2 Normative references
The following documents, in whole or in part, are normatively referenced in this document and are indispensable for its application. For dated references, only the edition cited applies. For undated references, the latest edition of the referenced document (including any amendments) applies.
OPC 10000-1, OPC Unified Architecture - Part 1: Overview and Concepts
OPC 10000-2, OPC Unified Architecture - Part 2: Security Model
OPC 10000-3, OPC Unified Architecture - Part 3: Address Space Model
OPC 10000-4, OPC Unified Architecture - Part 4: Services
OPC 10000-5, OPC Unified Architecture - Part 5: Information Model
OPC 10000-6, OPC Unified Architecture - Part 6: Mappings
OPC 10000-7, OPC Unified Architecture - Part 7: Profiles
OPC 10000-9, OPC Unified Architecture - Part 9: Alarms and Conditions
OPC 10000-12, OPC Unified Architecture - Part 12: Discovery and Global Services
OPC 10000-14, OPC Unified Architecture - Part 14: PubSub
OPC 10000-18, OPC Unified Architecture - Part 18: Role-Based Security
OPC 10000-21, OPC Unified Architecture - Part 21: Device Onboarding
XML Schema Part 2: XML Schema Part 2: Datatypes
SOAP Part 1, SOAP Version 1.2 Part 1: Messaging Framework
WS Addressing, Web Services Addressing (WS-Addressing)
TLS, RFC 8446 – The Transport Layer Security (TLS) Protocol Version 1.3
X.509 v3, ISO/IEC 9594-8 (ITU-T Rec. X.509), Information technology – Open Systems
HTTP, Hypertext Transfer Protocol (HTTP/1.1): Message Syntax and Routing
HTTPS, HTTP Over TLS
Base64, The Base16, Base32, and Base64 Data Encodings
X.690, ISO/IEC 8825-1 (ITU-T Rec. X.690), Information technology – ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER)
X.200, ISO/IEC 7498-1 (ITU-T Rec. X.200), Information technology – Open Systems Interconnection – Basic Reference Model: The Basic Model
IEEE Std 754, 60559-2020 - ISO/IEC/IEEE International Standard - Standard for Floating-Point Arithmetic
HMAC, Keyed-Hashing for Message Authentication
PKCS #1, RSA Cryptography Specifications Version 2.2
PKCS #12, Personal Information Exchange Syntax v1.1
FIPS 180-4, Secure Hash Standard (SHS)
FIPS 197, Advanced Encryption Standard (AES)
UTF-8, UTF-8, a transformation format of ISO 10646
IETF RFC 5280, Internet X.509 Public Key Infrastructure Certificate
IETF RFC 6818, Updates to the Internet X.509 Public Key Infrastructure
IETF RFC 4514, LDAP: String Representation of Distinguished Names
NTP, Network Time Protocol Version 4: Protocol and Algorithms Specification
IETF RFC 3986, Uniform Resource Identifier (URI): Generic Syntax
IETF RFC 8141, Uniform Resource Names (URNs)
IETF RFC 6455, The WebSocket Protocol
IETF RFC 8259, The JavaScript Object Notation (JSON) Data Interchange Format
IETF RFC 7519, JSON Web Token (JWT)
IETF RFC 7523, JSON Web Token (JWT) Profile for OAuth 2.0 Client Authentication and
IETF RFC 8705, OAuth 2.0 Mutual-TLS Client Authentication and Certificate-Bound Access Tokens
IETF RFC 6749, The OAuth 2.0 Authorization Framework
OpenID-Core, OpenID Connect Core 1.0
OpenID-Discovery, OpenID Connect Discovery 1.0
IETF RFC 6960, X.509 Internet Public Key Infrastructure – Online Certificate Status Protocol – OCSP
IETF RFC 5869, HMAC-based Extract-and-Expand Key Derivation Function (HKDF)
IETF RFC 8422, Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS) Versions 1.2 and Earlier
IETF RFC 6750, The OAuth 2.0 Authorization Framework: Bearer Token Usage
ISO 8601-1, Date and time - Representations for information interchange - Part 1: Basic rules
IETF RFC 5234, Augmented BNF for Syntax Specifications: ABNF
IETF RFC 4151, The 'tag' URI Scheme
SemVer, Semantic Versioning 2.0.0
OpenAPI, OpenAPI Specification v3.0
JSON Schema, JSON Schema 2020-12
IETF RFC 1952: GZIP file format specification version 4.3
AES-CTR, NIST SP 800-38A: Recommendation for Block Cipher Modes of Operation
IETF RFC 7919, Negotiated Finite Field Diffie-Hellman Ephemeral Parameters for Transport Layer Security (TLS)
IETF RFC 7748, Elliptic Curves for Security