I have reviewed this document as part of the Operational directorate’s ongoing effort to review all IETF documents being processed by the IESG.  These comments were written with the intent of improving the operational aspects of the IETF drafts. Comments that are not addressed in last call may be included in AD reviews during the IESG review.  Document editors and WG chairs should treat these comments just like any other last call comments. Document reviewed:  draft-ietf-ace-usecases-09 Status: Ready Summary: This document includes a collection of representative use cases for authentication and authorization in constrained environments.  These use cases aim at identifying authorization problems that arise during the lifecycle of a constrained device and are intended to provide a guideline for developing a comprehensive authentication and authorization solution for this class of scenarios. The document is informational and does not define something that needs an operational or management review.  Mahesh Jethanandani mjethanandani at gmail.com