct “nonce” claim value for the
ID Token to be accepted in contexts for which substitution is
possible.</t>

<t>Note that the use of explicit typing, as described in Section 2.2,
will not achieve disambiguation between ID Tokens and SETs, as the ID
Token validation rules do not use the “typ” header parameter value.</t>

</section>
<section anchor="not-access-tokens" title="Distinguishing SETs from Access Tokens">
<t>OAuth 2.0 <xref target="RFC6749"></xref> defines access tokens as being opaque.
Nonetheless, some implementations implement access tokens as JWTs.
Because the structure of these JWTs is implementation-specific,
ensuring that a SET cannot be confused with such an access token is
therefore likewise, in general, implementation specific.
Nonetheless, it is recommended that SET profiles employ the following
strategies to prevent possible substitutions of SETs for access
tokens in contexts in which that might be possible:</t>

<t><list style="symbols">
  <t>Prohibit use of the “exp” claim, as is done to prevent ID Token
confusion.</t>
  <t>Where possible, use a separate “aud” claim value to distinguish
between the Event Receiver and the protected resource that is the
audience of an access token.</t>
  <t>Modify access token validation systems to check for the presence
of the “events” claim as a means to detect security event tokens.
This is particularly useful if the same endpoint may receive both
types of tokens.</t>
  <t>Employ explicit typing, as described in Section 2.2, and modify
access token validation systems to use the “typ” header parameter
value.</t>
</list></t>

</section>
<section anchor="not-other-jwts" title="Distinguishing SETs from other kinds of JWTs">
<t>JWTs are now being used in application areas beyond the identity
applications in which they first appeared.  For instance, the Session
Initiation Protocol (SIP) Via Header Field <xref target="RFC8055"></xref> and Personal
Assertion Token (PASSporT) <xref target="I-D.ietf-stir-passport"></xref> specifications
both define JWT profiles that use mostly or completely different sets
of claims than are used by ID Tokens.  If it would otherwise be
possible for an attacker to substitute a SET for one of these (or
other) kinds of JWTs, then the SET profile must be defined in such a
way that any substituted SET will result in its rejection when
validated as the intended kind of JWT.</t>

<t>The most direct way to prevent confusion is to employ explicit
typing, as described in Section 2.2, and modify applicable token
validation systems to use the “typ” header parameter value.  This
approach can be employed for new systems but may not be applicable to
existing systems.</t>

<t>Another way to ensure that a SET is not confused with another kind of
JWT is to have the JWT validation logic reject JWTs containing an
“events” claim unless the JWT is intended to be a SET.  This approach
can be employed for new systems but may not be applicable to existing
systems.</t>

<t>For many use cases, the simplest way to prevent substitution is
requiring that the SET not include claims that are required for the
kind of JWT that might be the target of an attack.  For example, for
<xref target="RFC8055"></xref>, the “sip_callid” claim could be omitted and for
<xref target="I-D.ietf-stir-passport"></xref>, the “orig” claim could be omitted.</t>

<t>In many contexts, simple measures such as these will accomplish the
task, should confusion otherwise even be possible.  Note that this
topic is being explored in a more general fashion in JSON Web Token
Best Current Practices <xref target="I-D.sheffer-oauth-jwt-bcp"></xref>.  The proposed
best practices in that draft may also be applicable for particular
SET profiles and use cases.</t>

</section>
</section>
<section anchor="privacy" title="Privacy Considerations">
<t>If a SET needs to be retained for audit purposes, JWS MAY be used to
provide verification of its authenticity.</t>

<t>Event Transmitters SHOULD attempt to specialize feeds so that the
content is targeted to the specific business and protocol needs of an
Event Receiver.</t>

<t>When sharing personally identifiable information or information that
is otherwise considered confidential to affected users, Event
Transmitters and Receivers MUST have the appropriate legal agreements
and user consent or terms of service in place.</t>

<t>The propagation of subject identifiers can be perceived as personally
identifiable information.  Where possible, Event Transmitters and
Receivers SHOULD devise approaches that prevent propagation – for
example, the passing of a hash value that requires the Event Receiver
to know the subject.</t>

</section>
<section anchor="iana" title="IANA Considerations">

<section anchor="iana-sit" title="SET Subject Identifier Types Registry">
<t>This section establishes the IANA “SET Subject Identifier Types” registry
// TODO</t>

</section>
<section anchor="iana-claims" title="JSON Web Token Claims Registration">
<t>This specification registers the “event” claim in the IANA “JSON Web Token
Claims” registry <xref target="IANA.JWT.Claims"></xref> established by <xref target="RFC7519"></xref>.</t>

<section anchor="registry-contents" title="Registry Contents">
<t><list style="symbols">
  <t>Claim Name: “event”</t>
  <t>Claim Description: Security Event Payload</t>
  <t>Change Controller: IESG</t>
  <t>Specification Document(s): Section 2.1 of [[ this specification ]]</t>
</list></t>

</section>
</section>
<section anchor="iana-media-type" title="Media Type Registration">

<section anchor="registry-contents-1" title="Registry Contents">
<t>This section registers the “application/secevent+jwt” media type
<xref target="RFC2046"></xref> in the “Media Types” registry <xref target="IANA.MediaTypes"></xref> in the
manner described in <xref target="RFC6838"></xref>, which can be used to indicate that the
content is a SET.</t>

<t><list style="symbols">
  <t>Type name: application</t>
  <t>Subtype name: secevent+jwt</t>
  <t>Required parameters: n/a</t>
  <t>Optional parameters: n/a</t>
  <t>Encoding considerations: 8bit; A SET is a JWT; JWT values are
encoded as a series of base64url-encoded values (some of which may
be the empty string) separated by period (‘.’) characters.</t>
  <t>Security considerations: See the Security Considerations section
of [[ this specification ]]</t>
  <t>Interoperability considerations: n/a</t>
  <t>Published specification: Section 2.2 of [[ this specification ]]</t>
  <t>Applications that use this media type: TBD</t>
  <t>Fragment identifier considerations: n/a</t>
  <t>Additional information:</t>
  <t>Magic number(s): n/a</t>
  <t>File extension(s): n/a</t>
  <t>Macintosh file type code(s): n/a</t>
  <t>Person &amp; email address to contact for further information:
Michael B. Jones, mbj@microsoft.com</t>
  <t>Intended usage: COMMON</t>
  <t>Restrictions on usage: none</t>
  <t>Author: Michael B. Jones, mbj@microsoft.com</t>
  <t>Change controller: IESG</t>
  <t>Provisional registration?  No</t>
</list></t>

</section>
</section>
</section>


  </middle>

  <back>

    <references title='Normative References'>

<reference anchor="IANA.JWT.Claims" target="http://www.iana.org/assignments/jwt">
  <front>
    <title>JSON Web Token Claims</title>
    <author >
      <organization>IANA</organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="IANA.MediaTypes" target="http://www.iana.org/assignments/media-types">
  <front>
    <title>Media Types</title>
    <author >
      <organization>IANA</organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>




<reference  anchor="RFC2119" target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author initials='S.' surname='Bradner' fullname='S. Bradner'><organization /></author>
<date year='1997' month='March' />
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference  anchor="RFC3986" target='https://www.rfc-editor.org/info/rfc3986'>
<front>
<title>Uniform Resource Identifier (URI): Generic Syntax</title>
<author initials='T.' surname='Berners-Lee' fullname='T. Berners-Lee'><organization /></author>
<author initials='R.' surname='Fielding' fullname='R. Fielding'><organization /></author>
<author initials='L.' surname='Masinter' fullname='L. Masinter'><organization /></author>
<date year='2005' month='January' />
<abstract><t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource.  This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet.  The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier.  This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='STD' value='66'/>
<seriesInfo name='RFC' value='3986'/>
<seriesInfo name='DOI' value='10.17487/RFC3986'/>
</reference>



<reference  anchor="RFC5246" target='https://www.rfc-editor.org/info/rfc5246'>
<front>
<title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
<author initials='T.' surname='Dierks' fullname='T. Dierks'><organization /></author>
<author initials='E.' surname='Rescorla' fullname='E. Rescorla'><organization /></author>
<date year='2008' month='August' />
<abstract><t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol.  The TLS protocol provides communications security over the Internet.  The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5246'/>
<seriesInfo name='DOI' value='10.17487/RFC5246'/>
</reference>



<reference  anchor="RFC5322" target='https://www.rfc-editor.org/info/rfc5322'>
<front>
<title>Internet Message Format</title>
<author initials='P.' surname='Resnick' fullname='P. Resnick' role='editor'><organization /></author>
<date year='2008' month='October' />
<abstract><t>This document specifies the Internet Message Format (IMF), a syntax for text messages that are sent between computer users, within the framework of &quot;electronic mail&quot; messages.  This specification is a revision of Request For Comments (RFC) 2822, which itself superseded Request For Comments (RFC) 822, &quot;Standard for the Format of ARPA Internet Text Messages&quot;, updating it to reflect current practice and incorporating incremental changes that were specified in other RFCs.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5322'/>
<seriesInfo name='DOI' value='10.17487/RFC5322'/>
</reference>



<reference  anchor="RFC6125" target='https://www.rfc-editor.org/info/rfc6125'>
<front>
<title>Representation and Verification of Domain-Based Application Service Identity within Internet Public Key Infrastructure Using X.509 (PKIX) Certificates in the Context of Transport Layer Security (TLS)</title>
<author initials='P.' surname='Saint-Andre' fullname='P. Saint-Andre'><organization /></author>
<author initials='J.' surname='Hodges' fullname='J. Hodges'><organization /></author>
<date year='2011' month='March' />
<abstract><t>Many application technologies enable secure communication between two entities by means of Internet Public Key Infrastructure Using X.509 (PKIX) certificates in the context of Transport Layer Security (TLS). This document specifies procedures for representing and verifying the identity of application services in such interactions.   [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='6125'/>
<seriesInfo name='DOI' value='10.17487/RFC6125'/>
</reference>



<reference  anchor="RFC6749" target='https://www.rfc-editor.org/info/rfc6749'>
<front>
<title>The OAuth 2.0 Authorization Framework</title>
<author initials='D.' surname='Hardt' fullname='D. Hardt' role='editor'><organization /></author>
<date year='2012' month='October' />
<abstract><t>The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf.  This specification replaces and obsoletes the OAuth 1.0 protocol described in RFC 5849.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='6749'/>
<seriesInfo name='DOI' value='10.17487/RFC6749'/>
</reference>



<reference  anchor="RFC7519" target='https://www.rfc-editor.org/info/rfc7519'>
<front>
<title>JSON Web Token (JWT)</title>
<author initials='M.' surname='Jones' fullname='M. Jones'><organization /></author>
<author initials='J.' surname='Bradley' fullname='J. Bradley'><organization /></author>
<author initials='N.' surname='Sakimura' fullname='N. Sakimura'><organization /></author>
<date year='2015' month='May' />
<abstract><t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties.  The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t></abstract>
</front>
<seriesInfo name='RFC' value='7519'/>
<seriesInfo name='DOI' value='10.17487/RFC7519'/>
</reference>



<reference  anchor="RFC7525" target='https://www.rfc-editor.org/info/rfc7525'>
<front>
<title>Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
<author initials='Y.' surname='Sheffer' fullname='Y. Sheffer'><organization /></author>
<author initials='R.' surname='Holz' fullname='R. Holz'><organization /></author>
<author initials='P.' surname='Saint-Andre' fullname='P. Saint-Andre'><organization /></author>
<date year='2015' month='May' />
<abstract><t>Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) are widely used to protect data exchanged over application protocols such as HTTP, SMTP, IMAP, POP, SIP, and XMPP.  Over the last few years, several serious attacks on TLS have emerged, including attacks on its most commonly used cipher suites and their modes of operation.  This document provides recommendations for improving the security of deployed services that use TLS and DTLS. The recommendations are applicable to the majority of use cases.</t></abstract>
</front>
<seriesInfo name='BCP' value='195'/>
<seriesInfo name='RFC' value='7525'/>
<seriesInfo name='DOI' value='10.17487/RFC7525'/>
</reference>


<reference anchor="E.164" target="http://www.itu.int/rec/T-REC-E.164-201011-I/en">
  <front>
    <title>The international public telecommunication numbering plan</title>
    <author >
      <organization>International Telecommunication Union</organization>
    </author>
    <date year="2010"/>
  </front>
</reference>


    </references>

    <references title='Informative References'>





<reference anchor="I-D.ietf-stir-passport">
<front>
<title>Personal Assertion Token (PASSporT)</title>

<author initials='C' surname='Wendt' fullname='Chris Wendt'>
    <organization />
</author>

<author initials='J' surname='Peterson' fullname='Jon Peterson'>
    <organization />
</author>

<date month='February' day='9' year='2017' />

<abstract><t>This document defines a method for creating and validating a token that cryptographically verifies an originating identity, or more generally a URI or telephone number representing the originator of personal communications.  The PASSporT token is cryptographically signed to protect the integrity of the identity the originator and to verify the assertion of the identity information at the destination. The cryptographic signature is defined with the intention that it can confidently verify the originating persona even when the signature is sent to the destination party over an insecure channel.  PASSporT is particularly useful for many personal communications applications over IP networks and other multi-hop interconnection scenarios where the originating and destination parties may not have a direct trusted relationship.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-ietf-stir-passport-11' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-ietf-stir-passport-11.txt' />
</reference>



<reference anchor="I-D.sheffer-oauth-jwt-bcp">
<front>
<title>JSON Web Token Best Current Practices</title>

<author initials='Y' surname='Sheffer' fullname='Yaron Sheffer'>
    <organization />
</author>

<author initials='D' surname='Hardt' fullname='Dick Hardt'>
    <organization />
</author>

<author initials='M' surname='Jones' fullname='Michael Jones'>
    <organization />
</author>

<date month='July' day='3' year='2017' />

<abstract><t>JSON Web Tokens, also known as JWTs [RFC7519], are URL-safe JSON- based security tokens that contain a set of claims that can be signed and/or encrypted.  JWTs are being widely used and deployed as a simple security token format in numerous protocols and applications, both in the area of digital identity, and in other application areas. The goal of this Best Current Practices document is to provide actionable guidance leading to secure implementation and deployment of JWTs.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-sheffer-oauth-jwt-bcp-01' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-sheffer-oauth-jwt-bcp-01.txt' />
</reference>


<reference anchor="OpenID.Core" target="http://openid.net/specs/openid-connect-core-1_0.html">
  <front>
    <title>OpenID Connect Core 1.0</title>
    <author >
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>




<reference  anchor="RFC2046" target='https://www.rfc-editor.org/info/rfc2046'>
<front>
<title>Multipurpose Internet Mail Extensions (MIME) Part Two: Media Types</title>
<author initials='N.' surname='Freed' fullname='N. Freed'><organization /></author>
<author initials='N.' surname='Borenstein' fullname='N. Borenstein'><organization /></author>
<date year='1996' month='November' />
<abstract><t>This second document defines the general structure of the MIME media typing system and defines an initial set of media types.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='2046'/>
<seriesInfo name='DOI' value='10.17487/RFC2046'/>
</reference>



<reference  anchor="RFC6838" target='https://www.rfc-editor.org/info/rfc6838'>
<front>
<title>Media Type Specifications and Registration Procedures</title>
<author initials='N.' surname='Freed' fullname='N. Freed'><organization /></author>
<author initials='J.' surname='Klensin' fullname='J. Klensin'><organization /></author>
<author initials='T.' surname='Hansen' fullname='T. Hansen'><organization /></author>
<date year='2013' month='January' />
<abstract><t>This document defines procedures for the specification and registration of media types for use in HTTP, MIME, and other Internet protocols.  This memo documents an Internet Best Current Practice.</t></abstract>
</front>
<seriesInfo name='BCP' value='13'/>
<seriesInfo name='RFC' value='6838'/>
<seriesInfo name='DOI' value='10.17487/RFC6838'/>
</reference>



<reference  anchor="RFC7515" target='https://www.rfc-editor.org/info/rfc7515'>
<front>
<title>JSON Web Signature (JWS)</title>
<author initials='M.' surname='Jones' fullname='M. Jones'><organization /></author>
<author initials='J.' surname='Bradley' fullname='J. Bradley'><organization /></author>
<author initials='N.' surname='Sakimura' fullname='N. Sakimura'><organization /></author>
<date year='2015' month='May' />
<abstract><t>JSON Web Signature (JWS) represents content secured with digital signatures or Message Authentication Codes (MACs) using JSON-based data structures.  Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and an IANA registry defined by that specification.  Related encryption capabilities are described in the separate JSON Web Encryption (JWE) specification.</t></abstract>
</front>
<seriesInfo name='RFC' value='7515'/>
<seriesInfo name='DOI' value='10.17487/RFC7515'/>
</reference>



<reference  anchor="RFC7516" target='https://www.rfc-editor.org/info/rfc7516'>
<front>
<title>JSON Web Encryption (JWE)</title>
<author initials='M.' surname='Jones' fullname='M. Jones'><organization /></author>
<author initials='J.' surname='Hildebrand' fullname='J. Hildebrand'><organization /></author>
<date year='2015' month='May' />
<abstract><t>JSON Web Encryption (JWE) represents encrypted content using JSON-based data structures.  Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and IANA registries defined by that specification.  Related digital signature and Message Authentication Code (MAC) capabilities are described in the separate JSON Web Signature (JWS) specification.</t></abstract>
</front>
<seriesInfo name='RFC' value='7516'/>
<seriesInfo name='DOI' value='10.17487/RFC7516'/>
</reference>



<reference  anchor="RFC8055" target='https://www.rfc-editor.org/info/rfc8055'>
<front>
<title>Session Initiation Protocol (SIP) Via Header Field Parameter to Indicate Received Realm</title>
<author initials='C.' surname='Holmberg' fullname='C. Holmberg'><organization /></author>
<author initials='Y.' surname='Jiang' fullname='Y. Jiang'><organization /></author>
<date year='2017' month='January' />
<abstract><t>This specification defines a new Session Initiation Protocol (SIP) Via header field parameter, 'received-realm', which allows a SIP entity acting as an entry point to a transit network to indicate from which adjacent upstream network a SIP request is received by using a network realm value associated with the adjacent network.</t></abstract>
</front>
<seriesInfo name='RFC' value='8055'/>
<seriesInfo name='DOI' value='10.17487/RFC8055'/>
</reference>




    </references>


<section anchor="ack" title="Acknowledgments">
<t>The editors would like to thank Phil Hunt for his SET draft – on which much
of this specification is based – and his continuing contributions to this
draft.</t>

<t>The editors would like to thank the participants on the IETF secevent
mailing list and related working groups for their support of this
specification.</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

