This document defines how to use the Authentication and Authorization for Constrained Environments (ACE) framework to distribute keying