<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.14 (Ruby 2.6.3) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-ietf-secevent-subject-identifiers-12" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="secevent-subject-identifiers">Subject Identifiers for Security Event Tokens</title>

    <author initials="A." surname="Backman" fullname="Annabelle Backman" role="editor">
      <organization>Amazon</organization>
      <address>
        <email>richanna@amazon.com</email>
      </address>
    </author>
    <author initials="M." surname="Scurtescu" fullname="Marius Scurtescu">
      <organization>Coinbase</organization>
      <address>
        <email>marius.scurtescu@coinbase.com</email>
      </address>
    </author>
    <author initials="P." surname="Jain" fullname="Prachi Jain">
      <organization>Fastly</organization>
      <address>
        <email>prachi.jain1288@gmail.com</email>
      </address>
    </author>

    <date year="2022" month="July" day="24"/>

    <area>Security</area>
    <workgroup>Security Events Working Group</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>Security events communicated within Security Event Tokens may support a variety of identifiers to identify subjects related to the event.  This specification formalizes the notion of subject identifiers as structured information that describe a subject, and named formats that define the syntax and semantics for encoding subject identifiers as JSON objects.  It also defines a registry for defining and allocating names for such formats, as well as the <spanx style="verb">sub_id</spanx> JSON Web Token (JWT) claim.</t>



    </abstract>



  </front>

  <middle>


<section anchor="intro"><name>Introduction</name>
<t>As described in Section 1.2 of SET <xref target="RFC8417"/>, subjects related to security events may take a variety of forms, including but not limited to a JWT <xref target="RFC7519"/> principal, an IP address, a URL, etc.  Different types of subjects may need to be identified in different ways (e.g., a host might be identified by an IP or MAC address, while a user might be identified by an email address).  Furthermore, even in the case where the type of the subject is known, there may be multiple ways by which a given subject may be identified.  For example, an account may be identified by an opaque identifier, an email address, a phone number, a JWT <spanx style="verb">iss</spanx> claim and <spanx style="verb">sub</spanx> claim, etc., depending on the nature and needs of the transmitter and receiver. Even within the context of a given transmitter and receiver relationship, it may be appropriate to identify different accounts in different ways, for example if some accounts only have email addresses associated with them while others only have phone numbers. Therefore it can be necessary to indicate within a SET the mechanism by which a subject is being identified.</t>

<t>To address this problem, this specification defines Subject Identifiers - JSON <xref target="RFC7159"/> objects containing information identifying a subject - and Identifier Formats - named sets of rules describing how to encode different kinds of subject identifying information (e.g., an email address, or an issuer and subject pair) as a Subject Identifier.</t>

<t>Below is a non-normative example of a Subject Identifier that identifies a subject by email address, using the Email Identifier Format.</t>

<figure title="Example: Subject Identifier using the Email Identifier Format" anchor="figexampleintro"><artwork><![CDATA[
{
  "format": "email",
  "email": "user@example.com"
}
]]></artwork></figure>

<t>Subject Identifiers are intended to be a general-purpose mechanism for identifying subjects within JSON objects and their usage need not be limited to SETs.  Below is a non-normative example of a JWT that uses a Subject Identifier in the <spanx style="verb">sub_id</spanx> claim (defined in this specification) to identify the JWT Subject.</t>

<figure title="Example: JWT using a Subject Identifier with the &quot;sub_id&quot; claim" anchor="figexampleintro2"><artwork><![CDATA[
{
  "iss": "issuer.example.com",
  "sub_id": {
    "format": "phone_number",
    "phone_number": "+12065550100"
  }
}
]]></artwork></figure>

<t>Usage of Subject Identifiers also need not be limited to identifying JWT Subjects.  They are intended as a general-purpose means of expressing identifying information in an unambiguous manner.  Below is a non-normative example of a SET containing a hypothetical security event describing the interception of a message, using Subject Identifiers to identify the sender, intended recipient, and interceptor.</t>

<figure title="Example: SET with an event payload containing multiple Subject Identifiers" anchor="figexampleintro3"><artwork><![CDATA[
{
  "iss": "issuer.example.com",
  "iat": 1508184845,
  "aud": "aud.example.com",
  "events": {
    "https://secevent.example.com/events/message-interception": {
      "from": {
        "format": "email",
        "email": "alice@example.com"
      },
      "to": {
        "format": "email",
        "email": "bob@example.com"
      },
      "interceptor": {
        "format": "email",
        "email": "eve@example.com"
      }
    }
  }
}

]]></artwork></figure>

</section>
<section anchor="conv"><name>Notational Conventions</name>
<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in <xref target="RFC2119"/>.</t>

<section anchor="defn"><name>Definitions</name>
<t>This specification utilizes terminology defined in <xref target="RFC7159"/> and <xref target="RFC8417"/>.</t>

<t>Within this specification, the terms "Subject" and "subject" refer generically to anything being identified via one or more pieces of information.  The term "JWT Subject" refers specifically to the to the subject of a JWT. (i.e., the subject that the JWT asserts claims about)</t>

</section>
</section>
<section anchor="sub-ids"><name>Subject Identifiers</name>
<t>A Subject Identifier is a JSON <xref target="RFC7159"/> object whose contents may be used to identify a subject within some context.  An Identifier Format is a named definition of a set of information that may be used to identify a subject, and the rules for encoding that information as a Subject Identifier; they define the syntax and semantics of Subject Identifiers.  A Subject Identifier MUST conform to a specific Identifier Format, and MUST contain a <spanx style="verb">format</spanx> member whose value is the name of that Identifier Format.</t>

<t>Every Identifier Format MUST have a unique name registered in the IANA "Security Event Identifier Formats" registry established by <xref target="iana-formats"/>, or a Collision-Resistant Name as defined in <xref target="RFC7519"/>.  Identifier Formats that are expected to be used broadly by a variety of parties SHOULD be registered in the "Security Event Identifier Formats" registry.</t>

<t>An Identifier Format MAY describe more members than are strictly necessary to identify a subject, and MAY describe conditions under which those members are required, optional, or prohibited.  The <spanx style="verb">format</spanx> member is reserved for use as described in this specification; Identifier Formats MUST NOT declare any rules regarding the <spanx style="verb">format</spanx> member.</t>

<t>Every member within a Subject Identifier MUST match the rules specified for that member by this specification or by Subject Identifier's Identifier Format.  A Subject Identifier MUST NOT contain any members prohibited or not described by its Identifier Format, and MUST contain all members required by its Identifier Format.</t>

<section anchor="identifier-formats-versus-principal-types"><name>Identifier Formats versus Principal Types</name>
<t>Identifier Formats define how to encode identifying information for a subject.  They do not define the type or nature of the subject itself.  E.g., While the <spanx style="verb">email</spanx> Identifier Format declares that the value of the <spanx style="verb">email</spanx> member is an email address, a subject in a Security Event that is identified by an <spanx style="verb">email</spanx> Subject Identifier could be an end user who controls that email address, the mailbox itself, or anything else that the transmitter and receiver both understand to be associated with that email address.  Consequently Subject Identifiers remove ambiguity around how a subject is being identified, and how to parse an identifying structure, but do not remove ambiguity around how to resolve that identifier to a subject.  For example, consider a directory management API that allows callers to identify users and groups through both opaque unique identifiers and email addresses.  Such an API could use Subject Identifiers to disambiguate between which of these two types of identifiers is in use.  However, the API would have to determine whether the subject is a user or group via some other means, such as by querying a database, interpreting other parameters in the request, or inferring the type from the API contract.</t>

</section>
<section anchor="identifier-format-definitions"><name>Identifier Format Definitions</name>

<t>The following Identifier Formats are registered in the IANA "Security Event Identifier Formats" registry established by <xref target="iana-formats"/>.</t>

<t>Since the subject identifier format conveys semantic information, applications SHOULD choose the most specific possible format for the identifier in question. For example, an email address can be conveyed using a <spanx style="verb">mailto:</spanx> URI and the <spanx style="verb">uri</spanx> identifier format, but since the value is known to be an email address, the application should prefer to use the <spanx style="verb">email</spanx> identifier format instead.</t>

<section anchor="sub-id-acct"><name>Account Identifier Format</name>
<t>The Account Identifier Format identifies a subject using an account at a service provider, identified with an <spanx style="verb">acct</spanx> URI as defined in <xref target="RFC7565"/>.  Subject Identifiers in this format MUST contain a <spanx style="verb">uri</spanx> member whose value is the <spanx style="verb">acct</spanx> URI for the subject.  The <spanx style="verb">uri</spanx> member is REQUIRED and MUST NOT be null or empty.  The Account Identifier Format is identified by the name <spanx style="verb">account</spanx>.</t>

<t>Below is a non-normative example Subject Identifier for the Account Identifier Format:</t>

<figure title="Example: Subject Identifier for the Account Identifier Format" anchor="figexamplesubidaccount"><artwork><![CDATA[
{
  "format": "account",
  "uri": "acct:example.user@service.example.com"
}
]]></artwork></figure>

</section>
<section anchor="sub-id-email"><name>Email Identifier Format</name>
<t>The Email Identifier Format identifies a subject using an email address.  Subject Identifiers in this format MUST contain an <spanx style="verb">email</spanx> member whose value is a string containing the email address of the subject, formatted as an <spanx style="verb">addr-spec</spanx> as defined in Section 3.4.1 of <xref target="RFC5322"/>. The <spanx style="verb">email</spanx> member is REQUIRED and MUST NOT be null or empty. The value of the <spanx style="verb">email</spanx> member SHOULD identify a mailbox to which email may be delivered, in accordance with <xref target="RFC5321"/>. The Email Identifier Format is identified by the name <spanx style="verb">email</spanx>.</t>

<t>Below is a non-normative example Subject Identifier in the Email Identifier Format:</t>

<figure title="Example: Subject Identifier in the Email Identifier Format" anchor="figexamplesubidemail"><artwork><![CDATA[
{
  "format": "email",
  "email": "user@example.com"
}
]]></artwork></figure>

<section anchor="email-canon"><name>Email Canonicalization</name>
<t>Many email providers will treat multiple email addresses as equivalent. While the domain portion of an <xref target="RFC5322"/> email address is consistently treated as case-insensitive per <xref target="RFC1034"/>, some providers treat the local part of the email address as case-insensitive as well, and consider "user@example.com", "User@example.com", and "USER@example.com" as the same email address. This has led users to view these strings as equivalent, driving service providers to implement proprietary email canonicalization algorithms to ensure that email addresses entered by users resolve to the same canonical string. When receiving an Email Subject Identifier, the recipient SHOULD use their implementation's canonicalization algorithm to resolve the email address to the same string used in their system.</t>

</section>
</section>
<section anchor="sub-id-iss-sub"><name>Issuer and Subject Identifier Format</name>
<t>The Issuer and Subject Identifier Format identifies a subject using a pair of <spanx style="verb">iss</spanx> and <spanx style="verb">sub</spanx> members, analagous to how subjects are identified using the <spanx style="verb">iss</spanx> and <spanx style="verb">sub</spanx> claims in <xref target="OpenID.Core">OpenID Connect</xref> ID Tokens.  These members MUST follow the formats of the <spanx style="verb">iss</spanx> member and <spanx style="verb">sub</spanx> member defined by <xref target="RFC7519"/>, respectively.  Both the <spanx style="verb">iss</spanx> member and the <spanx style="verb">sub</spanx> member are REQUIRED and MUST NOT be null or empty. The Issuer and Subject Identifier Format is identified by the name <spanx style="verb">iss_sub</spanx>.</t>

<t>Below is a non-normative example Subject Identifier in the Issuer and Subject Identifier Format:</t>

<figure title="Example: Subject Identifier in the Issuer and Subject Identifier Format" anchor="figexamplesubidisssub"><artwork><![CDATA[
{
  "format": "iss_sub",
  "iss": "http://issuer.example.com/",
  "sub": "145234573"
}
]]></artwork></figure>

</section>
<section anchor="sub-id-opaque"><name>Opaque Identifier Format</name>
<t>The Opaque Identifier Format describes a subject that is identified with a string with no semantics asserted beyond its usage as an identifier for the subject, such as a UUID or hash used as a surrogate identifier for a record in a database.  Subject Identifiers in this format MUST contain an <spanx style="verb">id</spanx> member whose value is a JSON string containing the opaque string identifier for the subject.  The <spanx style="verb">id</spanx> member is REQUIRED and MUST NOT be null or empty.  The Opaque Identifier Format is identified by the name <spanx style="verb">opaque</spanx>.</t>

<t>Below is a non-normative example Subject Identifier in the Opaque Identifier Format:</t>

<figure title="Example: Subject Identifier in the Opaque Identifier Format" anchor="figexamplesubidopaque"><artwork><![CDATA[
{
  "format": "opaque",
  "id": "11112222333344445555"
}
]]></artwork></figure>

</section>
<section anchor="sub-id-phone"><name>Phone Number Identifier Format</name>
<t>The Phone Number Identifier Format identifies a subject using a telephone number.  Subject Identifiers in this format MUST contain a <spanx style="verb">phone_number</spanx> member whose value is a string containing the full telephone number of the subject, including international dialing prefix, formatted according to <xref target="E164">E.164</xref>. The <spanx style="verb">phone_number</spanx> member is REQUIRED and MUST NOT be null or empty. The Phone Number Identifier Format is identified by the name <spanx style="verb">phone_number</spanx>.</t>

<t>Below is a non-normative example Subject Identifier in the Email Identifier Format:</t>

<figure title="Example: Subject Identifier in the Phone Number Identifier Format" anchor="figexamplesubidphone"><artwork><![CDATA[
{
  "format": "phone_number",
  "phone_number": "+12065550100"
}
]]></artwork></figure>

</section>
<section anchor="sub-id-did"><name>Decentralized Identifier (DID) Format</name>

<t>The Decentralized Identifier Format identifies a subject using a Decentralized Identifier (DID) URL as defined in <xref target="DID"/>.  Subject Identifiers in this format MUST contain a <spanx style="verb">url</spanx> member whose value is a DID URL for the DID Subject being identified. The value of the <spanx style="verb">url</spanx> member MUST be a valid DID URL and MAY be a bare DID. The <spanx style="verb">url</spanx> member is REQUIRED and MUST NOT be null or empty. The Decentralized Identifier Format is identified by the name <spanx style="verb">did</spanx>.</t>

<t>Below are non-normative example Subject Identifiers for the Decentralized Identifier Format:</t>

<figure title="Example: Subject Identifier for the Decentralized Identifier Format, identifying a subject with a bare DID" anchor="figexamplesubiddidbare"><artwork><![CDATA[
{
  "format": "did",
  "url": "did:example:123456"
}
]]></artwork></figure>

<figure title="Example: Subject Identifier for the Decentralized Identifier Format, identifying a subject with a DID URL with non-empty path and query components" anchor="figexamplesubiddidcomplex"><artwork><![CDATA[
{
  "format": "did",
  "url": "did:example:123456/did/url/path?versionId=1"
}
]]></artwork></figure>

</section>
<section anchor="sub-id-uri"><name>Uniform Resource Identifier (URI) Format</name>

<t>The Uniform Resource Identifier (URI) Format identifies a subject using a URI as defined in <xref target="RFC3986"/>. This identifier format makes no assumptions or guarantees with regard to the content, scheme, or reachability of the URI within the field. Subject Identifiers in this format MUST contain a <spanx style="verb">uri</spanx> members whose value is a URI for the subject being identified. The <spanx style="verb">uri</spanx> member is REQUIRED and MUST NOT be null or empty. The URI format is identified by the name <spanx style="verb">uri</spanx>.</t>

<t>Below are non-normative example Subject Identifiers for the URI format:</t>

<figure title="Example: Subject Identifier for the URI Format, identifying a subject with a website URI" anchor="figexamplesubiduidbare"><artwork><![CDATA[
{
  "format": "uri",
  "uri": "https://user.example.com/"
}
]]></artwork></figure>

<figure title="Example: Subject Identifier for the URI Format, identifying a subject with a random URN" anchor="figexamplesubidurnbare"><artwork><![CDATA[
{
  "format": "uri",
  "uri": "urn:uuid:4e851e98-83c4-4743-a5da-150ecb53042f"
}
]]></artwork></figure>

</section>
<section anchor="sub-id-aliases"><name>Aliases Identifier Format</name>
<t>The Aliases Identifier Format describes a subject that is identified with a list of different Subject Identifiers. It is intended for use when a variety of identifiers have been shared with the party that will be interpreting the Subject Identifier, and it is unknown which of those identifiers they will recognize or support.  Subject Identifiers in this format MUST contain an <spanx style="verb">identifiers</spanx> member whose value is a JSON array containing one or more Subject Identifiers.  Each Subject Identifier in the array MUST identify the same entity.  The <spanx style="verb">identifiers</spanx> member is REQUIRED and MUST NOT be null or empty.  It MAY contain multiple instances of the same Identifier Format (e.g., multiple Email Subject Identifiers), but SHOULD NOT contain exact duplicates.  This format is identified by the name <spanx style="verb">aliases</spanx>.</t>

<t><spanx style="verb">aliases</spanx> Subject Identifiers MUST NOT be nested; i.e., the <spanx style="verb">identifiers</spanx> member of an <spanx style="verb">aliases</spanx> Subject Identifier MUST NOT contain a Subject Identifier in the <spanx style="verb">aliases</spanx> format.</t>

<t>Below is a non-normative example Subject Identifier in the Aliases Identifier Format:</t>

<figure title="Example: Subject Identifier in the Aliases Identifier Format" anchor="figexamplesubididtoken"><artwork><![CDATA[
{
  "format": "aliases",
  "identifiers": [
    {
      "format": "email",
      "email": "user@example.com"
    },
    {
      "format": "phone_number",
      "phone_number": "+12065550100"
    },
    {
      "format": "email",
      "email": "user+qualifier@example.com"
    }
  ]
}
]]></artwork></figure>

</section>
</section>
</section>
<section anchor="jwt-claims"><name>Subject Identifiers in JWTs</name>

<section anchor="jwt-claims-sub_id"><name><spanx style="verb">sub_id</spanx> Claim</name>
<t>The <spanx style="verb">sub</spanx> JWT Claim is defined in Section 4.1.2 of <xref target="RFC7519"/> as containing a string value, and therefore cannot contain a Subject Identifier (which is a JSON object) as its value.  This document defines the <spanx style="verb">sub_id</spanx> JWT Claim, in accordance with Section 4.2 of <xref target="RFC7519"/>, as a common claim that identifies the JWT Subject using a Subject Identifier.  When present, the value of this claim MUST be a Subject Identifier that identifies the subject of the JWT.  The <spanx style="verb">sub_id</spanx> claim MAY be included in a JWT, whether or not the <spanx style="verb">sub</spanx> claim is present.  When both the <spanx style="verb">sub</spanx> and <spanx style="verb">sub_id</spanx> claims are present in a JWT, they MUST identify the same subject, as a JWT has one and only one JWT Subject.</t>

<t>When processing a JWT with both <spanx style="verb">sub</spanx> and <spanx style="verb">sub_id</spanx> claims, implementations MUST NOT rely on both claims to determine the JWT Subject.  An implementation MAY attempt to determine the JWT Subject from one claim and fall back to using the other if it determines it does not understand the format of the first claim.  For example, an implementation may attempt to use <spanx style="verb">sub_id</spanx>, and fall back to using <spanx style="verb">sub</spanx> upon finding that <spanx style="verb">sub_id</spanx> contains a Subject Identifier whose format is not recognized by the implementation.</t>

<t>Below are non-normative examples of JWTs containing the <spanx style="verb">sub_id</spanx> claim:</t>

<figure title="Example: JWT containing a &quot;sub_id&quot; claim and no &quot;sub&quot; claim" anchor="figexamplejwtsubidemail"><artwork><![CDATA[
{
  "iss": "issuer.example.com",
  "sub_id": {
    "format": "email",
    "email": "user@example.com"
  }
}
]]></artwork></figure>

<figure title="Example: JWT where both the &quot;sub&quot; and &quot;sub_id&quot; claims identify the JWT Subject using the same identifier" anchor="figexamplejwtsamesubid"><artwork><![CDATA[
{
  "iss": "issuer.example.com",
  "sub": "user@example.com",
  "sub_id": {
    "format": "email",
    "email": "user@example.com"
  }
}
]]></artwork></figure>

<figure title="Example: JWT where both the &quot;sub&quot; and &quot;sub_id&quot; claims identify the JWT Subject using different values of the same identifier type" anchor="figexamplejwtdiffsubvalues"><artwork><![CDATA[
{
  "iss": "issuer.example.com",
  "sub": "liz@example.com",
  "sub_id": {
    "format": "email",
    "email": "elizabeth@example.com"
  }
}
]]></artwork></figure>

<figure title="Example: JWT where the &quot;sub&quot; and &quot;sub_id&quot; claims identify the JWT Subject via different types of identifiers" anchor="figexamplejwtdiffsubtype"><artwork><![CDATA[
{
  "iss": "issuer.example.com",
  "sub": "user@example.com",
  "sub_id": {
    "format": "account",
    "uri": "acct:example.user@service.example.com"
  }
}
]]></artwork></figure>

</section>
<section anchor="subid-and-isssub-subject-identifiers"><name><spanx style="verb">sub_id</spanx> and <spanx style="verb">iss_sub</spanx> Subject Identifiers</name>
<t>The <spanx style="verb">sub_id</spanx> claim MAY contain an <spanx style="verb">iss_sub</spanx> Subject Identifier.  In this case, the JWT's <spanx style="verb">iss</spanx> claim and the Subject Identifier's <spanx style="verb">iss</spanx> member MAY be different.  For example, in <xref target="OpenID.Core">OpenID Connect</xref> client may construct such a JWT when sending JWTs back to its OpenID Connect Identity Provider, in order to identify the JWT Subject using an identifier known to be understood by both parties.  Similarly, the JWT's <spanx style="verb">sub</spanx> claim and the Subject Identifier's <spanx style="verb">sub</spanx> member MAY be different.  For example, this may be used by an OpenID Connect client to communicate the JWT Subject's local identifier at the client back to its Identity Provider.</t>

<t>Below are non-normative examples of a JWT where the <spanx style="verb">iss</spanx> claim and <spanx style="verb">iss</spanx> member within the <spanx style="verb">sub_id</spanx> claim are the same, and a JWT where they are different.</t>

<figure title="Example: JWT with an &quot;iss_sub&quot; Subject Identifier where JWT issuer and JWT Subject issuer are the same" anchor="figexamplejwtsameiss"><artwork><![CDATA[
{
  "iss": "issuer.example.com",
  "sub_id": {
    "format": "iss_sub",
    "iss": "issuer.example.com",
    "sub": "example_user"
  }
}
]]></artwork></figure>

<figure title="Example: JWT with an &quot;iss_sub&quot; Subject Identifier where the JWT issuer and JWT Subject issuer are different" anchor="figexamplejwtdiffiss"><artwork><![CDATA[
{
  "iss": "client.example.com",
  "sub_id": {
    "format": "iss_sub",
    "iss": "issuer.example.com",
    "sub": "example_user"
  }
}
]]></artwork></figure>

<figure title="Example: JWT with an &quot;iss_sub&quot; Subject Identifier where the JWT &quot;iss&quot; and &quot;sub&quot; claims differ from the JWT Subject's &quot;iss&quot; and &quot;sub&quot; members" anchor="figexamplejwtdiffisssub"><artwork><![CDATA[
{
  "iss": "client.example.com",
  "sub": "client_user",
  "sub_id": {
    "format": "iss_sub",
    "iss": "issuer.example.com",
    "sub": "example_user"
  }
}
]]></artwork></figure>

</section>
</section>
<section anchor="implementer"><name>Considerations for Specifications that Define Identifier Formats</name>
<t>Identifier Format definitions MUST NOT make assertions or declarations regarding the subject being identified by the Subject Identifier (e.g., an Identifier Format cannot be defined as specifically identifying human end users), as such statements are outside the scope of Identifier Formats and Subject Identifiers, and expanding that scope for some Identifier Formats but not others would harm interoperability, as applications that depend on this expanded scope to disambiguate the subject type would be unable to use Identifier Formats that do not provide such rules.</t>

</section>
<section anchor="privacy"><name>Privacy Considerations</name>

<section anchor="identifier-correlation"><name>Identifier Correlation</name>
<t>The act of presenting two or more identifiers for a single subject together (e.g., within an <spanx style="verb">aliases</spanx> Subject Identifier, or via the <spanx style="verb">sub</spanx> and <spanx style="verb">sub_id</spanx> JWT claims) may communicate more information about the subject than was intended.  For example, the entity to which the identifiers are presented now knows that both identifiers relate to the same subject, and may be able to correlate additional data based on that.  When transmitting Subject Identifiers, the transmitter SHOULD take care that they are only transmitting multiple identifiers together when it is known that the recipient already knows that the identifiers are related (e.g., because they were previously sent to the recipient as claims in an OpenID Connect ID Token), or when correlation is essential to the use case.  Implementers must consider such risks, and specs that use subject identifiers must provide appropriate privacy considerations of their own.</t>

<t>The considerations described in Section 6 of <xref target="RFC8417"/> also apply when Subject Identifiers are used within SETs.  The considerations described in Section 12 of <xref target="RFC7519"/> also apply when Subject Identifiers are used within JWTs.</t>

</section>
</section>
<section anchor="security"><name>Security Considerations</name>

<section anchor="confidentiality-and-integrity"><name>Confidentiality and Integrity</name>
<t>This specification does not define any mechanism for ensuring the confidentiality or integrity of a Subject Identifier.  Where such properties are required, implementations MUST use mechanisms provided by the containing format (e.g., integrity protecting SETs or JWTs using JWS <xref target="RFC7515"/>), or at the transport layer or other layer in the application stack (e.g., using TLS <xref target="RFC8446"/>).</t>

<t>Further considerations regarding confidentiality and integrity of SETs can be found in Section 5.1 of <xref target="RFC8417"/>.</t>

</section>
</section>
<section anchor="iana"><name>IANA Considerations</name>

<section anchor="iana-formats"><name>Security Event Identifier Formats Registry</name>
<t>This document defines Identifier Formats, for which IANA is asked to create and maintain a new registry titled "Security Event Identifier Formats".  Initial values for the Security Event Identifier Formats registry are given in <xref target="sub-ids"/>.  Future assignments are to be made through the Expert Review registration policy <xref target="BCP26"/> and shall follow the template presented in <xref target="iana-formats-template"/>.</t>

<t>It is suggested that multiple Designated Experts be appointed who are able to represent the perspectives of different applications using this specification, in order to enable broadly informed review of registration decisions.  In cases where a registration decision could be perceived as creating a conflict of interest for a particular Expert, that Expert should defer to the judgment of the other Experts.</t>

<section anchor="registry-location"><name>Registry Location</name>
<t>(This section to be removed by the RFC Editor before publication as an RFC.)</t>

<t>The authors recommend that the Identifier Formats registry be located at <spanx style="verb">https://www.iana.org/assignments/secevent/</spanx>.</t>

</section>
<section anchor="iana-formats-template"><name>Registration Template</name>

<dl newline="true">
  <dt>Format Name</dt>
  <dd>
    <t>The name of the Identifier Format, as described in <xref target="sub-ids"/>. The name MUST be an ASCII string consisting only of lower-case characters ("a" - "z"), digits ("0" - "9"), underscores ("_"), and hyphens ("-"), and SHOULD NOT exceed 20 characters in length.</t>
  </dd>
  <dt>Format Description</dt>
  <dd>
    <t>A brief description of the Identifier Format.</t>
  </dd>
  <dt>Change Controller</dt>
  <dd>
    <t>For formats defined in documents published by the IETF or its working groups, list "IETF".  For all other formats, list the name of the party responsible for the registration.  Contact information such as mailing address, email address, or phone number may also be provided.</t>
  </dd>
  <dt>Defining Document(s)</dt>
  <dd>
    <t>A reference to the document or documents that define the Identifier Format.  The definition MUST specify the name, format, and meaning of each member that may occur within a Subject Identifier of the defined format, as well as whether each member is optional, required, prohibited, or the circumstances under which the member may be optional, required, or prohibited. URIs that can be used to retrieve copies of each document SHOULD be included.</t>
  </dd>
</dl>

</section>
<section anchor="iana-formats-init"><name>Initial Registry Contents</name>

<section anchor="account-identifier-format"><name>Account Identifier Format</name>

<t><list style="symbols">
  <t>Format Name: "account"</t>
  <t>Format Description: Subject identifier based on <spanx style="verb">acct</spanx> URI.</t>
  <t>Change Controller: IETF</t>
  <t>Defining Document(s): <xref target="sub-ids"/> of this document.</t>
</list></t>

</section>
<section anchor="email-identifier-format"><name>Email Identifier Format</name>

<t><list style="symbols">
  <t>Format Name: <spanx style="verb">email</spanx></t>
  <t>Format Description: Subject identifier based on email address.</t>
  <t>Change Controller: IETF</t>
  <t>Defining Document(s): <xref target="sub-ids"/> of this document.</t>
</list></t>

</section>
<section anchor="issuer-and-subject-identifier-format"><name>Issuer and Subject Identifier Format</name>

<t><list style="symbols">
  <t>Format Name: "iss_sub"</t>
  <t>Format Description: Subject identifier based on an issuer and subject.</t>
  <t>Change Controller: IETF</t>
  <t>Defining Document(s): <xref target="sub-ids"/> of this document.</t>
</list></t>

</section>
<section anchor="opaque-identifier-format"><name>Opaque Identifier Format</name>

<t><list style="symbols">
  <t>Format Name: "opaque"</t>
  <t>Format Description: Subject identifier based on an opaque string.</t>
  <t>Change Controller: IETF</t>
  <t>Defining Document(s): <xref target="sub-ids"/> of this document.</t>
</list></t>

</section>
<section anchor="phone-number-identifier-format"><name>Phone Number Identifier Format</name>

<t><list style="symbols">
  <t>Format Name: "phone_number"</t>
  <t>Format Description: Subject identifier based on an phone number.</t>
  <t>Change Controller: IETF</t>
  <t>Defining Document(s): <xref target="sub-ids"/> of this document.</t>
</list></t>

</section>
<section anchor="decentralized-identifier-format"><name>Decentralized Identifier Format</name>

<t><list style="symbols">
  <t>Format Name: "did"</t>
  <t>Format Description: Subject identifier based on a decentralized identifier (DID).</t>
  <t>Change Controller: IETF</t>
  <t>Defining Document(s): <xref target="sub-ids"/> of this document.</t>
</list></t>

</section>
<section anchor="uniform-resource-identifier-format"><name>Uniform Resource Identifier Format</name>

<t><list style="symbols">
  <t>Format Name: "uri"</t>
  <t>Format Description: Subject identifier based on a uniform resource identifier (URI).</t>
  <t>Change Controller: IETF</t>
  <t>Defining Document(s): <xref target="sub-ids"/> of this document.</t>
</list></t>

</section>
<section anchor="aliases-identifier-format"><name>Aliases Identifier Format</name>

<t><list style="symbols">
  <t>Format Name: "aliases"</t>
  <t>Format Description: Subject identifier that groups together multiple different subject identifiers for the same subject.</t>
  <t>Change Controller: IETF</t>
  <t>Defining Document(s): <xref target="sub-ids"/> of this document.</t>
</list></t>

</section>
</section>
<section anchor="iana-formats-expert"><name>Guidance for Expert Reviewers</name>
<t>The Expert Reviewer is expected to review the documentation referenced in a registration request to verify its completeness. The Expert Reviewer must base their decision to accept or reject the request on a fair and impartial assessment of the request. If the Expert Reviewer has a conflict of interest, such as being an author of a defining document referenced by the request, they must recuse themselves from the approval process for that request. In the case where a request is rejected, the Expert Reviewer should provide the requesting party with a written statement expressing the reason for rejection, and be prepared to cite any sources of information that went into that decision.</t>

<t>Identifier Formats need not be generally applicable and may be highly specific to a particular domain; it is expected that formats may be registered for niche or industry-specific use cases. The Expert Reviewer should focus on whether the format is thoroughly documented, and whether its registration will promote or harm interoperability.  In most cases, the Expert Reviewer should not approve a request if the registration would contribute to confusion, or amount to a synonym for an existing format.</t>

</section>
</section>
<section anchor="json-web-token-claims-registration"><name>JSON Web Token Claims Registration</name>
<t>This document defines the <spanx style="verb">sub_id</spanx> JWT Claim, which IANA is asked to register in the "JSON Web Token Claims" registry <xref target="IANA.JWT.Claims">IANA JSON Web Token Claims Registry</xref> established by <xref target="RFC7519"/>.</t>

<section anchor="registry-contents"><name>Registry Contents</name>

<t><list style="symbols">
  <t>Claim Name: "sub_id"</t>
  <t>Claim Description: Subject Identifier</t>
  <t>Change Controller: IESG</t>
  <t>Specification Document(s): <xref target="jwt-claims-sub_id"/> of this document.</t>
</list></t>

</section>
</section>
</section>


  </middle>

  <back>


    <references title='Normative References'>





<reference anchor='BCP26' target='https://www.rfc-editor.org/info/rfc8126'>
<front>
<title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
<author fullname='M. Cotton' initials='M.' surname='Cotton'><organization/></author>
<author fullname='B. Leiba' initials='B.' surname='Leiba'><organization/></author>
<author fullname='T. Narten' initials='T.' surname='Narten'><organization/></author>
<date month='June' year='2017'/>
<abstract><t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters.  To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper.  For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t><t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed.  This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t><t>This is the third edition of this document; it obsoletes RFC 5226.</t></abstract>
</front>
<seriesInfo name='BCP' value='26'/>
<seriesInfo name='RFC' value='8126'/>
<seriesInfo name='DOI' value='10.17487/RFC8126'/>
</reference>


<reference anchor="E164" target="http://www.itu.int/rec/T-REC-E.164-201011-I/en">
  <front>
    <title>The international public telecommunication numbering plan</title>
    <author >
      <organization>International Telecommunication Union</organization>
    </author>
    <date year="2010"/>
  </front>
</reference>
<reference anchor="IANA.JWT.Claims" target="http://www.iana.org/assignments/jwt">
  <front>
    <title>JSON Web Token Claims</title>
    <author >
      <organization>IANA</organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="DID" target="https://www.w3.org/TR/did-core/">
  <front>
    <title>Decentralized Identifiers (DIDs) v1.0</title>
    <author >
      <organization>World Wide Web Consortium (W3C)</organization>
    </author>
    <date year="2021"/>
  </front>
</reference>




<reference anchor='RFC8417' target='https://www.rfc-editor.org/info/rfc8417'>
<front>
<title>Security Event Token (SET)</title>
<author fullname='P. Hunt' initials='P.' role='editor' surname='Hunt'><organization/></author>
<author fullname='M. Jones' initials='M.' surname='Jones'><organization/></author>
<author fullname='W. Denniss' initials='W.' surname='Denniss'><organization/></author>
<author fullname='M. Ansari' initials='M.' surname='Ansari'><organization/></author>
<date month='July' year='2018'/>
<abstract><t>This specification defines the Security Event Token (SET) data structure.  A SET describes statements of fact from the perspective of an issuer about a subject.  These statements of fact represent an event that occurred directly to or about a security subject, for example, a statement about the issuance or revocation of a token on behalf of a subject.  This specification is intended to enable representing security- and identity-related events.  A SET is a JSON Web Token (JWT), which can be optionally signed and/or encrypted. SETs can be distributed via protocols such as HTTP.</t></abstract>
</front>
<seriesInfo name='RFC' value='8417'/>
<seriesInfo name='DOI' value='10.17487/RFC8417'/>
</reference>



<reference anchor='RFC7519' target='https://www.rfc-editor.org/info/rfc7519'>
<front>
<title>JSON Web Token (JWT)</title>
<author fullname='M. Jones' initials='M.' surname='Jones'><organization/></author>
<author fullname='J. Bradley' initials='J.' surname='Bradley'><organization/></author>
<author fullname='N. Sakimura' initials='N.' surname='Sakimura'><organization/></author>
<date month='May' year='2015'/>
<abstract><t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties.  The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t></abstract>
</front>
<seriesInfo name='RFC' value='7519'/>
<seriesInfo name='DOI' value='10.17487/RFC7519'/>
</reference>



<reference anchor='RFC7159' target='https://www.rfc-editor.org/info/rfc7159'>
<front>
<title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
<author fullname='T. Bray' initials='T.' role='editor' surname='Bray'><organization/></author>
<date month='March' year='2014'/>
<abstract><t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format.  It was derived from the ECMAScript Programming Language Standard.  JSON defines a small set of formatting rules for the portable representation of structured data.</t><t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t></abstract>
</front>
<seriesInfo name='RFC' value='7159'/>
<seriesInfo name='DOI' value='10.17487/RFC7159'/>
</reference>



<reference anchor='RFC2119' target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author fullname='S. Bradner' initials='S.' surname='Bradner'><organization/></author>
<date month='March' year='1997'/>
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference anchor='RFC7565' target='https://www.rfc-editor.org/info/rfc7565'>
<front>
<title>The 'acct' URI Scheme</title>
<author fullname='P. Saint-Andre' initials='P.' surname='Saint-Andre'><organization/></author>
<date month='May' year='2015'/>
<abstract><t>This document defines the 'acct' Uniform Resource Identifier (URI) scheme as a way to identify a user's account at a service provider, irrespective of the particular protocols that can be used to interact with the account.</t></abstract>
</front>
<seriesInfo name='RFC' value='7565'/>
<seriesInfo name='DOI' value='10.17487/RFC7565'/>
</reference>



<reference anchor='RFC5322' target='https://www.rfc-editor.org/info/rfc5322'>
<front>
<title>Internet Message Format</title>
<author fullname='P. Resnick' initials='P.' role='editor' surname='Resnick'><organization/></author>
<date month='October' year='2008'/>
<abstract><t>This document specifies the Internet Message Format (IMF), a syntax for text messages that are sent between computer users, within the framework of &quot;electronic mail&quot; messages.  This specification is a revision of Request For Comments (RFC) 2822, which itself superseded Request For Comments (RFC) 822, &quot;Standard for the Format of ARPA Internet Text Messages&quot;, updating it to reflect current practice and incorporating incremental changes that were specified in other RFCs.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5322'/>
<seriesInfo name='DOI' value='10.17487/RFC5322'/>
</reference>



<reference anchor='RFC5321' target='https://www.rfc-editor.org/info/rfc5321'>
<front>
<title>Simple Mail Transfer Protocol</title>
<author fullname='J. Klensin' initials='J.' surname='Klensin'><organization/></author>
<date month='October' year='2008'/>
<abstract><t>This document is a specification of the basic protocol for Internet electronic mail transport.  It consolidates, updates, and clarifies several previous documents, making all or parts of most of them obsolete.  It covers the SMTP extension mechanisms and best practices for the contemporary Internet, but does not provide details about particular extensions.  Although SMTP was designed as a mail transport and delivery protocol, this specification also contains information that is important to its use as a &quot;mail submission&quot; protocol for &quot;split-UA&quot; (User Agent) mail reading systems and mobile environments.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5321'/>
<seriesInfo name='DOI' value='10.17487/RFC5321'/>
</reference>



<reference anchor='RFC3986' target='https://www.rfc-editor.org/info/rfc3986'>
<front>
<title>Uniform Resource Identifier (URI): Generic Syntax</title>
<author fullname='T. Berners-Lee' initials='T.' surname='Berners-Lee'><organization/></author>
<author fullname='R. Fielding' initials='R.' surname='Fielding'><organization/></author>
<author fullname='L. Masinter' initials='L.' surname='Masinter'><organization/></author>
<date month='January' year='2005'/>
<abstract><t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource.  This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet.  The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier.  This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='STD' value='66'/>
<seriesInfo name='RFC' value='3986'/>
<seriesInfo name='DOI' value='10.17487/RFC3986'/>
</reference>




    </references>

    <references title='Informative References'>

<reference anchor="OpenID.Core" target="http://openid.net/specs/openid-connect-core-1_0.html">
  <front>
    <title>OpenID Connect Core 1.0</title>
    <author initials="N." surname="Sakimura" fullname="Nat Sakimura">
      <organization>Nomura Research Institute, Ltd.</organization>
    </author>
    <author initials="J." surname="Bradley" fullname="John Bradley">
      <organization>Ping Identity</organization>
    </author>
    <author initials="M." surname="Jones" fullname="Michael B. Jones">
      <organization>Microsoft</organization>
    </author>
    <author initials="B." surname="de Medeiros" fullname="Breno de Medeiros">
      <organization>Google</organization>
    </author>
    <author initials="C." surname="Mortimore" fullname="Chuck Mortimore">
      <organization>Salesforce</organization>
    </author>
    <date year="2014" month="November"/>
  </front>
</reference>




<reference anchor='RFC1034' target='https://www.rfc-editor.org/info/rfc1034'>
<front>
<title>Domain names - concepts and facilities</title>
<author fullname='P.V. Mockapetris' initials='P.V.' surname='Mockapetris'><organization/></author>
<date month='November' year='1987'/>
<abstract><t>This RFC is the revised basic definition of The Domain Name System.  It obsoletes RFC-882.  This memo describes the domain style names and their used for host address look up and electronic mail forwarding.  It discusses the clients and servers in the domain name system and the protocol used between them.</t></abstract>
</front>
<seriesInfo name='STD' value='13'/>
<seriesInfo name='RFC' value='1034'/>
<seriesInfo name='DOI' value='10.17487/RFC1034'/>
</reference>



<reference anchor='RFC7515' target='https://www.rfc-editor.org/info/rfc7515'>
<front>
<title>JSON Web Signature (JWS)</title>
<author fullname='M. Jones' initials='M.' surname='Jones'><organization/></author>
<author fullname='J. Bradley' initials='J.' surname='Bradley'><organization/></author>
<author fullname='N. Sakimura' initials='N.' surname='Sakimura'><organization/></author>
<date month='May' year='2015'/>
<abstract><t>JSON Web Signature (JWS) represents content secured with digital signatures or Message Authentication Codes (MACs) using JSON-based data structures.  Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and an IANA registry defined by that specification.  Related encryption capabilities are described in the separate JSON Web Encryption (JWE) specification.</t></abstract>
</front>
<seriesInfo name='RFC' value='7515'/>
<seriesInfo name='DOI' value='10.17487/RFC7515'/>
</reference>



<reference anchor='RFC8446' target='https://www.rfc-editor.org/info/rfc8446'>
<front>
<title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
<author fullname='E. Rescorla' initials='E.' surname='Rescorla'><organization/></author>
<date month='August' year='2018'/>
<abstract><t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol.  TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t><t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961.  This document also specifies new requirements for TLS 1.2 implementations.</t></abstract>
</front>
<seriesInfo name='RFC' value='8446'/>
<seriesInfo name='DOI' value='10.17487/RFC8446'/>
</reference>




    </references>


<section numbered="no" anchor="acknowledgements"><name>Acknowledgements</name>
<t>The authors would like to thank the members of the IETF Security Events working group, as well as those of the OpenID Shared Signals and Events Working Group, whose work provided the original basis for this document.
We would also like to acknowledge Aaron Parecki, Denis Pinkas, Justin Richer, Mike Jones and other members of the working group for reviewing this document.</t>

</section>
<section numbered="no" anchor="change-log"><name>Change Log</name>
<t>(This section to be removed by the RFC Editor before publication as an RFC.)</t>

<t>Draft 00 - AB - First draft</t>

<t>Draft 01 - AB:</t>

<t><list style="symbols">
  <t>Added reference to RFC 5322 for format of <spanx style="verb">email</spanx> claim.</t>
  <t>Renamed <spanx style="verb">iss_sub</spanx> type to <spanx style="verb">iss-sub</spanx>.</t>
  <t>Renamed <spanx style="verb">id_token_claims</spanx> type to <spanx style="verb">id-token-claims</spanx>.</t>
  <t>Added text specifying the nature of the subjects described by each type.</t>
</list></t>

<t>Draft 02 - AB:</t>

<t><list style="symbols">
  <t>Corrected format of phone numbers in examples.</t>
  <t>Updated author info.</t>
</list></t>

<t>Draft 03 - AB:</t>

<t><list style="symbols">
  <t>Added <spanx style="verb">account</spanx> type for <spanx style="verb">acct</spanx> URIs.</t>
  <t>Replaced <spanx style="verb">id-token-claims</spanx> type with <spanx style="verb">aliases</spanx> type.</t>
  <t>Added email canonicalization guidance.</t>
  <t>Updated semantics for <spanx style="verb">email</spanx>, <spanx style="verb">phone</spanx>, and <spanx style="verb">iss-sub</spanx> types.</t>
</list></t>

<t>Draft 04 - AB:</t>

<t><list style="symbols">
  <t>Added <spanx style="verb">sub_id</spanx> JWT Claim definition, guidance, examples.</t>
  <t>Added text prohibiting <spanx style="verb">aliases</spanx> nesting.</t>
  <t>Added privacy considerations for identifier correlation.</t>
</list></t>

<t>Draft 05 - AB:</t>

<t><list style="symbols">
  <t>Renamed the <spanx style="verb">phone</spanx> type to <spanx style="verb">phone-number</spanx> and its <spanx style="verb">phone</spanx> claim to <spanx style="verb">phone_number</spanx>.</t>
</list></t>

<t>Draft 06 - AB:</t>

<t><list style="symbols">
  <t>Replaced usage of the word "claim" to describe members of a Subject Identifier with the word "member", in accordance with terminology in RFC7159.</t>
  <t>Renamed the <spanx style="verb">phone-number</spanx> type to <spanx style="verb">phone_number</spanx> and <spanx style="verb">iss-sub</spanx> to <spanx style="verb">iss_sub</spanx>.</t>
  <t>Added normative requirements limiting the use of both <spanx style="verb">sub</spanx> and <spanx style="verb">sub_id</spanx> claims together when processing a JWT.</t>
  <t>Clarified that identifier correlation may be acceptable when it is a core part of the use case.</t>
  <t>Replaced references to OIDF with IETF in IANA Considerations.</t>
  <t>Recommended the appointment of multiple Designated Experts, and a location for the Subject Identifier Types registry.</t>
  <t>Added "_" to list of allowed characters in the Type Name for Subject Identifier Types.</t>
  <t>Clarified that Subject Identifiers don't provide confidentiality or integrity protection.</t>
  <t>Added references to SET, JWT privacy and security considerations.</t>
  <t>Added section describing the difference between subject identifier type and principal type that hopefully clarifies things and doesn't just muddy the water further.</t>
</list></t>

<t>Draft 07 - AB:</t>

<t><list style="symbols">
  <t>Emphasized that the spec is about identifiers, not the things they identify:
  <list style="symbols">
      <t>Renamed "Subject Identifier Type" to "Identifier Format".</t>
      <t>Renamed <spanx style="verb">subject_type</spanx> to <spanx style="verb">format</spanx>.</t>
      <t>Renamed "Security Event Subject Identifier Type Registry" to "Security Event Identifier Format Registry".</t>
      <t>Added new section with guidance for specs defining Identifier Formats, with normative prohibition on formats that describe the subject itself, rather than the identifier.</t>
    </list></t>
  <t>Clarified the meaning of "subject":
  <list style="symbols">
      <t>Defined "subject" as applying generically and "JWT Subject" as applying specifically to the subject of a JWT.</t>
      <t>Replaced most instances of the word "principal" with "subject".</t>
    </list></t>
  <t>Added <spanx style="verb">opaque</spanx> Identifier Format</t>
</list></t>

<t>Draft 08 - JR, AB:</t>

<t><list style="symbols">
  <t>Added <spanx style="verb">did</spanx> Identifier Format</t>
  <t>Alphabetized identifier format definitions</t>
  <t>Replaced "type" with "format" in places that had been missed in the -07 change. (mostly IANA Considerations)</t>
  <t>Miscellaneous editorial fixes</t>
</list></t>

<t>Draft 09 - AB:</t>

<t><list style="symbols">
  <t>Miscellaneous editorial fixes</t>
</list></t>

<t>Draft 10 - PJ:</t>

<t><list style="symbols">
  <t>Added author</t>
  <t>Editorial nits</t>
</list></t>

<t>Draft 11 - PJ:</t>

<t><list style="symbols">
  <t>Miscellaneous editorial fixes</t>
  <t>Moved aliases to the last in identifier format definitions</t>
  <t>Acknowledged individual reviewers</t>
</list></t>

<t>Draft 12 - PJ:</t>

<t><list style="symbols">
  <t>Restore the DID format that was removed in -11</t>
  <t>Added a generic "URI" format</t>
  <t>Normative advice on choosing the format</t>
</list></t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

