<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.17 (Ruby 2.6.3) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-ietf-secevent-subject-identifiers-14" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="secevent-subject-identifiers">Subject Identifiers for Security Event Tokens</title>

    <author initials="A." surname="Backman" fullname="Annabelle Backman" role="editor">
      <organization>Amazon</organization>
      <address>
        <email>richanna@amazon.com</email>
      </address>
    </author>
    <author initials="M." surname="Scurtescu" fullname="Marius Scurtescu">
      <organization>Coinbase</organization>
      <address>
        <email>marius.scurtescu@coinbase.com</email>
      </address>
    </author>
    <author initials="P." surname="Jain" fullname="Prachi Jain">
      <organization>Fastly</organization>
      <address>
        <email>prachi.jain1288@gmail.com</email>
      </address>
    </author>

    <date year="2022" month="October" day="27"/>

    <area>Security</area>
    <workgroup>Security Events Working Group</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>Security events communicated within Security Event Tokens may support a variety of identifiers to identify subjects related to the event.  This specification formalizes the notion of subject identifiers as structured information that describe a subject, and named formats that define the syntax and semantics for encoding subject identifiers as JSON objects.  It also defines a registry for defining and allocating names for such formats, as well as the <spanx style="verb">sub_id</spanx> JSON Web Token (JWT) claim.</t>



    </abstract>



  </front>

  <middle>


<section anchor="intro"><name>Introduction</name>
<t>As described in Section 1.2 of SET <xref target="RFC8417"/>, subjects related to security events may take a variety of forms, including but not limited to a JWT <xref target="RFC7519"/> principal, an IP address, a URL, etc.  Different types of subjects may need to be identified in different ways (e.g., a host might be identified by an IP or MAC address, while a user might be identified by an email address).  Furthermore, even in the case where the type of the subject is known, there may be multiple ways by which a given subject may be identified.  For example, an account may be identified by an opaque identifier, an email address, a phone number, a JWT <spanx style="verb">iss</spanx> claim and <spanx style="verb">sub</spanx> claim, etc., depending on the nature and needs of the transmitter and receiver. Even within the context of a given transmitter and receiver relationship, it may be appropriate to identify different accounts in different ways, for example if some accounts only have email addresses associated with them while others only have phone numbers. Therefore it can be necessary to indicate within a SET the mechanism by which a subject is being identified.</t>

<t>To address this problem, this specification defines Subject Identifiers - JSON <xref target="RFC8259"/> objects containing information identifying a subject - and Identifier Formats - named sets of rules describing how to encode different kinds of subject identifying information (e.g., an email address, or an issuer and subject pair) as a Subject Identifier.</t>

<t>Below is a non-normative example of a Subject Identifier that identifies a subject by email address, using the Email Identifier Format.</t>

<figure title="Example: Subject Identifier using the Email Identifier Format" anchor="figexampleintro"><artwork><![CDATA[
{
  "format": "email",
  "email": "user@example.com"
}
]]></artwork></figure>

<t>Subject Identifiers are intended to be a general-purpose mechanism for identifying subjects within JSON objects and their usage need not be limited to SETs.  Below is a non-normative example of a JWT that uses a Subject Identifier in the <spanx style="verb">sub_id</spanx> claim (defined in this specification) to identify the JWT Subject.</t>

<figure title="Example: JWT using a Subject Identifier with the &quot;sub_id&quot; claim" anchor="figexampleintro2"><artwork><![CDATA[
{
  "iss": "issuer.example.com",
  "sub_id": {
    "format": "phone_number",
    "phone_number": "+12065550100"
  }
}
]]></artwork></figure>

<t>Usage of Subject Identifiers also need not be limited to identifying JWT Subjects.  They are intended as a general-purpose means of expressing identifying information in an unambiguous manner.  Below is a non-normative example of a SET containing a hypothetical security event describing the interception of a message, using Subject Identifiers to identify the sender, intended recipient, and interceptor.</t>

<figure title="Example: SET with an event payload containing multiple Subject Identifiers" anchor="figexampleintro3"><artwork><![CDATA[
{
  "iss": "issuer.example.com",
  "iat": 1508184845,
  "aud": "aud.example.com",
  "events": {
    "https://secevent.example.com/events/message-interception": {
      "from": {
        "format": "email",
        "email": "alice@example.com"
      },
      "to": {
        "format": "email",
        "email": "bob@example.com"
      },
      "interceptor": {
        "format": "email",
        "email": "eve@example.com"
      }
    }
  }
}

]]></artwork></figure>

</section>
<section anchor="conv"><name>Notational Conventions</name>
<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in <xref target="RFC2119"/>.</t>

<section anchor="defn"><name>Definitions</name>
<t>This specification utilizes terminology defined in <xref target="RFC8259"/> and <xref target="RFC8417"/>.</t>

<t>Within this specification, the terms "Subject" and "subject" refer generically to anything being identified via one or more pieces of information.  The term "JWT Subject" refers specifically to the subject of a JWT (i.e., the subject that the JWT asserts claims about).</t>

</section>
</section>
<section anchor="sub-ids"><name>Subject Identifiers</name>
<t>A Subject Identifier is a JSON <xref target="RFC8259"/> object whose contents may be used to identify a subject within some context.  An Identifier Format is a named definition of a set of information that may be used to identify a subject, and the rules for encoding that information as a Subject Identifier; they define the syntax and semantics of Subject Identifiers.  A Subject Identifier MUST conform to a specific Identifier Format, and MUST contain a <spanx style="verb">format</spanx> member whose value is the name of that Identifier Format.</t>

<t>Every Identifier Format MUST have a unique name registered in the IANA "Security Event Identifier Formats" registry established by <xref target="iana-formats"/>, or a Collision-Resistant Name as defined in <xref target="RFC7519"/>.  Identifier Formats that are expected to be used broadly by a variety of parties SHOULD be registered in the "Security Event Identifier Formats" registry.</t>

<t>An Identifier Format MAY describe more members than are strictly necessary to identify a subject, and MAY describe conditions under which those members are required, optional, or prohibited.  The <spanx style="verb">format</spanx> member is reserved for use as described in this specification; Identifier Formats MUST NOT declare any rules regarding the <spanx style="verb">format</spanx> member.</t>

<t>Every member within a Subject Identifier MUST match the rules specified for that member by this specification or by Subject Identifier's Identifier Format.  A Subject Identifier MUST NOT contain any members prohibited or not described by its Identifier Format, and MUST contain all members required by its Identifier Format.</t>

<section anchor="identifier-formats-versus-principal-types"><name>Identifier Formats versus Principal Types</name>
<t>Identifier Formats define how to encode identifying information for a subject.  Unlike Principal Types, they do not define the type or nature of the subject itself.  E.g., While the <spanx style="verb">email</spanx> Identifier Format declares that the value of the <spanx style="verb">email</spanx> member is an email address, a subject in a Security Event that is identified by an <spanx style="verb">email</spanx> Subject Identifier could be an end user who controls that email address, the mailbox itself, or anything else that the transmitter and receiver both understand to be associated with that email address.  Consequently Subject Identifiers remove ambiguity around how a subject is being identified, and how to parse an identifying structure, but do not remove ambiguity around how to resolve that identifier to a subject.  For example, consider a directory management API that allows callers to identify users and groups through both opaque unique identifiers and email addresses.  Such an API could use Subject Identifiers to disambiguate between which of these two types of identifiers is in use.  However, the API would have to determine whether the subject is a user or group via some other means, such as by querying a database, interpreting other parameters in the request, or inferring the type from the API contract.</t>

</section>
<section anchor="identifier-format-definitions"><name>Identifier Format Definitions</name>

<t>The following Identifier Formats are registered in the IANA "Security Event Identifier Formats" registry established by <xref target="iana-formats"/>.</t>

<t>Since the subject identifier format conveys semantic information, applications SHOULD choose the most specific possible format for the identifier in question. For example, an email address can be conveyed using a <spanx style="verb">mailto:</spanx> URI and the <spanx style="verb">uri</spanx> identifier format, but since the value is known to be an email address, the application should prefer to use the <spanx style="verb">email</spanx> identifier format instead.</t>

<section anchor="sub-id-acct"><name>Account Identifier Format</name>
<t>The Account Identifier Format identifies a subject using an account at a service provider, identified with an <spanx style="verb">acct</spanx> URI as defined in <xref target="RFC7565"/>.  Subject Identifiers in this format MUST contain a <spanx style="verb">uri</spanx> member whose value is the <spanx style="verb">acct</spanx> URI for the subject.  The <spanx style="verb">uri</spanx> member is REQUIRED and MUST NOT be null or empty.  The Account Identifier Format is identified by a value of <spanx style="verb">account</spanx> in the <spanx style="verb">format</spanx> member.</t>

<t>Below is a non-normative example Subject Identifier for the Account Identifier Format:</t>

<figure title="Example: Subject Identifier for the Account Identifier Format" anchor="figexamplesubidaccount"><artwork><![CDATA[
{
  "format": "account",
  "uri": "acct:example.user@service.example.com"
}
]]></artwork></figure>

</section>
<section anchor="sub-id-email"><name>Email Identifier Format</name>
<t>The Email Identifier Format identifies a subject using an email address.  Subject Identifiers in this format MUST contain an <spanx style="verb">email</spanx> member whose value is a string containing the email address of the subject, formatted as an <spanx style="verb">addr-spec</spanx> as defined in Section 3.4.1 of <xref target="RFC5322"/>. The <spanx style="verb">email</spanx> member is REQUIRED and MUST NOT be null or empty. The value of the <spanx style="verb">email</spanx> member SHOULD identify a mailbox to which email may be delivered, in accordance with <xref target="RFC5321"/>. The Email Identifier Format is identified by the name <spanx style="verb">email</spanx>.</t>

<t>Below is a non-normative example Subject Identifier in the Email Identifier Format:</t>

<figure title="Example: Subject Identifier in the Email Identifier Format" anchor="figexamplesubidemail"><artwork><![CDATA[
{
  "format": "email",
  "email": "user@example.com"
}
]]></artwork></figure>

<section anchor="email-canon"><name>Email Canonicalization</name>
<t>Many email providers will treat multiple email addresses as equivalent. While the domain portion of an <xref target="RFC5322"/> email address is consistently treated as case-insensitive per <xref target="RFC1034"/>, some providers treat the local part of the email address as case-insensitive as well, and consider "user@example.com", "User@example.com", and "USER@example.com" as the same email address. This has led users to view these strings as equivalent, driving service providers to implement proprietary email canonicalization algorithms to ensure that email addresses entered by users resolve to the same canonical string. When receiving an Email Subject Identifier, the recipient SHOULD use their implementation's canonicalization algorithm to resolve the email address to the same string used in their system.</t>

</section>
</section>
<section anchor="sub-id-iss-sub"><name>Issuer and Subject Identifier Format</name>
<t>The Issuer and Subject Identifier Format identifies a subject using a pair of <spanx style="verb">iss</spanx> and <spanx style="verb">sub</spanx> members, analogous to how subjects are identified using the <spanx style="verb">iss</spanx> and <spanx style="verb">sub</spanx> claims in <xref target="OpenID.Core">OpenID Connect</xref> ID Tokens.  These members MUST follow the formats of the <spanx style="verb">iss</spanx> member and <spanx style="verb">sub</spanx> member defined by <xref target="RFC7519"/>, respectively.  Both the <spanx style="verb">iss</spanx> member and the <spanx style="verb">sub</spanx> member are REQUIRED and MUST NOT be null or empty. The Issuer and Subject Identifier Format is identified by the name <spanx style="verb">iss_sub</spanx>.</t>

<t>Below is a non-normative example Subject Identifier in the Issuer and Subject Identifier Format:</t>

<figure title="Example: Subject Identifier in the Issuer and Subject Identifier Format" anchor="figexamplesubidisssub"><artwork><![CDATA[
{
  "format": "iss_sub",
  "iss": "https://issuer.example.com/",
  "sub": "145234573"
}
]]></artwork></figure>

</section>
<section anchor="sub-id-opaque"><name>Opaque Identifier Format</name>
<t>The Opaque Identifier Format describes a subject that is identified with a string with no semantics asserted beyond its usage as an identifier for the subject, such as a UUID or hash used as a surrogate identifier for a record in a database.  Subject Identifiers in this format MUST contain an <spanx style="verb">id</spanx> member whose value is a JSON string containing the opaque string identifier for the subject.  The <spanx style="verb">id</spanx> member is REQUIRED and MUST NOT be null or empty.  The Opaque Identifier Format is identified by the name <spanx style="verb">opaque</spanx>.</t>

<t>Below is a non-normative example Subject Identifier in the Opaque Identifier Format:</t>

<figure title="Example: Subject Identifier in the Opaque Identifier Format" anchor="figexamplesubidopaque"><artwork><![CDATA[
{
  "format": "opaque",
  "id": "11112222333344445555"
}
]]></artwork></figure>

</section>
<section anchor="sub-id-phone"><name>Phone Number Identifier Format</name>
<t>The Phone Number Identifier Format identifies a subject using a telephone number.  Subject Identifiers in this format MUST contain a <spanx style="verb">phone_number</spanx> member whose value is a string containing the full telephone number of the subject, including international dialing prefix, formatted according to <xref target="E164">E.164</xref>. The <spanx style="verb">phone_number</spanx> member is REQUIRED and MUST NOT be null or empty. The Phone Number Identifier Format is identified by the name <spanx style="verb">phone_number</spanx>.</t>

<t>Below is a non-normative example Subject Identifier in the Email Identifier Format:</t>

<figure title="Example: Subject Identifier in the Phone Number Identifier Format" anchor="figexamplesubidphone"><artwork><![CDATA[
{
  "format": "phone_number",
  "phone_number": "+12065550100"
}
]]></artwork></figure>

</section>
<section anchor="sub-id-did"><name>Decentralized Identifier (DID) Format</name>

<t>The Decentralized Identifier Format identifies a subject using a Decentralized Identifier (DID) URL as defined in <xref target="DID"/>.  Subject Identifiers in this format MUST contain a <spanx style="verb">url</spanx> member whose value is a DID URL for the DID Subject being identified. The value of the <spanx style="verb">url</spanx> member MUST be a valid DID URL and MAY be a bare DID. The <spanx style="verb">url</spanx> member is REQUIRED and MUST NOT be null or empty. The Decentralized Identifier Format is identified by the name <spanx style="verb">did</spanx>.</t>

<t>Below are non-normative example Subject Identifiers for the Decentralized Identifier Format:</t>

<figure title="Example: Subject Identifier for the Decentralized Identifier Format, identifying a subject with a bare DID" anchor="figexamplesubiddidbare"><artwork><![CDATA[
{
  "format": "did",
  "url": "did:example:123456"
}
]]></artwork></figure>

<figure title="Example: Subject Identifier for the Decentralized Identifier Format, identifying a subject with a DID URL with non-empty path and query components" anchor="figexamplesubiddidcomplex"><artwork><![CDATA[
{
  "format": "did",
  "url": "did:example:123456/did/url/path?versionId=1"
}
]]></artwork></figure>

</section>
<section anchor="sub-id-uri"><name>Uniform Resource Identifier (URI) Format</name>

<t>The Uniform Resource Identifier (URI) Format identifies a subject using a URI as defined in <xref target="RFC3986"/>. This identifier format makes no assumptions or guarantees with regard to the content, scheme, or reachability of the URI within the field. Subject Identifiers in this format MUST contain a <spanx style="verb">uri</spanx> members whose value is a URI for the subject being identified. The <spanx style="verb">uri</spanx> member is REQUIRED and MUST NOT be null or empty. The URI format is identified by the name <spanx style="verb">uri</spanx>.</t>

<t>Below are non-normative example Subject Identifiers for the URI format:</t>

<figure title="Example: Subject Identifier for the URI Format, identifying a subject with a website URI" anchor="figexamplesubiduidbare"><artwork><![CDATA[
{
  "format": "uri",
  "uri": "https://user.example.com/"
}
]]></artwork></figure>

<figure title="Example: Subject Identifier for the URI Format, identifying a subject with a random URN" anchor="figexamplesubidurnbare"><artwork><![CDATA[
{
  "format": "uri",
  "uri": "urn:uuid:4e851e98-83c4-4743-a5da-150ecb53042f"
}
]]></artwork></figure>

</section>
<section anchor="sub-id-aliases"><name>Aliases Identifier Format</name>
<t>The Aliases Identifier Format describes a subject that is identified with a list of different Subject Identifiers. It is intended for use when a variety of identifiers have been shared with the party that will be interpreting the Subject Identifier, and it is unknown which of those identifiers they will recognize or support.  Subject Identifiers in this format MUST contain an <spanx style="verb">identifiers</spanx> member whose value is a JSON array containing one or more Subject Identifiers.  Each Subject Identifier in the array MUST identify the same entity.  The <spanx style="verb">identifiers</spanx> member is REQUIRED and MUST NOT be null or empty.  It MAY contain multiple instances of the same Identifier Format (e.g., multiple Email Subject Identifiers), but SHOULD NOT contain exact duplicates.  This format is identified by the name <spanx style="verb">aliases</spanx>.</t>

<t><spanx style="verb">aliases</spanx> Subject Identifiers MUST NOT be nested; i.e., the <spanx style="verb">identifiers</spanx> member of an <spanx style="verb">aliases</spanx> Subject Identifier MUST NOT contain a Subject Identifier in the <spanx style="verb">aliases</spanx> format.</t>

<t>Below is a non-normative example Subject Identifier in the Aliases Identifier Format:</t>

<figure title="Example: Subject Identifier in the Aliases Identifier Format" anchor="figexamplesubididtoken"><artwork><![CDATA[
{
  "format": "aliases",
  "identifiers": [
    {
      "format": "email",
      "email": "user@example.com"
    },
    {
      "format": "phone_number",
      "phone_number": "+12065550100"
    },
    {
      "format": "email",
      "email": "user+qualifier@example.com"
    }
  ]
}
]]></artwork></figure>

</section>
</section>
</section>
<section anchor="jwt-claims"><name>Subject Identifiers in JWTs</name>

<section anchor="jwt-claims-sub_id"><name><spanx style="verb">sub_id</spanx> Claim</name>
<t>The <spanx style="verb">sub</spanx> JWT Claim is defined in Section 4.1.2 of <xref target="RFC7519"/> as containing a string value, and therefore cannot contain a Subject Identifier (which is a JSON object) as its value.  This document defines the <spanx style="verb">sub_id</spanx> JWT Claim, in accordance with Section 4.2 of <xref target="RFC7519"/>, as a common claim that identifies the JWT Subject using a Subject Identifier.  When present, the value of this claim MUST be a Subject Identifier that identifies the subject of the JWT.  The <spanx style="verb">sub_id</spanx> claim MAY be included in a JWT, whether or not the <spanx style="verb">sub</spanx> claim is present.  When both the <spanx style="verb">sub</spanx> and <spanx style="verb">sub_id</spanx> claims are present in a JWT, they MUST identify the same subject, as a JWT has one and only one JWT Subject.</t>

<t>When processing a JWT with both <spanx style="verb">sub</spanx> and <spanx style="verb">sub_id</spanx> claims, implementations MUST NOT rely on both claims to determine the JWT Subject.  An implementation MAY attempt to determine the JWT Subject from one claim and fall back to using the other if it determines it does not understand the format of the first claim.  For example, an implementation may attempt to use <spanx style="verb">sub_id</spanx>, and fall back to using <spanx style="verb">sub</spanx> upon finding that <spanx style="verb">sub_id</spanx> contains a Subject Identifier whose format is not recognized by the implementation.</t>

<t>Below are non-normative examples of JWTs containing the <spanx style="verb">sub_id</spanx> claim:</t>

<figure title="Example: JWT containing a &quot;sub_id&quot; claim and no &quot;sub&quot; claim" anchor="figexamplejwtsubidemail"><artwork><![CDATA[
{
  "iss": "issuer.example.com",
  "sub_id": {
    "format": "email",
    "email": "user@example.com"
  }
}
]]></artwork></figure>

<figure title="Example: JWT where both the &quot;sub&quot; and &quot;sub_id&quot; claims identify the JWT Subject using the same identifier" anchor="figexamplejwtsamesubid"><artwork><![CDATA[
{
  "iss": "issuer.example.com",
  "sub": "user@example.com",
  "sub_id": {
    "format": "email",
    "email": "user@example.com"
  }
}
]]></artwork></figure>

<figure title="Example: JWT where both the &quot;sub&quot; and &quot;sub_id&quot; claims identify the JWT Subject using different values of the same identifier type" anchor="figexamplejwtdiffsubvalues"><artwork><![CDATA[
{
  "iss": "issuer.example.com",
  "sub": "liz@example.com",
  "sub_id": {
    "format": "email",
    "email": "elizabeth@example.com"
  }
}
]]></artwork></figure>

<figure title="Example: JWT where the &quot;sub&quot; and &quot;sub_id&quot; claims identify the JWT Subject via different types of identifiers" anchor="figexamplejwtdiffsubtype"><artwork><![CDATA[
{
  "iss": "issuer.example.com",
  "sub": "user@example.com",
  "sub_id": {
    "format": "account",
    "uri": "acct:example.user@service.example.com"
  }
}
]]></artwork></figure>

</section>
<section anchor="subid-and-isssub-subject-identifiers"><name><spanx style="verb">sub_id</spanx> and <spanx style="verb">iss_sub</spanx> Subject Identifiers</name>
<t>The <spanx style="verb">sub_id</spanx> claim MAY contain an <spanx style="verb">iss_sub</spanx> Subject Identifier.  In this case, the JWT's <spanx style="verb">iss</spanx> claim and the Subject Identifier's <spanx style="verb">iss</spanx> member MAY be different.  For example, in <xref target="OpenID.Core">OpenID Connect</xref> client may construct such a JWT when sending JWTs back to its OpenID Connect Identity Provider, in order to identify the JWT Subject using an identifier known to be understood by both parties.  Similarly, the JWT's <spanx style="verb">sub</spanx> claim and the Subject Identifier's <spanx style="verb">sub</spanx> member MAY be different.  For example, this may be used by an OpenID Connect client to communicate the JWT Subject's local identifier at the client back to its Identity Provider.</t>

<t>Below are non-normative examples of a JWT where the <spanx style="verb">iss</spanx> claim and <spanx style="verb">iss</spanx> member within the <spanx style="verb">sub_id</spanx> claim are the same, and a JWT where they are different.</t>

<figure title="Example: JWT with an &quot;iss_sub&quot; Subject Identifier where JWT issuer and JWT Subject issuer are the same" anchor="figexamplejwtsameiss"><artwork><![CDATA[
{
  "iss": "issuer.example.com",
  "sub_id": {
    "format": "iss_sub",
    "iss": "issuer.example.com",
    "sub": "example_user"
  }
}
]]></artwork></figure>

<figure title="Example: JWT with an &quot;iss_sub&quot; Subject Identifier where the JWT issuer and JWT Subject issuer are different" anchor="figexamplejwtdiffiss"><artwork><![CDATA[
{
  "iss": "client.example.com",
  "sub_id": {
    "format": "iss_sub",
    "iss": "issuer.example.com",
    "sub": "example_user"
  }
}
]]></artwork></figure>

<figure title="Example: JWT with an &quot;iss_sub&quot; Subject Identifier where the JWT &quot;iss&quot; and &quot;sub&quot; claims differ from the JWT Subject's &quot;iss&quot; and &quot;sub&quot; members" anchor="figexamplejwtdiffisssub"><artwork><![CDATA[
{
  "iss": "client.example.com",
  "sub": "client_user",
  "sub_id": {
    "format": "iss_sub",
    "iss": "issuer.example.com",
    "sub": "example_user"
  }
}
]]></artwork></figure>

</section>
</section>
<section anchor="implementer"><name>Considerations for Specifications that Define Identifier Formats</name>
<t>Identifier Format definitions MUST NOT make assertions or declarations regarding the subject being identified by the Subject Identifier (e.g., an Identifier Format cannot be defined as specifically identifying human end users), as such statements are outside the scope of Identifier Formats and Subject Identifiers, and expanding that scope for some Identifier Formats but not others would harm interoperability, as applications that depend on this expanded scope to disambiguate the subject type would be unable to use Identifier Formats that do not provide such rules.</t>

</section>
<section anchor="privacy"><name>Privacy Considerations</name>

<section anchor="identifier-correlation"><name>Identifier Correlation</name>
<t>The act of presenting two or more identifiers for a single subject together (e.g., within an <spanx style="verb">aliases</spanx> Subject Identifier, or via the <spanx style="verb">sub</spanx> and <spanx style="verb">sub_id</spanx> JWT claims) may communicate more information about the subject than was intended.  For example, the entity to which the identifiers are presented now knows that both identifiers relate to the same subject, and may be able to correlate additional data based on that.  When transmitting Subject Identifiers, the transmitter SHOULD take care that they are only transmitting multiple identifiers together when it is known that the recipient already knows that the identifiers are related (e.g., because they were previously sent to the recipient as claims in an OpenID Connect ID Token), or when correlation is essential to the use case.  Implementers must consider such risks, and specifications that use subject identifiers must provide appropriate privacy considerations of their own.</t>

<t>The considerations described in Section 6 of <xref target="RFC8417"/> also apply when Subject Identifiers are used within SETs.  The considerations described in Section 12 of <xref target="RFC7519"/> also apply when Subject Identifiers are used within JWTs.</t>

</section>
</section>
<section anchor="security"><name>Security Considerations</name>
<t>This specification does not define any mechanism for ensuring the confidentiality or integrity of a Subject Identifier.  Where such properties are required, implementations MUST use mechanisms provided by the containing format (e.g., integrity protecting SETs or JWTs using JWS <xref target="RFC7515"/>), or at the transport layer or other layer in the application stack (e.g., using TLS <xref target="RFC8446"/>).</t>

<t>Further considerations regarding confidentiality and integrity of SETs can be found in Section 5.1 of <xref target="RFC8417"/>.</t>

</section>
<section anchor="iana"><name>IANA Considerations</name>

<section anchor="iana-formats"><name>Security Event Identifier Formats Registry</name>
<t>This document defines Identifier Formats, for which IANA is asked to create and maintain a new registry titled "Security Event Identifier Formats".  Initial values for the Security Event Identifier Formats registry are given in <xref target="sub-ids"/>.  Future assignments are to be made through the Specification Required registration policy <xref target="BCP26"/> and shall follow the template presented in <xref target="iana-formats-template"/>.</t>

<t>It is suggested that multiple Designated Experts be appointed who are able to represent the perspectives of different applications using this specification, in order to enable broadly informed review of registration decisions.</t>

<section anchor="registry-location"><name>Registry Location</name>
<t>(This section to be removed by the RFC Editor before publication as an RFC.)</t>

<t>The authors recommend that the Identifier Formats registry be located at <spanx style="verb">https://www.iana.org/assignments/secevent/</spanx>.</t>

</section>
<section anchor="iana-formats-template"><name>Registration Template</name>

<dl newline="true">
  <dt>Format Name</dt>
  <dd>
    <t>The name of the Identifier Format, as described in <xref target="sub-ids"/>. The name MUST be an ASCII string consisting only of lower-case characters ("a" - "z"), digits ("0" - "9"), underscores ("_"), and hyphens ("-"), and SHOULD NOT exceed 20 characters in length.</t>
  </dd>
  <dt>Format Description</dt>
  <dd>
    <t>A brief description of the Identifier Format.</t>
  </dd>
  <dt>Change Controller</dt>
  <dd>
    <t>For formats defined in documents published by the IETF or its working groups, list "IETF".  For all other formats, list the name of the party responsible for the registration.  Contact information such as mailing address, email address, or phone number may also be provided.</t>
  </dd>
  <dt>Defining Document(s)</dt>
  <dd>
    <t>A reference to the document or documents that define the Identifier Format.  The definition MUST specify the name, format, and meaning of each member that may occur within a Subject Identifier of the defined format, as well as whether each member is optional, required, prohibited, or the circumstances under which the member may be optional, required, or prohibited. URIs that can be used to retrieve copies of each document SHOULD be included.</t>
  </dd>
</dl>

</section>
<section anchor="iana-formats-init"><name>Initial Registry Contents</name>

<section anchor="account-identifier-format"><name>Account Identifier Format</name>

<t><list style="symbols">
  <t>Format Name: "account"</t>
  <t>Format Description: Subject identifier based on <spanx style="verb">acct</spanx> URI.</t>
  <t>Change Controller: IETF</t>
  <t>Defining Document(s): <xref target="sub-ids"/> of this document.</t>
</list></t>

</section>
<section anchor="email-identifier-format"><name>Email Identifier Format</name>

<t><list style="symbols">
  <t>Format Name: <spanx style="verb">email</spanx></t>
  <t>Format Description: Subject identifier based on email address.</t>
  <t>Change Controller: IETF</t>
  <t>Defining Document(s): <xref target="sub-ids"/> of this document.</t>
</list></t>

</section>
<section anchor="issuer-and-subject-identifier-format"><name>Issuer and Subject Identifier Format</name>

<t><list style="symbols">
  <t>Format Name: "iss_sub"</t>
  <t>Format Description: Subject identifier based on an issuer and subject.</t>
  <t>Change Controller: IETF</t>
  <t>Defining Document(s): <xref target="sub-ids"/> of this document.</t>
</list></t>

</section>
<section anchor="opaque-identifier-format"><name>Opaque Identifier Format</name>

<t><list style="symbols">
  <t>Format Name: "opaque"</t>
  <t>Format Description: Subject identifier based on an opaque string.</t>
  <t>Change Controller: IETF</t>
  <t>Defining Document(s): <xref target="sub-ids"/> of this document.</t>
</list></t>

</section>
<section anchor="phone-number-identifier-format"><name>Phone Number Identifier Format</name>

<t><list style="symbols">
  <t>Format Name: "phone_number"</t>
  <t>Format Description: Subject identifier based on an phone number.</t>
  <t>Change Controller: IETF</t>
  <t>Defining Document(s): <xref target="sub-ids"/> of this document.</t>
</list></t>

</section>
<section anchor="decentralized-identifier-format"><name>Decentralized Identifier Format</name>

<t><list style="symbols">
  <t>Format Name: "did"</t>
  <t>Format Description: Subject identifier based on a decentralized identifier (DID).</t>
  <t>Change Controller: IETF</t>
  <t>Defining Document(s): <xref target="sub-ids"/> of this document.</t>
</list></t>

</section>
<section anchor="uniform-resource-identifier-format"><name>Uniform Resource Identifier Format</name>

<t><list style="symbols">
  <t>Format Name: "uri"</t>
  <t>Format Description: Subject identifier based on a uniform resource identifier (URI).</t>
  <t>Change Controller: IETF</t>
  <t>Defining Document(s): <xref target="sub-ids"/> of this document.</t>
</list></t>

</section>
<section anchor="aliases-identifier-format"><name>Aliases Identifier Format</name>

<t><list style="symbols">
  <t>Format Name: "aliases"</t>
  <t>Format Description: Subject identifier that groups together multiple different subject identifiers for the same subject.</t>
  <t>Change Controller: IETF</t>
  <t>Defining Document(s): <xref target="sub-ids"/> of this document.</t>
</list></t>

</section>
</section>
<section anchor="iana-formats-expert"><name>Guidance for Expert Reviewers</name>
<t>The Expert Reviewer is expected to review the documentation referenced in a registration request to verify its completeness. The Expert Reviewer must base their decision to accept or reject the request on a fair and impartial assessment of the request. If the Expert Reviewer has a conflict of interest, such as being an author of a defining document referenced by the request, they must recuse themselves from the approval process for that request. In the case where a request is rejected, the Expert Reviewer must provide the requesting party with a written statement expressing the reason for rejection, and be prepared to cite any sources of information that went into that decision.</t>

<t>Identifier Formats need not be generally applicable and may be highly specific to a particular domain; it is expected that formats may be registered for niche or industry-specific use cases. The Expert Reviewer should focus on whether the format is thoroughly documented, and whether its registration will promote or harm interoperability.  In most cases, the Expert Reviewer should not approve a request if the registration would contribute to confusion, or amount to a synonym for an existing format.</t>

</section>
</section>
<section anchor="json-web-token-claims-registration"><name>JSON Web Token Claims Registration</name>
<t>This document defines the <spanx style="verb">sub_id</spanx> JWT Claim, which IANA is asked to register in the "JSON Web Token Claims" registry <xref target="IANA.JWT.Claims">IANA JSON Web Token Claims Registry</xref> established by <xref target="RFC7519"/>.</t>

<section anchor="registry-contents"><name>Registry Contents</name>

<t><list style="symbols">
  <t>Claim Name: "sub_id"</t>
  <t>Claim Description: Subject Identifier</t>
  <t>Change Controller: IESG</t>
  <t>Specification Document(s): <xref target="jwt-claims-sub_id"/> of this document.</t>
</list></t>

</section>
</section>
</section>


  </middle>

  <back>


    <references title='Normative References'>





<reference anchor='BCP26' target='https://www.rfc-editor.org/info/rfc8126'>
<front>
<title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
<author fullname='M. Cotton' initials='M.' surname='Cotton'><organization/></author>
<author fullname='B. Leiba' initials='B.' surname='Leiba'><organization/></author>
<author fullname='T. Narten' initials='T.' surname='Narten'><organization/></author>
<date month='June' year='2017'/>
<abstract><t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters.  To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper.  For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t><t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed.  This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t><t>This is the third edition of this document; it obsoletes RFC 5226.</t></abstract>
</front>
<seriesInfo name='BCP' value='26'/>
<seriesInfo name='RFC' value='8126'/>
<seriesInfo name='DOI' value='10.17487/RFC8126'/>
</reference>


<reference anchor="E164" target="http://www.itu.int/rec/T-REC-E.164-201011-I/en">
  <front>
    <title>The international public telecommunication numbering plan</title>
    <author >
      <organization>International Telecommunication Union</organization>
    </author>
    <date year="2010"/>
  </front>
</reference>
<reference anchor="IANA.JWT.Claims" target="http://www.iana.org/assignments/jwt">
  <front>
    <title>JSON Web Token Claims</title>
    <author >
      <organization>IANA</organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="DID" target="https://www.w3.org/TR/did-core/">
  <front>
    <title>Decentralized Identifiers (DIDs) v1.0</title>
    <author >
      <organization>World Wide Web Consortium (W3C)</organization>
    </author>
    <date year="2021"/>
  </front>
</reference>




<reference anchor='RFC8417' target='https://www.rfc-editor.org/info/rfc8417'>
<front>
<title>Security Event Token (SET)</title>
<author fullname='P. Hunt' initials='P.' role='editor' surname='Hunt'><organization/></author>
<author fullname='M. Jones' initials='M.' surname='Jones'><organization/></author>
<author fullname='W. Denniss' initials='W.' surname='Denniss'><organization/></author>
<author fullname='M. Ansari' initials='M.' surname='Ansari'><organization/></author>
<date month='July' year='2018'/>
<abstract><t>This specification defines the Security Event Token (SET) data structure.  A SET describes statements of fact from the perspective of an issuer about a subject.  These statements of fact represent an event that occurred directly to or about a security subject, for example, a statement about the issuance or revocation of a token on behalf of a subject.  This specification is intended to enable representing security- and identity-related events.  A SET is a JSON Web Token (JWT), which can be optionally signed and/or encrypted. SETs can be distributed via protocols such as HTTP.</t></abstract>
</front>
<seriesInfo name='RFC' value='8417'/>
<seriesInfo name='DOI' value='10.17487/RFC8417'/>
</reference>



<reference anchor='RFC7519' target='https://www.rfc-editor.org/info/rfc7519'>
<front>
<title>JSON Web Token (JWT)</title>
<author fullname='M. Jones' initials='M.' surname='Jones'><organization/></author>
<author fullname='J. Bradley' initials='J.' surname='Bradley'><organization/></author>
<author fullname='N. Sakimura' initials='N.' surname='Sakimura'><organization/></author>
<date month='May' year='2015'/>
<abstract><t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties.  The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t></abstract>
</front>
<seriesInfo name='RFC' value='7519'/>
<seriesInfo name='DOI' value='10.17487/RFC7519'/>
</reference>



<reference anchor='RFC8259' target='https://www.rfc-editor.org/info/rfc8259'>
<front>
<title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
<author fullname='T. Bray' initials='T.' role='editor' surname='Bray'><organization/></author>
<date month='December' year='2017'/>
<abstract><t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format.  It was derived from the ECMAScript Programming Language Standard.  JSON defines a small set of formatting rules for the portable representation of structured data.</t><t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t></abstract>
</front>
<seriesInfo name='STD' value='90'/>
<seriesInfo name='RFC' value='8259'/>
<seriesInfo name='DOI' value='10.17487/RFC8259'/>
</reference>



<reference anchor='RFC2119' target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author fullname='S. Bradner' initials='S.' surname='Bradner'><organization/></author>
<date month='March' year='1997'/>
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference anchor='RFC7565' target='https://www.rfc-editor.org/info/rfc7565'>
<front>
<title>The 'acct' URI Scheme</title>
<author fullname='P. Saint-Andre' initials='P.' surname='Saint-Andre'><organization/></author>
<date month='May' year='2015'/>
<abstract><t>This document defines the 'acct' Uniform Resource Identifier (URI) scheme as a way to identify a user's account at a service provider, irrespective of the particular protocols that can be used to interact with the account.</t></abstract>
</front>
<seriesInfo name='RFC' value='7565'/>
<seriesInfo name='DOI' value='10.17487/RFC7565'/>
</reference>



<reference anchor='RFC5322' target='https://www.rfc-editor.org/info/rfc5322'>
<front>
<title>Internet Message Format</title>
<author fullname='P. Resnick' initials='P.' role='editor' surname='Resnick'><organization/></author>
<date month='October' year='2008'/>
<abstract><t>This document specifies the Internet Message Format (IMF), a syntax for text messages that are sent between computer users, within the framework of &quot;electronic mail&quot; messages.  This specification is a revision of Request For Comments (RFC) 2822, which itself superseded Request For Comments (RFC) 822, &quot;Standard for the Format of ARPA Internet Text Messages&quot;, updating it to reflect current practice and incorporating incremental changes that were specified in other RFCs.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5322'/>
<seriesInfo name='DOI' value='10.17487/RFC5322'/>
</reference>



<reference anchor='RFC5321' target='https://www.rfc-editor.org/info/rfc5321'>
<front>
<title>Simple Mail Transfer Protocol</title>
<author fullname='J. Klensin' initials='J.' surname='Klensin'><organization/></author>
<date month='October' year='2008'/>
<abstract><t>This document is a specification of the basic protocol for Internet electronic mail transport.  It consolidates, updates, and clarifies several previous documents, making all or parts of most of them obsolete.  It covers the SMTP extension mechanisms and best practices for the contemporary Internet, but does not provide details about particular extensions.  Although SMTP was designed as a mail transport and delivery protocol, this specification also contains information that is important to its use as a &quot;mail submission&quot; protocol for &quot;split-UA&quot; (User Agent) mail reading systems and mobile environments.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5321'/>
<seriesInfo name='DOI' value='10.17487/RFC5321'/>
</reference>



<reference anchor='RFC3986' target='https://www.rfc-editor.org/info/rfc3986'>
<front>
<title>Uniform Resource Identifier (URI): Generic Syntax</title>
<author fullname='T. Berners-Lee' initials='T.' surname='Berners-Lee'><organization/></author>
<author fullname='R. Fielding' initials='R.' surname='Fielding'><organization/></author>
<author fullname='L. Masinter' initials='L.' surname='Masinter'><organization/></author>
<date month='January' year='2005'/>
<abstract><t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource.  This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet.  The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier.  This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='STD' value='66'/>
<seriesInfo name='RFC' value='3986'/>
<seriesInfo name='DOI' value='10.17487/RFC3986'/>
</reference>




    </references>

    <references title='Informative References'>

<reference anchor="OpenID.Core" target="http://openid.net/specs/openid-connect-core-1_0.html">
  <front>
    <title>OpenID Connect Core 1.0</title>
    <author initials="N." surname="Sakimura" fullname="Nat Sakimura">
      <organization>Nomura Research Institute, Ltd.</organization>
    </author>
    <author initials="J." surname="Bradley" fullname="John Bradley">
      <organization>Ping Identity</organization>
    </author>
    <author initials="M." surname="Jones" fullname="Michael B. Jones">
      <organization>Microsoft</organization>
    </author>
    <author initials="B." surname="de Medeiros" fullname="Breno de Medeiros">
      <organization>Google</organization>
    </author>
    <author initials="C." surname="Mortimore" fullname="Chuck Mortimore">
      <organization>Salesforce</organization>
    </author>
    <date year="2014" month="November"/>
  </front>
</reference>




<reference anchor='RFC1034' target='https://www.rfc-editor.org/info/rfc1034'>
<front>
<title>Domain names - concepts and facilities</title>
<author fullname='P. Mockapetris' initials='P.' surname='Mockapetris'><organization/></author>
<date month='November' year='1987'/>
<abstract><t>This RFC is the revised basic definition of The Domain Name System.  It obsoletes RFC-882.  This memo describes the domain style names and their used for host address look up and electronic mail forwarding.  It discusses the clients and servers in the domain name system and the protocol used between them.</t></abstract>
</front>
<seriesInfo name='STD' value='13'/>
<seriesInfo name='RFC' value='1034'/>
<seriesInfo name='DOI' value='10.17487/RFC1034'/>
</reference>



<reference anchor='RFC7515' target='https://www.rfc-editor.org/info/rfc7515'>
<front>
<title>JSON Web Signature (JWS)</title>
<author fullname='M. Jones' initials='M.' surname='Jones'><organization/></author>
<author fullname='J. Bradley' initials='J.' surname='Bradley'><organization/></author>
<author fullname='N. Sakimura' initials='N.' surname='Sakimura'><organization/></author>
<date month='May' year='2015'/>
<abstract><t>JSON Web Signature (JWS) represents content secured with digital signatures or Message Authentication Codes (MACs) using JSON-based data structures.  Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and an IANA registry defined by that specification.  Related encryption capabilities are described in the separate JSON Web Encryption (JWE) specification.</t></abstract>
</front>
<seriesInfo name='RFC' value='7515'/>
<seriesInfo name='DOI' value='10.17487/RFC7515'/>
</reference>



<reference anchor='RFC8446' target='https://www.rfc-editor.org/info/rfc8446'>
<front>
<title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
<author fullname='E. Rescorla' initials='E.' surname='Rescorla'><organization/></author>
<date month='August' year='2018'/>
<abstract><t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol.  TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t><t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961.  This document also specifies new requirements for TLS 1.2 implementations.</t></abstract>
</front>
<seriesInfo name='RFC' value='8446'/>
<seriesInfo name='DOI' value='10.17487/RFC8446'/>
</reference>




    </references>


<section numbered="no" anchor="acknowledgements"><name>Acknowledgements</name>
<t>The authors would like to thank the members of the IETF Security Events working group, as well as those of the OpenID Shared Signals and Events Working Group, whose work provided the original basis for this document.
We would also like to acknowledge Aaron Parecki, Denis Pinkas, Justin Richer, Mike Jones and other members of the working group for reviewing this document.</t>

</section>
<section numbered="no" anchor="change-log"><name>Change Log</name>
<t>(This section to be removed by the RFC Editor before publication as an RFC.)</t>

<t>Draft 00 - AB - First draft</t>

<t>Draft 01 - AB:</t>

<t><list style="symbols">
  <t>Added reference to RFC 5322 for format of <spanx style="verb">email</spanx> claim.</t>
  <t>Renamed <spanx style="verb">iss_sub</spanx> type to <spanx style="verb">iss-sub</spanx>.</t>
  <t>Renamed <spanx style="verb">id_token_claims</spanx> type to <spanx style="verb">id-token-claims</spanx>.</t>
  <t>Added text specifying the nature of the subjects described by each type.</t>
</list></t>

<t>Draft 02 - AB:</t>

<t><list style="symbols">
  <t>Corrected format of phone numbers in examples.</t>
  <t>Updated author info.</t>
</list></t>

<t>Draft 03 - AB:</t>

<t><list style="symbols">
  <t>Added <spanx style="verb">account</spanx> type for <spanx style="verb">acct</spanx> URIs.</t>
  <t>Replaced <spanx style="verb">id-token-claims</spanx> type with <spanx style="verb">aliases</spanx> type.</t>
  <t>Added email canonicalization guidance.</t>
  <t>Updated semantics for <spanx style="verb">email</spanx>, <spanx style="verb">phone</spanx>, and <spanx style="verb">iss-sub</spanx> types.</t>
</list></t>

<t>Draft 04 - AB:</t>

<t><list style="symbols">
  <t>Added <spanx style="verb">sub_id</spanx> JWT Claim definition, guidance, examples.</t>
  <t>Added text prohibiting <spanx style="verb">aliases</spanx> nesting.</t>
  <t>Added privacy considerations for identifier correlation.</t>
</list></t>

<t>Draft 05 - AB:</t>

<t><list style="symbols">
  <t>Renamed the <spanx style="verb">phone</spanx> type to <spanx style="verb">phone-number</spanx> and its <spanx style="verb">phone</spanx> claim to <spanx style="verb">phone_number</spanx>.</t>
</list></t>

<t>Draft 06 - AB:</t>

<t><list style="symbols">
  <t>Replaced usage of the word "claim" to describe members of a Subject Identifier with the word "member", in accordance with terminology in RFC8259.</t>
  <t>Renamed the <spanx style="verb">phone-number</spanx> type to <spanx style="verb">phone_number</spanx> and <spanx style="verb">iss-sub</spanx> to <spanx style="verb">iss_sub</spanx>.</t>
  <t>Added normative requirements limiting the use of both <spanx style="verb">sub</spanx> and <spanx style="verb">sub_id</spanx> claims together when processing a JWT.</t>
  <t>Clarified that identifier correlation may be acceptable when it is a core part of the use case.</t>
  <t>Replaced references to OIDF with IETF in IANA Considerations.</t>
  <t>Recommended the appointment of multiple Designated Experts, and a location for the Subject Identifier Types registry.</t>
  <t>Added "_" to list of allowed characters in the Type Name for Subject Identifier Types.</t>
  <t>Clarified that Subject Identifiers don't provide confidentiality or integrity protection.</t>
  <t>Added references to SET, JWT privacy and security considerations.</t>
  <t>Added section describing the difference between subject identifier type and principal type that hopefully clarifies things and doesn't just muddy the water further.</t>
</list></t>

<t>Draft 07 - AB:</t>

<t><list style="symbols">
  <t>Emphasized that the spec is about identifiers, not the things they identify:
  <list style="symbols">
      <t>Renamed "Subject Identifier Type" to "Identifier Format".</t>
      <t>Renamed <spanx style="verb">subject_type</spanx> to <spanx style="verb">format</spanx>.</t>
      <t>Renamed "Security Event Subject Identifier Type Registry" to "Security Event Identifier Format Registry".</t>
      <t>Added new section with guidance for specs defining Identifier Formats, with normative prohibition on formats that describe the subject itself, rather than the identifier.</t>
    </list></t>
  <t>Clarified the meaning of "subject":
  <list style="symbols">
      <t>Defined "subject" as applying generically and "JWT Subject" as applying specifically to the subject of a JWT.</t>
      <t>Replaced most instances of the word "principal" with "subject".</t>
    </list></t>
  <t>Added <spanx style="verb">opaque</spanx> Identifier Format</t>
</list></t>

<t>Draft 08 - JR, AB:</t>

<t><list style="symbols">
  <t>Added <spanx style="verb">did</spanx> Identifier Format</t>
  <t>Alphabetized identifier format definitions</t>
  <t>Replaced "type" with "format" in places that had been missed in the -07 change. (mostly IANA Considerations)</t>
  <t>Miscellaneous editorial fixes</t>
</list></t>

<t>Draft 09 - AB:</t>

<t><list style="symbols">
  <t>Miscellaneous editorial fixes</t>
</list></t>

<t>Draft 10 - PJ:</t>

<t><list style="symbols">
  <t>Added author</t>
  <t>Editorial nits</t>
</list></t>

<t>Draft 11 - PJ:</t>

<t><list style="symbols">
  <t>Miscellaneous editorial fixes</t>
  <t>Moved aliases to the last in identifier format definitions</t>
  <t>Acknowledged individual reviewers</t>
</list></t>

<t>Draft 12 - PJ:</t>

<t><list style="symbols">
  <t>Restore the DID format that was removed in -11</t>
  <t>Added a generic "URI" format</t>
  <t>Normative advice on choosing the format</t>
</list></t>

<t>Draft 13 - PJ:</t>

<t><list style="symbols">
  <t>Editorial nits found during AD review</t>
</list></t>

<t>Draft 14 - PJ:</t>

<t><list style="symbols">
  <t>Fix IANA issues found during AD review</t>
</list></t>

</section>


  </back>

<!-- ##markdown-source:
H4sIAO7qWmMAA819WXPbSJLwO38Fln4Ye5ekRVlyuzUxsaOW3bNy+PpkORwb
PRNWESiKaIMABwVIZjs0v/3Lqw5clORuT6weuk2gzqy8KzMxnU5HVVpl+ih6
Xy9+1XEVnSY6r9JlqksTLYsyeq/jukyrbfTiCl5E58VnnZuRWixKfXUUGR1r
fD413H2a+u6jpIhztYaxk1It4ZWultNdHabzg1GiKuiwv7e/P53vTfd/GMXw
4LIotzBXlYzSTXkUVWVtqv29vR/39kcjVWp15FY5ui7Kz5dlUW+OWis30Ud4
leaX0d/w9eiz3kLb5Cg6zStd5rqaPsdVjkamUnnySWVFDgvZajPapEfRL1UR
TyJTlFWplwb+tV3jP/4B89fVqiiPRtF0FMFfmpuj6HgW/aTiz2uV0zMGwnGe
q4XOMt14V5SXKk9/U1Va5NBmrX4r+IVeqzQ7iso0Xino+VdFr2ZxsabXZYGH
ppO0KspRY/LXs+g9bLzSJq6D6V+rMq1N61Vz9pMizRfK6HD+NXWbGdvtr7E0
opU0Jn43i16qNNzyu1LFq9Q/bU73szJVtg0n21D72a/Qfr7/7NlfL/ExT5QX
5Rr6XWmAdPTTybv9p0fR2c8nz+b7T+HBi/nTgyMaSbD5fKVhUXiwNJnKok29
yNI4qnSmYcB1nacxvYryer3QJSLGJpNDqVR5qaujaFVVm6PHj6+vr2dpVc9g
wMeljh+fT89enExfzGDS6f7efG8+n54+1tzVoUMkG7YIZtdx3lnAhzyVM7fI
P9+Dn6fHb45nLz+ez04yla5NY3sv3799E33UCybHiFsMLl3lagYreayMSS/z
NRLD41+vq8H1wsTw+/np88acz4Fy86pUWfqbThps4iE0NY+iq/lsr7MGI4u4
fkJLOD97nKTJNC5K/XhofqDTLIk+AmOgLZ4UOdJdWq+jhx+fnDxqQGp/Phql
+TJEjrcbnZ8+n53AFI3183McLkc+h++jvhXDggtomiYzYAqPzUbHRh7Asqkv
LX86/7Q3W1XrLFjPm+JKIzLhER50tzeVXTK5vAE6VZ/TdV0q+5yp5o2qOm8I
MG8KfBSdaaNVGa8AsQzsra70JHpVJbNR3ywvgRWVKsn0tjnJy2KVt9/QJO+Q
Evh0gZ32DQkM5iUwR9Mc8DUyKp1FP7Xe0qDwsixMgey1Z0DoAmf9Wic6hVbN
YX8qdV70vaZx/1YUl5nuHfRkFr1GtFnDWTWHPFnV8efuSxrwvcq0AXSKYdDp
dBqphQGUj2HdTppoliaehoEartNqleb9shJY6DYy9WYDE0YqugKGqqFJsYwC
0RdVhf2JjUk0mqjUGQ0PLytgaDTzLALmlpoIERP6Cg8hCkDKNNQyL+gpzCFj
NeZS0BtkaFzVJQzuyAc6VCvAvQT4fJkuNCxWek8iEIkEvYRnqoxtukxzTVOa
bV6pL9TQADuHyWJWIHQeFwki1cBSiJcVvGPY3CkAKTOFDA0tAAqXKax3S6PR
YxwNJ1JZViAA4CcujuczNZCGrHKCE1yD0MX/4yovYBGf0uSizUEfAqN9FMXI
R2cRH/06TRLELWDfZZEAtBBAXx+k+PNm9Jfgb3RsHNAQnogH1Ho+28czeP/i
PPr69T9QXB3Mf7i5mfSesGkhGKJNpT7rJs7gxmBbaR5nNUF1UVd43FGWrlMZ
SUWwG5nxh8P5jzc3IFmhR7pRGR5ldPouUklSaoMAij6cvZpEuooB+M/T5VKX
iLvVdgPw9AjE68k1zwDI4U6Rdpy4jtdqCxJBzy5nOPaqMBVA8nJVtfostrIQ
OLHXxyd+PderNMM91wb46HBP0hhsr0ew9J9BQVnpEil6QiDEZeGRx6CswKiw
OvqJG8N9Ec5ajDTR57y4zif4FNrhVmHSdZ1V6QZWQ3uCeWFtgFsqukxxfNtb
Wvsl4moQ8b+oNfQmiKs4Luq8p61sp9iof9bB83LS2SSCc7MC1ioay0TO+SI1
5oJRl4gCUVx+87FOADlBfhG2FAwT0EaA9pmq4UiNBQjwutwAHoHCQi9B29Gw
13JGHM2yOYJqAVrNlwo7WngMdWYkB3owq3QDqOugoDabsgDMBApo8D+PTAI2
00WxCfMWBnGUAp4Wa+3bF3m2jVbqSjdhiPzEmCJOHdfGzawF6Qo8/bBvCG7g
TeeIHEvUG2APMZwP7AH0ARhXAXfCHQCQUSBYQCkifQTXWqMan5p1iEYB+i00
nk6AQqPReWFXDSNAE4DVItPrCf9qsn/LLPuMuCnzOmFA+4fIDoTd0ikq5qeh
GLAnQXzWLXNKp+qHRiQnUTAV0WB0RZhU1iBELUfEMVbFNYKHJIEODhLMscT0
SKlte0GWn3RIokBUAwCaWpDOjrRRafkIub7qAQpA9yedwaJSfJ8X+dSZFw6l
CLG7XVnuuYMyAXzgZFurqw1uBM//Bb3owA4W8q9//Wv0FXSQMe92fBSNaZTx
BB/yP+EZssO/ytrQIhqPbrjrUfRgmV7KGxJOrPD+ZfyCn/WZ9revbHwDKk8P
NqmSDas8cZIA6F/nGgyD6aYuN4UJsR2JNDxUJ02EQkLhT+cHS0pxeepSs7RB
2QaTBOINaAoVhbudIHJIOrKaiL8PFsLRnGrArPQh01TCr9sU96jBsLA7TiSD
h6cKqInHxxg6Cw+QzpfnhBZfSQ0NkIB4zyfmPdQ2aj2DNv813997enh4CAbj
3hia3AwjxX4HK3DBjAa9ULHMMfq7LPLvY4YMYsYHOh9UbfpQBNW3gbMLcSGA
mCGtVm+b6EXU28UtkDI4tf6yQSoL+GaHbSALzqMauNMivayLGpUYsODKO2MP
su+AR4I+s92glADlFkz5psYWMrzKuh9ivbGauIKlG4Sb5Qt9sGtjlUFIlBMP
ExCq6SaFFqyTu0mK8h5YlxKKzQ/3ns2fHTw7OKSHqkY8xP91O7BK6tHUWvbW
mxf2eMyNH8tupyEc3AiI6iWM7n8PcEB55fggGDmxbjJCbnJjW4+r4v7DLorF
7kEDQN9/dIBI7+gj+18k3CHKfdLl54CVRJ4oDwn1NmqbFSoJcdUprz1ohiT8
pqisS+qkyHEU1NDAwIExrpr2TWDpoF/tM9Apuk5NNH794f35eML/j968pX+f
vfh/H07PXjzHf7//n+NXr9w/uMUIfrz98Ere4798z5O3r1+/ePOcO78+/t8x
Y/n47bvz07dvjl+NLTdG33K9JhWx1NYiwSMCnlAx62hYZKz97M/RGAJCeU5W
pN0xcPr8Bm2+8G/UY2XXVSo2NhgaaV5kxeU2CuREQ8fChYdWH0z70erP7ZEn
rH3DqABUObAxb93YX6B6AlsmdojcJyONU+VbHPKyo0BGV6mKUHsFAYw2UQRM
I2aLLuCQzHZp4mgc8GOZLVilzBdaTU6+PkxnejZpvCORa8UiqNy6RG2T3JSR
WhR19WjWr198fQBDTNPE9KLg6LhXgCMXH1JyQdtGsUH2ijWrAVlAHWgIpECP
E9WEDAoxcwBOx3lXSRL5Qcpv4lCKAQPKcAvYDJRb559YPUj06IYPhbXPYMwB
DffPOMD2Vv9MvwTH3fbBmagcIIKzs5/BokcXNLwL2wOZEjS/4HVfgCQkNykf
zZXK0PQVzxUAk61RVfXqy2CIgrHVPQqaiqw2BRI/RWuaxmLvkS6tJqfJvw1U
1vTVdc2asXc8aVOpRZaaFdvrX7+iS30qPib056AZAmw0gzZwKNMzbVK8Rqqi
N7gEYkYtJsF+GfR3de0p2jvyNVBx4Aicok04syiB0QMxot8gdAxtVFmhPSIs
ddG38/tsGkDdi/LAlb2HkDgLHyYtO6dlQ/c0rrJtyzgewPTGgIArifDlGjUf
sZWrFat+PBHOUep/1ilsDWC/YTFGpwBG8gpUsIqcMMja2iiXos8N2NEVuzIR
ph1h0eXPf+47Jiv0oDNwNnKnbIVmAYiqTKwm2FqDQ2JLBc5ZMEBy0DdeBRxB
liY7YK7CQy22fd6Bgl50R/+T6aGwXbSPm3XUnG/dgXio41yo9Xt4wsxp1TNR
H4PIMjekPd/B/gDFnjMBuBpQ899Zd2d0jn7Mtmy/7a9vZGGlTVfGkOGxJIYg
aA4g/ZBn6WfdXtZEmHQhIHO8mn2UpXXTtb2VldHZEkZ9QU6Rj+S7IjwjhfOi
h2gFQ42Xy8x0ZWTb0dNIn/PRzU+42uQkLJdM17Fph+5Bqbios4QcCDAZ4AJ5
fEEkED6URSarba2DvGnwZFF8EUiIF0gUIZ0Z7bc56JNcgBnHLIbu+60ro+Mc
bC8AwI4XkoCdsI+sj6oQd9cFyiGyOhFGqixgKsKdnV4/pglBMWDohmDT8J/Y
e5sJOf4FdXZNCCPBuovsSrdcV6WIcIekDZ81nIFJkQGrKAE6jMHu2aL1DBYd
qd3H705FTmVgSINuB/9vG7B4oOzVoYgMPE/4/+WKgS8ub5HVjUsh6NFy28Ly
3uO9DoADZ2bUQd49YEQnqWFooDd2oatrje5rkiWM84gk14W/5gjnT8nfDKPD
rP9TXIOJVTLe4dTXNDUpGjiPZlOAbhjQfdy+V5CLDAAtwYDUctIsydnM3owJ
31kpumMAYJTieE0UqB3K6Ik3bciHTz0BPUC3qGi9LN2RZYKmQuQAzEiXpRVA
xE/Q3na7IBJT5KrqMrsoMI/uwjpHZBYuC8QEf3vc4J4ssr+7JoZGBbBY3TwF
PyA3xN1f6a1xinDIuyd4LZGJ6HTqVLwqCsPDrvFKyym+m8KYdJFpOzRL5BCf
cbN0MGRvtS+GGnhuLxV4fTpx/rkLbFUVRxfRh7NTZx9cANguuttj1mAcHJx+
TXdcltN1GDw2DbYemRVh+obtTuhVm6aY6cI1zeF8FV5ePHjwIDqWO68uflkj
b6riuLoh7Blu3OtrF8D4izXkRBHqdSnsGvSRq5T9Zl4eWY/JBU4qgOxVzJ8e
kmLex1mscrgMbI7AvKHzGLZtgpktmnjue+4O1Eth60rxqhJqYHjrVIOqhJi0
3lRb6bwDgh257MX/hQDwwrnBO8rqra7SHtlu9ze4qKPemw9ZDDsdARjyrDqy
3jO6BpFjnt16HQLQTROLIXe4Fbl11eg4Q9QeuDTxiE0kwpg91HY3XreVjntj
Y97W6loIqchMg8kCnyEFmTQYUlP1nMhU4mEjYoKGU+SGFy1qsjEQT2YHszmO
w+R1+GR/H8nrvFftvCvCn9+iwQrXDkxOqzICH2M1gPcp3phEZ6gVogaWMk8p
E4X8k5iGW/ncrnzwTNuU5lwassBvJCehzYFp+2np228RiWwYPnehmt2LE5Kx
NHOiYNPoT5QwUCAZmmka44ub0Wu0K3luy8XxshBOvyo1GrrWrd2914/QZASs
oCApbxUlxRoJAsOvrHMOef1/O2RsoXxqWPk1FWv4NC8jPIaSTEHIaXhNR7aB
bfJQ870nBxTZg7qdXzkvGpeBkUoZeWkszjan7RtegpfYLHAaefcUJ9H4Q/cZ
uY8/vH9x1nhuI6EMYmWLy5DLewUNMp2I9g70cpXqa1GZmWW0gD2JkjK9Iuuk
JX/ZHMCpyWbgaA9doUOIZ47b2KCyywJ0wdXasJVt6lL3WGFw3jpnVXJh7Qxn
5RR+f258WTniBRgCbAUKp2W87OL1RJRquW+zPEW0oLT0G6Ol/8ns2E3TCmsf
fbhiYcrk6mPCgpnMFpBxLWrVqQ926CHGtiBKjcFQexZFd+q6Sy5RWAWpDRR0
5MONxG2DSKey4hKvWmFXaH+6G3+62vXM0UcgtMeSawLY/S/NmN1/PHwQBPc+
iuANh1iyBhR4CEl0sEFCU9igRSstaEaRFe1NOCFG9oX31U7wBNEfC5SZodL1
UyE35J3hbDiBfwh7v49su9tBDQsbWNAnnP/3iZu7rKJf9sj8ctvMl9H2zrh7
Kf3YxUJgu/nB4f6Tg8MfnuwQTjAG/P8+0ukue7Ha3Vv2TOygKvZdMFENtrY+
0JCOevxkbJdYwqdfeRHc0fDtGZ6w3hZ45Q94zPExrIKlXf3VqWvWr6CiDx+A
WuA1cPcVcxfF6yrL4hKdJK1hMOwWtSD29llPxDcqohhVM6SF0r1dvyoqHiJ5
ObxPaz0F09zXeBo8xB1Exsv7nTQ2NHE/XfGUQlYUrjGHv334ewJ/B/B3CH87
CEdAene6GVqfpZV3FCL5hkKSdlEMhS4xwdzSZaf8wfSdMCrz2+z0MI7qvvbR
ErGnvYyOneTjs5tZSEkK2gGmGpUgZL407CkyOmiWIvqFkotA3mFi0yOxlnpX
fU+j6TbYD2N7Y/Z/oxnTiYO7JQpuEPX5vO6B+rthZQlgKC2KsqIedeggSZMb
9pcOdrwLHdwy64ezVx3nFrz4dr/WDjcCjEvzWaaMv+0cnbDmHss9HJwmXnDK
Q5Ymbmx7T0yvFqhNwZuZ9Zl9swvh1iMYJgc4R6CCSMgAV3RXKjAeUrunP4Lh
ewgCZrb+sUx+W/fY0Rw1p6c7iAAaE/ju4Qy7ZZWTxv1UM4omOKzxTS91374Z
zBd8DG8fb1S1+m+83wVOepr8Zb57l6BWwq8v/76NWlQVBS6fEp5FuGpCRbrX
wayxDXAVDKYU/vEhTyme5gzMw7qMG6L24Yez0y4LqctUWMid++7kJUOe8Cc/
PnvKDq+QDpyzf60+w3CgqoKCWq83fF2C91y1KkF11ZqDvCUWwhq5EocFqmm8
AuOZLqtKreKVWqRZyqEs2A4XFaSbwMQZcI/f55M3XebV44sfYFrf6ps/l80s
b2UpOIETrN/GUfxE/cIUXeqhb93aZOhBaVpkw8RV35+F4LLuRETXemHSijoM
MIz2DuoyP6phSUcH+tnhXP/4bPrsSXwwPfjh4MlUHSZqOj/c0/Hi8Mnewf5y
167K/LvtCsghKdbQ/o0l+uMsVejE2nU1xk3kdmyw/f2MzCw15H70KTi94X+n
3N3GnNs4qWv0nQ1msNKV+ALv2c1KlUF6FTk9t7wq8uSGsbpWre7zv1GAOy2l
zvnuMrjBR0IOp6dQGhoeDdfLHJh4RNmglHj7zYara3uLBavKUm1DWyGMve2P
sXwBXG+H+skj0pLcPYZ33OaYnu0N3+4y72MBn3JYn92587HjfS5eg/h7IJy7
i4SSnuX6DblUzSO+m/Zh325OoEVomtR8/6yNTXO+nW0KoVxg3q770XvaDRBo
A1bXnyMfutwLRb4t2DVsT2TcriQjN9LSRrH9DkNqkC0M3K5yc+s+cLuFd79Q
KoLPzRhIath1kxTkS/SM05POdIeEpl0j7lrZf/2zhs3i5nrWCP/9xw7XYlJR
Rvg9DMXBY0B23xvljplvH88x2v3X62rKDu+hnAsOfB+59DQq9tHoOeVX7RQG
khzshsYofO6X9l7SHswkVb2RNK4aCaLOIUKsz0WpS0ZsrHKMRNtJAw+ZfXum
yRH6lKaJXk0a2BK+S/Cwua3Wqc7p+3ZDvRe2fludTU3Y74nVG6ABp/q1Uzqr
Zjrfjiw5WCxdKGEmGmm1rdDKVJIeAsO2By598wdJFrIcy+xNI01RrGL2N2lx
10LriQtIk4hcfycRW0SQVdtNLNx9BjWz9yJ+Mr7DkV7BTCR6BwSVD/U2ki2C
94soHHF8SrXGH83sSYFpEUt+H3eko6VFDi5w0rqUC3h+qWkqHkC20wjga506
p3w0hyNoo7sO5ObOzhxshxvzeflLDG9eqPgzx1I5JzcdUrpETceNZ+hXQfZV
1QhTdZdZFjOWKbyylSs64WWt9WO4Q7B+VOosBCdDi2Rg1xsMa05zn4XiQc80
P5Bdy+qSF+McryoamhPlzXXebgWRRkIstOWebSLE0R+RiRsKmt0CsD//Fhh1
EFHRl4bb4LLtfFuu0lDw8zAJ9x47613wv2HbWJQFt967a67J4biO3R9utw0D
0+QsXebs+I1Xa74BRFn62++HkMbr/wXw3juDCa0xmIXkhvnuoPK2n0wY6vaB
mweDhv8NaBaG/N076O92oFLo8zBIfwc0MZI76dbLCfXqm0BtI2ll7+X7zJN7
JKmMBhSBhuk6PBVafGL4xhReLlv7k+kUk+k3zV1D67ZnJcRBoy2Ibg/liDOK
sVmzDc1ZDnJ7bU8rp2R4KRxgnJBCxbFV2o0XWm2jdz4OGLOgEo5jvoU+mlfq
Ycy0yOGiILFF1ChZd+heSNdppsps2wBnoHDtBmcYLXIbOOnkwjxSTrVpQUFA
WhVhqbL2nmFqDkwLtiwBa9I/hHMHsHcU1KpFcZ2SRSEyBV7fFoor6Y6citWV
1sBcP8LD7Y+Q/mEoy63jeDYobz4h77pVRqZmgO1LyPrf7SqALfWqWLh/7BAU
wgkR2z4O4NfH2fnE/y8BB4/yDwGORfvbAeSw554Q8q95W/83IAfd/jjgUeNQ
UHopyVDzOUZNFtPXUa5kEMonEtkqJhu6m9+HCaySCPicEyQ7XhZ0ozj7QZc7
/Sh3+uvJiEqCghHOpFxTdT4Kz7KXX5xoKatuZgEPXS9ZE6jPYeLKXnVXJA4X
Cl5nf45qlWsI7yRW9TrIskQ/LLZG+Qp2ZUWQY+u+qCs8C15xXHCtvB6Q9wfS
GWbL+stGBZYij4PHStHRPaPZIoZSgc3m2JVrviiA7qXcD7IjIczQkkKUWOGO
y9uBcOQFYEkymrqdEBgeBymI1zYVtc4VJnOJbdyzUp6N0y4lzJnhSKnZIHHe
lemVirdRC6m/Ptjwi8HSKiHWgVJki+YNqIWkAip2EIlHhuB9Xbhbh/B2RBKS
oUkWbL24ZBeR4JlNRN/t8KYrW1R+B1xFZNASV3gk+pzXPnhdYfkKrAXSPA+s
InCt/PVTV/ux1x8+mYNcCMF2Az8VlaG6Jj1OTo8Ut7A1F+FshmGHFQpsuULB
jFgOR2MAd2oDu1SFwQ6ojUmlD+tWcynIAzWfpPZLkKgs1yNU/DNWNgDe6Tfk
NGuM6i9swgsxe7qkO6e+yqUbLghuV1mpVbINwdQHU1uuVBBmoWMl8fDb6Foz
0K/SojawQiPaZ2siE8R3d5VWG9L9iLCMVh57WsAtYPQ/rAlALmPjAmKOTT31
UgAU5NpUPmmCaTQ1n4VFmR4BgyNZNAx3TiNZYg+LVgpJu1lkMDaoMVD+Gl1Z
5xz2ELborRb71PuquWIQV1JDZrdlUPRdJeCxkBFgaxBzdby7Tjrvcft/w6xo
ks2CIskd7mdrpQ1K5756S84DKrURuOZEWFuQMkSshMXSNHxuikNJSmIil6XE
lQx78Eth4hsSNVRHpVlkpNetXIelDo3FECfQA6/esnFP6hcFXSo8COQMcG64
YjJu2RJ9+fG9ZBfByRze3DBRhJUNqKZ0prbs5mdXMv+0l8hhQm+FppysgWc4
f2VneHZw8BRmgDOUQrpt7PHKTBvMtg6dgzNtRVKZl1SIIEC4wzAbUCpjRRFI
P8wF76ANpnf3V4Ia3Zo2Hp3ZrHEex6WJ37cciNQC69xIdafkqrQsk2hDeNdl
PnMFn5gSyUSipPaeLNfXPr2dVPXkLinx5MNJiQ+KG8+GpdwOFzcd4jjX7qWg
LyOVt26onDJXCPafDAgqra0VaYhczIHmbJDtma3dIhPx000BmIgpNfT1BimQ
ZlZ44RBk6uDdRMa81YpvWlt4gFPbiBL+OVjF1JeXdKXPrNxJxOcaN0BC68WX
DZUh48rDRUqDY70Rqt0jwr3U9n6LIleA10nKj2nGzTRUUOuD7pZ1C/1OmnVL
W8CJ1SCCEmXYYeHcEF5gSlA1KSN5Xw6bXxU8+ughs0whLD4aLgXieBDQWPSC
PhICL+milr+D4YuH5dhm9ojFFH+uwNAFzXqt88SrArvwaMHpjRTGXkUX4Xcf
ej8+YctGPr5o7o1XdW5RoEm2/tRHaO5emY2KwazdAwtSTCIstjXib3/4MmI9
K5/0lAcMcN/1d5e2eXT8/uT0NMgIwPRQjvLJiOUB+upySqXGQR5gZQ36MMZY
jaNpNP5tDKw7SS/Rh/YQVozPfsRn7FHEz0ngi0/4iCrAbDcr/HLAw/HUPgpC
ZvSXGIur7u+FU8EmMp1fVivk4LaKB+6QAjMBKseAeKleyr5dVdJeAMEYJyDV
LjUyZCzFk+kShkA13GbSBUEEli8axi1bm4NGfnH+M4lhrPgrn9/hWjATjkUb
Y4uxqPjICliGLS07pUZV60A5ngyz8fAgpPiG6Jkej7hST6XiZsE8mxKF1zXk
7rX1L7qVpRsZHnR1iprRwuW3Jq6SJIzzXKDw0DwiaFPZDE01OFhPdeID3QQO
ZO3PKHTPgnW5oLwgoSXzGR8HZVNJxGLRioPQlhHG1lrXqitAWMQgI3YWHhNQ
22NeesKxn1Ow8QXhBMCOfDk2rz35+mAEV1KO0hJAYMPLmrXebB6nNbz6hmzV
evtwdiqwFL3D1lcsNdAsMBsg2k3KTJwW7E7D18uzMRQ2z1bEq+O7J7aEZIsv
4bnYJPfByhGj0X9GAZsKLr78i4BgfbhR4Jh35qUvJDKD3h1SPSK6gzd9yHkU
MjsXpWLBMWsk69++Cylr8A17aKaef6dt3CXrs3sy1jf7DbvqLUb/vXY3lJvX
3ZHkDX7bhhppmN9rL7uTrbo7akQOftu+GnmE32lbt+SUdPeFCTHfsh1UF4OZ
gjaUEfa99rcrA2Voi3jF/01brGWy0k4W7hLTXb7XLgcDPHu4usTY3n2DJLVs
gTzrs3P2i7c4+jxTLnUl8Fl+HyBEf6tTjrDEOdmUglNHy4XLNjdEoqb3Uv+o
2TZi97y2dW3F+gk1JFbUnAIlQY0N40hq3VF5El2iIpTyN7kAZiCkpZpJd3Jy
5SFKiYfOGllUCzHG+u6ckCSuaFdUjxFwidUvyN2xpot/ldH1jzGs1y3DHrPo
lH+3l7CSANR8CXaY1IjGUiYmyNfnOyIsb0YGGTuv3KevnO4SgEgUblcDkFyy
tFuw5cRHuzY6Q0PW3dKRL/NKZTbW0teT9ZvofERJOZhQLd1f6SQnvVttOE6D
5VEGNCnxNu+nRM937i+jwq87cEdlpK4qT8mV+vKE1XG9oYwTdLKkFfsJmUW0
C57z7q41xa+SYs7VUQkJ+kvKhl+ykI9RgM0n9j8aH8EVwSq9XKHr21YHpAqb
hCpxnalSahH9WbzxngxWXDmQ5pOhgmqJuOscVGPNHs2kRnV06iaxDvABlJc6
fktAGgy8bRSq9GGZiGbozsm2Dr1sPVLbIfUmP8OSsm3geNdFpbm2RM+FHQcb
UdFEWmQ/psgiEcyMlA08s4QVzk3tqYxluqgruZjJl7UhzEBrcs1l36jI6TYv
8i27jPEe9IuY7zYJIxr1flGz4Ze4g9dwwE84FLk+4Ce0J++qdveuLSiK+QsN
sXMH2388fND6oOijbjHNoDB5y+dkbR8UeJxIIPJOIhzc415p56lqSDa9/xu8
aXoRWwKqm+7QK6rgFChkaTQ6jvEyK9MJV6w1HS8yepFY+9PJX8Z5Mb5p+MAY
w6huMzOK/HNgm7qwSXJxtD813PB1tD5CiOHQ0lcuv95zvtx7dFRmfLXe98ni
icRS4+D+soFiyMv0MsVbSJBsqeXiDbh8tHfc5MKwm1IeRNGxKgHo72Al8ed0
AueYwwDv0vyzApJ9WSO9RGfIhMpJ9Br701c+OYqfVZYmXBogEMaNxO48pcGh
CUq8Ki5HO4/nj3V40veeo729aBod/wT/+Zki6RP+CrS8nNPLI0T744S/vxO4
dXAyrCFH2/Nh+bYYIQflQ9czzd+I8EGZHJZa0BPE54tms+QTJSF9YoQPmydT
eiOkQN14YfQ1PvEKWanZWz88dH3iJ8vQG4Ljz9ym9/2mKRCBZJTfXuOreBHn
7lGoHy7mwyZhPzArLih6/cBP2tD01Ue5RDH08L4NwzDZZCpmoDS3LpEbqED4
cAXeiB1+oMjcpaiy4Xqb3yyVE5xI2RNJjnCHxdG+fl8HnX11uH3gwJu4BUwa
oAvO0bq2KP/CbS5n1cm3Hbh/XvqPrqV0kecu0P2SD/2SLdqRmOL9eoSj31Nb
dEZJ/SnbTPKnim55GJnmaTiNnGRtPx4mbCLBwDnMaeCUGvtpCc9Odn+fjEfg
5uPedLDwaz0pkT9+IWbWu3W31SYEPoUQCPCgCGut2WPxQbDir2RXL30GzZJm
zVJgdzpTK4ajnRE1Y6lbchhZu7p7GDdhI1jIwiGlNQgKQWOk1I3SlC6mIjw3
x/oocert6fOfGbwkAQGuPTe43F/ukgTOcvdmTaYdN3U2xjcr/FeOh0Ll6IMK
wcdL7FmMPxFa2cR3qlYPj5s3JzgmDsCfa6H4w4EZekDeFx6RFPmfvOWzMy7B
hgAgcXaEjJHvHU6IkVhy52/4iMYRdwDOY1gp2foqnfUnxL4sftexwMiP07jv
Bgs94IZXoN1jFawtYmlpUxa5Lih0waAN3P2vaPyt6yRhwXytUKVdcnCBZxA/
eAbxYr0B25jcV+7WEQUa4SjFiQWuj4lLapSpyeC1IY/4wXVP3eOB0yTMGHez
dmeN3hcCn08IASZ5loUXs9YszYv3gUmdTs2z33Zb75vzbMJh9LU7YKLBy9A7
Q9+s9+6CvjAFqVJj+ZSTN3gpmLe/8S0cOYzSs1/eALRjW1LlrYCxNqXo8FLK
fdWMD+q53DL5j51JkCdpMuEnz6imbeNDZWHLu3ytzB6aMDUyTDt1DlimOOQf
M7zc8jyV2SKAfa5BwfBn+AXes0lLQcD6UT2d4H0GVACk2XbjLjuByCFvHlO2
lixTosyRs9FrOciVSrg+xxpElv8IwxRoMCYFfBY9RHAA7HpY+SOY7nVqYrBj
VK6xwKsmNRudYMv0izZuwz96kr5Thzlq4O9eBtBh5RFZgusBe/Yd5r7D7hng
PRkHokJZnMgUHfqt4A1MyIQ+7gzsvFaZWDKYs2VXtO9XdAZaWiFR81gUSkZm
x5MyzmCB+afzud+zxfNojNVvpBu8fuOoVCVUXRnz1vFzFK4iYQPf5k/8Uprg
k1ishAPmjp/LNlzHA9/x5/SL9UsYji3q7fn/AebFIIQ/iAAA

-->

</rfc>

