<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.4.13 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>

<rfc ipr="trust200902" docName="draft-ietf-secevent-subject-identifiers-08" category="std">

  <front>
    <title abbrev="secevent-subject-identifiers">Subject Identifiers for Security Event Tokens</title>

    <author initials="A." surname="Backman" fullname="Annabelle Backman" role="editor">
      <organization>Amazon</organization>
      <address>
        <email>richanna@amazon.com</email>
      </address>
    </author>
    <author initials="M." surname="Scurtescu" fullname="Marius Scurtescu">
      <organization>Coinbase</organization>
      <address>
        <email>marius.scurtescu@coinbase.com</email>
      </address>
    </author>

    <date year="2021" month="May" day="24"/>

    <area>Security</area>
    <workgroup>Security Events Working Group</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>Security events communicated within Security Event Tokens may support a variety of identifiers to identify subjects related to the event.  This specification formalizes the notion of subject identifiers as structured information that describe a subject, and named formats that define the syntax and semantics for encoding subject identifiers as JSON objects.  It also defines a registry for defining and allocating names for such formats, as well as the <spanx style="verb">sub_id</spanx> JSON Web Token (JWT) claim.</t>



    </abstract>


  </front>

  <middle>


<section anchor="intro" title="Introduction">
<t>As described in Section 1.2 of SET <xref target="RFC8417"/>, subjects related to security events may take a variety of forms, including but not limited to a JWT <xref target="RFC7519"/> principal, an IP address, a URL, etc.  Different types of subjects may need to be identified in different ways. (e.g., a host might be identified by an IP or MAC address, while a user might be identified by an email address)  Furthermore, even in the case where the type of the subject is known, there may be multiple ways by which a given subject may be identified.  For example, an account may be identified by an opaque identifier, an email address, a phone number, a JWT <spanx style="verb">iss</spanx> claim and <spanx style="verb">sub</spanx> claim, etc., depending on the nature and needs of the transmitter and receiver. Even within the context of a given transmitter and receiver relationship, it may be appropriate to identify different accounts in different ways, for example if some accounts only have email addresses associated with them while others only have phone numbers. Therefore it can be necessary to indicate within a SET the mechanism by which a subject is being identified.</t>

<t>To address this problem, this specification defines Subject Identifiers - JSON <xref target="RFC7159"/> objects containing information identifying a subject - and Identifier Formats - named sets of rules describing how to encode different kinds of subject identifying information (e.g., an email address, or an issuer and subject pair) as a Subject Identifier.</t>

<t>Below is a non-normative example of a Subject Identifier that identifies a subject by email address, using the Email Identifier Format.</t>

<figure title="Example: Subject Identifier using the Email Identifier Format" anchor="figexampleintro"><artwork><![CDATA[
{
  "format": "email",
  "email": "user@example.com"
}
]]></artwork></figure>

<t>Subject Identifiers are intended to be a general purpose mechanism for identifying subjects within JSON objects and their usage need not be limited to SETs.  Below is a non-normative example of a JWT that uses a Subject Identifier in the <spanx style="verb">sub_id</spanx> claim (defined in this specification) to identify the JWT Subject.</t>

<figure title="Example: JWT using a Subject Identifier with the sub_id claim" anchor="figexampleintro2"><artwork><![CDATA[
{
  "iss": "issuer.example.com",
  "sub_id": {
    "format": "phone_number",
    "phone_number": "+12065550100"
  }
}
]]></artwork></figure>

<t>Usage of Subject Identifiers also need not be limited to identifying JWT Subjects.  They are intended as a general purpose means of expressing identifying information in an unambiguous manner.  Below is a non-normative example of a SET containing a hypothetical security event describing the interception of a message, using Subject Identifiers to identify the sender, intended recipient, and interceptor.</t>

<figure title="Example: SET with an event payload containing multiple Subject Identifiers" anchor="figexampleintro3"><artwork><![CDATA[
{
  "iss": "issuer.example.com",
  "iat": 1508184845,
  "aud": "aud.example.com",
  "events": {
    "https://secevent.example.com/events/message-interception": {
      "from": {
        "format": "email",
        "email": "alice@example.com"
      },
      "to": {
        "format": "email",
        "email": "bob@example.com"
      },
      "interceptor": {
        "format": "email",
        "email": "eve@example.com"
      }
    }
  }
}

]]></artwork></figure>

</section>
<section anchor="conv" title="Notational Conventions">
<t>The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL NOT”,
“SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “MAY”, and “OPTIONAL” in this
document are to be interpreted as described in <xref target="RFC2119"/>.</t>

<section anchor="defn" title="Definitions">
<t>This specification utilizes terminology defined in <xref target="RFC7159"/>, <xref target="RFC7519"/>, and <xref target="RFC8417"/>.</t>

<t>Within this specification, the terms “Subject” and “subject” refer generically to anything being identified via one or more pieces of information.  The term “JWT Subject” refers specifically to the to the subject of a JWT. (i.e., the subject that the JWT asserts claims about)</t>

</section>
</section>
<section anchor="sub-ids" title="Subject Identifiers">
<t>A Subject Identifier is a JSON <xref target="RFC7159"/> object whose contents may be used to identify a subject within some context.  An Identifier Format is a named definition of a set of information that may be used to identify a subject, and the rules for encoding that information as a Subject Identifier; they define the syntax and semantics of Subject Identifiers.  A Subject Identifier MUST conform to a specific Identifier Format, and MUST contain a <spanx style="verb">format</spanx> member whose value is the name of that Identifier Format.</t>

<t>Every Identifier Format MUST have a unique name registered in the IANA “Security Event Identifier Formats” registry established by <xref target="iana-formats"/>, or a Collision-Resistant Name as defined in <xref target="RFC7519"/>.  Identifier Formats that are expected to be used broadly by a variety of parties SHOULD be registered in the “Security Event Identifier Formats” registry.</t>

<t>An Identifier Format MAY describe more members than are strictly necessary to identify a subject, and MAY describe conditions under which those members are required, optional, or prohibited.  The <spanx style="verb">format</spanx> member is reserved for use as described in this specification; Identifier Formats MUST NOT declare any rules regarding the <spanx style="verb">format</spanx> member.</t>

<t>Every member within a Subject Identifier MUST match the rules specified for that member by this specification or by Subject Identifier’s Identifier Format.  A Subject Identifier MUST NOT contain any members prohibited or not described by its Identifier Format, and MUST contain all members required by its Identifier Format.</t>

<section anchor="identifier-formats-versus-principal-types" title="Identifier Formats versus Principal Types">
<t>Identifier Formats define how to encode identifying information for a subject.  They do not define the type or nature of the subject itself.  E.g., While the <spanx style="verb">email</spanx> Identifier Format declares that the value of the <spanx style="verb">email</spanx> member is an email address, a subject in a Security Event that is identified by an <spanx style="verb">email</spanx> Subject Identifier could be an end user who controls that email address, the mailbox itself, or anything else that the transmitter and receiver both understand to be associated with that email address.  Consequently Subject Identifiers remove ambiguity around how a subject is being identified, and how to parse an identifying structure, but do not remove ambiguity around how to resolve that identifier to a subject.  For example, consider a directory management API that allows callers to identify users and groups through both opaque unique identifiers and email addresses.  Such an API could use Subject Identifiers to disambiguate between which of these two types of identifiers is in use.  However, the API would have to determine whether the subject is a user or group via some other means, such as by querying a database, interpreting other parameters in the request, or inferring the type from the API contract.</t>

</section>
<section anchor="identifier-format-definitions" title="Identifier Format Definitions">

<t>The following Identifier Formats are registered in the IANA “Security Event Identifier Formats” registry established by <xref target="iana-formats"/>.</t>

<section anchor="sub-id-acct" title="Account Identifier Format">
<t>The Account Identifier Format identifies a subject using an account at a service provider, identified with an <spanx style="verb">acct</spanx> URI as defined in <xref target="RFC7565"/>.  Subject Identifiers in this format MUST contain a <spanx style="verb">uri</spanx> member whose value is the <spanx style="verb">acct</spanx> URI for the subject.  The <spanx style="verb">uri</spanx> member is REQUIRED and MUST NOT be null or empty.  The Account Identifier Format is identified by the name <spanx style="verb">account</spanx>.</t>

<t>Below is a non-normative example Subject Identifier for the Account Identifier Format:</t>

<figure title="Example: Subject Identifier for the Account Identifier Format" anchor="figexamplesubidaccount"><artwork><![CDATA[
{
  "format": "account",
  "uri": "acct:example.user@service.example.com"
}
]]></artwork></figure>

</section>
<section anchor="sub-id-aliases" title="Aliases Identifier Format">
<t>The Aliases Identifier Format describes a subject that is identified with a list of different Subject Identifiers. It is intended for use when a variety of identifiers have been shared with the party that will be interpreting the Subject Identifier, and it is unknown which of those identifiers they will recognize or support.  Subject Identifiers in this format MUST contain an <spanx style="verb">identifiers</spanx> member whose value is a JSON array containing one or more Subject Identifiers.  Each Subject Identifier in the array MUST identify the same entity.  The <spanx style="verb">identifiers</spanx> member is REQUIRED and MUST NOT be null or empty.  It MAY contain multiple instances of the same Identifier Format (e.g., multiple Email Subject Identifiers), but SHOULD NOT contain exact duplicates.  This format is identified by the name <spanx style="verb">aliases</spanx>.</t>

<t><spanx style="verb">alias</spanx> Subject Identifiers MUST NOT be nested; i.e., the <spanx style="verb">identifiers</spanx> member of an <spanx style="verb">alias</spanx> Subject Identifier MUST NOT contain a Subject Identifier in the <spanx style="verb">aliases</spanx> format.</t>

<t>Below is a non-normative example Subject Identifier in the Aliases Identifier Format:</t>

<figure title="Example: Subject Identifier in the Aliases Identifier Format" anchor="figexamplesubididtoken"><artwork><![CDATA[
{
  "format": "aliases",
  "identifiers": [
    {
      "format": "email",
      "email": "user@example.com"
    },
    {
      "format": "phone_number",
      "phone_number": "+12065550100"
    },
    {
      "format": "email",
      "email": "user+qualifier@example.com"
    }
  ]
}
]]></artwork></figure>

</section>
<section anchor="sub-id-did" title="Decentralized Identifier (DID) Format">
<t>The Decentralized Identifier Format identifies a subject using a Decentralized Identifier (DID) URL as defined in <xref target="DID"/>.  Subject Identifiers in this format MUST contain a <spanx style="verb">url</spanx> member whose value is a DID URL for the DID Subject being identified. The value of the <spanx style="verb">url</spanx> member MUST be a valid DID URL and MAY be a bare DID. The <spanx style="verb">url</spanx> member is REQUIRED and MUST NOT be null or empty. The Decentralized Identifier Format is identified by the name <spanx style="verb">did</spanx>.</t>

<t>Below are non-normative example Subject Identifiers for the Decentralized Identifier Format:</t>

<figure title="Example: Subject Identifier for the Decentralized Identifier Format, identifying a subject with a bare DID" anchor="figexamplesubiddidbare"><artwork><![CDATA[
{
  "format": "did",
  "url": "did:example:123456"
}
]]></artwork></figure>

<figure title="Example: Subject Identifier for the Decentralized Identifier Format, identifying a subject with a DID URL with non-empty path and query components" anchor="figexamplesubiddidcomplex"><artwork><![CDATA[
{
  "format": "did",
  "url": "did:example:123456/did/url/path?versionId=1"
}
]]></artwork></figure>

</section>
<section anchor="sub-id-email" title="Email Identifier Format">
<t>The Email Identifier Format identifies a subject using an email address.  Subject Identifiers in this format MUST contain an <spanx style="verb">email</spanx> member whose value is a string containing the email address of the subject, formatted as an <spanx style="verb">addr-spec</spanx> as defined in Section 3.4.1 of <xref target="RFC5322"/>. The <spanx style="verb">email</spanx> member is REQUIRED and MUST NOT be null or empty. The value of the <spanx style="verb">email</spanx> member SHOULD identify a mailbox to which email may be delivered, in accordance with <xref target="RFC5321"/>. The Email Identifier Format is identified by the name <spanx style="verb">email</spanx>.</t>

<t>Below is a non-normative example Subject Identifier in the Email Identifier Format:</t>

<figure title="Example: Subject Identifier in the Email Identifier Format" anchor="figexamplesubidemail"><artwork><![CDATA[
{
  "format": "email",
  "email": "user@example.com"
}
]]></artwork></figure>

<section anchor="email-canon" title="Email Canonicalization">
<t>Many email providers will treat multiple email addresses as equivalent. While the domain portion of an <xref target="RFC5322"/> email address is consistently treated as case-insensitive per <xref target="RFC1034"/>, some providers treat the local part of the email address as case-insensitive as well, and consider “user@example.com”, “User@example.com”, and “USER@example.com” as the same email address. This has led users to view these strings as equivalent, driving service providers to implement proprietary email canonicalization algorithms to ensure that email addresses entered by users resolve to the same canonical string. When receiving an Email Subject Identifier, the recipient SHOULD use their implementation’s canonicalization algorithm to resolve the email address to the same string used in their system.</t>

</section>
</section>
<section anchor="sub-id-iss-sub" title="Issuer and Subject Identifier Format">
<t>The Issuer and Subject Identifier Format identifies a subject using a pair of <spanx style="verb">iss</spanx> and <spanx style="verb">sub</spanx> members, analagous to how subjects are identified using the <spanx style="verb">iss</spanx> and <spanx style="verb">sub</spanx> claims in <xref target="OpenID.Core">OpenID Connect</xref> ID Tokens.  These members MUST follow the formats of the <spanx style="verb">iss</spanx> member and <spanx style="verb">sub</spanx> member defined by <xref target="RFC7519"/>, respectively.  Both the <spanx style="verb">iss</spanx> member and the <spanx style="verb">sub</spanx> member are REQUIRED and MUST NOT be null or empty. The Issuer and Subject Identifier Format is identified by the name <spanx style="verb">iss_sub</spanx>.</t>

<t>Below is a non-normative example Subject Identifier in the Issuer and Subject Identifier Format:</t>

<figure title="Example: Subject Identifier in the Issuer and Subject Identifier Format" anchor="figexamplesubidisssub"><artwork><![CDATA[
{
  "format": "iss_sub",
  "iss": "http://issuer.example.com/",
  "sub": "145234573"
}
]]></artwork></figure>

</section>
<section anchor="sub-id-opaque" title="Opaque Identifier Format">
<t>The Opaque Identifier Format describes a subject that is identified with a string with no semantics asserted beyond its usage as an identifier for the subject, such as a UUID or hash used as a surrogate identifier for a record in a database.  Subject Identifiers in this format MUST contain an <spanx style="verb">id</spanx> member whose value is a JSON string containing the opaque string identifier for the subject.  The <spanx style="verb">id</spanx> member is REQUIRED and MUST NOT be null or empty.  The Opaque Identifier Format is identified by the name <spanx style="verb">opaque</spanx>.</t>

<t>Below is a non-normative example Subject Identifier in the Opaque Identifier Format:</t>

<figure title="Example: Subject Identifier in the Opaque Identifier Format" anchor="figexamplesubidopaque"><artwork><![CDATA[
{
  "format": "opaque",
  "id": "11112222333344445555"
}
]]></artwork></figure>

</section>
<section anchor="sub-id-phone" title="Phone Number Identifier Format">
<t>The Phone Number Identifier Format identifies a subject using a telephone number.  Subject Identifiers in this format MUST contain a <spanx style="verb">phone_number</spanx> member whose value is a string containing the full telephone number of the subject, including international dialing prefix, formatted according to <xref target="E164">E.164</xref>. The <spanx style="verb">phone_number</spanx> member is REQUIRED and MUST NOT be null or empty. The Phone Number Identifier Format is identified by the name <spanx style="verb">phone_number</spanx>.</t>

<t>Below is a non-normative example Subject Identifier in the Email Identifier Format:</t>

<figure title="Example: Subject Identifier in the Phone Number Identifier Format." anchor="figexamplesubidphone"><artwork><![CDATA[
{
  "format": "phone_number",
  "phone_number": "+12065550100"
}
]]></artwork></figure>

</section>
</section>
</section>
<section anchor="jwt-claims" title="Subject Identifiers in JWTs">

<section anchor="jwt-claims-sub_id" title="“sub_id” Claim">
<t>The <spanx style="verb">sub</spanx> JWT Claim is defined in Section 4.1.2 of <xref target="RFC7519"/> as containing a string value, and therefore cannot contain a Subject Identifier (which is a JSON object) as its value.  This document defines the <spanx style="verb">sub_id</spanx> JWT Claim, in accordance with Section 4.2 of <xref target="RFC7519"/>, as a common claim that identifies the JWT Subject using a Subject Identifier.  When present, the value of this claim MUST be a Subject Identifier that identifies the subject of the JWT.  The <spanx style="verb">sub_id</spanx> claim MAY be included in a JWT, whether or not the <spanx style="verb">sub</spanx> claim is present.  When both the <spanx style="verb">sub</spanx> and <spanx style="verb">sub_id</spanx> claims are present in a JWT, they MUST identify the same subject, as a JWT has one and only one JWT Subject.</t>

<t>When processing a JWT with both <spanx style="verb">sub</spanx> and <spanx style="verb">sub_id</spanx> claims, implementations MUST NOT rely on both claims to determine the JWT Subject.  An implementation MAY attempt to determine the JWT Subject from one claim and fall back to using the other if it determines it does not understand the format of the first claim.  For example, an implementation may attempt to use <spanx style="verb">sub_id</spanx>, and fall back to using <spanx style="verb">sub</spanx> upon finding that <spanx style="verb">sub_id</spanx> contains a Subject Identifier whose format is not recognized by the implementation.</t>

<t>Below are non-normative examples of JWTs containing the <spanx style="verb">sub_id</spanx> claim:</t>

<figure title="Example: JWT containing a `sub_id` claim and no `sub` claim" anchor="figexamplejwtsubidemail"><artwork><![CDATA[
{
  "iss": "issuer.example.com",
  "sub_id": {
    "format": "email",
    "email": "user@example.com"
  }
}
]]></artwork></figure>

<figure title="Example: JWT where both the `sub` and `sub_id` claims identify the JWT Subject using the same identifier" anchor="figexamplejwtsamesubid"><artwork><![CDATA[
{
  "iss": "issuer.example.com",
  "sub": "user@example.com",
  "sub_id": {
    "format": "email",
    "email": "user@example.com"
  }
}
]]></artwork></figure>

<figure title="Example: JWT where both the `sub` and `sub_id` claims identify the JWT Subject using different values of the same identifier type" anchor="figexamplejwtdiffsubvalues"><artwork><![CDATA[
{
  "iss": "issuer.example.com",
  "sub": "user@example.com",
  "sub_id": {
    "format": "email",
    "email": "elizabeth@example.com"
  }
}
]]></artwork></figure>

<figure title="Example: JWT where the `sub` and `sub_id` claims identify the JWT Subject via different types of identifiers" anchor="figexamplejwtdiffsubtype"><artwork><![CDATA[
{
  "iss": "issuer.example.com",
  "sub": "user@example.com",
  "sub_id": {
    "format": "account",
    "uri": "acct:example.user@service.example.com"
  }
}
]]></artwork></figure>

</section>
<section anchor="subid-and-isssub-subject-identifiers" title="“sub_id” and “iss_sub” Subject Identifiers">
<t>The <spanx style="verb">sub_id</spanx> claim MAY contain an <spanx style="verb">iss_sub</spanx> Subject Identifier.  In this case, the JWT’s <spanx style="verb">iss</spanx> claim and the Subject Identifier’s <spanx style="verb">iss</spanx> member MAY be different.  For example, in <xref target="OpenID.Core">OpenID Connect</xref> client may construct such a JWT when sending JWTs back to its OpenID Connect Identity Provider, in order to identify the JWT Subject using an identifier known to be understood by both parties.  Similarly, the JWT’s <spanx style="verb">sub</spanx> claim and the Subject Identifier’s <spanx style="verb">sub</spanx> member MAY be different.  For example, this may be used by an OpenID Connect client to communicate the JWT Subject’s local identifier at the client back to its Identity Provider.</t>

<t>Below are non-normative examples of a JWT where the <spanx style="verb">iss</spanx> claim and <spanx style="verb">iss</spanx> member within the <spanx style="verb">sub_id</spanx> claim are the same, and a JWT where they are different.</t>

<figure title="Example: JWT with a `iss_sub` Subject Identifier where JWT issuer and JWT Subject issuer are the same" anchor="figexamplejwtsameiss"><artwork><![CDATA[
{
  "iss": "issuer.example.com",
  "sub_id": {
    "format": "iss_sub",
    "iss": "issuer.example.com",
    "sub": "example_user"
  }
}
]]></artwork></figure>

<figure title="Example: JWT with an `iss_sub` Subject Identifier where the JWT issuer and JWT Subject issuer are different" anchor="figexamplejwtdiffiss"><artwork><![CDATA[
{
  "iss": "client.example.com",
  "sub_id": {
    "format": "iss_sub",
    "iss": "issuer.example.com",
    "sub": "example_user"
  }
}
]]></artwork></figure>

<figure title="Example: JWT with an `iss_sub` Subject Identifier where the JWT `iss` and `sub` claims differ from the JWT Subject's `iss` and `sub` members" anchor="figexamplejwtdiffisssub"><artwork><![CDATA[
{
  "iss": "client.example.com",
  "sub": "client_user",
  "sub_id": {
    "format": "iss_sub",
    "iss": "issuer.example.com",
    "sub": "example_user"
  }
}
]]></artwork></figure>

</section>
</section>
<section anchor="implementer" title="Considerations for Specifications that Define Identifier Formats">
<t>Identifier Format definitions MUST NOT make assertions or declarations regarding the subject being identified by the Subject Identifier (e.g., an Identifier Format cannot be defined as specifically identifying human end users), as such statements are outside the scope of Identifier Formats and Subject Identifiers, and expanding that scope for some Identifier Formats but not others would harm interoperability, as applications that depend on this expanded scope to disambiguate the subject type would be unable to use Identifier Formats that do not provide such rules.</t>

</section>
<section anchor="privacy" title="Privacy Considerations">

<section anchor="identifier-correlation" title="Identifier Correlation">
<t>The act of presenting two or more identifiers for a single subject together (e.g., within an <spanx style="verb">aliases</spanx> Subject Identifier, or via the <spanx style="verb">sub</spanx> and <spanx style="verb">sub_id</spanx> JWT claims) may communicate more information about the subject than was intended.  For example, the entity to which the identifiers are presented now knows that both identifiers relate to the same subject, and may be able to correlate additional data based on that.  When transmitting Subject Identifiers, the transmitter SHOULD take care that they are only transmitting multiple identifiers together when it is known that the recipient already knows that the identifiers are related (e.g., because they were previously sent to the recipient as claims in an OpenID Connect ID Token), or when correlation is essential to the use case.</t>

<t>The considerations described in Section 6 of <xref target="RFC8417"/> also apply when Subject Identifiers are used within SETs.  The considerations described in Section 12 of <xref target="RFC7519"/> also apply when Subject Identifiers are used within JWTs.</t>

</section>
</section>
<section anchor="security" title="Security Considerations">

<section anchor="confidentiality-and-integrity" title="Confidentiality and Integrity">
<t>This specification does not define any mechanism for ensuring the confidentiality or integrityi of a Subject Identifier.  Where such properties are required, implementations MUST use mechanisms provided by the containing format (e.g., integrity protecting SETs or JWTs using JWS <xref target="RFC7515"/>), or at the transport layer or other layer in the application stack (e.g., using TLS <xref target="RFC8446"/>).</t>

<t>Further considerations regarding confidentiality and integrity of SETs can be found in Section 5.1 of <xref target="RFC8417"/>.</t>

</section>
</section>
<section anchor="iana" title="IANA Considerations">

<section anchor="iana-formats" title="Security Event Identifier Formats Registry">
<t>This document defines Identifier Formats, for which IANA is asked to create and maintain a new registry titled “Security Event Identifier Formats”.  Initial values for the Security Event Identifier Formats registry are given in <xref target="sub-ids"/>.  Future assignments are to be made through the Expert Review registration policy <xref target="BCP26"/> and shall follow the template presented in <xref target="iana-formats-template"/>.</t>

<t>It is suggested that multiple Designated Experts be appointed who are able to represent the perspectives of different applications using this specification, in order to enable broadly informed review of registration decisions.  In cases where a registration decision could be perceived as creating a conflict of interest for a particular Expert, that Expert should defer to the judgment of the other Experts.</t>

<section anchor="registry-location" title="Registry Location">
<t>(This section to be removed by the RFC Editor before publication as an RFC.)</t>

<t>The authors recommend that the Identifier Formats registry be located at <spanx style="verb">https://www.iana.org/assignments/secevent/</spanx>.</t>

</section>
<section anchor="iana-formats-template" title="Registration Template">

<t><list style="hanging">
  <t hangText="Format Name"><vspace blankLines='0'/>
  The name of the Identifier Format, as described in <xref target="sub-ids"/>. The name MUST be an ASCII string consisting only of lower-case characters (“a” - “z”), digits (“0” - “9”), underscores (“_”), and hyphens (“-“), and SHOULD NOT exceed 20 characters in length.</t>
  <t hangText="Format Description"><vspace blankLines='0'/>
  A brief description of the Identifier Format.</t>
  <t hangText="Change Controller"><vspace blankLines='0'/>
  For formats defined in documents published by the IETF or its working groups, list “IETF”.  For all other formats, list the name of the party responsible for the registration.  Contact information such as mailing address, email address, or phone number may also be provided.</t>
  <t hangText="Defining Document(s)"><vspace blankLines='0'/>
  A reference to the document or documents that define the Identifier Format.  The definition MUST specify the name, format, and meaning of each member that may occur within a Subject Identifier of the defined format, as well as whether each member is optional, required, prohibited, or the circumstances under which the member may be optional, required, or prohibited. URIs that can be used to retrieve copies of each document SHOULD be included.</t>
</list></t>

</section>
<section anchor="iana-formats-init" title="Initial Registry Contents">

<section anchor="account-identifier-format" title="Account Identifier Format">

<t><list style="symbols">
  <t>Format Name: <spanx style="verb">account</spanx></t>
  <t>Format Description: Subject identifier based on <spanx style="verb">acct</spanx> URI.</t>
  <t>Change Controller: IETF</t>
  <t>Defining Document(s): <xref target="sub-ids"/> of this document.</t>
</list></t>

</section>
<section anchor="aliases-identifier-format" title="Aliases Identifier Format">

<t><list style="symbols">
  <t>Format Name: <spanx style="verb">aliases</spanx></t>
  <t>Format Description: Subject identifier that groups together multiple different subject identifiers for the same subject.</t>
  <t>Change Controller: IETF</t>
  <t>Defining Document(s): <xref target="sub-ids"/> of this document.</t>
</list></t>

</section>
<section anchor="decentralized-identifier-format" title="Decentralized Identifier Format">

<t><list style="symbols">
  <t>Format Name: <spanx style="verb">did</spanx></t>
  <t>Format Description: Subject identifier based on a Decentralized Identifier (DID) URL.</t>
  <t>Change Controller: IETF</t>
  <t>Defining Document(s): <xref target="sub-ids"/> of this document.</t>
</list></t>

</section>
<section anchor="email-identifier-format" title="Email Identifier Format">

<t><list style="symbols">
  <t>Format Name: <spanx style="verb">email</spanx></t>
  <t>Format Description: Subject identifier based on email address.</t>
  <t>Change Controller: IETF</t>
  <t>Defining Document(s): <xref target="sub-ids"/> of this document.</t>
</list></t>

</section>
<section anchor="issuer-and-subject-identifier-format" title="Issuer and Subject Identifier Format">

<t><list style="symbols">
  <t>Format Name: <spanx style="verb">iss_sub</spanx></t>
  <t>Format Description: Subject identifier based on an issuer and subject.</t>
  <t>Change Controller: IETF</t>
  <t>Defining Document(s): <xref target="sub-ids"/> of this document.</t>
</list></t>

</section>
<section anchor="opaque-identifier-format" title="Opaque Identifier Format">

<t><list style="symbols">
  <t>Format Name: <spanx style="verb">opaque</spanx></t>
  <t>Format Description: Subject identifier based on an opaque string.</t>
  <t>Change Controller: IETF</t>
  <t>Defining Document(s): <xref target="sub-ids"/> of this document.</t>
</list></t>

</section>
<section anchor="phone-number-identifier-format" title="Phone Number Identifier Format">

<t><list style="symbols">
  <t>Format Name: <spanx style="verb">phone_number</spanx></t>
  <t>Format Description: Subject identifier based on an phone number.</t>
  <t>Change Controller: IETF</t>
  <t>Defining Document(s): <xref target="sub-ids"/> of this document.</t>
</list></t>

</section>
</section>
<section anchor="iana-formats-expert" title="Guidance for Expert Reviewers">
<t>The Expert Reviewer is expected to review the documentation referenced in a registration request to verify its completeness. The Expert Reviewer must base their decision to accept or reject the request on a fair and impartial assessment of the request. If the Expert Reviewer has a conflict of interest, such as being an author of a defining document referenced by the request, they must recuse themselves from the approval process for that request. In the case where a request is rejected, the Expert Reviewer should provide the requesting party with a written statement expressing the reason for rejection, and be prepared to cite any sources of information that went into that decision.</t>

<t>Identifier Formats need not be generally applicable and may be highly specific to a particular domain; it is expected that formats may be registered for niche or industry-specific use cases. The Expert Reviewer should focus on whether the format is thoroughly documented, and whether its registration will promote or harm interoperability.  In most cases, the Expert Reviewer should not approve a request if the registration would contribute to confusion, or amount to a synonym for an existing format.</t>

</section>
</section>
<section anchor="json-web-token-claims-registration" title="JSON Web Token Claims Registration">
<t>This document defines the <spanx style="verb">sub_id</spanx> JWT Claim, which IANA is asked to register in the “JSON Web Token Claims” registry <xref target="IANA.JWT.Claims">IANA JSON Web Token Claims Registry</xref> established by <xref target="RFC7519"/>.</t>

<section anchor="registry-contents" title="Registry Contents">

<t><list style="symbols">
  <t>Claim Name: “sub_id”</t>
  <t>Claim Description: Subject Identifier</t>
  <t>Change Controller: IESG</t>
  <t>Specification Document(s): <xref target="jwt-claims-sub_id"/> of this document.</t>
</list></t>

</section>
</section>
</section>


  </middle>

  <back>

    <references title='Normative References'>





<reference anchor='BCP26' target='https://www.rfc-editor.org/info/rfc8126'>
<front>
<title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
<author fullname='M. Cotton' initials='M.' surname='Cotton'><organization/></author>
<author fullname='B. Leiba' initials='B.' surname='Leiba'><organization/></author>
<author fullname='T. Narten' initials='T.' surname='Narten'><organization/></author>
<date month='June' year='2017'/>
<abstract><t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters.  To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper.  For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t><t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed.  This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t><t>This is the third edition of this document; it obsoletes RFC 5226.</t></abstract>
</front>
<seriesInfo name='BCP' value='26'/>
<seriesInfo name='RFC' value='8126'/>
<seriesInfo name='DOI' value='10.17487/RFC8126'/>
</reference>


<reference anchor="E164" target="http://www.itu.int/rec/T-REC-E.164-201011-I/en">
  <front>
    <title>The international public telecommunication numbering plan</title>
    <author >
      <organization>International Telecommunication Union</organization>
    </author>
    <date year="2010"/>
  </front>
</reference>
<reference anchor="IANA.JWT.Claims" target="http://www.iana.org/assignments/jwt">
  <front>
    <title>JSON Web Token Claims</title>
    <author >
      <organization>IANA</organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="DID" target="https://www.w3.org/TR/did-core/">
  <front>
    <title>Decentralized Identifiers (DIDs) v1.0</title>
    <author >
      <organization>World Wide Web Consortium (W3C)</organization>
    </author>
    <date year="2021"/>
  </front>
</reference>




<reference anchor='RFC8417' target='https://www.rfc-editor.org/info/rfc8417'>
<front>
<title>Security Event Token (SET)</title>
<author fullname='P. Hunt' initials='P.' role='editor' surname='Hunt'><organization/></author>
<author fullname='M. Jones' initials='M.' surname='Jones'><organization/></author>
<author fullname='W. Denniss' initials='W.' surname='Denniss'><organization/></author>
<author fullname='M. Ansari' initials='M.' surname='Ansari'><organization/></author>
<date month='July' year='2018'/>
<abstract><t>This specification defines the Security Event Token (SET) data structure.  A SET describes statements of fact from the perspective of an issuer about a subject.  These statements of fact represent an event that occurred directly to or about a security subject, for example, a statement about the issuance or revocation of a token on behalf of a subject.  This specification is intended to enable representing security- and identity-related events.  A SET is a JSON Web Token (JWT), which can be optionally signed and/or encrypted. SETs can be distributed via protocols such as HTTP.</t></abstract>
</front>
<seriesInfo name='RFC' value='8417'/>
<seriesInfo name='DOI' value='10.17487/RFC8417'/>
</reference>



<reference anchor='RFC7519' target='https://www.rfc-editor.org/info/rfc7519'>
<front>
<title>JSON Web Token (JWT)</title>
<author fullname='M. Jones' initials='M.' surname='Jones'><organization/></author>
<author fullname='J. Bradley' initials='J.' surname='Bradley'><organization/></author>
<author fullname='N. Sakimura' initials='N.' surname='Sakimura'><organization/></author>
<date month='May' year='2015'/>
<abstract><t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties.  The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t></abstract>
</front>
<seriesInfo name='RFC' value='7519'/>
<seriesInfo name='DOI' value='10.17487/RFC7519'/>
</reference>



<reference anchor='RFC7159' target='https://www.rfc-editor.org/info/rfc7159'>
<front>
<title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
<author fullname='T. Bray' initials='T.' role='editor' surname='Bray'><organization/></author>
<date month='March' year='2014'/>
<abstract><t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format.  It was derived from the ECMAScript Programming Language Standard.  JSON defines a small set of formatting rules for the portable representation of structured data.</t><t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t></abstract>
</front>
<seriesInfo name='RFC' value='7159'/>
<seriesInfo name='DOI' value='10.17487/RFC7159'/>
</reference>



<reference anchor='RFC2119' target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author fullname='S. Bradner' initials='S.' surname='Bradner'><organization/></author>
<date month='March' year='1997'/>
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference anchor='RFC7565' target='https://www.rfc-editor.org/info/rfc7565'>
<front>
<title>The 'acct' URI Scheme</title>
<author fullname='P. Saint-Andre' initials='P.' surname='Saint-Andre'><organization/></author>
<date month='May' year='2015'/>
<abstract><t>This document defines the 'acct' Uniform Resource Identifier (URI) scheme as a way to identify a user's account at a service provider, irrespective of the particular protocols that can be used to interact with the account.</t></abstract>
</front>
<seriesInfo name='RFC' value='7565'/>
<seriesInfo name='DOI' value='10.17487/RFC7565'/>
</reference>



<reference anchor='RFC5322' target='https://www.rfc-editor.org/info/rfc5322'>
<front>
<title>Internet Message Format</title>
<author fullname='P. Resnick' initials='P.' role='editor' surname='Resnick'><organization/></author>
<date month='October' year='2008'/>
<abstract><t>This document specifies the Internet Message Format (IMF), a syntax for text messages that are sent between computer users, within the framework of &quot;electronic mail&quot; messages.  This specification is a revision of Request For Comments (RFC) 2822, which itself superseded Request For Comments (RFC) 822, &quot;Standard for the Format of ARPA Internet Text Messages&quot;, updating it to reflect current practice and incorporating incremental changes that were specified in other RFCs.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5322'/>
<seriesInfo name='DOI' value='10.17487/RFC5322'/>
</reference>



<reference anchor='RFC5321' target='https://www.rfc-editor.org/info/rfc5321'>
<front>
<title>Simple Mail Transfer Protocol</title>
<author fullname='J. Klensin' initials='J.' surname='Klensin'><organization/></author>
<date month='October' year='2008'/>
<abstract><t>This document is a specification of the basic protocol for Internet electronic mail transport.  It consolidates, updates, and clarifies several previous documents, making all or parts of most of them obsolete.  It covers the SMTP extension mechanisms and best practices for the contemporary Internet, but does not provide details about particular extensions.  Although SMTP was designed as a mail transport and delivery protocol, this specification also contains information that is important to its use as a &quot;mail submission&quot; protocol for &quot;split-UA&quot; (User Agent) mail reading systems and mobile environments.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5321'/>
<seriesInfo name='DOI' value='10.17487/RFC5321'/>
</reference>




    </references>

    <references title='Informative References'>

<reference anchor="OpenID.Core" target="http://openid.net/specs/openid-connect-core-1_0.html">
  <front>
    <title>OpenID Connect Core 1.0</title>
    <author initials="N." surname="Sakimura" fullname="Nat Sakimura">
      <organization>Nomura Research Institute, Ltd.</organization>
    </author>
    <author initials="J." surname="Bradley" fullname="John Bradley">
      <organization>Ping Identity</organization>
    </author>
    <author initials="M." surname="Jones" fullname="Michael B. Jones">
      <organization>Microsoft</organization>
    </author>
    <author initials="B." surname="de Medeiros" fullname="Breno de Medeiros">
      <organization>Google</organization>
    </author>
    <author initials="C." surname="Mortimore" fullname="Chuck Mortimore">
      <organization>Salesforce</organization>
    </author>
    <date year="2014" month="November"/>
  </front>
</reference>




<reference anchor='RFC1034' target='https://www.rfc-editor.org/info/rfc1034'>
<front>
<title>Domain names - concepts and facilities</title>
<author fullname='P.V. Mockapetris' initials='P.V.' surname='Mockapetris'><organization/></author>
<date month='November' year='1987'/>
<abstract><t>This RFC is the revised basic definition of The Domain Name System.  It obsoletes RFC-882.  This memo describes the domain style names and their used for host address look up and electronic mail forwarding.  It discusses the clients and servers in the domain name system and the protocol used between them.</t></abstract>
</front>
<seriesInfo name='STD' value='13'/>
<seriesInfo name='RFC' value='1034'/>
<seriesInfo name='DOI' value='10.17487/RFC1034'/>
</reference>



<reference anchor='RFC7515' target='https://www.rfc-editor.org/info/rfc7515'>
<front>
<title>JSON Web Signature (JWS)</title>
<author fullname='M. Jones' initials='M.' surname='Jones'><organization/></author>
<author fullname='J. Bradley' initials='J.' surname='Bradley'><organization/></author>
<author fullname='N. Sakimura' initials='N.' surname='Sakimura'><organization/></author>
<date month='May' year='2015'/>
<abstract><t>JSON Web Signature (JWS) represents content secured with digital signatures or Message Authentication Codes (MACs) using JSON-based data structures.  Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and an IANA registry defined by that specification.  Related encryption capabilities are described in the separate JSON Web Encryption (JWE) specification.</t></abstract>
</front>
<seriesInfo name='RFC' value='7515'/>
<seriesInfo name='DOI' value='10.17487/RFC7515'/>
</reference>



<reference anchor='RFC8446' target='https://www.rfc-editor.org/info/rfc8446'>
<front>
<title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
<author fullname='E. Rescorla' initials='E.' surname='Rescorla'><organization/></author>
<date month='August' year='2018'/>
<abstract><t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol.  TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t><t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961.  This document also specifies new requirements for TLS 1.2 implementations.</t></abstract>
</front>
<seriesInfo name='RFC' value='8446'/>
<seriesInfo name='DOI' value='10.17487/RFC8446'/>
</reference>




    </references>


<section numbered="no" anchor="acknowledgements" title="Acknowledgements">
<t>The authors would like to thank the members of the IETF Security Events working group, as well as those of the OpenID Shared Signals and Events Working Group, whose work provided the original basis for this document.</t>

</section>
<section numbered="no" anchor="change-log" title="Change Log">
<t>(This section to be removed by the RFC Editor before publication as an RFC.)</t>

<t>Draft 00 - AB - First draft</t>

<t>Draft 01 - AB:</t>

<t><list style="symbols">
  <t>Added reference to RFC 5322 for format of <spanx style="verb">email</spanx> claim.</t>
  <t>Renamed <spanx style="verb">iss_sub</spanx> type to <spanx style="verb">iss-sub</spanx>.</t>
  <t>Renamed <spanx style="verb">id_token_claims</spanx> type to <spanx style="verb">id-token-claims</spanx>.</t>
  <t>Added text specifying the nature of the subjects described by each type.</t>
</list></t>

<t>Draft 02 - AB:</t>

<t><list style="symbols">
  <t>Corrected format of phone numbers in examples.</t>
  <t>Updated author info.</t>
</list></t>

<t>Draft 03 - AB:</t>

<t><list style="symbols">
  <t>Added <spanx style="verb">account</spanx> type for <spanx style="verb">acct</spanx> URIs.</t>
  <t>Replaced <spanx style="verb">id-token-claims</spanx> type with <spanx style="verb">aliases</spanx> type.</t>
  <t>Added email canonicalization guidance.</t>
  <t>Updated semantics for <spanx style="verb">email</spanx>, <spanx style="verb">phone</spanx>, and <spanx style="verb">iss-sub</spanx> types.</t>
</list></t>

<t>Draft 04 - AB:</t>

<t><list style="symbols">
  <t>Added <spanx style="verb">sub_id</spanx> JWT Claim definition, guidance, examples.</t>
  <t>Added text prohibiting <spanx style="verb">aliases</spanx> nesting.</t>
  <t>Added privacy considerations for identifier correlation.</t>
</list></t>

<t>Draft 05 - AB:</t>

<t><list style="symbols">
  <t>Renamed the <spanx style="verb">phone</spanx> type to <spanx style="verb">phone-number</spanx> and its <spanx style="verb">phone</spanx> claim to <spanx style="verb">phone_number</spanx>.</t>
</list></t>

<t>Draft 06 - AB:</t>

<t><list style="symbols">
  <t>Replaced usage of the word “claim” to describe members of a Subject Identifier with the word “member”, in accordance with terminology in RFC7159.</t>
  <t>Renamed the <spanx style="verb">phone-number</spanx> type to <spanx style="verb">phone_number</spanx> and <spanx style="verb">iss-sub</spanx> to <spanx style="verb">iss_sub</spanx>.</t>
  <t>Added normative requirements limiting the use of both <spanx style="verb">sub</spanx> and <spanx style="verb">sub_id</spanx> claims together when processing a JWT.</t>
  <t>Clarified that identifier correlation may be acceptable when it is a core part of the use case.</t>
  <t>Replaced references to OIDF with IETF in IANA Considerations.</t>
  <t>Recommended the appointment of multiple Designated Experts, and a location for the Subject Identifier Types registry.</t>
  <t>Added “_” to list of allowed characters in the Type Name for Subject Identifier Types.</t>
  <t>Clarified that Subject Identifiers don’t provide confidentiality or integrity protection.</t>
  <t>Added references to SET, JWT privacy and security considerations.</t>
  <t>Added section describing the difference between subject identifier type and principal type that hopefully clarifies things and doesn’t just muddy the water further.</t>
</list></t>

<t>Draft 07 - AB:</t>

<t><list style="symbols">
  <t>Emphasized that the spec is about identifiers, not the things they identify:
  <list style="symbols">
      <t>Renamed “Subject Identifier Type” to “Identifier Format”.</t>
      <t>Renamed <spanx style="verb">subject_type</spanx> to <spanx style="verb">format</spanx>.</t>
      <t>Renamed “Security Event Subject Identifier Type Registry” to “Security Event Identifier Format Registry”.</t>
      <t>Added new section with guidance for specs defining Identifier Formats, with normative prohibition on formats that describe the subject itself, rather than the identifier.</t>
    </list></t>
  <t>Clarified the meaning of “subject”:
  <list style="symbols">
      <t>Defined “subject” as applying generically and “JWT Subject” as applying specifically to the subject of a JWT.</t>
      <t>Replaced most instances of the word “principal” with “subject”.</t>
    </list></t>
  <t>Added <spanx style="verb">opaque</spanx> Identifier Format</t>
</list></t>

<t>Draft 08 - JR, AB:
* Added <spanx style="verb">did</spanx> Identifier Format
* Alphabetized identifier format definitions
* Replaced “type” with “format” in places that had been missed in the -07 change. (mostly IANA Considerations)
* Miscellaneous editorial fixes</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

