Hi,

To create a new field, IANA would need instructions from an RFC or, if they see 
a clear need for it (per RFC 8126, Section 2.4), the ADs. If that's not 
appropriate, would it make sense to add a line that mentions that the registry 
doesn't include a "Resource Type" field, and that this field is being included 
in Table 10 for the readers' information, or something along those lines? I 
think our concern is just that someone might read the IANA Considerations 
section and wonder if the registry could have been misidentified.

thanks,
Amanda

On Fri Mar 27 18:47:42 2026, [email protected] wrote:
> Hi Kaelin
> 
> We did note this discrepancy during an IANA expert review.  My
> recommendation is that we not change the IANA tables at this stage,
> since that would require a full review of the core documents.  From a
> functional standpoint, the fields in the registry are enough.
> 
> That having been said, if IANA wants to update these fields, I would
> suggest that is a process that should be reviewed at least by the
> designated experts, if not by the working group itself.
> 
> Eliot
> 
> > On 27 Mar 2026, at 19:16, Kaelin Foody <[email protected]>
> > wrote:
> >
> > Hi IANA, authors,
> >
> > We had a few questions related to the IANA Considerations section of
> > this document (please see <https://www.rfc-
> > editor.org/authors/rfc9944.html#name-iana-considerations>).
> >
> > a) We note that Section 9.2 contains an indicator of "Resource Type:
> > Device”.  As this seems to match the template for registrations in
> > RFC 7643 (see below), should a “Resource Type” column be added to the
> > “SCIM Server-Related Schema URIs” registry
> > <https://www.iana.org/assignments/scim/scim.xhtml#server-related> (or
> > to any other registries in the "System for Cross-domain Identity
> > Management (SCIM) Schema URIs”
> > <https://www.iana.org/assignments/scim/scim.xhtml> registry group)?
> > Or should this information be cut from Section 9.2 to more closely
> > match the current registry entries?
> >
> > From RFC 7643:
> >
> > Intended or Associated Resource Type: A value defining the resource
> > type (e.g., "Device").
> >
> > b) As Section 10.3.2 of RFC 7643 and the registry at
> > <https://www.iana.org/assignments/scim/scim.xhtml#server-related> use
> > “Schema Name” and “Name” (respectively), we will also update
> > "Description” to “Name” in Section 9.2 of this document, unless we
> > hear objections otherwise (note that this change will also match
> > usage in Section 9.1, which already uses “Name”).
> >
> > Thanks in advance.
> >
> > All best,
> >
> > Kaelin Foody
> > RFC Production Center
> >
> >> On Mar 26, 2026, at 5:28 AM, Eliot Lear <[email protected]> wrote:
> >>
> >> Kaelin,
> >>
> >> Thanks.  I only have two additional comments:
> >>
> >> The legends seem to take up a lot of vertical space.  Is it possible
> >> to consolidate them into fewer lines, or is that dictated by the
> >> style guide?
> >>
> >> Could we preface Figures 3-12 with the word “Example:”?  The lack of
> >> a clear break makes it seem a little odd.
> >>
> >> Eliot
> >>
> >>> On 25 Mar 2026, at 20:16, Kaelin Foody <[email protected]
> >>> editor.org> wrote:
> >>>
> >>> Hi Deb, Eliot, all,
> >>>
> >>> Deb - Thank you for your approval. We have marked it here:
> >>> https://www.rfc-editor.org/auth48/rfc9944.
> >>>
> >>> Eliot - Thank you for your reply. We have updated the document
> >>> according to your responses. You may find the updated files at the
> >>> end of this email.
> >>>
> >>> One additional note:
> >>>
> >>>> Should pointers to BLE 5.3 be updated to 5.4 throughout?
> >>>>
> >>>>> Go with 5.4.
> >>>
> >>> For above, we have updated instances of BLE 5.3 to 5.4 throughout,
> >>> but some of these changes were made in the sourcecode. Please
> >>> carefully review these changes to ensure they are accurate (see:
> >>> https://www.rfc-editor.org/authors/rfc9944-lastrfcdiff.html) and
> >>> let us know if any additional changes need to be made.
> >>>
> >>> Please also note that we will ask IANA to update their registries
> >>> to match the edited document shortly.
> >>>
> >>> Upon careful review, please contact us with any further updates or
> >>> with your approval of the document in its current form.  We will
> >>> await approvals from each party listed on the AUTH48 status page
> >>> for this document prior to moving forward in the publication
> >>> process.
> >>>
> >>> The AUTH48 status page for this document is available here:
> >>> https://www.rfc-editor.org/auth48/rfc9944
> >>>
> >>> — FILES (please refresh): —
> >>>
> >>> The updated files have been posted here:
> >>> https://www.rfc-editor.org/authors/rfc9944.txt
> >>> https://www.rfc-editor.org/authors/rfc9944.pdf
> >>> https://www.rfc-editor.org/authors/rfc9944.html
> >>> https://www.rfc-editor.org/authors/rfc9944.xml
> >>>
> >>> Diff files showing changes between the last and current version:
> >>> https://www.rfc-editor.org/authors/rfc9944-lastdiff.html
> >>> https://www.rfc-editor.org/authors/rfc9944-lastrfcdiff.html (side
> >>> by side)
> >>>
> >>> Diff files showing changes made during AUTH48:
> >>> https://www.rfc-editor.org/authors/rfc9944-auth48diff.html
> >>> https://www.rfc-editor.org/authors/rfc9944-auth48rfcdiff.html (side
> >>> by side)
> >>>
> >>> Diff files showing all changes:
> >>> https://www.rfc-editor.org/authors/rfc9944-diff.html
> >>> https://www.rfc-editor.org/authors/rfc9944-rfcdiff.html (side by
> >>> side)
> >>>
> >>> Thank you,
> >>>
> >>> Kaelin Foody
> >>> RFC Production Center
> >>>
> >>>> On Mar 24, 2026, at 2:39 PM, Deb Cooley <[email protected]>
> >>>> wrote:
> >>>>
> >>>> Thanks for that.  I'm glad they are employer phone numbers.  No
> >>>> one needs more spam on their personal phones.
> >>>>
> >>>> Deb
> >>>>
> >>>> On Tue, Mar 24, 2026 at 12:28 PM Muhammad Shahzad
> >>>> <[email protected]> wrote:
> >>>> Hi All,
> >>>>
> >>>> The address currently listed for me and Hassan is good.
> >>>>
> >>>> On Tue, Mar 24, 2026 at 11:44 AM Eliot Lear <[email protected]>
> >>>> wrote:
> >>>> It’s a Cisco main #, and our address.  I’m okay with it.
> >>>> Muhammed?  Hassan?
> >>>>
> >>>> Eliot
> >>>>
> >>>>> On 24 Mar 2026, at 12:23, Deb Cooley <[email protected]>
> >>>>> wrote:
> >>>>>
> >>>>> Apologies, I missed the *AD note.....(both from Kaelin and
> >>>>> Eliot).
> >>>>>
> >>>>> I've checked the diff and subsequent message from Eliot pretty
> >>>>> carefully (especially the SHOULD/MUST change) and it all appears
> >>>>> to be fine.  I approve the changes.
> >>>>>
> >>>>> I only have one comment wrt Author Addresses:  These are super
> >>>>> specific.  In the case of the NC State authors, it appears that
> >>>>> the address is a department address, clearly already public.  For
> >>>>> Eliot, that is your personal address, no?  And the phone number?
> >>>>> I haven't seen too many phone numbers on drafts/RFCs.  This is
> >>>>> your call, but I think it would be reasonable (and mostly the
> >>>>> norm) to remove the actual street address and phone number.
> >>>>>
> >>>>> Deb
> >>>>>
> >>>>>
> >>>>>
> >>>>> On Tue, Mar 24, 2026 at 5:52 AM Eliot Lear <[email protected]>
> >>>>> wrote:
> >>>>>
> >>>>>
> >>>>>> On 20 Mar 2026, at 15:32, Kaelin Foody <[email protected]
> >>>>>> editor.org> wrote:
> >>>>>>
> >>>>>> Hi *Deb, Eliot, all,
> >>>>>>
> >>>>>> *Deb - As AD, please review the following changes to this
> >>>>>> document.
> >>>>>>
> >>>>>> You may view them in the diff here: https://www.rfc-
> >>>>>> editor.org/authors/rfc9944-lastdiff.html.
> >>>>>>
> >>>>>> There is additional context in this email thread regarding these
> >>>>>> changes, but we have summarized them below:
> >>>>>>
> >>>>>> Section 1.3: Added sentence re: line wrapping per RFC 8792.
> >>>>>>  Section 6.3.1: Updated paragraph that appears after Table 2.
> >>>>>> Section 7.6: Removed sentence in first paragraph (per inclusive
> >>>>>> language guidance).
> >>>>>> Section 7.6.1:  Updated definition of
> >>>>>> telemetryEnterpriseEndpoint.
> >>>>>>   Section 7.6.2: Updated one line of sourcecode.
> >>>>>>
> >>>>>>
> >>>>>> Eliot, authors - Thank you for your review and replies. You may
> >>>>>> find the updated files at the end of this email.
> >>>>>>
> >>>>>> A few follow-up questions:
> >>>>>>
> >>>>>>
> >>>>>> i) For question 15 below, we have updated part a as requested.
> >>>>>> We want to confirm how to proceed with the following:
> >>>>>>
> >>>>>> For part b -- should pointers to BLE 5.3 be updated to 5.4
> >>>>>> throughout?
> >>>>>
> >>>>> Go with 5.4.
> >>>>>>
> >>>>>> For part c -- is the “Current” text the correct reference?
> >>>>>
> >>>>> I need the text but probably the answer is “no” in relation to
> >>>>> BLE.  However, we have only tested against 5.4, and I will not
> >>>>> make any claims about 5.5, which introduces new encrypted
> >>>>> advertisement capabilities.
> >>>>>
> >>>>>>
> >>>>>>> 15) <!-- [rfced] [BLE54]: Please review the following questions
> >>>>>>> regarding this reference:
> >>>>>>>
> >>>>>>> a) We were unable to find "isRandom" mentioned in [BLE54] as
> >>>>>>> seen
> >>>>>>> below. Should this citation be updated?
> >>>>>>>
> >>>>>>> Original:
> >>>>>>>
> >>>>>>> isRandom:  A boolean flag taken from [BLE54].
> >>>>>>>
> >>>>>>>> You’re indeed correct. That flag itself is NOT taken from
> >>>>>>>> [BLE54].  The description should be as follows:
> >>>>>>>>
> >>>>>>>> isRandom:A boolean flag. If FALSE, the device is using a
> >>>>>>>> public MAC address. If TRUE, the device uses a random address.
> >>>>>>>> If an Identifying Resolving Key (IRK) is present, the address
> >>>>>>>> represents a resolvable private address. Otherwise, the
> >>>>>>>> address is assumed to be a random static address. Non-
> >>>>>>>> resolvable private addresses are not supported by this
> >>>>>>>> specification. This attribute is not required. It is mutable
> >>>>>>>> and is returned by default. The default value is FALSE.  See
> >>>>>>>> Vol 6 Part B, Section 1.3 of [BLE54] for more information
> >>>>>>>> about different address types.
> >>>>>>>>
> >>>>>>>> We have one other issue to look at: we want to make sure we
> >>>>>>>> are pointing to the amended 5.4 spec.  The earlier one was
> >>>>>>>> withdrawn.  The Section # above is from the amended spec.
> >>>>>>>
> >>>>>>> b) We also note a few instances of "BLE core specifications
> >>>>>>> 5.3" mentioned
> >>>>>>> throughout this document. However, the Normative References
> >>>>>>> section cites
> >>>>>>> Version 5.4. Please review and let us know if/how to update
> >>>>>>> accordingly.
> >>>>>>>
> >>>>>>> For example:
> >>>>>>>
> >>>>>>> "description": "The isRandom flag is taken from the BLE
> >>>>>>>     core specifications 5.3. If TRUE, device is using a
> >>>>>>>     random address.  Default value is false.",
> >>>>>>>
> >>>>>>> c) Please review our updates to the text below. There are
> >>>>>>> multiple volumes in
> >>>>>>> [BLE54]; it appears Section 5.4.5 is referring to Volume 1,
> >>>>>>> Part A, Section
> >>>>>>> 5.4.5 of [BLE54]. Is this the correct section?
> >>>>>>>
> >>>>>>> Original:
> >>>>>>>
> >>>>>>> For more information about the use of the IRK, see Section
> >>>>>>> 5.4.5 of
> >>>>>>> [BLE54].
> >>>>>>>
> >>>>>>> Current:
> >>>>>>>
> >>>>>>> For more information about the use of the IRK, see Volume 1,
> >>>>>>> Part A,
> >>>>>>> Section 5.4.5 of [BLE54].
> >>>>>>> -->
> >>>>>>>
> >>>>>>>> Yes.
> >>>>>>
> >>>>>>
> >>>>>>
> >>>>>> ii) To clarify, would you like these references below to remain
> >>>>>> as is (as two separate references)?
> >>>>>
> >>>>> Actually, I think they’re one big PDF, so a reference to the same
> >>>>> doc is fine.
> >>>>>
> >>>>>>
> >>>>>>> 16) <!-- [rfced] References:
> >>>>>>>
> >>>>>>> a) We note that [draft-brinckman-nipc] was replaced by [draft-
> >>>>>>> ietf-asdf-nipc].
> >>>>>>> Should these remain as two separate references? Or, would you
> >>>>>>> like to remove
> >>>>>>>  the citation to [draft-brinckman-nipc] and only keep the
> >>>>>>> reference to [draft-ietf-asdf-nipc]?
> >>>>>>>> Yes.
> >>>>>>
> >>>>>>
> >>>>>> iii) We have made the update below as requested. Please provide
> >>>>>> a reference for [OAUTHv2].
> >>>>>
> >>>>> RFC 6749.
> >>>>>
> >>>>>
> >>>>>>
> >>>>>>> OLD:
> >>>>>>>
> >>>>>>>> Note that either clientToken or certificateInfo is used for
> >>>>>>>> the authentication of the application. If certificateInfo is
> >>>>>>>> NOT present when an endpointApp object is created, then the
> >>>>>>>> server SHOULD return a clientToken. Otherwise, if the server
> >>>>>>>> accepts the certificateInfo object for authentication, it
> >>>>>>>> SHOULD NOT return a clientToken. If the server accepts and
> >>>>>>>> produces a clientToken, then control and telemetry servers
> >>>>>>>> MUST validate both. The SCIM client will know that this is the
> >>>>>>>> case based on the SCIM object that is returned.
> >>>>>>>
> >>>>>>>
> >>>>>>> Now there’s a nice big SHOULD in the middle of that, but it
> >>>>>>> leads to a question as to when that SHOULD doesn’t apply.  The
> >>>>>>> obvious answer is with OAUTH.  So we think the following text
> >>>>>>> would address that point:
> >>>>>>>
> >>>>>>> NEW:
> >>>>>>>
> >>>>>>>> If certificateInfo is provided by the client and is accepted
> >>>>>>>> by the server, the server MUST return that multivalued
> >>>>>>>> attribute in its response.  Otherwise, the server is expected
> >>>>>>>> to return a clientToken.  If the server returns neither
> >>>>>>>> certificateInfo nor a clientToken, then external
> >>>>>>>> authentication such as [OAUTHv2] MUST be pre-arranged.  If the
> >>>>>>>> server accepts a certificate and produces a clientToken, then
> >>>>>>>> control and telemetry servers MUST validate both.
> >>>>>>
> >>>>>>
> >>>>>> iv) We have added Sriram to the Acknowledgments. Please let us
> >>>>>> know if there is any additional text to include.
> >>>>>>
> >>>>>>> Finally, these matters were brought to our attention by Sriram
> >>>>>>> Sekar who I would ask to be added to the acknowledgments.
> >>>>>>
> >>>>>>
> >>>>>> v) Note that we have updated the expansion of NIPC to Non-
> >>>>>> Internet-Connected Physical Components (NIPC) per Rohit Mohan’s
> >>>>>> email.
> >>>>>
> >>>>> Ok
> >>>>>
> >>>>>>
> >>>>>>> c) FYI - We have added expansions for the following
> >>>>>>> abbreviations. Please review
> >>>>>>> each expansion in the document carefully to ensure correctness.
> >>>>>>>
> >>>>>>> Certificate Authority (CA)
> >>>>>>> Near Field Communication (NFC)
> >>>>>>> Non-IP Device Control (NIPC)
> >>>>>>>  Universally Unique Identifier (UUID)
> >>>>>>> -->
> >>>>>>
> >>>>>>
> >>>>>> vi) Also note that we have added this Perhaps text to the
> >>>>>> document for now. We will discuss with the team whether RESTful
> >>>>>> should be marked as well-known (and not require expansion).
> >>>>>
> >>>>> Ok
> >>>>>
> >>>>> Thanks!
> >>>>>
> >>>>> Eliot
> >>>>>
> >>>>>>
> >>>>>>> b) May we expand "RESTful" by providing a definition as
> >>>>>>> follows?
> >>>>>>>
> >>>>>>> Original:
> >>>>>>>
> >>>>>>> confirmationNumber:  An integer which some solutions require in
> >>>>>>>   RESTful message exchange.
> >>>>>>>
> >>>>>>> Perhaps:
> >>>>>>>
> >>>>>>> confirmationNumber:  An integer that some solutions require in
> >>>>>>> a RESTful message exchange (where RESTful refers to the
> >>>>>>> Representational
> >>>>>>> State Transfer (REST) architecture).
> >>>>>>>
> >>>>>>>> While I leave this to the RPC, might I suggest that RESTful
> >>>>>>>> now be consider one of those industry terms of art that
> >>>>>>>> doesn’t require expansion?
> >>>>>>
> >>>>>>
> >>>>>>
> >>>>>> — FILES (please refresh): —
> >>>>>>
> >>>>>> The updated files have been posted here:
> >>>>>> https://www.rfc-editor.org/authors/rfc9944.txt
> >>>>>> https://www.rfc-editor.org/authors/rfc9944.pdf
> >>>>>> https://www.rfc-editor.org/authors/rfc9944.html
> >>>>>> https://www.rfc-editor.org/authors/rfc9944.xml
> >>>>>>
> >>>>>> Diff files showing changes between the last and current version:
> >>>>>> https://www.rfc-editor.org/authors/rfc9944-lastdiff.html
> >>>>>> https://www.rfc-editor.org/authors/rfc9944-lastrfcdiff.html
> >>>>>> (side by side)
> >>>>>>
> >>>>>> Diff files showing changes made during AUTH48:
> >>>>>> https://www.rfc-editor.org/authors/rfc9944-auth48diff.html
> >>>>>> https://www.rfc-editor.org/authors/rfc9944-auth48rfcdiff.html
> >>>>>> (side by side)
> >>>>>>
> >>>>>> Diff files showing all changes:
> >>>>>> https://www.rfc-editor.org/authors/rfc9944-diff.html
> >>>>>> https://www.rfc-editor.org/authors/rfc9944-rfcdiff.html (side by
> >>>>>> side)
> >>>>>>
> >>>>>> The AUTH48 status page for this document is available here:
> >>>>>> https://www.rfc-editor.org/auth48/rfc9944
> >>>>>>
> >>>>>>
> >>>>>> Thank you,
> >>>>>>
> >>>>>> Kaelin Foody
> >>>>>> RFC Production Center
> >>>>>>
> >>>>>>
> >>>>>> On Mar 18, 2026, at 12:47 PM, Eliot Lear
> >>>>>> <[email protected]> wrote:
> >>>>>>>
> >>>>>>> Hi RFC Editor and chairs and AD:
> >>>>>>>
> >>>>>>> In operational practice we have noticed two issues we would
> >>>>>>> like to address in the RFC before it is closed.  The first has
> >>>>>>> to do with the use of OAUTH as a means to authenticate SCIM
> >>>>>>> connections.  Today we say in Section 6.3.1:
> >>>>>>>
> >>>>>>> OLD:
> >>>>>>>
> >>>>>>>> Note that either clientToken or certificateInfo is used for
> >>>>>>>> the authentication of the application. If certificateInfo is
> >>>>>>>> NOT present when an endpointApp object is created, then the
> >>>>>>>> server SHOULD return a clientToken. Otherwise, if the server
> >>>>>>>> accepts the certificateInfo object for authentication, it
> >>>>>>>> SHOULD NOT return a clientToken. If the server accepts and
> >>>>>>>> produces a clientToken, then control and telemetry servers
> >>>>>>>> MUST validate both. The SCIM client will know that this is the
> >>>>>>>> case based on the SCIM object that is returned.
> >>>>>>>
> >>>>>>>
> >>>>>>> Now there’s a nice big SHOULD in the middle of that, but it
> >>>>>>> leads to a question as to when that SHOULD doesn’t apply.  The
> >>>>>>> obvious answer is with OAUTH.  So we think the following text
> >>>>>>> would address that point:
> >>>>>>>
> >>>>>>> NEW:
> >>>>>>>
> >>>>>>>> If certificateInfo is provided by the client and is accepted
> >>>>>>>> by the server, the server MUST return that multivalued
> >>>>>>>> attribute in its response.  Otherwise, the server is expected
> >>>>>>>> to return a clientToken.  If the server returns neither
> >>>>>>>> certificateInfo nor a clientToken, then external
> >>>>>>>> authentication such as [OAUTHv2] MUST be pre-arranged.  If the
> >>>>>>>> server accepts a certificate and produces a clientToken, then
> >>>>>>>> control and telemetry servers MUST validate both.
> >>>>>>>
> >>>>>>>
> >>>>>>> This is a bit more crisp and prescriptive.
> >>>>>>>
> >>>>>>> Then in Section 7.6.1, we’ve noted one other issue:
> >>>>>>>
> >>>>>>>> telemetryEnterpriseEndpoint:A string representing a URL of the
> >>>>>>>> enterprise endpoint to reach an enterprise gateway for
> >>>>>>>> telemetry. When the enterprise receives the SCIM object from
> >>>>>>>> the onboarding application, it adds this attribute to it and
> >>>>>>>> sends it back as a response to the onboarding application.
> >>>>>>>> This attribute is optional, case sensitive, mutable, and
> >>>>>>>> returned by default. The uniqueness is enforced by the
> >>>>>>>> enterprise. An implementation MUST generate an exception if
> >>>>>>>> telemetryEnterpriseEndpoint is not returned and telemetry is
> >>>>>>>> required for the proper functioning of a device.
> >>>>>>>
> >>>>>>>
> >>>>>>> It is possible that this service may be externalized.  That is,
> >>>>>>> it’s there, but the SCIM implementation for $REASONs doesn’t
> >>>>>>> know about it.  To address this point, we propose to replace
> >>>>>>> the last sentence (“An implementation … a device.”) as follows:
> >>>>>>>
> >>>>>>> NEW:
> >>>>>>>
> >>>>>>>> This attribute is populated when the enterprise provides a
> >>>>>>>> telemetry endpoint (e.g., hosted by the enterprise gateway).
> >>>>>>>> If a telemetry service is not known by the SCIM server, the
> >>>>>>>> attribute will not be returned.  In such cases, if the
> >>>>>>>> application requires telemetry, separate arrangements must be
> >>>>>>>> made.
> >>>>>>>
> >>>>>>>
> >>>>>>> Two other points:
> >>>>>>>
> >>>>>>> To answer Kaelin’s earlier question, we propose to add a note
> >>>>>>> in Section 1.3 as follows:
> >>>>>>>
> >>>>>>>> When JSON is presented in this memo, it is folded in
> >>>>>>>> accordance with RFC 8792.
> >>>>>>>
> >>>>>>>
> >>>>>>> Also, we caught one error in an example in Section 7.6.2.
> >>>>>>>
> >>>>>>> OLD:
> >>>>>>>
> >>>>>>>> "telemetryEnterpriseEndpoint": "https://example.com/\
> >>>>>>>
> >>>>>>> NEW:
> >>>>>>>
> >>>>>>>> "telemetryEnterpriseEndpoint": "mqtts://example.com/\
> >>>>>>>
> >>>>>>>
> >>>>>>>
> >>>>>>> Noting the change of URI scheme.
> >>>>>>>
> >>>>>>> Finally, these matters were brought to our attention by Sriram
> >>>>>>> Sekar who I would ask to be added to the acknowledgments.
> >>>>>>>
> >>>>>>> Eliot
> >>>>>>>
> >>>>>>>> On 11 Mar 2026, at 19:39, [email protected] wrote:
> >>>>>>>>
> >>>>>>>> *****IMPORTANT*****
> >>>>>>>>
> >>>>>>>> Updated 2026/03/11
> >>>>>>>>
> >>>>>>>> RFC Author(s):
> >>>>>>>> --------------
> >>>>>>>>
> >>>>>>>> Instructions for Completing AUTH48
> >>>>>>>>
> >>>>>>>> Your document has now entered AUTH48.  Once it has been
> >>>>>>>> reviewed and
> >>>>>>>>  approved by you and all coauthors, it will be published as an
> >>>>>>>> RFC.
> >>>>>>>> If an author is no longer available, there are several
> >>>>>>>> remedies
> >>>>>>>> available as listed in the FAQ (https://www.rfc-
> >>>>>>>> editor.org/faq/).
> >>>>>>>>
> >>>>>>>> You and you coauthors are responsible for engaging other
> >>>>>>>> parties
> >>>>>>>> (e.g., Contributors or Working Group) as necessary before
> >>>>>>>> providing
> >>>>>>>> your approval.
> >>>>>>>>
> >>>>>>>> Planning your review
> >>>>>>>> ---------------------
> >>>>>>>>
> >>>>>>>> Please review the following aspects of your document:
> >>>>>>>>
> >>>>>>>> *  RFC Editor questions
> >>>>>>>>
> >>>>>>>> Please review and resolve any questions raised by the RFC
> >>>>>>>> Editor
> >>>>>>>> that have been included in the XML file as comments marked as
> >>>>>>>> follows:
> >>>>>>>>
> >>>>>>>> <!-- [rfced] ... -->
> >>>>>>>>
> >>>>>>>> These questions will also be sent in a subsequent email.
> >>>>>>>>
> >>>>>>>> *  Changes submitted by coauthors
> >>>>>>>>
> >>>>>>>> Please ensure that you review any changes submitted by your
> >>>>>>>> coauthors.  We assume that if you do not speak up that you
> >>>>>>>> agree to changes submitted by your coauthors.
> >>>>>>>>
> >>>>>>>> *  Content
> >>>>>>>>
> >>>>>>>> Please review the full content of the document, as this cannot
> >>>>>>>> change once the RFC is published.  Please pay particular
> >>>>>>>> attention to:
> >>>>>>>> - IANA considerations updates (if applicable)
> >>>>>>>> - contact information
> >>>>>>>> - references
> >>>>>>>>
> >>>>>>>> *  Copyright notices and legends
> >>>>>>>>
> >>>>>>>> Please review the copyright notice and legends as defined in
> >>>>>>>>  RFC 5378 and the Trust Legal Provisions
> >>>>>>>> (TLP – https://trustee.ietf.org/license-info).
> >>>>>>>>
> >>>>>>>> *  Semantic markup
> >>>>>>>>
> >>>>>>>> Please review the markup in the XML file to ensure that
> >>>>>>>> elements of
> >>>>>>>> content are correctly tagged.  For example, ensure that
> >>>>>>>> <sourcecode>
> >>>>>>>> and <artwork> are set correctly.  See details at
> >>>>>>>> <https://authors.ietf.org/rfcxml-vocabulary>.
> >>>>>>>>
> >>>>>>>> *  Formatted output
> >>>>>>>>
> >>>>>>>> Please review the PDF, HTML, and TXT files to ensure that the
> >>>>>>>> formatted output, as generated from the markup in the XML
> >>>>>>>> file, is
> >>>>>>>> reasonable.  Please note that the TXT will have formatting
> >>>>>>>> limitations compared to the PDF and HTML.
> >>>>>>>>
> >>>>>>>>
> >>>>>>>> Submitting changes
> >>>>>>>> ------------------
> >>>>>>>>
> >>>>>>>> To submit changes, please reply to this email using ‘REPLY
> >>>>>>>> ALL’ as all
> >>>>>>>> the parties CCed on this message need to see your changes. The
> >>>>>>>> parties
> >>>>>>>> include:
> >>>>>>>>
> >>>>>>>> *  your coauthors
> >>>>>>>>
> >>>>>>>> *  [email protected] (the RPC team)
> >>>>>>>>
> >>>>>>>> *  other document participants, depending on the stream (e.g.,
> >>>>>>>> IETF Stream participants are your working group chairs, the
> >>>>>>>> responsible ADs, and the document shepherd).
> >>>>>>>>
> >>>>>>>> *  [email protected], which is a new archival
> >>>>>>>> mailing list
> >>>>>>>> to preserve AUTH48 conversations; it is not an active
> >>>>>>>> discussion
> >>>>>>>> list:
> >>>>>>>>
> >>>>>>>> *  More info:
> >>>>>>>>   https://mailarchive.ietf.org/arch/msg/ietf-
> >>>>>>>> announce/yb6lpIGh-4Q9l2USxIAe6P8O4Zc
> >>>>>>>>
> >>>>>>>> *  The archive itself:
> >>>>>>>>   https://mailarchive.ietf.org/arch/browse/auth48archive/
> >>>>>>>>
> >>>>>>>> *  Note: If only absolutely necessary, you may temporarily opt
> >>>>>>>> out
> >>>>>>>>  of the archiving of messages (e.g., to discuss a sensitive
> >>>>>>>> matter).
> >>>>>>>>   If needed, please add a note at the top of the message that
> >>>>>>>> you
> >>>>>>>>   have dropped the address. When the discussion is concluded,
> >>>>>>>>   [email protected] will be re-added to the CC list
> >>>>>>>> and
> >>>>>>>>   its addition will be noted at the top of the message.
> >>>>>>>>
> >>>>>>>> You may submit your changes in one of two ways:
> >>>>>>>>
> >>>>>>>> An update to the provided XML file
> >>>>>>>> — OR —
> >>>>>>>> An explicit list of changes in this format
> >>>>>>>>
> >>>>>>>> Section # (or indicate Global)
> >>>>>>>>
> >>>>>>>> OLD:
> >>>>>>>> old text
> >>>>>>>>
> >>>>>>>> NEW:
> >>>>>>>> new text
> >>>>>>>>
> >>>>>>>> You do not need to reply with both an updated XML file and an
> >>>>>>>> explicit
> >>>>>>>> list of changes, as either form is sufficient.
> >>>>>>>>
> >>>>>>>> We will ask a stream manager to review and approve any changes
> >>>>>>>> that seem
> >>>>>>>>  beyond editorial in nature, e.g., addition of new text,
> >>>>>>>> deletion of text,
> >>>>>>>>  and technical changes.  Information about stream managers can
> >>>>>>>> be found in
> >>>>>>>> the FAQ.  Editorial changes do not require approval from a
> >>>>>>>> stream manager.
> >>>>>>>>
> >>>>>>>>
> >>>>>>>> Approving for publication
> >>>>>>>> --------------------------
> >>>>>>>>
> >>>>>>>> To approve your RFC for publication, please reply to this
> >>>>>>>> email stating
> >>>>>>>> that you approve this RFC for publication.  Please use ‘REPLY
> >>>>>>>> ALL’,
> >>>>>>>> as all the parties CCed on this message need to see your
> >>>>>>>> approval.
> >>>>>>>>
> >>>>>>>>
> >>>>>>>> Files
> >>>>>>>> -----
> >>>>>>>>
> >>>>>>>> The files are available here:
> >>>>>>>> https://www.rfc-editor.org/authors/rfc9944.xml
> >>>>>>>> https://www.rfc-editor.org/authors/rfc9944.html
> >>>>>>>> https://www.rfc-editor.org/authors/rfc9944.pdf
> >>>>>>>> https://www.rfc-editor.org/authors/rfc9944.txt
> >>>>>>>>
> >>>>>>>> Diff file of the text:
> >>>>>>>> https://www.rfc-editor.org/authors/rfc9944-diff.html
> >>>>>>>> https://www.rfc-editor.org/authors/rfc9944-rfcdiff.html (side
> >>>>>>>> by side)
> >>>>>>>>
> >>>>>>>> Diff of the XML:
> >>>>>>>> https://www.rfc-editor.org/authors/rfc9944-xmldiff1.html
> >>>>>>>>
> >>>>>>>>
> >>>>>>>> Tracking progress
> >>>>>>>> -----------------
> >>>>>>>>
> >>>>>>>> The details of the AUTH48 status of your document are here:
> >>>>>>>> https://www.rfc-editor.org/auth48/rfc9944
> >>>>>>>>
> >>>>>>>> Please let us know if you have any questions.
> >>>>>>>>
> >>>>>>>> Thank you for your cooperation,
> >>>>>>>>
> >>>>>>>> RFC Editor
> >>>>>>>>
> >>>>>>>> --------------------------------------
> >>>>>>>> RFC9944 (draft-ietf-scim-device-model-18)
> >>>>>>>>
> >>>>>>>> Title            : Device Schema Extensions to the SCIM model
> >>>>>>>> Author(s)        : M. Shahzad, H. Iqbal, E. Lear
> >>>>>>>> WG Chair(s)      : Nancy Cam-Winget
> >>>>>>>> Area Director(s) : Deb Cooley, Paul Wouters
> >>>>>>>>
> >>>>>>>>
> >>>>>>>
> >>>>>>
> >>>>>
> >>>>
> >>>
> >>
> >

-- 
auth48archive mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to