<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.6.2 (Ruby 2.6.3) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-ietf-secevent-subject-identifiers-10" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="secevent-subject-identifiers">Subject Identifiers for Security Event Tokens</title>

    <author initials="A." surname="Backman" fullname="Annabelle Backman" role="editor">
      <organization>Amazon</organization>
      <address>
        <email>richanna@amazon.com</email>
      </address>
    </author>
    <author initials="M." surname="Scurtescu" fullname="Marius Scurtescu">
      <organization>Coinbase</organization>
      <address>
        <email>marius.scurtescu@coinbase.com</email>
      </address>
    </author>
    <author initials="P." surname="Jain" fullname="Prachi Jain">
      <organization>Fastly</organization>
      <address>
        <email>prachi.jain1288@gmail.com</email>
      </address>
    </author>

    <date year="2022" month="March" day="07"/>

    <area>Security</area>
    <workgroup>Security Events Working Group</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>Security events communicated within Security Event Tokens may support a variety of identifiers to identify subjects related to the event.  This specification formalizes the notion of subject identifiers as structured information that describe a subject, and named formats that define the syntax and semantics for encoding subject identifiers as JSON objects.  It also defines a registry for defining and allocating names for such formats, as well as the <spanx style="verb">sub_id</spanx> JSON Web Token (JWT) claim.</t>



    </abstract>



  </front>

  <middle>


<section anchor="intro"><name>Introduction</name>
<t>As described in Section 1.2 of SET <xref target="RFC8417"/>, subjects related to security events may take a variety of forms, including but not limited to a JWT <xref target="RFC7519"/> principal, an IP address, a URL, etc.  Different types of subjects may need to be identified in different ways (e.g., a host might be identified by an IP or MAC address, while a user might be identified by an email address).  Furthermore, even in the case where the type of the subject is known, there may be multiple ways by which a given subject may be identified.  For example, an account may be identified by an opaque identifier, an email address, a phone number, a JWT <spanx style="verb">iss</spanx> claim and <spanx style="verb">sub</spanx> claim, etc., depending on the nature and needs of the transmitter and receiver. Even within the context of a given transmitter and receiver relationship, it may be appropriate to identify different accounts in different ways, for example if some accounts only have email addresses associated with them while others only have phone numbers. Therefore it can be necessary to indicate within a SET the mechanism by which a subject is being identified.</t>

<t>To address this problem, this specification defines Subject Identifiers - JSON <xref target="RFC7159"/> objects containing information identifying a subject - and Identifier Formats - named sets of rules describing how to encode different kinds of subject identifying information (e.g., an email address, or an issuer and subject pair) as a Subject Identifier.</t>

<t>Below is a non-normative example of a Subject Identifier that identifies a subject by email address, using the Email Identifier Format.</t>

<figure title="Example: Subject Identifier using the Email Identifier Format" anchor="figexampleintro"><artwork><![CDATA[
{
  "format": "email",
  "email": "user@example.com"
}
]]></artwork></figure>

<t>Subject Identifiers are intended to be a general purpose mechanism for identifying subjects within JSON objects and their usage need not be limited to SETs.  Below is a non-normative example of a JWT that uses a Subject Identifier in the <spanx style="verb">sub_id</spanx> claim (defined in this specification) to identify the JWT Subject.</t>

<figure title="Example: JWT using a Subject Identifier with the &quot;sub_id&quot; claim" anchor="figexampleintro2"><artwork><![CDATA[
{
  "iss": "issuer.example.com",
  "sub_id": {
    "format": "phone_number",
    "phone_number": "+12065550100"
  }
}
]]></artwork></figure>

<t>Usage of Subject Identifiers also need not be limited to identifying JWT Subjects.  They are intended as a general purpose means of expressing identifying information in an unambiguous manner.  Below is a non-normative example of a SET containing a hypothetical security event describing the interception of a message, using Subject Identifiers to identify the sender, intended recipient, and interceptor.</t>

<figure title="Example: SET with an event payload containing multiple Subject Identifiers" anchor="figexampleintro3"><artwork><![CDATA[
{
  "iss": "issuer.example.com",
  "iat": 1508184845,
  "aud": "aud.example.com",
  "events": {
    "https://secevent.example.com/events/message-interception": {
      "from": {
        "format": "email",
        "email": "alice@example.com"
      },
      "to": {
        "format": "email",
        "email": "bob@example.com"
      },
      "interceptor": {
        "format": "email",
        "email": "eve@example.com"
      }
    }
  }
}

]]></artwork></figure>

</section>
<section anchor="conv"><name>Notational Conventions</name>
<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in <xref target="RFC2119"/>.</t>

<section anchor="defn"><name>Definitions</name>
<t>This specification utilizes terminology defined in <xref target="RFC7159"/>, <xref target="RFC7519"/>, and <xref target="RFC8417"/>.</t>

<t>Within this specification, the terms "Subject" and "subject" refer generically to anything being identified via one or more pieces of information.  The term "JWT Subject" refers specifically to the to the subject of a JWT. (i.e., the subject that the JWT asserts claims about)</t>

</section>
</section>
<section anchor="sub-ids"><name>Subject Identifiers</name>
<t>A Subject Identifier is a JSON <xref target="RFC7159"/> object whose contents may be used to identify a subject within some context.  An Identifier Format is a named definition of a set of information that may be used to identify a subject, and the rules for encoding that information as a Subject Identifier; they define the syntax and semantics of Subject Identifiers.  A Subject Identifier MUST conform to a specific Identifier Format, and MUST contain a <spanx style="verb">format</spanx> member whose value is the name of that Identifier Format.</t>

<t>Every Identifier Format MUST have a unique name registered in the IANA "Security Event Identifier Formats" registry established by <xref target="iana-formats"/>, or a Collision-Resistant Name as defined in <xref target="RFC7519"/>.  Identifier Formats that are expected to be used broadly by a variety of parties SHOULD be registered in the "Security Event Identifier Formats" registry.</t>

<t>An Identifier Format MAY describe more members than are strictly necessary to identify a subject, and MAY describe conditions under which those members are required, optional, or prohibited.  The <spanx style="verb">format</spanx> member is reserved for use as described in this specification; Identifier Formats MUST NOT declare any rules regarding the <spanx style="verb">format</spanx> member.</t>

<t>Every member within a Subject Identifier MUST match the rules specified for that member by this specification or by Subject Identifier's Identifier Format.  A Subject Identifier MUST NOT contain any members prohibited or not described by its Identifier Format, and MUST contain all members required by its Identifier Format.</t>

<section anchor="identifier-formats-versus-principal-types"><name>Identifier Formats versus Principal Types</name>
<t>Identifier Formats define how to encode identifying information for a subject.  They do not define the type or nature of the subject itself.  E.g., While the <spanx style="verb">email</spanx> Identifier Format declares that the value of the <spanx style="verb">email</spanx> member is an email address, a subject in a Security Event that is identified by an <spanx style="verb">email</spanx> Subject Identifier could be an end user who controls that email address, the mailbox itself, or anything else that the transmitter and receiver both understand to be associated with that email address.  Consequently Subject Identifiers remove ambiguity around how a subject is being identified, and how to parse an identifying structure, but do not remove ambiguity around how to resolve that identifier to a subject.  For example, consider a directory management API that allows callers to identify users and groups through both opaque unique identifiers and email addresses.  Such an API could use Subject Identifiers to disambiguate between which of these two types of identifiers is in use.  However, the API would have to determine whether the subject is a user or group via some other means, such as by querying a database, interpreting other parameters in the request, or inferring the type from the API contract.</t>

</section>
<section anchor="identifier-format-definitions"><name>Identifier Format Definitions</name>

<t>The following Identifier Formats are registered in the IANA "Security Event Identifier Formats" registry established by <xref target="iana-formats"/>.</t>

<section anchor="sub-id-acct"><name>Account Identifier Format</name>
<t>The Account Identifier Format identifies a subject using an account at a service provider, identified with an <spanx style="verb">acct</spanx> URI as defined in <xref target="RFC7565"/>.  Subject Identifiers in this format MUST contain a <spanx style="verb">uri</spanx> member whose value is the <spanx style="verb">acct</spanx> URI for the subject.  The <spanx style="verb">uri</spanx> member is REQUIRED and MUST NOT be null or empty.  The Account Identifier Format is identified by the name <spanx style="verb">account</spanx>.</t>

<t>Below is a non-normative example Subject Identifier for the Account Identifier Format:</t>

<figure title="Example: Subject Identifier for the Account Identifier Format" anchor="figexamplesubidaccount"><artwork><![CDATA[
{
  "format": "account",
  "uri": "acct:example.user@service.example.com"
}
]]></artwork></figure>

</section>
<section anchor="sub-id-aliases"><name>Aliases Identifier Format</name>
<t>The Aliases Identifier Format describes a subject that is identified with a list of different Subject Identifiers. It is intended for use when a variety of identifiers have been shared with the party that will be interpreting the Subject Identifier, and it is unknown which of those identifiers they will recognize or support.  Subject Identifiers in this format MUST contain an <spanx style="verb">identifiers</spanx> member whose value is a JSON array containing one or more Subject Identifiers.  Each Subject Identifier in the array MUST identify the same entity.  The <spanx style="verb">identifiers</spanx> member is REQUIRED and MUST NOT be null or empty.  It MAY contain multiple instances of the same Identifier Format (e.g., multiple Email Subject Identifiers), but SHOULD NOT contain exact duplicates.  This format is identified by the name <spanx style="verb">aliases</spanx>.</t>

<t><spanx style="verb">aliases</spanx> Subject Identifiers MUST NOT be nested; i.e., the <spanx style="verb">identifiers</spanx> member of an <spanx style="verb">aliases</spanx> Subject Identifier MUST NOT contain a Subject Identifier in the <spanx style="verb">aliases</spanx> format.</t>

<t>Below is a non-normative example Subject Identifier in the Aliases Identifier Format:</t>

<figure title="Example: Subject Identifier in the Aliases Identifier Format" anchor="figexamplesubididtoken"><artwork><![CDATA[
{
  "format": "aliases",
  "identifiers": [
    {
      "format": "email",
      "email": "user@example.com"
    },
    {
      "format": "phone_number",
      "phone_number": "+12065550100"
    },
    {
      "format": "email",
      "email": "user+qualifier@example.com"
    }
  ]
}
]]></artwork></figure>

</section>
<section anchor="sub-id-did"><name>Decentralized Identifier (DID) Format</name>
<t>The Decentralized Identifier Format identifies a subject using a Decentralized Identifier (DID) URL as defined in <xref target="DID"/>.  Subject Identifiers in this format MUST contain a <spanx style="verb">url</spanx> member whose value is a DID URL for the DID Subject being identified. The value of the <spanx style="verb">url</spanx> member MUST be a valid DID URL and MAY be a bare DID. The <spanx style="verb">url</spanx> member is REQUIRED and MUST NOT be null or empty. The Decentralized Identifier Format is identified by the name <spanx style="verb">did</spanx>.</t>

<t>Below are non-normative example Subject Identifiers for the Decentralized Identifier Format:</t>

<figure title="Example: Subject Identifier for the Decentralized Identifier Format, identifying a subject with a bare DID" anchor="figexamplesubiddidbare"><artwork><![CDATA[
{
  "format": "did",
  "url": "did:example:123456"
}
]]></artwork></figure>

<figure title="Example: Subject Identifier for the Decentralized Identifier Format, identifying a subject with a DID URL with non-empty path and query components" anchor="figexamplesubiddidcomplex"><artwork><![CDATA[
{
  "format": "did",
  "url": "did:example:123456/did/url/path?versionId=1"
}
]]></artwork></figure>

</section>
<section anchor="sub-id-email"><name>Email Identifier Format</name>
<t>The Email Identifier Format identifies a subject using an email address.  Subject Identifiers in this format MUST contain an <spanx style="verb">email</spanx> member whose value is a string containing the email address of the subject, formatted as an <spanx style="verb">addr-spec</spanx> as defined in Section 3.4.1 of <xref target="RFC5322"/>. The <spanx style="verb">email</spanx> member is REQUIRED and MUST NOT be null or empty. The value of the <spanx style="verb">email</spanx> member SHOULD identify a mailbox to which email may be delivered, in accordance with <xref target="RFC5321"/>. The Email Identifier Format is identified by the name <spanx style="verb">email</spanx>.</t>

<t>Below is a non-normative example Subject Identifier in the Email Identifier Format:</t>

<figure title="Example: Subject Identifier in the Email Identifier Format" anchor="figexamplesubidemail"><artwork><![CDATA[
{
  "format": "email",
  "email": "user@example.com"
}
]]></artwork></figure>

<section anchor="email-canon"><name>Email Canonicalization</name>
<t>Many email providers will treat multiple email addresses as equivalent. While the domain portion of an <xref target="RFC5322"/> email address is consistently treated as case-insensitive per <xref target="RFC1034"/>, some providers treat the local part of the email address as case-insensitive as well, and consider "user@example.com", "User@example.com", and "USER@example.com" as the same email address. This has led users to view these strings as equivalent, driving service providers to implement proprietary email canonicalization algorithms to ensure that email addresses entered by users resolve to the same canonical string. When receiving an Email Subject Identifier, the recipient SHOULD use their implementation's canonicalization algorithm to resolve the email address to the same string used in their system.</t>

</section>
</section>
<section anchor="sub-id-iss-sub"><name>Issuer and Subject Identifier Format</name>
<t>The Issuer and Subject Identifier Format identifies a subject using a pair of <spanx style="verb">iss</spanx> and <spanx style="verb">sub</spanx> members, analagous to how subjects are identified using the <spanx style="verb">iss</spanx> and <spanx style="verb">sub</spanx> claims in <xref target="OpenID.Core">OpenID Connect</xref> ID Tokens.  These members MUST follow the formats of the <spanx style="verb">iss</spanx> member and <spanx style="verb">sub</spanx> member defined by <xref target="RFC7519"/>, respectively.  Both the <spanx style="verb">iss</spanx> member and the <spanx style="verb">sub</spanx> member are REQUIRED and MUST NOT be null or empty. The Issuer and Subject Identifier Format is identified by the name <spanx style="verb">iss_sub</spanx>.</t>

<t>Below is a non-normative example Subject Identifier in the Issuer and Subject Identifier Format:</t>

<figure title="Example: Subject Identifier in the Issuer and Subject Identifier Format" anchor="figexamplesubidisssub"><artwork><![CDATA[
{
  "format": "iss_sub",
  "iss": "http://issuer.example.com/",
  "sub": "145234573"
}
]]></artwork></figure>

</section>
<section anchor="sub-id-opaque"><name>Opaque Identifier Format</name>
<t>The Opaque Identifier Format describes a subject that is identified with a string with no semantics asserted beyond its usage as an identifier for the subject, such as a UUID or hash used as a surrogate identifier for a record in a database.  Subject Identifiers in this format MUST contain an <spanx style="verb">id</spanx> member whose value is a JSON string containing the opaque string identifier for the subject.  The <spanx style="verb">id</spanx> member is REQUIRED and MUST NOT be null or empty.  The Opaque Identifier Format is identified by the name <spanx style="verb">opaque</spanx>.</t>

<t>Below is a non-normative example Subject Identifier in the Opaque Identifier Format:</t>

<figure title="Example: Subject Identifier in the Opaque Identifier Format" anchor="figexamplesubidopaque"><artwork><![CDATA[
{
  "format": "opaque",
  "id": "11112222333344445555"
}
]]></artwork></figure>

</section>
<section anchor="sub-id-phone"><name>Phone Number Identifier Format</name>
<t>The Phone Number Identifier Format identifies a subject using a telephone number.  Subject Identifiers in this format MUST contain a <spanx style="verb">phone_number</spanx> member whose value is a string containing the full telephone number of the subject, including international dialing prefix, formatted according to <xref target="E164">E.164</xref>. The <spanx style="verb">phone_number</spanx> member is REQUIRED and MUST NOT be null or empty. The Phone Number Identifier Format is identified by the name <spanx style="verb">phone_number</spanx>.</t>

<t>Below is a non-normative example Subject Identifier in the Email Identifier Format:</t>

<figure title="Example: Subject Identifier in the Phone Number Identifier Format" anchor="figexamplesubidphone"><artwork><![CDATA[
{
  "format": "phone_number",
  "phone_number": "+12065550100"
}
]]></artwork></figure>

</section>
</section>
</section>
<section anchor="jwt-claims"><name>Subject Identifiers in JWTs</name>

<section anchor="jwt-claims-sub_id"><name><spanx style="verb">sub_id</spanx> Claim</name>
<t>The <spanx style="verb">sub</spanx> JWT Claim is defined in Section 4.1.2 of <xref target="RFC7519"/> as containing a string value, and therefore cannot contain a Subject Identifier (which is a JSON object) as its value.  This document defines the <spanx style="verb">sub_id</spanx> JWT Claim, in accordance with Section 4.2 of <xref target="RFC7519"/>, as a common claim that identifies the JWT Subject using a Subject Identifier.  When present, the value of this claim MUST be a Subject Identifier that identifies the subject of the JWT.  The <spanx style="verb">sub_id</spanx> claim MAY be included in a JWT, whether or not the <spanx style="verb">sub</spanx> claim is present.  When both the <spanx style="verb">sub</spanx> and <spanx style="verb">sub_id</spanx> claims are present in a JWT, they MUST identify the same subject, as a JWT has one and only one JWT Subject.</t>

<t>When processing a JWT with both <spanx style="verb">sub</spanx> and <spanx style="verb">sub_id</spanx> claims, implementations MUST NOT rely on both claims to determine the JWT Subject.  An implementation MAY attempt to determine the JWT Subject from one claim and fall back to using the other if it determines it does not understand the format of the first claim.  For example, an implementation may attempt to use <spanx style="verb">sub_id</spanx>, and fall back to using <spanx style="verb">sub</spanx> upon finding that <spanx style="verb">sub_id</spanx> contains a Subject Identifier whose format is not recognized by the implementation.</t>

<t>Below are non-normative examples of JWTs containing the <spanx style="verb">sub_id</spanx> claim:</t>

<figure title="Example: JWT containing a &quot;sub_id&quot; claim and no &quot;sub&quot; claim" anchor="figexamplejwtsubidemail"><artwork><![CDATA[
{
  "iss": "issuer.example.com",
  "sub_id": {
    "format": "email",
    "email": "user@example.com"
  }
}
]]></artwork></figure>

<figure title="Example: JWT where both the &quot;sub&quot; and &quot;sub_id&quot; claims identify the JWT Subject using the same identifier" anchor="figexamplejwtsamesubid"><artwork><![CDATA[
{
  "iss": "issuer.example.com",
  "sub": "user@example.com",
  "sub_id": {
    "format": "email",
    "email": "user@example.com"
  }
}
]]></artwork></figure>

<figure title="Example: JWT where both the &quot;sub&quot; and &quot;sub_id&quot; claims identify the JWT Subject using different values of the same identifier type" anchor="figexamplejwtdiffsubvalues"><artwork><![CDATA[
{
  "iss": "issuer.example.com",
  "sub": "liz@example.com",
  "sub_id": {
    "format": "email",
    "email": "elizabeth@example.com"
  }
}
]]></artwork></figure>

<figure title="Example: JWT where the &quot;sub&quot; and &quot;sub_id&quot; claims identify the JWT Subject via different types of identifiers" anchor="figexamplejwtdiffsubtype"><artwork><![CDATA[
{
  "iss": "issuer.example.com",
  "sub": "user@example.com",
  "sub_id": {
    "format": "account",
    "uri": "acct:example.user@service.example.com"
  }
}
]]></artwork></figure>

</section>
<section anchor="subid-and-isssub-subject-identifiers"><name><spanx style="verb">sub_id</spanx> and <spanx style="verb">iss_sub</spanx> Subject Identifiers</name>
<t>The <spanx style="verb">sub_id</spanx> claim MAY contain an <spanx style="verb">iss_sub</spanx> Subject Identifier.  In this case, the JWT's <spanx style="verb">iss</spanx> claim and the Subject Identifier's <spanx style="verb">iss</spanx> member MAY be different.  For example, in <xref target="OpenID.Core">OpenID Connect</xref> client may construct such a JWT when sending JWTs back to its OpenID Connect Identity Provider, in order to identify the JWT Subject using an identifier known to be understood by both parties.  Similarly, the JWT's <spanx style="verb">sub</spanx> claim and the Subject Identifier's <spanx style="verb">sub</spanx> member MAY be different.  For example, this may be used by an OpenID Connect client to communicate the JWT Subject's local identifier at the client back to its Identity Provider.</t>

<t>Below are non-normative examples of a JWT where the <spanx style="verb">iss</spanx> claim and <spanx style="verb">iss</spanx> member within the <spanx style="verb">sub_id</spanx> claim are the same, and a JWT where they are different.</t>

<figure title="Example: JWT with an &quot;iss_sub&quot; Subject Identifier where JWT issuer and JWT Subject issuer are the same" anchor="figexamplejwtsameiss"><artwork><![CDATA[
{
  "iss": "issuer.example.com",
  "sub_id": {
    "format": "iss_sub",
    "iss": "issuer.example.com",
    "sub": "example_user"
  }
}
]]></artwork></figure>

<figure title="Example: JWT with an &quot;iss_sub&quot; Subject Identifier where the JWT issuer and JWT Subject issuer are different" anchor="figexamplejwtdiffiss"><artwork><![CDATA[
{
  "iss": "client.example.com",
  "sub_id": {
    "format": "iss_sub",
    "iss": "issuer.example.com",
    "sub": "example_user"
  }
}
]]></artwork></figure>

<figure title="Example: JWT with an &quot;iss_sub&quot; Subject Identifier where the JWT &quot;iss&quot; and &quot;sub&quot; claims differ from the JWT Subject's &quot;iss&quot; and &quot;sub&quot; members" anchor="figexamplejwtdiffisssub"><artwork><![CDATA[
{
  "iss": "client.example.com",
  "sub": "client_user",
  "sub_id": {
    "format": "iss_sub",
    "iss": "issuer.example.com",
    "sub": "example_user"
  }
}
]]></artwork></figure>

</section>
</section>
<section anchor="implementer"><name>Considerations for Specifications that Define Identifier Formats</name>
<t>Identifier Format definitions MUST NOT make assertions or declarations regarding the subject being identified by the Subject Identifier (e.g., an Identifier Format cannot be defined as specifically identifying human end users), as such statements are outside the scope of Identifier Formats and Subject Identifiers, and expanding that scope for some Identifier Formats but not others would harm interoperability, as applications that depend on this expanded scope to disambiguate the subject type would be unable to use Identifier Formats that do not provide such rules.</t>

</section>
<section anchor="privacy"><name>Privacy Considerations</name>

<section anchor="identifier-correlation"><name>Identifier Correlation</name>
<t>The act of presenting two or more identifiers for a single subject together (e.g., within an <spanx style="verb">aliases</spanx> Subject Identifier, or via the <spanx style="verb">sub</spanx> and <spanx style="verb">sub_id</spanx> JWT claims) may communicate more information about the subject than was intended.  For example, the entity to which the identifiers are presented now knows that both identifiers relate to the same subject, and may be able to correlate additional data based on that.  When transmitting Subject Identifiers, the transmitter SHOULD take care that they are only transmitting multiple identifiers together when it is known that the recipient already knows that the identifiers are related (e.g., because they were previously sent to the recipient as claims in an OpenID Connect ID Token), or when correlation is essential to the use case.</t>

<t>The considerations described in Section 6 of <xref target="RFC8417"/> also apply when Subject Identifiers are used within SETs.  The considerations described in Section 12 of <xref target="RFC7519"/> also apply when Subject Identifiers are used within JWTs.</t>

</section>
</section>
<section anchor="security"><name>Security Considerations</name>

<section anchor="confidentiality-and-integrity"><name>Confidentiality and Integrity</name>
<t>This specification does not define any mechanism for ensuring the confidentiality or integrity of a Subject Identifier.  Where such properties are required, implementations MUST use mechanisms provided by the containing format (e.g., integrity protecting SETs or JWTs using JWS <xref target="RFC7515"/>), or at the transport layer or other layer in the application stack (e.g., using TLS <xref target="RFC8446"/>).</t>

<t>Further considerations regarding confidentiality and integrity of SETs can be found in Section 5.1 of <xref target="RFC8417"/>.</t>

</section>
</section>
<section anchor="iana"><name>IANA Considerations</name>

<section anchor="iana-formats"><name>Security Event Identifier Formats Registry</name>
<t>This document defines Identifier Formats, for which IANA is asked to create and maintain a new registry titled "Security Event Identifier Formats".  Initial values for the Security Event Identifier Formats registry are given in <xref target="sub-ids"/>.  Future assignments are to be made through the Expert Review registration policy <xref target="BCP26"/> and shall follow the template presented in <xref target="iana-formats-template"/>.</t>

<t>It is suggested that multiple Designated Experts be appointed who are able to represent the perspectives of different applications using this specification, in order to enable broadly informed review of registration decisions.  In cases where a registration decision could be perceived as creating a conflict of interest for a particular Expert, that Expert should defer to the judgment of the other Experts.</t>

<section anchor="registry-location"><name>Registry Location</name>
<t>(This section to be removed by the RFC Editor before publication as an RFC.)</t>

<t>The authors recommend that the Identifier Formats registry be located at <spanx style="verb">https://www.iana.org/assignments/secevent/</spanx>.</t>

</section>
<section anchor="iana-formats-template"><name>Registration Template</name>

<dl newline="true">
  <dt>Format Name</dt>
  <dd>
    <t>The name of the Identifier Format, as described in <xref target="sub-ids"/>. The name MUST be an ASCII string consisting only of lower-case characters ("a" - "z"), digits ("0" - "9"), underscores ("_"), and hyphens ("-"), and SHOULD NOT exceed 20 characters in length.</t>
  </dd>
  <dt>Format Description</dt>
  <dd>
    <t>A brief description of the Identifier Format.</t>
  </dd>
  <dt>Change Controller</dt>
  <dd>
    <t>For formats defined in documents published by the IETF or its working groups, list "IETF".  For all other formats, list the name of the party responsible for the registration.  Contact information such as mailing address, email address, or phone number may also be provided.</t>
  </dd>
  <dt>Defining Document(s)</dt>
  <dd>
    <t>A reference to the document or documents that define the Identifier Format.  The definition MUST specify the name, format, and meaning of each member that may occur within a Subject Identifier of the defined format, as well as whether each member is optional, required, prohibited, or the circumstances under which the member may be optional, required, or prohibited. URIs that can be used to retrieve copies of each document SHOULD be included.</t>
  </dd>
</dl>

</section>
<section anchor="iana-formats-init"><name>Initial Registry Contents</name>

<section anchor="account-identifier-format"><name>Account Identifier Format</name>

<t><list style="symbols">
  <t>Format Name: "account"</t>
  <t>Format Description: Subject identifier based on <spanx style="verb">acct</spanx> URI.</t>
  <t>Change Controller: IETF</t>
  <t>Defining Document(s): <xref target="sub-ids"/> of this document.</t>
</list></t>

</section>
<section anchor="aliases-identifier-format"><name>Aliases Identifier Format</name>

<t><list style="symbols">
  <t>Format Name: "aliases"</t>
  <t>Format Description: Subject identifier that groups together multiple different subject identifiers for the same subject.</t>
  <t>Change Controller: IETF</t>
  <t>Defining Document(s): <xref target="sub-ids"/> of this document.</t>
</list></t>

</section>
<section anchor="decentralized-identifier-format"><name>Decentralized Identifier Format</name>

<t><list style="symbols">
  <t>Format Name: "did"</t>
  <t>Format Description: Subject identifier based on a Decentralized Identifier (DID) URL.</t>
  <t>Change Controller: IETF</t>
  <t>Defining Document(s): <xref target="sub-ids"/> of this document.</t>
</list></t>

</section>
<section anchor="email-identifier-format"><name>Email Identifier Format</name>

<t><list style="symbols">
  <t>Format Name: <spanx style="verb">email</spanx></t>
  <t>Format Description: Subject identifier based on email address.</t>
  <t>Change Controller: IETF</t>
  <t>Defining Document(s): <xref target="sub-ids"/> of this document.</t>
</list></t>

</section>
<section anchor="issuer-and-subject-identifier-format"><name>Issuer and Subject Identifier Format</name>

<t><list style="symbols">
  <t>Format Name: "iss_sub"</t>
  <t>Format Description: Subject identifier based on an issuer and subject.</t>
  <t>Change Controller: IETF</t>
  <t>Defining Document(s): <xref target="sub-ids"/> of this document.</t>
</list></t>

</section>
<section anchor="opaque-identifier-format"><name>Opaque Identifier Format</name>

<t><list style="symbols">
  <t>Format Name: "opaque"</t>
  <t>Format Description: Subject identifier based on an opaque string.</t>
  <t>Change Controller: IETF</t>
  <t>Defining Document(s): <xref target="sub-ids"/> of this document.</t>
</list></t>

</section>
<section anchor="phone-number-identifier-format"><name>Phone Number Identifier Format</name>

<t><list style="symbols">
  <t>Format Name: "phone_number"</t>
  <t>Format Description: Subject identifier based on an phone number.</t>
  <t>Change Controller: IETF</t>
  <t>Defining Document(s): <xref target="sub-ids"/> of this document.</t>
</list></t>

</section>
</section>
<section anchor="iana-formats-expert"><name>Guidance for Expert Reviewers</name>
<t>The Expert Reviewer is expected to review the documentation referenced in a registration request to verify its completeness. The Expert Reviewer must base their decision to accept or reject the request on a fair and impartial assessment of the request. If the Expert Reviewer has a conflict of interest, such as being an author of a defining document referenced by the request, they must recuse themselves from the approval process for that request. In the case where a request is rejected, the Expert Reviewer should provide the requesting party with a written statement expressing the reason for rejection, and be prepared to cite any sources of information that went into that decision.</t>

<t>Identifier Formats need not be generally applicable and may be highly specific to a particular domain; it is expected that formats may be registered for niche or industry-specific use cases. The Expert Reviewer should focus on whether the format is thoroughly documented, and whether its registration will promote or harm interoperability.  In most cases, the Expert Reviewer should not approve a request if the registration would contribute to confusion, or amount to a synonym for an existing format.</t>

</section>
</section>
<section anchor="json-web-token-claims-registration"><name>JSON Web Token Claims Registration</name>
<t>This document defines the <spanx style="verb">sub_id</spanx> JWT Claim, which IANA is asked to register in the "JSON Web Token Claims" registry <xref target="IANA.JWT.Claims">IANA JSON Web Token Claims Registry</xref> established by <xref target="RFC7519"/>.</t>

<section anchor="registry-contents"><name>Registry Contents</name>

<t><list style="symbols">
  <t>Claim Name: "sub_id"</t>
  <t>Claim Description: Subject Identifier</t>
  <t>Change Controller: IESG</t>
  <t>Specification Document(s): <xref target="jwt-claims-sub_id"/> of this document.</t>
</list></t>

</section>
</section>
</section>


  </middle>

  <back>

    <references title='Normative References'>





<reference anchor='BCP26' target='https://www.rfc-editor.org/info/rfc8126'>
<front>
<title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
<author fullname='M. Cotton' initials='M.' surname='Cotton'><organization/></author>
<author fullname='B. Leiba' initials='B.' surname='Leiba'><organization/></author>
<author fullname='T. Narten' initials='T.' surname='Narten'><organization/></author>
<date month='June' year='2017'/>
<abstract><t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters.  To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper.  For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t><t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed.  This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t><t>This is the third edition of this document; it obsoletes RFC 5226.</t></abstract>
</front>
<seriesInfo name='BCP' value='26'/>
<seriesInfo name='RFC' value='8126'/>
<seriesInfo name='DOI' value='10.17487/RFC8126'/>
</reference>


<reference anchor="E164" target="http://www.itu.int/rec/T-REC-E.164-201011-I/en">
  <front>
    <title>The international public telecommunication numbering plan</title>
    <author >
      <organization>International Telecommunication Union</organization>
    </author>
    <date year="2010"/>
  </front>
</reference>
<reference anchor="IANA.JWT.Claims" target="http://www.iana.org/assignments/jwt">
  <front>
    <title>JSON Web Token Claims</title>
    <author >
      <organization>IANA</organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="DID" target="https://www.w3.org/TR/did-core/">
  <front>
    <title>Decentralized Identifiers (DIDs) v1.0</title>
    <author >
      <organization>World Wide Web Consortium (W3C)</organization>
    </author>
    <date year="2021"/>
  </front>
</reference>




<reference anchor='RFC8417' target='https://www.rfc-editor.org/info/rfc8417'>
<front>
<title>Security Event Token (SET)</title>
<author fullname='P. Hunt' initials='P.' role='editor' surname='Hunt'><organization/></author>
<author fullname='M. Jones' initials='M.' surname='Jones'><organization/></author>
<author fullname='W. Denniss' initials='W.' surname='Denniss'><organization/></author>
<author fullname='M. Ansari' initials='M.' surname='Ansari'><organization/></author>
<date month='July' year='2018'/>
<abstract><t>This specification defines the Security Event Token (SET) data structure.  A SET describes statements of fact from the perspective of an issuer about a subject.  These statements of fact represent an event that occurred directly to or about a security subject, for example, a statement about the issuance or revocation of a token on behalf of a subject.  This specification is intended to enable representing security- and identity-related events.  A SET is a JSON Web Token (JWT), which can be optionally signed and/or encrypted. SETs can be distributed via protocols such as HTTP.</t></abstract>
</front>
<seriesInfo name='RFC' value='8417'/>
<seriesInfo name='DOI' value='10.17487/RFC8417'/>
</reference>



<reference anchor='RFC7519' target='https://www.rfc-editor.org/info/rfc7519'>
<front>
<title>JSON Web Token (JWT)</title>
<author fullname='M. Jones' initials='M.' surname='Jones'><organization/></author>
<author fullname='J. Bradley' initials='J.' surname='Bradley'><organization/></author>
<author fullname='N. Sakimura' initials='N.' surname='Sakimura'><organization/></author>
<date month='May' year='2015'/>
<abstract><t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties.  The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t></abstract>
</front>
<seriesInfo name='RFC' value='7519'/>
<seriesInfo name='DOI' value='10.17487/RFC7519'/>
</reference>



<reference anchor='RFC7159' target='https://www.rfc-editor.org/info/rfc7159'>
<front>
<title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
<author fullname='T. Bray' initials='T.' role='editor' surname='Bray'><organization/></author>
<date month='March' year='2014'/>
<abstract><t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format.  It was derived from the ECMAScript Programming Language Standard.  JSON defines a small set of formatting rules for the portable representation of structured data.</t><t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t></abstract>
</front>
<seriesInfo name='RFC' value='7159'/>
<seriesInfo name='DOI' value='10.17487/RFC7159'/>
</reference>



<reference anchor='RFC2119' target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author fullname='S. Bradner' initials='S.' surname='Bradner'><organization/></author>
<date month='March' year='1997'/>
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference anchor='RFC7565' target='https://www.rfc-editor.org/info/rfc7565'>
<front>
<title>The 'acct' URI Scheme</title>
<author fullname='P. Saint-Andre' initials='P.' surname='Saint-Andre'><organization/></author>
<date month='May' year='2015'/>
<abstract><t>This document defines the 'acct' Uniform Resource Identifier (URI) scheme as a way to identify a user's account at a service provider, irrespective of the particular protocols that can be used to interact with the account.</t></abstract>
</front>
<seriesInfo name='RFC' value='7565'/>
<seriesInfo name='DOI' value='10.17487/RFC7565'/>
</reference>



<reference anchor='RFC5322' target='https://www.rfc-editor.org/info/rfc5322'>
<front>
<title>Internet Message Format</title>
<author fullname='P. Resnick' initials='P.' role='editor' surname='Resnick'><organization/></author>
<date month='October' year='2008'/>
<abstract><t>This document specifies the Internet Message Format (IMF), a syntax for text messages that are sent between computer users, within the framework of &quot;electronic mail&quot; messages.  This specification is a revision of Request For Comments (RFC) 2822, which itself superseded Request For Comments (RFC) 822, &quot;Standard for the Format of ARPA Internet Text Messages&quot;, updating it to reflect current practice and incorporating incremental changes that were specified in other RFCs.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5322'/>
<seriesInfo name='DOI' value='10.17487/RFC5322'/>
</reference>



<reference anchor='RFC5321' target='https://www.rfc-editor.org/info/rfc5321'>
<front>
<title>Simple Mail Transfer Protocol</title>
<author fullname='J. Klensin' initials='J.' surname='Klensin'><organization/></author>
<date month='October' year='2008'/>
<abstract><t>This document is a specification of the basic protocol for Internet electronic mail transport.  It consolidates, updates, and clarifies several previous documents, making all or parts of most of them obsolete.  It covers the SMTP extension mechanisms and best practices for the contemporary Internet, but does not provide details about particular extensions.  Although SMTP was designed as a mail transport and delivery protocol, this specification also contains information that is important to its use as a &quot;mail submission&quot; protocol for &quot;split-UA&quot; (User Agent) mail reading systems and mobile environments.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5321'/>
<seriesInfo name='DOI' value='10.17487/RFC5321'/>
</reference>




    </references>

    <references title='Informative References'>

<reference anchor="OpenID.Core" target="http://openid.net/specs/openid-connect-core-1_0.html">
  <front>
    <title>OpenID Connect Core 1.0</title>
    <author initials="N." surname="Sakimura" fullname="Nat Sakimura">
      <organization>Nomura Research Institute, Ltd.</organization>
    </author>
    <author initials="J." surname="Bradley" fullname="John Bradley">
      <organization>Ping Identity</organization>
    </author>
    <author initials="M." surname="Jones" fullname="Michael B. Jones">
      <organization>Microsoft</organization>
    </author>
    <author initials="B." surname="de Medeiros" fullname="Breno de Medeiros">
      <organization>Google</organization>
    </author>
    <author initials="C." surname="Mortimore" fullname="Chuck Mortimore">
      <organization>Salesforce</organization>
    </author>
    <date year="2014" month="November"/>
  </front>
</reference>




<reference anchor='RFC1034' target='https://www.rfc-editor.org/info/rfc1034'>
<front>
<title>Domain names - concepts and facilities</title>
<author fullname='P.V. Mockapetris' initials='P.V.' surname='Mockapetris'><organization/></author>
<date month='November' year='1987'/>
<abstract><t>This RFC is the revised basic definition of The Domain Name System.  It obsoletes RFC-882.  This memo describes the domain style names and their used for host address look up and electronic mail forwarding.  It discusses the clients and servers in the domain name system and the protocol used between them.</t></abstract>
</front>
<seriesInfo name='STD' value='13'/>
<seriesInfo name='RFC' value='1034'/>
<seriesInfo name='DOI' value='10.17487/RFC1034'/>
</reference>



<reference anchor='RFC7515' target='https://www.rfc-editor.org/info/rfc7515'>
<front>
<title>JSON Web Signature (JWS)</title>
<author fullname='M. Jones' initials='M.' surname='Jones'><organization/></author>
<author fullname='J. Bradley' initials='J.' surname='Bradley'><organization/></author>
<author fullname='N. Sakimura' initials='N.' surname='Sakimura'><organization/></author>
<date month='May' year='2015'/>
<abstract><t>JSON Web Signature (JWS) represents content secured with digital signatures or Message Authentication Codes (MACs) using JSON-based data structures.  Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and an IANA registry defined by that specification.  Related encryption capabilities are described in the separate JSON Web Encryption (JWE) specification.</t></abstract>
</front>
<seriesInfo name='RFC' value='7515'/>
<seriesInfo name='DOI' value='10.17487/RFC7515'/>
</reference>



<reference anchor='RFC8446' target='https://www.rfc-editor.org/info/rfc8446'>
<front>
<title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
<author fullname='E. Rescorla' initials='E.' surname='Rescorla'><organization/></author>
<date month='August' year='2018'/>
<abstract><t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol.  TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t><t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961.  This document also specifies new requirements for TLS 1.2 implementations.</t></abstract>
</front>
<seriesInfo name='RFC' value='8446'/>
<seriesInfo name='DOI' value='10.17487/RFC8446'/>
</reference>




    </references>


<section numbered="no" anchor="acknowledgements"><name>Acknowledgements</name>
<t>The authors would like to thank the members of the IETF Security Events working group, as well as those of the OpenID Shared Signals and Events Working Group, whose work provided the original basis for this document.</t>

</section>
<section numbered="no" anchor="change-log"><name>Change Log</name>
<t>(This section to be removed by the RFC Editor before publication as an RFC.)</t>

<t>Draft 00 - AB - First draft</t>

<t>Draft 01 - AB:</t>

<t><list style="symbols">
  <t>Added reference to RFC 5322 for format of <spanx style="verb">email</spanx> claim.</t>
  <t>Renamed <spanx style="verb">iss_sub</spanx> type to <spanx style="verb">iss-sub</spanx>.</t>
  <t>Renamed <spanx style="verb">id_token_claims</spanx> type to <spanx style="verb">id-token-claims</spanx>.</t>
  <t>Added text specifying the nature of the subjects described by each type.</t>
</list></t>

<t>Draft 02 - AB:</t>

<t><list style="symbols">
  <t>Corrected format of phone numbers in examples.</t>
  <t>Updated author info.</t>
</list></t>

<t>Draft 03 - AB:</t>

<t><list style="symbols">
  <t>Added <spanx style="verb">account</spanx> type for <spanx style="verb">acct</spanx> URIs.</t>
  <t>Replaced <spanx style="verb">id-token-claims</spanx> type with <spanx style="verb">aliases</spanx> type.</t>
  <t>Added email canonicalization guidance.</t>
  <t>Updated semantics for <spanx style="verb">email</spanx>, <spanx style="verb">phone</spanx>, and <spanx style="verb">iss-sub</spanx> types.</t>
</list></t>

<t>Draft 04 - AB:</t>

<t><list style="symbols">
  <t>Added <spanx style="verb">sub_id</spanx> JWT Claim definition, guidance, examples.</t>
  <t>Added text prohibiting <spanx style="verb">aliases</spanx> nesting.</t>
  <t>Added privacy considerations for identifier correlation.</t>
</list></t>

<t>Draft 05 - AB:</t>

<t><list style="symbols">
  <t>Renamed the <spanx style="verb">phone</spanx> type to <spanx style="verb">phone-number</spanx> and its <spanx style="verb">phone</spanx> claim to <spanx style="verb">phone_number</spanx>.</t>
</list></t>

<t>Draft 06 - AB:</t>

<t><list style="symbols">
  <t>Replaced usage of the word "claim" to describe members of a Subject Identifier with the word "member", in accordance with terminology in RFC7159.</t>
  <t>Renamed the <spanx style="verb">phone-number</spanx> type to <spanx style="verb">phone_number</spanx> and <spanx style="verb">iss-sub</spanx> to <spanx style="verb">iss_sub</spanx>.</t>
  <t>Added normative requirements limiting the use of both <spanx style="verb">sub</spanx> and <spanx style="verb">sub_id</spanx> claims together when processing a JWT.</t>
  <t>Clarified that identifier correlation may be acceptable when it is a core part of the use case.</t>
  <t>Replaced references to OIDF with IETF in IANA Considerations.</t>
  <t>Recommended the appointment of multiple Designated Experts, and a location for the Subject Identifier Types registry.</t>
  <t>Added "_" to list of allowed characters in the Type Name for Subject Identifier Types.</t>
  <t>Clarified that Subject Identifiers don't provide confidentiality or integrity protection.</t>
  <t>Added references to SET, JWT privacy and security considerations.</t>
  <t>Added section describing the difference between subject identifier type and principal type that hopefully clarifies things and doesn't just muddy the water further.</t>
</list></t>

<t>Draft 07 - AB:</t>

<t><list style="symbols">
  <t>Emphasized that the spec is about identifiers, not the things they identify:
  <list style="symbols">
      <t>Renamed "Subject Identifier Type" to "Identifier Format".</t>
      <t>Renamed <spanx style="verb">subject_type</spanx> to <spanx style="verb">format</spanx>.</t>
      <t>Renamed "Security Event Subject Identifier Type Registry" to "Security Event Identifier Format Registry".</t>
      <t>Added new section with guidance for specs defining Identifier Formats, with normative prohibition on formats that describe the subject itself, rather than the identifier.</t>
    </list></t>
  <t>Clarified the meaning of "subject":
  <list style="symbols">
      <t>Defined "subject" as applying generically and "JWT Subject" as applying specifically to the subject of a JWT.</t>
      <t>Replaced most instances of the word "principal" with "subject".</t>
    </list></t>
  <t>Added <spanx style="verb">opaque</spanx> Identifier Format</t>
</list></t>

<t>Draft 08 - JR, AB:</t>

<t><list style="symbols">
  <t>Added <spanx style="verb">did</spanx> Identifier Format</t>
  <t>Alphabetized identifier format definitions</t>
  <t>Replaced "type" with "format" in places that had been missed in the -07 change. (mostly IANA Considerations)</t>
  <t>Miscellaneous editorial fixes</t>
</list></t>

<t>Draft 09 - AB:</t>

<t><list style="symbols">
  <t>Miscellaneous editorial fixes</t>
</list></t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

