Skip to content
Open
Changes from 1 commit
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
8 changes: 7 additions & 1 deletion openid-connect-ephemeral-subject-identifier-1_0.md
Original file line number Diff line number Diff line change
Expand Up @@ -53,7 +53,13 @@ The OpenID Foundation (OIDF) promotes, protects and nurtures the OpenID communit
{mainmatter}

# Introduction
This document specifies an ephemeral subject identifier type for [OpenID Connect Core 1.0][OIDC]. The ephemeral subject identifier identifies the End-User for a short time and remains constant for the duration of the authentication session. In subsequent visits by the End-User to a Relying Party application that requires authentication, the authorization server will return a subject identifier with a different value. The authorization server provides an ephemeral subject identifier to the Relying Party in the ID Token and UserInfo endpoint response as specified by [OpenID Connect Core 1.0][OIDC].
This document specifies an ephemeral subject identifier type for [OpenID Connect Core 1.0][OIDC]. The ephemeral subject identifier identifies the End-User for a short time and remains constant for the duration of the authentication session. In subsequent visits by the End-User to a Relying Party application that requires authentication, the authorization server will return a subject identifier with a different value. The authorization server provides an ephemeral subject identifier to the Relying Party in the ID Token and UserInfo endpoint response as specified by [OpenID Connect Core 1.0][OIDC].

There are several reasons for defining it:
* It is already used in some ecosystems. Standardizing it would therefore reduce existing variations;
* It is a condition needed to mathematically prove OIDC/SIOP to fulfil the Unlinkability Level (UL) 3A+ defined in ISO/IEC 27551 Information security, cybersecurity and privacy protection — Requirements for attribute-based unlinkable entity authentication.

Examples of attribute-based unlinkable entity authentication include Overage verification, Underage verification, Registered domicile verification, etc.


# Requirements Notation and Conventions
Expand Down
Loading