Table of contents
1 INTRODUCTION .......................................................................................................................................................... 8
1.1 Scope ............................................................................................................................................................ 8
1.2 References.................................................................................................................................................... 8
1.3 Definitions and acronyms............................................................................................................................ 10
1.3.1 Shall/should/may/might word usage .............................................................................................. 10
1.3.2 Conventions ................................................................................................................................... 10
1.3.3 Abbreviations and acronyms.......................................................................................................... 11
1.3.4 Definitions ...................................................................................................................................... 12
1.3.5 Symbols ......................................................................................................................................... 13
1.4 Architecture ................................................................................................................................................. 14
1.5 Device roles ................................................................................................................................................ 14
1.5.1 Authentication roles........................................................................................................................ 14
1.5.2 Configurator delegation..................................................................
1