Amanda,

Do you have any suggested wording we could add to help clarify things?

Eliot

> On 31 Mar 2026, at 20:06, Amanda Baber via RT <[email protected]> wrote:
> 
> Hi,
> 
> To create a new field, IANA would need instructions from an RFC or, if they 
> see a clear need for it (per RFC 8126, Section 2.4), the ADs. If that's not 
> appropriate, would it make sense to add a line that mentions that the 
> registry doesn't include a "Resource Type" field, and that this field is 
> being included in Table 10 for the readers' information, or something along 
> those lines? I think our concern is just that someone might read the IANA 
> Considerations section and wonder if the registry could have been 
> misidentified.
> 
> thanks,
> Amanda
> 
> On Fri Mar 27 18:47:42 2026, [email protected] wrote:
>> Hi Kaelin
>> 
>> We did note this discrepancy during an IANA expert review.  My
>> recommendation is that we not change the IANA tables at this stage,
>> since that would require a full review of the core documents.  From a
>> functional standpoint, the fields in the registry are enough.
>> 
>> That having been said, if IANA wants to update these fields, I would
>> suggest that is a process that should be reviewed at least by the
>> designated experts, if not by the working group itself.
>> 
>> Eliot
>> 
>>> On 27 Mar 2026, at 19:16, Kaelin Foody <[email protected]>
>>> wrote:
>>> 
>>> Hi IANA, authors,
>>> 
>>> We had a few questions related to the IANA Considerations section of
>>> this document (please see <https://www.rfc-
>>> editor.org/authors/rfc9944.html#name-iana-considerations>).
>>> 
>>> a) We note that Section 9.2 contains an indicator of "Resource Type:
>>> Device”.  As this seems to match the template for registrations in
>>> RFC 7643 (see below), should a “Resource Type” column be added to the
>>> “SCIM Server-Related Schema URIs” registry
>>> <https://www.iana.org/assignments/scim/scim.xhtml#server-related> (or
>>> to any other registries in the "System for Cross-domain Identity
>>> Management (SCIM) Schema URIs”
>>> <https://www.iana.org/assignments/scim/scim.xhtml> registry group)?
>>> Or should this information be cut from Section 9.2 to more closely
>>> match the current registry entries?
>>> 
>>> From RFC 7643:
>>> 
>>> Intended or Associated Resource Type: A value defining the resource
>>> type (e.g., "Device").
>>> 
>>> b) As Section 10.3.2 of RFC 7643 and the registry at
>>> <https://www.iana.org/assignments/scim/scim.xhtml#server-related> use
>>> “Schema Name” and “Name” (respectively), we will also update
>>> "Description” to “Name” in Section 9.2 of this document, unless we
>>> hear objections otherwise (note that this change will also match
>>> usage in Section 9.1, which already uses “Name”).
>>> 
>>> Thanks in advance.
>>> 
>>> All best,
>>> 
>>> Kaelin Foody
>>> RFC Production Center
>>> 
>>>> On Mar 26, 2026, at 5:28 AM, Eliot Lear <[email protected]> wrote:
>>>> 
>>>> Kaelin,
>>>> 
>>>> Thanks.  I only have two additional comments:
>>>> 
>>>> The legends seem to take up a lot of vertical space.  Is it possible
>>>> to consolidate them into fewer lines, or is that dictated by the
>>>> style guide?
>>>> 
>>>> Could we preface Figures 3-12 with the word “Example:”?  The lack of
>>>> a clear break makes it seem a little odd.
>>>> 
>>>> Eliot
>>>> 
>>>>> On 25 Mar 2026, at 20:16, Kaelin Foody <[email protected]
>>>>> editor.org> wrote:
>>>>> 
>>>>> Hi Deb, Eliot, all,
>>>>> 
>>>>> Deb - Thank you for your approval. We have marked it here:
>>>>> https://www.rfc-editor.org/auth48/rfc9944.
>>>>> 
>>>>> Eliot - Thank you for your reply. We have updated the document
>>>>> according to your responses. You may find the updated files at the
>>>>> end of this email.
>>>>> 
>>>>> One additional note:
>>>>> 
>>>>>> Should pointers to BLE 5.3 be updated to 5.4 throughout?
>>>>>> 
>>>>>>> Go with 5.4.
>>>>> 
>>>>> For above, we have updated instances of BLE 5.3 to 5.4 throughout,
>>>>> but some of these changes were made in the sourcecode. Please
>>>>> carefully review these changes to ensure they are accurate (see:
>>>>> https://www.rfc-editor.org/authors/rfc9944-lastrfcdiff.html) and
>>>>> let us know if any additional changes need to be made.
>>>>> 
>>>>> Please also note that we will ask IANA to update their registries
>>>>> to match the edited document shortly.
>>>>> 
>>>>> Upon careful review, please contact us with any further updates or
>>>>> with your approval of the document in its current form.  We will
>>>>> await approvals from each party listed on the AUTH48 status page
>>>>> for this document prior to moving forward in the publication
>>>>> process.
>>>>> 
>>>>> The AUTH48 status page for this document is available here:
>>>>> https://www.rfc-editor.org/auth48/rfc9944
>>>>> 
>>>>> — FILES (please refresh): —
>>>>> 
>>>>> The updated files have been posted here:
>>>>> https://www.rfc-editor.org/authors/rfc9944.txt
>>>>> https://www.rfc-editor.org/authors/rfc9944.pdf
>>>>> https://www.rfc-editor.org/authors/rfc9944.html
>>>>> https://www.rfc-editor.org/authors/rfc9944.xml
>>>>> 
>>>>> Diff files showing changes between the last and current version:
>>>>> https://www.rfc-editor.org/authors/rfc9944-lastdiff.html
>>>>> https://www.rfc-editor.org/authors/rfc9944-lastrfcdiff.html (side
>>>>> by side)
>>>>> 
>>>>> Diff files showing changes made during AUTH48:
>>>>> https://www.rfc-editor.org/authors/rfc9944-auth48diff.html
>>>>> https://www.rfc-editor.org/authors/rfc9944-auth48rfcdiff.html (side
>>>>> by side)
>>>>> 
>>>>> Diff files showing all changes:
>>>>> https://www.rfc-editor.org/authors/rfc9944-diff.html
>>>>> https://www.rfc-editor.org/authors/rfc9944-rfcdiff.html (side by
>>>>> side)
>>>>> 
>>>>> Thank you,
>>>>> 
>>>>> Kaelin Foody
>>>>> RFC Production Center
>>>>> 
>>>>>> On Mar 24, 2026, at 2:39 PM, Deb Cooley <[email protected]>
>>>>>> wrote:
>>>>>> 
>>>>>> Thanks for that.  I'm glad they are employer phone numbers.  No
>>>>>> one needs more spam on their personal phones.
>>>>>> 
>>>>>> Deb
>>>>>> 
>>>>>> On Tue, Mar 24, 2026 at 12:28 PM Muhammad Shahzad
>>>>>> <[email protected]> wrote:
>>>>>> Hi All,
>>>>>> 
>>>>>> The address currently listed for me and Hassan is good.
>>>>>> 
>>>>>> On Tue, Mar 24, 2026 at 11:44 AM Eliot Lear <[email protected]>
>>>>>> wrote:
>>>>>> It’s a Cisco main #, and our address.  I’m okay with it.
>>>>>> Muhammed?  Hassan?
>>>>>> 
>>>>>> Eliot
>>>>>> 
>>>>>>> On 24 Mar 2026, at 12:23, Deb Cooley <[email protected]>
>>>>>>> wrote:
>>>>>>> 
>>>>>>> Apologies, I missed the *AD note.....(both from Kaelin and
>>>>>>> Eliot).
>>>>>>> 
>>>>>>> I've checked the diff and subsequent message from Eliot pretty
>>>>>>> carefully (especially the SHOULD/MUST change) and it all appears
>>>>>>> to be fine.  I approve the changes.
>>>>>>> 
>>>>>>> I only have one comment wrt Author Addresses:  These are super
>>>>>>> specific.  In the case of the NC State authors, it appears that
>>>>>>> the address is a department address, clearly already public.  For
>>>>>>> Eliot, that is your personal address, no?  And the phone number?
>>>>>>> I haven't seen too many phone numbers on drafts/RFCs.  This is
>>>>>>> your call, but I think it would be reasonable (and mostly the
>>>>>>> norm) to remove the actual street address and phone number.
>>>>>>> 
>>>>>>> Deb
>>>>>>> 
>>>>>>> 
>>>>>>> 
>>>>>>> On Tue, Mar 24, 2026 at 5:52 AM Eliot Lear <[email protected]>
>>>>>>> wrote:
>>>>>>> 
>>>>>>> 
>>>>>>>> On 20 Mar 2026, at 15:32, Kaelin Foody <[email protected]
>>>>>>>> editor.org> wrote:
>>>>>>>> 
>>>>>>>> Hi *Deb, Eliot, all,
>>>>>>>> 
>>>>>>>> *Deb - As AD, please review the following changes to this
>>>>>>>> document.
>>>>>>>> 
>>>>>>>> You may view them in the diff here: https://www.rfc-
>>>>>>>> editor.org/authors/rfc9944-lastdiff.html.
>>>>>>>> 
>>>>>>>> There is additional context in this email thread regarding these
>>>>>>>> changes, but we have summarized them below:
>>>>>>>> 
>>>>>>>> Section 1.3: Added sentence re: line wrapping per RFC 8792.
>>>>>>>> Section 6.3.1: Updated paragraph that appears after Table 2.
>>>>>>>> Section 7.6: Removed sentence in first paragraph (per inclusive
>>>>>>>> language guidance).
>>>>>>>> Section 7.6.1:  Updated definition of
>>>>>>>> telemetryEnterpriseEndpoint.
>>>>>>>>  Section 7.6.2: Updated one line of sourcecode.
>>>>>>>> 
>>>>>>>> 
>>>>>>>> Eliot, authors - Thank you for your review and replies. You may
>>>>>>>> find the updated files at the end of this email.
>>>>>>>> 
>>>>>>>> A few follow-up questions:
>>>>>>>> 
>>>>>>>> 
>>>>>>>> i) For question 15 below, we have updated part a as requested.
>>>>>>>> We want to confirm how to proceed with the following:
>>>>>>>> 
>>>>>>>> For part b -- should pointers to BLE 5.3 be updated to 5.4
>>>>>>>> throughout?
>>>>>>> 
>>>>>>> Go with 5.4.
>>>>>>>> 
>>>>>>>> For part c -- is the “Current” text the correct reference?
>>>>>>> 
>>>>>>> I need the text but probably the answer is “no” in relation to
>>>>>>> BLE.  However, we have only tested against 5.4, and I will not
>>>>>>> make any claims about 5.5, which introduces new encrypted
>>>>>>> advertisement capabilities.
>>>>>>> 
>>>>>>>> 
>>>>>>>>> 15) <!-- [rfced] [BLE54]: Please review the following questions
>>>>>>>>> regarding this reference:
>>>>>>>>> 
>>>>>>>>> a) We were unable to find "isRandom" mentioned in [BLE54] as
>>>>>>>>> seen
>>>>>>>>> below. Should this citation be updated?
>>>>>>>>> 
>>>>>>>>> Original:
>>>>>>>>> 
>>>>>>>>> isRandom:  A boolean flag taken from [BLE54].
>>>>>>>>> 
>>>>>>>>>> You’re indeed correct. That flag itself is NOT taken from
>>>>>>>>>> [BLE54].  The description should be as follows:
>>>>>>>>>> 
>>>>>>>>>> isRandom:A boolean flag. If FALSE, the device is using a
>>>>>>>>>> public MAC address. If TRUE, the device uses a random address.
>>>>>>>>>> If an Identifying Resolving Key (IRK) is present, the address
>>>>>>>>>> represents a resolvable private address. Otherwise, the
>>>>>>>>>> address is assumed to be a random static address. Non-
>>>>>>>>>> resolvable private addresses are not supported by this
>>>>>>>>>> specification. This attribute is not required. It is mutable
>>>>>>>>>> and is returned by default. The default value is FALSE.  See
>>>>>>>>>> Vol 6 Part B, Section 1.3 of [BLE54] for more information
>>>>>>>>>> about different address types.
>>>>>>>>>> 
>>>>>>>>>> We have one other issue to look at: we want to make sure we
>>>>>>>>>> are pointing to the amended 5.4 spec.  The earlier one was
>>>>>>>>>> withdrawn.  The Section # above is from the amended spec.
>>>>>>>>> 
>>>>>>>>> b) We also note a few instances of "BLE core specifications
>>>>>>>>> 5.3" mentioned
>>>>>>>>> throughout this document. However, the Normative References
>>>>>>>>> section cites
>>>>>>>>> Version 5.4. Please review and let us know if/how to update
>>>>>>>>> accordingly.
>>>>>>>>> 
>>>>>>>>> For example:
>>>>>>>>> 
>>>>>>>>> "description": "The isRandom flag is taken from the BLE
>>>>>>>>>    core specifications 5.3. If TRUE, device is using a
>>>>>>>>>    random address.  Default value is false.",
>>>>>>>>> 
>>>>>>>>> c) Please review our updates to the text below. There are
>>>>>>>>> multiple volumes in
>>>>>>>>> [BLE54]; it appears Section 5.4.5 is referring to Volume 1,
>>>>>>>>> Part A, Section
>>>>>>>>> 5.4.5 of [BLE54]. Is this the correct section?
>>>>>>>>> 
>>>>>>>>> Original:
>>>>>>>>> 
>>>>>>>>> For more information about the use of the IRK, see Section
>>>>>>>>> 5.4.5 of
>>>>>>>>> [BLE54].
>>>>>>>>> 
>>>>>>>>> Current:
>>>>>>>>> 
>>>>>>>>> For more information about the use of the IRK, see Volume 1,
>>>>>>>>> Part A,
>>>>>>>>> Section 5.4.5 of [BLE54].
>>>>>>>>> -->
>>>>>>>>> 
>>>>>>>>>> Yes.
>>>>>>>> 
>>>>>>>> 
>>>>>>>> 
>>>>>>>> ii) To clarify, would you like these references below to remain
>>>>>>>> as is (as two separate references)?
>>>>>>> 
>>>>>>> Actually, I think they’re one big PDF, so a reference to the same
>>>>>>> doc is fine.
>>>>>>> 
>>>>>>>> 
>>>>>>>>> 16) <!-- [rfced] References:
>>>>>>>>> 
>>>>>>>>> a) We note that [draft-brinckman-nipc] was replaced by [draft-
>>>>>>>>> ietf-asdf-nipc].
>>>>>>>>> Should these remain as two separate references? Or, would you
>>>>>>>>> like to remove
>>>>>>>>> the citation to [draft-brinckman-nipc] and only keep the
>>>>>>>>> reference to [draft-ietf-asdf-nipc]?
>>>>>>>>>> Yes.
>>>>>>>> 
>>>>>>>> 
>>>>>>>> iii) We have made the update below as requested. Please provide
>>>>>>>> a reference for [OAUTHv2].
>>>>>>> 
>>>>>>> RFC 6749.
>>>>>>> 
>>>>>>> 
>>>>>>>> 
>>>>>>>>> OLD:
>>>>>>>>> 
>>>>>>>>>> Note that either clientToken or certificateInfo is used for
>>>>>>>>>> the authentication of the application. If certificateInfo is
>>>>>>>>>> NOT present when an endpointApp object is created, then the
>>>>>>>>>> server SHOULD return a clientToken. Otherwise, if the server
>>>>>>>>>> accepts the certificateInfo object for authentication, it
>>>>>>>>>> SHOULD NOT return a clientToken. If the server accepts and
>>>>>>>>>> produces a clientToken, then control and telemetry servers
>>>>>>>>>> MUST validate both. The SCIM client will know that this is the
>>>>>>>>>> case based on the SCIM object that is returned.
>>>>>>>>> 
>>>>>>>>> 
>>>>>>>>> Now there’s a nice big SHOULD in the middle of that, but it
>>>>>>>>> leads to a question as to when that SHOULD doesn’t apply.  The
>>>>>>>>> obvious answer is with OAUTH.  So we think the following text
>>>>>>>>> would address that point:
>>>>>>>>> 
>>>>>>>>> NEW:
>>>>>>>>> 
>>>>>>>>>> If certificateInfo is provided by the client and is accepted
>>>>>>>>>> by the server, the server MUST return that multivalued
>>>>>>>>>> attribute in its response.  Otherwise, the server is expected
>>>>>>>>>> to return a clientToken.  If the server returns neither
>>>>>>>>>> certificateInfo nor a clientToken, then external
>>>>>>>>>> authentication such as [OAUTHv2] MUST be pre-arranged.  If the
>>>>>>>>>> server accepts a certificate and produces a clientToken, then
>>>>>>>>>> control and telemetry servers MUST validate both.
>>>>>>>> 
>>>>>>>> 
>>>>>>>> iv) We have added Sriram to the Acknowledgments. Please let us
>>>>>>>> know if there is any additional text to include.
>>>>>>>> 
>>>>>>>>> Finally, these matters were brought to our attention by Sriram
>>>>>>>>> Sekar who I would ask to be added to the acknowledgments.
>>>>>>>> 
>>>>>>>> 
>>>>>>>> v) Note that we have updated the expansion of NIPC to Non-
>>>>>>>> Internet-Connected Physical Components (NIPC) per Rohit Mohan’s
>>>>>>>> email.
>>>>>>> 
>>>>>>> Ok
>>>>>>> 
>>>>>>>> 
>>>>>>>>> c) FYI - We have added expansions for the following
>>>>>>>>> abbreviations. Please review
>>>>>>>>> each expansion in the document carefully to ensure correctness.
>>>>>>>>> 
>>>>>>>>> Certificate Authority (CA)
>>>>>>>>> Near Field Communication (NFC)
>>>>>>>>> Non-IP Device Control (NIPC)
>>>>>>>>> Universally Unique Identifier (UUID)
>>>>>>>>> -->
>>>>>>>> 
>>>>>>>> 
>>>>>>>> vi) Also note that we have added this Perhaps text to the
>>>>>>>> document for now. We will discuss with the team whether RESTful
>>>>>>>> should be marked as well-known (and not require expansion).
>>>>>>> 
>>>>>>> Ok
>>>>>>> 
>>>>>>> Thanks!
>>>>>>> 
>>>>>>> Eliot
>>>>>>> 
>>>>>>>> 
>>>>>>>>> b) May we expand "RESTful" by providing a definition as
>>>>>>>>> follows?
>>>>>>>>> 
>>>>>>>>> Original:
>>>>>>>>> 
>>>>>>>>> confirmationNumber:  An integer which some solutions require in
>>>>>>>>>  RESTful message exchange.
>>>>>>>>> 
>>>>>>>>> Perhaps:
>>>>>>>>> 
>>>>>>>>> confirmationNumber:  An integer that some solutions require in
>>>>>>>>> a RESTful message exchange (where RESTful refers to the
>>>>>>>>> Representational
>>>>>>>>> State Transfer (REST) architecture).
>>>>>>>>> 
>>>>>>>>>> While I leave this to the RPC, might I suggest that RESTful
>>>>>>>>>> now be consider one of those industry terms of art that
>>>>>>>>>> doesn’t require expansion?
>>>>>>>> 
>>>>>>>> 
>>>>>>>> 
>>>>>>>> — FILES (please refresh): —
>>>>>>>> 
>>>>>>>> The updated files have been posted here:
>>>>>>>> https://www.rfc-editor.org/authors/rfc9944.txt
>>>>>>>> https://www.rfc-editor.org/authors/rfc9944.pdf
>>>>>>>> https://www.rfc-editor.org/authors/rfc9944.html
>>>>>>>> https://www.rfc-editor.org/authors/rfc9944.xml
>>>>>>>> 
>>>>>>>> Diff files showing changes between the last and current version:
>>>>>>>> https://www.rfc-editor.org/authors/rfc9944-lastdiff.html
>>>>>>>> https://www.rfc-editor.org/authors/rfc9944-lastrfcdiff.html
>>>>>>>> (side by side)
>>>>>>>> 
>>>>>>>> Diff files showing changes made during AUTH48:
>>>>>>>> https://www.rfc-editor.org/authors/rfc9944-auth48diff.html
>>>>>>>> https://www.rfc-editor.org/authors/rfc9944-auth48rfcdiff.html
>>>>>>>> (side by side)
>>>>>>>> 
>>>>>>>> Diff files showing all changes:
>>>>>>>> https://www.rfc-editor.org/authors/rfc9944-diff.html
>>>>>>>> https://www.rfc-editor.org/authors/rfc9944-rfcdiff.html (side by
>>>>>>>> side)
>>>>>>>> 
>>>>>>>> The AUTH48 status page for this document is available here:
>>>>>>>> https://www.rfc-editor.org/auth48/rfc9944
>>>>>>>> 
>>>>>>>> 
>>>>>>>> Thank you,
>>>>>>>> 
>>>>>>>> Kaelin Foody
>>>>>>>> RFC Production Center
>>>>>>>> 
>>>>>>>> 
>>>>>>>> On Mar 18, 2026, at 12:47 PM, Eliot Lear
>>>>>>>> <[email protected]> wrote:
>>>>>>>>> 
>>>>>>>>> Hi RFC Editor and chairs and AD:
>>>>>>>>> 
>>>>>>>>> In operational practice we have noticed two issues we would
>>>>>>>>> like to address in the RFC before it is closed.  The first has
>>>>>>>>> to do with the use of OAUTH as a means to authenticate SCIM
>>>>>>>>> connections.  Today we say in Section 6.3.1:
>>>>>>>>> 
>>>>>>>>> OLD:
>>>>>>>>> 
>>>>>>>>>> Note that either clientToken or certificateInfo is used for
>>>>>>>>>> the authentication of the application. If certificateInfo is
>>>>>>>>>> NOT present when an endpointApp object is created, then the
>>>>>>>>>> server SHOULD return a clientToken. Otherwise, if the server
>>>>>>>>>> accepts the certificateInfo object for authentication, it
>>>>>>>>>> SHOULD NOT return a clientToken. If the server accepts and
>>>>>>>>>> produces a clientToken, then control and telemetry servers
>>>>>>>>>> MUST validate both. The SCIM client will know that this is the
>>>>>>>>>> case based on the SCIM object that is returned.
>>>>>>>>> 
>>>>>>>>> 
>>>>>>>>> Now there’s a nice big SHOULD in the middle of that, but it
>>>>>>>>> leads to a question as to when that SHOULD doesn’t apply.  The
>>>>>>>>> obvious answer is with OAUTH.  So we think the following text
>>>>>>>>> would address that point:
>>>>>>>>> 
>>>>>>>>> NEW:
>>>>>>>>> 
>>>>>>>>>> If certificateInfo is provided by the client and is accepted
>>>>>>>>>> by the server, the server MUST return that multivalued
>>>>>>>>>> attribute in its response.  Otherwise, the server is expected
>>>>>>>>>> to return a clientToken.  If the server returns neither
>>>>>>>>>> certificateInfo nor a clientToken, then external
>>>>>>>>>> authentication such as [OAUTHv2] MUST be pre-arranged.  If the
>>>>>>>>>> server accepts a certificate and produces a clientToken, then
>>>>>>>>>> control and telemetry servers MUST validate both.
>>>>>>>>> 
>>>>>>>>> 
>>>>>>>>> This is a bit more crisp and prescriptive.
>>>>>>>>> 
>>>>>>>>> Then in Section 7.6.1, we’ve noted one other issue:
>>>>>>>>> 
>>>>>>>>>> telemetryEnterpriseEndpoint:A string representing a URL of the
>>>>>>>>>> enterprise endpoint to reach an enterprise gateway for
>>>>>>>>>> telemetry. When the enterprise receives the SCIM object from
>>>>>>>>>> the onboarding application, it adds this attribute to it and
>>>>>>>>>> sends it back as a response to the onboarding application.
>>>>>>>>>> This attribute is optional, case sensitive, mutable, and
>>>>>>>>>> returned by default. The uniqueness is enforced by the
>>>>>>>>>> enterprise. An implementation MUST generate an exception if
>>>>>>>>>> telemetryEnterpriseEndpoint is not returned and telemetry is
>>>>>>>>>> required for the proper functioning of a device.
>>>>>>>>> 
>>>>>>>>> 
>>>>>>>>> It is possible that this service may be externalized.  That is,
>>>>>>>>> it’s there, but the SCIM implementation for $REASONs doesn’t
>>>>>>>>> know about it.  To address this point, we propose to replace
>>>>>>>>> the last sentence (“An implementation … a device.”) as follows:
>>>>>>>>> 
>>>>>>>>> NEW:
>>>>>>>>> 
>>>>>>>>>> This attribute is populated when the enterprise provides a
>>>>>>>>>> telemetry endpoint (e.g., hosted by the enterprise gateway).
>>>>>>>>>> If a telemetry service is not known by the SCIM server, the
>>>>>>>>>> attribute will not be returned.  In such cases, if the
>>>>>>>>>> application requires telemetry, separate arrangements must be
>>>>>>>>>> made.
>>>>>>>>> 
>>>>>>>>> 
>>>>>>>>> Two other points:
>>>>>>>>> 
>>>>>>>>> To answer Kaelin’s earlier question, we propose to add a note
>>>>>>>>> in Section 1.3 as follows:
>>>>>>>>> 
>>>>>>>>>> When JSON is presented in this memo, it is folded in
>>>>>>>>>> accordance with RFC 8792.
>>>>>>>>> 
>>>>>>>>> 
>>>>>>>>> Also, we caught one error in an example in Section 7.6.2.
>>>>>>>>> 
>>>>>>>>> OLD:
>>>>>>>>> 
>>>>>>>>>> "telemetryEnterpriseEndpoint": "https://example.com/\
>>>>>>>>> 
>>>>>>>>> NEW:
>>>>>>>>> 
>>>>>>>>>> "telemetryEnterpriseEndpoint": "mqtts://example.com/\
>>>>>>>>> 
>>>>>>>>> 
>>>>>>>>> 
>>>>>>>>> Noting the change of URI scheme.
>>>>>>>>> 
>>>>>>>>> Finally, these matters were brought to our attention by Sriram
>>>>>>>>> Sekar who I would ask to be added to the acknowledgments.
>>>>>>>>> 
>>>>>>>>> Eliot
>>>>>>>>> 
>>>>>>>>>> On 11 Mar 2026, at 19:39, [email protected] wrote:
>>>>>>>>>> 
>>>>>>>>>> *****IMPORTANT*****
>>>>>>>>>> 
>>>>>>>>>> Updated 2026/03/11
>>>>>>>>>> 
>>>>>>>>>> RFC Author(s):
>>>>>>>>>> --------------
>>>>>>>>>> 
>>>>>>>>>> Instructions for Completing AUTH48
>>>>>>>>>> 
>>>>>>>>>> Your document has now entered AUTH48.  Once it has been
>>>>>>>>>> reviewed and
>>>>>>>>>> approved by you and all coauthors, it will be published as an
>>>>>>>>>> RFC.
>>>>>>>>>> If an author is no longer available, there are several
>>>>>>>>>> remedies
>>>>>>>>>> available as listed in the FAQ (https://www.rfc-
>>>>>>>>>> editor.org/faq/).
>>>>>>>>>> 
>>>>>>>>>> You and you coauthors are responsible for engaging other
>>>>>>>>>> parties
>>>>>>>>>> (e.g., Contributors or Working Group) as necessary before
>>>>>>>>>> providing
>>>>>>>>>> your approval.
>>>>>>>>>> 
>>>>>>>>>> Planning your review
>>>>>>>>>> ---------------------
>>>>>>>>>> 
>>>>>>>>>> Please review the following aspects of your document:
>>>>>>>>>> 
>>>>>>>>>> *  RFC Editor questions
>>>>>>>>>> 
>>>>>>>>>> Please review and resolve any questions raised by the RFC
>>>>>>>>>> Editor
>>>>>>>>>> that have been included in the XML file as comments marked as
>>>>>>>>>> follows:
>>>>>>>>>> 
>>>>>>>>>> <!-- [rfced] ... -->
>>>>>>>>>> 
>>>>>>>>>> These questions will also be sent in a subsequent email.
>>>>>>>>>> 
>>>>>>>>>> *  Changes submitted by coauthors
>>>>>>>>>> 
>>>>>>>>>> Please ensure that you review any changes submitted by your
>>>>>>>>>> coauthors.  We assume that if you do not speak up that you
>>>>>>>>>> agree to changes submitted by your coauthors.
>>>>>>>>>> 
>>>>>>>>>> *  Content
>>>>>>>>>> 
>>>>>>>>>> Please review the full content of the document, as this cannot
>>>>>>>>>> change once the RFC is published.  Please pay particular
>>>>>>>>>> attention to:
>>>>>>>>>> - IANA considerations updates (if applicable)
>>>>>>>>>> - contact information
>>>>>>>>>> - references
>>>>>>>>>> 
>>>>>>>>>> *  Copyright notices and legends
>>>>>>>>>> 
>>>>>>>>>> Please review the copyright notice and legends as defined in
>>>>>>>>>> RFC 5378 and the Trust Legal Provisions
>>>>>>>>>> (TLP – https://trustee.ietf.org/license-info).
>>>>>>>>>> 
>>>>>>>>>> *  Semantic markup
>>>>>>>>>> 
>>>>>>>>>> Please review the markup in the XML file to ensure that
>>>>>>>>>> elements of
>>>>>>>>>> content are correctly tagged.  For example, ensure that
>>>>>>>>>> <sourcecode>
>>>>>>>>>> and <artwork> are set correctly.  See details at
>>>>>>>>>> <https://authors.ietf.org/rfcxml-vocabulary>.
>>>>>>>>>> 
>>>>>>>>>> *  Formatted output
>>>>>>>>>> 
>>>>>>>>>> Please review the PDF, HTML, and TXT files to ensure that the
>>>>>>>>>> formatted output, as generated from the markup in the XML
>>>>>>>>>> file, is
>>>>>>>>>> reasonable.  Please note that the TXT will have formatting
>>>>>>>>>> limitations compared to the PDF and HTML.
>>>>>>>>>> 
>>>>>>>>>> 
>>>>>>>>>> Submitting changes
>>>>>>>>>> ------------------
>>>>>>>>>> 
>>>>>>>>>> To submit changes, please reply to this email using ‘REPLY
>>>>>>>>>> ALL’ as all
>>>>>>>>>> the parties CCed on this message need to see your changes. The
>>>>>>>>>> parties
>>>>>>>>>> include:
>>>>>>>>>> 
>>>>>>>>>> *  your coauthors
>>>>>>>>>> 
>>>>>>>>>> *  [email protected] (the RPC team)
>>>>>>>>>> 
>>>>>>>>>> *  other document participants, depending on the stream (e.g.,
>>>>>>>>>> IETF Stream participants are your working group chairs, the
>>>>>>>>>> responsible ADs, and the document shepherd).
>>>>>>>>>> 
>>>>>>>>>> *  [email protected], which is a new archival
>>>>>>>>>> mailing list
>>>>>>>>>> to preserve AUTH48 conversations; it is not an active
>>>>>>>>>> discussion
>>>>>>>>>> list:
>>>>>>>>>> 
>>>>>>>>>> *  More info:
>>>>>>>>>>  https://mailarchive.ietf.org/arch/msg/ietf-
>>>>>>>>>> announce/yb6lpIGh-4Q9l2USxIAe6P8O4Zc
>>>>>>>>>> 
>>>>>>>>>> *  The archive itself:
>>>>>>>>>>  https://mailarchive.ietf.org/arch/browse/auth48archive/
>>>>>>>>>> 
>>>>>>>>>> *  Note: If only absolutely necessary, you may temporarily opt
>>>>>>>>>> out
>>>>>>>>>> of the archiving of messages (e.g., to discuss a sensitive
>>>>>>>>>> matter).
>>>>>>>>>>  If needed, please add a note at the top of the message that
>>>>>>>>>> you
>>>>>>>>>>  have dropped the address. When the discussion is concluded,
>>>>>>>>>>  [email protected] will be re-added to the CC list
>>>>>>>>>> and
>>>>>>>>>>  its addition will be noted at the top of the message.
>>>>>>>>>> 
>>>>>>>>>> You may submit your changes in one of two ways:
>>>>>>>>>> 
>>>>>>>>>> An update to the provided XML file
>>>>>>>>>> — OR —
>>>>>>>>>> An explicit list of changes in this format
>>>>>>>>>> 
>>>>>>>>>> Section # (or indicate Global)
>>>>>>>>>> 
>>>>>>>>>> OLD:
>>>>>>>>>> old text
>>>>>>>>>> 
>>>>>>>>>> NEW:
>>>>>>>>>> new text
>>>>>>>>>> 
>>>>>>>>>> You do not need to reply with both an updated XML file and an
>>>>>>>>>> explicit
>>>>>>>>>> list of changes, as either form is sufficient.
>>>>>>>>>> 
>>>>>>>>>> We will ask a stream manager to review and approve any changes
>>>>>>>>>> that seem
>>>>>>>>>> beyond editorial in nature, e.g., addition of new text,
>>>>>>>>>> deletion of text,
>>>>>>>>>> and technical changes.  Information about stream managers can
>>>>>>>>>> be found in
>>>>>>>>>> the FAQ.  Editorial changes do not require approval from a
>>>>>>>>>> stream manager.
>>>>>>>>>> 
>>>>>>>>>> 
>>>>>>>>>> Approving for publication
>>>>>>>>>> --------------------------
>>>>>>>>>> 
>>>>>>>>>> To approve your RFC for publication, please reply to this
>>>>>>>>>> email stating
>>>>>>>>>> that you approve this RFC for publication.  Please use ‘REPLY
>>>>>>>>>> ALL’,
>>>>>>>>>> as all the parties CCed on this message need to see your
>>>>>>>>>> approval.
>>>>>>>>>> 
>>>>>>>>>> 
>>>>>>>>>> Files
>>>>>>>>>> -----
>>>>>>>>>> 
>>>>>>>>>> The files are available here:
>>>>>>>>>> https://www.rfc-editor.org/authors/rfc9944.xml
>>>>>>>>>> https://www.rfc-editor.org/authors/rfc9944.html
>>>>>>>>>> https://www.rfc-editor.org/authors/rfc9944.pdf
>>>>>>>>>> https://www.rfc-editor.org/authors/rfc9944.txt
>>>>>>>>>> 
>>>>>>>>>> Diff file of the text:
>>>>>>>>>> https://www.rfc-editor.org/authors/rfc9944-diff.html
>>>>>>>>>> https://www.rfc-editor.org/authors/rfc9944-rfcdiff.html (side
>>>>>>>>>> by side)
>>>>>>>>>> 
>>>>>>>>>> Diff of the XML:
>>>>>>>>>> https://www.rfc-editor.org/authors/rfc9944-xmldiff1.html
>>>>>>>>>> 
>>>>>>>>>> 
>>>>>>>>>> Tracking progress
>>>>>>>>>> -----------------
>>>>>>>>>> 
>>>>>>>>>> The details of the AUTH48 status of your document are here:
>>>>>>>>>> https://www.rfc-editor.org/auth48/rfc9944
>>>>>>>>>> 
>>>>>>>>>> Please let us know if you have any questions.
>>>>>>>>>> 
>>>>>>>>>> Thank you for your cooperation,
>>>>>>>>>> 
>>>>>>>>>> RFC Editor
>>>>>>>>>> 
>>>>>>>>>> --------------------------------------
>>>>>>>>>> RFC9944 (draft-ietf-scim-device-model-18)
>>>>>>>>>> 
>>>>>>>>>> Title            : Device Schema Extensions to the SCIM model
>>>>>>>>>> Author(s)        : M. Shahzad, H. Iqbal, E. Lear
>>>>>>>>>> WG Chair(s)      : Nancy Cam-Winget
>>>>>>>>>> Area Director(s) : Deb Cooley, Paul Wouters
>>>>>>>>>> 
>>>>>>>>>> 
>>>>>>>>> 
>>>>>>>> 
>>>>>>> 
>>>>>> 
>>>>> 
>>>> 
>>> 
> 

-- 
auth48archive mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to