This document proposes an architecture for authorization in constrained environments. It defines three levels - constrained, less-constrained, and principal. The constrained level consists of clients and resource servers with limited capabilities. The less-constrained level includes client and authorization servers with more capabilities. The principal level defines resource owners and requesting parties. It also outlines protocols, authorization granularity levels, and tasks related to authorization and authentication in constrained networks.