<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.36 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-seralathan-radext-persistent-devid-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.33.0 -->
  <front>
    <title abbrev="persistent-devid">RADIUS Attribute for Persistent Device Identity in MAC-Randomized Environments</title>
    <seriesInfo name="Internet-Draft" value="draft-seralathan-radext-persistent-devid-00"/>
    <author initials="P." surname="Seralathan" fullname="Premanand Seralathan">
      <organization>Cisco Systems</organization>
      <address>
        <postal>
          <street>170 West Tasman Drive</street>
          <city>San Jose</city>
          <code>95134</code>
          <country>US</country>
        </postal>
        <email>pseralat@cisco.com</email>
      </address>
    </author>
    <author initials="L." surname="Mukund" fullname="Laxmi Mukund">
      <organization>Cisco Systems</organization>
      <address>
        <postal>
          <street>Cessna Business Park, Kadubeesanahalli</street>
          <city>ORR Bangalore</city>
          <code>560103</code>
          <country>IN</country>
        </postal>
        <email>lmukund@cisco.com</email>
      </address>
    </author>
    <author initials="A." surname="Milton" fullname="Antoni Milton">
      <organization>Hewlett Packard Enterprise (HPE)</organization>
      <address>
        <postal>
          <street>6280 America Center Dr</street>
          <city>San Jose</city>
          <code>95002</code>
          <country>US</country>
        </postal>
        <email>antoni.milton@hpe.com</email>
      </address>
    </author>
    <date year="2026" month="April" day="30"/>
    <area>general</area>
    <workgroup>RADEXT Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <keyword>RADIUS</keyword>
    <keyword>Device-Id</keyword>
    <abstract>
      <?line 120?>

<t>This document defines a new RADIUS attribute, Persistent-Device-Id, that enables
Network Access Control (NAC) systems to maintain a stable device identity across
Media Access Control (MAC) address changes. Modern operating systems randomize
MAC addresses by default, disrupting RADIUS-based authentication, authorization,
and accounting workflows that rely on the Calling-Station-Id attribute as a
persistent device identifier. The Persistent-Device-Id attribute carries a
Globally Unique Identifier (GUID) in RADIUS Access-Accept and
Accounting-Request messages, providing a stable correlation key for device
profiling, policy enforcement, and regulatory compliance. This document
specifies the attribute format, assignment procedures, and usage guidelines
for RADIUS clients and servers..</t>
    </abstract>
  </front>
  <middle>
    <?line 134?>

<section anchor="intro">
      <name>Introduction</name>
      <t>The RADIUS protocol <xref target="RFC2865"/> uses the Calling-Station-Id attribute (Type 31)
to carry the Media Access Control (MAC) address of the connecting device. This
attribute serves as the de facto device identifier in Network Access Control
(NAC) deployments, used for device identification, profiling, policy assignment,
license counting, and regulatory audit trails.</t>
      <t>MAC address randomization as a privacy feature was first introduced during
active scanning in iOS 8 (2014). Since 2020, major operating system vendors
have adopted randomized MAC addresses by default for network association.
<xref target="RFC9724"/> provides a comprehensive taxonomy of MAC address selection policies
and documents current OS practices: per-network randomization (PNGM),
per-connection randomization (PSGM), periodic rotation (PPGM), and scan-time
randomization are now widely deployed across Android <xref target="ANDROID-MAC"/>, iOS
<xref target="APPLE-MAC"/>, Windows <xref target="WINDOWS-MAC"/>, and Linux.</t>
      <t>Current versions of all major mobile operating systems transmit randomized
MAC addresses by default when connecting to wireless networks, disrupting
network services that depend on the MAC address as a stable device identifier.</t>
      <t>The impact on RADIUS-based NAC systems is significant:</t>
      <ul spacing="normal">
        <li>
          <t>A single physical device may present different Calling-Station-Id values
across connections, creating multiple unrelated endpoint records.</t>
        </li>
        <li>
          <t>Device profiling data becomes fragmented across records keyed by different
MAC addresses.</t>
        </li>
        <li>
          <t>RADIUS Accounting records <xref target="RFC2866"/> cannot be correlated across sessions
for the same device.</t>
        </li>
        <li>
          <t>License management systems produce inflated device counts.</t>
        </li>
        <li>
          <t>Regulatory audit trails required by frameworks such as <xref target="HIPAA"/> and <xref target="FISMA"/>
lose device-level continuity.</t>
        </li>
      </ul>
      <t>IEEE 802.11bh-2024 <xref target="IEEE80211BH"/> addresses session continuity at Layer 2 but
does not extend to the AAA layer. This document addresses the gap by defining
a RADIUS attribute that carries a persistent device identifier above the MAC
address layer.</t>
      <section anchor="Requirements">
        <name>Requirements Language</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL",
"SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT
RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be
interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/>
when, and only when, they appear in all capitals, as shown here.</t>
      </section>
      <section anchor="Terminology">
        <name>Terminology</name>
        <t>Persistent-Device-Id (PDID):</t>
        <ul empty="true">
          <li>
            <t>A unique identifier carried within the device's certificate, typically
provisioned during device enrollment by a Mobile Device Management (MDM)
system or the NAC server's own registration process. The RADIUS server
extracts this identifier during certificate-based authentication and includes i
t in the RADIUS Access-Accept to provide a persistent device identity that
survives MAC address changes.</t>
          </li>
        </ul>
        <t>RADIUS Client:</t>
        <ul empty="true">
          <li>
            <t>A network device (switch, wireless controller, VPN concentrator) that acts
as a RADIUS authenticator per <xref target="RFC2865"/>.</t>
          </li>
        </ul>
        <t>RADIUS Server:</t>
        <ul empty="true">
          <li>
            <t>A server that processes RADIUS Access-Request messages, performs authentication
and authorization, and returns Access-Accept or Access-Reject messages. In this
context, the RADIUS server is also the entity that assigns and manages
Persistent-Device-Id values.</t>
          </li>
        </ul>
        <t>MAC Address Randomization:</t>
        <ul empty="true">
          <li>
            <t>The practice of replacing a device's hardware-assigned MAC address with a
locally-administered, randomly-generated alternative, as described in <xref target="RFC9724"/>.</t>
          </li>
        </ul>
        <t>Locally-Administered MAC Address:</t>
        <ul empty="true">
          <li>
            <t>A MAC address with the locally-administered bit (bit 1 of the first octet) set
to 1. Unlike globally-assigned (burned-in) MAC addresses, a locally-administered
address has local significance only, can be assigned by any entity, and is not
guaranteed to be globally unique. Randomized MAC addresses use
locally-administered addresses.</t>
          </li>
        </ul>
        <t>Identity Correlation Source:</t>
        <ul empty="true">
          <li>
            <t>A piece of information available during the RADIUS exchange that can be used
to associate a new MAC address with a previously assigned Persistent-Device-Id.
Examples include certificate Common Name (from certificate-based EAP methods
such as EAP-TLS, EAP-TTLS, or TEAP), MDM device identifier, and IEEE 802.1X
authenticated username.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="Problem">
      <name>Problem Statement</name>
      <section anchor="calling-station-id-as-device-identifier">
        <name>Calling-Station-Id as Device Identifier</name>
        <t>Section 5.31 of <xref target="RFC2865"/> defines the Calling-Station-Id attribute as
carrying "the phone number" of the user. In practice, for IEEE 802 networks,
this attribute carries the MAC address of the connecting device, formatted as a
string of hex digits (e.g., "AA-BB-CC-DD-EE-FF").</t>
        <t>NAC systems use Calling-Station-Id as the primary key for:</t>
        <ol spacing="normal" type="1"><li>
            <t>Endpoint record lookup and creation</t>
          </li>
          <li>
            <t>Device profiling and classification</t>
          </li>
          <li>
            <t>Authorization policy evaluation</t>
          </li>
          <li>
            <t>RADIUS Accounting session correlation</t>
          </li>
          <li>
            <t>License and compliance tracking</t>
          </li>
        </ol>
      </section>
      <section anchor="impact-of-mac-address-randomization">
        <name>Impact of MAC Address Randomization</name>
        <t>When a device randomizes its MAC address, the Calling-Station-Id value changes.
From the RADIUS server's perspective, each randomized MAC appears to be a new,
unrelated device. This causes:</t>
        <ol spacing="normal" type="1"><li>
            <t>Endpoint Record Proliferation: A single device generates N endpoint records
for N different MAC addresses, fragmenting device state.</t>
          </li>
          <li>
            <t>Profiling Data Loss: Attributes collected from network probes (DHCP, HTTP,
SNMP, DNS) are stored against a MAC-keyed record. When the MAC changes, the
accumulated profiling data is inaccessible for the new session.</t>
          </li>
          <li>
            <t>Accounting Discontinuity: Accounting Start and Stop records <xref target="RFC2866"/> for
the same device carry different Calling-Station-Id values, preventing session correlation.</t>
          </li>
          <li>
            <t>License Count Inflation: License management based on unique
Calling-Station-Id values produces artificially high counts.</t>
          </li>
          <li>
            <t>Compliance Gaps: Regulatory frameworks requiring device-level audit trails
(HIPAA <xref target="HIPAA"/>, FISMA <xref target="FISMA"/>, PCI-DSS <xref target="PCI-DSS"/>) cannot be satisfied
when device identity is ephemeral.</t>
          </li>
        </ol>
      </section>
      <section anchor="limitations-of-existing-mechanisms">
        <name>Limitations of Existing Mechanisms</name>
        <t>No existing standard RADIUS attribute provides a persistent device identifier
independent of the MAC address. The following existing attributes are insufficient:</t>
        <t>Calling-Station-Id (Type 31):</t>
        <ul empty="true">
          <li>
            <t>Carries the MAC address, which is now unstable.</t>
          </li>
        </ul>
        <t>User-Name (Type 1):</t>
        <ul empty="true">
          <li>
            <t>Identifies the user, not the device. A user may have multiple devices, and
conversely, a single device may be shared by several individuals.</t>
          </li>
        </ul>
        <t>NAS-Port-Id (Type 87):</t>
        <ul empty="true">
          <li>
            <t>Identifies the network port, not the device.</t>
          </li>
        </ul>
        <t>Class (Type 25):</t>
        <ul empty="true">
          <li>
            <t>An opaque value sent by the RADIUS server in Access-Accept and echoed by the
NAS in subsequent Accounting-Request messages <xref target="RFC2865"/>. The Class attribute
is server-generated per session for accounting grouping and policy context.
It is opaque to the NAS, has no defined structure for device identification,
and is not guaranteed to persist across sessions or MAC address changes. It
cannot serve as a stable device identifier.</t>
          </li>
        </ul>
        <t>Chargeable-User-Identity (CUI) <xref target="RFC4372"/>:</t>
        <ul empty="true">
          <li>
            <t>Provides a stable user-level identity for inter-domain roaming and billing.
While CUI carries an opaque identifier, it is semantically a user identity,
not a device identity. A single user may have multiple devices, and a shared
device may serve multiple users. CUI cannot distinguish between devices
belonging to the same user. Furthermore, RFC 4372 specifies that the CUI
binding lifetime should be temporary (e.g., one billing period), whereas
persistent device identification requires a stable identity across the device's
entire enrollment lifecycle. Overloading CUI to carry device identity would
violate its defined semantics and conflict with existing CUI deployments used
for roaming billing.</t>
          </li>
        </ul>
        <t>Certificate-based EAP fields (EAP-TLS, EAP-TTLS, TEAP):</t>
        <ul empty="true">
          <li>
            <t>Available only for certificate-based authentication methods, not for MAC
Authentication Bypass (MAB) or credential-based EAP methods.</t>
          </li>
        </ul>
        <t>The absence of a standard attribute has led to vendor-specific workarounds that
are mutually incompatible, as described in the following section.</t>
      </section>
      <section anchor="current-vendor-specific-approaches">
        <name>Current Vendor-Specific Approaches</name>
        <t>In the absence of a standard RADIUS attribute for persistent device identity,
network access control vendors have independently implemented proprietary
solutions to address the MAC address randomization problem. These approaches
differ in their choice of RADIUS attribute, encoding format, and client-side
parsing requirements.</t>
        <t>Some implementations repurpose existing standard RADIUS attributes such as
User-Name (Type 1) to carry device identifiers in the Access-Accept message.
This approach violates the semantic definition of User-Name in RFC 2865, which
specifies it as "the name of the user to be authenticated." Overloading
User-Name with device identity creates ambiguity for downstream consumers of
RADIUS data, including accounting systems, billing platforms, and compliance
audit tools that expect User-Name to contain an actual user identity. It also
requires RADIUS clients (NAS devices) to implement vendor-specific logic to
distinguish between a true user name and an encoded device identifier.</t>
        <t>Other implementations use Vendor-Specific Attributes (Type 26) to carry the
persistent device identifier within a vendor-allocated attribute space. While
VSAs are a legitimate RADIUS extension mechanism, they are inherently
non-interoperable: a RADIUS client from one vendor cannot interpret the
VSA encoding of another vendor's RADIUS server. In multi-vendor enterprise
deployments -- where network access devices, RADIUS servers, and policy
engines may come from different manufacturers -- VSA-based approaches result
in fragmented device identity that cannot be correlated across the infrastructure.</t>
        <t>Both approaches share a common deficiency: they require modifications to RADIUS
client firmware for each vendor's proprietary encoding, creating a fragmented
ecosystem where persistent device identity is available only within
single-vendor deployments. Enterprise networks that use equipment from multiple
vendors -- a common scenario in large organizations -- cannot achieve
onsistent device identity across their infrastructure.</t>
        <t>A standard RADIUS attribute for persistent device identity, as defined in this
document, would eliminate this fragmentation by providing a single,
interoperable mechanism that all vendors can implement without proprietary
extensions or semantic overloading of existing attributes.</t>
      </section>
    </section>
    <section anchor="Attribute">
      <name>Persistent-Device-Id Attribute</name>
      <section anchor="attribute-format">
        <name>Attribute Format</name>
        <t>The Persistent-Device-Id attribute is a standard RADIUS attribute with the
following format:</t>
        <figure anchor="attr-pdevid">
          <name>Encoding Persistent-Device-Id Attribute</name>
          <artwork><![CDATA[
0                   1                   2                   3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|     Type      |    Length     |           Value ...
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                    Value (variable length string)             |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+


]]></artwork>
        </figure>
        <t>Type</t>
        <ul empty="true">
          <li>
            <ul empty="true">
              <li>
                <t>TBD1 (to be assigned by IANA)</t>
              </li>
            </ul>
          </li>
        </ul>
        <t>Length</t>
        <ul empty="true">
          <li>
            <ul empty="true">
              <li>
                <t>Variable (2 octets for Type and Length, plus the length of the string value)</t>
              </li>
            </ul>
          </li>
        </ul>
        <t>Data Type</t>
        <ul empty="true">
          <li>
            <ul empty="true">
              <li>
                <t>String</t>
              </li>
            </ul>
          </li>
        </ul>
        <t>Value</t>
        <ul empty="true">
          <li>
            <t>A string containing the persistent device identifier extracted from the
device's certificate. Implementations SHOULD use UUID version 4 <xref target="RFC9562"/>
in the standard 36-character string representation (e.g.,
"f47ac10b-58cc-4372-a567-0e02b2c3d479"). The identifier is provisioned into
the certificate during device enrollment and is not generated by the RADIUS
server.</t>
          </li>
        </ul>
      </section>
      <section anchor="string-representation">
        <name>String Representation</name>
        <t>When UUID version 4 is used as the Persistent-Device-Id, it MUST use the
standard string format defined in Section 4 of <xref target="RFC9562"/>:</t>
        <ul empty="true">
          <li>
            <t>xxxxxxxx-xxxx-4xxx-yxxx-xxxxxxxxxxxx</t>
          </li>
        </ul>
        <t>where "x" is a lowercase hexadecimal digit and "y" is one of 8, 9, a, or b.
The "4" indicates UUID version 4. This string representation is carried
directly in the RADIUS attribute value field.</t>
        <t>Example:</t>
        <ul empty="true">
          <li>
            <t>Persistent-Device-Id = "f47ac10b-58cc-4372-a567-0e02b2c3d479"</t>
          </li>
        </ul>
      </section>
      <section anchor="attribute-properties">
        <name>Attribute Properties</name>
        <t>The following table summarizes the properties of the Persistent-Device-Id
attribute:</t>
        <table>
          <thead>
            <tr>
              <th align="left">Attribute Name</th>
              <th align="left">Persistent-Device-Id</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">Attribute Type</td>
              <td align="left">TBD1</td>
            </tr>
            <tr>
              <td align="left">Value Type</td>
              <td align="left">String</td>
            </tr>
            <tr>
              <td align="left">Length</td>
              <td align="left">Variable</td>
            </tr>
            <tr>
              <td align="left">Allowed in</td>
              <td align="left">Access-Accept, Accounting-Request, Accounting-Response, CoA-Request</td>
            </tr>
            <tr>
              <td align="left">Forbidden in</td>
              <td align="left">Access-Request, Access-Reject, Access-Challenge</td>
            </tr>
            <tr>
              <td align="left">Presence</td>
              <td align="left">OPTIONAL</td>
            </tr>
            <tr>
              <td align="left">Maximum Occurrences</td>
              <td align="left">1</td>
            </tr>
            <tr>
              <td align="left">Encrypted</td>
              <td align="left">Yes (as per RADIUS shared secret)</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
    <section anchor="security-and-deployment-model">
      <name>Security and Deployment Model</name>
      <t>This section defines the security and deployment model for the
Persistent-Device-Id specification. A clear understanding of the actors,
threats addressed, explicit non-goals, and security invariants is essential to
evaluate the privacy and security properties of this mechanism.</t>
      <section anchor="actors">
        <name>Actors</name>
        <t>The following actors are relevant to this specification:</t>
        <ol spacing="normal" type="1"><li>
            <t>Device Owner/User: The individual who owns or operates the device. In
enterprise environments, this may be an employee using a corporate-issued or
BYOD device. The device owner has a legitimate expectation of privacy from
passive observers and external networks, while accepting that their employer's
network may identify their device for security and compliance purposes.</t>
          </li>
          <li>
            <t>Enterprise Administrator: The network operator responsible for device
enrollment, certificate provisioning, NAC policy enforcement, and compliance
auditing. The administrator has a legitimate need to persistently identify
enrolled devices for security operations.</t>
          </li>
          <li>
            <t>Passive Observer: An entity that can observe Layer 2 frames on the wireless
medium or local network segment. This includes any device within radio range of
a wireless network. The passive observer is the primary adversary that MAC
address randomization is designed to defeat.</t>
          </li>
          <li>
            <t>Rogue Access Point / Man-in-the-Middle: An attacker operating an
unauthorized access point to intercept or manipulate network traffic. This
actor can observe Layer 2 frames and may attempt to intercept authentication
exchanges.</t>
          </li>
          <li>
            <t>External Network: A network operator outside the device's home
administrative domain. External networks should not be able to learn the
Persistent-Device-Id or correlate device activity across domains.</t>
          </li>
        </ol>
      </section>
      <section anchor="threats-addressed">
        <name>Threats Addressed</name>
        <t>MAC address randomization was introduced to mitigate the following threats.
This specification is designed to preserve these protections:</t>
        <ol spacing="normal" type="1"><li>
            <t>Passive Device Tracking: A passive observer monitors Layer 2 frame headers
to track a device's location and movement patterns using its MAC address.
MAC randomization defeats this by changing the MAC address. The
Persistent-Device-Id does NOT reintroduce this threat because it is never
present in any Layer 2 frame. The identifier value originates from the
device certificate exchanged within the encrypted EAP tunnel, and the
Persistent-Device-Id RADIUS attribute is carried only in RADIUS messages
between the server and authenticator, protected by RADIUS/TLS
<xref target="I-D.ietf-radext-radiusdtls-bis"/>.</t>
          </li>
          <li>
            <t>Cross-Network Correlation: An adversary correlates a device's activity
across multiple networks using a stable identifier. MAC randomization limits
this by using different MAC addresses on different networks. The
Persistent-Device-Id does NOT enable cross-network correlation because:
(i) the identifier is scoped to the administrative domain that provisioned the
certificate, (ii) external networks never see the identifier, and (iii) the
RADIUS server MUST NOT share it with external entities.</t>
          </li>
          <li>
            <t>Device Fingerprinting: An attacker combines observable characteristics
(probe requests, timing patterns, supported capabilities) to fingerprint a
device. The Persistent-Device-Id does not contribute to fingerprinting
because it is not observable by any entity other than the RADIUS server and
the authenticated NAS.</t>
          </li>
        </ol>
      </section>
      <section anchor="explicit-non-goals">
        <name>Explicit Non-Goals</name>
        <t>This specification explicitly does NOT:</t>
        <ol spacing="normal" type="1"><li>
            <t>Enable tracking of unenrolled devices. Devices without certificates
(guest, unauthenticated, MAB-only) are completely unaffected by this
specification and continue to benefit fully from MAC randomization privacy.</t>
          </li>
          <li>
            <t>Provide a mechanism for cross-network tracking. The Persistent-Device-Id
is administratively scoped and MUST NOT be shared across administrative domains.</t>
          </li>
          <li>
            <t>Enable surveillance or monitoring of user behavior. The identifier
correlates a device for NAC, compliance, and licensing purposes only. It does
not reveal user activity, browsing history, or application usage.</t>
          </li>
          <li>
            <t>Undermine the user's choice to use MAC randomization. The MAC address
continues to randomize at Layer 2 as the device vendor intended. The
Persistent-Device-Id operates at a different layer (AAA/RADIUS) and is
visible only to the enterprise network the device has voluntarily enrolled with.</t>
          </li>
          <li>
            <t>Introduce a covert or hidden identifier. The identifier is explicitly
provisioned into the device's certificate during a transparent enrollment
process that requires device owner or administrator action.</t>
          </li>
        </ol>
      </section>
      <section anchor="security-invariants">
        <name>Security Invariants</name>
        <t>The following security properties MUST hold for any conforming implementation:</t>
        <ol spacing="normal" type="1"><li>
            <t>The Persistent-Device-Id MUST NOT appear in the clear in any Layer 2 frame
(Ethernet, Wi-Fi management, or data frames).</t>
          </li>
          <li>
            <t>The Persistent-Device-Id value is derived from the device certificate
exchanged within the encrypted EAP tunnel (device to RADIUS server). The
Persistent-Device-Id RADIUS attribute MUST only be transmitted within RADIUS
messages protected by RADIUS/TLS <xref target="I-D.ietf-radext-radiusdtls-bis"/>
(RADIUS server to NAS).</t>
          </li>
          <li>
            <t>The Persistent-Device-Id MUST NOT be derivable from the device's MAC
address (randomized or real).</t>
          </li>
          <li>
            <t>The Persistent-Device-Id MUST NOT be observable by passive observers on
the wireless medium or local network segment.</t>
          </li>
          <li>
            <t>The Persistent-Device-Id MUST NOT be shared with entities outside the
administrative domain without explicit device owner consent.</t>
          </li>
        </ol>
      </section>
    </section>
    <section anchor="device-consent-and-control">
      <name>Device Consent and Control</name>
      <t>A central concern raised by device vendors and privacy advocates is whether
a persistent device identifier undermines the user's control over their device
identity. This section specifies the consent and control requirements that
ensure the Persistent-Device-Id respects device owner autonomy.</t>
      <section anchor="consent-model">
        <name>Consent Model</name>
        <t>The Persistent-Device-Id is NEVER assigned to a device without explicit action
by the device owner or an authorized administrator. The identifier exists only
because a certificate containing it was provisioned onto the device through
one of the following consent-based mechanisms:</t>
        <ol spacing="normal" type="1"><li>
            <t>Corporate Device Enrollment (Administrator Consent): An enterprise
administrator enrolls the device in a Mobile Device Management (MDM) system.
The MDM system generates a certificate containing the Persistent-Device-Id and
pushes it to the device. The administrator acts on behalf of the organization,
and the device is corporate-owned. The employee is informed of the enrollment
through the organization's acceptable use policy.</t>
          </li>
          <li>
            <t>BYOD Self-Enrollment (User Consent): The device owner voluntarily connects
to a provisioning portal (captive portal or onboarding SSID) and follows an
enrollment workflow. During this process, the portal generates a certificate
containing the Persistent-Device-Id and installs it on the device. The user
explicitly initiates and approves this enrollment. On most operating systems
(iOS, Android, Windows, macOS), installing a certificate profile requires the
user to accept a system-level prompt.</t>
          </li>
          <li>
            <t>MDM-Initiated BYOD Enrollment (User Consent with MDM): The device owner
installs an MDM agent application and enrolls their personal device in the
organization's MDM. The MDM provisions the certificate. The user must
explicitly install the MDM profile and grant the required permissions,
providing informed consent.</t>
          </li>
        </ol>
      </section>
      <section anchor="user-control-and-opt-out">
        <name>User Control and Opt-Out</name>
        <t>The device owner retains full control over the Persistent-Device-Id at all
times:</t>
        <ol spacing="normal" type="1"><li>
            <t>Certificate Removal: The device owner can remove the certificate (and with
it, the Persistent-Device-Id) at any time by deleting the certificate
profile from the device settings. On iOS, this is under
Settings &gt; General &gt; VPN &amp; Device Management. On Android,
Settings &gt; Security &gt; Credentials. On Windows, certmgr.msc. On macOS,
Keychain Access. Once the certificate is removed, the device will no longer
present a Persistent-Device-Id during authentication, and the RADIUS server
will treat it as a new, unidentified device.</t>
          </li>
          <li>
            <t>MDM Unenrollment: For MDM-managed devices, the device owner can unenroll
from the MDM system, which removes the MDM profile and all associated
certificates, including the one containing the Persistent-Device-Id.</t>
          </li>
          <li>
            <t>Network Disconnection: The device owner can choose not to connect to the
enterprise network. No identifier is transmitted unless the device actively
authenticates to the network using the provisioned certificate.</t>
          </li>
          <li>
            <t>No Silent Re-provisioning: The RADIUS server or NAS MUST NOT provision or
re-provision a certificate containing a Persistent-Device-Id without the device
owner's or administrator's explicit action. If a certificate expires or is
revoked, a new enrollment process requiring consent is needed.</t>
          </li>
        </ol>
      </section>
      <section anchor="transparency-requirements">
        <name>Transparency Requirements</name>
        <t>Organizations deploying the Persistent-Device-Id SHOULD:</t>
        <ol spacing="normal" type="1"><li>
            <t>Inform device owners, through an acceptable use policy or enrollment
notification, that a persistent device identifier will be embedded in the c
ertificate and used for network access control, compliance, and licensing
purposes.</t>
          </li>
          <li>
            <t>Clearly describe what data is associated with the Persistent-Device-Id
(MAC address history, session records, compliance state) and how long it is
retained.</t>
          </li>
          <li>
            <t>Provide a documented procedure for device owners to request deletion of
their Persistent-Device-Id records, in compliance with applicable privacy
regulations (e.g., the General Data Protection Regulation <xref target="GDPR"/> Article 17,
the California Consumer Privacy Act).</t>
          </li>
        </ol>
        <t>The above recommendations are expressed as SHOULD to accommodate deployments
where equivalent transparency is already provided through existing enterprise
acceptable use policies, device management agreements, or where jurisdictional
requirements impose alternative notification obligations that satisfy the same
intent.</t>
      </section>
    </section>
    <section anchor="certificate-provisioning-lifecycle">
      <name>Certificate Provisioning Lifecycle</name>
      <t>The provisioning of the Persistent-Device-Id into the device's certificate is
outside the scope of the RADIUS protocol. This section provides an informational
overview of the lifecycle:</t>
      <ol spacing="normal" type="1"><li>
          <t>Enrollment: The device is enrolled through an MDM system or a NAC
registration portal. During enrollment, the system generates a UUID
version 4 using a CSPRNG and embeds it in the certificate's Subject
Alternative Name (SAN) URI field using the URN format defined in <xref target="RFC9562"/>,
e.g., "urn:uuid:f47ac10b-58cc-4372-a567-0e02b2c3d479". The certificate is
signed by the organization's CA and pushed to the device.  </t>
          <ul spacing="normal">
            <li>
              <t>The SAN URI field is chosen over the X.509v3 subjectUniqueId field for the
following reasons. First, <xref target="RFC5280"/> Section 4.1.2.8 states that conforming
CAs "MUST NOT generate certificates with unique identifiers", effectively
deprecating subjectUniqueId for new deployments. Second, the SAN extension is
the standard mechanism for carrying additional identity forms in X.509
certificates and is universally supported by certificate tooling, MDM systems,
and SCEP/EST enrollment protocols. Third, the urn:uuid: namespace is already
registered <xref target="RFC9562"/>, requiring no new URI scheme registration. The RADIUS
server extracts the UUID from the SAN URI by parsing the urn:uuid: prefix and
using the remaining string representation directly as the RADIUS attribute
value.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Consent: Certificate installation requires explicit action -- either by an
administrator (corporate MDM push) or by the device owner (accepting a
certificate profile prompt during BYOD onboarding). The identifier is never
provisioned silently.</t>
        </li>
        <li>
          <t>Authentication: When the device connects to the network, it presents the
certificate inside the encrypted EAP tunnel (e.g., EAP-TLS, EAP-TTLS, TEAP).
The RADIUS server extracts the Persistent-Device-Id from the SAN URI field
and includes it in the Access-Accept message.</t>
        </li>
        <li>
          <t>Renewal: When the certificate approaches expiration, the MDM or NAC system
renews it. The renewed certificate must contain the same Persistent-Device-Id
as the original, preserving identity continuity.</t>
        </li>
        <li>
          <t>Revocation: When a device is decommissioned, lost, or stolen, the
administrator revokes the certificate. The RADIUS server rejects subsequent
authentication attempts. The Persistent-Device-Id record may be retained for
 audit or deleted per the organization's data retention policy.</t>
        </li>
        <li>
          <t>Re-enrollment: If a device is re-enrolled after revocation, a new
certificate with a new Persistent-Device-Id should be provisioned. Reuse of a
previously revoked identifier is not recommended.</t>
        </li>
      </ol>
    </section>
    <section anchor="protocol-sequence-diagrams">
      <name>Protocol Sequence Diagrams</name>
      <t>The following diagram illustrates the complete lifecycle: certificate
provisioning, initial authentication with identifier extraction, and
re-authentication after MAC address rotation.</t>
      <figure anchor="figlifecycle">
        <name>Persistent-ID Lifecycle Management</name>
        <artwork><![CDATA[
Device        MDM/Portal    CA        NAS         RADIUS Server
  |               |          |          |               |
  |  PHASE 1: CERTIFICATE PROVISIONING (one-time)       |
  |               |          |          |               |
  |-- Enroll ---->|          |          |               |
  |  (user consent)          |          |               |
  |               |--CSR---->|          |               |
  |               | (UUID in |          |               |
  |               |  SAN URI)|          |               |
  |               |<-Cert----|          |               |
  |<--Push Cert---|          |          |               |
  | (user accepts |          |          |               |
  |  cert prompt) |          |          |               |
  |               |          |          |               |
  |  PHASE 2: FIRST AUTHENTICATION (certificate-based EAP)|
  |               |          |          |               |
  |-- 802.1X Start -------------------->|               |
  |  (MAC_1 in L2 header)    |          |               |
  |               |          |          |--Acc-Request->|
  |               |          |          | Calling-Stn-Id|
  |               |          |          | = MAC_1       |
  |<============ EAP Tunnel (e.g., EAP-TLS) ============>|
  |  (cert with UUID_A exchanged inside tunnel)         |
  |               |          |          |               |
  |               |          |          |  Server:      |
  |               |          |          |  1.Extract    |
  |               |          |          |    UUID_A     |
  |               |          |          |    from cert  |
  |               |          |          |  2.Store:     |
  |               |          |          |    UUID_A ->  |
  |               |          |          |    MAC_1      |
  |               |          |          |               |
  |               |          |          |<-Acc-Accept---|
  |               |          |          | PDID=UUID_A   |
  |<-- EAP-Success ---------------------|               |
  |               |          |          |--Acct-Req---->|
  |               |          |          | MAC_1,UUID_A  |
  |               |          |          |               |
  |       PHASE 3: RE-AUTH AFTER MAC ROTATION           |
  |               |          |          |               |
  |  [MAC rotates: MAC_1 -> MAC_2]      |               |
  |               |          |          |               |
  |-- 802.1X Start -------------------->|               |
  |  (MAC_2 in L2 header)    |          |               |
  |               |          |          |--Acc-Request->|
  |               |          |          | Calling-Stn-Id|
  |               |          |          | = MAC_2       |
  |<============ EAP Tunnel (e.g., EAP-TLS) ============>|
  |  (same cert, same UUID_A)           |               |
  |               |          |          |               |
  |               |          |          |  Server:      |
  |               |          |          |  1.Extract    |
  |               |          |          |    UUID_A     |
  |               |          |          |  2.Find       |
  |               |          |          |    existing   |
  |               |          |          |    record     |
  |               |          |          |  3.Add MAC_2  |
  |               |          |          |    to UUID_A  |
  |               |          |          |               |
  |               |          |          |<-Acc-Accept---|
  |               |          |          | PDID=UUID_A   |
  |               |          |          | (same as      |
  |               |          |          |  before)      |
  |<-- EAP-Success ---------------------|               |
  |               |          |          |--Acct-Req---->|
  |               |          |          | MAC_2,UUID_A  |


]]></artwork>
      </figure>
      <t>Key observations: (1) The UUID is provisioned with user/admin consent during
enrollment. (2) The UUID originates from the device certificate exchanged
within the encrypted EAP tunnel -- it never appears in any Layer 2 frame.
The Persistent-Device-Id RADIUS attribute is carried only in RADIUS messages
protected by RADIUS/TLS. (3) After MAC rotation, the same UUID is extracted
from the same certificate, allowing the RADIUS server to unify device records
across MAC changes. (4) Unenrolled devices (no certificate) are unaffected and
receive no Persistent-Device-Id.</t>
    </section>
    <section anchor="attribute-assignment-procedures">
      <name>Attribute Assignment Procedures</name>
      <section anchor="identifier-extraction-from-certificate">
        <name>Identifier Extraction from Certificate</name>
        <t>When a RADIUS server receives an Access-Request containing a certificate-based
authentication (e.g., EAP-TLS, EAP-TTLS, TEAP), and the device's certificate contains a
persistent device identifier, the server MUST:</t>
        <ol spacing="normal" type="1"><li>
            <t>Extract the persistent device identifier from the device's certificate.</t>
          </li>
          <li>
            <t>Store or update the identifier in association with the device's current
Calling-Station-Id (MAC address) for correlation purposes.</t>
          </li>
          <li>
            <t>Include the Persistent-Device-Id attribute in the Access-Accept message.</t>
          </li>
        </ol>
      </section>
      <section anchor="correlation-and-retrieval">
        <name>Correlation and Retrieval</name>
        <t>When a RADIUS server receives an Access-Request and the Calling-Station-Id does
not match any stored device record, but the device authenticates via a
certificate-based method, the server SHOULD attempt to correlate the request
with an existing Persistent-Device-Id by extracting the identifier from the
certificate and looking up the stored records.</t>
        <t>The primary identity correlation source is the device certificate. If the
authentication method is certificate-based (e.g., EAP-TLS, EAP-TTLS, TEAP), the
server extracts the persistent device identifier from the certificate and
uses it to look up an existing device record. If a matching record is found,
the server associates the new MAC address with the existing record.</t>
        <t>Note: External device management systems (e.g., MDM) provision the persistent
identifier into the device's certificate during enrollment. The identifier
reaches the RADIUS server through the certificate-based authentication
exchange, not through a separate channel. Therefore, MDM-managed devices are
covered by the certificate-based extraction above.</t>
        <t>For authentication methods that do not involve certificates (e.g., MAB,
credential-based EAP methods, guest access), no persistent device identifier
is available in the authentication exchange. In these cases, the RADIUS server
does not assign a Persistent-Device-Id, and MAC address randomization continues
to result in separate device records per MAC address.</t>
        <t>This document does not define alternative mechanisms for persistent device
identification in non-certificate-based authentication scenarios. Such
mechanisms are outside the scope of this specification.</t>
        <t>If the extracted identifier matches an existing record, the server MUST:</t>
        <ol spacing="normal" type="1"><li>
            <t>Associate the new Calling-Station-Id (MAC address) with the existing
Persistent-Device-Id record.</t>
          </li>
          <li>
            <t>Include the existing Persistent-Device-Id in the Access-Accept message.</t>
          </li>
        </ol>
        <t>If the device authenticates via a non-certificate-based method, or if the
certificate does not contain a persistent device identifier, the server
MUST NOT include a Persistent-Device-Id attribute in the Access-Accept.</t>
      </section>
      <section anchor="immutability">
        <name>Immutability</name>
        <t>The Persistent-Device-Id value is determined by the identifier provisioned in
the device's certificate. It MUST NOT be modified by the RADIUS server. If
administrative action requires re-identification of a device (e.g., device
decommissioning and re-enrollment), a new certificate with a new identifier
must be provisioned to the device. The old identifier MUST be retired and MUST
NOT be reassigned to a different device.</t>
      </section>
      <section anchor="uniqueness">
        <name>Uniqueness</name>
        <t>The persistent device identifier provisioned in each device's certificate MUST
be globally unique. The enrollment system (MDM or NAC registration portal) is
responsible for ensuring uniqueness during certificate provisioning. The use of
UUID version 4 with a CSPRNG during provisioning provides sufficient uniqueness
guarantees.</t>
      </section>
      <section anchor="concurrency">
        <name>Concurrency</name>
        <t>In deployments where multiple RADIUS server instances process authentication
requests concurrently, implementations MUST ensure that the extracted
Persistent-Device-Id and its associated MAC address mappings are consistently
replicated across all server instances. Since the identifier originates from
the certificate (not generated by the server), concurrency risks are limited
to MAC address association updates.</t>
        <t>Recommended approaches include:
1. Advisory locking on the Calling-Station-Id or identity correlation key before
checking for existing assignments.
1. A check-then-act pattern with lock acquisition: acquire lock, re-query for
existing assignment, create if absent, release lock.
1. Distributed coordination across server instances in clustered deployments.
The lock hold time SHOULD NOT exceed 5 seconds to prevent processing delays.</t>
      </section>
      <section anchor="nad-and-platform-integration">
        <name>NAD and Platform Integration</name>
        <t>After receiving the Persistent-Device-Id in the Access-Accept message, the
Network Access Device (NAD) associates the identifier with the client session.
This enables several downstream use cases beyond the RADIUS exchange itself:</t>
        <ol spacing="normal" type="1"><li>
            <t>Client Session Correlation: The NAD maintains a mapping between the
Persistent-Device-Id and the current client session. When the device
reconnects with a different randomized MAC address, the NAD can correlate
the new session with previous sessions for the same device, preserving
continuity for session logs, QoS policies, and access control lists.</t>
          </li>
          <li>
            <t>Device Profiling and Fingerprinting: The NAD or RADIUS server can share
the Persistent-Device-Id with endpoint analytics and profiling systems.
These systems build device fingerprint profiles -- aggregating attributes
such as DHCP options, HTTP user-agent, and CDP/LLDP data -- indexed by the
persistent identifier rather than the transient MAC address. This ensures
profiling data survives MAC rotation.</t>
          </li>
          <li>
            <t>Location and Presence Analytics: The NAD can include the
Persistent-Device-Id in location telemetry messages (e.g., via streaming
telemetry or location service protocols) sent to location analytics
platforms. This allows location services to track device presence and
movement patterns using a stable identifier, even as the MAC address
changes between sessions.</t>
          </li>
          <li>
            <t>Cross-Platform Distribution: The RADIUS server or NAD can distribute the
Persistent-Device-Id to network management, assurance, and third-party
platforms through integration mechanisms such as publish-subscribe
frameworks, REST APIs, or event streaming. This enables a consistent device
identity across the ecosystem of network services -- including compliance
engines, network assurance dashboards, and third-party security tools --
without requiring each platform to independently resolve MAC address
changes.</t>
          </li>
        </ol>
        <t>In all cases, the Persistent-Device-Id MUST be treated with the same access
control and privacy protections described in this specification. Platforms
receiving the identifier MUST NOT expose it to entities outside the
administrative domain without explicit device owner consent.</t>
      </section>
    </section>
    <section anchor="usage-in-radius-messages">
      <name>Usage in RADIUS Messages</name>
      <section anchor="access-accept">
        <name>Access-Accept</name>
        <t>When a RADIUS server extracts a Persistent-Device-Id from a device's
certificate during authentication, it SHOULD include the Persistent-Device-Id
attribute in the Access-Accept message sent to the RADIUS client (authenticator).</t>
        <figure anchor="figaccess-accept">
          <name>Persistent Device ID in Access Accept</name>
          <artwork><![CDATA[
RADIUS Server                          RADIUS Client
     |                                        |
     |<--- Access-Request --------------------|
     |     (Calling-Station-Id = random MAC)  |
     |                                        |
     |  [Correlate or assign PDID]            |
     |                                        |
     |---- Access-Accept -------------------->|
     |     (Persistent-Device-Id = UUID)      |
     |     (other authorization attributes)   |
     |                                        |

]]></artwork>
        </figure>
      </section>
      <section anchor="accounting-request">
        <name>Accounting-Request</name>
        <t>When a RADIUS client has received a Persistent-Device-Id in an Access-Accept,
it SHOULD include the Persistent-Device-Id attribute in all subsequent
Accounting-Request messages (Accounting-Start, Interim-Update, and
Accounting-Stop) for that session.</t>
        <t>This enables the RADIUS server to correlate accounting records across sessions
where the Calling-Station-Id may differ due to MAC address randomization.</t>
        <figure anchor="figaccounting-request">
          <name>Persistent Device ID in Accounting Request</name>
          <artwork><![CDATA[
RADIUS Client                          RADIUS Server
     |                                       |
     |---- Accounting-Request (Start) ------>|
     |     (Calling-Station-Id = MAC_1)      |
     |     (Persistent-Device-Id = UUID_A)   |
     |                                       |
     |     [Device reconnects with new MAC]  |
     |                                       |
     |---- Accounting-Request (Start) ------>|
     |     (Calling-Station-Id = MAC_2)      |
     |     (Persistent-Device-Id = UUID_A)   |
     |                                       |

]]></artwork>
        </figure>
        <t>The RADIUS server can now correlate both sessions as belonging to the same
device (UUID_A) despite different MAC addresses.</t>
      </section>
      <section anchor="coa-request">
        <name>CoA-Request</name>
        <t>A RADIUS server MAY include the Persistent-Device-Id attribute in a
Change-of-Authorization (CoA) Request RFC5176 to identify the target device
session. The RADIUS client MUST use the Persistent-Device-Id, if present, to
identify the session to which the CoA applies, in preference to
Calling-Station-Id when both are present.</t>
      </section>
      <section anchor="Access-Request">
        <name>Access-Request</name>
        <t>The Persistent-Device-Id attribute MUST NOT appear in Access-Request messages.
The identifier is extracted from the device's certificate by the RADIUS server
during authentication processing, not supplied by the RADIUS client.</t>
        <t>Exception: If a RADIUS client has cached a Persistent-Device-Id from a
previous Access-Accept for the same device, and the server's deployment
policy explicitly permits it, the client MAY include the cached
Persistent-Device-Id in the Access-Request as a hint to assist correlation.
When present in an Access-Request, the server MUST validate the hint against
its own records and MUST NOT trust it as authoritative.</t>
      </section>
      <section anchor="access-reject-and-access-challenge">
        <name>Access-Reject and Access-Challenge</name>
        <t>The Persistent-Device-Id attribute MUST NOT appear in Access-Reject or
Access-Challenge messages. A Persistent-Device-Id is only included upon
successful certificate-based authentication where the certificate contains a
valid persistent device identifier.</t>
      </section>
    </section>
    <section anchor="interaction-with-existing-attributes">
      <name>Interaction with Existing Attributes</name>
      <section anchor="calling-station-id-type-31">
        <name>Calling-Station-Id (Type 31)</name>
        <t>The Persistent-Device-Id attribute supplements but does not replace
Calling-Station-Id. The Calling-Station-Id continues to carry the MAC address
(randomized or not) as observed by the RADIUS client. Systems that need the
current MAC address for network-level operations (e.g., VLAN assignment, ACL
application) continue to use Calling-Station-Id for that purpose.</t>
        <t>The Persistent-Device-Id provides the stable device-level correlation that
Calling-Station-Id can no longer guarantee.</t>
      </section>
      <section anchor="user-name-type-1">
        <name>User-Name (Type 1)</name>
        <t>The Persistent-Device-Id identifies a device, not a user. A single User-Name
may be associated with multiple Persistent-Device-Id values (one per device),
and a single Persistent-Device-Id MAY be associated with multiple User-Name
values (if different users authenticate on the same device).</t>
      </section>
      <section anchor="acct-session-id-type-44">
        <name>Acct-Session-Id (Type 44)</name>
        <t>The Acct-Session-Id attribute identifies a single session. The
Persistent-Device-Id identifies the device across sessions. Together,
they enable both session-level and device-level accounting correlation.</t>
      </section>
      <section anchor="chargeable-user-identity-rfc4372">
        <name>Chargeable-User-Identity <xref target="RFC4372"/></name>
        <t>The Chargeable-User-Identity (CUI) attribute defined in <xref target="RFC4372"/> provides a
stable user-level identity for inter-domain roaming and billing. While both
CUI and Persistent-Device-Id carry opaque identifiers in RADIUS messages, they
serve fundamentally different purposes and cannot be used interchangeably. The
key differences are:</t>
        <ol spacing="normal" type="1"><li>
            <t>Semantic Scope: CUI identifies a user (or chargeable entity) for billing
purposes. Persistent-Device-Id identifies a physical device. These are
orthogonal concepts: a single user may own multiple devices (each requiring
a distinct Persistent-Device-Id), and a shared device may authenticate multiple
users (each receiving a distinct CUI). Overloading one attribute to serve
both purposes would create ambiguity and prevent independent user and device correlation.</t>
          </li>
          <li>
            <t>Identifier Origin: CUI is generated by the home RADIUS server as an opaque
token. Persistent-Device-Id is extracted from the device's certificate (SAN
URI field), provisioned by the enrollment system. The RADIUS server does not
generate the Persistent-Device-Id; it reads it from the certificate presented
during certificate-based EAP authentication. These are different data flows requiring
different handling semantics.</t>
          </li>
          <li>
            <t>Binding Lifetime: RFC 4372 explicitly states that the CUI binding
"should be temporary -- long enough to be useful for the external applications
and not too long such that it can be used to identify the user." A typical CUI
lifetime is one billing period. In contrast, the Persistent-Device-Id MUST
remain stable for the entire duration the device's certificate is valid,
potentially spanning years, to enable persistent device identification
across MAC address changes.</t>
          </li>
          <li>
            <t>Deployment Scope: CUI is designed for cross-network roaming scenarios
involving visited and home networks with intermediary proxies.
Persistent-Device-Id is scoped to a single administrative domain for NAC,
compliance, and audit purposes. A deployment may legitimately need both
attributes simultaneously -- CUI for roaming billing and Persistent-Device-Id
for device identification -- in the same RADIUS message.</t>
          </li>
          <li>
            <t>Opaqueness Constraint: <xref target="RFC4372"/> mandates that "RADIUS entities other than
the Home RADIUS server MUST treat the CUI content as an opaque token, and
SHOULD NOT perform operations on its content other than a binary equality
comparison test." Any scheme to differentiate user vs. device identity within a
CUI value (e.g., using a class prefix or structured encoding) would require
intermediaries to inspect and interpret CUI content, directly violating this
requirement.</t>
          </li>
        </ol>
        <t>In roaming scenarios, both CUI and Persistent-Device-Id MAY be present in the
same RADIUS message, providing independent user-level and device-level
correlation without ambiguity or attribute overloading.</t>
      </section>
      <section anchor="eap-message-type-79">
        <name>EAP-Message (Type 79)</name>
        <t>When certificate-based EAP authentication is used (e.g., EAP-TLS, EAP-TTLS,
TEAP), the device's certificate is the source of the Persistent-Device-Id.
The RADIUS server extracts the identifier from the certificate during the
EAP exchange and includes it in the Access-Accept. This is the primary and
intended use case for this specification.</t>
      </section>
    </section>
    <section anchor="operational-considerations">
      <name>Operational Considerations</name>
      <section anchor="replication">
        <name>Replication</name>
        <t>In deployments with multiple RADIUS servers, the Persistent-Device-Id
assignments and the associated MAC address mappings MUST be replicated across
all servers. This ensures that a device authenticating to any server in the
deployment receives the same Persistent-Device-Id.</t>
        <t>The replication mechanism is implementation-specific and outside the scope of
this document. Implementations SHOULD provide eventual consistency with a
convergence time appropriate for the deployment's authentication rate.</t>
      </section>
      <section anchor="proxy-environments">
        <name>Proxy Environments</name>
        <t>When a RADIUS proxy forwards an Access-Request to an upstream RADIUS server,
and the upstream server includes a Persistent-Device-Id in the Access-Accept,
the proxy MUST forward the Persistent-Device-Id attribute to the RADIUS client
without modification.</t>
        <t>A RADIUS proxy MUST NOT modify or strip Persistent-Device-Id attributes. The
identifier originates from the device's certificate and is extracted by the
authoritative RADIUS server. Proxies that forward Access-Accept messages MUST
pass the attribute through unchanged.</t>
      </section>
      <section anchor="incremental-deployment">
        <name>Incremental Deployment</name>
        <t>RADIUS clients that do not support the Persistent-Device-Id attribute will
ignore it in Access-Accept messages per standard RADIUS behavior (unknown
attributes are silently discarded). This allows incremental deployment where
RADIUS servers begin including the attribute before all clients are upgraded.</t>
      </section>
      <section anchor="pre-existing-device-records">
        <name>Pre-Existing Device Records</name>
        <t>When a RADIUS server implementing this specification receives an Access-Request
for a device that has an existing record (created before Persistent-Device-Id
support was deployed), and the device authenticates via a certificate containing
a persistent identifier, the server SHOULD:</t>
        <ol spacing="normal" type="1"><li>
            <t>Extract the Persistent-Device-Id from the certificate and associate it with
the existing device record.</t>
          </li>
          <li>
            <t>Associate it with the existing device record, preserving all historical data.</t>
          </li>
          <li>
            <t>Include the Persistent-Device-Id in the Access-Accept.</t>
          </li>
        </ol>
        <t>This provides a seamless deployment path for existing deployments.</t>
      </section>
      <section anchor="mixed-mode-operation">
        <name>Mixed-Mode Operation</name>
        <t>During deployment, some device records will have Persistent-Device-Id values
and some will not. Implementations MUST support lookups by both
Calling-Station-Id (for legacy records) and Persistent-Device-Id
(for migrated records) until deployment is complete.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <section anchor="identifier-provisioning">
        <name>Identifier Provisioning</name>
        <t>The Persistent-Device-Id is provisioned into the device's certificate by the
enrollment system (MDM or NAC registration portal) during device onboarding.
The enrollment system MUST use a Cryptographically Secure Pseudo-Random Number
Generator (CSPRNG) when generating the identifier to ensure unpredictability.
Use of predictable or sequential identifiers would allow an attacker to
enumerate devices or anticipate future identifiers. The RADIUS server does
not generate identifiers; it extracts them from certificates presented
during authentication.</t>
      </section>
      <section anchor="transport-security">
        <name>Transport Security</name>
        <t>The Persistent-Device-Id benefits from two layers of transport protection.
First, the identifier value originates from the device's certificate, which is
exchanged inside the encrypted EAP tunnel (e.g., EAP-TLS, EAP-TTLS, TEAP)
between the supplicant and the RADIUS server. This ensures the identifier
is never transmitted in cleartext over the air (wireless) or on the wire
(wired), and is not visible to passive observers, neighboring devices, or
any entity not party to the authenticated EAP session. This is in stark
contrast to the MAC address, which appears in plaintext in every Layer 2
frame header. Second, the Persistent-Device-Id RADIUS attribute is carried
within RADIUS messages between the server and the authenticator, protected
by the RADIUS shared secret mechanism or, for stronger security, by
RADIUS/TLS (RadSec) <xref target="I-D.ietf-radext-radiusdtls-bis"/>.</t>
        <t>For deployments requiring stronger transport security, RADIUS/TLS (RadSec)
<xref target="I-D.ietf-radext-radiusdtls-bis"/> SHOULD be used.
<xref target="I-D.ietf-radext-deprecating-radius"/> further deprecates RADIUS over UDP and
MD5-based security mechanisms, mandating TLS-based transport for all RADIUS
deployments. When RadSec is in use, the Persistent-Device-Id receives the
same TLS protection as all other RADIUS attributes.</t>
      </section>
      <section anchor="access-control">
        <name>Access Control</name>
        <t>The Persistent-Device-Id mapping table (associating UUIDs with MAC addresses
and device attributes) contains sensitive information. Access to this table
MUST be restricted to authorized administrators and audit systems. All access
to the mapping table SHOULD be logged.</t>
      </section>
      <section anchor="identifier-spoofing">
        <name>Identifier Spoofing</name>
        <t>If the Access-Request hint mechanism <xref target="Access-Request"/> is implemented, the
RADIUS server MUST validate any client-provided Persistent-Device-Id against
its authoritative records. A RADIUS client MUST NOT be trusted as the source
of truth for Persistent-Device-Id values.</t>
      </section>
      <section anchor="replay-protection">
        <name>Replay Protection</name>
        <t>The Persistent-Device-Id does not introduce new replay attack vectors beyond
those inherent in the RADIUS protocol. Standard RADIUS replay protections
(Request Authenticator, Message-Authenticator attribute <xref target="RFC3579"/>) apply.</t>
      </section>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <section anchor="persistent-identification">
        <name>Persistent Identification</name>
        <t>The Persistent-Device-Id is explicitly designed to enable persistent device
identification within an administrative domain. This is its intended purpose
for NAC, compliance, and auditing. However, this capability must be balanced
against user privacy expectations.</t>
      </section>
      <section anchor="scope-limitation">
        <name>Scope Limitation</name>
        <t>The Persistent-Device-Id SHOULD be scoped to a single administrative domain. A
Persistent-Device-Id assigned by one organization's RADIUS server MUST NOT be
shared with other organizations without explicit user consent, except as
required by applicable law.</t>
      </section>
      <section anchor="data-retention">
        <name>Data Retention</name>
        <t>Organizations deploying Persistent-Device-Id SHOULD establish data retention
policies that define:
1. Maximum retention period for Persistent-Device-Id records.
1. Procedures for deleting Persistent-Device-Id records when a device is
decommissioned.
1. Procedures for honoring data deletion requests from device owners, where
required by applicable privacy regulations (e.g., GDPR Article 17, <xref target="GDPR"/>).</t>
      </section>
      <section anchor="relationship-to-mac-randomization-goals">
        <name>Relationship to MAC Randomization Goals</name>
        <t>MAC address randomization was introduced to prevent cross-network tracking of
devices at Layer 2. A key privacy concern is whether introducing a
Persistent-Device-Id undermines the privacy benefits of MAC randomization.
This specification preserves MAC randomization privacy because the
Persistent-Device-Id value originates from the device certificate exchanged
within the encrypted EAP tunnel during certificate-based authentication, and
the RADIUS attribute is carried only in RADIUS messages protected by
RADIUS/TLS. Unlike the MAC address, which
is transmitted in plaintext in Layer 2 frames and is visible to any passive
observer on the wireless medium or local network segment, the
Persistent-Device-Id is never exposed in cleartext over the air or on the wire.
Specifically:</t>
        <ol spacing="normal" type="1"><li>
            <t>Transport Protection: The Persistent-Device-Id value originates from the
device's certificate, which is exchanged within the encrypted EAP tunnel
(e.g., EAP-TLS, EAP-TTLS, TEAP). The TLS handshake encrypts the certificate
exchange, ensuring the identifier is never visible to passive observers,
neighboring devices, or any entity not participating in the authenticated
session. The Persistent-Device-Id RADIUS attribute is then carried in RADIUS
messages protected by the shared secret or by RADIUS/TLS. In contrast, the MAC address is present in every Layer 2
frame header in plaintext and can be captured by any device within radio range
(wireless) or on the same network segment (wired). MAC randomization exists
precisely because the MAC address lacks this transport protection. The
Persistent-Device-Id does not share this vulnerability.</t>
          </li>
          <li>
            <t>Explicit Enrollment and Consent: The Persistent-Device-Id is only present on
devices that have been explicitly enrolled through an MDM system or NAC
registration portal. The device owner or administrator has voluntarily
provisioned the certificate containing the identifier. This is fundamentally
different from MAC address tracking, which occurs without the device owner's
knowledge or consent. Unenrolled devices (guest, BYOD without certificates) are
not affected by this specification and continue to benefit fully from MAC
randomization privacy.</t>
          </li>
          <li>
            <t>Domain-Scoped Visibility: The Persistent-Device-Id is scoped to the
administrative domain that provisioned the certificate. It is visible only to
the RADIUS server and the authenticator within that domain. It cannot be used
for cross-network tracking because external networks never see the identifier
-- it is not broadcast, not included in probe requests, and not present in any
Layer 2 frame. The MAC address, even when randomized, is visible to every
network the device encounters. The Persistent-Device-Id has strictly
narrower visibility than even a randomized MAC address.</t>
          </li>
          <li>
            <t>RADIUS Transport Encryption: When the Persistent-Device-Id is included in
the RADIUS Access-Accept message from the server to the authenticator,
it is protected by the RADIUS shared secret mechanism. For deployments requiring
stronger protection, RADIUS/TLS (RadSec) <xref target="I-D.ietf-radext-radiusdtls-bis"/>
provides full encryption of the RADIUS transport. Together, the encrypted
EAP tunnel protects the certificate exchange (device to server), and
RADIUS/TLS protects the attribute transport (server to authenticator),
ensuring the identifier is never exposed in cleartext at any point.</t>
          </li>
        </ol>
        <t>Organizations MUST NOT use the Persistent-Device-Id to correlate device
activity across independent administrative domains unless the device owner has
provided explicit consent.</t>
      </section>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <section anchor="radius-attribute-type">
        <name>RADIUS Attribute Type</name>
        <t>This document requests IANA to allocate a new RADIUS Attribute Type from the
"RADIUS Attribute Types" registry (https://www.iana.org/assignments/radius-types/):</t>
        <table>
          <thead>
            <tr>
              <th align="left">Type</th>
              <th align="left">Name</th>
              <th align="left">Data Type</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">TBD1</td>
              <td align="left">Persistent-Device-Id</td>
              <td align="left">string</td>
              <td align="left">[this document]</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC2865">
          <front>
            <title>Remote Authentication Dial In User Service (RADIUS)</title>
            <author fullname="C. Rigney" initials="C." surname="Rigney"/>
            <author fullname="S. Willens" initials="S." surname="Willens"/>
            <author fullname="A. Rubens" initials="A." surname="Rubens"/>
            <author fullname="W. Simpson" initials="W." surname="Simpson"/>
            <date month="June" year="2000"/>
            <abstract>
              <t>This document describes a protocol for carrying authentication, authorization, and configuration information between a Network Access Server which desires to authenticate its links and a shared Authentication Server. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2865"/>
          <seriesInfo name="DOI" value="10.17487/RFC2865"/>
        </reference>
        <reference anchor="RFC2866">
          <front>
            <title>RADIUS Accounting</title>
            <author fullname="C. Rigney" initials="C." surname="Rigney"/>
            <date month="June" year="2000"/>
            <abstract>
              <t>This document describes a protocol for carrying accounting information between a Network Access Server and a shared Accounting Server. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2866"/>
          <seriesInfo name="DOI" value="10.17487/RFC2866"/>
        </reference>
        <reference anchor="RFC3579">
          <front>
            <title>RADIUS (Remote Authentication Dial In User Service) Support For Extensible Authentication Protocol (EAP)</title>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <author fullname="P. Calhoun" initials="P." surname="Calhoun"/>
            <date month="September" year="2003"/>
            <abstract>
              <t>This document defines Remote Authentication Dial In User Service (RADIUS) support for the Extensible Authentication Protocol (EAP), an authentication framework which supports multiple authentication mechanisms. In the proposed scheme, the Network Access Server (NAS) forwards EAP packets to and from the RADIUS server, encapsulated within EAP-Message attributes. This has the advantage of allowing the NAS to support any EAP authentication method, without the need for method- specific code, which resides on the RADIUS server. While EAP was originally developed for use with PPP, it is now also in use with IEEE 802. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3579"/>
          <seriesInfo name="DOI" value="10.17487/RFC3579"/>
        </reference>
        <reference anchor="RFC5176">
          <front>
            <title>Dynamic Authorization Extensions to Remote Authentication Dial In User Service (RADIUS)</title>
            <author fullname="M. Chiba" initials="M." surname="Chiba"/>
            <author fullname="G. Dommety" initials="G." surname="Dommety"/>
            <author fullname="M. Eklund" initials="M." surname="Eklund"/>
            <author fullname="D. Mitton" initials="D." surname="Mitton"/>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <date month="January" year="2008"/>
            <abstract>
              <t>This document describes a currently deployed extension to the Remote Authentication Dial In User Service (RADIUS) protocol, allowing dynamic changes to a user session, as implemented by network access server products. This includes support for disconnecting users and changing authorizations applicable to a user session. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5176"/>
          <seriesInfo name="DOI" value="10.17487/RFC5176"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC9562">
          <front>
            <title>Universally Unique IDentifiers (UUIDs)</title>
            <author fullname="K. Davis" initials="K." surname="Davis"/>
            <author fullname="B. Peabody" initials="B." surname="Peabody"/>
            <author fullname="P. Leach" initials="P." surname="Leach"/>
            <date month="May" year="2024"/>
            <abstract>
              <t>This specification defines UUIDs (Universally Unique IDentifiers) --
also known as GUIDs (Globally Unique IDentifiers) -- and a Uniform
Resource Name namespace for UUIDs. A UUID is 128 bits long and is
intended to guarantee uniqueness across space and time. UUIDs were
originally used in the Apollo Network Computing System (NCS), later
in the Open Software Foundation's (OSF's) Distributed Computing
Environment (DCE), and then in Microsoft Windows platforms.</t>
              <t>This specification is derived from the OSF DCE specification with the
kind permission of the OSF (now known as "The Open Group"). Information from earlier versions of the OSF DCE specification have
been incorporated into this document. This document obsoletes RFC
4122.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9562"/>
          <seriesInfo name="DOI" value="10.17487/RFC9562"/>
        </reference>
        <reference anchor="I-D.ietf-radext-radiusdtls-bis">
          <front>
            <title>RadSec: RADIUS over Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
            <author fullname="Jan-Frederik Rieckers" initials="J." surname="Rieckers">
              <organization>Deutsches Forschungsnetz | German National Research and Education Network</organization>
            </author>
            <author fullname="Margaret Cullen" initials="M." surname="Cullen">
              <organization>Painless Security</organization>
            </author>
            <author fullname="Stefan Winter" initials="S." surname="Winter">
              <organization>Fondation Restena | Restena Foundation</organization>
            </author>
            <date day="23" month="February" year="2026"/>
            <abstract>
              <t>   This document defines transport profiles for running RADIUS over
   Transport Layer Security (TLS) and Datagram Transport Layer Security
   (DTLS), allowing the secure and reliable transport of RADIUS
   messages.  RADIUS/TLS and RADIUS/DTLS are collectively referred to as
   RadSec.

   This document obsoletes RFC6614 and RFC7360, which specified
   experimental versions of RADIUS over TLS and DTLS.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-radext-radiusdtls-bis-15"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC4372">
          <front>
            <title>Chargeable User Identity</title>
            <author fullname="F. Adrangi" initials="F." surname="Adrangi"/>
            <author fullname="A. Lior" initials="A." surname="Lior"/>
            <author fullname="J. Korhonen" initials="J." surname="Korhonen"/>
            <author fullname="J. Loughney" initials="J." surname="Loughney"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>This document describes a new Remote Authentication Dial-In User Service (RADIUS) attribute, Chargeable-User-Identity. This attribute can be used by a home network to identify a user for the purpose of roaming transactions that occur outside of the home network. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4372"/>
          <seriesInfo name="DOI" value="10.17487/RFC4372"/>
        </reference>
        <reference anchor="RFC9724">
          <front>
            <title>State of Affairs for Randomized and Changing Media Access Control (MAC) Addresses</title>
            <author fullname="JC. Zúñiga" initials="JC." surname="Zúñiga"/>
            <author fullname="CJ. Bernardos" initials="CJ." role="editor" surname="Bernardos"/>
            <author fullname="A. Andersdotter" initials="A." surname="Andersdotter"/>
            <date month="March" year="2025"/>
            <abstract>
              <t>Internet users are becoming more aware that their activity over the Internet leaves a vast digital footprint, that communications might not always be properly secured, and that their location and actions can be tracked. One of the main factors that eases tracking of Internet users is the wide use of long-lasting, and sometimes persistent, identifiers at various protocol layers. This document focuses on Media Access Control (MAC) addresses.</t>
              <t>There have been several initiatives within the IETF and the IEEE 802 standards committees to address some of the privacy issues involved. This document provides an overview of these activities to help coordinate standardization activities in these bodies.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9724"/>
          <seriesInfo name="DOI" value="10.17487/RFC9724"/>
        </reference>
        <reference anchor="I-D.ietf-radext-deprecating-radius">
          <front>
            <title>Deprecating Insecure Practices in RADIUS</title>
            <author fullname="Alan DeKok" initials="A." surname="DeKok">
              <organization>InkBridge Networks</organization>
            </author>
            <date day="15" month="March" year="2026"/>
            <abstract>
              <t>   RADIUS crypto-agility was first mandated as future work by RFC 6421.
   The outcome of that work was the publication of RADIUS over TLS (RFC
   6614) and RADIUS over DTLS (RFC 7360) as experimental documents.
   Those transport protocols have been in wide-spread use for many years
   in a wide range of networks, and have recently been standardized in
   [I-D.ietf-radext-radiusdtls-bis].  TLS has proven to be a useful
   replacment for UDP (RFC 2865) and TCP (RFC 6613) transports.  With
   that knowledge, the continued use of insecure transports for RADIUS
   has serious and negative implications for privacy and security.

   The publication of the "BlastRADIUS" exploit has also shown that
   RADIUS security needs to be updated.  It is no longer acceptable for
   RADIUS to rely on MD5 for security.  It is no longer acceptable to
   send device or location information in clear text across the wider
   Internet.  This document therefore deprecates many insecure practices
   in RADIUS, and mandates support for secure TLS-based transport
   layers.  Related security issues with RADIUS are discussed, and
   recommendations are made for practices which increase both security
   and privacy.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-radext-deprecating-radius-09"/>
        </reference>
        <reference anchor="IANA-RADIUS" target="https://www.iana.org/assignments/radius-types/">
          <front>
            <title>RADIUS Attribute Types</title>
            <author initials="" surname="IANA">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="ANDROID-MAC">
          <front>
            <title>MAC Randomization Behavior</title>
            <author initials="" surname="Google">
              <organization/>
            </author>
            <date year="2023"/>
          </front>
        </reference>
        <reference anchor="APPLE-MAC">
          <front>
            <title>Use private Wi-Fi addresses on Apple devices</title>
            <author initials="" surname="Apple">
              <organization/>
            </author>
            <date year="2024"/>
          </front>
        </reference>
        <reference anchor="WINDOWS-MAC">
          <front>
            <title>MAC address randomization in Windows</title>
            <author initials="" surname="Microsoft">
              <organization/>
            </author>
            <date year="2024"/>
          </front>
        </reference>
        <reference anchor="HIPAA">
          <front>
            <title>Health Insurance Portability and Accountability Act of 1996</title>
            <author initials="U. S." surname="Department of Health and Human Services">
              <organization/>
            </author>
            <date year="1996" month="August"/>
          </front>
        </reference>
        <reference anchor="FISMA">
          <front>
            <title>Federal Information Security Modernization Act of 2014</title>
            <author initials="U. S." surname="Congress">
              <organization/>
            </author>
            <date year="2014" month="December"/>
          </front>
        </reference>
        <reference anchor="PCI-DSS">
          <front>
            <title>Payment Card Industry Data Security Standard (PCI DSS)</title>
            <author initials="" surname="PCI Security Standards Council">
              <organization/>
            </author>
            <date year="2024" month="June"/>
          </front>
        </reference>
        <reference anchor="GDPR">
          <front>
            <title>Regulation (EU) 2016/679 - General Data Protection Regulation</title>
            <author initials="" surname="European Parliament and Council">
              <organization/>
            </author>
            <date year="2016" month="April"/>
          </front>
        </reference>
        <reference anchor="IEEE80211BH" target="https://standards.ieee.org/ieee/802.11bh/10525/">
          <front>
            <title>Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications</title>
            <author initials="" surname="IEEE">
              <organization/>
            </author>
            <date year="2024"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 1315?>

<section anchor="use-case-examples">
      <name>Use Case Examples</name>
      <section anchor="byod-with-certificate-based-authentication">
        <name>BYOD with Certificate-Based Authentication</name>
        <t>A personal device is onboarded via a provisioning portal and issued a device
certificate. The certificate contains a persistent device identifier
provisioned during enrollment. The following example uses EAP-TLS, but the
same flow applies to any certificate-based EAP method (EAP-TTLS, TEAP).</t>
        <t>Step 1: Device connects with MAC_1, authenticates via certificate-based EAP
   Step 2: RADIUS server extracts Persistent-Device-Id from certificate
   Step 3: No existing record found for this identifier
   Step 4: Server stores: PDID -&gt; {MAC_1, cert identity}
   Step 5: Access-Accept includes Persistent-Device-Id = PDID</t>
        <t>[Later, device reconnects with randomized MAC_2]</t>
        <t>Step 6: Device connects with MAC_2, authenticates via certificate-based EAP
   Step 7: RADIUS server extracts same Persistent-Device-Id from certificate
   Step 8: Server finds existing record for this identifier
   Step 9: Server adds MAC_2 to the PDID record
   Step 10: Access-Accept includes same Persistent-Device-Id = PDID</t>
      </section>
      <section anchor="mdm-managed-device">
        <name>MDM-Managed Device</name>
        <t>A corporate device is enrolled in a Mobile Device Management system. The MDM
provisions a device certificate containing a persistent device identifier.</t>
        <artwork><![CDATA[
  Step 1: Device connects with MAC_1, authenticates via certificate-based EAP
  Step 2: RADIUS server extracts Persistent-Device-Id from MDM-provisioned certificate
  Step 3: No existing record found for this identifier
  Step 4: Server stores: PDID -> {MAC_1, cert identity}
  Step 5: Access-Accept includes Persistent-Device-Id = PDID

  [Later, device reconnects with randomized MAC_2]

  Step 6: Device connects with MAC_2, authenticates via certificate-based EAP
  Step 7: RADIUS server extracts same Persistent-Device-Id from certificate
  Step 8: Server finds existing record
  Step 9: Access-Accept includes same Persistent-Device-Id = PDID
]]></artwork>
      </section>
      <section anchor="accounting-correlation-across-mac-changes">
        <name>Accounting Correlation Across MAC Changes</name>
        <artwork><![CDATA[
  Session 1:
    Accounting-Start: Calling-Station-Id=MAC_1,
                      Persistent-Device-Id=UUID_A,
                      Acct-Session-Id=SES_1
    Accounting-Stop:  Calling-Station-Id=MAC_1,
                      Persistent-Device-Id=UUID_A,
                      Acct-Session-Id=SES_1

  Session 2 (same device, new MAC):
    Accounting-Start: Calling-Station-Id=MAC_2,
                      Persistent-Device-Id=UUID_A,
                      Acct-Session-Id=SES_2
    Accounting-Stop:  Calling-Station-Id=MAC_2,
                      Persistent-Device-Id=UUID_A,
                      Acct-Session-Id=SES_2

  Correlation: Sessions SES_1 and SES_2 both belong to device UUID_A
               despite different Calling-Station-Id values.
]]></artwork>
      </section>
      <section anchor="guest-access-limitations">
        <name>Guest Access Limitations</name>
        <t>For unauthenticated guest access (e.g., open hotspot), no identity correlation
source is available. In this scenario:
      Step 1: Device connects with MAC_1, no certificate-based authentication
      Step 2: RADIUS server has no certificate to extract identifier from
      Step 3: No Persistent-Device-Id included in Access-Accept
      Step 4: Device is treated as a new endpoint keyed by MAC_1</t>
        <artwork><![CDATA[
  [Device reconnects with randomized MAC_2, no certificate-based authentication]

  Step 5: Server has no way to correlate MAC_2 with MAC_1
  Step 6: Device is treated as a new endpoint keyed by MAC_2
]]></artwork>
        <t>This limitation is inherent: without an identity assertion from the device,
persistent identification across MAC changes is not possible without resorting
to fingerprinting techniques that undermine the privacy goals of MAC
randomization.</t>
      </section>
    </section>
    <section numbered="false" anchor="Changelog">
      <name>Changelog</name>
      <ul spacing="normal">
        <li>
          <t>0 - initial draft.</t>
        </li>
      </ul>
    </section>
    <section numbered="false" anchor="Acknowledgements">
      <name>Acknowledgements</name>
      <t>The authors thank Suresh Krishnan, Juan Carlos Zuniga, Jerome Henry,
Mark Grayson, and Eric Vyncke for their valuable technical review, feedback,
and contributions to the development of this specification.</t>
      <t>The authors acknowledge the work of the IETF MADINAS working group in
documenting the impacts of MAC address randomization, which motivated this
specification.</t>
      <t>Disclosure of AI Use: The authors used AI-assisted tools for drafting and
language editing of this document. All technical concepts and protocol
specifications presented are the original intellectual contributions of the
authors, developed through years of hands-on engineering work on network
access control systems. The authors reviewed, edited, and verified all content
and take full responsibility for the accuracy and integrity of this publication.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
