<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->
<?rfc css="css/overrides.css"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-smith-satp-vlei-binding-01" category="std" consensus="true" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.30.2 -->
  <front>
    <title abbrev="SATP-vLEI">A SATP Core Binding for vLEI Identities</title>
    <seriesInfo name="Internet-Draft" value="draft-smith-satp-vlei-binding-01"/>
    <author fullname="Ned Smith">
      <organization>Independent</organization>
      <address>
        <email>ned.smith.ietf@outlook.com</email>
      </address>
    </author>
    <date year="2025" month="October" day="17"/>
    <area>Applications and Real-Time</area>
    <workgroup>Secure Asset Transfer Protocol</workgroup>
    <keyword>verifiable identities</keyword>
    <keyword>internet draft</keyword>
    <abstract>
      <?line 220?>

<t>The verifiable Legal Entity Identifier (vLEI) is a cryptographically verifiable extension of the LEI standard, designed to automate trust in organizational identity.
Governed by the Global Legal Entity Identifier Foundation (GLEIF), the vLEI system uses Authentic Chained Data Containers (ACDCs), Self-Addressing Identifiers (SAIDs), and Key Event Receipt Infrastructure (KERI) to issue and verify credentials for legal entities and their authorized representatives.
It enables secure, machine-readable identity assertions across financial, regulatory, and supply chain ecosystems, supporting role-based delegation and interoperability with decentralized trust frameworks.</t>
      <t>This specification defines vLEI for verifiable gateway operator identities and cryptographically links the gateway operator identity to the gateway identity.
Thus SATP core lock assertions are cryptographically linked to gateway operator identities.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://nedmsmith.github.io/draft-smith-satp-vlei-binding/draft-smith-satp-vlei-binding.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-smith-satp-vlei-binding/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Secure Asset Transfer Protocol Working Group mailing list (<eref target="mailto:sat@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/sat/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/sat/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/nedmsmith/draft-smith-satp-vlei-binding"/>.</t>
    </note>
  </front>
  <middle>
    <?line 230?>

<section anchor="sec-intro">
      <name>Introduction</name>
      <t>The SATP architecture <xref target="I-D.ietf-satp-architecture"/> defines an interoperability architecture for interconnection between networks or systems that anticipates a secure asset transfer protocol that satisfies security, privacy, atomicity and liveliness requirements in the transfer of assets.
The SATP core protocol <xref target="I-D.ietf-satp-core"/> is a protocol for exchanging digital assets that ensures the state of the asset is preserved across inter-domain transfers. It is an extensible protocol where fields containing identity and payload values that are not defined by SATP core may be defined by companion specifications.
This specification defines a SATP core protocol binding for Verifiable Legal Entity Identifiers (vLEI) <xref target="ISO17442-3"/> used to identify SATP gateways and the organizations that operate them.
In some use cases, the assets being transferred have legal considerations such that officers of the organization are expected to authorize digital asset transfers.
This specification details the various vLEI credentials needed and how to integrate them with SATP core messages.
SATP core message binding anticipates use of a message wrapper that uses media type <xref target="STD91"/> and content format <xref target="RFC7252"/> identifiers to facilitate interoperability with vLEI and other credential types.</t>
    </section>
    <section anchor="sec-conv">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<section anchor="terminology">
        <name>Terminology</name>
        <ul spacing="normal">
          <li>
            <t>Legal Entity : any organization or structure that is legally or financially responsible for its actions and can enter into financial transactions, explicitly excluding natural persons except where they act as sole proprietors recognized as legal entities <xref target="ISO17442-1_2020"/>.</t>
          </li>
          <li>
            <t>Natural person : a living human being (<eref target="https://www.law.cornell.edu/wex/natural_person">LLI</eref>).</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="sec-ids">
      <name>vLEI Identities and Credentials</name>
      <t>The SATP core protocol <xref target="I-D.ietf-satp-core"/> defines a set of entities that participate in an asset transfer.
These entities are represented in differennt ways including identifiers, credentials and public keys.
SATP entities are presumed to have been issued cryptographically relevant identities prior to the SATP Transfer Initiation Stage (Stage 1) and subsequent exchanges.
An entity (see Section 3 <xref target="RFC4949"/> that weilds a cryptographic key pair can be described as a <em>principal</em> <xref target="ACM-Calculus"/>.
SATP Gateways and Networks as well as the key management infrastructure that authorizes these keys are all principals.</t>
      <section anchor="vlei-credential-attributes">
        <name>vLEI Credential Attributes</name>
        <t>A legal entity identifier (LEI) is essentially a globally unique value issued by a well-known entity trusted to manage the LEI namespace correctly.
A verifiable LEI (vLEI) <xref target="ISO17442-3"/> is an Authentic Chained Data Container (ACDC) <xref target="ACDC-Spec"/> credential that contains three attributes:</t>
        <ul spacing="normal">
          <li>
            <t>Legal Entity Identifier (LEI)</t>
          </li>
          <li>
            <t>Person Identifier - human friendly name</t>
          </li>
          <li>
            <t>Organizational Role Identifier - defined by a namespace controller such as GLEIF <xref target="GLEIF-vLEI-EGF"/>.</t>
          </li>
        </ul>
        <t>A vLEI ACDC attributes also contain an Autonomic Identifier (<eref target="https://trustoverip.github.io/kerisuite-glossary#term:autonomic-identifier">AID</eref>) that identifies the principal to which the other vLEI attributes are bound.
In PKIX terminology, this AID identifies the <em>subject</em>.
A vLEI ACDC also contains an issuer AID that identifies the issuing principal.
vLEI credentials are issued to non-natural person legal entities (see <xref target="GLEIF-vLEI-Part2"/> and <xref target="ISO17442-3"/>).
Nevertheless, these credentials contain <tt>personLegalName</tt> and <tt>engagementContextRole</tt> attributes that are typically associated with natural persons.</t>
      </section>
      <section anchor="keri-key-management">
        <name>KERI Key Management</name>
        <t>AIDs reference Key Event Log (KEL) events that can be verified by outside entities; as such is a form of key attestation.
An ACDC issuer is anchored to a key inception event which is a digest of the current and pre-rotated keys and other key management context.
The digest becomes the issuer's autonomic identifier (AID).
An ACDC credential can be identified by hashing its contents.
The resulting digest is called a Self-Addressing Identifier (SAID) <xref target="KERI-Spec"/>.</t>
        <t>Periodically, key events are appended to the KEL resulting in a different key state.
However, the key inception event (the first event) remains unchanged.
Anchoring AIDs to inception events means the identifier is relatively long lived as even key rotation events are anticipated at inception.
Key rotation events that exceed the number of pre-rotated keys results in a new key inception event that conseqently invalidates its previous AID.</t>
        <t>When applying vLEI to SATP, ACID properties suggest that the state of the exchanged asset, the protocol state, and the key state play a role in determining the overall state of the asset exchange.
Ideally, SATP principals (including key state) is locked down as part of reliable asset exchange where the complete state can be rolled back to a known-good state.
However, if key state can't be locked as part of a SATP asset exchange, key state verification at each SATP stage may be needed to verify the subsequent key state changes occuring during SATP stages does not present a security relevant condition.</t>
      </section>
      <section anchor="satp-credentialing-assumptions">
        <name>SATP Credentialing Assumptions</name>
        <t>SATP signing keys (e.g., senderGatewaySignaturePublicKey) that are based on ACDC credentials implicitly support key attestation as part of key verification.
SATP device keys (e.g., senderGatewayDeviceIdentityPubKey) used for device authentication or device attestation can furthur strengthen trustworthiness claims of SATP endpoints.
Some SATP keys do not use vLEI credentals, but could still be based on ACDC credentials.
Still other credential types (e.g., PKIX <xref target="RFC5280"/>) could be leveraged, but complicates key and trust management.</t>
        <t>RFCthis assumes SATP stage 1 messages that contain identifiers and public keys are artifacts of credentials that have been issued to SATP defined entities.
In addition, SATP entities are authorized by vLEI hierarchy that supplies a legal context for asset exchange
Nevertheless, the GatewayDeviceIdentityPublicKey could be associated with a different credential from that belonging to the GatewaySignaturePublicKey.
Consequently, there <bcp14>MAY</bcp14> be additional credentials issued to SATP principals that require additional verifier processing that ensures the asset transfer legal context is in force despite bifurcated credential formats and infrastructure.</t>
      </section>
      <section anchor="sec-id-bind">
        <name>SATP Identity Binding</name>
        <t><xref target="tbl-satp-entity"/> shows SATP entities with corresponding SATP message types mapped to a suitable credential structure.
Stage 1 defines uses credential artifacts (i.e., identifiers and public keys) implying credential issuance occurred earlier, possibly during Stage 0.
RFCthis assumes all credentials issued are (or can be) ACDCs.
The entity identifier within an ACDD is an autonomic identifer (AID), which is semantically aligned with SATP IDs.</t>
        <table anchor="tbl-ent-msg-cred">
          <name>Mapping of SATP Entities and Messages to Credential Type</name>
          <thead>
            <tr>
              <th align="left">SATP Entity</th>
              <th align="left">SATP Message</th>
              <th align="left">Structure</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">Originator</td>
              <td align="left">OriginatorCredential <em>-implied-</em></td>
              <td align="left">vLEI</td>
            </tr>
            <tr>
              <td align="left"> </td>
              <td align="left">verifiedOriginatorEntityID</td>
              <td align="left">AID</td>
            </tr>
            <tr>
              <td align="left"> </td>
              <td align="left">originatorPubkey</td>
              <td align="left">KEL or other</td>
            </tr>
            <tr>
              <td align="left">Sender Gateway Owner</td>
              <td align="left">senderGatewayOwnerCredential <em>-implied-</em></td>
              <td align="left">vLEI</td>
            </tr>
            <tr>
              <td align="left"> </td>
              <td align="left">senderGatewayOwnerID</td>
              <td align="left">AID</td>
            </tr>
            <tr>
              <td align="left">Sender Gateway (G1)</td>
              <td align="left">senderGatewayCredential <em>-implied-</em></td>
              <td align="left">ACDC</td>
            </tr>
            <tr>
              <td align="left"> </td>
              <td align="left">senderGatewayId</td>
              <td align="left">AID</td>
            </tr>
            <tr>
              <td align="left"> </td>
              <td align="left">senderGatewaySignaturePublicKey</td>
              <td align="left">KEL or other</td>
            </tr>
            <tr>
              <td align="left">Sender Gateway (G1)</td>
              <td align="left">senderGatewayDeviceIdentityCredential <em>-implied-</em></td>
              <td align="left">ACDC</td>
            </tr>
            <tr>
              <td align="left"> </td>
              <td align="left">senderGatewayDeviceIdentityId <em>-implied-</em></td>
              <td align="left">AID</td>
            </tr>
            <tr>
              <td align="left"> </td>
              <td align="left">senderGatewayDeviceIdentityPubkey</td>
              <td align="left">KEL or other</td>
            </tr>
            <tr>
              <td align="left">Sender Network</td>
              <td align="left">senderNetworkCredential <em>-implied-</em></td>
              <td align="left">ACDC</td>
            </tr>
            <tr>
              <td align="left"> </td>
              <td align="left">senderGatewayNetworkId</td>
              <td align="left">AID</td>
            </tr>
            <tr>
              <td align="left">.............</td>
              <td align="left">.........................................</td>
              <td align="left">....</td>
            </tr>
            <tr>
              <td align="left">Beneficiary</td>
              <td align="left">BeneficiaryCredential <em>-implied-</em></td>
              <td align="left">vLEI</td>
            </tr>
            <tr>
              <td align="left"> </td>
              <td align="left">beneficiaryPubkey</td>
              <td align="left">KEL or other</td>
            </tr>
            <tr>
              <td align="left"> </td>
              <td align="left">verifiedBeneficiaryEntityID</td>
              <td align="left">AID</td>
            </tr>
            <tr>
              <td align="left">Receiver Gateway Owner</td>
              <td align="left">receiverGatewayOwnerCredential <em>-implied-</em></td>
              <td align="left">vLEI</td>
            </tr>
            <tr>
              <td align="left"> </td>
              <td align="left">senderGatewayOwnerID</td>
              <td align="left">AID</td>
            </tr>
            <tr>
              <td align="left">Receiver Gateway (G2)</td>
              <td align="left">receiverGatewayCredential <em>-implied-</em></td>
              <td align="left">ACDC</td>
            </tr>
            <tr>
              <td align="left"> </td>
              <td align="left">receiverGatewayId</td>
              <td align="left">AID</td>
            </tr>
            <tr>
              <td align="left"> </td>
              <td align="left">receiverGatewaySignaturePublicKey</td>
              <td align="left">KEL or other</td>
            </tr>
            <tr>
              <td align="left">Receiver Gateway (G2)</td>
              <td align="left">receiverGatewayDeviceIdentityCredential <em>-implied-</em></td>
              <td align="left">ACDC</td>
            </tr>
            <tr>
              <td align="left"> </td>
              <td align="left">receiverGatewayDeviceIdentityId <em>-implied-</em></td>
              <td align="left">AID</td>
            </tr>
            <tr>
              <td align="left"> </td>
              <td align="left">receiverGatewayDeviceIdentityPubkey</td>
              <td align="left">KEL or other</td>
            </tr>
            <tr>
              <td align="left">Recipient Network</td>
              <td align="left">recipientNetworkCredential <em>-implied-</em></td>
              <td align="left">ACDC</td>
            </tr>
            <tr>
              <td align="left"> </td>
              <td align="left">recipientGatewayNetworkId</td>
              <td align="left">AID</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="vlei-roles">
        <name>vLEI Roles</name>
        <t>The vLEI ecosystem defines roles-specific credentials.
Version 1.0 of vLEI defines six ecosystem roles.</t>
        <table anchor="tbl-vlei-roles">
          <name>vLEI Ecosystem Roles</name>
          <thead>
            <tr>
              <th align="left">vLEI Role</th>
              <th align="left">Abbreviation</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">QualifiedvLEIIssuervLEICredential</td>
              <td align="left">QVI</td>
            </tr>
            <tr>
              <td align="left">LegalEntityvLEICredential</td>
              <td align="left">LEID</td>
            </tr>
            <tr>
              <td align="left">OORAuthorizationvLEICredential</td>
              <td align="left">OORA</td>
            </tr>
            <tr>
              <td align="left">LegalEntityOfficialOrganizationalRolevLEICredential</td>
              <td align="left">OOR</td>
            </tr>
            <tr>
              <td align="left">ECRAuthorizationvLEICredential</td>
              <td align="left">ECRA</td>
            </tr>
            <tr>
              <td align="left">LegalEntityEngagementContextRolevLEICredential</td>
              <td align="left">ECR</td>
            </tr>
          </tbody>
        </table>
        <t>The vLEI role architecdture is a hierarchical namespace.
The QVI role manages the top-level namespace.
It oversees the lifecycle of subordinate namespaces (e.g., LEID, OORA, and ECRA) which are also characterized as roles.
The LEID role manages the LEID namespace.
The OORA role manages the OORA namespace and lifecycle of its subordinate OOR role.
The ECRA role manages the ECR namespace and lifecycle of its subordinate ECR role.
The LEID, OOR, and ECR are <em>non-natural person</em> roles (see <xref target="ISO17442-1_2020"/>).
Non-vLEI credentials are used to identify and authenticate such entities.</t>
        <section anchor="vlei-schemas">
          <name>vLEI Schemas</name>
          <t>The various vLEI ACDC objects conform to JSON Schemas:</t>
          <ul spacing="normal">
            <li>
              <t><eref target="https://github.com/GLEIF-IT/vLEI-schema/blob/main/legal-entity-vLEI-credential.json">LEID</eref>.</t>
            </li>
            <li>
              <t><eref target="https://github.com/GLEIF-IT/vLEI-schema/blob/main/qualified-vLEI-issuer-vLEI-credential.json">QVI</eref>.</t>
            </li>
            <li>
              <t><eref target="https://github.com/GLEIF-IT/vLEI-schema/blob/main/oor-authorization-vlei-credential.json">OORA</eref>.</t>
            </li>
            <li>
              <t><eref target="https://github.com/GLEIF-IT/vLEI-schema/blob/main/ecr-authorization-vlei-credential.json">ECRA</eref>.</t>
            </li>
            <li>
              <t><eref target="https://github.com/GLEIF-IT/vLEI-schema/blob/main/legal-entity-official-organizational-role-vLEI-credential.json">OOR</eref>.</t>
            </li>
            <li>
              <t><eref target="https://github.com/GLEIF-IT/vLEI-schema/blob/main/legal-entity-engagement-context-role-vLEI-credential.json">ECR</eref>.</t>
            </li>
          </ul>
          <t>These schemas are used to validate JSON realizations of vLEI credentials.
Other representations such as CBOR <xref target="STD94"/> and message pack <xref target="MSGPCK"/> can be realized, but the schemas used to validate them are not available at the time of this writing.</t>
        </section>
        <section anchor="legalentityengagementcontextrolevleicredential-credentials">
          <name>LegalEntityEngagementContextRolevLEICredential Credentials</name>
          <t>The SATP Messages in row 3 of <xref target="tbl-satp-entity"/> is a LegalEntityEngagementContextRolevLEICredential as defined by the <eref target="https://github.com/GLEIF-IT/vLEI-schema/blob/main/legal-entity-engagement-context-role-vLEI-credential.json">LEECRvLEIC</eref> schema.</t>
          <t>These messages are realized using a LEECRvLEIC because they identify the gateways and hosts within the respective networks involved in transferring digital assets.</t>
        </section>
      </section>
    </section>
    <section anchor="sec-arch">
      <name>vLEI Binding Architecture</name>
      <t>The SATP core protocol <xref target="I-D.ietf-satp-core"/> defines several extensible protocol fields that contain identity and other values not defined by SATP core.
To facilitate interoperability these fields <bcp14>SHOULD</bcp14> contain a media type <xref target="STD91"/> or content format <xref target="RFC7252"/> wrapper.
This specation requests IANA assignment of media type and content format identifiers for vLEIs which are serialized as Composable Event Streaming Representation (CESR) <xref target="CESR-Spec"/> objects in JSON and other formats.
See <xref target="sec-media-types"/>.</t>
      <t><cref anchor="ids-note3" source="Ned Smith">
Note: SATP describes Gateway secure channel establishment public key-pair but this isn't represented in the list of message publickey message types.
Gateway Credential type isn't used in any of the stages afaik.
There should be an IANA registry for the allowed credential types (vLEI, SAML, OAuth, PKIX).
</cref></t>
      <section anchor="sec-satp-vlei-mapping">
        <name>SATP vLEI Mapping</name>
        <t>The SATP protocol <xref target="I-D.ietf-satp-core"/> defines a set of SATP flows that are divided into protocol message exchange blocks called stages.
The stage-1 messages are illustrated in <xref target="tbl-ent-msg-cred"/>.
The SATP entity that authors the various stage-1 messages is also depicted in <xref target="tbl-ent-msg-cred"/>.
The authority used to assert SATP messages is based on a cryptographic credential that is used to authenticate the message.
SATP asset transfers depend on properly established organizational authority contexts.
<xref target="tbl-satp-entity"/> illustrates the relationships between the various SATP entities, some of which are implied, and the source of authority.
The table is ordered according to an authority hierarchy with the root authority in the first row and leaf entitities on the 6th row.
Authority is therefore cumulative from row to row.
The type of credential used to represent authority is in column 3.</t>
        <table anchor="tbl-satp-entity">
          <name>Mapping SATP Entity to vLEI Role</name>
          <thead>
            <tr>
              <th align="left">#</th>
              <th align="left">SATP Entity</th>
              <th align="left">vLEI Type &amp; Authority Chain</th>
              <th align="left">Credential Type</th>
              <th align="left">Notes</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">1</td>
              <td align="left">Root vLEI Issuer <em>-implied-</em></td>
              <td align="left">GLEIF</td>
              <td align="left">vLEI</td>
              <td align="left">Root namespace authority (e.g., GLEIF)</td>
            </tr>
            <tr>
              <td align="left">2</td>
              <td align="left">Qualified vLEI Issuer <em>-implied-</em></td>
              <td align="left">GLEIF&gt;&gt;QVI</td>
              <td align="left">vLEI</td>
              <td align="left">Inter organizational namespace authority</td>
            </tr>
            <tr>
              <td align="left">3</td>
              <td align="left">Organizational vLEI Issuer <em>-implied-</em></td>
              <td align="left">QVI&gt;&gt;LEID</td>
              <td align="left">vLEI</td>
              <td align="left">Organizational level namespace authority</td>
            </tr>
            <tr>
              <td align="left">4</td>
              <td align="left">Originator, Beneficiary, Gateway Owner</td>
              <td align="left">LEID&gt;&gt;OORA, LEID&gt;&gt;ECRA, LEID&gt;&gt;OORA&gt;&gt;OOR, LEID&gt;&gt;ECRA&gt;&gt;ECR</td>
              <td align="left">vLEI</td>
              <td align="left">Person-in-role credential</td>
            </tr>
            <tr>
              <td align="left">5</td>
              <td align="left">Gateway / Network Operations Manager / Admin <em>-implied-</em></td>
              <td align="left">ECR&gt;&gt;ACDC&gt;&gt;KEL, ECR&gt;&gt;KEL, ECR(as other issuer)&gt;&gt;other</td>
              <td align="left">ACDC, KEL, other</td>
              <td align="left">Operational credentials (not defined by vLEI)</td>
            </tr>
            <tr>
              <td align="left">6</td>
              <td align="left">Sender/Receiver Gateway, Sender/Recipient Network</td>
              <td align="left">n/a</td>
              <td align="left">KEL, other</td>
              <td align="left">Device or system identity</td>
            </tr>
          </tbody>
        </table>
        <ol group="cntr1" spacing="normal" type="Row %d."><li>
            <t>GLEIF is a well-known root authority in the vLEI ecosystem.
The GLEIF AID is public knowledge.</t>
          </li>
          <li>
            <t>Second tier QVI authorities are credentialed by a root authority.
Typically, second tier authorities are inter-organizational issuing credentials to multiple organizational entities.</t>
          </li>
          <li>
            <t>Orgainzational entities use an LEID credential to manage intra-organizational namespaces.</t>
          </li>
          <li>
            <t>SATP stage-1 messages imply the existence of oganization level entities such as Originator, Beneficiary, and Gateway Owners.
vLEI defines two forms of person-in-role credentials that map to these SATP entities.
OOR for organizational officers and ECR for oganizational departments or functions.
SATP use cases likely depend on ECR credentials.
A legal entity may delegate credential issuance by naming an alternate legal entity using OOR Authority (OORA) or ECR Authority (ECRA) delegation credentials.</t>
          </li>
          <li>
            <t>SATP architecture assumes the existence of intra-organizational entities that manage and adminster networks and servers.
vLEI doesn't define such roles and SATP stage-1 messages don't explicitly mention the existence of such entities.
However, the people responsible for administering and managing the systems that implement SATP message exchange have credentials that tie into the organizational accountability framework envisaged by vLEI.
These credentials can be KERI based (e.g., KEL, ACDC) or other (e.g., PKIX).</t>
          </li>
          <li>
            <t>SATP stage-1 messages describe various services and networks that have been credentialed with device or system identities.
These credentials can be KERI based or other.
KERI based credentials reference the key holders AID that is the identity of the gateway or network principal that weilds the corresponding private key.
An PKIX device certificate associates a <em>subject name</em> to the public key of the gateway or network principal that weilds the corresponding private key.
A SATP gateway or network can be a principal that has multiple key management subsystems (e.g., KERI and PKIX).</t>
          </li>
        </ol>
        <section anchor="vlei-deployment-considerations">
          <name>vLEI Deployment Considerations</name>
          <t>SATP deployments could utilize other vLEI roles.
For example, an ECR role might be defined for a SATP Gateway Operations Manager or Network Administrator. See row 4 <xref target="tbl-satp-entity"/>.
Although SATP Stage 1 messages don't directly refer to ECR credentials, the credentials referenced could link to ECR credentials which in turn link to ECRA credentials etc...</t>
          <t><cref anchor="ids-note2" source="Ned Smith">
Note: Need to describe how this draft approaches both top-down and bottom-up protocol binding e.g., http and tls.
</cref></t>
        </section>
      </section>
      <section anchor="key-structures">
        <name>Key Structures</name>
        <t>Keys embedded in hardware or firmware may not easily be converted to an interoperablel format, hence support for multiple key formats ensures the SATP protocols can be implemented by a wide variety of systems.</t>
        <t>The SATP PublicKey messages <bcp14>SHALL</bcp14> be encoded using JSON Web Key (JWK) <xref target="RFC7517"/>, COSE key <xref target="STD96"/>, PKIX key in PEM or DER, or as key events <xref target="KERI-Spec"/>.</t>
        <t>Other key formats <bcp14>SHOULD</bcp14> be allowed but are out of scope for RFCthis.</t>
      </section>
      <section anchor="satp-message-wrapper-schema">
        <name>SATP Message Wrapper Schema</name>
        <t>The following CDDL <xref target="RFC8610"/> defines the wrapper and application to SATP fields.</t>
        <section anchor="sec-stage1">
          <name>SATP Transfer Initiation (Stage 1) Message Binding</name>
          <t>The SATP stage 1 messages containing identifiers use a vLEI wrapper that contains a payload and payload content identifier.
Other stage 1 messages are public key values that use a key wrapper that disambiguates the key type and format or can be expressed as a wrapped vLEI.</t>
          <sourcecode type="cddl"><![CDATA[
satp-message = {
  ? verifiedOriginatorEntityId: wrapped-vlei
  ? verifiedBeneficiaryEntityId: wrapped-vlei
  ? senderGatewayOwnerId: wrapped-vlei
  ? receiverGatewayOwnerId: wrapped-vlei

  ? senderGatewayId: wrapped-vlei
  ? recipientGatewayId: wrapped-vlei
  ? senderGatewayNetworkId: wrapped-vlei
  ? recipientGatewayNetworkId: wrapped-vlei

  ? originatorPubkey: wrapped-vlei / wrapped-key
  ? beneficiaryPubkey: wrapped-vlei / wrapped-key
  ? senderGatewaySignaturePublicKey: wrapped-vlei / wrapped-key
  ? receiverGatewaySignaturePublicKey: wrapped-vlei / wrapped-key
  ? senderGatewayDeviceIdentityPubkey: wrapped-vlei / wrapped-key
  ? receiverGatewayDeviceIdentityPubkey: wrapped-vlei / wrapped-key
}
]]></sourcecode>
        </section>
        <section anchor="sec-vlei-wrapper">
          <name>vLEI Wrapper</name>
          <sourcecode type="cddl"><![CDATA[
; =====================================================================
; --- Wrapped vLEI Payloads ---
; =====================================================================

wrapped-vlei = {
 content: content-ref
 payload: bstr / tstr
}
]]></sourcecode>
        </section>
        <section anchor="sec-content-ref">
          <name>Content References</name>
          <sourcecode type="cddl"><![CDATA[
content-ref = non-empty<{ 
 ? mt: vlei-media-type ; TBA 
 ? cf: uint ; TBA content format id
 ? cbt: bool ; payload contains CBOR tagged content in the TN() range if true, if false not cbor tagged and "mt" is required
 ? oid: tstr ; generated from content-format-id e.g., "1.3.6.1.4.1.37476.2.1.5"
}>
]]></sourcecode>
        </section>
        <section anchor="sec-wrapped-key">
          <name>Key Wrappers</name>
          <sourcecode type="cddl"><![CDATA[
; =====================================================================
; --- Wrapped Key Definitions ---
; =====================================================================

wrapped-key = $key-type
$key-type /= cose-key
$key-type /= jwk-key
$key-type /= pkix-key

cose-key = {
 content: "application/cose;cose-type=cose-key" / uint,
 encoding: "cbor" / "base64uri" / "text",
 payload: bstr / tstr
}

jwk-key = {
  content: "application/jwk+json" / uint,
  payload: tstr
}

pkix-key = {
  content: "application/pkix-cert" / uint,
  encoding: "PEM" / "DER",
  payload: tstr / bstr
}
]]></sourcecode>
        </section>
      </section>
      <section anchor="sec-media-types">
        <name>vLEI Media Types</name>
        <t>vLEI credentials are expressed as Authentic Chained Data Containers (ACDC) <xref target="ACDC-Spec"/>.
Section <xref target="sec-iana"/> request IANA assignment of media types <xref target="STD91"/> and content format identifiers <xref target="RFC7252"/>.</t>
        <t>SATP core <xref target="I-D.ietf-satp-core"/> anticipates JSON encoded message.
vLEI credentials can subsequently be JSON encoded while also being CESR <xref target="CESR-Spec"/> compliant.
CESR defines JSON, CBOR, MSGPK and native CESR variants.
The follwing media types <bcp14>MAY</bcp14> be used when building credential payloads for SATP:</t>
        <table anchor="tbl-cesr-media-types">
          <name>vLEI media types</name>
          <thead>
            <tr>
              <th align="left">Media Types</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">application/cesr+json</td>
            </tr>
            <tr>
              <td align="left">application/cesr+cbor</td>
            </tr>
            <tr>
              <td align="left">application/cesr+msgpk</td>
            </tr>
            <tr>
              <td align="left">application/cesr</td>
            </tr>
          </tbody>
        </table>
        <t>The media types in <xref target="tbl-cesr-media-types"/> have start codes that comply with the media type's structured syntax suffix, but require CESR-aware parsers that can detect them.
The "cesr" subtype informs parsers that they have to do start code look-ahead processing.</t>
        <t>The "cesr" subtype also informs parsers that the CESR stream may contain a variety of objects including ACDCs, AIDs, and SAIDs (as mentioned in previous sections of RFCthis).</t>
        <section anchor="profile-optonal-parameter">
          <name>Profile Optonal Parameter</name>
          <t>The media type assignments have an optional parameter named "profile=" that <bcp14>MAY</bcp14> be any value.
It can be used to identify a vLEI profile such as vLEI credential type.
It <bcp14>SHOULD</bcp14> be expressed in URI format as illustrated in <xref target="tbl-vlei-profiles"/>.</t>
          <table anchor="tbl-vlei-profiles">
            <name>vLEI profiles</name>
            <thead>
              <tr>
                <th align="left">Profile name</th>
                <th align="left">Profile ID</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">QualifiedvLEIIssuervLEICredential (QVI)</td>
                <td align="left">profile=urn:vlei:qvi</td>
              </tr>
              <tr>
                <td align="left">LegalEntityvLEICredential (LEID)</td>
                <td align="left">profile=urn:vlei:leid</td>
              </tr>
              <tr>
                <td align="left">ECRAuthorizationvLEICredential (ECRA)</td>
                <td align="left">profile=urn:vlei:ecra</td>
              </tr>
              <tr>
                <td align="left">LegalEntityEngagementContextRolevLEICredential (ECR)</td>
                <td align="left">profile=urn:vlei:ecr</td>
              </tr>
              <tr>
                <td align="left">OORAuthorizationvLEICredential (OORA)</td>
                <td align="left">profile=urn:vlei:oora</td>
              </tr>
              <tr>
                <td align="left">LegalEntityOfficialOrganizationalRolevLEICredential (OOR)</td>
                <td align="left">profile=urn:vlei:oor</td>
              </tr>
            </tbody>
          </table>
          <t>The various vLEI credential types can be specified in a media type using the profile option.
<xref target="tbl-vlei-profiles"/> summarizes the profile identifiers for the various vLEI credential types.
A comprehensive listing of vLEI profiles is provided even though some of the vLEI credential types are not anticipated by the vLEI binding to SATP at this time.</t>
        </section>
        <section anchor="encoding-optonal-parameter">
          <name>Encoding Optonal Parameter</name>
          <t>The media type assignments have an optional encoding ("encoding=") parameter that can be used to tunnel an alternative encoding.
Typically, encodings fall into two broad categories; text or binary.
An encoding <bcp14>MAY</bcp14> be any value, but RFCthis anticipates the following:</t>
          <ul spacing="normal">
            <li>
              <t>"base64uri" -- the payload is binary, as indicated by the media-type, but base64 encoded when the bounding protocol is a text stream. See Section 5, <xref target="RFC4648"/>.</t>
            </li>
          </ul>
        </section>
        <section anchor="charset-optonal-parameter">
          <name>Charset Optonal Parameter</name>
          <t>The media type assignments have an optional character set ("charset=") parameter that can be used to identify the character encoding scheme when the payload is a text encoding.
By default "utf-8" is assumed.
Alternative character set encodings <bcp14>MUST</bcp14> populate "charset=".</t>
        </section>
      </section>
    </section>
    <section anchor="sec-verify">
      <name>Verification of vLEI Payloads</name>
      <t>TODO</t>
    </section>
    <section anchor="implementation-status">
      <name>Implementation Status</name>
      <t>TODO</t>
    </section>
    <section anchor="sec-sec">
      <name>Security Considerations</name>
      <t>The following security properties are assumed for all payloads identified by media types defined in RFCthis:</t>
      <ul spacing="normal">
        <li>
          <t>ACDC payloads are cryptographically signed.</t>
        </li>
        <li>
          <t>CESR payloads are cryptographically signed and self-framing.</t>
        </li>
        <li>
          <t>Signature verification is required to ensure authenticity and integrity.</t>
        </li>
        <li>
          <t>Credential provenance must be anchored to a trusted root.
For example, the GLEIF Root AID via ACDC edges (see <xref target="GLEIF-vLEI-EGF"/>).</t>
        </li>
        <li>
          <t>vLEIs must be validated against the vLEI schema. See <xref target="GLEIF-vLEI-Part3"/>.</t>
        </li>
      </ul>
    </section>
    <section anchor="sec-iana">
      <name>IANA Considerations</name>
      <section anchor="media-type-assignment">
        <name>Media Type Assignment</name>
        <t>IANA is requested to add the following media types to the "Media Types"
registry <xref target="IANA.media-types"/>.</t>
        <section anchor="applicationcesrjson">
          <name>application/cesr+json</name>
          <t>This media type indicates the payload is a JSON formatted vLEI.</t>
          <t><em>Type name:</em></t>
          <ul spacing="normal">
            <li>
              <t>application</t>
            </li>
          </ul>
          <t><em>Subtype name:</em></t>
          <ul spacing="normal">
            <li>
              <t>cesr+json</t>
            </li>
          </ul>
          <t><em>Required parameters:</em></t>
          <ul spacing="normal">
            <li>
              <t>None</t>
            </li>
          </ul>
          <t><em>Optional parameters:</em></t>
          <ul spacing="normal">
            <li>
              <t><tt>profile</tt> — Indicates the payload conforms to a specific vLEI credential type.</t>
            </li>
            <li>
              <t><tt>encoding</tt> — Indicates the ACDC stream is text or binary.
If binary, encoding <bcp14>MUST</bcp14> make the payload text-safe (e.g., <tt>encoding=base64uri</tt>).
Defaults to <tt>text</tt>.</t>
            </li>
            <li>
              <t><tt>charset</tt> — Indicates character set for text encodings.
Defaults to UTF-8.</t>
            </li>
          </ul>
          <t><em>Encoding considerations:</em></t>
          <ul spacing="normal">
            <li>
              <t>8-bit; JSON text encoding defaults to UTF-8.</t>
            </li>
            <li>
              <t>Binary payloads are text-safe encoded for use in JSON streams.</t>
            </li>
          </ul>
          <t><em>Security considerations:</em></t>
          <ul spacing="normal">
            <li>
              <t>See <xref target="sec-sec"/>.</t>
            </li>
          </ul>
          <t><em>Interoperability considerations:</em></t>
          <ul spacing="normal">
            <li>
              <t>Binary payloads must be base64 encoded to make payloads compatible with text streams.</t>
            </li>
            <li>
              <t>Section 9.4 and 9.5 in the CESR specification (cold start) in CESR</t>
            </li>
            <li>
              <t>Section 11.5 Version String Field in CESR</t>
            </li>
          </ul>
          <t><em>Published specification:</em></t>
          <ul spacing="normal">
            <li>
              <t>RFCthis</t>
            </li>
            <li>
              <t>Key Event Receipt Infrastructure (KERI) — <xref target="KERI-Spec"/></t>
            </li>
            <li>
              <t>Authentictic Chained Data Containers (ACDC) — <xref target="ACDC-Spec"/></t>
            </li>
            <li>
              <t>Composable Event Streaming Representation (CESR) — <xref target="CESR-Spec"/></t>
            </li>
            <li>
              <t>GLEIF vLEI Credential Schema Registry — <xref target="GLEIF-vLEI-Part3"/></t>
            </li>
          </ul>
          <t><em>Applications that use this media type:</em></t>
          <ul spacing="normal">
            <li>
              <t>GLEIF vLEI issuance and verification systems.</t>
            </li>
            <li>
              <t>SATP-compliant credential exchange platforms.</t>
            </li>
            <li>
              <t>Forensic credential chaining and audit systems.</t>
            </li>
          </ul>
          <t><em>Fragment identifier considerations:</em></t>
          <ul spacing="normal">
            <li>
              <t>None</t>
            </li>
          </ul>
          <t><em>Additional information:</em></t>
          <ul spacing="normal">
            <li>
              <t><em>Magic number(s):</em> None</t>
            </li>
            <li>
              <t><em>File extension(s):</em> <tt>.acdcjson</tt></t>
            </li>
            <li>
              <t><em>Macintosh file type code(s):</em> None</t>
            </li>
          </ul>
          <t><em>Person &amp; email address to contact for further information:</em></t>
          <ul spacing="normal">
            <li>
              <t>N. Smith <eref target="mailto:ned.smith.ietf@outlook.com">ned.smith.ietf@outlook.com</eref></t>
            </li>
            <li>
              <t>GLEIF IT Team <eref target="mailto:vlei-support@gleif.org">vlei-support@gleif.org</eref></t>
            </li>
          </ul>
          <t><em>Intended usage:</em></t>
          <ul spacing="normal">
            <li>
              <t>COMMON</t>
            </li>
          </ul>
          <t><em>Author:</em></t>
          <ul spacing="normal">
            <li>
              <t>N. Smith <eref target="mailto:ned.smith.ietf@outlook.com">ned.smith.ietf@outlook.com</eref></t>
            </li>
            <li>
              <t>GLEIF IT Team <eref target="mailto:vlei-support@gleif.org">vlei-support@gleif.org</eref></t>
            </li>
          </ul>
          <t><em>Change controller:</em></t>
          <ul spacing="normal">
            <li>
              <t>IETF / GLEIF</t>
            </li>
          </ul>
        </section>
        <section anchor="applicationcesrcbor">
          <name>application/cesr+cbor</name>
          <t><em>Type name:</em></t>
          <ul spacing="normal">
            <li>
              <t>application</t>
            </li>
          </ul>
          <t><em>Subtype name:</em></t>
          <ul spacing="normal">
            <li>
              <t>cesr+cbor</t>
            </li>
          </ul>
          <t><em>Required parameters:</em></t>
          <ul spacing="normal">
            <li>
              <t>None</t>
            </li>
          </ul>
          <t><em>Optional parameters:</em></t>
          <ul spacing="normal">
            <li>
              <t><tt>profile</tt> — Indicates the payload conforms to a specific vLEI credential type.</t>
            </li>
            <li>
              <t><tt>encoding</tt> — Indicates the ACDC stream is text or binary.
Defaults to <tt>cbor</tt>.</t>
            </li>
            <li>
              <t><tt>charset</tt> — Indicates character set for text encodings.
Defaults to UTF-8.</t>
            </li>
          </ul>
          <t><em>Encoding considerations:</em></t>
          <ul spacing="normal">
            <li>
              <t>ACDC streams are CBOR encoded for use with binary transports.
If the transport is a text stream the <tt>encoding</tt> option should be specified.</t>
            </li>
          </ul>
          <t><em>Security considerations:</em></t>
          <ul spacing="normal">
            <li>
              <t>See <xref target="sec-sec"/>.</t>
            </li>
          </ul>
          <t><em>Interoperability considerations:</em></t>
          <t>None.</t>
          <t><em>Published specification:</em></t>
          <ul spacing="normal">
            <li>
              <t>RFCthis</t>
            </li>
            <li>
              <t>Key Event Receipt Infrastructure (KERI) — <xref target="KERI-Spec"/></t>
            </li>
            <li>
              <t>Authentictic Chained Data Containers (ACDC) — <xref target="ACDC-Spec"/></t>
            </li>
            <li>
              <t>Composable Event Streaming Representation (CESR) — <xref target="CESR-Spec"/></t>
            </li>
            <li>
              <t>GLEIF vLEI Credential Schema Registry — <xref target="GLEIF-vLEI-Part3"/></t>
            </li>
          </ul>
          <t><em>Applications that use this media type:</em></t>
          <ul spacing="normal">
            <li>
              <t>GLEIF vLEI issuance and verification systems</t>
            </li>
            <li>
              <t>SATP-compliant credential exchange platforms</t>
            </li>
            <li>
              <t>Forensic credential chaining and audit systems</t>
            </li>
          </ul>
          <t><em>Fragment identifier considerations:</em></t>
          <ul spacing="normal">
            <li>
              <t>None</t>
            </li>
          </ul>
          <t><em>Additional information:</em></t>
          <ul spacing="normal">
            <li>
              <t>Magic number(s): None</t>
            </li>
            <li>
              <t>File extension(s): <tt>.acdcbor</tt></t>
            </li>
            <li>
              <t>Macintosh file type code(s): None</t>
            </li>
          </ul>
          <t><em>Person &amp; email address to contact for further information:</em></t>
          <ul spacing="normal">
            <li>
              <t>N. Smith <eref target="mailto:ned.smith.ietf@outlook.com">ned.smith.ietf@outlook.com</eref></t>
            </li>
            <li>
              <t>GLEIF IT Team <eref target="mailto:vlei-support@gleif.org">vlei-support@gleif.org</eref></t>
            </li>
          </ul>
          <t><em>Intended usage:</em></t>
          <ul spacing="normal">
            <li>
              <t>COMMON</t>
            </li>
          </ul>
          <t><em>Author:</em></t>
          <ul spacing="normal">
            <li>
              <t>N. Smith <eref target="mailto:ned.smith.ietf@outlook.com">ned.smith.ietf@outlook.com</eref></t>
            </li>
            <li>
              <t>GLEIF IT Team <eref target="mailto:vlei-support@gleif.org">vlei-support@gleif.org</eref></t>
            </li>
          </ul>
          <t><em>Change controller:</em></t>
          <ul spacing="normal">
            <li>
              <t>IETF / GLEIF</t>
            </li>
          </ul>
        </section>
        <section anchor="applicationcesrmsgpk">
          <name>application/cesr+msgpk</name>
          <t><em>Type name:</em></t>
          <ul spacing="normal">
            <li>
              <t>application</t>
            </li>
          </ul>
          <t><em>Subtype name:</em></t>
          <ul spacing="normal">
            <li>
              <t>cesr+msgpk</t>
            </li>
          </ul>
          <t><em>Required parameters:</em></t>
          <ul spacing="normal">
            <li>
              <t>None</t>
            </li>
          </ul>
          <t><em>Optional parameters:</em></t>
          <ul spacing="normal">
            <li>
              <t><tt>profile</tt> — Indicates the payload conforms to a specific vLEI credential type.</t>
            </li>
            <li>
              <t><tt>encoding</tt> — Indicates the ACDC stream is text or binary.
Defaults to <tt>msgpk</tt>.</t>
            </li>
            <li>
              <t><tt>charset</tt> — Indicates character set for text encodings.
Defaults to UTF-8.</t>
            </li>
          </ul>
          <t><em>Encoding considerations:</em></t>
          <ul spacing="normal">
            <li>
              <t>ACDC streams are MSGPK encoded for use with binary transports.
If the transport is a text stream the <tt>encoding</tt> option should be specified.</t>
            </li>
          </ul>
          <t><em>Security considerations:</em></t>
          <ul spacing="normal">
            <li>
              <t>See <xref target="sec-sec"/>.</t>
            </li>
          </ul>
          <t><em>Interoperability considerations:</em></t>
          <t>None.</t>
          <t><em>Published specification:</em></t>
          <ul spacing="normal">
            <li>
              <t>RFCthis</t>
            </li>
            <li>
              <t>Key Event Receipt Infrastructure (KERI) — <xref target="KERI-Spec"/></t>
            </li>
            <li>
              <t>Authentictic Chained Data Containers (ACDC) — <xref target="ACDC-Spec"/></t>
            </li>
            <li>
              <t>Composable Event Streaming Representation (CESR) — <xref target="CESR-Spec"/></t>
            </li>
            <li>
              <t>GLEIF vLEI Credential Schema Registry — <xref target="GLEIF-vLEI-Part3"/></t>
            </li>
          </ul>
          <t><em>Applications that use this media type:</em></t>
          <ul spacing="normal">
            <li>
              <t>GLEIF vLEI issuance and verification systems</t>
            </li>
            <li>
              <t>SATP-compliant credential exchange platforms</t>
            </li>
            <li>
              <t>Forensic credential chaining and audit systems</t>
            </li>
          </ul>
          <t><em>Fragment identifier considerations:</em></t>
          <ul spacing="normal">
            <li>
              <t>None</t>
            </li>
          </ul>
          <t><em>Additional information:</em></t>
          <ul spacing="normal">
            <li>
              <t>Magic number(s): None</t>
            </li>
            <li>
              <t>File extension(s): <tt>.acdcmsgpk</tt></t>
            </li>
            <li>
              <t>Macintosh file type code(s): None</t>
            </li>
          </ul>
          <t><em>Person &amp; email address to contact for further information:</em></t>
          <ul spacing="normal">
            <li>
              <t>N. Smith <eref target="mailto:ned.smith.ietf@outlook.com">ned.smith.ietf@outlook.com</eref></t>
            </li>
            <li>
              <t>GLEIF IT Team <eref target="mailto:vlei-support@gleif.org">vlei-support@gleif.org</eref></t>
            </li>
          </ul>
          <t><em>Intended usage:</em></t>
          <ul spacing="normal">
            <li>
              <t>COMMON</t>
            </li>
          </ul>
          <t><em>Author:</em></t>
          <ul spacing="normal">
            <li>
              <t>N. Smith <eref target="mailto:ned.smith.ietf@outlook.com">ned.smith.ietf@outlook.com</eref></t>
            </li>
            <li>
              <t>GLEIF IT Team <eref target="mailto:vlei-support@gleif.org">vlei-support@gleif.org</eref></t>
            </li>
          </ul>
          <t><em>Change controller:</em></t>
          <ul spacing="normal">
            <li>
              <t>IETF / GLEIF</t>
            </li>
          </ul>
        </section>
        <section anchor="applicationcesr">
          <name>application/cesr</name>
          <t><em>Type name:</em></t>
          <ul spacing="normal">
            <li>
              <t>application</t>
            </li>
          </ul>
          <t><em>Subtype name:</em></t>
          <ul spacing="normal">
            <li>
              <t>cesr</t>
            </li>
          </ul>
          <t><em>Required parameters:</em></t>
          <ul spacing="normal">
            <li>
              <t>None</t>
            </li>
          </ul>
          <t><em>Optional parameters:</em></t>
          <ul spacing="normal">
            <li>
              <t><tt>profile</tt> — Indicates the payload conforms to a specific vLEI credential type.</t>
            </li>
            <li>
              <t><tt>encoding</tt> — Indicates the CESR stream is text or binary.
Defaults to <tt>text</tt>.
<tt>encoding=binary</tt> indicates the CESR stream is binary encoded.</t>
            </li>
            <li>
              <t><tt>charset</tt> — Indicates character set for text encodings.
Defaults to UTF-8.</t>
            </li>
          </ul>
          <t><em>Encoding considerations:</em></t>
          <ul spacing="normal">
            <li>
              <t>CESR defaults to UTF-8 text encoding and is self-framing.</t>
            </li>
            <li>
              <t>CESR can also be a binary stream.
When used in binary mode the <tt>encoding</tt> option <bcp14>MUST</bcp14> be specified (e.g., <tt>encoding=binary</tt>).</t>
            </li>
          </ul>
          <t><em>Security considerations:</em></t>
          <ul spacing="normal">
            <li>
              <t>See <xref target="sec-iana"/>.</t>
            </li>
          </ul>
          <t><em>Interoperability considerations:</em></t>
          <t>None.</t>
          <t><em>Published specification:</em></t>
          <ul spacing="normal">
            <li>
              <t>RFCthis</t>
            </li>
            <li>
              <t>Key Event Receipt Infrastructure (KERI) — <xref target="KERI-Spec"/></t>
            </li>
            <li>
              <t>Authentictic Chained Data Containers (ACDC) — <xref target="ACDC-Spec"/></t>
            </li>
            <li>
              <t>Composable Event Streaming Representation (CESR) — <xref target="CESR-Spec"/></t>
            </li>
            <li>
              <t>GLEIF vLEI Credential Schema Registry — <xref target="GLEIF-vLEI-Part3"/></t>
            </li>
          </ul>
          <t><em>Applications that use this media type:</em></t>
          <ul spacing="normal">
            <li>
              <t>GLEIF vLEI issuance and verification systems</t>
            </li>
            <li>
              <t>SATP-compliant credential exchange platforms</t>
            </li>
            <li>
              <t>Forensic credential chaining and audit systems</t>
            </li>
          </ul>
          <t><em>Fragment identifier considerations:</em></t>
          <ul spacing="normal">
            <li>
              <t>None</t>
            </li>
          </ul>
          <t><em>Additional information:</em></t>
          <ul spacing="normal">
            <li>
              <t>Magic number(s): None</t>
            </li>
            <li>
              <t>File extension(s): <tt>.acdccesr</tt></t>
            </li>
            <li>
              <t>Macintosh file type code(s): None</t>
            </li>
          </ul>
          <t><em>Person &amp; email address to contact for further information:</em></t>
          <ul spacing="normal">
            <li>
              <t>N. Smith <eref target="mailto:ned.smith.ietf@outlook.com">ned.smith.ietf@outlook.com</eref></t>
            </li>
            <li>
              <t>GLEIF IT Team <eref target="mailto:vlei-support@gleif.org">vlei-support@gleif.org</eref></t>
            </li>
          </ul>
          <t><em>Intended usage:</em></t>
          <ul spacing="normal">
            <li>
              <t>COMMON</t>
            </li>
          </ul>
          <t><em>Author:</em></t>
          <ul spacing="normal">
            <li>
              <t>N. Smith <eref target="mailto:ned.smith.ietf@outlook.com">ned.smith.ietf@outlook.com</eref></t>
            </li>
            <li>
              <t>GLEIF IT Team <eref target="mailto:vlei-support@gleif.org">vlei-support@gleif.org</eref></t>
            </li>
          </ul>
          <t><em>Change controller:</em></t>
          <ul spacing="normal">
            <li>
              <t>IETF / GLEIF</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="coap-content-format-id-assignments">
        <name>CoAP Content-Format ID Assignments</name>
        <t>IANA is requested to assign the following Content-Format numbers in the
"CoAP Content-Formats" sub-registry, within the "Constrained RESTful
Environments (CoRE) Parameters" Registry <xref target="IANA.core-parameters"/>:</t>
        <table align="left">
          <name>New Content-Formats</name>
          <thead>
            <tr>
              <th align="left">Content-Type</th>
              <th align="left">Content Coding</th>
              <th align="left">ID</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">application/cesr+json</td>
              <td align="left">-</td>
              <td align="left">TBA1</td>
              <td align="left">RFCthis</td>
            </tr>
            <tr>
              <td align="left">application/cesr+cbor</td>
              <td align="left">-</td>
              <td align="left">TBD2</td>
              <td align="left">RFCthis</td>
            </tr>
            <tr>
              <td align="left">application/cesr+msgpk</td>
              <td align="left">-</td>
              <td align="left">TBD3</td>
              <td align="left">RFCthis</td>
            </tr>
            <tr>
              <td align="left">application/cesr</td>
              <td align="left">-</td>
              <td align="left">TBD4</td>
              <td align="left">RFCthis</td>
            </tr>
            <tr>
              <td align="left">application/cesr+json;profile=urn:vlei:leid</td>
              <td align="left">-</td>
              <td align="left">TBA10</td>
              <td align="left">RFCthis</td>
            </tr>
            <tr>
              <td align="left">application/cesr+json;profile=urn:vlei:ecr</td>
              <td align="left">-</td>
              <td align="left">TBA11</td>
              <td align="left">RFCthis</td>
            </tr>
            <tr>
              <td align="left">application/cesr+json;profile=urn:vlei:oor</td>
              <td align="left">-</td>
              <td align="left">TBA12</td>
              <td align="left">RFCthis</td>
            </tr>
            <tr>
              <td align="left">application/cesr+json;profile=urn:vlei:oora</td>
              <td align="left">-</td>
              <td align="left">TBA13</td>
              <td align="left">RFCthis</td>
            </tr>
            <tr>
              <td align="left">application/cesr+json;profile=urn:vlei:qvi</td>
              <td align="left">-</td>
              <td align="left">TBA14</td>
              <td align="left">RFCthis</td>
            </tr>
            <tr>
              <td align="left">application/cesr+json;profile=urn:vlei:ecra</td>
              <td align="left">-</td>
              <td align="left">TBA15</td>
              <td align="left">RFCthis</td>
            </tr>
            <tr>
              <td align="left">application/cesr+cbor;profile=urn:vlei:leid</td>
              <td align="left">-</td>
              <td align="left">TBA20</td>
              <td align="left">RFCthis</td>
            </tr>
            <tr>
              <td align="left">application/cesr+cbor;profile=urn:vlei:ecr</td>
              <td align="left">-</td>
              <td align="left">TBA21</td>
              <td align="left">RFCthis</td>
            </tr>
            <tr>
              <td align="left">application/cesr+cbor;profile=urn:vlei:oor</td>
              <td align="left">-</td>
              <td align="left">TBA22</td>
              <td align="left">RFCthis</td>
            </tr>
            <tr>
              <td align="left">application/cesr+cbor;profile=urn:vlei:oora</td>
              <td align="left">-</td>
              <td align="left">TBA23</td>
              <td align="left">RFCthis</td>
            </tr>
            <tr>
              <td align="left">application/cesr+cbor;profile=urn:vlei:qvi</td>
              <td align="left">-</td>
              <td align="left">TBA24</td>
              <td align="left">RFCthis</td>
            </tr>
            <tr>
              <td align="left">application/cesr+cbor;profile=urn:vlei:ecra</td>
              <td align="left">-</td>
              <td align="left">TBA25</td>
              <td align="left">RFCthis</td>
            </tr>
            <tr>
              <td align="left">application/cesr+msgpk;profile=urn:vlei:leid</td>
              <td align="left">-</td>
              <td align="left">TBA30</td>
              <td align="left">RFCthis</td>
            </tr>
            <tr>
              <td align="left">application/cesr+msgpk;profile=urn:vlei:ecr</td>
              <td align="left">-</td>
              <td align="left">TBA31</td>
              <td align="left">RFCthis</td>
            </tr>
            <tr>
              <td align="left">application/cesr+msgpk;profile=urn:vlei:oor</td>
              <td align="left">-</td>
              <td align="left">TBA32</td>
              <td align="left">RFCthis</td>
            </tr>
            <tr>
              <td align="left">application/cesr+msgpk;profile=urn:vlei:oora</td>
              <td align="left">-</td>
              <td align="left">TBA33</td>
              <td align="left">RFCthis</td>
            </tr>
            <tr>
              <td align="left">application/cesr+msgpk;profile=urn:vlei:qvi</td>
              <td align="left">-</td>
              <td align="left">TBA34</td>
              <td align="left">RFCthis</td>
            </tr>
            <tr>
              <td align="left">application/cesr+msgpk;profile=urn:vlei:ecra</td>
              <td align="left">-</td>
              <td align="left">TBA35</td>
              <td align="left">RFCthis</td>
            </tr>
            <tr>
              <td align="left">application/cesr;profile=urn:vlei:leid</td>
              <td align="left">-</td>
              <td align="left">TBA40</td>
              <td align="left">RFCthis</td>
            </tr>
            <tr>
              <td align="left">application/cesr;profile=urn:vlei:ecr</td>
              <td align="left">-</td>
              <td align="left">TBA41</td>
              <td align="left">RFCthis</td>
            </tr>
            <tr>
              <td align="left">application/cesr;profile=urn:vlei:oor</td>
              <td align="left">-</td>
              <td align="left">TBA42</td>
              <td align="left">RFCthis</td>
            </tr>
            <tr>
              <td align="left">application/cesr;profile=urn:vlei:oora</td>
              <td align="left">-</td>
              <td align="left">TBA43</td>
              <td align="left">RFCthis</td>
            </tr>
            <tr>
              <td align="left">application/cesr;profile=urn:vlei:qvi</td>
              <td align="left">-</td>
              <td align="left">TBA44</td>
              <td align="left">RFCthis</td>
            </tr>
            <tr>
              <td align="left">application/cesr;profile=urn:vlei:ecra</td>
              <td align="left">-</td>
              <td align="left">TBA45</td>
              <td align="left">RFCthis</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="REQ-LEVEL">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="I-D.ietf-satp-core">
          <front>
            <title>Secure Asset Transfer Protocol (SATP) Core</title>
            <author fullname="Martin Hargreaves" initials="M." surname="Hargreaves">
              <organization>Quant Network</organization>
            </author>
            <author fullname="Thomas Hardjono" initials="T." surname="Hardjono">
              <organization>MIT</organization>
            </author>
            <author fullname="Rafael Belchior" initials="R." surname="Belchior">
         </author>
            <author fullname="Venkatraman Ramakrishna" initials="V." surname="Ramakrishna">
              <organization>IBM</organization>
            </author>
            <author fullname="Alexandru Chiriac" initials="A." surname="Chiriac">
              <organization>Quant Network</organization>
            </author>
            <date day="7" month="August" year="2025"/>
            <abstract>
              <t>   This memo describes the Secure Asset Transfer (SAT) Protocol for
   digital assets.  SAT is a protocol operating between two gateways
   that conducts the transfer of a digital asset from one gateway to
   another, each representing their corresponding digital asset
   networks.  The protocol establishes a secure channel between the
   endpoints and implements a 2-phase commit (2PC) to ensure the
   properties of transfer atomicity, consistency, isolation and
   durability.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-satp-core-11"/>
        </reference>
        <reference anchor="RFC7159">
          <front>
            <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
            <date month="March" year="2014"/>
            <abstract>
              <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format. It was derived from the ECMAScript Programming Language Standard. JSON defines a small set of formatting rules for the portable representation of structured data.</t>
              <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7159"/>
          <seriesInfo name="DOI" value="10.17487/RFC7159"/>
        </reference>
        <reference anchor="RFC7517">
          <front>
            <title>JSON Web Key (JWK)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>A JSON Web Key (JWK) is a JavaScript Object Notation (JSON) data structure that represents a cryptographic key. This specification also defines a JWK Set JSON data structure that represents a set of JWKs. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and IANA registries established by that specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7517"/>
          <seriesInfo name="DOI" value="10.17487/RFC7517"/>
        </reference>
        <reference anchor="RFC2585">
          <front>
            <title>Internet X.509 Public Key Infrastructure Operational Protocols: FTP and HTTP</title>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="May" year="1999"/>
            <abstract>
              <t>The protocol conventions described in this document satisfy some of the operational requirements of the Internet Public Key Infrastructure (PKI). This document specifies the conventions for using the File Transfer Protocol (FTP) and the Hypertext Transfer Protocol (HTTP) to obtain certificates and certificate revocation lists (CRLs) from PKI repositories. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2585"/>
          <seriesInfo name="DOI" value="10.17487/RFC2585"/>
        </reference>
        <reference anchor="RFC4648">
          <front>
            <title>The Base16, Base32, and Base64 Data Encodings</title>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
            <date month="October" year="2006"/>
            <abstract>
              <t>This document describes the commonly used base 64, base 32, and base 16 encoding schemes. It also discusses the use of line-feeds in encoded data, use of padding in encoded data, use of non-alphabet characters in encoded data, use of different encoding alphabets, and canonical encodings. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4648"/>
          <seriesInfo name="DOI" value="10.17487/RFC4648"/>
        </reference>
        <reference anchor="STD96">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
              <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="96"/>
          <seriesInfo name="RFC" value="9052"/>
          <seriesInfo name="DOI" value="10.17487/RFC9052"/>
        </reference>
        <reference anchor="STD91">
          <front>
            <title>Media Type Specifications and Registration Procedures</title>
            <author fullname="N. Freed" initials="N." surname="Freed"/>
            <author fullname="J. Klensin" initials="J." surname="Klensin"/>
            <author fullname="T. Hansen" initials="T." surname="Hansen"/>
            <date month="January" year="2013"/>
            <abstract>
              <t>This document defines procedures for the specification and registration of media types for use in HTTP, MIME, and other Internet protocols. This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="13"/>
          <seriesInfo name="RFC" value="6838"/>
          <seriesInfo name="DOI" value="10.17487/RFC6838"/>
        </reference>
        <reference anchor="RFC7252">
          <front>
            <title>The Constrained Application Protocol (CoAP)</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s. The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
              <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types. CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7252"/>
          <seriesInfo name="DOI" value="10.17487/RFC7252"/>
        </reference>
        <reference anchor="RFC8610">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="C. Vigano" initials="C." surname="Vigano"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8610"/>
          <seriesInfo name="DOI" value="10.17487/RFC8610"/>
        </reference>
        <reference anchor="GLEIF-vLEI-Part1" target="https://www.gleif.org/organizational-identity/introducing-the-verifiable-lei-vlei/introducing-the-vlei-ecosystem-governance-framework/2025-04-16_vlei-egf-v3.0-technical-requirements-part-1-keri-infrastructure-2024_v1.3_final.pdf">
          <front>
            <title>Technical Requirements Part 1: KERI Infrastructure</title>
            <author>
              <organization>Global Legal Entity Identifier Foundation</organization>
            </author>
            <date year="2025" month="April" day="16"/>
          </front>
          <seriesInfo name="GLEIF" value="vLEI-EGF-TechReq-Part1-v1.3"/>
        </reference>
        <reference anchor="GLEIF-vLEI-Part2" target="https://www.gleif.org/media/pages/organizational-identity/introducing-the-verifiable-lei-vlei/introducing-the-vlei-ecosystem-governance-framework/7040021178-1759312105/2023-12-15_vlei-egf-v3.0-technical-requirements-part-2-vlei-credentials_v1.1-final.pdf">
          <front>
            <title>Technical Requirements Part 2: vLEI Credentials</title>
            <author>
              <organization>Global Legal Entity Identifier Foundation</organization>
            </author>
            <date year="2023" month="December" day="15"/>
          </front>
          <seriesInfo name="GLEIF" value="vLEI-EGF-TechReq-Part2-v1.1"/>
        </reference>
        <reference anchor="GLEIF-vLEI-Part3" target="https://www.gleif.org/media/pages/organizational-identity/introducing-the-verifiable-lei-vlei/introducing-the-vlei-ecosystem-governance-framework/7040021178-1759312105/2023-12-15_vlei-egf-v3.0-technical-requirements-part-2-vlei-credentials_v1.1-final.pdf">
          <front>
            <title>Technical Requirements Part 3: vLEI Credential Schema Registry</title>
            <author>
              <organization>Global Legal Entity Identifier Foundation</organization>
            </author>
            <date year="2023" month="December" day="15"/>
          </front>
          <seriesInfo name="GLEIF" value="vLEI-EGF-TechReq-Part3-v1.1"/>
        </reference>
        <reference anchor="ISO17442-3" target="https://www.iso.org/standard/85628.html">
          <front>
            <title>Financial services — Legal entity identifier (LEI) — Part 3: Verifiable LEIs (vLEIs)</title>
            <author>
              <organization>International Organization for Standardization</organization>
            </author>
            <date year="2024"/>
          </front>
          <seriesInfo name="ISO" value="17442-3:2024"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="IANA.media-types" target="https://www.iana.org/assignments/media-types">
          <front>
            <title>Media Types</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="IANA.core-parameters" target="https://www.iana.org/assignments/core-parameters">
          <front>
            <title>Constrained RESTful Environments (CoRE) Parameters</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.ietf-satp-architecture">
          <front>
            <title>Secure Asset Transfer (SAT) Interoperability Architecture</title>
            <author fullname="Thomas Hardjono" initials="T." surname="Hardjono">
              <organization>MIT</organization>
            </author>
            <author fullname="Martin Hargreaves" initials="M." surname="Hargreaves">
              <organization>Quant Network</organization>
            </author>
            <author fullname="Ned Smith" initials="N." surname="Smith">
              <organization>Intel</organization>
            </author>
            <author fullname="Venkatraman Ramakrishna" initials="V." surname="Ramakrishna">
              <organization>IBM</organization>
            </author>
            <date day="31" month="July" year="2025"/>
            <abstract>
              <t>   This document proposes an interoperability architecture for the
   secure transfer of assets between two networks or systems based on
   the gateway model.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-satp-architecture-08"/>
        </reference>
        <reference anchor="ISO17442-1" target="https://www.iso.org/standard/59771.html">
          <front>
            <title>Financial services — Legal entity identifier (LEI) — Part 1: Assignment</title>
            <author>
              <organization>International Organization for Standardization</organization>
            </author>
            <date year="2020"/>
          </front>
          <seriesInfo name="ISO" value="17442-1:2020"/>
        </reference>
        <reference anchor="KERI-Spec" target="https://trustoverip.github.io/tswg-keri-specification/">
          <front>
            <title>Key Event Receipt Infrastructure (KERI) Specification, v0.9, Draft</title>
            <author>
              <organization>Trust Over IP Foundation</organization>
            </author>
            <date year="2023"/>
          </front>
          <seriesInfo name="TOIP" value="TSWG-KERI-2023"/>
        </reference>
        <reference anchor="KERI-glossary" target="https://trustoverip.github.io/kerisuite-glossary/">
          <front>
            <title>KERI Suite Glossary, Draft 01</title>
            <author>
              <organization>Trust Over IP Foundation</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="ACDC-Spec" target="https://trustoverip.github.io/tswg-acdc-specification">
          <front>
            <title>Authentic Chained Data Containers (ACDC) Specification, v0.9, Draft</title>
            <author>
              <organization>Trust Over IP Foundation</organization>
            </author>
            <date year="2023"/>
          </front>
          <seriesInfo name="TOIP" value="TSWG-ACDC-2023"/>
        </reference>
        <reference anchor="CESR-Spec" target="https://trustoverip.github.io/tswg-cesr-specification/">
          <front>
            <title>Composable Event Streaming Representation (CESR) Proof Format Specification, v0.9, Draft</title>
            <author>
              <organization>Trust Over IP Foundation</organization>
            </author>
            <date year="2023"/>
          </front>
          <seriesInfo name="TOIP" value="TSWG-CESR-2023"/>
        </reference>
        <reference anchor="GLEIF-vLEI-EGF" target="https://www.gleif.org/en/vlei/introducing-the-vlei-ecosystem-governance-framework">
          <front>
            <title>Verifiable LEI (vLEI) Ecosystem Governance Framework v3.0: Primary and Controlled Documents</title>
            <author>
              <organization>Global Legal Entity Identifier Foundation</organization>
            </author>
            <date year="2025" month="April" day="16"/>
          </front>
          <seriesInfo name="GLEIF" value="vLEI-EGF-v3.0"/>
        </reference>
        <reference anchor="vLEI-glossary" target="https://www.gleif.org/organizational-identity/introducing-the-verifiable-lei-vlei/introducing-the-vlei-ecosystem-governance-framework/2023-12-15_vlei-egf-v3.0-glossary_v1.3-final.pdf">
          <front>
            <title>Verifiable LEI (vLEI) Ecosystem Governance Framework 3.0: Glossary</title>
            <author>
              <organization>Global Legal Entity Identifier Foundation</organization>
            </author>
            <date year="2023" month="December" day="15"/>
          </front>
          <seriesInfo name="GLEIF" value="v1.3"/>
        </reference>
        <reference anchor="ACM-Calculus" target="https://dl.acm.org/doi/10.1145/155183.155225">
          <front>
            <title>A Calculus for Access Control in Distributed Systems</title>
            <author initials="M." surname="Abadi" fullname="Martín Abadi">
              <organization/>
            </author>
            <author initials="M." surname="Burrows" fullname="Michael Burrows">
              <organization/>
            </author>
            <author initials="B." surname="Lampson" fullname="Butler Lampson">
              <organization/>
            </author>
            <author initials="G." surname="Plotkin" fullname="Gordon Plotkin">
              <organization/>
            </author>
            <date year="1993" month="October"/>
          </front>
          <seriesInfo name="ACM" value="TOPLAS 15(4), pp. 706–734"/>
        </reference>
        <reference anchor="RFC4949">
          <front>
            <title>Internet Security Glossary, Version 2</title>
            <author fullname="R. Shirey" initials="R." surname="Shirey"/>
            <date month="August" year="2007"/>
            <abstract>
              <t>This Glossary provides definitions, abbreviations, and explanations of terminology for information system security. The 334 pages of entries offer recommendations to improve the comprehensibility of written material that is generated in the Internet Standards Process (RFC 2026). The recommendations follow the principles that such writing should (a) use the same term or definition whenever the same concept is mentioned; (b) use terms in their plainest, dictionary sense; (c) use terms that are already well-established in open publications; and (d) avoid terms that either favor a particular vendor or favor a particular technology or mechanism over other, competing techniques that already exist or could be developed. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="FYI" value="36"/>
          <seriesInfo name="RFC" value="4949"/>
          <seriesInfo name="DOI" value="10.17487/RFC4949"/>
        </reference>
        <reference anchor="ISO17442-1_2020" target="https://www.iso.org/standard/78829.html">
          <front>
            <title>Financial services — Legal entity identifier (LEI) — Part 1: Assignment</title>
            <author>
              <organization>International Organization for Standardization</organization>
            </author>
            <date year="2020"/>
          </front>
          <seriesInfo name="ISO" value="17442-1:2020"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="STD94">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="94"/>
          <seriesInfo name="RFC" value="8949"/>
          <seriesInfo name="DOI" value="10.17487/RFC8949"/>
        </reference>
        <reference anchor="MSGPCK" target="https://github.com/msgpack/msgpack/blob/master/spec.md">
          <front>
            <title>MessagePack Specification</title>
            <author>
              <organization>MessagePack Community</organization>
            </author>
            <date year="2023"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 1001?>

<section anchor="sec-autogen">
      <name>Full CDDL</name>
      <sourcecode type="cddl"><![CDATA[
]]></sourcecode>
    </section>
    <section anchor="examples-in-json">
      <name>Examples in JSON</name>
      <t>The following SATP wrapper examples show synthetic vLEI data:</t>
      <sourcecode type="json"><![CDATA[
{
  "verifiedOriginatorEntityId": {
    "content": {
      "mt": "application/cesr+json;profile=urn:vlei:leid"
      // JSON serialization of an ACDC credential (LEID profile)
    },
    "payload": "ACDC10JSON...SAID...i:did:keri:..."
    // literal ACDC JSON text, not base64
  }
}

]]></sourcecode>
      <sourcecode type="json"><![CDATA[
{
  "verifiedBeneficiaryEntityId": {
    "content": {
      "mt": "application/cesr;profile=urn:vlei:leid;encoding=binary"
    },
    "payload": "QUNEQzEwQ0JPUkJhc2U2NEVuY29kZWQvLi4u"
    // base64 of binary CESR serialization of SAID credential (LEID profile)
  }
}

]]></sourcecode>
      <sourcecode type="json"><![CDATA[
{
  "senderGatewayOwnerId": {
    "content": {
      "mt": "application/cesr+msgpk;profile=urn:vlei:leid"
      // cf, cbt, oid omitted here — optional in schema
    },
    "payload": "ACDC10MSGP...SAID...i:did:keri:..."
    // MessagePack serialization of an ACDC credential (LEID profile)
  }
}
]]></sourcecode>
      <sourcecode type="json"><![CDATA[
{
  "receiverGatewayOwnerId": {
    "content": {
      "mt": "application/cesr;profile=urn:vlei:leid;encoding=base64uri"
      // could also include cf, cbt, oid if known
    },
    "payload": "QUNEQzEwQ0VTUkJhc2U2NEVuY29kZWQvLi4u"
    // ⟶ Base64 of binary CESR stream encoding of SAID credential
  }
}

]]></sourcecode>
      <sourcecode type="json"><![CDATA[
{
  "senderGatewayId": {
    "content": {
      "mt": "application/cesr;profile=urn:vlei:ecr"
      // cf, cbt, oid omitted — optional in schema
    },
    "payload": "ACDC10CESR...SAID...i:did:keri:..."
    // CESR-encoded ACDC credential (ECR profile) as plain text
  }
}


]]></sourcecode>
      <sourcecode type="json"><![CDATA[
{
  "recipientGatewayId": {
    "content": {
      "mt": "application/cesr+cbor;profile=urn:vlei:ecr", // from vlei-media-type enum
      "cf": 0,
      "oid": "1.2.3.4.6" // actual OID for this credential type
    },
    "payload": "ACDC10CBORTESTSAIDi:did:keri:EXAMPLERGWNETID"
    // raw CBOR bytes or base64/base64url string, but not CBOR-tagged
  }
}

]]></sourcecode>
      <sourcecode type="json"><![CDATA[
{
  "senderGatewayNetworkId": {
    "content": {
      "mt": "application/cesr+cbor;profile=urn:vlei:ecr;encoding=base64uri",
      "cbt": false // no TN() CBOR tag; just base64 of raw CBOR
    },
    "payload": "oWJ0ZXN0LWVjci1jcmVkZW50aWFs..." 
    // base64 of the CBOR-encoded ACDC (ECR profile)
  }
}

]]></sourcecode>
      <sourcecode type="json"><![CDATA[
{
  "senderGatewayNetworkId": {
    "content": {
      "mt": "application/cesr+cbor;profile=urn:vlei:ecr;encoding=base64uri",
      "cbt": false // no TN() CBOR tag; just base64 of raw CBOR
    },
    "payload": "gEEBAQ..." 
    // base64 of CBOR-encoded ACDC (ECR profile)
  }
}

]]></sourcecode>
      <t>The following SATP wrapper examples show synthetic key data:</t>
      <sourcecode type="json"><![CDATA[
{
  "originatorPubkey": {
    "content": "application/jwk+json",
    "payload": "{ \"kty\": \"EC\", \"crv\": \"P-256\", \"x\": \"...\", \"y\": \"...\" }"
  },
  "beneficiaryPubkey": {
    "content": "application/cose;cose-type=cose-key",
    "encoding": "base64uri", // explicitly flagging representation
    "payload": "aEtNQnBRLi4u" // base64 of CBOR COSE_Key bytes
  },
  "senderGatewaySignaturePublicKey": {
    "content": "application/jwk+json",
    "payload": "{ \"kty\": \"RSA\", \"n\": \"...\", \"e\": \"AQAB\" }"
  },
  "receiverGatewaySignaturePublicKey": {
    "content": "application/cose;cose-type=cose-key",
    "encoding": "base64uri",
    "payload": "aEtNQ3BBLi4u"
  },
  "senderGatewayDeviceIdentityPubkey": {
    "content": "application/pkix-cert",
    "encoding": "PEM",
    "payload": "-----BEGIN CERTIFICATE-----\nMIIB...==\n-----END CERTIFICATE-----"
  },
  "receiverGatewayDeviceIdentityPubkey": {
    "content": "application/pkix-cert",
    "encoding": "DER",
    "payload": "MIIB..." // base64 DER
  }
}



]]></sourcecode>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Nicholas Racz for review, comments, and ecosystem alignment contributions.</t>
      <t>Samuel Smith for review, comments, and KERI ACDC CESR and vLEI insights.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
