<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.11 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-sbriz-identity-trust-system-01" category="std" consensus="true" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.21.0 -->
  <front>
    <title abbrev="Identity Trust">Identity Trust System</title>
    <seriesInfo name="Internet-Draft" value="draft-sbriz-identity-trust-system-01"/>
    <author initials="L." surname="Sbriz" fullname="Luigi Sbriz">
      <organization>Cybersecurity &amp; Privacy Senior Consultant</organization>
      <address>
        <email>luigi@sbriz.eu</email>
      </address>
    </author>
    <date year="2024" month="April" day="28"/>
    <area>SEC</area>
    <workgroup>Web Authorization Protocol</workgroup>
    <abstract>
      <?line 75?>

<t>This document describes the identity trust system, which is an open identity authentication system that requires no federation of authentication domains. It is based on a symmetric authentication protocol and a specific infrastructure based on trust in Identity Providers (IdPs). Below are the main components of the authentication process between two entities.</t>
      <ol spacing="normal" type="1"><li>
          <t>Symmetric authentication protocol - Both entities must recognize each other and are authenticated by their identity provider according to a symmetric message exchange scheme. It builds on and extends the OAuth Authorization Framework RFC6749.</t>
        </li>
        <li>
          <t>Trustees' network - A special network, dedicated to creating a protected environment for exchanging authentication messages between IdPs, constitutes the infrastructure to avoid domain federation.</t>
        </li>
        <li>
          <t>Custodian concept - IdPs are divided into two typologies to better protect personal data and link digital identity to physical one. A generic IdP (called trustee) to manage digital authentication only and a specific IdP (called custodian), with the legal right to process the individual's real data and under the control of country's authority, to manage the physical identity and the link with the digital one.</t>
        </li>
      </ol>
    </abstract>
  </front>
  <middle>
    <?line 83?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The typical model of access to Internet protected resources requires that the identity of the user, i.e. the <strong><em>resource owner</em></strong>, be authenticated by the resource manager, i.e. the <strong><em>service provider</em></strong>. The authentication process is not the primary task of the service provider and therefore can be entrusted to a third party shared between the user and the service provider, known as an <strong><em>identity provider</em></strong>. A popular authentication mechanism is defined by <xref target="RFC6749"/>.</t>
      <t>This mechanism is asymmetric, only the resource owner must be recognized but not vice versa. Furthermore, the digital identity has value only within the digital ecosystem of the identity provider, i.e. its authentication domain or in a set of domains in a relationship of trust between them. It follows that when the digital ecosystem changes, the resource owner needs a new user to be recognized in the new digital environment. Instead, with a symmetric authentication scheme, the new user is no longer necessary. Moreover, it is not even necessary to create a trust relationship between domains. Trust is assigned only to the entity that guarantees identity authentication process, i.e. the identity provider that guarantees the inviolability and truthfulness of the authentication messages exchanged.</t>
      <t>The concept used to build symmetric authentication is the request for equal dignity in recognition, i.e. each entity must be recognized by the other. To achieve this equal relationship, an identity recognition process based on a mirrored sequence of messages exchanged is necessary. Consequently, basing this symmetric process on the trust assigned to the identity provider has a great advantage, it is no longer necessary to define a specific trust between domains or create new users to be able to operate in an ecosystem different from that of belonging.</t>
      <t>To implement this solution it is necessary to modify the authentication protocol to support the symmetric exchange of identification messages, and also implement a similar message exchange mechanism between identity providers. For security reasons, an infrastructure dedicated to identity providers is required. Furthermore, dividing IdPs into two categories reduces the amount of personal data used in registrations. The first category will be made up of those who are only authorized to recognize digital identity. The second category consists of those with the legal authority to also manage the real identity. The second category will act as a guarantor of the authenticity of the identity used in registration on the providers of the first category.</t>
      <section anchor="use-cases-of-both-authentication-schemes">
        <name>Use cases of both authentication schemes</name>
        <t>Figure 1 depicts the use case of the classic identity recognition method with asymmetry in the process of exchanging authentication messages <xref target="RFC6749"/>. A SVG image is available <eref target="https://raw.githubusercontent.com/Luigi-Sbriz/identity/main/images/1_Asymmetric-depiction.svg">here</eref>. The scenario depicted represents a resource owner who needs to retrieve a resource from the service provider. The identity provider <bcp14>MUST</bcp14> verify the identity of the resource owner before accessing the resource server. The relying party who manages the resource does not provide any information about its identity, it provides the resource only to authorized requests.</t>
        <artwork><![CDATA[
                  ┌───────────┐
                  │Identity   │
                  │           │
                  │Provider   │
                  └─────┬─────┘
                Digital │ecosystem
               .........│..............................
               :  ┌─────┴─────┐                       :
               :  │Authorizati│                       :
               :  │           ├──────────────┐        :
               :  │on Server  │              │        :
               :  └─────┬─────┘              │        :
               :        │                    │        :
               :        │                    │        :
┌───────────┐  :  ┌─────┴─────┐        ┌─────┴─────┐  :  ┌───────────┐
│Resource   │  :  │User       │        │Relying    │  :  │Service    │
│           ├─────┤           ├────────┤           ├─────┤           │
│Owner      │  :  │Agent      │        │Party      │  :  │Provider   │
└───────────┘  :  └───────────┘        └─────┬─────┘  :  └───────────┘
               :                             │        :
               :                             │        :
               :                       ┌─────┴─────┐  :
               :                       │Resource   │  :
               :                       │           │  :
               :                       │Server     │  :
               :                       └───────────┘  :
               :......................................:

Figure 1: Use case of the authorization flow - Asymmetrical Case
]]></artwork>
        <t>Figure 2 depicts the use case with the components needed to enable the identity authentication process in a symmetric manner capable of operating in different digital ecosystems. A SVG image is available <eref target="https://raw.githubusercontent.com/Luigi-Sbriz/identity/main/images/2_Symmetric-depiction.svg">here</eref>. The new scenario depicts two different ecosystems, one for the resource owner (client accessing the resource) and the other for the service provider (server managing the resource). This means that any entity involved in the authentication process will have its own identity provider, and they will interact with each other to ensure the completion of the symmetric authentication process..</t>
        <artwork><![CDATA[
                  ┌───────────┐        ┌───────────┐
                  │Identity   │        │Identity   │
                  │           │        │           │
                  │Provider C │        │Provider S │
                  └─────┬─────┘        └─────┬─────┘
                Digital │ecosystem   Digital │ecosystem
                        │C                   │S
               .........│.........  .........│.........
               :  ┌─────┴─────┐  :  :  ┌─────┴─────┐  :
               :  │Authorizati│  :  :  │Authorizati│  :
               :  │           ╞════════╡           │  :
               :  │on Server C│  :  :  │on Server S│  :
               :  └─────┬─────┘  :  :  └─────┬─────┘  :
               :        │        :  :        │        :
               :        │        :  :        │        :
┌───────────┐  :  ┌─────┴─────┐  :  :  ┌─────┴─────┐  :  ┌───────────┐
│Resource   │  :  │User       │  :  :  │Relying    │  :  │Service    │
│           ├─────┤           ├────────┤           ├─────┤           │
│Owner      │  :  │Agent      │  :  :  │Party      │  :  │Provider   │
└───────────┘  :  └───────────┘  :  :  └─────┬─────┘  :  └───────────┘
               :                 :  :        │        :
               :                 :  :        │        :
               :                 :  :  ┌─────┴─────┐  :
               :                 :  :  │Resource   │  :
               :                 :  :  │           │  :
               :                 :  :  │Server     │  :
               :                 :  :  └───────────┘  :
               :.................:  :.................:

Figure 2: Use case of the authorization flow - Symmetrical Case
]]></artwork>
        <t>The two representations are very similar to each other but note that the symmetric protocol requires direct communication between the identity providers' authentication servers to allow the circular transit of authentication messages. Therefore, no trust between domains or new users is necessary. This idea was first exposed in some articles published on ISACA Journal (see <xref target="LS1"/>, <xref target="LS2"/>, <xref target="LS3"/>, <xref target="LS4"/>) with some specific use cases and examples of potential implementations.</t>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>Some terms are used with a precise meaning.</t>
      <ul spacing="normal">
        <li>
          <t>"<strong><em>resource owner</em></strong>": 
An entity capable of granting access to a protected resource. When the resource owner is a person, it is referred to as an "<strong><em>end user</em></strong>", a "<strong><em>consumer</em></strong>" or an "<strong><em>individual</em></strong>". This is sometimes abbreviated as "<strong><em>RO</em></strong>".</t>
        </li>
        <li>
          <t>"<strong><em>service provider</em></strong>": 
An entity capable of managing access to a protected resource. It is generally a legal person. This is sometimes abbreviated as "<strong><em>SP</em></strong>".</t>
        </li>
        <li>
          <t>"<strong><em>identity provider</em></strong>": 
An entity capable of managing and recognizing the identity of registered entities. The set of all entities registered by the identity provider is also known as the IdP's digital ecosystem. This is sometimes abbreviated as "<strong><em>IdP</em></strong>".</t>
        </li>
        <li>
          <t>"<strong><em>resource server</em></strong>": 
The server hosting the protected resources, capable of accepting and responding to protected resource requests using access tokens. The resource server is often accessible via an API. This is sometimes abbreviated as "<strong><em>RS</em></strong>".</t>
        </li>
        <li>
          <t>"<strong><em>client</em></strong>", for software used also "<strong><em>user agent</em></strong>": 
An application making protected resource requests on behalf of the resource owner and with its authorization. The term "client" does not imply any particular implementation characteristics (e.g., whether the application executes on a server, a desktop, or other devices).</t>
        </li>
        <li>
          <t>"<strong><em>relying party</em></strong>": 
An application making protected resource authorization on behalf of the service provider and also managing its identity. The "relying party" acts as the "client" but on service provider side. This is sometimes abbreviated as "<strong><em>RP</em></strong>".</t>
        </li>
        <li>
          <t>"<strong><em>authorization server</em></strong>": 
The server issuing access tokens to the client after successfully authenticating the resource owner and obtaining authorization. This is sometimes abbreviated as "<strong><em>AS</em></strong>".</t>
        </li>
        <li>
          <t>"<strong><em>access token</em></strong>": 
The concept is the same of the <xref target="RFC6749"/>, a tiny piece of code that contains the necessary authentication data, issued by the authorization server.</t>
        </li>
        <li>
          <t>"<strong><em>identity token</em></strong>" or "<strong><em>ID token</em></strong>": 
The structure is similar to access token but it is used as proof that the user has been authenticated. The ID token may have additional information about the user and, it is signed by the issuer with its private key. To verify the token, the issuer's public key is used.</t>
        </li>
        <li>
          <t>"<strong><em>digital ecosystem</em></strong>": 
Internet environment composed of all entities based on the same identity provider.</t>
        </li>
      </ul>
      <t>The detail of the information exchanged or protocols in the interactions between the authorization server and the requesting client, or between relying party and resource server, or the composition of tokens, is beyond the scope of this specification.</t>
    </section>
    <section anchor="symmetric-authentication-protocol">
      <name>Symmetric authentication protocol</name>
      <t>The symmetric authentication flow is conceptually not too dissimilar from the classic one referring to the single ecosystem <xref target="RFC5234"/>, except that the authentication is dual because the two flows reflect the same operations symmetrically. Both the <strong>client</strong> (<em>resource owner</em>) and the <strong>server</strong> (<em>service provider</em>) <bcp14>MUST</bcp14> authenticate their identity through their IdP. The details of each basic operation in the symmetric process are the same as the corresponding single ecosystem specification <xref target="RFC6749"/> and <bcp14>MUST</bcp14> maintain alignment with it over time.</t>
      <t>The authentication sequence between a consumer and a resource provider operating in different environments will be:</t>
      <t><strong><em>1.</em></strong> Entities exchange the access tokens received from their authentication server with each other.<br/>
        <strong><em>2.</em></strong> Entities send the received token to their authentication server.<br/>
        <strong><em>3.</em></strong> Authentication servers exchange access tokens with each other.<br/>
        <strong><em>4.</em></strong> Authentication servers verify tokens with their original.<br/>
        <strong><em>5.</em></strong> Authentication servers send the result to their own entity.<br/>
        <strong><em>6.</em></strong> Entities are authenticated and can now exchange information.</t>
      <t>Conceptually, in a client-server schema, the authentication process begins with the resource owner requesting access to the protected resource to the service provider. Both respond with their access tokens and request their IdP to validate the received token. The IdPs exchange tokens for validation and send the result to their entity. On success, access to the resource is allowed.</t>
      <t>Figure 3 shows the abstract depiction of the symmetric authentication sequence. A SVG image is available <eref target="https://raw.githubusercontent.com/Luigi-Sbriz/identity/main/images/3_Symmetric-sequence-diagram.svg">here</eref>.</t>
      <artwork><![CDATA[
┌───────────┐                                            ┌───────────┐
│Relying    ├-(1)--Request Authentication--------------->│Authorizati│
│           │                                            │           │
│Party      │<-(2)-Return Server Token-------------------┤on Server S│
└───────────┘                                            └───────────┘
┌───────────┐      ┌───────────┐      ┌───────────┐      ┌───────────┐
│Resource   │      │User       │      │Authorizati│      │Relying    │
│           │      │           │      │           │      │           │
│Owner      │      │Agent      │      │on Server C│      │Party      │
└─────┬─────┘      └─────┬─────┘      └─────┬─────┘      └─────┬─────┘
      |      Request     |                  |                  |
      ├-(3)--Protected-->+-(4)--Send Access Request----------->|
      |      Resource    |                  |                  |
      |                  |<-(5)-Return Server Token------------┘
      |                  |                  |
      |                  ├(6)-Request Client|
      |                  |  Token & Send    |
      |                  |  Server Token--->|
      |                  |                  |
      |<-(7)-Request Credentials via UA-----┤
      |                  |                  |
      └-(8)--Present Credentials via UA---->|
                         |                  |
                         └<-(9)---Return    |
                            Client Token----┘
┌───────────┐      ┌───────────┐      ┌───────────┐      ┌───────────┐
│User       │      │Authorizati│      │Authorizati│      │Relying    │
│           │      │           │      │           │      │           │
│Agent      │      │on Server C│      │on Server S│      │Party      │
└─────┬─────┘      └─────┬─────┘      └─────┬─────┘      └─────┬─────┘
      |                  |                  |                  |
      ├-(10)--Request Protected Resource & Send Client Token-->|
      |                  |                  |                  |
      |                  |<-(12)---Send     |<-(11)---Send     |
      |                  |  Client Token----┤  Client Token----┤
      |                  |                  |                  |
      |                  ├-(13)---Return    |                  |
      |                  |  Server Token--->|                  |
      |                  |                  |                  |
      └<-(14)--Return of |                  └-(15)--Return of  |
         Authorization---┘                     Authorization-->┘
┌───────────┐      ┌───────────┐      ┌───────────┐      ┌───────────┐
│Resource   │      │User       │      │Relying    │      │Resource   │
│           │      │           │      │           │      │           │
│Owner      │      │Agent      │      │Party      │      │Server     │
└─────┬─────┘      └─────┬─────┘      └─────┬─────┘      └─────┬─────┘
      |                  |                  |                  |
      |                  |                  ├(16)Call Protected|
      |                  |                  | Resource-------->|
      |                  |                  |                  |
      └<-(19)-----Return |<-(18)-----Return |<-(17)-----Return |
        Protect.Resource-┘ Protect.Resource-┘ Protect.Resource-┘

Figure 3: Symmetric Authentication Protocol - Sequence diagram
]]></artwork>
      <t>(1) - (2)       The <strong><em>RP</em></strong> requests authentication to its <strong><em>AS</em></strong> (marked "S" as server) and receives the server token (access token from the service provider's AS). The relying party must be provided with its own access token to resolve multiple requests.<br/>
(3) - (5)       The <strong><em>RO</em></strong> requests access to the protected resource via the user agent. The <strong><em>UA</em></strong> activates the authentication process by requesting access to the <strong><em>RP</em></strong>, which responds by providing the server token. The response may also include the server ID token.<br/>
(6) - (9)       The <strong><em>UA</em></strong> requests the client token (access token from the client's AS) to its <strong><em>AS</em></strong> (marked "C" as client), sending also the server token received from <strong><em>RP</em></strong>. The client's <strong><em>AS</em></strong> requests credentials from the <strong><em>RO</em></strong> and returns the client token to the <strong><em>UA</em></strong>.<br/>
(10) - (11)     The <strong><em>UA</em></strong> requests the protected resource from the <strong><em>RP</em></strong> by sending the client token. Then, relying party requests to service provider's AS to verify the client token.<br/>
(12) - (15)     Both authentication servers must verify that the tokens received match the originals. Then, client's AS informs the <strong><em>UA</em></strong> of the outcome and the same is done by the service provider's AS to the <strong><em>RP</em></strong>. The outcome sent to the relying party may also include the client ID token.<br/>
(16) - (17)     The <strong><em>RP</em></strong> notifies the <strong><em>RS</em></strong> of the legitimate request of '<strong><em>UA</em></strong>. The <strong><em>RS</em></strong> returns the protected resource to <strong><em>RP</em></strong>.<br/>
(18) - (19) The <strong><em>RP</em></strong> sends the protected resource to <strong><em>UA</em></strong>, which then presents it to the requester <strong><em>RO</em></strong>.</t>
      <t><strong><em>Notes regarding some steps:</em></strong><br/>
(4) If the server token is not available at this time, sequence (1) - (2) will be executed between steps (4) and (5) to provide the server token. Additionally, this change may also be necessary for a periodic refresh of the server token or if the entities are both clients.<br/>
(6) The client's authorization could be performed in advance and the client token stored securely by the user agent for handling multiple authentication requests. This means performing only the server token communication here, avoiding the following steps (7) - (9) because already done.</t>
      <t>The verification of the authenticity of the tokens is carried out by the IdPs who exchange messages on a dedicated network to reduce the risk of intrusion. Security is strengthened by the presence of two interfaces for the exchange of tokens, one is for the party in trust and the other is for the opposing party. If one is compromised, the other interrupts the flow avoiding authorization. The trust placed in the mutual validation of messages avoids having to merge authentication domains, leaving great flexibility to the system as a whole.</t>
      <t>Identity recognition information resides only with a trusted identity provider. This reduces the need to store too much personal information in Internet registrations. Furthermore, to easily identify which IdP holds the entity's authentication credentials, it can be easily extracted from the username structure if this is defined following the same technique used to compose an email address <xref target="RFC5322"/>, that means an username, an @ sign, and a domain name.</t>
    </section>
    <section anchor="identity-provider-trustee-concepts">
      <name>Identity Provider - Trustee Concepts</name>
      <t>The symmetric authentication protocol bases its functioning on the existence of trusted entities, called <strong><em>identity providers (IdPs)</em></strong>, in a network among themselves, exchanging authentication messages to guarantee the digital identity. Each IdP acts as a point of reference for the identity authentication service in its digital ecosystem, and must be able to communicate with every other IdP to recognize identities belonging to other ecosystems, securely from intrusions or tampering. The effectiveness of the entire authentication system depends on the trust placed in these identity providers but it must be deserved. This requires a robust organisation, subject to systematic oversight by independent certification body, to ensure transparent management by IdPs.</t>
      <section anchor="importance-of-this-role">
        <name>Importance of this role</name>
        <t>The identity provider is the guarantor of the authenticity of the relationship between digital credentials and the identity of natural or legal persons in digital communication. For this role it can also be called an <strong>ID trustee</strong> and the greatest criticality it must face is the inviolability of the messages exchanged. Furthermore, when processing personal data, the laws of the country to which the data subject belongs must be considered. It may also provide additional services (e.g. anonymous email, answering machine, anonymous accounts,...), but always in full compliance with the applicable law and only if they do not present risk for the data subject. Anonymization services are intended exclusively for the intended recipient but not for the authority exercising the applicable law (e.g. for a whistleblowing).</t>
        <t>An IdP <bcp14>MUST</bcp14> be a legal person subject to both the laws of the country to which it belongs and to international certification bodies, to guarantee compliance with this standard, the security of the information processed, the expected level of quality of service and the lawful processing of data.</t>
      </section>
      <section anchor="infrastructure">
        <name>Infrastructure</name>
        <t>The infrastructure underlying symmetric communication is a dedicated network to the exchange of authentication messages between IdPs. Ideally, each IdP always has two connectors, one to communicate with its trusted entity and the other to exchange messages with another IdP. With its own entity the mechanism is exactly the one defined by <xref target="RFC6749"/>. With other IdPs, a reserved channel is required for the exchange of tokens, which provides guarantees on the integrity of the messages and their origin. This channel <bcp14>SHOULD</bcp14> have low latency because it represents an additional step compared to the single ecosystem authentication scheme. The intended mechanism for sharing messages is that of a mail server <xref target="RFC5321"/>.</t>
        <t>The dedicated network for the identity providers is not technically necessary for the authentication protocol but is essential for security, to reduce the risk of fraud or identity theft and, to ensure trust in lawful behavior. There <bcp14>MUST</bcp14> also be an international control body for the IdPs and the IdP network, an authority with the task of governing the overall system, i.e. defining technical standards, or carrying out audits to ensure compliance with the rules, or acting to exclude nodes in case of violation of the rules.</t>
      </section>
    </section>
    <section anchor="identity-provider-custodian-concept">
      <name>Identity Provider - Custodian concept</name>
      <t>The relationship between digital and physical identity should be managed only by a particular identity provider, called <strong><em>identity custodian (IdC)</em></strong>, who has the legal authority to manage the personal data of the natural person. Only in this way it will be the perfect candidate to guarantee the identity provider the validity of the request for the release of a new digital identity, without having to disclose the physical identity to the IdP. Guaranteeing the digital identity of a user corresponding to a legal entity will not be the task of the identity custodian but of an authority or a process compliant with the law of the country to which the legal entity belongs. The identity token contains the indication between users of a natural person or a legal entity. The identity token makes it possible to distinguish the user of a natural or legal person and to know who has guaranteed the physical identity. An identity custodian can also act as an identity trustee, keeping roles distinct in communication protocols.</t>
      <section anchor="general-schema">
        <name>General schema</name>
        <t>The identity custodian certifies that it is a real identity that requires the digital identity but can also provide personal data to identity trustee with the consent of the data subject. The identity trustee provides the authentication service for its digital ecosystem. A use case describing the relationship between identity custodian, identity trustee, and digital identity is provided in figure 4. A SVG image is available <eref target="https://raw.githubusercontent.com/Luigi-Sbriz/identity/main/images/4_Identity-custodian-concept.svg">here</eref>.</t>
        <artwork><![CDATA[
............................              ............................
: Real ecosystem X         :              :         Real ecosystem Y :
:              ...................  ...................              :
:              :Digital          :  :          Digital:              :
:              :ecosystem A      :  :      ecosystem B:              :
:              :  ┌───────────┐  :  :  ┌───────────┐  :              :
:              :  │  Digital  │  :  :  │  Digital  │  :              :
:      ┌──────────┤           ├────────┤           ├──────────┐      :
:      │       :  │Identity A │  :  :  │Identity B │  :       │      :
:      │       :  └─────┬─────┘  :  :  └─────┬─────┘  :       │      :
:      │       :        │        :  :        │        :       │      :
:      │       :        │        :  :        │        :       │      :
:┌─────┴─────┐ :  ┌─────┴─────┐  :  :  ┌─────┴─────┐  : ┌─────┴─────┐:
:│ Identity  │ :  │ Identity  │  :  :  │ Identity  │  : │ Identity  │:
:│           ╞════╡           ╞════════╡           ╞════╡           │:
:│Custodian X│ :  │Provider A │  :  :  │Provider B │  : │Custodian Y│:
:└───────────┘ :  └───────────┘  :  :  └───────────┘  : └───────────┘:
: Real         :                 :  :                 :         Real :
: identity A   :.................:  :.................:   identity B :
:                          :              :                          :
:..........................:              :..........................:

Figure 4: The Identity Custodian Use Case
]]></artwork>
        <t>Generally, identity provider must carry out the recognition and registration of the user's personal data before being able to guarantee its identity. The collection of the data of the natural person must be carried out in accordance with the protection provided for by the regulations in force. To ensure that the processing of personal data is restricted and controlled, it is useful to divide the set of IdPs into two categories. In the first, there will be IdPs (also called trustees) that only manage digital identity operations, and in the second, IdCs (identity custodians) that guarantee trustees that the applicant's identity is real. The IdC's category should operate under the responsibility of the legal authority that manages the real identity of the individual (i.e. who issues the identity card).</t>
        <t>Through the identity custodian, each individual can request the issuing of a new digital identity to their trusted IdP. It will be the trusted IdP who will ask for confirmation of the applicant's authenticity directly from the IdC. The applicant must send an ID token with their IdC contact information to initiate the request. The request will be managed entirely online and will not require any personal data from the data subject but, subject to consent, everything will be sent by the IdC. The new identity will be useful to meet the typical needs of transactions on the Internet, with the right confidentiality for the holder and an added value for the authority, being able to identify the real person. The digital legal identity to sign contracts should be managed directly by IdC.</t>
        <t>In short the roles involved in the trust-based authentication system.
- The <strong><em>identity custodian</em></strong> is the guarantor of the existence of the natural person and has the ability to uniquely identify it but only following a formal request from the legitimate authority.<br/>
- The <strong><em>identity provider</em></strong> receives the identification data that the data subject has decided to provide and will match these to the digital identity.<br/>
- The <strong><em>service provider</em></strong> will have the guarantee that the user is linked to a real person for security, contractual or legal reasons.<br/>
- The <strong><em>data subject</em></strong> can provide personal information according to their need, also maintaining anonymity.<br/>
- The <strong><em>public authority</em></strong> that manages the real data will be able to identify the individual with certainty in case of violations of the law (i.e. to protect the service provider).</t>
        <section anchor="issuing-of-a-new-digital-identity">
          <name>Issuing of a New Digital Identity</name>
          <t>The request for a new digital identity is activated by the natural person towards the chosen trustee. The trustee will request confirmation from the identity custodian if the request lawfully came from a real person. In case of confirmation, it will record the personal data that the data subject has authorized IdC to transfer. A use case describing the request of a new digital identity is provided in figure 5. A SVG image is available <eref target="https://raw.githubusercontent.com/Luigi-Sbriz/identity/main/images/5_New-identity-use-case.svg">here</eref>.</t>
          <artwork><![CDATA[
                  ┌───────────┐        ┌───────────┐
                  │Identity   │        │Identity   │
                  │           │        │           │
                  │Custodian  │        │Provider   │
                  └─────┬─────┘        └─────┬─────┘
                  IdC   │              IdP   │
               ecosystem│           ecosystem│
               .........│.........  .........│.........
               :  ┌─────┴─────┐  :  :  ┌─────┴─────┐  :
               :  │Authorizat.│  :  :  │Authorizat.│  :
               :  │           ╞════════╡           │  :
               :  │Server IdC │  :  :  │Server IdP │  :
               :  └─────┬─────┘  :  :  └─────┬─────┘  :
               :        │        :  :        │        :
               :        │        :  :        │        :
┌───────────┐  :  ┌─────┴─────┐  :  :  ┌─────┴─────┐  :
│Data       │  :  │User       │  :  :  │Relying    │  :
│           ├─────┤           ├────────┤           │  :
│Subject    │  :  │Agent      │  :  :  │Party  IdP │  :
└───────────┘  :  └───────────┘  :  :  └───────────┘  :
               :.................:  :.................:

Figure 5: Abstract of New Digital Identity Request
]]></artwork>
          <t>Figure 6 shows the abstract representation of the message exchange sequence to request a new digital identity. A SVG image is available <eref target="https://raw.githubusercontent.com/Luigi-Sbriz/identity/main/images/6_New-identity-sequence-diagram.svg">here</eref>.</t>
          <artwork><![CDATA[
┌───────────┐      ┌───────────┐      ┌───────────┐      ┌───────────┐
│Data       │      │User       │      │Authorizat.│      │Relying    │
│           │      │           │      │           │      │           │
│Subject    │      │Agent      │      │Server IdC │      │Party  IdP │
└───────────┘      └─────┬─────┘      └─────┬─────┘      └─────┬─────┘
      |                  |                  |                  |
      ├-(1)-Request New->+-(2)--Send New Identity Request----->|
      |     Identity     |                  |                  |
      |                  |<--(3)--Return IdP Token-------------┘
      |                  |                  |
      |                  ├(4)--Request IdC  |
      |                  |     Token & Send |
      |                  |     IdP Token--->|
      |                  |                  |
      |<-(5)-Request Credentials via UA-----┤
      |                  |                  |
      └-(6)--Present Credentials via UA---->|
                         |                  |
                         └<--(7)--Return    |
                                  IdC Token-┘
┌───────────┐      ┌───────────┐      ┌───────────┐      ┌───────────┐
│User       │      │Authorizat.│      │Authorizat.│      │Relying    │
│           │      │           │      │           │      │           │
│Agent      │      │Server IdC │      │Server IdP │      │Party  IdP │
└─────┬─────┘      └─────┬─────┘      └─────┬─────┘      └─────┬─────┘
      |                  |                  |                  |
      ├-(8)--Request New Identity & Send IdC Token------------>|
      |                  |                  |                  |
      |                  |<--(10)--Send IdC |<--(9)--Send IdC  |
      |                  |         Token----┤        Token-----┤
      |                  |                  |                  |
      |                  ├-(11)--Return IdP |                  |
      |                  |     Token & Send |                  |
      |                  |     ID Token---->|                  |
      |                  |                  |                  |
      └<-(12)---Return   |                  └-(13)---Return    |
                ID Token-┘                     Client Token--->┘
┌───────────┐                ┌───────────┐               ┌───────────┐
│Data       │                │User       │               │Relying    │
│           │                │           │               │           │
│Subject    │                │Agent      │               │Party  IdP │
└─────┬─────┘                └─────┬─────┘               └─────┬─────┘
      |                            |                           |
      └<-(15)------Return ID Token-┘<-(14)-Return Client Token-┘

Figure 6: New Digital Identity Request - Sequence diagram
]]></artwork>
          <t>(1) - (3)       The <strong><em>data subject</em></strong> requests the new digital identity via the user agent to the identity provider. The <strong><em>UA</em></strong> activates the authentication process by requesting the new identity to the <strong><em>RP</em></strong>, which responds by providing the IdP token (access token from IdP's AS).<br/>
(4) - (7)       The <strong><em>UA</em></strong> requests the IdC token (access token from the custodian's AS) to its <strong><em>AS</em></strong>, sending also the IdP token received from <strong><em>RP</em></strong>. The custodian's <strong><em>AS</em></strong> requests credentials from the <strong><em>data subject</em></strong> and returns the IdC token to the <strong><em>UA</em></strong>.<br/>
(8) - (9)       The <strong><em>UA</em></strong> requests the new digital identity from the <strong><em>RP</em></strong> by sending the IdC token. Then, relying party requests to identity provider's AS to verify the IdC token.<br/>
(10) - (11)     Both authentication servers must verify that the tokens received match the originals. If required by data subject, the custodian's AS will send an additional ID token with personal data.<br/>
(12) - (13)     Custodian's AS informs the <strong><em>UA</em></strong> of the outcome and, if required, sends also a copy of the ID token. The identity provider's AS sends to the <strong><em>RP</em></strong> the client token (related the new identity provided by IdP).<br/>
(14) - (15) The <strong><em>RP</em></strong> sends the client token to <strong><em>UA</em></strong>, which then informs the <strong><em>data subject</em></strong> of the outcome and, if required, sends a readable copy of the ID token to check the personal information shared.</t>
          <t><strong><em>Notes regarding some steps:</em></strong><br/>
(3) If the relying party does not have the IdP token available, this will be requested from the authentication server after step (2).<br/>
(4) IdC token does not contains any real identity information as default. If requested, an ID token with a standard set of real information can be included during this step.</t>
          <t>Any new digital identity with legal value is issued according to the rules defined by the relevant authority. It is presumable that there is also physical recognition of the data subject before the provision of credentials but no reference model is defined in this document.</t>
        </section>
      </section>
    </section>
    <section anchor="sustainable-digital-identity-trust-schema">
      <name>Sustainable Digital Identity Trust Schema</name>
      <t>For the effectiveness of the identity trust system based on the paradigm of trust towards a third party recognizable as reliable, it is necessary to guarantee a transparent and verifiable mechanism. The objective is to achieve universal participation and it is only possible if trust in the system as a whole is demonstrable. For this reason it is necessary to establish founding principles that guide the rules to guarantee equal dignity and balance in all components of the system. The following nine principles are established:</t>
      <ol spacing="normal" type="1"><li>
          <t>The digital identity can be cancelled or deleted without impacting the physical identity.</t>
        </li>
        <li>
          <t>The digital identity must be linkable to the physical identity in a verifiable manner.</t>
        </li>
        <li>
          <t>Only the authority that legally manages the individual's physical identity can verify this link.</t>
        </li>
        <li>
          <t>The authentication system must be flexible (i.e., able to adapt to technological evolutions or emerging needs).</t>
        </li>
        <li>
          <t>The authentication system must be accessible to all potential users (i.e., without discriminatory costs).</t>
        </li>
        <li>
          <t>The authentication system must be secure (i.e., continuously aligned with security best practices).</t>
        </li>
        <li>
          <t>The authentication system must be privacy-friendly (i.e., not requiring any personal information unless strictly necessary).</t>
        </li>
        <li>
          <t>The authentication system must be resilient (i.e., with availability appropriate for needs and the ability to cope with adversity).</t>
        </li>
        <li>
          <t>The authentication system technology must be open (i.e., able to evolve based on transparent shared standards and verifiable developments).</t>
        </li>
      </ol>
      <t>To guarantee the principles set out, the requirements of the authentication system <bcp14>MUST</bcp14> include the protection of personal data and the guarantee of anonymity for lawful purposes, that is:</t>
      <ol spacing="normal" type="1"><li>
          <t>Ensure mutual recognition to guarantee the identity of the provider to the consumer.</t>
        </li>
        <li>
          <t>Ensure the ability to authenticate the digital identities of consumers and providers against their real-world identity, without unnecessarily exposing real data.</t>
        </li>
      </ol>
      <t>The ability to validate the authenticity of the relationship between digital identity and physical identity lies only with the public authority responsible for managing the citizen's identity. This capability is provided through a digital identity recognition service (i.e. IdC), technologically compliant with identity provider protocols but under the supervision of the public authority.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>There are some cautionary points regarding security that need to be considered.
- Integrity and resilience are the most critical parameters. The integrity of the messages is fundamental to guarantee the authenticity of the identity, while the availability of the authentication service is the basis for ensuring the feasibility of the entire process.
- Symmetric authentication contrast the risk of man-in-the-middle attack because it should successfully attack both message flows at the same time.
- The trustee is a critical component and must be subjected to rigorous checks on compliance with the standards.
- The relying party and the resourse server should be on different servers using a dedicated communication channel.</t>
      <t>Referring to the term identification, we mean at least three different types, the device, the digital user and the individual.</t>
      <ul spacing="normal">
        <li>
          <t>The <strong><em>device</em></strong> is identified with technical methods suited to the various needs. For example, geolocalization using International Mobile Equipment Identity (IMEI) <xref target="ITU1"/> and Integrated Circuit Card ID (ICCID) <xref target="ITU2"/>.</t>
        </li>
        <li>
          <t>The <strong><em>digital user</em></strong> is well managed by <xref target="RFC6749"/> but inside the digital ecosystem. To manage users of multiple domains, either the user registrations are duplicated for each domain involved, or the domains involved are joined in a trust relationship.</t>
        </li>
        <li>
          <t>The <strong><em>individual</em></strong>, or natural person, is well managed with classic physical methods (e.g. photo ID) but the link with the digital identity needs to be improved because the quality is not satisfactory. This topic is beyond the scope of this specification and it was explored for example in <xref target="LS3"/>.</t>
        </li>
      </ul>
      <t>An in-depth defense system <bcp14>SHOULD</bcp14> consider all the components involved and in this case not just the pure digital authentication of the user. In this document only the digital user is treated but extensions applicable to mixed situations with multiple types are certainly welcome to improve the overall security profile.</t>
      <section anchor="user-registration">
        <name>User registration</name>
        <t>It is important to control the amount of data exchanged during the authentication process but also that the data required to issue a new digital identity are the only ones strictly necessary. To assign access credentials to a protected resource to a user, a process of recording the user's identification and contact data is necessary, as they are necessary for the authentication of the digital identity and for the attribution of access rights to the resource. Data provided or exchanged with IdPs <bcp14>MUST</bcp14> comply with the need-to-know principle. Three ways of recording are required.</t>
        <section anchor="registration-with-an-identity-custodian-idc">
          <name>Registration with an identity custodian (IdC).</name>
          <t>The IdC has the legal authority to retain all personal data essential to complete the process of recognizing the real individual. Consequently it also has full authority over digital identity data and registration is subject to the law of the individual's country of origin.</t>
        </section>
        <section anchor="registration-with-an-identity-provider-idp">
          <name>Registration with an identity provider (IdP).</name>
          <t>The IdP has to guarantee the authenticity of the digital identity and the collection of personal data <bcp14>SHOULD</bcp14> be limited to the sole purpose of this operation. For the registration of a natural person, the IdP requests confirmation from the IdC of the real identity of the applicant before issuing the digital identity. The process is completely online and does not require any physical recognition. For legal entities, the data is provided by the owner or a delegate.</t>
        </section>
        <section anchor="registration-with-a-service-provider-sp">
          <name>Registration with a service provider (SP).</name>
          <t>The service provider <bcp14>SHOULD</bcp14> know only the data necessary to build the authorization roles to govern access to resources and nothing more. These are provided directly by the user or by an ID token, in addition to those received automatically from their IdP relating to digital identity.</t>
        </section>
      </section>
    </section>
    <section anchor="conclusions">
      <name>Conclusions</name>
      <t>To operate effectively between the different digital ecosystems, the identity management system <bcp14>MUST</bcp14> be based on a common authentication protocol that symmetrically carries out the same operations in complete transparency, entrusting the decision on recognition to a trusted third party. Confidence in the reliability of recognition carried out by the identity guarantor (IdP or IdC) cannot be based on the technological component alone. It is therefore necessary to involve an independent supervisory authority for technological aspects and the local competent public authority responsible for data protection.</t>
      <t>To improve trust in the digital operations between the consumer and the service provider three guarantees must be provided.</t>
      <ol spacing="normal" type="1"><li>
          <t>The mutual recognition between consumer and service provider.</t>
        </li>
        <li>
          <t>The control and minimization of the personal information processed.</t>
        </li>
        <li>
          <t>In case of legal need, the ability to match the digital identities of consumer and provider against their real-world identity.</t>
        </li>
      </ol>
      <t>Due to the strong synergy that can be achieved, it is advisable to maintain constant technical alignment with the standard <xref target="RFC6749"/> and the related specifications to implement point-to-point authentication, within the broader symmetric authentication framework.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC6749">
          <front>
            <title>The OAuth 2.0 Authorization Framework</title>
            <author fullname="D. Hardt" initials="D." role="editor" surname="Hardt"/>
            <date month="October" year="2012"/>
            <abstract>
              <t>The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf. This specification replaces and obsoletes the OAuth 1.0 protocol described in RFC 5849. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6749"/>
          <seriesInfo name="DOI" value="10.17487/RFC6749"/>
        </reference>
        <reference anchor="RFC5322">
          <front>
            <title>Internet Message Format</title>
            <author fullname="P. Resnick" initials="P." role="editor" surname="Resnick"/>
            <date month="October" year="2008"/>
            <abstract>
              <t>This document specifies the Internet Message Format (IMF), a syntax for text messages that are sent between computer users, within the framework of "electronic mail" messages. This specification is a revision of Request For Comments (RFC) 2822, which itself superseded Request For Comments (RFC) 822, "Standard for the Format of ARPA Internet Text Messages", updating it to reflect current practice and incorporating incremental changes that were specified in other RFCs. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5322"/>
          <seriesInfo name="DOI" value="10.17487/RFC5322"/>
        </reference>
        <reference anchor="RFC5321">
          <front>
            <title>Simple Mail Transfer Protocol</title>
            <author fullname="J. Klensin" initials="J." surname="Klensin"/>
            <date month="October" year="2008"/>
            <abstract>
              <t>This document is a specification of the basic protocol for Internet electronic mail transport. It consolidates, updates, and clarifies several previous documents, making all or parts of most of them obsolete. It covers the SMTP extension mechanisms and best practices for the contemporary Internet, but does not provide details about particular extensions. Although SMTP was designed as a mail transport and delivery protocol, this specification also contains information that is important to its use as a "mail submission" protocol for "split-UA" (User Agent) mail reading systems and mobile environments. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5321"/>
          <seriesInfo name="DOI" value="10.17487/RFC5321"/>
        </reference>
        <reference anchor="RFC5234">
          <front>
            <title>Augmented BNF for Syntax Specifications: ABNF</title>
            <author fullname="D. Crocker" initials="D." role="editor" surname="Crocker"/>
            <author fullname="P. Overell" initials="P." surname="Overell"/>
            <date month="January" year="2008"/>
            <abstract>
              <t>Internet technical specifications often need to define a formal syntax. Over the years, a modified version of Backus-Naur Form (BNF), called Augmented BNF (ABNF), has been popular among many Internet specifications. The current specification documents ABNF. It balances compactness and simplicity with reasonable representational power. The differences between standard BNF and ABNF involve naming rules, repetition, alternatives, order-independence, and value ranges. This specification also supplies additional rule definitions and encoding for a core lexical analyzer of the type common to several Internet specifications. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="68"/>
          <seriesInfo name="RFC" value="5234"/>
          <seriesInfo name="DOI" value="10.17487/RFC5234"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="ITU1" target="https://www.itu.int/dms_pub/itu-t/opb/tut/T-TUT-CCICT-2020-PDF-E.pdf">
          <front>
            <title>QTR-RLB-IMEI - Reliability of International Mobile Station Equipment Identity (IMEI), Technical Report</title>
            <author>
              <organization>International Telecommunications Union</organization>
            </author>
            <date year="2020" month="July"/>
          </front>
        </reference>
        <reference anchor="ITU2" target="https://www.itu.int/rec/T-REC-E.118">
          <front>
            <title>E.118: The International Telecommunication Charge Card</title>
            <author>
              <organization>International Telecommunications Union</organization>
            </author>
            <date year="2006" month="May"/>
          </front>
        </reference>
        <reference anchor="LS1" target="https://www.isaca.org/resources/isaca-journal/issues/2022/volume-2/a-symmetrical-framework-for-the-exchange-of-identity-credentials-based-on-the-trust-paradigm-part-1">
          <front>
            <title>A Symmetrical Framework for the Exchange of Identity Credentials Based on the Trust Paradigm, Part 1: Identity Trust Abstract Model, ISACA Journal, vol.2</title>
            <author initials="L." surname="Sbriz" fullname="Luigi Sbriz">
              <organization/>
            </author>
            <date year="2022" month="April"/>
          </front>
        </reference>
        <reference anchor="LS2" target="https://www.isaca.org/resources/isaca-journal/issues/2022/volume-2/a-symmetrical-framework-for-the-exchange-of-identity-credentials-based-on-the-trust-paradigm-part-2">
          <front>
            <title>A Symmetrical Framework for the Exchange of Identity Credentials Based on the Trust Paradigm, Part 2: Identity Trust Service Implementation, ISACA Journal, vol.2</title>
            <author initials="L." surname="Sbriz" fullname="Luigi Sbriz">
              <organization/>
            </author>
            <date year="2022" month="April"/>
          </front>
        </reference>
        <reference anchor="LS3" target="https://www.isaca.org/resources/isaca-journal/issues/2023/volume-1/how-to-digitally-verify-human-identity">
          <front>
            <title>How to Digitally Verify Human Identity: The Case of Voting, ISACA Journal, vol.1</title>
            <author initials="L." surname="Sbriz" fullname="Luigi Sbriz">
              <organization/>
            </author>
            <date year="2023" month="January"/>
          </front>
        </reference>
        <reference anchor="LS4" target="https://www.isaca.org/resources/isaca-journal/issues/2023/volume-6/modeling-an-identity-trust-system">
          <front>
            <title>Modeling an Identity Trust System, ISACA Journal, vol.6</title>
            <author initials="L." surname="Sbriz" fullname="Luigi Sbriz">
              <organization/>
            </author>
            <date year="2023" month="November"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 514?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>This document was prepared using text editor with Markdown syntax (kramdown-rfc dialect).</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
