Grace Lewis edited this page Dec 17, 2018 · 22 revisions

The SEI ACE Implementation for Constrained and Unconstrained Resource Servers consists of five repositories:

It is an implementation of the ACE Working Group proposal for Authentication and Authorization in Resource-Constrained Environments with two extensions to support operation in disadvantaged environments:

  • RS to AS Pairing
  • Periodic introspection for token revocation

The implementation is based on previous work in establishing trusted identities in disconnected edge environments and explicit threat modeling. Supporting documents for this work are:

Clone this wiki locally
You can’t perform that action at this time.
You signed in with another tab or window. Reload to refresh your session. You signed out in another tab or window. Reload to refresh your session.
Press h to open a hovercard with more details.