Self-issued Identifier: Difference between revisions

From IDESG Wiki
Jump to navigation Jump to search
Line 18: Line 18:
# The Subject ID (sub) could be freed from the limitations described above and take its traditional unstructured format.
# The Subject ID (sub) could be freed from the limitations described above and take its traditional unstructured format.
# The Persistent User ID (puid) could be made mandatory in a new spec that included other information on the need for key recovery, reissue and roll-over. Those process would be spelled out in some detail.
# The Persistent User ID (puid) could be made mandatory in a new spec that included other information on the need for key recovery, reissue and roll-over. Those process would be spelled out in some detail.
## The id_token could be further described for optional
## The id_token could be further described for optional Client Bound End-User Assertion (see reference below) in place of the traditional Bearer Token.


==References==
==References==

Revision as of 19:11, 18 June 2020

Full Title or Meme

This Wiki Page was created to track the use of Self-issued Identifier in the Identity Ecosystem.

Context

  • This wiki is focused on the use case of a Self-issued Identifier in a mobile device. It is recognized that other use cases also exist, but it seems that this use case covers all the issues.
  • With the rise of the W3C program on Decentralized Identifiers, there is a need for the Identity Ecosystem to coordinate with other teams developing this technology.
  • At the 2020-06-16 meeting of the FIRE WG a liaison effort was approved. That effort is tracked here.

History

  • The [OpenID Connect Core 1.0 was issued on 2018-11-08 with section 7 covering self-issued ID. Initial uptake was minimal.
  • The Subject ID (SUB) was redefined for that section as "the base64url encoded representation of the thumbprint of the key in the sub_jwk Claim. This thumbprint value is computed as the SHA-256 hash of the octets of the UTF-8 representation of a JWK constructed containing only the REQUIRED members to represent the key, with the member names sorted into lexicographic order, and with no white space or line breaks."

Problems

  • The current work of the Decentralized Identifiers has proceed with little concern for how it might integrate with existing Identity Ecosystems.
  • Self-issued Identifiers of all types depend on secret values held by the user in portable protected storage, for example a smartphone or WebAuthn key.
  • If the user's hardware device is stolen or disable, the recover of the user's identifier can be a challenge which could turn into a UX nightmare if not handled well.
  • In particular the SIOP program has been developing standards which look a lot like the DIA and other work in the Kantara work groups without any coordination.

Solutions

  1. The Subject ID (sub) could be freed from the limitations described above and take its traditional unstructured format.
  2. The Persistent User ID (puid) could be made mandatory in a new spec that included other information on the need for key recovery, reissue and roll-over. Those process would be spelled out in some detail.
    1. The id_token could be further described for optional Client Bound End-User Assertion (see reference below) in place of the traditional Bearer Token.

References