<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.17 (Ruby 2.6.10) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-ietf-secevent-subject-identifiers-17" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="secevent-subject-identifiers">Subject Identifiers for Security Event Tokens</title>

    <author initials="A." surname="Backman" fullname="Annabelle Backman" role="editor">
      <organization>Amazon</organization>
      <address>
        <email>richanna@amazon.com</email>
      </address>
    </author>
    <author initials="M." surname="Scurtescu" fullname="Marius Scurtescu">
      <organization>Coinbase</organization>
      <address>
        <email>marius.scurtescu@coinbase.com</email>
      </address>
    </author>
    <author initials="P." surname="Jain" fullname="Prachi Jain">
      <organization>Fastly</organization>
      <address>
        <email>prachi.jain1288@gmail.com</email>
      </address>
    </author>

    <date year="2023" month="April" day="29"/>

    <area>Security</area>
    <workgroup>Security Events Working Group</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>Security events communicated within Security Event Tokens may support a variety of identifiers to identify subjects related to the event.  This specification formalizes the notion of subject identifiers as structured information that describe a subject, and named formats that define the syntax and semantics for encoding subject identifiers as JSON objects.  It also defines a registry for defining and allocating names for such formats, as well as the "sub_id" JSON Web Token (JWT) claim.</t>



    </abstract>



  </front>

  <middle>


<section anchor="intro"><name>Introduction</name>
<t>As described in Section 1.2 of SET <xref target="RFC8417"/>, subjects related to security events may take a variety of forms, including but not limited to a JWT <xref target="RFC7519"/> principal, an IP address, a URL, etc.  Different types of subjects may need to be identified in different ways (e.g., a user might be identified by an email address or a phone number or an account number).  Furthermore, even in the case where the type of the subject is known, there may be multiple ways by which a given subject may be identified.  For example, an account may be identified by an opaque identifier, an email address, a phone number, a JWT "iss" claim and "sub" claim, etc., depending on the nature and needs of the transmitter and receiver. Even within the context of a given transmitter and receiver relationship, it may be appropriate to identify different accounts in different ways, for example if some accounts only have email addresses associated with them while others only have phone numbers. Therefore it can be necessary to indicate within a SET the mechanism by which a subject is being identified.</t>

<t>To address this problem, this specification defines Subject Identifiers - JSON <xref target="RFC8259"/> objects containing information identifying a subject - and Identifier Formats - named sets of rules describing how to encode different kinds of subject identifying information (e.g., an email address, or an issuer and subject pair) as a Subject Identifier.</t>

<t>Below is a non-normative example of a Subject Identifier that identifies a subject by email address, using the Email Identifier Format.</t>

<figure title="Example: Subject Identifier using the Email Identifier Format" anchor="figexampleintro"><artwork><![CDATA[
{
  "format": "email",
  "email": "user@example.com"
}
]]></artwork></figure>

<t>Subject Identifiers are intended to be a general-purpose mechanism for identifying subjects within JSON objects and their usage need not be limited to SETs.  Below is a non-normative example of a JWT that uses a Subject Identifier in the "sub_id" claim (defined in this specification) to identify the JWT Subject.</t>

<figure title="Example: JWT using a Subject Identifier with the &quot;sub_id&quot; claim" anchor="figexampleintro2"><artwork><![CDATA[
{
  "iss": "issuer.example.com",
  "sub_id": {
    "format": "phone_number",
    "phone_number": "+12065550100"
  }
}
]]></artwork></figure>

<t>Usage of Subject Identifiers also need not be limited to identifying JWT Subjects.  They are intended as a general-purpose means of expressing identifying information in an unambiguous manner.  Below is a non-normative example of a SET containing a hypothetical security event describing the interception of a message, using Subject Identifiers to identify the sender, intended recipient, and interceptor.</t>

<figure title="Example: SET with an event payload containing multiple Subject Identifiers" anchor="figexampleintro3"><artwork><![CDATA[
{
  "iss": "issuer.example.com",
  "iat": 1508184845,
  "aud": "aud.example.com",
  "events": {
    "https://secevent.example.com/events/message-interception": {
      "from": {
        "format": "email",
        "email": "alice@example.com"
      },
      "to": {
        "format": "email",
        "email": "bob@example.com"
      },
      "interceptor": {
        "format": "email",
        "email": "eve@example.com"
      }
    }
  }
}

]]></artwork></figure>

</section>
<section anchor="conv"><name>Notational Conventions</name>
<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in BCP 14 <xref target="RFC2119"/><xref target="RFC8417"/>.</t>

<section anchor="defn"><name>Definitions</name>
<t>This specification utilizes terminology defined in <xref target="RFC8259"/> and <xref target="RFC8417"/>.</t>

<t>Within this specification, the terms "Subject" and "subject" refer generically to anything being identified via one or more pieces of information.  The term "JWT Subject" refers specifically to the subject of a JWT (i.e., the subject that the JWT asserts claims about).</t>

</section>
</section>
<section anchor="sub-ids"><name>Subject Identifiers</name>
<t>A Subject Identifier is a JSON <xref target="RFC8259"/> object whose contents may be used to identify a subject within some context.  An Identifier Format is a named definition of a set of information that may be used to identify a subject, and the rules for encoding that information as a Subject Identifier; they define the syntax and semantics of Subject Identifiers.  A Subject Identifier MUST conform to a specific Identifier Format, and MUST contain a "format" member whose value is the name of that Identifier Format.</t>

<t>Every Identifier Format MUST have a unique name registered in the IANA "Security Event Identifier Formats" registry established by <xref target="iana-formats"/>, or a Collision-Resistant Name as defined in <xref target="RFC7519"/>.  Identifier Formats that are expected to be used broadly by a variety of parties SHOULD be registered in the "Security Event Identifier Formats" registry.</t>

<t>An Identifier Format MAY describe more members than are strictly necessary to identify a subject, and MAY describe conditions under which those members are required, optional, or prohibited.  The "format" member is reserved for use as described in this specification; Identifier Formats MUST NOT declare any rules regarding the "format" member.</t>

<t>Every member within a Subject Identifier MUST match the rules specified for that member by this specification or by Subject Identifier's Identifier Format.  A Subject Identifier MUST NOT contain any members prohibited or not described by its Identifier Format, and MUST contain all members required by its Identifier Format.</t>

<section anchor="identifier-formats-versus-principal-types"><name>Identifier Formats versus Principal Types</name>
<t>Identifier Formats define how to encode identifying information for a subject.  Unlike Principal Types, they do not define the type or nature of the subject itself.  For example, while the "email" Identifier Format declares that the value of the "email" member is an email address, a subject in a Security Event that is identified by an "email" Subject Identifier could be an end user who controls that email address, the mailbox itself, or anything else that the transmitter and receiver both understand to be associated with that email address.  Consequently Subject Identifiers remove ambiguity around how a subject is being identified, and how to parse an identifying structure, but do not remove ambiguity around how to resolve that identifier to a subject.  For example, consider a directory management API that allows callers to identify users and groups through both opaque unique identifiers and email addresses.  Such an API could use Subject Identifiers to disambiguate between which of these two types of identifiers is in use.  However, the API would have to determine whether the subject is a user or group via some other means, such as by querying a database, interpreting other parameters in the request, or inferring the type from the API contract.</t>

</section>
<section anchor="identifier-format-definitions"><name>Identifier Format Definitions</name>

<t>The following Identifier Formats are registered in the IANA "Security Event Identifier Formats" registry established by <xref target="iana-formats"/>.</t>

<t>Since the subject identifier format conveys semantic information, applications SHOULD choose the most specific possible format for the identifier in question. For example, an email address can be conveyed using a <spanx style="verb">mailto:</spanx> URI and the <spanx style="verb">uri</spanx> identifier format, but since the value is known to be an email address, the application should prefer to use the "email" identifier format instead.</t>

<section anchor="sub-id-acct"><name>Account Identifier Format</name>
<t>The Account Identifier Format identifies a subject using an account at a service provider, identified with an "acct" URI as defined in <xref target="RFC7565"/>. An account is an arrangement or agreement through which a user gets access to a service and gets a unique identity with the service provider. Subject Identifiers in this format MUST contain a "uri" member whose value is the "acct" URI for the subject.  The "uri" member is REQUIRED and MUST NOT be null or empty.  The Account Identifier Format is identified by a value of "account" in the "format" member.</t>

<t>Below is a non-normative example Subject Identifier for the Account Identifier Format:</t>

<figure title="Example: Subject Identifier for the Account Identifier Format" anchor="figexamplesubidaccount"><artwork><![CDATA[
{
  "format": "account",
  "uri": "acct:example.user@service.example.com"
}
]]></artwork></figure>

</section>
<section anchor="sub-id-email"><name>Email Identifier Format</name>
<t>The Email Identifier Format identifies a subject using an email address.  Subject Identifiers in this format MUST contain an "email" member whose value is a string containing the email address of the subject, formatted as an "addr-spec" as defined in Section 3.4.1 of <xref target="RFC5322"/>. The "email" member is REQUIRED and MUST NOT be null or empty. The value of the "email" member MUST identify a mailbox to which email may be delivered, in accordance with <xref target="RFC5321"/>. The Email Identifier Format is identified by the name "email".</t>

<t>Below is a non-normative example Subject Identifier in the Email Identifier Format:</t>

<figure title="Example: Subject Identifier in the Email Identifier Format" anchor="figexamplesubidemail"><artwork><![CDATA[
{
  "format": "email",
  "email": "user@example.com"
}
]]></artwork></figure>

<section anchor="email-canon"><name>Email Canonicalization</name>
<t>Many email providers will treat multiple email addresses as equivalent. While the domain portion of an <xref target="RFC5322"/> email address is consistently treated as case-insensitive per <xref target="RFC1034"/>, some providers treat the local part of the email address as case-insensitive as well, and consider "user@example.com", "User@example.com", and "USER@example.com" as the same email address. This has led users to view these strings as equivalent, driving service providers to implement proprietary email canonicalization algorithms to ensure that email addresses entered by users resolve to the same canonical string. When receiving an Email Subject Identifier, the recipient SHOULD use their implementation's canonicalization algorithm to resolve the email address to the same string used in their system.</t>

</section>
</section>
<section anchor="sub-id-iss-sub"><name>Issuer and Subject Identifier Format</name>
<t>The Issuer and Subject Identifier Format identifies a subject using a pair of "iss" and "sub" members, analogous to how subjects are identified using the "iss" and "sub" claims in <xref target="OpenID.Core">OpenID Connect</xref> ID Tokens.  These members MUST follow the formats of the "iss" member and "sub" member defined by <xref target="RFC7519"/>, respectively.  Both the "iss" member and the "sub" member are REQUIRED and MUST NOT be null or empty. The Issuer and Subject Identifier Format is identified by the name "iss_sub".</t>

<t>Below is a non-normative example Subject Identifier in the Issuer and Subject Identifier Format:</t>

<figure title="Example: Subject Identifier in the Issuer and Subject Identifier Format" anchor="figexamplesubidisssub"><artwork><![CDATA[
{
  "format": "iss_sub",
  "iss": "https://issuer.example.com/",
  "sub": "145234573"
}
]]></artwork></figure>

</section>
<section anchor="sub-id-opaque"><name>Opaque Identifier Format</name>
<t>The Opaque Identifier Format describes a subject that is identified with a string with no semantics asserted beyond its usage as an identifier for the subject, such as a UUID or hash used as a surrogate identifier for a record in a database.  Subject Identifiers in this format MUST contain an "id" member whose value is a JSON string containing the opaque string identifier for the subject.  The "id" member is REQUIRED and MUST NOT be null or empty.  The Opaque Identifier Format is identified by the name "opaque".</t>

<t>Below is a non-normative example Subject Identifier in the Opaque Identifier Format:</t>

<figure title="Example: Subject Identifier in the Opaque Identifier Format" anchor="figexamplesubidopaque"><artwork><![CDATA[
{
  "format": "opaque",
  "id": "11112222333344445555"
}
]]></artwork></figure>

</section>
<section anchor="sub-id-phone"><name>Phone Number Identifier Format</name>
<t>The Phone Number Identifier Format identifies a subject using a telephone number.  Subject Identifiers in this format MUST contain a "phone_number" member whose value is a string containing the full telephone number of the subject, including international dialing prefix, formatted according to <xref target="E164">E.164</xref>. The "phone_number" member is REQUIRED and MUST NOT be null or empty. The Phone Number Identifier Format is identified by the name "phone_number".</t>

<t>Below is a non-normative example Subject Identifier in the Email Identifier Format:</t>

<figure title="Example: Subject Identifier in the Phone Number Identifier Format" anchor="figexamplesubidphone"><artwork><![CDATA[
{
  "format": "phone_number",
  "phone_number": "+12065550100"
}
]]></artwork></figure>

</section>
<section anchor="sub-id-did"><name>Decentralized Identifier (DID) Format</name>

<t>The Decentralized Identifier Format identifies a subject using a Decentralized Identifier (DID) URL as defined in <xref target="DID"/>.  Subject Identifiers in this format MUST contain a "URL" member whose value is a DID URL for the DID Subject being identified. The value of the "url" member MUST be a valid DID URL and MAY be a bare DID. The "url" member is REQUIRED and MUST NOT be null or empty. The Decentralized Identifier Format is identified by the name "did".</t>

<t>Below are non-normative example Subject Identifiers for the Decentralized Identifier Format:</t>

<figure title="Example: Subject Identifier for the Decentralized Identifier Format, identifying a subject with a bare DID" anchor="figexamplesubiddidbare"><artwork><![CDATA[
{
  "format": "did",
  "url": "did:example:123456"
}
]]></artwork></figure>

<figure title="Example: Subject Identifier for the Decentralized Identifier Format, identifying a subject with a DID URL with non-empty path and query components" anchor="figexamplesubiddidcomplex"><artwork><![CDATA[
{
  "format": "did",
  "url": "did:example:123456/did/url/path?versionId=1"
}
]]></artwork></figure>

</section>
<section anchor="sub-id-uri"><name>Uniform Resource Identifier (URI) Format</name>

<t>The Uniform Resource Identifier (URI) Format identifies a subject using a URI as defined in <xref target="RFC3986"/>. This identifier format makes no assumptions or guarantees with regard to the content, scheme, or reachability of the URI within the field. Subject Identifiers in this format MUST contain a "uri" member whose value is a URI for the subject being identified. The "uri" member is REQUIRED and MUST NOT be null or empty. The URI format is identified by the name "uri".</t>

<t>Below are non-normative example Subject Identifiers for the URI format:</t>

<figure title="Example: Subject Identifier for the URI Format, identifying a subject with a website URI" anchor="figexamplesubiduidbare"><artwork><![CDATA[
{
  "format": "uri",
  "uri": "https://user.example.com/"
}
]]></artwork></figure>

<figure title="Example: Subject Identifier for the URI Format, identifying a subject with a random URN" anchor="figexamplesubidurnbare"><artwork><![CDATA[
{
  "format": "uri",
  "uri": "urn:uuid:4e851e98-83c4-4743-a5da-150ecb53042f"
}
]]></artwork></figure>

</section>
<section anchor="sub-id-aliases"><name>Aliases Identifier Format</name>
<t>The Aliases Identifier Format describes a subject that is identified with a list of different Subject Identifiers. It is intended for use when a variety of identifiers have been shared with the party that will be interpreting the Subject Identifier, and it is unknown which of those identifiers they will recognize or support.  Subject Identifiers in this format MUST contain an "identifiers" member whose value is a JSON array containing one or more Subject Identifiers.  Each Subject Identifier in the array MUST identify the same entity.  The "identifiers" member is REQUIRED and MUST NOT be null or empty.  It MAY contain multiple instances of the same Identifier Format (e.g., multiple Email Subject Identifiers), but SHOULD NOT contain exact duplicates.  This format is identified by the name "aliases".</t>

<t>"aliases" Subject Identifiers MUST NOT be nested; i.e., the "identifiers" member of an "aliases" Subject Identifier MUST NOT contain a Subject Identifier in the "aliases" format.</t>

<t>Below is a non-normative example Subject Identifier in the Aliases Identifier Format:</t>

<figure title="Example: Subject Identifier in the Aliases Identifier Format" anchor="figexamplesubididtoken"><artwork><![CDATA[
{
  "format": "aliases",
  "identifiers": [
    {
      "format": "email",
      "email": "user@example.com"
    },
    {
      "format": "phone_number",
      "phone_number": "+12065550100"
    },
    {
      "format": "email",
      "email": "user+qualifier@example.com"
    }
  ]
}
]]></artwork></figure>

</section>
</section>
</section>
<section anchor="jwt-claims"><name>Subject Identifiers in JWTs</name>

<section anchor="jwt-claims-sub_id"><name><spanx style="verb">sub_id</spanx> Claim</name>
<t>The "sub" JWT Claim is defined in Section 4.1.2 of <xref target="RFC7519"/> as containing a string value, and therefore cannot contain a Subject Identifier (which is a JSON object) as its value.  This document defines the "sub_id" JWT Claim, in accordance with Section 4.2 of <xref target="RFC7519"/>, as a common claim that identifies the JWT Subject using a Subject Identifier.  When present, the value of this claim MUST be a Subject Identifier that identifies the subject of the JWT.  The "sub_id" claim MAY be included in a JWT, whether or not the "sub" claim is present.  When both the "sub" and "sub_id" claims are present in a JWT, they MUST identify the same subject, as a JWT has one and only one JWT Subject.</t>

<t>When processing a JWT with both "sub" and "sub_id" claims, implementations MUST NOT rely on both claims to determine the JWT Subject.  An implementation MAY attempt to determine the JWT Subject from one claim and fall back to using the other if it determines it does not understand the format of the first claim.  For example, an implementation may attempt to use "sub_id", and fall back to using "sub" upon finding that "sub_id" contains a Subject Identifier whose format is not recognized by the implementation.</t>

<t>Below are non-normative examples of JWTs containing the "sub_id" claim:</t>

<figure title="Example: JWT containing a &quot;sub_id&quot; claim and no &quot;sub&quot; claim" anchor="figexamplejwtsubidemail"><artwork><![CDATA[
{
  "iss": "issuer.example.com",
  "sub_id": {
    "format": "email",
    "email": "user@example.com"
  }
}
]]></artwork></figure>

<figure title="Example: JWT where both the &quot;sub&quot; and &quot;sub_id&quot; claims identify the JWT Subject using the same identifier" anchor="figexamplejwtsamesubid"><artwork><![CDATA[
{
  "iss": "issuer.example.com",
  "sub": "user@example.com",
  "sub_id": {
    "format": "email",
    "email": "user@example.com"
  }
}
]]></artwork></figure>

<figure title="Example: JWT where both the &quot;sub&quot; and &quot;sub_id&quot; claims identify the JWT Subject using different values of the same identifier type" anchor="figexamplejwtdiffsubvalues"><artwork><![CDATA[
{
  "iss": "issuer.example.com",
  "sub": "liz@example.com",
  "sub_id": {
    "format": "email",
    "email": "elizabeth@example.com"
  }
}
]]></artwork></figure>

<figure title="Example: JWT where the &quot;sub&quot; and &quot;sub_id&quot; claims identify the JWT Subject via different types of identifiers" anchor="figexamplejwtdiffsubtype"><artwork><![CDATA[
{
  "iss": "issuer.example.com",
  "sub": "user@example.com",
  "sub_id": {
    "format": "account",
    "uri": "acct:example.user@service.example.com"
  }
}
]]></artwork></figure>

</section>
<section anchor="subid-and-isssub-subject-identifiers"><name><spanx style="verb">sub_id</spanx> and <spanx style="verb">iss_sub</spanx> Subject Identifiers</name>
<t>The "sub_id" claim MAY contain an "iss_sub" Subject Identifier.  In this case, the JWT's "iss" claim and the Subject Identifier's "iss" member MAY be different.  For example, in <xref target="OpenID.Core">OpenID Connect</xref> client may construct such a JWT when sending JWTs back to its OpenID Connect Identity Provider, in order to identify the JWT Subject using an identifier known to be understood by both parties.  Similarly, the JWT's "sub" claim and the Subject Identifier's "sub" member MAY be different.  For example, this may be used by an OpenID Connect client to communicate the JWT Subject's local identifier at the client back to its Identity Provider.</t>

<t>Below are non-normative examples of a JWT where the "iss" claim and "iss" member within the "sub_id" claim are the same, and a JWT where they are different.</t>

<figure title="Example: JWT with an &quot;iss_sub&quot; Subject Identifier where JWT issuer and JWT Subject issuer are the same" anchor="figexamplejwtsameiss"><artwork><![CDATA[
{
  "iss": "issuer.example.com",
  "sub_id": {
    "format": "iss_sub",
    "iss": "issuer.example.com",
    "sub": "example_user"
  }
}
]]></artwork></figure>

<figure title="Example: JWT with an &quot;iss_sub&quot; Subject Identifier where the JWT issuer and JWT Subject issuer are different" anchor="figexamplejwtdiffiss"><artwork><![CDATA[
{
  "iss": "client.example.com",
  "sub_id": {
    "format": "iss_sub",
    "iss": "issuer.example.com",
    "sub": "example_user"
  }
}
]]></artwork></figure>

<figure title="Example: JWT with an &quot;iss_sub&quot; Subject Identifier where the JWT &quot;iss&quot; and &quot;sub&quot; claims differ from the JWT Subject's &quot;iss&quot; and &quot;sub&quot; members" anchor="figexamplejwtdiffisssub"><artwork><![CDATA[
{
  "iss": "client.example.com",
  "sub": "client_user",
  "sub_id": {
    "format": "iss_sub",
    "iss": "issuer.example.com",
    "sub": "example_user"
  }
}
]]></artwork></figure>

</section>
</section>
<section anchor="implementer"><name>Considerations for Specifications that Define Identifier Formats</name>
<t>Identifier Format definitions MUST NOT make assertions or declarations regarding the subject being identified by the Subject Identifier (e.g., an Identifier Format cannot be defined as specifically identifying human end users), as such statements are outside the scope of Identifier Formats and Subject Identifiers, and expanding that scope for some Identifier Formats but not others would harm interoperability, as applications that depend on this expanded scope to disambiguate the subject type would be unable to use Identifier Formats that do not provide such rules.</t>

</section>
<section anchor="privacy"><name>Privacy Considerations</name>

<section anchor="identifier-correlation"><name>Identifier Correlation</name>
<t>The act of presenting two or more identifiers for a single subject together (e.g., within an "aliases" Subject Identifier, or via the "sub" and "sub_id" JWT claims) may communicate more information about the subject than was intended.  For example, the entity to which the identifiers are presented now knows that both identifiers relate to the same subject, and may be able to correlate additional data based on that.  When transmitting Subject Identifiers, the transmitter SHOULD take care that they are only transmitting multiple identifiers together when it is known that the recipient already knows that the identifiers are related (e.g., because they were previously sent to the recipient as claims in an OpenID Connect ID Token), or when correlation is essential to the use case.  Implementers must consider such risks, and specifications that use subject identifiers must provide appropriate privacy considerations of their own.</t>

<t>The considerations described in Section 6 of <xref target="RFC8417"/> also apply when Subject Identifiers are used within SETs.  The considerations described in Section 12 of <xref target="RFC7519"/> also apply when Subject Identifiers are used within JWTs.</t>

</section>
</section>
<section anchor="security"><name>Security Considerations</name>
<t>This specification does not define any mechanism for ensuring the confidentiality or integrity of a Subject Identifier.  Where such properties are required, implementations MUST use mechanisms provided by the containing format (e.g., integrity protecting SETs or JWTs using JWS <xref target="RFC7515"/>), or at the transport layer or other layer in the application stack (e.g., using TLS <xref target="RFC8446"/>).</t>

<t>Further considerations regarding confidentiality and integrity of SETs can be found in Section 5.1 of <xref target="RFC8417"/>.</t>

</section>
<section anchor="iana"><name>IANA Considerations</name>

<section anchor="iana-formats"><name>Security Event Identifier Formats Registry</name>
<t>This document defines Identifier Formats, for which IANA is asked to create and maintain a new registry titled "Security Event Identifier Formats".  Initial values for the Security Event Identifier Formats registry are given in <xref target="sub-ids"/>.  Future assignments are to be made through the Specification Required registration policy <xref target="BCP26"/> and shall follow the template presented in <xref target="iana-formats-template"/>.</t>

<t>It is suggested that multiple Designated Experts be appointed who are able to represent the perspectives of different applications using this specification, in order to enable broadly informed review of registration decisions.</t>

<section anchor="registry-location"><name>Registry Location</name>
<t>(This section to be removed by the RFC Editor before publication as an RFC.)</t>

<t>The authors recommend that the Identifier Formats registry be located at <spanx style="verb">https://www.iana.org/assignments/secevent/</spanx>.</t>

</section>
<section anchor="iana-formats-template"><name>Registration Template</name>

<dl newline="true">
  <dt>Format Name</dt>
  <dd>
    <t>The name of the Identifier Format, as described in <xref target="sub-ids"/>. The name MUST be an ASCII string consisting only of lower-case characters ("a" - "z"), digits ("0" - "9"), underscores ("_"), and hyphens ("-"), and SHOULD NOT exceed 20 characters in length.</t>
  </dd>
  <dt>Format Description</dt>
  <dd>
    <t>A brief description of the Identifier Format.</t>
  </dd>
  <dt>Change Controller</dt>
  <dd>
    <t>For formats defined in documents published by the IETF or its working groups, list "IETF".  For all other formats, list the name of the party responsible for the registration.  Contact information such as mailing address, email address, or phone number must also be provided.</t>
  </dd>
  <dt>Defining Document(s)</dt>
  <dd>
    <t>A reference to the document or documents that define the Identifier Format.  The reference document(s) MUST specify the name, format,and meaning of each member that may occur within a Subject Identifier of the defined format, as well as whether each member is optional, required or conditional, and the circumstances under which these optional or conditional fields would be used. URIs that can be used to retrieve copies of each document SHOULD be included.</t>
  </dd>
</dl>

</section>
<section anchor="iana-formats-init"><name>Initial Registry Contents</name>

<section anchor="account-identifier-format"><name>Account Identifier Format</name>

<t><list style="symbols">
  <t>Format Name: "account"</t>
  <t>Format Description: Subject identifier based on <spanx style="verb">acct</spanx> URI.</t>
  <t>Change Controller: IETF</t>
  <t>Defining Document(s): <xref target="sub-ids"/> of this document.</t>
</list></t>

</section>
<section anchor="email-identifier-format"><name>Email Identifier Format</name>

<t><list style="symbols">
  <t>Format Name: <spanx style="verb">email</spanx></t>
  <t>Format Description: Subject identifier based on email address.</t>
  <t>Change Controller: IETF</t>
  <t>Defining Document(s): <xref target="sub-ids"/> of this document.</t>
</list></t>

</section>
<section anchor="issuer-and-subject-identifier-format"><name>Issuer and Subject Identifier Format</name>

<t><list style="symbols">
  <t>Format Name: "iss_sub"</t>
  <t>Format Description: Subject identifier based on an issuer and subject.</t>
  <t>Change Controller: IETF</t>
  <t>Defining Document(s): <xref target="sub-ids"/> of this document.</t>
</list></t>

</section>
<section anchor="opaque-identifier-format"><name>Opaque Identifier Format</name>

<t><list style="symbols">
  <t>Format Name: "opaque"</t>
  <t>Format Description: Subject identifier based on an opaque string.</t>
  <t>Change Controller: IETF</t>
  <t>Defining Document(s): <xref target="sub-ids"/> of this document.</t>
</list></t>

</section>
<section anchor="phone-number-identifier-format"><name>Phone Number Identifier Format</name>

<t><list style="symbols">
  <t>Format Name: "phone_number"</t>
  <t>Format Description: Subject identifier based on an phone number.</t>
  <t>Change Controller: IETF</t>
  <t>Defining Document(s): <xref target="sub-ids"/> of this document.</t>
</list></t>

</section>
<section anchor="decentralized-identifier-format"><name>Decentralized Identifier Format</name>

<t><list style="symbols">
  <t>Format Name: "did"</t>
  <t>Format Description: Subject identifier based on a decentralized identifier (DID).</t>
  <t>Change Controller: IETF</t>
  <t>Defining Document(s): <xref target="sub-ids"/> of this document.</t>
</list></t>

</section>
<section anchor="uniform-resource-identifier-format"><name>Uniform Resource Identifier Format</name>

<t><list style="symbols">
  <t>Format Name: "uri"</t>
  <t>Format Description: Subject identifier based on a uniform resource identifier (URI).</t>
  <t>Change Controller: IETF</t>
  <t>Defining Document(s): <xref target="sub-ids"/> of this document.</t>
</list></t>

</section>
<section anchor="aliases-identifier-format"><name>Aliases Identifier Format</name>

<t><list style="symbols">
  <t>Format Name: "aliases"</t>
  <t>Format Description: Subject identifier that groups together multiple different subject identifiers for the same subject.</t>
  <t>Change Controller: IETF</t>
  <t>Defining Document(s): <xref target="sub-ids"/> of this document.</t>
</list></t>

</section>
</section>
<section anchor="iana-formats-expert"><name>Guidance for Expert Reviewers</name>
<t>The Expert Reviewer is expected to review the documentation referenced in a registration request to verify its completeness. The Expert Reviewer must base their decision to accept or reject the request on a fair and impartial assessment of the request. If the Expert Reviewer has a conflict of interest, such as being an author of a defining document referenced by the request, they must recuse themselves from the approval process for that request.</t>

<t>Identifier Formats need not be generally applicable and may be highly specific to a particular domain; it is expected that formats may be registered for niche or industry-specific use cases. The Expert Reviewer should focus on whether the format is thoroughly documented, and whether its registration will promote or harm interoperability.  In most cases, the Expert Reviewer should not approve a request if the registration would contribute to confusion, or amount to a synonym for an existing format.</t>

</section>
</section>
<section anchor="json-web-token-claims-registration"><name>JSON Web Token Claims Registration</name>
<t>This document defines the <spanx style="verb">sub_id</spanx> JWT Claim, which IANA is asked to register in the "JSON Web Token Claims" registry <xref target="IANA.JWT.Claims">IANA JSON Web Token Claims Registry</xref> established by <xref target="RFC7519"/>.</t>

<section anchor="registry-contents"><name>Registry Contents</name>

<t><list style="symbols">
  <t>Claim Name: "sub_id"</t>
  <t>Claim Description: Subject Identifier</t>
  <t>Change Controller: IETF</t>
  <t>Specification Document(s): <xref target="jwt-claims-sub_id"/> of this document.</t>
</list></t>

</section>
</section>
</section>


  </middle>

  <back>


    <references title='Normative References'>





<reference anchor='BCP26' target='https://www.rfc-editor.org/info/rfc8126'>
<front>
<title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
<author fullname='M. Cotton' initials='M.' surname='Cotton'><organization/></author>
<author fullname='B. Leiba' initials='B.' surname='Leiba'><organization/></author>
<author fullname='T. Narten' initials='T.' surname='Narten'><organization/></author>
<date month='June' year='2017'/>
<abstract><t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters.  To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper.  For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t><t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed.  This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t><t>This is the third edition of this document; it obsoletes RFC 5226.</t></abstract>
</front>
<seriesInfo name='BCP' value='26'/>
<seriesInfo name='RFC' value='8126'/>
<seriesInfo name='DOI' value='10.17487/RFC8126'/>
</reference>


<reference anchor="E164" target="https://www.itu.int/rec/T-REC-E.164-201011-I/en">
  <front>
    <title>The international public telecommunication numbering plan</title>
    <author >
      <organization>International Telecommunication Union</organization>
    </author>
    <date year="2010"/>
  </front>
</reference>
<reference anchor="IANA.JWT.Claims" target="https://www.iana.org/assignments/jwt">
  <front>
    <title>JSON Web Token Claims</title>
    <author >
      <organization>IANA</organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="DID" target="https://www.w3.org/TR/did-core/">
  <front>
    <title>Decentralized Identifiers (DIDs) v1.0</title>
    <author >
      <organization>World Wide Web Consortium (W3C)</organization>
    </author>
    <date year="2021"/>
  </front>
</reference>




<reference anchor='RFC8417' target='https://www.rfc-editor.org/info/rfc8417'>
<front>
<title>Security Event Token (SET)</title>
<author fullname='P. Hunt' initials='P.' role='editor' surname='Hunt'><organization/></author>
<author fullname='M. Jones' initials='M.' surname='Jones'><organization/></author>
<author fullname='W. Denniss' initials='W.' surname='Denniss'><organization/></author>
<author fullname='M. Ansari' initials='M.' surname='Ansari'><organization/></author>
<date month='July' year='2018'/>
<abstract><t>This specification defines the Security Event Token (SET) data structure.  A SET describes statements of fact from the perspective of an issuer about a subject.  These statements of fact represent an event that occurred directly to or about a security subject, for example, a statement about the issuance or revocation of a token on behalf of a subject.  This specification is intended to enable representing security- and identity-related events.  A SET is a JSON Web Token (JWT), which can be optionally signed and/or encrypted. SETs can be distributed via protocols such as HTTP.</t></abstract>
</front>
<seriesInfo name='RFC' value='8417'/>
<seriesInfo name='DOI' value='10.17487/RFC8417'/>
</reference>



<reference anchor='RFC7519' target='https://www.rfc-editor.org/info/rfc7519'>
<front>
<title>JSON Web Token (JWT)</title>
<author fullname='M. Jones' initials='M.' surname='Jones'><organization/></author>
<author fullname='J. Bradley' initials='J.' surname='Bradley'><organization/></author>
<author fullname='N. Sakimura' initials='N.' surname='Sakimura'><organization/></author>
<date month='May' year='2015'/>
<abstract><t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties.  The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t></abstract>
</front>
<seriesInfo name='RFC' value='7519'/>
<seriesInfo name='DOI' value='10.17487/RFC7519'/>
</reference>



<reference anchor='RFC8259' target='https://www.rfc-editor.org/info/rfc8259'>
<front>
<title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
<author fullname='T. Bray' initials='T.' role='editor' surname='Bray'><organization/></author>
<date month='December' year='2017'/>
<abstract><t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format.  It was derived from the ECMAScript Programming Language Standard.  JSON defines a small set of formatting rules for the portable representation of structured data.</t><t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t></abstract>
</front>
<seriesInfo name='STD' value='90'/>
<seriesInfo name='RFC' value='8259'/>
<seriesInfo name='DOI' value='10.17487/RFC8259'/>
</reference>



<reference anchor='RFC2119' target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author fullname='S. Bradner' initials='S.' surname='Bradner'><organization/></author>
<date month='March' year='1997'/>
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference anchor='RFC7565' target='https://www.rfc-editor.org/info/rfc7565'>
<front>
<title>The 'acct' URI Scheme</title>
<author fullname='P. Saint-Andre' initials='P.' surname='Saint-Andre'><organization/></author>
<date month='May' year='2015'/>
<abstract><t>This document defines the 'acct' Uniform Resource Identifier (URI) scheme as a way to identify a user's account at a service provider, irrespective of the particular protocols that can be used to interact with the account.</t></abstract>
</front>
<seriesInfo name='RFC' value='7565'/>
<seriesInfo name='DOI' value='10.17487/RFC7565'/>
</reference>



<reference anchor='RFC5322' target='https://www.rfc-editor.org/info/rfc5322'>
<front>
<title>Internet Message Format</title>
<author fullname='P. Resnick' initials='P.' role='editor' surname='Resnick'><organization/></author>
<date month='October' year='2008'/>
<abstract><t>This document specifies the Internet Message Format (IMF), a syntax for text messages that are sent between computer users, within the framework of &quot;electronic mail&quot; messages.  This specification is a revision of Request For Comments (RFC) 2822, which itself superseded Request For Comments (RFC) 822, &quot;Standard for the Format of ARPA Internet Text Messages&quot;, updating it to reflect current practice and incorporating incremental changes that were specified in other RFCs.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5322'/>
<seriesInfo name='DOI' value='10.17487/RFC5322'/>
</reference>



<reference anchor='RFC5321' target='https://www.rfc-editor.org/info/rfc5321'>
<front>
<title>Simple Mail Transfer Protocol</title>
<author fullname='J. Klensin' initials='J.' surname='Klensin'><organization/></author>
<date month='October' year='2008'/>
<abstract><t>This document is a specification of the basic protocol for Internet electronic mail transport.  It consolidates, updates, and clarifies several previous documents, making all or parts of most of them obsolete.  It covers the SMTP extension mechanisms and best practices for the contemporary Internet, but does not provide details about particular extensions.  Although SMTP was designed as a mail transport and delivery protocol, this specification also contains information that is important to its use as a &quot;mail submission&quot; protocol for &quot;split-UA&quot; (User Agent) mail reading systems and mobile environments.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5321'/>
<seriesInfo name='DOI' value='10.17487/RFC5321'/>
</reference>



<reference anchor='RFC3986' target='https://www.rfc-editor.org/info/rfc3986'>
<front>
<title>Uniform Resource Identifier (URI): Generic Syntax</title>
<author fullname='T. Berners-Lee' initials='T.' surname='Berners-Lee'><organization/></author>
<author fullname='R. Fielding' initials='R.' surname='Fielding'><organization/></author>
<author fullname='L. Masinter' initials='L.' surname='Masinter'><organization/></author>
<date month='January' year='2005'/>
<abstract><t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource.  This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet.  The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier.  This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='STD' value='66'/>
<seriesInfo name='RFC' value='3986'/>
<seriesInfo name='DOI' value='10.17487/RFC3986'/>
</reference>




    </references>

    <references title='Informative References'>

<reference anchor="OpenID.Core" target="https://openid.net/specs/openid-connect-core-1_0.html">
  <front>
    <title>OpenID Connect Core 1.0</title>
    <author initials="N." surname="Sakimura" fullname="Nat Sakimura">
      <organization>Nomura Research Institute, Ltd.</organization>
    </author>
    <author initials="J." surname="Bradley" fullname="John Bradley">
      <organization>Ping Identity</organization>
    </author>
    <author initials="M." surname="Jones" fullname="Michael B. Jones">
      <organization>Microsoft</organization>
    </author>
    <author initials="B." surname="de Medeiros" fullname="Breno de Medeiros">
      <organization>Google</organization>
    </author>
    <author initials="C." surname="Mortimore" fullname="Chuck Mortimore">
      <organization>Salesforce</organization>
    </author>
    <date year="2014" month="November"/>
  </front>
</reference>




<reference anchor='RFC1034' target='https://www.rfc-editor.org/info/rfc1034'>
<front>
<title>Domain names - concepts and facilities</title>
<author fullname='P. Mockapetris' initials='P.' surname='Mockapetris'><organization/></author>
<date month='November' year='1987'/>
<abstract><t>This RFC is the revised basic definition of The Domain Name System.  It obsoletes RFC-882.  This memo describes the domain style names and their used for host address look up and electronic mail forwarding.  It discusses the clients and servers in the domain name system and the protocol used between them.</t></abstract>
</front>
<seriesInfo name='STD' value='13'/>
<seriesInfo name='RFC' value='1034'/>
<seriesInfo name='DOI' value='10.17487/RFC1034'/>
</reference>



<reference anchor='RFC7515' target='https://www.rfc-editor.org/info/rfc7515'>
<front>
<title>JSON Web Signature (JWS)</title>
<author fullname='M. Jones' initials='M.' surname='Jones'><organization/></author>
<author fullname='J. Bradley' initials='J.' surname='Bradley'><organization/></author>
<author fullname='N. Sakimura' initials='N.' surname='Sakimura'><organization/></author>
<date month='May' year='2015'/>
<abstract><t>JSON Web Signature (JWS) represents content secured with digital signatures or Message Authentication Codes (MACs) using JSON-based data structures.  Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and an IANA registry defined by that specification.  Related encryption capabilities are described in the separate JSON Web Encryption (JWE) specification.</t></abstract>
</front>
<seriesInfo name='RFC' value='7515'/>
<seriesInfo name='DOI' value='10.17487/RFC7515'/>
</reference>



<reference anchor='RFC8446' target='https://www.rfc-editor.org/info/rfc8446'>
<front>
<title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
<author fullname='E. Rescorla' initials='E.' surname='Rescorla'><organization/></author>
<date month='August' year='2018'/>
<abstract><t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol.  TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t><t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961.  This document also specifies new requirements for TLS 1.2 implementations.</t></abstract>
</front>
<seriesInfo name='RFC' value='8446'/>
<seriesInfo name='DOI' value='10.17487/RFC8446'/>
</reference>




    </references>


<section numbered="no" anchor="acknowledgements"><name>Acknowledgements</name>
<t>The authors would like to thank the members of the IETF Security Events working group, as well as those of the OpenID Shared Signals and Events Working Group, whose work provided the original basis for this document.
We would also like to acknowledge Aaron Parecki, Denis Pinkas, Justin Richer, Mike Jones and other members of the working group for reviewing this document.</t>

</section>
<section numbered="no" anchor="change-log"><name>Change Log</name>
<t>(This section to be removed by the RFC Editor before publication as an RFC.)</t>

<t>Draft 00 - AB - First draft</t>

<t>Draft 01 - AB:</t>

<t><list style="symbols">
  <t>Added reference to RFC 5322 for format of <spanx style="verb">email</spanx> claim.</t>
  <t>Renamed <spanx style="verb">iss_sub</spanx> type to <spanx style="verb">iss-sub</spanx>.</t>
  <t>Renamed <spanx style="verb">id_token_claims</spanx> type to <spanx style="verb">id-token-claims</spanx>.</t>
  <t>Added text specifying the nature of the subjects described by each type.</t>
</list></t>

<t>Draft 02 - AB:</t>

<t><list style="symbols">
  <t>Corrected format of phone numbers in examples.</t>
  <t>Updated author info.</t>
</list></t>

<t>Draft 03 - AB:</t>

<t><list style="symbols">
  <t>Added <spanx style="verb">account</spanx> type for <spanx style="verb">acct</spanx> URIs.</t>
  <t>Replaced <spanx style="verb">id-token-claims</spanx> type with <spanx style="verb">aliases</spanx> type.</t>
  <t>Added email canonicalization guidance.</t>
  <t>Updated semantics for <spanx style="verb">email</spanx>, <spanx style="verb">phone</spanx>, and <spanx style="verb">iss-sub</spanx> types.</t>
</list></t>

<t>Draft 04 - AB:</t>

<t><list style="symbols">
  <t>Added <spanx style="verb">sub_id</spanx> JWT Claim definition, guidance, examples.</t>
  <t>Added text prohibiting <spanx style="verb">aliases</spanx> nesting.</t>
  <t>Added privacy considerations for identifier correlation.</t>
</list></t>

<t>Draft 05 - AB:</t>

<t><list style="symbols">
  <t>Renamed the <spanx style="verb">phone</spanx> type to <spanx style="verb">phone-number</spanx> and its <spanx style="verb">phone</spanx> claim to <spanx style="verb">phone_number</spanx>.</t>
</list></t>

<t>Draft 06 - AB:</t>

<t><list style="symbols">
  <t>Replaced usage of the word "claim" to describe members of a Subject Identifier with the word "member", in accordance with terminology in RFC8259.</t>
  <t>Renamed the <spanx style="verb">phone-number</spanx> type to <spanx style="verb">phone_number</spanx> and <spanx style="verb">iss-sub</spanx> to <spanx style="verb">iss_sub</spanx>.</t>
  <t>Added normative requirements limiting the use of both <spanx style="verb">sub</spanx> and <spanx style="verb">sub_id</spanx> claims together when processing a JWT.</t>
  <t>Clarified that identifier correlation may be acceptable when it is a core part of the use case.</t>
  <t>Replaced references to OIDF with IETF in IANA Considerations.</t>
  <t>Recommended the appointment of multiple Designated Experts, and a location for the Subject Identifier Types registry.</t>
  <t>Added "_" to list of allowed characters in the Type Name for Subject Identifier Types.</t>
  <t>Clarified that Subject Identifiers don't provide confidentiality or integrity protection.</t>
  <t>Added references to SET, JWT privacy and security considerations.</t>
  <t>Added section describing the difference between subject identifier type and principal type that hopefully clarifies things and doesn't just muddy the water further.</t>
</list></t>

<t>Draft 07 - AB:</t>

<t><list style="symbols">
  <t>Emphasized that the spec is about identifiers, not the things they identify:
  <list style="symbols">
      <t>Renamed "Subject Identifier Type" to "Identifier Format".</t>
      <t>Renamed <spanx style="verb">subject_type</spanx> to <spanx style="verb">format</spanx>.</t>
      <t>Renamed "Security Event Subject Identifier Type Registry" to "Security Event Identifier Format Registry".</t>
      <t>Added new section with guidance for specs defining Identifier Formats, with normative prohibition on formats that describe the subject itself, rather than the identifier.</t>
    </list></t>
  <t>Clarified the meaning of "subject":
  <list style="symbols">
      <t>Defined "subject" as applying generically and "JWT Subject" as applying specifically to the subject of a JWT.</t>
      <t>Replaced most instances of the word "principal" with "subject".</t>
    </list></t>
  <t>Added <spanx style="verb">opaque</spanx> Identifier Format</t>
</list></t>

<t>Draft 08 - JR, AB:</t>

<t><list style="symbols">
  <t>Added <spanx style="verb">did</spanx> Identifier Format</t>
  <t>Alphabetized identifier format definitions</t>
  <t>Replaced "type" with "format" in places that had been missed in the -07 change. (mostly IANA Considerations)</t>
  <t>Miscellaneous editorial fixes</t>
</list></t>

<t>Draft 09 - AB:</t>

<t><list style="symbols">
  <t>Miscellaneous editorial fixes</t>
</list></t>

<t>Draft 10 - PJ:</t>

<t><list style="symbols">
  <t>Added author</t>
  <t>Editorial nits</t>
</list></t>

<t>Draft 11 - PJ:</t>

<t><list style="symbols">
  <t>Miscellaneous editorial fixes</t>
  <t>Moved aliases to the last in identifier format definitions</t>
  <t>Acknowledged individual reviewers</t>
</list></t>

<t>Draft 12 - PJ:</t>

<t><list style="symbols">
  <t>Restore the DID format that was removed in -11</t>
  <t>Added a generic "URI" format</t>
  <t>Normative advice on choosing the format</t>
</list></t>

<t>Draft 13 - PJ:</t>

<t><list style="symbols">
  <t>Editorial nits found during AD review</t>
</list></t>

<t>Draft 14 - PJ:</t>

<t><list style="symbols">
  <t>Fix IANA issues found during AD review</t>
</list></t>

<t>Draft 15 - PJ:</t>

<t><list style="symbols">
  <t>Fix issues found during review</t>
</list></t>

<t>Draft 16 - PJ:</t>

<t><list style="symbols">
  <t>Change controller updated to IETF</t>
</list></t>

<t>Draft 17 -PJ:</t>

<t><list style="symbols">
  <t>Fixed nits identified during IESG reviews</t>
</list></t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

