Internet Assigned Numbers Authority CBOR Web Token (CWT) Claims Created 2018-03-22 Last Updated 2024-02-21 Available Formats [IMG] XML [IMG] HTML [IMG] Plain text Registries included below • CBOR Web Token (CWT) Claims • CWT Confirmation Methods CBOR Web Token (CWT) Claims Expert(s) Mike Jones, Hannes Tschofenig, Ludwig Seitz Reference [RFC8392] Note Registration requests should be sent to the mailing list described in [RFC8392]. If approved, designated experts should notify IANA within three weeks. For assistance, please contact iana@iana.org. Available Formats [IMG] CSV Range Registration Procedures Integer values from -256 to 255 Standards Action Integer values from -65536 to -257 Specification Required Integer values from 256 to 65535 Specification Required Integer values greater than 65535 Expert Review Strings of length 1 Standards Action Strings of length 2 Specification Required Strings of length greater than 2 Expert Review Claim Name Claim JWT Claim Name Claim Claim Value Change Controller Reference Description Key Type less Reserved for Private Use than [RFC8392] -65536 -65536 Unassigned to -261 hcert Health hcert -260 map [European_eHealth_Network] [Electronic Health Certificate Certificate Specification] EUPHNonce Challenge EUPHNonce -259 bstr [FIDO_Alliance] [FIDO Device Onboard Specification] Nonce Signing prefix for multi-app EATMAROEPrefix restricted EATMAROEPrefix -258 bstr [FIDO_Alliance] [FIDO Device Onboard Specification] operating environments EAT-FDO may contain EAT-FDO related to EAT-FDO -257 array [FIDO_Alliance] [FIDO Device Onboard Specification] FIDO Device Onboarding Unassigned -256 to -1 This Reserved registration 0 [IESG] [RFC8392] reserves the key value 0 iss Issuer iss 1 text string [IESG] [RFC8392] sub Subject sub 2 text string [IESG] [RFC8392] aud Audience aud 3 text string [IESG] [RFC8392] Expiration integer or exp Time exp 4 floating-point [IESG] [RFC8392] number integer or nbf Not Before nbf 5 floating-point [IESG] [RFC8392] number integer or iat Issued At iat 6 floating-point [IESG] [RFC8392] number cti CWT ID jti 7 byte string [IESG] [RFC8392] cnf Confirmation cnf 8 map [IESG] [RFC8747] The scope of an access byte string or scope token, as scope 9 text string [IESG] [RFC8693, Section 4.2] defined in [RFC6749]. Nonce Nonce eat_nonce 10 bstr or array [IETF] [OpenID Connect Core 1.0][RFC-ietf-rats-eat-25] Unassigned 11 to 37 The ACE profile a ace_profile token is ace_profile 38 integer [IETF] [RFC9200, Section 5.10] supposed to be used with. The client-nonce cnonce sent to the AS cnonce 39 byte string [IETF] [RFC9200, Section 5.10] by the RS via the client. The expiration time of a token measured unsigned exi from when it exi 40 integer [IETF] [RFC9200, Section 5.10.3] was received at the RS in seconds. Unassigned 41 to 255 UEID The Universal ueid 256 bstr [IETF] [RFC-ietf-rats-eat-25] Entity ID SUEIDs Semi-permanent sueids 257 map [IETF] [RFC-ietf-rats-eat-25] UEIDs Hardware OEM ID Hardware OEM oemid 258 bstr or int [IETF] [RFC-ietf-rats-eat-25] ID Model Hardware Model identifier for hwmodel 259 bstr [IETF] [RFC-ietf-rats-eat-25] hardware Hardware Hardware Version Version hwversion 260 array [IETF] [RFC-ietf-rats-eat-25] Identifier Uptime Uptime uptime 261 uint [IETF] [RFC-ietf-rats-eat-25] Indicates whether the OEM Authorized Boot software oemboot 262 bool [IETF] [RFC-ietf-rats-eat-25] booted was OEM authorized Indicates Debug Status status of dbgstat 263 uint [IETF] [RFC-ietf-rats-eat-25] debug facilities Location The geographic location 264 map [IETF] [RFC-ietf-rats-eat-25] location Indicates the EAT Profile EAT profile eat_profile 265 uri or oid [IETF] [RFC-ietf-rats-eat-25] followed The section Submodules Section containing submods 266 map [IETF] [RFC-ietf-rats-eat-25] submodules The number times the Boot Count entity or bootcount 267 uint [IETF] [RFC-ietf-rats-eat-25] submodule has been booted Boot Seed Identifies a bootseed 268 bstr [IETF] [RFC-ietf-rats-eat-25] boot cycle Certifications received as DLOAs Digital dloas 269 array [IETF] [RFC-ietf-rats-eat-25] Letters of Approval The name of Software Name the software swname 270 tstr [IETF] [RFC-ietf-rats-eat-25] running in the entity The version of Software Version software swversion 271 array [IETF] [RFC-ietf-rats-eat-25] running in the entity Manifests describing the Software Manifests software manifests 272 array [IETF] [RFC-ietf-rats-eat-25] installed on the entity Measurements of the software, Measurements memory measurements 273 array [IETF] [RFC-ietf-rats-eat-25] configuration and such on the entity The results of comparing Software Measurement Results software measres 274 array [IETF] [RFC-ietf-rats-eat-25] measurements to reference values Indicates Intended Use intended use intuse 275 uint [IETF] [RFC-ietf-rats-eat-25] of the EAT Unassigned 276 to 281 geohash Geohash String geohash 282 text string or [Consumer_Technology_Association] [Fast and Readable Geographical array Hashing (CTA-5009)] Unassigned 283 to 299 wmver The version of wmver 300 unsigned [DASH-IF] [ETSI TS 104 002 V1.1.1] the WM Token integer The WM unsigned wmvnd technology wmvnd 301 integer [DASH-IF] [ETSI TS 104 002 V1.1.1] vendor The length in unsigned wmpatlen bits of the WM wmpatlen 302 integer [DASH-IF] [ETSI TS 104 002 V1.1.1] pattern The nominal wmsegduration duration of a wmsegduration 303 map [DASH-IF] [ETSI TS 104 002 V1.1.1] segment COSE_Encrypt0 wmpattern The WM pattern wmpattern 304 or [DASH-IF] [ETSI TS 104 002 V1.1.1] COSE_Encrypt or byte string Used as input wmid to derive the wmid 305 text string [DASH-IF] [ETSI TS 104 002 V1.1.1] WM pattern for indirect mode Used as additional wmopid input to wmopid 306 unsigned [DASH-IF] [ETSI TS 104 002 V1.1.1] derive the WM integer pattern for indirect mode The key to use for derivation unsigned wmkeyver of the WM wmkeyver 307 integer [DASH-IF] [ETSI TS 104 002 V1.1.1] pattern in indirect mode Unassigned 308 to 2393 psa-client-id PSA Client ID N/A 2394 signed integer [Hannes_Tschofenig] [draft-tschofenig-rats-psa-token-09] psa-security-lifecycle PSA Security N/A 2395 unsigned [Hannes_Tschofenig] [draft-tschofenig-rats-psa-token-09] Lifecycle integer PSA psa-implementation-id Implementation N/A 2396 byte string [Hannes_Tschofenig] [draft-tschofenig-rats-psa-token-09] ID psa-boot-seed PSA Boot Seed N/A 2397 byte string [Hannes_Tschofenig] [draft-tschofenig-rats-psa-token-09] PSA psa-certification-reference Certification N/A 2398 text string [Hannes_Tschofenig] [draft-tschofenig-rats-psa-token-09] Reference psa-software-components PSA Software N/A 2399 array [Hannes_Tschofenig] [draft-tschofenig-rats-psa-token-09] Components PSA psa-verification-service-indicator Verification N/A 2400 text string [Hannes_Tschofenig] [draft-tschofenig-rats-psa-token-09] Service Indicator 2401 Unassigned to 65535 CWT Confirmation Methods Registration Procedure(s) Specification Required Expert(s) Ludwig Seitz, Mike Jones Reference [RFC8747] Note Registration requests should be sent to the mailing list described in [RFC8747]. If approved, designated experts should notify IANA within three weeks. For assistance, please contact iana@iana.org. Available Formats [IMG] CSV Confirmation Method Confirmation Method Description JWT Confirmation Confirmation Key Confirmation Value Type Change Reference Name Method Name Controller COSE_Key COSE_Key Representing Public Key jwk 1 COSE_Key structure [IESG] [RFC8747, Section 3.2] COSE_Encrypt or COSE_Encrypt0 structure Encrypted_COSE_Key Encrypted COSE_Key jwe 2 (with an optional [IESG] [RFC8747, corresponding Section 3.3] COSE_Encrypt or COSE_Encrypt0 tag) kid Key Identifier kid 3 binary string [IESG] [RFC8747, Section 3.4] OSCORE_Input_Material carrying the [RFC9203, osc parameters for using OSCORE per-message osc 4 map [IETF] Section security with implicit key confirmation 3.2.1] Contact Information ID Name Contact URI Last Updated [Consumer_Technology_Association] Consumer Technology Association mailto:standards&cta.tech 2024-02-21 [DASH-IF] DASH Industry Forum https://dashif.org 2023-03-01 [European_eHealth_Network] European eHealth Network mailto:jakob&kirei.se 2021-04-15 [FIDO_Alliance] FIDO Alliance mailto:iana-request&fidoalliance.org 2021-03-05 [Hannes_Tschofenig] Hannes Tschofenig mailto:hannes.tschofenig&arm.com 2022-07-27 [IESG] IESG mailto:iesg&ietf.org [IETF] IETF mailto:iesg&ietf.org Licensing Terms