hash stringlengths 32 32 | doc_id stringlengths 7 13 | section stringlengths 3 121 | content stringlengths 0 2.2M |
|---|---|---|---|
ebce105b6d97ede43cea618c70172b77 | 118 122 | 7.1.6 Resource [trustAnchorCred] | The [trustAnchorCred] <mgmtObj> specialization is read by AEs or CSEs on ADN or ASN/MN nodes in the Field Domain. A [trustAnchorCred] is configured as a child or children of [authenticationProfile] resources by means of a mgmtLink. A security principal acting on a [authenticationProfile] uses the information in the associated [trustAnchorCred] resources to identify a trust anchor certificate for validation of certificates. The [trustAnchorCred] resource shall contain the child resource specified in table 7.1.6-1. Table 7.1.6-1: Child resources of [trustAnchorCred] resource Child Resources of [trustAnchorCred] Child Resource Type Multiplicity Description [variable] <subscription> 0..n See clause 9.6.8 of ETSI TS 118 101 [2] The [trustAnchorCred] resource shall contain the attributes specified in table 7.1.6-2. Table 7.1.6-2: Attributes of [trustAnchorCred] resource Attributes of [trustAnchorCred] Multiplicity RW/ RO/ WO Description resourceType 1 RO See clause 9.6.1.3 of ETSI TS 118 101 [2]. resourceID 1 RO See clause 9.6.1.3 of ETSI TS 118 101 [2]. resourceName 1 WO See clause 9.6.1.3 of ETSI TS 118 101 [2]. parentID 1 RO See clause 9.6.1.3 of ETSI TS 118 101 [2]. expirationTime 1 RW See clause 9.6.1.3 of ETSI TS 118 101 [2]. accessControlPolicyIDs 0..1 (L) RW See clause 9.6.1.3 of ETSI TS 118 101 [2]. creationTime 1 RO See clause 9.6.1.3 of ETSI TS 118 101 [2]. lastModifiedTime 1 RO See clause 9.6.1.3 of ETSI TS 118 101 [2]. Labels 0..1(L) RW See clause 9.6.1.3 of ETSI TS 118 101 [2]. mgmtDefinition 1 WO See clause 9.6.15 of ETSI TS 118 101 [2]. This attribute shall have the fixed value 1024 ("trustAnchorCred"). objectIDs 0..1 (L) WO See clause 9.6.15 of ETSI TS 118 101 [2]. objectPaths 0..1 (L) WO See clause 9.6.15 of ETSI TS 118 101 [2]. Description 0..1 RW See clause 9.6.15 of ETSI TS 118 101 [2]. certFingerprint 1 WO Provides a hash value for identifying a certificate authority certificate to be used for validating certificates presented by other entities. URI 1 RW A URI from which the trust anchor certificate may be retrieved. ETSI ETSI TS 118 122 V4.5.1 (2023-07) 20 oneM2M TS-0022 version 4.5.1 Release 4 The certFingerprint attribute of the [trustAnchorCred] resource identifies a Certificate Authority certificate to be used by the Managed Entity as a trust anchor when validating the certificate chains provided by other entities. The hash value portion of the certFingerprint attribute shall be computed over the X.509 ASN.1 DER encoded certificate using the SHA-256 hash algorithm defined in FIPS PUB 180-4 [10]. The certFingerprint attribute shall be represented in the named information (ni) URI format defined in IETF RFC 6920 [7], see tables 7.2.6.1-2 and 7.3.2-1. Where the CA Certificate identified in a [trustAnchorCred] resource is not already in local storage, then the Managed Entity shall retrieve the certificate using the URI attribute in the [trustAnchorCred] resources. [trustAnchorCred] resources are expected to be protected by a secure environment on the Managed Entity, in order to preserve integrity of the attributes. Optimal protection is provided when the integrity protection of the management protocol message is verified in the secure environment. |
ebce105b6d97ede43cea618c70172b77 | 118 122 | 7.1.7 Resource [MAFClientRegCfg] | This <mgmtObj> specialization is used to convey instructions regarding the MAF Client Registration procedure (clause 8.8.2.3 of ETSI TS 118 103 [3]). The [MAFClientRegCfg] resource shall contain the child resource specified in table 7.1.7-1. Table 7.1.7-1: Child resources of [MAFClientRegCfg] resource Child Resources of [MAFClientRegCfg] Child Resource Type Multiplicity Description [variable] <subscription> 0..n See clause 9.6.8 of ETSI TS 118 101 [2] The [MAFClientRegCfg] resource shall contain the attributes specified in table 7.1.7-2. Table 7.1.7-2: Attributes of [MAFClientRegCfg] resource Attributes of [MAFClientRegCfg] Multiplicity RW/ RO/ WO Description resourceType 1 RO See clause 9.6.1.3 of ETSI TS 118 101 [2]. resourceID 1 RO See clause 9.6.1.3 of ETSI TS 118 101 [2]. resourceName 1 WO See clause 9.6.1.3 of ETSI TS 118 101 [2]. parentID 1 RO See clause 9.6.1.3 of ETSI TS 118 101 [2]. expirationTime 1 RW See clause 9.6.1.3 of ETSI TS 118 101 [2]. accessControlPolicyIDs 0..1 (L) RW See clause 9.6.1.3 of ETSI TS 118 101 [2]. creationTime 1 RO See clause 9.6.1.3 of ETSI TS 118 101 [2]. lastModifiedTime 1 RO See clause 9.6.1.3 of ETSI TS 118 101 [2]. labels 0..1(L) RW See clause 9.6.1.3 of ETSI TS 118 101 [2]. mgmtDefinition 1 WO See clause 9.6.15 of ETSI TS 118 101 [2]. This attribute shall have the fixed value 1025 ("MAFClientRegCfg"). objectIDs 0..1 (L) WO See clause 9.6.15 of ETSI TS 118 101 [2]. objectPaths 0..1 (L) WO See clause 9.6.15 of ETSI TS 118 101 [2]. description 0..1 RW See clause 9.6.15 of ETSI TS 118 101 [2]. fqdn 1 WO See clause 8.8.3.2 of ETSI TS 118 103 [3]. adminFQDN 1 WO See clause 8.8.3.2 of ETSI TS 118 103 [3]. httpPort 0..1 WO See clause 8.8.3.2 of ETSI TS 118 103 [3]. coapPort 0..1 WO See clause 8.8.3.2 of ETSI TS 118 103 [3]. websocketPort 0..1 WO See clause 8.8.3.2 of ETSI TS 118 103 [3]. mgmtLink 1 RW A link to a [authenticationProfile] resource containing the parameters for the MAF Client to establish mutually-authenticated secure communications with the MAF. The MAF Client shall perform the MAF Client Registration Procedure specified in clause 8.8.2.3 of ETSI TS 118 103 [3], using the linked authentication profile for mutual authentication of the MAF Client and MAF. The MOs configured to the Managed Entity via [MAFClientRegCfg] resources are expected to be protected by a secure environment on the Managed Entity, in order to preserve integrity of the attributes. Optimal protection is provided when the integrity protection of the management protocol message is verified in the secure environment. ETSI ETSI TS 118 122 V4.5.1 (2023-07) 21 oneM2M TS-0022 version 4.5.1 Release 4 |
ebce105b6d97ede43cea618c70172b77 | 118 122 | 7.1.8 Resource [MEFClientRegCfg] | This <mgmtObj> specialization is used to convey instructions regarding the MEF Client Registration procedure (clause 8.3.5.2.3 of ETSI TS 118 103 [3]). The [MEFClientRegCfg] resource shall contain the child resource specified in table 7.1.8-1. Table 7.1.8-1: Child resources of [MEFClientRegCfg] resource Child Resources of [MEFClientRegCfg] Child Resource Type Multiplicity Description [variable] <subscription> 0..n See clause 9.6.8 of ETSI TS 118 101 [2] The [MEFClientRegCfg] resource shall contain the attributes specified in table 7.1.8-2. Table 7.1.8-2: Attributes of [MEFClientRegCfg] resource Attributes of [MEFClientRegCfg] Multiplicity RW/ RO/ WO Description resourceType 1 RO See clause 9.6.1.3 of ETSI TS 118 101 [2]. resourceID 1 RO See clause 9.6.1.3 of ETSI TS 118 101 [2]. resourceName 1 WO See clause 9.6.1.3 of ETSI TS 118 101 [2]. parentID 1 RO See clause 9.6.1.3 of ETSI TS 118 101 [2]. expirationTime 1 RW See clause 9.6.1.3 of ETSI TS 118 101 [2]. accessControlPolicyIDs 0..1 (L) RW See clause 9.6.1.3 of ETSI TS 118 101 [2]. creationTime 1 RO See clause 9.6.1.3 of ETSI TS 118 101 [2]. lastModifiedTime 1 RO See clause 9.6.1.3 of ETSI TS 118 101 [2]. Labels 0..1(L) RW See clause 9.6.1.3 of ETSI TS 118 101 [2]. mgmtDefinition 1 WO See clause 9.6.15 of ETSI TS 118 101 [2]. This attribute shall have the fixed value 1026 ("MEFClientRegCfg"). objectIDs 0..1 (L) WO See clause 9.6.15 of ETSI TS 118 101 [2]. objectPaths 0..1 (L) WO See clause 9.6.15 of ETSI TS 118 101 [2]. Description 0..1 RW See clause 9.6.15 of ETSI TS 118 101 [2]. Fqdn 1 WO See clause 8.3.7 of ETSI TS 118 103 [3]. adminFQDN 1 WO See clause 8.3.7 of ETSI TS 118 103 [3]. httpPort 0..1 WO See clause 8.3.7 of ETSI TS 118 103 [3]. coapPort 0..1 WO See clause 8.3.7 of ETSI TS 118 103 [3]. websocketPort 0..1 WO See clause 8.3.7 of ETSI TS 118 103 [3]. mgmtLink 1 RW A link to a [authenticationProfile] resource containing the parameters for the MEF Client to establish mutually-authenticated secure communications with the MEF. The MEF Client shall perform the MEF Client Registration Procedure specified in clause 8.8.2.3 of ETSI TS 118 103 [3], using the linked authentication profile for mutual authentication of the MEF Client and MEF. The MOs configured to the Managed Entity via [MEFClientRegCfg] resources are expected to be protected by a secure environment on the Managed Entity, in order to preserve integrity of the attributes. Optimal protection is provided when the integrity protection of the management protocol message is verified in the secure environment. |
ebce105b6d97ede43cea618c70172b77 | 118 122 | 7.1.9 Resource [OAuth2Authentication] | This specialization of <mgmtObj> is used to store access token and refresh token used in OAuth2 security protocol The [OAuth2Authentication] resource shall contain the child resources specified in table 7.1.9-1. Table 7.1.9-1: Child resources of [OAuth2Authentication] resource Child Resources of [OAuth2Authentication] Child Resource Type Multiplicity Description [variable] <subscription> 0..n See clause 9.6.8 of ETSI TS 118 101 [2] ETSI ETSI TS 118 122 V4.5.1 (2023-07) 22 oneM2M TS-0022 version 4.5.1 Release 4 The [OAuth2Authentication] resource shall contain the attributes specified in table 7.1.9-2. Table 7.1.9-2: Attributes of [OAuth2Authentication] resource Attributes of [OAuth2Authentication] Multiplicity RW/ RO/ WO Description resourceType 1 RO See clause 9.6.1.3 of ETSI TS 118 101 [2]. resourceID 1 RO See clause 9.6.1.3 of ETSI TS 118 101 [2]. resourceName 1 WO See clause 9.6.1.3 of ETSI TS 118 101 [2]. parentID 1 RO See clause 9.6.1.3 of ETSI TS 118 101 [2]. expirationTime 1 RW See clause 9.6.1.3 of ETSI TS 118 101 [2]. accessControlPolicyIDs 0..1 (L) RW See clause 9.6.1.3 of ETSI TS 118 101 [2]. creationTime 1 RO See clause 9.6.1.3 of ETSI TS 118 101 [2]. lastModifiedTime 1 RO See clause 9.6.1.3 of ETSI TS 118 101 [2]. labels 0..1(L) RW See clause 9.6.1.3 of ETSI TS 118 101 [2]. mgmtDefinition 1 WO See clause 9.6.15 of ETSI TS 118 101 [2]. This attribute shall have fixed value "OAuthAuthentication". objectIDs 0..1 (L) WO See clause 9.6.15 of ETSI TS 118 101 [2]. objectPaths 0..1 (L) WO See clause 9.6.15 of ETSI TS 118 101 [2]. description 0..1 RW See clause 9.6.15 of ETSI TS 118 101 [2]. accessToken 1 RW Indicates OAuth2 access token. refreshToken 1 RW Indicates OAuth2 refresh token. |
ebce105b6d97ede43cea618c70172b77 | 118 122 | 7.1.10 Resource [wifiClient] | This specialization of <mgmtObj> is used to store configuration of Wi-Fi® connection on the client device. The [wifiClient] resource shall contain the child resources specified in table 7.1.10-1. Table 7.1.10-1: Child resources of [wifiClient] resource Child Resources of [wifiClient] Child Resource Type Multiplicity Description [variable] <subscription> 0..n See clause 9.6.8 of ETSI TS 118 101 [2] The [wifiClient] resource shall contain the attributes specified in table 7.1.10-2. ETSI ETSI TS 118 122 V4.5.1 (2023-07) 23 oneM2M TS-0022 version 4.5.1 Release 4 Table 7.1.10-2: Attributes of [wifiClient] resource Attributes of [wifiClient] Multiplicity RW/ RO/ WO Description resourceType 1 RO See clause 9.6.1.3 of ETSI TS 118 101 [2]. resourceID 1 RO See clause 9.6.1.3 of ETSI TS 118 101 [2]. resourceName 1 WO See clause 9.6.1.3 of ETSI TS 118 101 [2]. parentID 1 RO See clause 9.6.1.3 of ETSI TS 118 101 [2]. expirationTime 1 RW See clause 9.6.1.3 of ETSI TS 118 101 [2]. accessControlPolicyIDs 0..1 (L) RW See clause 9.6.1.3 of ETSI TS 118 101 [2]. creationTime 1 RO See clause 9.6.1.3 of ETSI TS 118 101 [2]. lastModifiedTime 1 RO See clause 9.6.1.3 of ETSI TS 118 101 [2]. labels 0..1(L) RW See clause 9.6.1.3 of ETSI TS 118 101 [2]. mgmtDefinition 1 WO See clause 9.6.15 of ETSI TS 118 101 [2]. This attribute shall have the fixed value 1027(wifiClient). objectIDs 0..1 (L) WO See clause 9.6.15 of ETSI TS 118 101 [2]. objectPaths 0..1 (L) WO See clause 9.6.15 of ETSI TS 118 101 [2]. description 0..1 RW See clause 9.6.15 of ETSI TS 118 101 [2]. ssid 1 RW Indicates ssid of Wi-Fi® network. This attribute is a specialization of [objectAttribute] attribute. credentials 0..1 RW Indicates encryption type and credentials used to authenticate connection. This attribute is a specialization of [objectAttribute] attribute. macAddress 0..1 RW Indicates MAC address of network's access point. This attribute is a specialization of [objectAttribute] attribute. channel 0..1 RO Indicates Wi-Fi® channel. This attribute is a specialization of [objectAttribute] attribute. connectionStatus 0..1 RW Indicates current status of the connection. This attribute is a specialization of [objectAttribute] attribute. scan 1 RW The action that allows to scan the environment to find available Wi-Fi® networks. The action is triggered by assigning value "TRUE" to this attribute. This attribute is a specialization of [objectAttribute] attribute. This action will provide all the available ssids in scanResult. scanResult 1 RW Indicates list of networks detected by the device. This attribute is a specialization of [objectAttribute] attribute. update 1 RW The action is to trigger the device to update its Wi-Fi® configuration based on the provided values (e.g. ssid, credentials, etc.).The action is triggered by assigning value "TRUE" to this attribute. This attribute is a specialization of [objectAttribute] attribute. updateStatus 1 RW Indicates status of update operation. This attribute is a specialization of [objectAttribute] attribute. toggleRadioStatus 0..1 RW The action that allows to turn on and turn off the Wi-Fi® sub-system on Wi-Fi® client device according to present radioStatus attribute value. The action is triggered by assigning value "TRUE" to this attribute. This attribute is a specialization of [objectAttribute] attribute. This action will switch radioStatus. radioStatus 0..1 RW Indicates whether the Wi-Fi® sub-system on Wi-Fi® client device is turned on or turned off. This attribute is a specialization of [objectAttribute] attribute. |
ebce105b6d97ede43cea618c70172b77 | 118 122 | 7.2 Resource-Type specific procedures and definitions | |
ebce105b6d97ede43cea618c70172b77 | 118 122 | 7.2.1 Introduction | The present clause defines the resource-type specific details of the resource representations and protocol procedures for each <mgmtObj> specialization defined in clause 7.1. ETSI ETSI TS 118 122 V4.5.1 (2023-07) 24 oneM2M TS-0022 version 4.5.1 Release 4 |
ebce105b6d97ede43cea618c70172b77 | 118 122 | 7.2.2 Resource [registration] | |
ebce105b6d97ede43cea618c70172b77 | 118 122 | 7.2.2.1 Introduction | This specialization of <mgmtObj> is used to convey the service layer configuration information needed to register an AE or CSE with a Registrar CSE. Table 7.2.2.1-1: Data Type Definition of [registration] Data Type ID File Name Note registration DCFG-registration.xsd Table 7.2.2.1-2: Resource specific attributes of [registration] Attribute Name Request Optionality Data Type Default Value and Constraints Create Update mgmtDefinition M NP See clause 7.4.15 of ETSI TS 118 104 [4] 1020 (registration). objectIDs O NP See clause 7.4.15 of ETSI TS 118 104 [4] objectPaths O NP See clause 7.4.15 of ETSI TS 118 104 [4] description O O See clause 7.4.15 of ETSI TS 118 104 [4] originatorID O O m2m:ID CSE-ID of the CSE hosted on the ASN/MN or the AE-ID of an AE hosted on an ASN/MN or ADN node. If the setting is for a CSE, then this attribute shall be present. pointOfAccess O O m2m:poaList The point of access URI of the Registrar CSE. Note that protocol binding is determined from the protocol schema in this URI. CSEBase O O xs:anyURI No Defaults. CSE-ID O O m2m:ID No Defaults. appID O O m2m:ID The APP_ID of an AE. This attribute shall only be present when this resource is used for the registration of an AE. externalID O O m2m:externalID The M2M-Ext-ID of the ASN/MN CSE. This attribute can be present when the originatorID is a CSE-ID and the CSE uses the dynamic registration defined in clause 7.1.10 Trigger Recipient Identifier of ETSI TS 118 101 [2]. Trigger-Recipient-ID O O m2m:triggerRecipientID The Trigger-Recipient-ID of the ASN/MN CSE. This attribute can be present when the originatorID is a CSE-ID and the CSE uses the dynamic registration defined in clause 7.1.10 Trigger Recipient Identifier of ETSI TS 118 101 [2]. mgmtLink O O m2m:mgmtLinkRef 1 link to a [authenticationProfile] resource instance. See note. M2M-Sub-ID O NP m2m:ID NOTE: The SUID in the linked [authenticationProfile] instance constrains the security framework to be used with the Authentication Profile. The security frameworks used with the [registration] resource are Security Association Establishment Frameworks (SAEF). The entity composing a [registration] instance is expected to confirm that the linked Authentication Profile contains a SUID corresponding to an SAEF. The SAEF SUIDs are the values 12, 22, 32 or 42 as defined in ETSI TS 118 104 [4]. ETSI ETSI TS 118 122 V4.5.1 (2023-07) 25 oneM2M TS-0022 version 4.5.1 Release 4 |
ebce105b6d97ede43cea618c70172b77 | 118 122 | 7.2.2.2 Resource specific procedure on CRUD operations | When management is performed using technology specific protocols, the procedures defined in clause 7.4.15.2 of ETSI TS 118 104 [4], '<mgmtObj> specific procedures' shall be used. In addition to the generic procedures in clause 7.2.2 of ETSI TS 118 104 [4] for operations on this resource following check shall be done in CREATE and UPDATE operation: If appID attribute is set to a value starting with other than 'r', 'R' or 'N' then the Hosting CSE shall reject the request with "BAD_REQUEST" Response Status Code. NOTE: Use of 'r' will be forbidden when subsequently registering an AE that supports release 4 or above. |
ebce105b6d97ede43cea618c70172b77 | 118 122 | 7.2.3 Resource [dataCollection] | |
ebce105b6d97ede43cea618c70172b77 | 118 122 | 7.2.3.1 Introduction | Table 7.2.3.1-1: Data Type Definition of [dataCollection] Data Type ID File Name Note dataCollection DCFG-dataCollection.xsd Table 7.2.3.1-2: Resource specific attributes of [dataCollection] Attribute Name Request Optionality Data Type Default Value and Constraints Create Update mgmtDefinition M NP See clause 7.4.15 of ETSI TS 118 104 [4] 1021 (dataCollection). objectIDs O NP See clause 7.4.15 of ETSI TS 118 104 [4] objectPaths O NP See clause 7.4.15 of ETSI TS 118 104 [4] description O O See clause 7.4.15 of ETSI TS 118 104 [4] containerPath M O m2m:ID The URI of the <container> resource in the hosting CSE that stores the data transmitted by the device. reportingSchedule O O m2m:scheduleEntries The schedule, used to transmit the measured or collected data to the Hosting CSE. If the entity that reports the data misses a reporting interval, the entity shall wait until the next interval to report the data. measurementSchedule O O m2m:scheduleEntries The schedule, that the device will use to collect or measure the data. If the entity that measures or collects the data misses a measurement interval, the entity shall wait until the next interval to collect or measure the data. mgmtLink O O m2m:mgmtLinkRef 1 link to a [authenticationProfile]. See note. ETSI ETSI TS 118 122 V4.5.1 (2023-07) 26 oneM2M TS-0022 version 4.5.1 Release 4 Attribute Name Request Optionality Data Type Default Value and Constraints Create Update NOTE: The SUID in the linked [authenticationProfile] instance constrains the security framework to be used with the Authentication Profile. The security frameworks used with the [dataCollection] resource are End-to-End Security of Primitives (ESPrim). The entity composing a [dataCollection] instance is expected to confirm that the linked Authentication Profile contains a SUID corresponding to ESPrim. The SUIDs corresponding to ESPrim security frameworks are the values 13, 23, 33 or 43 as defined in ETSI TS 118 104 [4]. |
ebce105b6d97ede43cea618c70172b77 | 118 122 | 7.2.3.2 Resource specific procedure on CRUD operations | When management is performed using technology specific protocols, the procedures defined in clause 7.4.15.2 of ETSI TS 118 104 [4], '<mgmtObj> specific procedures' shall be used. There is no change from the generic procedures in clause 7.2.2 of ETSI TS 118 104 [4] for operations on this resource. ETSI TS 118 105 [5] and ETSI TS 118 106 [6] provide the mapping of these resources into the technology specific protocol data model. |
ebce105b6d97ede43cea618c70172b77 | 118 122 | 7.2.4 Resource [authenticationProfile] | |
ebce105b6d97ede43cea618c70172b77 | 118 122 | 7.2.4.1 Introduction | Table 7.2.4.1-1: Data Type Definition of [authenticationProfile] Data Type ID File Name Note authenticationProfile DCFG-authenticationProfile.xsd Table 7.2.4.1-2: Resource specific attributes of [authenticationProfile] Attribute Name Request Optionality Data Type Default Value and Constraints Create Update mgmtDefinition M NP See clause 7.4.15 of ETSI TS 118 104 [4] 1022 (authenticationProfile). objectID O NP See clause 7.4.15 of ETSI TS 118 104 [4] objectPaths O NP See clause 7.4.15 of ETSI TS 118 104 [4] description O O See clause 7.4.15 of ETSI TS 118 104 [4] SUID M NP m2m:suid Allowed values are listed in table 7.1.4-3. TLSCiphersuites O O dcfg:listOfTLSCiphersuite symmKeyID O NP sec:credentialID symmKeyValue O NP xs:hexBinary The minimum key length is 256 bits. MAFKeyRegLabels O NP m2m:labels MAFKeyRegDuration O NP xs:duration mycertFingerprint O NP dcfg:niURI or dcfg:nihURI rawPubKeyID O NP dcfg:niURI or dcfg:nihURI M2M-Sub-ID O NP xs:string mgmtLink O O See clause 7.4.15 of ETSI TS 118 104 [4] Table 7.2.4.1-3: Child resources of [authenticationProfile] resource Child Resource Type Child Resource Name Multiplicity Ref. to in Resource Type Definition <subscription> [variable] 0..n Clause 7.4.8 of ETSI TS 118 104 [4] ETSI ETSI TS 118 122 V4.5.1 (2023-07) 27 oneM2M TS-0022 version 4.5.1 Release 4 |
ebce105b6d97ede43cea618c70172b77 | 118 122 | 7.2.4.2 Resource specific procedure on CRUD operations | When management is performed using technology specific protocols, the procedures defined in clause 7.4.15.2 of ETSI TS 118 104 [4], '<mgmtObj> specific procedures' shall be used. There is no change from the generic procedures in clause 7.2.2 of ETSI TS 118 104 [4] for operations on this resource. ETSI TS 118 105 [5] and ETSI TS 118 106 [6] provide the mapping of these resources into the technology specific protocol data model. |
ebce105b6d97ede43cea618c70172b77 | 118 122 | 7.2.5 Resource [myCertFileCred] | |
ebce105b6d97ede43cea618c70172b77 | 118 122 | 7.2.5.1 Introduction | Table 7.2.5.1-1: Data Type Definition of [myCertFileCred] Data Type ID File Name Note myCertFileCred DCFG-myCertFileCred.xsd Table 7.2.5.1-2: Resource specific attributes of [myCertFileCred] Attribute Name Request Optionality Data Type Default Value and Constraints Create Update mgmtDefinition M NP See clause 7.4.15 of ETSI TS 118 104 [4] 1023 (myCertFileCred) objectID O NP See clause 7.4.15 of ETSI TS 118 104 [4] objectPaths O NP See clause 7.4.15 of ETSI TS 118 104 [4] description O O See clause 7.4.15 of ETSI TS 118 104 [4] SUIDs M O xs:list of m2m:suid Allowed values are listed in table 7.1.5-3. myCertFileFormat M NP xs:anyURI Media Type of myCertFileContent attribute. Default is "application/pkcs7- mime". myCertFileContent M NP xs:string Certificate or certificate chain. Default media-type is "application/pkcs7-mime". Table 7.2.5.1-3: Child resources of [myCertFileCred] resource Child Resource Type Child Resource Name Multiplicity Ref. to in Resource Type Definition <subscription> [variable] 0..n Clause 7.4.8 of ETSI TS 118 104 [4] |
ebce105b6d97ede43cea618c70172b77 | 118 122 | 7.2.5.2 Resource specific procedure on CRUD operations | When management is performed using technology specific protocols, the procedures defined in clause 7.4.15.2 of ETSI TS 118 104 [4], '<mgmtObj> specific procedures' shall be used. There is no change from the generic procedures in clause 7.2.2 of ETSI TS 118 104 [4] for operations on this resource. ETSI TS 118 105 [5] and ETSI TS 118 106 [6] provide the mapping of these resources into the technology specific protocol data model. |
ebce105b6d97ede43cea618c70172b77 | 118 122 | 7.2.6 Resource [trustAnchorCred] | |
ebce105b6d97ede43cea618c70172b77 | 118 122 | 7.2.6.1 Introduction | Table 7.2.6.1-1: Data Type Definition of [trustAnchorCred] Data Type ID File Name Note trustAnchorCred DCFG-trustAnchorCred.xsd ETSI ETSI TS 118 122 V4.5.1 (2023-07) 28 oneM2M TS-0022 version 4.5.1 Release 4 Table 7.2.6.1-2: Resource specific attributes of [trustAnchorCred] Attribute Name Request Optionality Data Type Default Value and Constraints Create Update mgmtDefinition M NP See clause 7.4.15 of ETSI TS 118 104 [4] 1024 (trustAnchorCred) objectID O NP See clause 7.4.15 of ETSI TS 118 104 [4] objectPaths O NP See clause 7.4.15 of ETSI TS 118 104 [4] description O O See clause 7.4.15 of ETSI TS 118 104 [4] certFingerprint M NP dcfg:niURI URI M O xs:anyURI Table 7.2.6.1-3: Child resources of [trustAnchorCred] resource Child Resource Type Child Resource Name Multiplicity Ref. to in Resource Type Definition <subscription> [variable] 0..n Clause 7.4.8 of ETSI TS 118 104 [4] |
ebce105b6d97ede43cea618c70172b77 | 118 122 | 7.2.6.2 Resource specific procedure on CRUD operations | When management is performed using technology specific protocols, the procedures defined in clause 7.4.15.2 of ETSI TS 118 104 [4], '<mgmtObj> specific procedures' shall be used. There is no change from the generic procedures in clause 7.2.2 of ETSI TS 118 104 [4] for operations on this resource. ETSI TS 118 105 [5] and ETSI TS 118 106 [6] provide the mapping of these resources into the technology specific protocol data model. |
ebce105b6d97ede43cea618c70172b77 | 118 122 | 7.2.7 Resource [MAFClientRegCfg] | |
ebce105b6d97ede43cea618c70172b77 | 118 122 | 7.2.7.1 Introduction | Table 7.2.7.1-1: Data Type Definition of [MAFClientRegCfg] Data Type ID File Name Note MAFClientRegCfg DCFG-MAFClientRegCfg.xsd Table 7.2.7.1-2: Resource specific attributes of [MAFClientRegCfg] Attribute Name Request Optionality Data Type Default Value and Constraints Create Update mgmtDefinition M NP See clause 7.4.15 of ETSI TS 118 104 [4] 1025 (MAFClientRegCfg) fqdn M NP See table 12.4.2-1 of ETSI TS 118 103 [3] adminFQDN M NP See table 12.4.2-1 of ETSI TS 118 103 [3] httpPort O NP See table 12.4.2-1 of ETSI TS 118 103 [3] At least one of these attributes shall be present coapPort O NP See table 12.4.2-1 of ETSI TS 118 103 [3] websocketPort O NP See table 12.4.2-1 of ETSI TS 118 103 [3] mgmtLink M O m2m:mgmtLinkRef 1 link to a [authenticationProfile] resources instance NOTE: For further details of these attributes, see clauses 8.8.3.2 and 12.4.2 of ETSI TS 118 103 [3]. ETSI ETSI TS 118 122 V4.5.1 (2023-07) 29 oneM2M TS-0022 version 4.5.1 Release 4 Table 7.2.7.1-3: Child resources of [MAFClientRegCfg] resource Child Resource Type Child Resource Name Multiplicity Ref. to in Resource Type Definition <subscription> [variable] 0..n Clause 7.4.8 of ETSI TS 118 104 [4] |
ebce105b6d97ede43cea618c70172b77 | 118 122 | 7.2.7.2 Resource specific procedure on CRUD operations | When management is performed using technology specific protocols, the procedures defined in clause 7.4.15.2 of ETSI TS 118 104 [4], '<mgmtObj> specific procedures' shall be used. There is no change from the generic procedures in clause 7.2.2 of ETSI TS 118 104 [4] for operations on this resource. ETSI TS 118 105 [5] and ETSI TS 118 106 [6] provide the mapping of these resources into the technology specific protocol data model. |
ebce105b6d97ede43cea618c70172b77 | 118 122 | 7.2.8 Resource [MEFClientRegCfg] | |
ebce105b6d97ede43cea618c70172b77 | 118 122 | 7.2.8.1 Introduction | Table 7.2.8.1-1: Data Type Definition of [MEFClientRegCfg] Data Type ID File Name Note MEFClientRegCfg DCFG-MEFClientRegCfg.xsd Table 7.2.8.1-2: Resource specific attributes of [MEFClientRegCfg] Attribute Name Request Optionality Data Type Default Value and Constraints Create Update mgmtDefinition M NP See clause 7.4.15 of ETSI TS 118 104 [4] 1026 (MEFClientRegCfg) fqdn M NP See table 12.4.2-1 of ETSI TS 118 103 [3] adminFQDN M NP See table 12.4.2-1 of ETSI TS 118 103 [3] httpPort O NP See table 12.4.2-1 of ETSI TS 118 103 [3] At least one of these attributes shall be present coapPort O NP See table 12.4.2-1 of ETSI TS 118 103 [3] websocketPort O NP See table 12.4.2-1 of ETSI TS 118 103 [3] mgmtLink M O m2m:mgmtLinkRef 1 link to a [authenticationProfile] resources instance NOTE: For further details of these attributes, see clauses 8.3.7.2 and 12.4.2 of ETSI TS 118 103 [3]. Table 7.2.8.1-3: Child resources of [MEFClientRegCfg] resource Child Resource Type Child Resource Name Multiplicity Ref. to in Resource Type Definition <subscription> [variable] 0..n Clause 7.4.8 of ETSI TS 118 104 [4] |
ebce105b6d97ede43cea618c70172b77 | 118 122 | 7.2.8.2 Resource specific procedure on CRUD operations | When management is performed using technology specific protocols, the procedures defined in clause 7.4.15.2 of ETSI TS 118 104 [4], '<mgmtObj> specific procedures' shall be used. There is no change from the generic procedures in clause 7.2.2 of ETSI TS 118 104 [4] for operations on this resource. ETSI TS 118 105 [5] and ETSI TS 118 106 [6] provide the mapping of these resources into the technology specific protocol data model. ETSI ETSI TS 118 122 V4.5.1 (2023-07) 30 oneM2M TS-0022 version 4.5.1 Release 4 |
ebce105b6d97ede43cea618c70172b77 | 118 122 | 7.2.9 Resource [OAuth2Authentication] | |
ebce105b6d97ede43cea618c70172b77 | 118 122 | 7.2.9.1 Introduction | 7.2. |
ebce105b6d97ede43cea618c70172b77 | 118 122 | 9.1 Introduction | This specialization of <mgmtObj> is used to store access token and refresh token used in OAuth2 security protocol Table 7.2.9.1-1: Data Type Definition of [OAuth2Authentication] Data Type ID File Name Note OAuth2Authentication DCFG-OAuth2.xsd Table 7.2.9.1-2: Resource specific attributes of [OAuth2Authentication] Attribute Name Request Optionality Data Type Default Value and Constraints Create Update mgmtDefinition M NP See clause 7.4.15 of ETSI TS 118 104 [4] 1027 (OAuth2Authentication) objectIDs O NP See clause 7.4.15 of ETSI TS 118 104 [4] objectPaths O NP See clause 7.4.15 of ETSI TS 118 104 [4] description O O See clause 7.4.15 of ETSI TS 118 104 [4] accessToken M O xs:string refreshToken M O xs:string |
ebce105b6d97ede43cea618c70172b77 | 118 122 | 7.2.9.2 Resource specific procedure on CRUD operations | When management is performed using technology specific protocols, the procedures defined in clause 7.4.15.2 in ETSI TS 118 104 [4],'<mgmtObj> specific procedures' shall be used. There are no change from the generic procedures in clause 7.2.2 of ETSI TS 118 104 [4] for operations on this resource. |
ebce105b6d97ede43cea618c70172b77 | 118 122 | 7.2.10 Resource [wifiClient] | |
ebce105b6d97ede43cea618c70172b77 | 118 122 | 7.2.10.1 Introduction | This specialization of <mgmtObj> is used to store configuration of Wi-Fi® connection on the client device. Table 7.2.10.1-1: Data Type Definition of [wifiClient] Data Type ID File Name Note wifiClient DCFG-wifiClient.xsd ETSI ETSI TS 118 122 V4.5.1 (2023-07) 31 oneM2M TS-0022 version 4.5.1 Release 4 Table 7.2.10.1-2: Resource specific attributes of [wifiClient] Attribute Name Request Optionality Data Type Default Value and Constraints Create Update mgmtDefinition M NP See clause 7.4.15 of ETSI TS 118 104 [4] 1028 (wifiClient) objectIDs O NP See clause 7.4.15 of ETSI TS 118 104 [4] objectPaths O NP See clause 7.4.15 of ETSI TS 118 104 [4] description O O See clause 7.4.15 of ETSI TS 118 104 [4] ssid M O dcfg:ssid credentials O O dcfg:wifiCredentials macAddress O O xs:string channel O O xs:integer update O O xs:boolean scan M O xs:boolean toggleRadioStatus O O xs:boolean scanResult O O dcfg:listOfSsids updateStatus O O m2m:actionStatus connectionStatus O O dcfg:wifiConnectionStatus radioStatus O O xs:boolean |
ebce105b6d97ede43cea618c70172b77 | 118 122 | 7.2.10.2 Resource specific procedure on CRUD operations | When management is performed using technology specific protocols, the procedures defined in clause 7.4.15.2 of ETSI TS 118 104 [4],'<mgmtObj> specific procedures' shall be used. There are no change from the generic procedures in clause 7.2.2 of ETSI TS 118 104 [4] for operations on this resource except retrieve operation which is described below. |
ebce105b6d97ede43cea618c70172b77 | 118 122 | 7.3 Data formats for device configuration | |
ebce105b6d97ede43cea618c70172b77 | 118 122 | 7.3.1 Introduction | Clause 7.3 defines data formats of resource attributes and parameters used in present document. Any data types of XML elements defined for use in present document shall be one of name spaces in table 7.3.1-1. Table 7.3.1-1: Namespaces used in present document Name space prefix Name space definition oneM2M protocol CDT m2m: http://www.onem2m.org/xml/protocol Device Configuration dcfg: http://www.onem2m.org/xml/deviceConfig oneM2M Security sec: http://www.onem2m.org/xml/securityProtocols |
ebce105b6d97ede43cea618c70172b77 | 118 122 | 7.3.2 Simple oneM2M data types for device configuration | Table 7.3.2-1 describes simple data type definitions specific to security. The types in table 7.3.2-1 are either: • Atomic data types derived from XML Schema data types by restrictions other than enumeration. • List data types constructed from other XML Schema or oneM2M-defined atomic data types. ETSI ETSI TS 118 122 V4.5.1 (2023-07) 32 oneM2M TS-0022 version 4.5.1 Release 4 Table 7.3.2-1: oneM2M simple data types for device configuration XSD type name Used for Examples Description dcfg:TLSCiphersuite A TLS Ciphersuite identifier C0A5 Four hexadecimal characters representing a TLS Cipher suite identifier. The list of TLS cipher suites identifiers can be found at the IANA TLS Cipher Suite Registry [8]. dcfg:ListOfTLSCiphersu ite A list of TLS Ciphersuite identifiers xs:list of elements of data type dcfg:TLSCiphersuite. dcfg:niURI Identifying information with a hash value ni:///sha-256;UyaQV... ni:///1;UyaQV... ("1" is a short identifier for sha-256) An xs:anyURI conforming to the Named Information 'ni' URI scheme specified in IETF RFC 6920 [7], with no authority field. dcfg:nihURI Identifying information with a human speakable encoding of a hash value nih:sha-256-32;53269057;b nih:sha-256-32;5326-9057;b nih:6;5326-9057 ("6" is a short identifier for sha-256-32) An xs:anyURI conforming to the Human Speakable Named Information 'nih' URI scheme specified in IETF RFC 6920 [7], with no authority field. A checkdigit may be present. dcfg:ssid SSID of Wi-Fi® network The ssid of Wi-Fi® network. dcfg:listOfSsids List of SSIDs xs:list of elements of data type m2m:ssid. |
ebce105b6d97ede43cea618c70172b77 | 118 122 | 7.3.3 Enumerated oneM2M data types for device configuration | |
ebce105b6d97ede43cea618c70172b77 | 118 122 | 7.3.3.1 dcfg:wifiConnectionStatus | Used to indicate Wi-Fi® connection status. Table 7.3.3.1-1: Interpretation of dcfg:wifiConnectionStatus Value Interpretation Note 0 Disconnected 1 Connected 2 Idle Indicates the state when the device tries to establish the connection to the network. It expires after the set number of unsuccessful attempts or when the connection is established. 3 No SSID available 4 Scan completed 5 Failed 6 Lost |
ebce105b6d97ede43cea618c70172b77 | 118 122 | 7.3.3.2 dcfg:wifiEncryptionType | Used for indicating which Wi-Fi® encryption protocol is used to provide security in wireless network. ETSI ETSI TS 118 122 V4.5.1 (2023-07) 33 oneM2M TS-0022 version 4.5.1 Release 4 Table 7.3.3.2-1: Interpretation of dcfg:wifiEncyrptionType Value Interpretation Note 1 none 2 WEP 3 WPA Personal 4 WPA2 Personal 5 WPA3 Personal 6 WPA Enterprise 7 WPA2 Enterprise 8 WPA3 Enterprise |
ebce105b6d97ede43cea618c70172b77 | 118 122 | 7.3.4 Complex type definitions | |
ebce105b6d97ede43cea618c70172b77 | 118 122 | 7.3.4.1 dcfg:wifiCredentials | Used for credentials in [wifiClient] Management Object resource. Values contained in username, password, wep.key and wpa.psk attributes shall not be readable. Each Retrieve request shall be forwarded to device and from there the data shall be retrieved. Table 7.3.4.1-1: Type Definition of dcfg:wifiCredentials Element Path Element Data Type Multiplicity Note encryptionType dcfg:wifiEncryptionType 1 Indicates type of encryption used to provide network security username xs:string 0..1 Indicates username used to authenticate user in WPA-Enterprise, WPA2-Enterprise or WPA3-Enterprise protocols Only valid if encryptionType = 6, 7 or 8 password xs:string 0..1 Indicates password used to authenticate user in WPA-Enterprise, WPA2-Enterprise or WPA3-Enterprise protocols Only valid if encryptionType = 6, 7 or 8 wepKey xs:string 0..1 Indicates key in case of WEP encryption. Only valid if field encryptionType = 2 wpaPsk xs:string 0..1 Indicates WPA Pre Shared Key Only valid if field encryptionType = 3, 4 or 5 |
ebce105b6d97ede43cea618c70172b77 | 118 122 | 8 Procedures | |
ebce105b6d97ede43cea618c70172b77 | 118 122 | 8.1 <mgmtObj> life cycle procedures | |
ebce105b6d97ede43cea618c70172b77 | 118 122 | 8.1.1 Introduction | The life cycle of the <mgmtObj> resource in the Hosting CSE is established either through the: • Provisioning of the <mgmtObj> resource by the Configuration AE. • Discovery of the <mgmtObj> resource by the Hosting CSE using the methods described in clause 6.1. ETSI ETSI TS 118 122 V4.5.1 (2023-07) 34 oneM2M TS-0022 version 4.5.1 Release 4 |
ebce105b6d97ede43cea618c70172b77 | 118 122 | 8.1.2 Setting configuration information on <mgmtObj> resource | The Configuration AE is able to configure the <mgmtObj> resources used for device configuration by either creating the <mgmtObj> resource or updating existing <mgmtObj> resources for the targeted AE or CSE. Likewise, the Configuration AE can delete the <mgmtObj> resource as part of a decommissioning process. In some scenarios the <mgmtObj> resource may already exist due to pre-provisioning or a previous discovery action by the IN-CSE's interaction with the Configuration IPE, DM Server or ASN/MN or ADN node. As such the Configuration AE needs to first discover if the <mgmtObj> resource exists in the Hosting CSE. As <mgmtObj> resources are represented under the <node> resource of the ASN/MN or ADN node, the discovery operation's scope can use the <node> resource within the discovery criteria. Based on the results of the discovery the Configuration AE will either create or update the <mgmtObj> resource. Figure 8.1.2-1 depicts this flow. Figure 8.1.2-1: Configuring attributes of a <mgmtObj> resource Likewise, the Configuration AE may use the same approach to discover when deleting the <mgmtObj> resource as part of a decommissioning process or retrieval of the <mgmtObj> resource. NOTE: In order for the IN-CSE to forward the request onto the DM Server, the <mgmtObj> resource is required to be configured with the path to the resource in the context of the technology specific protocol (e.g. LWM2M URI [i.4], OMA-DM path [i.3], BBF TR-069 path [i.2]). The fully qualified domain name can also be used if the IN-CSE does not know the address of the DM Server. |
ebce105b6d97ede43cea618c70172b77 | 118 122 | 8.1.3 Management of <mgmtObj> resource on ASN/MN/ADN nodes | |
ebce105b6d97ede43cea618c70172b77 | 118 122 | 8.1.3.1 Introduction | Management of the <mgmtObj> object resources on ASN/MN or ADN nodes may be managed using one of the architectural methods described in clause 6.1. |
ebce105b6d97ede43cea618c70172b77 | 118 122 | 8.1.3.2 Management using device management technologies | Clause 10.2.8 '<mgmtObj> Resource Procedures' of ETSI TS 118 101 [2] describes the procedures for M2M Nodes to represent their technology specific data as oneM2M resources within the IN-CSE. ETSI ETSI TS 118 122 V4.5.1 (2023-07) 35 oneM2M TS-0022 version 4.5.1 Release 4 Figure 8.1.3.2-1: Management using Device Management technologies 1) The Configuration AE issues a request for <mgmtObj> resource for an ASN/MN/ADN node that is managed using Device Management technologies. 2) The IN- CSE processes the request issued by Configuration AE. 3) The IN-CSE executes the Device Management command which is mapped from operation on <mgmtObj> resource to external management technologies. 4) The ASN/MN/ADN then creates, updates, deletes or retrieve the configuration parameters on the node, and returns the result of Device Management command. |
ebce105b6d97ede43cea618c70172b77 | 118 122 | 8.1.3.3 Management using the Mcc reference point | Once M2M Service Layer operation is established between the AE or CSE and the Registrar/Hosting CSE, <mgmtObj> resources may be managed using the Mcc reference point by the AE or CSE subscribing to receive changes to the <mgmtObj> resource using the subscription procedures defined in clause 10.2.11 of ETSI TS 118 101 [2]. Establishment of the M2M Service Layer operations includes actions such as establishing the appropriate security associations and registration of the CSEs and AEs. While not mentioned in clause 6.1 of the present document, <mgmtObj> specializations may be announced depending on the <mgmtObj> specialization type. The following <mgmtObj> specializations specified in the present document are announceable (i.e. announceable variants of this resource type are defined in the XSD of the respective <mgmtObj> specialization): [registration], [dataCollection] The following <mgmtObj> specializations specified in the present document are not announceable (i.e. announceable variants of this resource type are not defined in the XSD of the respective <mgmtObj> specialization): [authenticationProfile], [myCertFileCred], [trustAnchorCred], [MAFClientRegCfg], [MEFClientRegCfg] Configuration AE Hosting CSE <IN-CSE> Targeted Field Device ASN/ADN 2.CRUD <mgmtObj> resource 1.CRUD request for <mgmtObj> 3.Execute DM command 4. Create/Update/ Retrieve/Delete configuration parameters ETSI ETSI TS 118 122 V4.5.1 (2023-07) 36 oneM2M TS-0022 version 4.5.1 Release 4 Figure 8.1.3.3-1: Management using the Mcc reference point 1) Once M2M Service Layer operation is established, the AE or CSE on the ASN/MN/ADN node subscribes to the <mgmtObj> resource which is associated with the specific M2M Application functionality creating <subscription> resource. 2) When the Configurator AE creates, updates or delete the <mgmtObj> resource, the Configuration AE issues a request on the <mgmtObj> resource. 3) The Hosting CSE for the <mgmtObj> resource performs the operation on the resource as Receiver. 4) The Hosting CSE notifies the subscribed AE or CSE as the subscribed event message. 5) The AE or CSE configures the M2M Application on the ASN/MN or ADN node. |
ebce105b6d97ede43cea618c70172b77 | 118 122 | 8.1.3.4 Management using the oneM2M IPE technology | When ASN/MN or ADN nodes are configured using a Configuration IPE, the ASN/MN/ADN may periodically request the Configuration IPE to configure the ASN/MN/ADN node. The method that the ASN/MN/ADN uses to periodically request to be configured is unspecified in the present document. Once the Configuration IPE receives the request from the ASN/MN/ADN node, the Configuration IPE shall send a retrieve request to the Hosting CSE to obtain the applicable specialization of <mgmtObj> resources for the ASN/MN/ADN node. How the Configuration IPE maintains the mapping between the ASN/MN/ADN and the associated <node> and <mgmtObj> resources is unspecified in the present document. ETSI ETSI TS 118 122 V4.5.1 (2023-07) 37 oneM2M TS-0022 version 4.5.1 Release 4 Figure 8.1.3.4-1: Management using oneM2M IPE technology 1) The Configuration AE issues a CRUD request to <mgmtObj> resource which is associated with the functionality of targeted field device. 2) The Hosting CSE processes the CRUD request. 3) When the ASN/MN/ADN determines it needs to be configured, the ASN/MN/ADN issues a request to the Configuration IPE. 4) The Configuration IPE determines <mgmtObj> resource to refer as the source of configuration parameter for the targeted field device, and issues an operation on the <mgmtObj> or <node> resource. 5) When the RETRIEVE request is successfully performed, the Configuration IPE transforms the <mgmtObj> resource into a form understandable by ASN/MN/ADN node. 6) The ASN/MN/ADN configures setting parameters for the M2M Application. NOTE: One possible method of exchanging information between the Configuration IPE and the ASN/MN/ADN is to simply serialize the <mgmtObj> resource using the MIME content types defined in clause 6.7 of ETSI TS 118 104 [4] 'oneM2M specific MIME media types'. |
ebce105b6d97ede43cea618c70172b77 | 118 122 | 8.2 Obtaining authentication credential procedure | When an ASN/MN or ADN node is required to be authenticated, a mgmtLink 'authProfile' referring to the <mgmtObj> resource specialization for maintaining the Authentication Profiles shall be provided. The Authentication Profile contains following information: • Choice of TLS options. • mgmtLinkRef(s) to the <mgmtObj> which provides information required to obtain the credential(s). When an ASN/MN or ADN node is establishing the appropriate security associations, the <mgmtObj> specialization for Authentication Profile shall be used to identify the security related settings. Actual credential shall be obtained using the information on the <mgmtObj> specializations (Authentication Credential Configuration) which is referred by mgmtLinkRef(s) from Authentication Profile. Configuration AE Hosting CSE Targeted Field Device Configuration IPE 2.CRUD <mgmtObj> resource 3.Request configuration data 1. CRUD request for <mgmtObj> 4.Retrieve <mgmtObj> or <node> ASN/ADN 5.Return configuration data 6.Configure parameters of the M2M Application ETSI ETSI TS 118 122 V4.5.1 (2023-07) 38 oneM2M TS-0022 version 4.5.1 Release 4 Figure 8.2-1: Relationship between 'Authentication Profile' and 'Authentication Credential Configuration(s)' |
ebce105b6d97ede43cea618c70172b77 | 118 122 | 8.3 AE and CSE registration procedure | When an ASN/MN or ADN node receives the information in the [registration] resource, the AE or CSE performs the registration procedure for that type of resource. If the resource is for CSE, then the CSE registration procedure which is defined in clause 10.1.1.2.1 of ETSI TS 118 101 [2] is used. If the resource is for AE, the Application Entity Registration procedure defined in clause 10.1.1.2.2 of ETSI TS 118 101 [2] is used. Required parameter for registration procedures is retrieved as attribute value of [registration] resource. Table 8.3-1: Required [registration] resource parameters for registration attribute of [registration] parameter in ETSI TS 118 101 [2]/TS-0004 [4] originatorID From primitive parameter PoA CSE-PoA (Point of Access) resourcePath To primitive parameter |
ebce105b6d97ede43cea618c70172b77 | 118 122 | 8.4 Enabling data collection by [dataCollection] resource | When an AE needs to measure or collect data to be later reported to a Hosting CSE , report measured data to a CSE, the ASN/MN/ADN may be instructed when to measure/collect the data and then when to report the measured/collected data along with where to place the data within the Hosting CSE. Once AE is configured with the [dataCollection] resource AE performs CREATE operation for new <contentInstance> resource as the child resource of <container> resource which is specified as 'containerPath' attribute of [dataCollection] resource to report the measured/collected data. The frequency of collection/measurement and reporting are accordingly specified as 'reportingSchedule' and 'measurementSchedule' attributes of the [dataCollection] resource. ETSI ETSI TS 118 122 V4.5.1 (2023-07) 39 oneM2M TS-0022 version 4.5.1 Release 4 |
ebce105b6d97ede43cea618c70172b77 | 118 122 | 9 Short Names | 9.1 Introduction Short names are introduced in clause 8.2.1 of ETSI TS 118 104 [4]. The short names in ETSI TS 118 104 shall apply in addition to the short names defined in the present document. 9.2 Common and Field Device Configuration specific oneM2M Resource attributes In protocol bindings, resource attribute names shall be translated into short names of table 9.2-1 and in table 8.2.3-1 of ETSI TS 118 104 [4]. Table 9.2-1: Common and Field Device Configuration specific oneM2M Attribute Short Names Attribute Name Occurs in Short Name Notes resourceType All ty Defined in ETSI TS 118 104 [4]. resourceID All ri Defined in ETSI TS 118 104 [4]. resourceName All rn Defined in ETSI TS 118 104 [4]. parentID All pi Defined in ETSI TS 118 104 [4]. expirationTime All et Defined in ETSI TS 118 104 [4]. creationTime All ct Defined in ETSI TS 118 104 [4]. Labels All lbl Defined in ETSI TS 118 104 [4]. lastModifiedTime All lt Defined in ETSI TS 118 104 [4]. description All dc Defined in ETSI TS 118 104 [4]. mgmtDefinition All mgd Defined in ETSI TS 118 104 [4]. objectIDs All obis Defined in ETSI TS 118 104 [4]. objectPaths All obps Defined in ETSI TS 118 104 [4]. mgmtLink All cmlk Defined in ETSI TS 118 104 [4]. CSE-ID registration csi Defined in ETSI TS 118 104 [4]. CSEBase registration cb Defined in ETSI TS 118 104 [4]. originatorID registration oid pointOfAccess registration poa appID registration apid externalID registration eid Trigger-Recipient-ID registration tri Defined in ETSI TS 118 104 [4]. containerPath dataCollection cntp reportingSchedule dataCollection rpsc measurementSchedule dataCollection mesc SUID authenticationProfile suid TLSCiphersuites authenticationProfile tlcs symmKeyID authenticationProfile ski symmKeyValue authenticationProfile skv MAFKeyRegLabels authenticationProfile mkrl MAFKeyRegDuration authenticationProfile mkrd mycertFingerprint authenticationProfile mcfp rawPubKeyID authenticationProfile rpki SUIDs myCertFileCred suids myCertFileFormat myCertFileCred mcff myCertFileContent myCertFileCred mcfc certFingerprint trustAnchorCred cfp URI trustAnchorCred uri Defined in ETSI TS 118 104 [4]. Fqdn MEFClientRegCfg, MAFClientRegCfg fq Defined in ETSI TS 118 132 [9]. adminFQDN MEFClientRegCfg, MAFClientRegCfg adfq Defined in ETSI TS 118 132 [9]. httpPort MEFClientRegCfg, MAFClientRegCfg hpt Defined in ETSI TS 118 132 [9]. coapPort MEFClientRegCfg, MAFClientRegCfg copt Defined in ETSI TS 118 132 [9]. ETSI ETSI TS 118 122 V4.5.1 (2023-07) 40 oneM2M TS-0022 version 4.5.1 Release 4 Attribute Name Occurs in Short Name Notes websocketPort MEFClientRegCfg, MAFClientRegCfg wpt Defined in ETSI TS 118 132 [9]. accessToken OAuth2Authentication atk refreshToken OAuth2Authentication rtk ssid wifiClient ssid credentials wifiClient cred macAddress wifiClient maca channel wifiClient chan connectionStatus wifiClient cons scan wifiClient scan scanResult wifiClient scanr update wificlient, ud Defined in ETSI TS 118 104 [4]. updateStatus wifiClient uds Defined in ETSI TS 118 104 [4]. toggleRadioStatus wifiClient trdst radioStatus wifiClient rdst 9.3 Field Device Configuration specific oneM2M Resource types In protocol bindings, resource type names of the <mgmtObj> specializations shall be translated into the short names of table 9.3-1. Table 9.3-1: Field Device Configuration specific Resource Type Short Names ResourceType Name Short Name registration reg registrationAnnc regA dataCollection datc dataCollectionAnnc datcA authenticationProfile autp MAFClientRegCfg macrc MEFClientRegCfg mecrc myCertFileCred nycfc trustAnchorCred tac wifiClient wfct OAuth2Authentication oaan |
ebce105b6d97ede43cea618c70172b77 | 118 122 | 9.4 oneM2M Complex data type members | In protocol bindings, complex data types member names shall be translated into the short names of table 9.4-1. Table 9.4-1: oneM2M Complex data type member short names Member Name Occurs in Short Name Notes encryptionType dcfg:wifiCredentials enct username dcfg:wifiCredentials unm Defined in ETSI TS 118 104 [4]. password dcfg:wifiCredentials pwd Defined in ETSI TS 118 104 [4]. wepKey dcfg:wifiCredentials wepk wpaPsk dcfg:wifiCredentials wpap ETSI ETSI TS 118 122 V4.5.1 (2023-07) 41 oneM2M TS-0022 version 4.5.1 Release 4 History Document history V4.5.1 July 2023 Publication |
2949bd5aae729487a8f07c15de132bb9 | 119 102-2 | 1 Scope | The present document specifies a general structure and an XML format for reporting the validation of AdES digital signatures (specified in ETSI EN 319 122-1 [i.1], ETSI EN 319 132-1 [4], ETSI EN 319 142-1 [i.3] respectively). The present document is aligned with the requirements specified in ETSI EN 319 102-1 [1]. |
2949bd5aae729487a8f07c15de132bb9 | 119 102-2 | 2 References | |
2949bd5aae729487a8f07c15de132bb9 | 119 102-2 | 2.1 Normative references | References are either specific (identified by date of publication and/or edition number or version number) or non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the referenced document (including any amendments) applies. Referenced documents which are not found to be publicly available in the expected location might be found at https://docbox.etsi.org/Reference. NOTE: While any hyperlinks included in this clause were valid at the time of publication, ETSI cannot guarantee their long term validity. The following referenced documents are necessary for the application of the present document. [1] ETSI EN 319 102-1 (V1.3.1): "Electronic Signatures and Infrastructures (ESI); Procedures for Creation and Validation of AdES Digital Signatures; Part 1: Creation and Validation". [2] W3C® Recommendation 11 April 2013: "XML Signature Syntax and Processing Version 1.1". [3] ETSI TS 101 903 (V1.3.2): "XML Advanced Electronic Signatures (XAdES)". [4] ETSI EN 319 132-1: "Electronic Signatures and Infrastructures (ESI); XAdES digital signatures; Part 1: Building blocks and XAdES baseline signatures". [5] ETSI EN 319 132-2: "Electronic Signatures and Infrastructures (ESI); XAdES digital signatures; Part 2: Extended XAdES signatures". [6] ETSI TS 119 612: "Electronic Signatures and Infrastructures (ESI); Trusted Lists". [7] ETSI TS 119 312: "Electronic Signatures and Infrastructures (ESI); Cryptographic Suites". [8] IETF RFC 3061: "A URN Namespace of Object Identifiers". [9] ISO 32000-1:2008: "Document management - Portable document format - Part 1: PDF 1.7". [10] W3C® Recommendation 5 April 2012: "XML Schema Definition Language (XSD) 1.1 Part 1: Structures". [11] ETSI TS 119 172-1: "Electronic Signatures and Infrastructures (ESI); Signature Policies; Part 1: Building blocks and table of contents for human readable signature policy documents". [12] IETF RFC 5035: "Enhanced Security Services (ESS) Update: Adding CertID Algorithm Agility". ETSI ETSI TS 119 102-2 V1.4.1 (2023-06) 11 |
2949bd5aae729487a8f07c15de132bb9 | 119 102-2 | 2.2 Informative references | References are either specific (identified by date of publication and/or edition number or version number) or non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the referenced document (including any amendments) applies. NOTE: While any hyperlinks included in this clause were valid at the time of publication, ETSI cannot guarantee their long term validity. The following referenced documents are not necessary for the application of the present document but they assist the user with regard to a particular subject area. [i.1] ETSI EN 319 122-1: "Electronic Signatures and Infrastructures (ESI); CAdES digital signatures; Part 1: Building blocks and CAdES baseline signatures". [i.2] ETSI EN 319 122-2: "Electronic Signatures and Infrastructures (ESI); CAdES digital signatures; Part 2: Extended CAdES signatures". [i.3] ETSI EN 319 142-1: "Electronic Signatures and Infrastructures (ESI); PAdES digital signatures; Part 1: Building blocks and PAdES baseline signatures". [i.4] ETSI EN 319 142-2: "Electronic Signatures and Infrastructures (ESI); PAdES digital signatures; Part 2: Additional PAdES signatures profiles". [i.5] ETSI TS 119 182-1: "Electronic Signatures and Infrastructures (ESI); JAdES digital signatures; Part 1: Building blocks and JAdES baseline signatures". [i.6] IETF RFC 4998: "Evidence Record Syntax (ERS)". [i.7] IETF RFC 6283: "Extensible Markup Language Evidence Record Syntax (XMLERS)". [i.8] Regulation (EU) No 910/2014 of the European Parliament and of the Council of 23 July 2014 on electronic identification and trust services for electronic transactions in the internal market and repealing Directive 1999/93/EC. [i.9] Recommendation ITU-R TF.460-6: "Standard-frequency and time-signal emissions". |
2949bd5aae729487a8f07c15de132bb9 | 119 102-2 | 3 Definition of terms, symbols and abbreviations | |
2949bd5aae729487a8f07c15de132bb9 | 119 102-2 | 3.1 Terms | For the purposes of the present document, the terms given in ETSI EN 319 102-1 [1] and the following apply: AdES (digital) signature: digital signature that is either a CAdES signature, or a PAdES signature or a XAdES signature advanced electronic signature: As defined in Regulation (EU) No 910/2014 [i.8]. CAdES signature: digital signature that satisfies the requirements specified within ETSI EN 319 122-1 [i.1] or ETSI EN 319 122-2 [i.2] Coordinated Universal Time (UTC): time scale based on the second as defined in Recommendation ITU-R TF.460-6 [i.9] data object: actual binary/octet data being operated on (transformed, digested, or signed) by an application data to be signed formatted: data created from the data to be signed objects by formatting them and placing them in the correct sequence for the computation of the data to be signed representation data to be signed representation: hash of the data to be signed formatted, which is used to compute the digital signature value ETSI ETSI TS 119 102-2 V1.4.1 (2023-06) 12 JAdES signature: digital signature that satisfies the requirements specified within ETSI TS 119 182-1 [i.5] PAdES signature: digital signature that satisfies the requirements specified within ETSI EN 319 142-1 [i.3] or ETSI EN 319 142-2 [i.4] public key: in a public key cryptographic system, that key of an entity's key pair which is publicly known qualified electronic signature: As defined in Regulation (EU) No 910/2014 [i.8]. signature validation report: See ETSI EN 319 102-1 [1]. NOTE: Clause 5.1.3 of ETSI EN 319 102-1 [1] specifies minimum requirements for the content of such a report. (electronic) time-stamp: data in electronic form which binds other electronic data to a particular time establishing evidence that these data existed at that time trusted list: list that provides information about the status and the status history of the trust services from trust service providers regarding compliance with the applicable requirements and the relevant provisions of the applicable legislation NOTE: In the context of European Union Member States, as specified in Regulation (EU) No 910/2014 [i.8], it refers to an EU Member State list including information related to the qualified trust service providers for which it is responsible, together with information related to the qualified trust services provided by them. In the context of non-EU countries or international organizations, it refers to a list meeting the requirements of ETSI TS 119 612 [6] and providing assessment scheme based approval status information about trust services from trust service providers, for compliance with the relevant provisions of the applicable approval scheme and the relevant legislation. XAdES signature: digital signature that satisfies the requirements specified within ETSI EN 319 132-1 [4] or ETSI EN 319 132-2 [5] |
2949bd5aae729487a8f07c15de132bb9 | 119 102-2 | 3.2 Symbols | Void. |
2949bd5aae729487a8f07c15de132bb9 | 119 102-2 | 3.3 Abbreviations | For the purposes of the present document, the following abbreviations apply: AdES Advanced Electronic Signature CRL Certificate Revocation List DA Driving Application DER Distinguished Encoding Rules DSS Digital Signature Service DTBSF Data To Be Signed Formatted DTBSR Data To Be Signed Representation OCSP Online Certificate Status Protocol OID Object IDentifier PDF Portable Document Format POE Proof Of Existence SD Signer's Document SDR Signer's Document Representation SVA Signature Validation Application TSP Trust Service Provider TU Time-stamping Unit URI Uniform Resource Identifier URL Uniform Resource Locator URN Uniform Resource Name UTC Coordinated Universal Time VRI Validation Related Information W3C World Wide Web Consortium ETSI ETSI TS 119 102-2 V1.4.1 (2023-06) 13 XML eXtensible Markup Language |
2949bd5aae729487a8f07c15de132bb9 | 119 102-2 | 4 Signature Validation Report Structure | |
2949bd5aae729487a8f07c15de132bb9 | 119 102-2 | 4.1 General provisions | |
2949bd5aae729487a8f07c15de132bb9 | 119 102-2 | 4.1.1 Report Structure | |
2949bd5aae729487a8f07c15de132bb9 | 119 102-2 | 4.1.1.1 General | The present document defines the structure of reporting the result of the validation of an AdES digital signature (specified in ETSI EN 319 122-1 [i.1], ETSI EN 319 132-1 [4], ETSI EN 319 142-1 [i.3] respectively). The Signature Validation Application (SVA) is assumed to follow the signature validation model specified in ETSI EN 319 102-1 [1] and illustrated by Figure 1. Figure 1: Conceptual Model of Signature Validation ETSI EN 319 102-1 [1] The signature validation report shall consist of: • One or more Signature Validation Report-elements, each element containing the overall signature validation status for one signature as well as additional information on the signature validation performed. Clause 4.3 describes this element. It may also contain: • A Signature Validation Objects-element, containing objects used during validation, such as trust anchors, CRLs, or time-stamps. Clause 4.4 describes this element. NOTE: Objects contained in a signature validation objects element can be trust anchor information, CRLs or time-stamps. Some of these objects tend to be large. The signature validation objects element acts a container allowing storing objects only once even when they are needed for more than one signature validation report element. ETSI ETSI TS 119 102-2 V1.4.1 (2023-06) 14 • A Validator Information Element, containing information on the entity validating the signature(s) and producing the report. Clause 4.5 describes this element. • A Validation Report Signature Element, containing a signature on the report. Clause 4.6 describes this element. Figure 2 illustrates this structure. Figure 3 shows the structure with the elements contained in each of the fields. The following clauses describe these elements. Signature Validation Report Validator Information Validation Report Signature Signature Validation Report Element Signature Validation Objects Element Signature Validation Report Element Signature Validation Report Element CRL CRL validation report Time-Stamp TS validation report OCSP OCSP validation report ... … validation report A dotted line indicates a reference to the validation object is contained in the signature validation report element Figure 2: Signature Validation Report Structure ETSI ETSI TS 119 102-2 V1.4.1 (2023-06) 15 Signed Validation Report Signature Validation Report Elem ent Signature Identification Element Signature Validation Status Indication Main Status Indication Status Sub-Indication Associated validation report data elements Validation Constraints Evaluation Report Formal Policy Policy Identifier Policy Name URLs Validation Constraint (1..n) Validation Constraint Identifier Validation Constraint Status (Applied, Disabled, Overridden) Constraint Validation Result Main status indication Status sub-indication Associated validation report data elements Signature Validation Time Info Time of validation Time of POE of signature Signer's Document Signature Attributes Signer Information Signature Quality Signature Validation Process Inform ation Validation Process (according to ETSI EN 319 102-1 [1]) Validation Service Policy Validation Service Practice Statement Other Signature Validation Report Element Signature Validation Report Element … Signature Validation Objects Elem ent Signature Validation Object Object Identifier Object Type Validation Objects Proof of Existence Signature Validation Object Validation Report Signature Validation Object Signature Validation Object … Validator Information Validation Report Signature Element Figure 3: Validation Report Structure and Elements Annex B of the present document references an XML Schema file for the present document. ETSI ETSI TS 119 102-2 V1.4.1 (2023-06) 16 For every element specified below, a clause provides an excerpt of that schema that is relevant for that element for information. In case of discrepancies between such xml schema excerpts provided in the present document and the XML Schema files, the XML Schema files shall take precedence. Conventional XML namespace prefixes are used in the present document: • The prefix vr: (or no prefix) stands for the namespace for the present document. • The prefix ds: stands for the W3C XML Signature namespace [2]. • The prefix XAdES: stands for the namespace defined in ETSI XML Advanced Electronic Signatures (XAdES) document [3]. • The prefix tsl: stands for the namespace defined in ETSI TS 119 612 [6]. • The prefix xs: stands for the XML schema namespace [10]. Table 1 shows the URI values of the XML namespaces and their corresponding prefixes used in the schema file and within the present document. Table 1: Namespaces with prefixes URI value of the XML Namespace Prefix http://uri.etsi.org/19102/v1.4.1# vr http://www.w3.org/2000/09/xmldsig# ds http://uri.etsi.org/01903/v1.3.2 XAdES http://uri.etsi.org/02231/v2# tsl http://www.w3.org/2001/XMLSchema xs The following elements are used throughout the following clauses. |
2949bd5aae729487a8f07c15de132bb9 | 119 102-2 | 4.1.1.2 Validation Object Reference Element | |
2949bd5aae729487a8f07c15de132bb9 | 119 102-2 | 4.1.1.2.1 General | Validation object reference elements are used within a validation report to reference another element within the report. EXAMPLE: Signature validation objects or the Signature Identification Element can be such elements that are referenced. |
2949bd5aae729487a8f07c15de132bb9 | 119 102-2 | 4.1.1.2.2 XML | Validation object reference elements shall be type VOReferenceType that is defined as follows: <xs:complexType name="VOReferenceType"> <xs:sequence> <xs:any namespace="##any" processContents="lax" minOccurs="0"/> </xs:sequence> <xs:attribute name="VOReference" type="xs:IDREFS" use="required"/> </xs:complexType> |
2949bd5aae729487a8f07c15de132bb9 | 119 102-2 | 4.1.1.3 Typed Data Type | |
2949bd5aae729487a8f07c15de132bb9 | 119 102-2 | 4.1.1.3.1 General | A typed data type element is a generic data structure that can be used for representing any Type-Value tuple. ETSI ETSI TS 119 102-2 V1.4.1 (2023-06) 17 |
2949bd5aae729487a8f07c15de132bb9 | 119 102-2 | 4.1.1.3.2 XML | A typed data type element shall be of type TypedDataType that is defined as follows: <xs:complexType name="TypedDataType"> <xs:sequence> <xs:element name="Type" type="xs:anyURI"/> <xs:element name="Value" type="xs:anyType"/> </xs:sequence> </xs:complexType> |
2949bd5aae729487a8f07c15de132bb9 | 119 102-2 | 4.1.1.4 Any Type | |
2949bd5aae729487a8f07c15de132bb9 | 119 102-2 | 4.1.1.4.1 General | Various validation report elements allow the inclusion of optional elements that can be of "any type". The AnyType element is a generic data structure that can be used for representing any such elements. |
2949bd5aae729487a8f07c15de132bb9 | 119 102-2 | 4.1.1.4.2 XML | An any type element shall be of type AnyType that is defined as follows: <xs:complexType name="AnyType" mixed="true"> <xs:sequence minOccurs="0" maxOccurs="unbounded"> <xs:any processContents="lax"/> </xs:sequence> </xs:complexType> |
2949bd5aae729487a8f07c15de132bb9 | 119 102-2 | 4.1.1.5 Signature Reference | |
2949bd5aae729487a8f07c15de132bb9 | 119 102-2 | 4.1.1.5.1 General | A signature reference element references a specific electronic signature. |
2949bd5aae729487a8f07c15de132bb9 | 119 102-2 | 4.1.1.5.2 XML | A signature reference shall be of type SignatureReferenceType that is defined as follows: <xs:complexType name="SignatureReferenceType"> <xs:choice> <xs:sequence> <xs:element name="CanonicalizationMethod" type="xs:anyURI" minOccurs="0"/> <xs:element name="DigestMethod" type="xs:anyURI"/> <xs:element name="DigestValue" type="xs:base64Binary"/> </xs:sequence> <xs:element ref="vr:XAdESSignaturePtr"/> <xs:element name="PAdESFieldName" type="xs:string"/> <xs:element name="OtherInformation" type="vr:AnyType" minOccurs="0"/> </xs:choice> </xs:complexType> <xs:element name="XAdESSignaturePtr" type="vr:XAdESSignaturePtrType"/> <xs:complexType name="XAdESSignaturePtrType"> <xs:sequence> <xs:element name="NsPrefixMapping" type="vr:NsPrefixMappingType" minOccurs="0" maxOccurs="unbounded"/> </xs:sequence> <xs:attribute name="WhichDocument" type="xs:IDREF" use="optional"/> <xs:attribute name="XPath" type="xs:string" use="optional"/> <xs:attribute name="SchemaRefs" type="xs:IDREFS" use="optional"/> </xs:complexType> <xs:complexType name="NsPrefixMappingType"> <xs:sequence> <xs:element name="NamespaceURI" type="xs:anyURI"/> <xs:element name="NamespacePrefix" type="xs:string"/> </xs:sequence> </xs:complexType> ETSI ETSI TS 119 102-2 V1.4.1 (2023-06) 18 |
2949bd5aae729487a8f07c15de132bb9 | 119 102-2 | 4.2 Validation-Report-Element | |
2949bd5aae729487a8f07c15de132bb9 | 119 102-2 | 4.2.1 General | Presence: Mandatory Description: This element is the wrapper for reports on the validation of one or more signatures. Content: This element shall contain one or more signature-validation-report elements as specified in clause 4.3. It also may contain: a signature validation objects element as specified in clause 4.4; information on the entity validating the signature and creating the validation report as described in clause 4.5; and a validation-report-signature element as described in clause 4.6. |
2949bd5aae729487a8f07c15de132bb9 | 119 102-2 | 4.2.2 XML | The validation report element shall be contained in an element named ValidationReport of type ValidationReportType that is defined as follows: <xs:complexType name="ValidationReportType"> <xs:sequence> <xs:element name="SignatureValidationReport" type="vr:SignatureValidationReportType" maxOccurs="unbounded"/> <xs:element name="SignatureValidationObjects" type="vr:ValidationObjectListType" minOccurs="0"/> <xs:element name="SignatureValidator" type="vr:SignatureValidatorType" minOccurs="0"/> <xs:element ref="ds:Signature" minOccurs="0"/> </xs:sequence> </xs:complexType> |
2949bd5aae729487a8f07c15de132bb9 | 119 102-2 | 4.3 Signature-Validation-Report-Element | |
2949bd5aae729487a8f07c15de132bb9 | 119 102-2 | 4.3.1 General | Presence: Mandatory Description: This element represents the validation information for a single signature. Content: This element shall contain a sequence of elements described in clauses 4.3.3 to 4.3.12. NOTE: This element is also used in the validation report of a signature validation object (see clause 4.4.8). The rules whether an element contained within this element is mandatory or optional can be different in this case. This element may also contain any other information provided by the validation process. ETSI ETSI TS 119 102-2 V1.4.1 (2023-06) 19 |
2949bd5aae729487a8f07c15de132bb9 | 119 102-2 | 4.3.2 XML | The signature validation report shall be contained in an element named SignatureValidationReport of type SignatureValidationReportType that is defined as follows: <xs:complexType name="SignatureValidationReportType"> <xs:sequence> <xs:element name="SignatureIdentifier" type="vr:SignatureIdentifierType" minOccurs="0"/> <xs:element name="ValidationConstraintsEvaluationReport" type="vr:ValidationConstraintsEvaluationReportType" minOccurs="0"/> <xs:element name="ValidationTimeInfo" type="vr:ValidationTimeInfoType" minOccurs="0"/> <xs:element name="SignersDocument" type="vr:SignersDocumentType" minOccurs="0"/> <xs:element name="SignatureAttributes" type="vr:SignatureAttributesType" minOccurs="0"/> <xs:element name="SignerInformation" type="vr:SignerInformationType" minOccurs="0"/> <xs:element name="SignatureQuality" type="vr:SignatureQualityType" minOccurs="0"/> <xs:element name="SignatureValidationProcess" type="SignatureValidationProcessType" minOccurs="0"/> <xs:element name="SignatureValidationStatus" type="ValidationStatusType"/> <xs:element name="OtherInformation" type="vr:AnyType" minOccurs="0"/> </xs:sequence> </xs:complexType> |
2949bd5aae729487a8f07c15de132bb9 | 119 102-2 | 4.3.3 Signature Identification Element | |
2949bd5aae729487a8f07c15de132bb9 | 119 102-2 | 4.3.3.1 Element Semantics | Presence: Conditional. This element shall be present in the validation report of a signature unless the signature validation status element (see clause 4.3.4) indicates that a validation has not been possible because signature was not conformant to one of the base standards to the extent that the cryptographic verification building block was unable to process it (main indication TOTAL-FAILED, subindication FORMAT_FAILURE as specified in ETSI EN 319 102-1 [1], clause 5.1.3, table 6). This element may be present in a validation report of a signature validation object (see clause 4.4.8). Description: This element identifies the signature that has been the scope of the validation. Content: This element shall contain: 1) The DTBSR (see clause 4.2.8 in ETSI EN 319 102-1 [1]) together with an identifier of the hash algorithm used to calculate the hash. 2) An indication whether the DTBSF (see clause 4.2.7 in ETSI EN 319 102-1 [1]) or the DTBSR (see clause 4.2.8 in ETSI EN 319 102-1 [1]) has been processed by the SVA. NOTE 1: This allows the report format defined in the present document to be used when a SVA has verified the cryptographic signature and the validity of the certificate(s) only without having seen the documents and any other elements of an AdES-Signature. 3) An indication whether the Signer's Document (SD) (see clause 4.2.3 in ETSI EN 319 102-1 [1]) or the Signer's Document Representation (SDR) (see clause 4.2.4 in ETSI EN 319 102-1 [1]) has been processed by the SVA. NOTE 2: This allows the report format defined in the present document to be used when a SVA has verified an AdES signature having processed the hash the Signer's Document only. This element may also contain: 4) A unique identifier allowing this element to be referenced within the validation report. 5) The digital signature value. 6) An identifier provided by the DA. 7) One or more other elements, which help identifying a signature and the signature data in a unique manner. ETSI ETSI TS 119 102-2 V1.4.1 (2023-06) 20 |
2949bd5aae729487a8f07c15de132bb9 | 119 102-2 | 4.3.3.2 XML representation | The Signature Identification Element shall be of type SignatureIdentifierType. This element shall contain the DTBSR in an element of type XAdES:DigestAlgAndValueType. The element HashOnly shall contain the value true when only the DTBSR has been processed by the SVA, otherwise it shall contain the value false. The element DocHashOnly shall contain the value true when only the SDR has been processed by the SVA, otherwise it shall contain the value false. This element may also contain: • a <ds:SignatureValue>-element to identify the signature by the digital signature value; • a DAIdentifier-element containing an identifier provided by the DA; and • an xs:id attribute as the unique identifier by which this element can be referenced; • one or more elements (of any type) helping to identify the signature. The set of child elements shall be chosen to identify the signature or validation data in an unambiguous manner. <xs:complexType name="SignatureIdentifierType"> <xs:sequence> <xs:element name="DigestAlgAndValue" type="XAdES:DigestAlgAndValueType" minOccurs="0"/> <xs:element ref="ds:SignatureValue" minOccurs="0"/> <xs:element name="HashOnly" type="xs:boolean"/> <xs:element name="DocHashOnly" type="xs:boolean"/> <xs:element name="DAIdentifier" type="xs:string" minOccurs="0"/> <xs:element name="OtherInformation" type="vr:AnyType" minOccurs="0"/> </xs:sequence> <xs:attribute name="id" type="xs:ID" use="optional"/> </xs:complexType> |
2949bd5aae729487a8f07c15de132bb9 | 119 102-2 | 4.3.4 Signature Validation Status Indication | |
2949bd5aae729487a8f07c15de132bb9 | 119 102-2 | 4.3.4.1 General | Presence: Mandatory. Description: When present in the validation report of a signature, this element provides information on the status of the full validation of the signature in the context of a particular signature validation policy. When present in a validation report of a signature validation object, this element provides information on the result of the validation of that object in the context of a particular signature validation policy that was selected for the validation of the signature. Content: This element shall contain one main status indication element as defined in clause 4.3.4.2. This element may contain one or more sub-indication elements as defined in clause 4.3.4.3. NOTE: There can be more than one sub-indication element when the SVA needs to report multiple problems. |
2949bd5aae729487a8f07c15de132bb9 | 119 102-2 | 4.3.4.2 Main Status Indication Element | Presence: Mandatory. Description: This element provides the main status indication. Content: When present in the validation report of a signature, the following URIs shall be used to represent the main status indication: TOTAL-PASSED urn:etsi:019102:mainindication:total-passed ETSI ETSI TS 119 102-2 V1.4.1 (2023-06) 21 TOTAL-FAILED urn:etsi:019102:mainindication:total-failed INDETERMINATE urn:etsi:019102:mainindication:indeterminate When present in an individual validation constraint report element (see clause 4.3.5.4) or a validation report of a signature validation object (see clause 4.4.8), the following URIs shall be used to represent the main status indication: PASSED urn:etsi:019102:mainindication:passed FAILED urn:etsi:019102:mainindication:failed INDETERMINATE urn:etsi:019102:mainindication:indeterminate The main status indication may be supported by associated validation report data as specified in tables 5 and 6 of ETSI EN 319 102-1 [1]. If present, such data shall be contained in associated validation data elements as specified in clause 4.3.12. |
2949bd5aae729487a8f07c15de132bb9 | 119 102-2 | 4.3.4.3 Status Sub-Indication Element | Presence: Optional. Description: This element provides a status sub-indication. NOTE: When the main status indication is TOTAL-FAILED or INDETERMINATE, providing a sub-indication is essential to understand the reason for the result. Content: The Status Sub-Indication element shall consist of: 1) a sub-indication that shall clearly identify the reason for the main status indication; and 2) optional associated validation report data elements (see clause 4.3.12) supporting that sub-indication. There may be more than one sub-indication element present. A sub-indication may be supported by associated validation report data as specified in tables 5 and 6 of ETSI EN 319 102-1 [1]. If present, such data shall be contained in associated validation data elements as specified in clause 4.3.12. When the sub-indication corresponds to a sub-indication defined in ETSI EN 319 102-1 [1], the following URIs shall be used. Table 2 Subindication URN FORMAT_FAILURE urn:etsi:019102:subindication:FORMAT_FAILURE HASH_FAILURE urn:etsi:019102:subindication:HASH_FAILURE SIG_CRYPTO_FAILURE urn:etsi:019102: subindication:SIG_CRYPTO_FAILURE REVOKED urn:etsi:019102:subindication:REVOKED SIG_CONSTRAINTS_FAILURE urn:etsi:019102: subindication:SIG_CONSTRAINTS_FAILURE CHAIN_CONSTRAINTS_FAILURE urn:etsi:019102: subindication:CHAIN_CONSTRAINTS_FAILURE CERTIFICATE_CHAIN_GENERAL_FAILURE urn:etsi:019102: subindication:CERTIFICATE_CHAIN_GENERAL_FAILURE CRYPTO_CONSTRAINTS_FAILURE urn:etsi:019102: subindication:CRYPTO_CONSTRAINTS_FAILURE EXPIRED urn:etsi:019102:subindication:EXPIRED NOT_YET_VALID urn:etsi:019102:subindication:NOT_YET_VALID POLICY_PROCESSING_ERROR urn:etsi:019102: subindication:POLICY_PROCESSING_ERROR SIGNATURE_POLICY_NOT_AVAILABLE urn:etsi:019102: subindication:SIGNATURE_POLICY_NOT_AVAILABLE TIMESTAMP_ORDER_FAILURE urn:etsi:019102: subindication:TIMESTAMP_ORDER_FAILURE ETSI ETSI TS 119 102-2 V1.4.1 (2023-06) 22 Subindication URN NO_SIGNING_CERTIFICATE_FOUND urn:etsi:019102: subindication:NO_SIGNING_CERTIFICATE_FOUND NO_CERTIFICATE_CHAIN_FOUND urn:etsi:019102: subindication:NO_CERTIFICATE_CHAIN_FOUND REVOKED_NO_POE urn:etsi:019102: subindication:REVOKED_NO_POE REVOKED_CA_NO_POE urn:etsi:019102: subindication:REVOKED_CA_NO_POE OUT_OF_BOUNDS_NO_POE urn:etsi:019102: subindication:OUT_OF_BOUNDS_NO_POE CRYPTO_CONSTRAINTS_FAILURE_NO_POE urn:etsi:019102: subindication:CRYPTO_CONSTRAINTS_FAILURE_NO_POE NO_POE urn:etsi:019102:subindication:NO_POE TRY_LATER urn:etsi:019102:subindication:TRY_LATER SIGNED_DATA_NOT_FOUND urn:etsi:019102: subindication:SIGNED_DATA_NOT_FOUND CUSTOM urn:etsi:019102:subindication:CUSTOM REVOCATION_OUT_OF_BOUNDS_NO_POE urn:etsi:019102:subindication:REVOCATION_OUT_OF_B OUNDS_NO_POE |
2949bd5aae729487a8f07c15de132bb9 | 119 102-2 | 4.3.4.4 XML representation | The signature validation status indication shall be provided as an element named SignatureValidationStatus of type ValidationStatusType, as defined below. The main status indication shall be expressed by the element MainIndication using the URIs defined in clause 4.3.4.2. The sub-indication shall be expressed by the element SubIndication using the URIs defined in clause 4.3.4.3. The associated validation data may be reported in AssociatedValidationReportData elements, see clause 4.3.12. <xs:complexType name="ValidationStatusType"> <xs:sequence> <xs:element name="MainIndication" type="xs:anyURI"/> <xs:element name="SubIndication" type="xs:anyURI" minOccurs="0" maxOccurs="unbounded"/> <xs:element name="AssociatedValidationReportData" type="vr:ValidationReportDataType" minOccurs="0" maxOccurs="unbounded"/> </xs:sequence> </xs:complexType> |
2949bd5aae729487a8f07c15de132bb9 | 119 102-2 | 4.3.5 Validation Constraints Evaluation Report | |
2949bd5aae729487a8f07c15de132bb9 | 119 102-2 | 4.3.5.1 General | Presence: Conditional. This element shall be present in the validation report of a signature. This element may be present in a validation report of a signature validation object (see clause 4.4.8). Description: This element specifies the set of validation constraints that have been driving the validation process, irrespective of the way the constraints have been defined (see ETSI EN 319 102-1 [1], clause 5.1.4.1). Content: When a formal signature validation policy, as defined in ETSI TS 119 172-1 [11], has been selected explicitly or implicitly by the DA, this element shall contain a reference to that formal signature validation policy specification in a formal policy element (see clause 4.3.5.3). NOTE: The reference to the formal signature validation policy indicates that this policy has been driving the validation. Detailed information on the validation of the individual constraints this policy consists of can be reported additionally in validation constraint elements. ETSI ETSI TS 119 102-2 V1.4.1 (2023-06) 23 This element shall contain individual validation constraint report elements (see clause 4.3.5.4) reporting on validation constraints that have been applied explicitly and implicitly by the SVA. This element shall contain individual validation constraint report elements (see clause 4.3.5.4) reporting on validation constraints that a validation conformant to ETSI EN 319 102-1 [1] would require to be checked but have been disabled or have been overridden by the validation policy in use. When a formal signature validation policy provided by the DA was not applied or not applied completely by the SVA, the validation report shall contain individual validation constraint report elements (see clause 4.3.5.4) reporting on which validation constraints were applied and which ones have been ignored or overridden. |
2949bd5aae729487a8f07c15de132bb9 | 119 102-2 | 4.3.5.2 XML | Information on the validation constraints that were applied during validation shall be placed in an element named ValidationConstraintsEvaluationReport of type ValidationConstraintsEvaluationReportType, defined as follows: <xs:complexType name="ValidationConstraintsEvaluationReportType"> <xs:sequence> <xs:element name="SignatureValidationPolicy" type="vr:SignatureValidationPolicyType" minOccurs="0"/> <xs:element name="ValidationConstraint" type="vr:IndividualValidationConstraintReportType" minOccurs="0" maxOccurs="unbounded"/> </xs:sequence> </xs:complexType> It may contain an element of type SignatureValidationPolicyType as defined in clause 4.3.5.3.2 and one or more elements of type IndividualValidationConstraintReportType as defined in clause 4.3.5.4.2. |
2949bd5aae729487a8f07c15de132bb9 | 119 102-2 | 4.3.5.3 Formal Policy Element | |
2949bd5aae729487a8f07c15de132bb9 | 119 102-2 | 4.3.5.3.1 General | Presence: Conditional. This element shall be present in the validation report of a signature when a formal signature validation policy as defined in ETSI TS 119 172-1 [11] has been selected explicitly or implicitly by the DA. In all other cases, this element may be present. Description: This element defines a formal signature validation policy that has been driving the validation process. Content: This element shall contain a signature validation policy identifier that is capable of uniquely identifying the signature validation policy defining the set of constraints that have been applied during validation. This element may also contain the following additional information: 1) A signature policy name. 2) A URL where the formal policy specification can be retrieved. 3) A URL where a human readable policy equivalent to the applied formal policy can be retrieved. 4) A reference to an object in the Signature Validation Objects element (see clause 4.1.1.2). The object referenced shall contain the formal signature validation policy specification. ETSI ETSI TS 119 102-2 V1.4.1 (2023-06) 24 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.