I thought that had been resolved?  The datatracker says 'Expert Review OK'.
[My memory has seen better days, both age and digging out from IETF 125 and
the fog of actions.  I'm happy to be corrected.]

I'm not going to pull up mailarchive links.... but 25 June 2025, Amanda
issued their ballot:  IANA OK.... (this only went to the IESG)

Deb

On Tue, Mar 31, 2026 at 7:41 AM Eliot Lear <[email protected]> wrote:

> Deb,
>
> This is what Paulo noticed during the last call- the tables in the IANA
> registry do not perfectly match the IANA considerations in 7643.
>
> Eliot
>
> On 31 Mar 2026, at 13:24, Deb Cooley <[email protected]> wrote:
>
> There is an IANA issue?  Where is the information on this?  [is this a
> result of the AD change, so I'm not getting messages?]
>
> Deb
>
> On Tue, Mar 31, 2026 at 5:15 AM Eliot Lear <[email protected]> wrote:
>
>> Kaelin,
>>
>> On the IANA issue, my suggestion is to decouple.  If IANA wants to
>> restructure the registry, that’s their affair, not the RFC Editor’s.
>>
>> Eliot
>>
>> > On 27 Mar 2026, at 19:32, Kaelin Foody <[email protected]>
>> wrote:
>> >
>> > Hi Eliot, all,
>> >
>> > Thanks for your reply -- we have updated the files accordingly and
>> posted them at the end of this email. Please review and let us know if
>> these updates are suitable.
>> >
>> > We will await IANA’s reply for guidance about this document's IANA
>> Considerations section.
>> >
>> > Otherwise, we believe there is only one outstanding item on our end.
>> Please review the following question and let us know if we may proceed with
>> these updates (in the “Perhaps” text below):
>> >
>> >> 8) <!-- [rfced] May we adjust these definitions below in order to
>> clarify what
>> >> list items "not" refers to?
>> >>
>> >> Original:
>> >>
>> >>  It is not mutable, read-only, generated if no certificateInfo
>> >>  object is provisioned, case sensitive and returned by default if it
>> exists.
>> >>  ...
>> >>  This attribute is not required, mutable, singular and NOT case
>> >>  sensitive.
>> >>  ...
>> >>  It is not required, multivalued, mutable, and returned by default.
>> >>
>> >> Perhaps:
>> >>
>> >>  It is not mutable. It is read only, case sensitive, and generated if
>> no certificateInfo
>> >>  object is provisioned. It is returned by default if it exists.
>> >>  ...
>> >>  This attribute is not required and not case sensitive. It is mutable
>> and singular.
>> >>  ...
>> >>  It is not required. It is multivalued, mutable, and returned by
>> default.
>> >>
>> >> -->
>> >>
>> >>> We would like to leave this text unresolved for this very moment, as
>> we have discovered a small wrinkle in the text in operation.  I’ll raise
>> that in a separate email once we’ve resolved the rest of these issues.
>> >
>> > The AUTH48 status page for this document is available here:
>> > https://www.rfc-editor.org/auth48/rfc9944
>> >
>> > — FILES (please refresh): —
>> >
>> > The updated files have been posted here:
>> > https://www.rfc-editor.org/authors/rfc9944.txt
>> > https://www.rfc-editor.org/authors/rfc9944.pdf
>> > https://www.rfc-editor.org/authors/rfc9944.html
>> > https://www.rfc-editor.org/authors/rfc9944.xml
>> >
>> > Diff files showing changes between the last and current version:
>> > https://www.rfc-editor.org/authors/rfc9944-lastdiff.html
>> > https://www.rfc-editor.org/authors/rfc9944-lastrfcdiff.html (side by
>> side)
>> >
>> > Diff files showing changes made during AUTH48:
>> > https://www.rfc-editor.org/authors/rfc9944-auth48diff.html
>> > https://www.rfc-editor.org/authors/rfc9944-auth48rfcdiff.html (side by
>> side)
>> >
>> > Diff files showing all changes:
>> > https://www.rfc-editor.org/authors/rfc9944-diff.html
>> > https://www.rfc-editor.org/authors/rfc9944-rfcdiff.html (side by side)
>> >
>> > All the best,
>> >
>> > Kaelin Foody
>> > RFC Production Center
>> >
>> >> On Mar 27, 2026, at 2:16 PM, Kaelin Foody <[email protected]>
>> wrote:
>> >>
>> >> Hi IANA, authors,
>> >>
>> >> We had a few questions related to the IANA Considerations section of
>> this document (please see <
>> https://www.rfc-editor.org/authors/rfc9944.html#name-iana-considerations
>> >).
>> >>
>> >> a) We note that Section 9.2 contains an indicator of "Resource Type:
>> Device”.  As this seems to match the template for registrations in RFC 7643
>> (see below), should a “Resource Type” column be added to the “SCIM
>> Server-Related Schema URIs” registry <
>> https://www.iana.org/assignments/scim/scim.xhtml#server-related> (or to
>> any other registries in the "System for Cross-domain Identity Management
>> (SCIM) Schema URIs” <https://www.iana.org/assignments/scim/scim.xhtml>
>> registry group)? Or should this information be cut from Section 9.2 to more
>> closely match the current registry entries?
>> >>
>> >> From RFC 7643:
>> >>
>> >>  Intended or Associated Resource Type: A value defining the resource
>> type (e.g., "Device").
>> >>
>> >> b) As Section 10.3.2 of RFC 7643 and the registry at <
>> https://www.iana.org/assignments/scim/scim.xhtml#server-related> use
>> “Schema Name” and “Name” (respectively), we will also update "Description”
>> to “Name” in Section 9.2 of this document, unless we hear objections
>> otherwise (note that this change will also match usage in Section 9.1,
>> which already uses “Name”).
>> >>
>> >> Thanks in advance.
>> >>
>> >> All best,
>> >>
>> >> Kaelin Foody
>> >> RFC Production Center
>> >>
>> >>> On Mar 26, 2026, at 5:28 AM, Eliot Lear <[email protected]> wrote:
>> >>>
>> >>> Kaelin,
>> >>>
>> >>> Thanks.  I only have two additional comments:
>> >>>
>> >>> The legends seem to take up a lot of vertical space.  Is it possible
>> to consolidate them into fewer lines, or is that dictated by the style
>> guide?
>> >>>
>> >>> Could we preface Figures 3-12 with the word “Example:”?  The lack of
>> a clear break makes it seem a little odd.
>> >>>
>> >>> Eliot
>> >>>
>> >>>> On 25 Mar 2026, at 20:16, Kaelin Foody <[email protected]>
>> wrote:
>> >>>>
>> >>>> Hi Deb, Eliot, all,
>> >>>>
>> >>>> Deb - Thank you for your approval. We have marked it here:
>> https://www.rfc-editor.org/auth48/rfc9944.
>> >>>>
>> >>>> Eliot - Thank you for your reply. We have updated the document
>> according to your responses. You may find the updated files at the end of
>> this email.
>> >>>>
>> >>>> One additional note:
>> >>>>
>> >>>>> Should pointers to BLE 5.3 be updated to 5.4 throughout?
>> >>>>>
>> >>>>>> Go with 5.4.
>> >>>>
>> >>>> For above, we have updated instances of BLE 5.3 to 5.4 throughout,
>> but some of these changes were made in the sourcecode. Please carefully
>> review these changes to ensure they are accurate (see:
>> https://www.rfc-editor.org/authors/rfc9944-lastrfcdiff.html) and let us
>> know if any additional changes need to be made.
>> >>>>
>> >>>> Please also note that we will ask IANA to update their registries to
>> match the edited document shortly.
>> >>>>
>> >>>> Upon careful review, please contact us with any further updates or
>> with your approval of the document in its current form.  We will await
>> approvals from each party listed on the AUTH48 status page for this
>> document prior to moving forward in the publication process.
>> >>>>
>> >>>> The AUTH48 status page for this document is available here:
>> >>>> https://www.rfc-editor.org/auth48/rfc9944
>> >>>>
>> >>>> — FILES (please refresh): —
>> >>>>
>> >>>> The updated files have been posted here:
>> >>>> https://www.rfc-editor.org/authors/rfc9944.txt
>> >>>> https://www.rfc-editor.org/authors/rfc9944.pdf
>> >>>> https://www.rfc-editor.org/authors/rfc9944.html
>> >>>> https://www.rfc-editor.org/authors/rfc9944.xml
>> >>>>
>> >>>> Diff files showing changes between the last and current version:
>> >>>> https://www.rfc-editor.org/authors/rfc9944-lastdiff.html
>> >>>> https://www.rfc-editor.org/authors/rfc9944-lastrfcdiff.html (side
>> by side)
>> >>>>
>> >>>> Diff files showing changes made during AUTH48:
>> >>>> https://www.rfc-editor.org/authors/rfc9944-auth48diff.html
>> >>>> https://www.rfc-editor.org/authors/rfc9944-auth48rfcdiff.html (side
>> by side)
>> >>>>
>> >>>> Diff files showing all changes:
>> >>>> https://www.rfc-editor.org/authors/rfc9944-diff.html
>> >>>> https://www.rfc-editor.org/authors/rfc9944-rfcdiff.html (side by
>> side)
>> >>>>
>> >>>> Thank you,
>> >>>>
>> >>>> Kaelin Foody
>> >>>> RFC Production Center
>> >>>>
>> >>>>> On Mar 24, 2026, at 2:39 PM, Deb Cooley <[email protected]>
>> wrote:
>> >>>>>
>> >>>>> Thanks for that.  I'm glad they are employer phone numbers.  No one
>> needs more spam on their personal phones.
>> >>>>>
>> >>>>> Deb
>> >>>>>
>> >>>>> On Tue, Mar 24, 2026 at 12:28 PM Muhammad Shahzad <[email protected]>
>> wrote:
>> >>>>> Hi All,
>> >>>>>
>> >>>>> The address currently listed for me and Hassan is good.
>> >>>>>
>> >>>>> On Tue, Mar 24, 2026 at 11:44 AM Eliot Lear <[email protected]> wrote:
>> >>>>> It’s a Cisco main #, and our address.  I’m okay with it.
>> Muhammed?  Hassan?
>> >>>>>
>> >>>>> Eliot
>> >>>>>
>> >>>>>> On 24 Mar 2026, at 12:23, Deb Cooley <[email protected]> wrote:
>> >>>>>>
>> >>>>>> Apologies, I missed the *AD note.....(both from Kaelin and
>> Eliot).
>> >>>>>>
>> >>>>>> I've checked the diff and subsequent message from Eliot pretty
>> carefully (especially the SHOULD/MUST change) and it all appears to be
>> fine.  I approve the changes.
>> >>>>>>
>> >>>>>> I only have one comment wrt Author Addresses:  These are super
>> specific.  In the case of the NC State authors, it appears that the address
>> is a department address, clearly already public.  For Eliot, that is your
>> personal address, no?  And the phone number?  I haven't seen too many phone
>> numbers on drafts/RFCs.  This is your call, but I think it would be
>> reasonable (and mostly the norm) to remove the actual street address and
>> phone number.
>> >>>>>>
>> >>>>>> Deb
>> >>>>>>
>> >>>>>>
>> >>>>>>
>> >>>>>> On Tue, Mar 24, 2026 at 5:52 AM Eliot Lear <[email protected]> wrote:
>> >>>>>>
>> >>>>>>
>> >>>>>>> On 20 Mar 2026, at 15:32, Kaelin Foody <
>> [email protected]> wrote:
>> >>>>>>>
>> >>>>>>> Hi *Deb, Eliot, all,
>> >>>>>>>
>> >>>>>>> *Deb - As AD, please review the following changes to this
>> document.
>> >>>>>>>
>> >>>>>>> You may view them in the diff here:
>> https://www.rfc-editor.org/authors/rfc9944-lastdiff.html.
>> >>>>>>>
>> >>>>>>> There is additional context in this email thread regarding these
>> changes, but we have summarized them below:
>> >>>>>>>
>> >>>>>>> Section 1.3: Added sentence re: line wrapping per RFC 8792.
>> >>>>>>> Section 6.3.1: Updated paragraph that appears after Table 2.
>> >>>>>>> Section 7.6: Removed sentence in first paragraph (per inclusive
>> language guidance).
>> >>>>>>> Section 7.6.1:  Updated definition of telemetryEnterpriseEndpoint.
>> >>>>>>> Section 7.6.2: Updated one line of sourcecode.
>> >>>>>>>
>> >>>>>>>
>> >>>>>>> Eliot, authors - Thank you for your review and replies. You may
>> find the updated files at the end of this email.
>> >>>>>>>
>> >>>>>>> A few follow-up questions:
>> >>>>>>>
>> >>>>>>>
>> >>>>>>> i) For question 15 below, we have updated part a as requested. We
>> want to confirm how to proceed with the following:
>> >>>>>>>
>> >>>>>>> For part b -- should pointers to BLE 5.3 be updated to 5.4
>> throughout?
>> >>>>>>
>> >>>>>> Go with 5.4.
>> >>>>>>>
>> >>>>>>> For part c -- is the “Current” text the correct reference?
>> >>>>>>
>> >>>>>> I need the text but probably the answer is “no” in relation to
>> BLE.  However, we have only tested against 5.4, and I will not make any
>> claims about 5.5, which introduces new encrypted advertisement capabilities.
>> >>>>>>
>> >>>>>>>
>> >>>>>>>> 15) <!-- [rfced] [BLE54]: Please review the following questions
>> regarding this reference:
>> >>>>>>>>
>> >>>>>>>> a) We were unable to find "isRandom" mentioned in [BLE54] as seen
>> >>>>>>>> below. Should this citation be updated?
>> >>>>>>>>
>> >>>>>>>> Original:
>> >>>>>>>>
>> >>>>>>>> isRandom:  A boolean flag taken from [BLE54].
>> >>>>>>>>
>> >>>>>>>>> You’re indeed correct. That flag itself is NOT taken from
>> [BLE54].  The description should be as follows:
>> >>>>>>>>>
>> >>>>>>>>> isRandom:A boolean flag. If FALSE, the device is using a public
>> MAC address. If TRUE, the device uses a random address. If an Identifying
>> Resolving Key (IRK) is present, the address represents a resolvable private
>> address. Otherwise, the address is assumed to be a random static address.
>> Non-resolvable private addresses are not supported by this specification.
>> This attribute is not required. It is mutable and is returned by default.
>> The default value is FALSE.  See Vol 6 Part B, Section 1.3 of [BLE54] for
>> more information about different address types.
>> >>>>>>>>>
>> >>>>>>>>> We have one other issue to look at: we want to make sure we are
>> pointing to the amended 5.4 spec.  The earlier one was withdrawn.  The
>> Section # above is from the amended spec.
>> >>>>>>>>
>> >>>>>>>> b) We also note a few instances of "BLE core specifications 5.3"
>> mentioned
>> >>>>>>>> throughout this document. However, the Normative References
>> section cites
>> >>>>>>>> Version 5.4. Please review and let us know if/how to update
>> accordingly.
>> >>>>>>>>
>> >>>>>>>> For example:
>> >>>>>>>>
>> >>>>>>>>    "description": "The isRandom flag is taken from the BLE
>> >>>>>>>>        core specifications 5.3. If TRUE, device is using a
>> >>>>>>>>        random address.  Default value is false.",
>> >>>>>>>>
>> >>>>>>>> c) Please review our updates to the text below. There are
>> multiple volumes in
>> >>>>>>>> [BLE54]; it appears Section 5.4.5 is referring to Volume 1, Part
>> A, Section
>> >>>>>>>> 5.4.5 of [BLE54]. Is this the correct section?
>> >>>>>>>>
>> >>>>>>>> Original:
>> >>>>>>>>
>> >>>>>>>> For more information about the use of the IRK, see Section 5.4.5
>> of
>> >>>>>>>> [BLE54].
>> >>>>>>>>
>> >>>>>>>> Current:
>> >>>>>>>>
>> >>>>>>>> For more information about the use of the IRK, see Volume 1,
>> Part A,
>> >>>>>>>> Section 5.4.5 of [BLE54].
>> >>>>>>>> -->
>> >>>>>>>>
>> >>>>>>>>> Yes.
>> >>>>>>>
>> >>>>>>>
>> >>>>>>>
>> >>>>>>> ii) To clarify, would you like these references below to remain
>> as is (as two separate references)?
>> >>>>>>
>> >>>>>> Actually, I think they’re one big PDF, so a reference to the same
>> doc is fine.
>> >>>>>>
>> >>>>>>>
>> >>>>>>>> 16) <!-- [rfced] References:
>> >>>>>>>>
>> >>>>>>>> a) We note that [draft-brinckman-nipc] was replaced by
>> [draft-ietf-asdf-nipc].
>> >>>>>>>> Should these remain as two separate references? Or, would you
>> like to remove
>> >>>>>>>> the citation to [draft-brinckman-nipc] and only keep the
>> >>>>>>>> reference to [draft-ietf-asdf-nipc]?
>> >>>>>>>>> Yes.
>> >>>>>>>
>> >>>>>>>
>> >>>>>>> iii) We have made the update below as requested. Please provide a
>> reference for [OAUTHv2].
>> >>>>>>
>> >>>>>> RFC 6749.
>> >>>>>>
>> >>>>>>
>> >>>>>>>
>> >>>>>>>> OLD:
>> >>>>>>>>
>> >>>>>>>>> Note that either clientToken or certificateInfo is used for the
>> authentication of the application. If certificateInfo is NOT present when
>> an endpointApp object is created, then the server SHOULD return a
>> clientToken. Otherwise, if the server accepts the certificateInfo object
>> for authentication, it SHOULD NOT return a clientToken. If the server
>> accepts and produces a clientToken, then control and telemetry servers MUST
>> validate both. The SCIM client will know that this is the case based on the
>> SCIM object that is returned.
>> >>>>>>>>
>> >>>>>>>>
>> >>>>>>>> Now there’s a nice big SHOULD in the middle of that, but it
>> leads to a question as to when that SHOULD doesn’t apply.  The obvious
>> answer is with OAUTH.  So we think the following text would address that
>> point:
>> >>>>>>>>
>> >>>>>>>> NEW:
>> >>>>>>>>
>> >>>>>>>>> If certificateInfo is provided by the client and is accepted by
>> the server, the server MUST return that multivalued attribute in its
>> response.  Otherwise, the server is expected to return a clientToken.  If
>> the server returns neither certificateInfo nor a clientToken, then external
>> authentication such as [OAUTHv2] MUST be pre-arranged.  If the server
>> accepts a certificate and produces a clientToken, then control and
>> telemetry servers MUST validate both.
>> >>>>>>>
>> >>>>>>>
>> >>>>>>> iv) We have added Sriram to the Acknowledgments. Please let us
>> know if there is any additional text to include.
>> >>>>>>>
>> >>>>>>>> Finally, these matters were brought to our attention by Sriram
>> Sekar who I would ask to be added to the acknowledgments.
>> >>>>>>>
>> >>>>>>>
>> >>>>>>> v) Note that we have updated the expansion of NIPC to
>> Non-Internet-Connected Physical Components (NIPC) per Rohit Mohan’s email.
>>
>> >>>>>>
>> >>>>>> Ok
>> >>>>>>
>> >>>>>>>
>> >>>>>>>> c) FYI - We have added expansions for the following
>> abbreviations. Please review
>> >>>>>>>> each expansion in the document carefully to ensure correctness.
>> >>>>>>>>
>> >>>>>>>> Certificate Authority (CA)
>> >>>>>>>> Near Field Communication (NFC)
>> >>>>>>>> Non-IP Device Control (NIPC)
>> >>>>>>>> Universally Unique Identifier (UUID)
>> >>>>>>>> -->
>> >>>>>>>
>> >>>>>>>
>> >>>>>>> vi) Also note that we have added this Perhaps text to the
>> document for now. We will discuss with the team whether RESTful should be
>> marked as well-known (and not require expansion).
>> >>>>>>
>> >>>>>> Ok
>> >>>>>>
>> >>>>>> Thanks!
>> >>>>>>
>> >>>>>> Eliot
>> >>>>>>
>> >>>>>>>
>> >>>>>>>> b) May we expand "RESTful" by providing a definition as follows?
>> >>>>>>>>
>> >>>>>>>> Original:
>> >>>>>>>>
>> >>>>>>>> confirmationNumber:  An integer which some solutions require in
>> >>>>>>>> RESTful message exchange.
>> >>>>>>>>
>> >>>>>>>> Perhaps:
>> >>>>>>>>
>> >>>>>>>> confirmationNumber:  An integer that some solutions require in
>> >>>>>>>> a RESTful message exchange (where RESTful refers to the
>> Representational
>> >>>>>>>> State Transfer (REST) architecture).
>> >>>>>>>>
>> >>>>>>>>> While I leave this to the RPC, might I suggest that RESTful now
>> be consider one of those industry terms of art that doesn’t require
>> expansion?
>> >>>>>>>
>> >>>>>>>
>> >>>>>>>
>> >>>>>>> — FILES (please refresh): —
>> >>>>>>>
>> >>>>>>> The updated files have been posted here:
>> >>>>>>> https://www.rfc-editor.org/authors/rfc9944.txt
>> >>>>>>> https://www.rfc-editor.org/authors/rfc9944.pdf
>> >>>>>>> https://www.rfc-editor.org/authors/rfc9944.html
>> >>>>>>> https://www.rfc-editor.org/authors/rfc9944.xml
>> >>>>>>>
>> >>>>>>> Diff files showing changes between the last and current version:
>> >>>>>>> https://www.rfc-editor.org/authors/rfc9944-lastdiff.html
>> >>>>>>> https://www.rfc-editor.org/authors/rfc9944-lastrfcdiff.html
>> (side by side)
>> >>>>>>>
>> >>>>>>> Diff files showing changes made during AUTH48:
>> >>>>>>> https://www.rfc-editor.org/authors/rfc9944-auth48diff.html
>> >>>>>>> https://www.rfc-editor.org/authors/rfc9944-auth48rfcdiff.html
>> (side by side)
>> >>>>>>>
>> >>>>>>> Diff files showing all changes:
>> >>>>>>> https://www.rfc-editor.org/authors/rfc9944-diff.html
>> >>>>>>> https://www.rfc-editor.org/authors/rfc9944-rfcdiff.html (side by
>> side)
>> >>>>>>>
>> >>>>>>> The AUTH48 status page for this document is available here:
>> >>>>>>> https://www.rfc-editor.org/auth48/rfc9944
>> >>>>>>>
>> >>>>>>>
>> >>>>>>> Thank you,
>> >>>>>>>
>> >>>>>>> Kaelin Foody
>> >>>>>>> RFC Production Center
>> >>>>>>>
>> >>>>>>>
>> >>>>>>> On Mar 18, 2026, at 12:47 PM, Eliot Lear <lear=
>> [email protected]> wrote:
>> >>>>>>>>
>> >>>>>>>> Hi RFC Editor and chairs and AD:
>> >>>>>>>>
>> >>>>>>>> In operational practice we have noticed two issues we would like
>> to address in the RFC before it is closed.  The first has to do with the
>> use of OAUTH as a means to authenticate SCIM connections.  Today we say in
>> Section 6.3.1:
>> >>>>>>>>
>> >>>>>>>> OLD:
>> >>>>>>>>
>> >>>>>>>>> Note that either clientToken or certificateInfo is used for the
>> authentication of the application. If certificateInfo is NOT present when
>> an endpointApp object is created, then the server SHOULD return a
>> clientToken. Otherwise, if the server accepts the certificateInfo object
>> for authentication, it SHOULD NOT return a clientToken. If the server
>> accepts and produces a clientToken, then control and telemetry servers MUST
>> validate both. The SCIM client will know that this is the case based on the
>> SCIM object that is returned.
>> >>>>>>>>
>> >>>>>>>>
>> >>>>>>>> Now there’s a nice big SHOULD in the middle of that, but it
>> leads to a question as to when that SHOULD doesn’t apply.  The obvious
>> answer is with OAUTH.  So we think the following text would address that
>> point:
>> >>>>>>>>
>> >>>>>>>> NEW:
>> >>>>>>>>
>> >>>>>>>>> If certificateInfo is provided by the client and is accepted by
>> the server, the server MUST return that multivalued attribute in its
>> response.  Otherwise, the server is expected to return a clientToken.  If
>> the server returns neither certificateInfo nor a clientToken, then external
>> authentication such as [OAUTHv2] MUST be pre-arranged.  If the server
>> accepts a certificate and produces a clientToken, then control and
>> telemetry servers MUST validate both.
>> >>>>>>>>
>> >>>>>>>>
>> >>>>>>>> This is a bit more crisp and prescriptive.
>> >>>>>>>>
>> >>>>>>>> Then in Section 7.6.1, we’ve noted one other issue:
>> >>>>>>>>
>> >>>>>>>>> telemetryEnterpriseEndpoint:A string representing a URL of the
>> enterprise endpoint to reach an enterprise gateway for telemetry. When the
>> enterprise receives the SCIM object from the onboarding application, it
>> adds this attribute to it and sends it back as a response to the onboarding
>> application. This attribute is optional, case sensitive, mutable, and
>> returned by default. The uniqueness is enforced by the enterprise. An
>> implementation MUST generate an exception if telemetryEnterpriseEndpoint is
>> not returned and telemetry is required for the proper functioning of a
>> device.
>> >>>>>>>>
>> >>>>>>>>
>> >>>>>>>> It is possible that this service may be externalized.  That is,
>> it’s there, but the SCIM implementation for $REASONs doesn’t know about
>> it.  To address this point, we propose to replace the last sentence (“An
>> implementation … a device.”) as follows:
>> >>>>>>>>
>> >>>>>>>> NEW:
>> >>>>>>>>
>> >>>>>>>>> This attribute is populated when the enterprise provides a
>> telemetry endpoint (e.g., hosted by the enterprise gateway).  If a
>> telemetry service is not known by the SCIM server, the attribute will not
>> be returned.  In such cases, if the application requires telemetry,
>> separate arrangements must be made.
>> >>>>>>>>
>> >>>>>>>>
>> >>>>>>>> Two other points:
>> >>>>>>>>
>> >>>>>>>> To answer Kaelin’s earlier question, we propose to add a note in
>> Section 1.3 as follows:
>> >>>>>>>>
>> >>>>>>>>> When JSON is presented in this memo, it is folded in accordance
>> with RFC 8792.
>> >>>>>>>>
>> >>>>>>>>
>> >>>>>>>> Also, we caught one error in an example in Section 7.6.2.
>> >>>>>>>>
>> >>>>>>>> OLD:
>> >>>>>>>>
>> >>>>>>>>> "telemetryEnterpriseEndpoint": "https://example.com/\
>> >>>>>>>>
>> >>>>>>>> NEW:
>> >>>>>>>>
>> >>>>>>>>> "telemetryEnterpriseEndpoint": "mqtts://example.com/\
>> <http://example.com/%5C>
>> >>>>>>>>
>> >>>>>>>>
>> >>>>>>>>
>> >>>>>>>> Noting the change of URI scheme.
>> >>>>>>>>
>> >>>>>>>> Finally, these matters were brought to our attention by Sriram
>> Sekar who I would ask to be added to the acknowledgments.
>> >>>>>>>>
>> >>>>>>>> Eliot
>> >>>>>>>>
>> >>>>>>>>> On 11 Mar 2026, at 19:39, [email protected] wrote:
>> >>>>>>>>>
>> >>>>>>>>> *****IMPORTANT*****
>> >>>>>>>>>
>> >>>>>>>>> Updated 2026/03/11
>> >>>>>>>>>
>> >>>>>>>>> RFC Author(s):
>> >>>>>>>>> --------------
>> >>>>>>>>>
>> >>>>>>>>> Instructions for Completing AUTH48
>> >>>>>>>>>
>> >>>>>>>>> Your document has now entered AUTH48.  Once it has been
>> reviewed and
>> >>>>>>>>> approved by you and all coauthors, it will be published as an
>> RFC.
>> >>>>>>>>> If an author is no longer available, there are several remedies
>> >>>>>>>>> available as listed in the FAQ (https://www.rfc-editor.org/faq/
>> ).
>> >>>>>>>>>
>> >>>>>>>>> You and you coauthors are responsible for engaging other
>> parties
>> >>>>>>>>> (e.g., Contributors or Working Group) as necessary before
>> providing
>> >>>>>>>>> your approval.
>> >>>>>>>>>
>> >>>>>>>>> Planning your review
>> >>>>>>>>> ---------------------
>> >>>>>>>>>
>> >>>>>>>>> Please review the following aspects of your document:
>> >>>>>>>>>
>> >>>>>>>>> *  RFC Editor questions
>> >>>>>>>>>
>> >>>>>>>>> Please review and resolve any questions raised by the RFC
>> Editor
>> >>>>>>>>> that have been included in the XML file as comments marked as
>> >>>>>>>>> follows:
>> >>>>>>>>>
>> >>>>>>>>> <!-- [rfced] ... -->
>> >>>>>>>>>
>> >>>>>>>>> These questions will also be sent in a subsequent email.
>> >>>>>>>>>
>> >>>>>>>>> *  Changes submitted by coauthors
>> >>>>>>>>>
>> >>>>>>>>> Please ensure that you review any changes submitted by your
>> >>>>>>>>> coauthors.  We assume that if you do not speak up that you
>> >>>>>>>>> agree to changes submitted by your coauthors.
>> >>>>>>>>>
>> >>>>>>>>> *  Content
>> >>>>>>>>>
>> >>>>>>>>> Please review the full content of the document, as this cannot
>> >>>>>>>>> change once the RFC is published.  Please pay particular
>> attention to:
>> >>>>>>>>> - IANA considerations updates (if applicable)
>> >>>>>>>>> - contact information
>> >>>>>>>>> - references
>> >>>>>>>>>
>> >>>>>>>>> *  Copyright notices and legends
>> >>>>>>>>>
>> >>>>>>>>> Please review the copyright notice and legends as defined in
>> >>>>>>>>> RFC 5378 and the Trust Legal Provisions
>> >>>>>>>>> (TLP – https://trustee.ietf.org/license-info).
>> >>>>>>>>>
>> >>>>>>>>> *  Semantic markup
>> >>>>>>>>>
>> >>>>>>>>> Please review the markup in the XML file to ensure that
>> elements of
>> >>>>>>>>> content are correctly tagged.  For example, ensure that
>> <sourcecode>
>> >>>>>>>>> and <artwork> are set correctly.  See details at
>> >>>>>>>>> <https://authors.ietf.org/rfcxml-vocabulary>.
>> >>>>>>>>>
>> >>>>>>>>> *  Formatted output
>> >>>>>>>>>
>> >>>>>>>>> Please review the PDF, HTML, and TXT files to ensure that the
>> >>>>>>>>> formatted output, as generated from the markup in the XML file,
>> is
>> >>>>>>>>> reasonable.  Please note that the TXT will have formatting
>> >>>>>>>>> limitations compared to the PDF and HTML.
>> >>>>>>>>>
>> >>>>>>>>>
>> >>>>>>>>> Submitting changes
>> >>>>>>>>> ------------------
>> >>>>>>>>>
>> >>>>>>>>> To submit changes, please reply to this email using ‘REPLY ALL’
>> as all
>> >>>>>>>>> the parties CCed on this message need to see your changes. The
>> parties
>> >>>>>>>>> include:
>> >>>>>>>>>
>> >>>>>>>>> *  your coauthors
>> >>>>>>>>>
>> >>>>>>>>> *  [email protected] (the RPC team)
>> >>>>>>>>>
>> >>>>>>>>> *  other document participants, depending on the stream (e.g.,
>> >>>>>>>>> IETF Stream participants are your working group chairs, the
>> >>>>>>>>> responsible ADs, and the document shepherd).
>> >>>>>>>>>
>> >>>>>>>>> *  [email protected], which is a new archival
>> mailing list
>> >>>>>>>>> to preserve AUTH48 conversations; it is not an active
>> discussion
>> >>>>>>>>> list:
>> >>>>>>>>>
>> >>>>>>>>> *  More info:
>> >>>>>>>>>
>> https://mailarchive.ietf.org/arch/msg/ietf-announce/yb6lpIGh-4Q9l2USxIAe6P8O4Zc
>> >>>>>>>>>
>> >>>>>>>>> *  The archive itself:
>> >>>>>>>>>  https://mailarchive.ietf.org/arch/browse/auth48archive/
>> >>>>>>>>>
>> >>>>>>>>> *  Note: If only absolutely necessary, you may temporarily opt
>> out
>> >>>>>>>>>  of the archiving of messages (e.g., to discuss a sensitive
>> matter).
>> >>>>>>>>>  If needed, please add a note at the top of the message that
>> you
>> >>>>>>>>>  have dropped the address. When the discussion is concluded,
>> >>>>>>>>>  [email protected] will be re-added to the CC list
>> and
>> >>>>>>>>>  its addition will be noted at the top of the message.
>> >>>>>>>>>
>> >>>>>>>>> You may submit your changes in one of two ways:
>> >>>>>>>>>
>> >>>>>>>>> An update to the provided XML file
>> >>>>>>>>> — OR —
>> >>>>>>>>> An explicit list of changes in this format
>> >>>>>>>>>
>> >>>>>>>>> Section # (or indicate Global)
>> >>>>>>>>>
>> >>>>>>>>> OLD:
>> >>>>>>>>> old text
>> >>>>>>>>>
>> >>>>>>>>> NEW:
>> >>>>>>>>> new text
>> >>>>>>>>>
>> >>>>>>>>> You do not need to reply with both an updated XML file and an
>> explicit
>> >>>>>>>>> list of changes, as either form is sufficient.
>> >>>>>>>>>
>> >>>>>>>>> We will ask a stream manager to review and approve any changes
>> that seem
>> >>>>>>>>> beyond editorial in nature, e.g., addition of new text,
>> deletion of text,
>> >>>>>>>>> and technical changes.  Information about stream managers can
>> be found in
>> >>>>>>>>> the FAQ.  Editorial changes do not require approval from a
>> stream manager.
>> >>>>>>>>>
>> >>>>>>>>>
>> >>>>>>>>> Approving for publication
>> >>>>>>>>> --------------------------
>> >>>>>>>>>
>> >>>>>>>>> To approve your RFC for publication, please reply to this email
>> stating
>> >>>>>>>>> that you approve this RFC for publication.  Please use ‘REPLY
>> ALL’,
>> >>>>>>>>> as all the parties CCed on this message need to see your
>> approval.
>> >>>>>>>>>
>> >>>>>>>>>
>> >>>>>>>>> Files
>> >>>>>>>>> -----
>> >>>>>>>>>
>> >>>>>>>>> The files are available here:
>> >>>>>>>>> https://www.rfc-editor.org/authors/rfc9944.xml
>> >>>>>>>>> https://www.rfc-editor.org/authors/rfc9944.html
>> >>>>>>>>> https://www.rfc-editor.org/authors/rfc9944.pdf
>> >>>>>>>>> https://www.rfc-editor.org/authors/rfc9944.txt
>> >>>>>>>>>
>> >>>>>>>>> Diff file of the text:
>> >>>>>>>>> https://www.rfc-editor.org/authors/rfc9944-diff.html
>> >>>>>>>>> https://www.rfc-editor.org/authors/rfc9944-rfcdiff.html (side
>> by side)
>> >>>>>>>>>
>> >>>>>>>>> Diff of the XML:
>> >>>>>>>>> https://www.rfc-editor.org/authors/rfc9944-xmldiff1.html
>> >>>>>>>>>
>> >>>>>>>>>
>> >>>>>>>>> Tracking progress
>> >>>>>>>>> -----------------
>> >>>>>>>>>
>> >>>>>>>>> The details of the AUTH48 status of your document are here:
>> >>>>>>>>> https://www.rfc-editor.org/auth48/rfc9944
>> >>>>>>>>>
>> >>>>>>>>> Please let us know if you have any questions.
>> >>>>>>>>>
>> >>>>>>>>> Thank you for your cooperation,
>> >>>>>>>>>
>> >>>>>>>>> RFC Editor
>> >>>>>>>>>
>> >>>>>>>>> --------------------------------------
>> >>>>>>>>> RFC9944 (draft-ietf-scim-device-model-18)
>> >>>>>>>>>
>> >>>>>>>>> Title            : Device Schema Extensions to the SCIM model
>> >>>>>>>>> Author(s)        : M. Shahzad, H. Iqbal, E. Lear
>> >>>>>>>>> WG Chair(s)      : Nancy Cam-Winget
>> >>>>>>>>> Area Director(s) : Deb Cooley, Paul Wouters
>> >>>>>>>>>
>> >>>>>>>>>
>> >>>>>>>>
>> >>>>>>>
>> >>>>>>
>> >>>>>
>> >>>>
>> >>>
>> >>
>> >
>>
>>
>
-- 
auth48archive mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to