<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-sbriz-identity-trust-system-02" category="std" consensus="true" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.24.0 -->
  <front>
    <title abbrev="Identity Trust">Identity Trust System</title>
    <seriesInfo name="Internet-Draft" value="draft-sbriz-identity-trust-system-02"/>
    <author initials="L." surname="Sbriz" fullname="Luigi Sbriz">
      <organization>Cybersecurity &amp; Privacy Senior Consultant</organization>
      <address>
        <email>luigi@sbriz.eu</email>
      </address>
    </author>
    <date year="2024" month="November" day="07"/>
    <area>SEC</area>
    <workgroup>Web Authorization Protocol</workgroup>
    <abstract>
      <?line 75?>

<t>This document defines an <strong>identity trust system</strong>, which is a symmetric digital identity authentication system that requires no federation of authentication domains. The main components of the authentication process between two entities are:</t>
      <ol spacing="normal" type="1"><li>
          <t><strong>Symmetric authentication protocol</strong> - Both entities must recognize each other and are authenticated by their identity provider according to a symmetric message exchange scheme. It builds on and extends the OAuth Authorization Framework RFC6749.</t>
        </li>
        <li>
          <t><strong>Trustees network</strong> - A special network dedicated to creating a protected environment for exchanging authentication messages between Identity Providers (IdPs) constitutes the infrastructure to avoid domain federation.</t>
        </li>
        <li>
          <t><strong>Custodian concept</strong> - IdPs are divided into two typologies to better protect personal data and link digital identity to physical one. A generic IdP (called trustee) to manage digital authentication only and a specific IdP (called custodian), with the legal right to process the individual's real data and under the control of country's authority, to manage the physical identity and the link with the digital one.</t>
        </li>
      </ol>
    </abstract>
  </front>
  <middle>
    <?line 83?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The typical model of access to Internet protected resources requires that the identity of the user, i.e. the <strong><em>resource owner</em></strong>, be authenticated by the resource manager, i.e. the <strong><em>service provider</em></strong>. The authentication process is not the primary task of the service provider and therefore can be entrusted to a third party shared between the user and the service provider, known as an <strong><em>identity provider</em></strong>. A popular authentication mechanism is defined by <xref target="RFC6749"/>.</t>
      <t>This mechanism is asymmetric, only the resource owner must be recognized but not vice versa. Furthermore, the digital identity has value only within the digital ecosystem of the identity provider, i.e. its authentication domain or in a set of domains in a relationship of trust between them. It follows that when the digital ecosystem changes, the resource owner needs a new user to be recognized in the new digital environment. Instead, with a symmetric authentication scheme, the new user is no longer necessary. Moreover, it is not even necessary to create a trust relationship between domains. Trust is assigned only to the entity that guarantees identity authentication process, i.e. the identity provider that guarantees the inviolability and truthfulness of the authentication messages exchanged.</t>
      <t>The concept used to build symmetric authentication is the request for equal dignity in recognition, i.e. each entity must be recognized by the other. To achieve this equal relationship, an identity recognition process based on a mirrored sequence of messages exchanged is necessary. Consequently, basing this symmetric process on the trust assigned to the identity provider has a great advantage, it is no longer necessary to define a specific trust between domains or create new users to be able to operate in an ecosystem different from that of belonging.</t>
      <t>To implement this solution it is necessary to modify the authentication protocol to support the symmetric exchange of identification messages, and also implement a similar message exchange mechanism between identity providers. For security reasons, an infrastructure dedicated to identity providers is required. Furthermore, dividing IdPs into two categories reduces the amount of personal data used in registrations. The first category will be made up of those who are only authorized to recognize digital identity. The second category consists of those with the legal authority to also manage the real identity. The second category will act as a guarantor of the authenticity of the identity used in registration on the providers of the first category.</t>
      <section anchor="use-cases-of-both-authentication-schemes">
        <name>Use cases of both authentication schemes</name>
        <t>Figure 1 depicts the use case of the classic identity recognition method with asymmetry in the process of exchanging authentication messages <xref target="RFC6749"/>. A SVG image is available <eref target="https://raw.githubusercontent.com/Luigi-Sbriz/identity/main/images/1_Asymmetric-depiction.svg">here</eref>. The scenario depicted represents a resource owner who needs to retrieve a resource from the service provider. The identity provider <bcp14>MUST</bcp14> verify the identity of the resource owner before accessing the resource server. The relying party who manages the resource does not provide any information about its identity, it provides the resource only to authorized requests.</t>
        <artwork><![CDATA[
                  ┌───────────┐
                  │Identity   │
                  │           │
                  │Provider   │
                  └─────┬─────┘
                Digital │ecosystem
               .........│..............................
               :  ┌─────┴─────┐                       :
               :  │Authorizati│                       :
               :  │           ├──────────────┐        :
               :  │on Server  │              │        :
               :  └─────┬─────┘              │        :
               :        │                    │        :
┌───────────┐  :  ┌─────┴─────┐        ┌─────┴─────┐  :  ┌───────────┐
│Resource   │  :  │User       │        │Relying    │  :  │Service    │
│           ├─────┤           ├────────┤           ├─────┤           │
│Owner      │  :  │Agent      │        │Party      │  :  │Provider   │
└───────────┘  :  └───────────┘        └─────┬─────┘  :  └───────────┘
               :                             │        :
               :                       ┌─────┴─────┐  :
               :                       │Resource   │  :
               :                       │           │  :
               :                       │Server     │  :
               :                       └───────────┘  :
               :......................................:

Figure 1: Use case of the authorization flow - Asymmetrical case
]]></artwork>
        <t>Figure 2 depicts the use case with the components needed to enable the identity authentication process in a symmetric manner capable of operating in different digital ecosystems. A SVG image is available <eref target="https://raw.githubusercontent.com/Luigi-Sbriz/identity/main/images/2_Symmetric-depiction.svg">here</eref>. The new scenario depicts two different ecosystems, one for the resource owner (client accessing the resource) and the other for the service provider (server managing the resource). This means that any entity involved in the authentication process will have its own identity provider, and they will interact with each other to ensure the completion of the symmetric authentication process.</t>
        <artwork><![CDATA[
                  ┌───────────┐        ┌───────────┐
                  │Identity   │        │Identity   │
                  │           │        │           │
                  │Provider C │        │Provider S │
                  └─────┬─────┘        └─────┬─────┘
                Digital │ecosystem   Digital │ecosystem
                        │C                   │S
               .........│.........  .........│.........
               :  ┌─────┴─────┐  :  :  ┌─────┴─────┐  :
               :  │Authorizati│  :  :  │Authorizati│  :
               :  │           ╞════════╡           │  :
               :  │on Server C│  :  :  │on Server S│  :
               :  └─────┬─────┘  :  :  └─────┬─────┘  :
               :        │        :  :        │        :
┌───────────┐  :  ┌─────┴─────┐  :  :  ┌─────┴─────┐  :  ┌───────────┐
│Resource   │  :  │User       │  :  :  │Relying    │  :  │Service    │
│           ├─────┤           ├────────┤           ├─────┤           │
│Owner      │  :  │Agent      │  :  :  │Party      │  :  │Provider   │
└───────────┘  :  └───────────┘  :  :  └─────┬─────┘  :  └───────────┘
               :                 :  :        │        :
               :                 :  :  ┌─────┴─────┐  :
               :                 :  :  │Resource   │  :
               :                 :  :  │           │  :
               :                 :  :  │Server     │  :
               :                 :  :  └───────────┘  :
               :.................:  :.................:

Figure 2: Use case of the authorization flow - Symmetrical case
]]></artwork>
        <t>The two representations are very similar to each other but note that the symmetric protocol requires direct communication between the identity providers' authentication servers to allow the circular transit of authentication messages. Therefore, no trust between domains or new users is necessary. This idea was first exposed in some articles published on ISACA Journal (see <xref target="LS1"/>, <xref target="LS2"/>, <xref target="LS3"/>, <xref target="LS4"/>) with some specific use cases and examples of potential implementations.</t>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>Some terms are used with a precise meaning.</t>
      <ul spacing="normal">
        <li>
          <t>"<strong><em>resource owner</em></strong>": 
An entity capable of granting access to a protected resource. When the resource owner is a person, it is also referred to as "<strong><em>end user</em></strong>", "<strong><em>consumer</em></strong>" or "<strong><em>individual</em></strong>". This is sometimes abbreviated as "<strong><em>RO</em></strong>".</t>
        </li>
        <li>
          <t>"<strong><em>service provider</em></strong>": 
An entity capable of managing access to a protected resource. It is generally a legal person. This is sometimes abbreviated as "<strong><em>SP</em></strong>".</t>
        </li>
        <li>
          <t>"<strong><em>identity provider</em></strong>": 
An entity capable of managing and recognizing the identity of registered entities. The set of all entities registered by the identity provider is also known as the IdP's digital ecosystem. This is sometimes abbreviated as "<strong><em>IdP</em></strong>".</t>
        </li>
        <li>
          <t>"<strong><em>resource server</em></strong>": 
The server hosting the protected resources, capable of accepting and responding to protected resource requests using access tokens. The resource server is often accessible via an API. This is sometimes abbreviated as "<strong><em>RS</em></strong>".</t>
        </li>
        <li>
          <t>"<strong><em>client</em></strong>", for software is also referred to as "<strong><em>user agent</em></strong>": 
An application making protected resource requests on behalf of the resource owner and with its authorization. The term "client" does not imply any particular implementation characteristics (e.g., whether the application executes on a server, a desktop, or other devices).</t>
        </li>
        <li>
          <t>"<strong><em>relying party</em></strong>": 
An application making protected resource authorization on behalf of the service provider and also managing its identity. The "relying party" acts as the "client" but on service provider side. This is sometimes abbreviated as "<strong><em>RP</em></strong>".</t>
        </li>
        <li>
          <t>"<strong><em>authorization server</em></strong>": 
The server issuing access tokens to the client after successfully authenticating the resource owner and obtaining authorization. This is sometimes abbreviated as "<strong><em>AS</em></strong>".</t>
        </li>
        <li>
          <t>"<strong><em>access token</em></strong>": 
The concept is the same of the <xref target="RFC6749"/>, a tiny piece of code that contains the necessary authentication data, issued by the authorization server.</t>
        </li>
        <li>
          <t>"<strong><em>identity token</em></strong>" or "<strong><em>ID token</em></strong>": 
The structure is similar to access token but it is used as proof that the user has been authenticated. The ID token may have additional information about the user and, it is signed by the issuer with its private key. To verify the token, the issuer's public key is used.</t>
        </li>
        <li>
          <t>"<strong><em>digital ecosystem</em></strong>": 
Internet environment composed of all entities based on the same identity provider.</t>
        </li>
      </ul>
      <t>The detail of the information exchanged or protocols in the interactions between the authorization server and the requesting client, or between relying party and resource server, or the composition of tokens, is beyond the scope of this specification.</t>
    </section>
    <section anchor="symmetric-authentication-protocol">
      <name>Symmetric authentication protocol</name>
      <t>The symmetric authentication flow is conceptually not too dissimilar from the classic one referring to the single ecosystem <xref target="RFC5234"/>, except that the authentication is dual because the two flows reflect the same operations symmetrically. Both the <strong>client</strong> (<em>resource owner</em>) and the <strong>server</strong> (<em>service provider</em>) <bcp14>MUST</bcp14> authenticate their identity through their IdP. The details of each basic operation in the symmetric process are the same as the corresponding single ecosystem specification <xref target="RFC6749"/> and <bcp14>MUST</bcp14> maintain alignment with it over time.</t>
      <t>The authentication sequence between a consumer and a resource provider operating in different environments will be:</t>
      <t><strong><em>1.</em></strong> Entities exchange the access tokens received from their authentication server with each other.<br/>
        <strong><em>2.</em></strong> Entities send the received token to their authentication server.<br/>
        <strong><em>3.</em></strong> Authentication servers exchange access tokens with each other.<br/>
        <strong><em>4.</em></strong> Authentication servers verify tokens with their original.<br/>
        <strong><em>5.</em></strong> Authentication servers send the result to their own entity.<br/>
        <strong><em>6.</em></strong> Entities are authenticated and can now exchange information.</t>
      <t>Conceptually, in a client-server schema, the authentication process begins with the resource owner requesting access to the protected resource to the service provider. Both respond with their access tokens and request their IdP to validate the received token. The IdPs exchange tokens for validation and send the result to their entity. On success, access to the resource is allowed.</t>
      <t>Figure 3 shows the abstract depiction of the symmetric authentication sequence. A SVG image is available <eref target="https://raw.githubusercontent.com/Luigi-Sbriz/identity/main/images/3_Symmetric-sequence-diagram.svg">here</eref>.</t>
      <artwork><![CDATA[
┌───────────┐                                            ┌───────────┐
│Relying    ├-(1)--Request Authentication--------------->│Authorizati│
│           │                                            │           │
│Party      │<-(2)-Return Server Token-------------------┤on Server S│
└───────────┘                                            └───────────┘
┌───────────┐      ┌───────────┐      ┌───────────┐      ┌───────────┐
│Resource   │      │User       │      │Authorizati│      │Relying    │
│           │      │           │      │           │      │           │
│Owner      │      │Agent      │      │on Server C│      │Party      │
└─────┬─────┘      └─────┬─────┘      └─────┬─────┘      └─────┬─────┘
      |      Request     |                  |                  |
      ├-(3)--Protected-->+-(4)--Send Access Request----------->|
      |      Resource    |                  |                  |
      |                  |<-(5)-Return Server Token------------┘
      |                  |                  |
      |                  ├(6)-Request Client|
      |                  |  Token & Send    |
      |                  |  Server Token--->|
      |                  |                  |
      |<-(7)-Request Credentials via UA-----┤
      |                  |                  |
      └-(8)--Present Credentials via UA---->|
                         |                  |
                         └<-(9)---Return    |
                            Client Token----┘
┌───────────┐      ┌───────────┐      ┌───────────┐      ┌───────────┐
│User       │      │Authorizati│      │Authorizati│      │Relying    │
│           │      │           │      │           │      │           │
│Agent      │      │on Server C│      │on Server S│      │Party      │
└─────┬─────┘      └─────┬─────┘      └─────┬─────┘      └─────┬─────┘
      |                  |                  |                  |
      ├-(10)--Request Protected Resource & Send Client Token-->|
      |                  |                  |                  |
      |                  |<-(12)---Send     |<-(11)---Send     |
      |                  |  Client Token----┤  Client Token----┤
      |                  |                  |                  |
      |                  ├-(13)---Return    |                  |
      |                  |  Server Token--->|                  |
      |                  |                  |                  |
      └<-(14)--Return of |                  └-(15)--Return of  |
         Authorization---┘                     Authorization-->┘
┌───────────┐      ┌───────────┐      ┌───────────┐      ┌───────────┐
│Resource   │      │User       │      │Relying    │      │Resource   │
│           │      │           │      │           │      │           │
│Owner      │      │Agent      │      │Party      │      │Server     │
└─────┬─────┘      └─────┬─────┘      └─────┬─────┘      └─────┬─────┘
      |                  |                  |                  |
      |                  |                  ├(16)Call Protected|
      |                  |                  | Resource-------->|
      |                  |                  |                  |
      └<-(19)-----Return |<-(18)-----Return |<-(17)-----Return |
        Protect.Resource-┘ Protect.Resource-┘ Protect.Resource-┘

Figure 3: Symmetric Authentication Protocol - Sequence diagram
]]></artwork>
      <t>(1) - (2)       The <strong><em>RP</em></strong> requests authentication to its <strong><em>AS</em></strong> (marked "S" as server) and receives the server token (access token from the service provider's AS). The relying party must be provided with its own access token to resolve multiple requests.<br/>
(3) - (5)       The <strong><em>RO</em></strong> requests access to the protected resource via the user agent. The <strong><em>UA</em></strong> activates the authentication process by requesting access to the <strong><em>RP</em></strong>, which responds by providing the server token. The response may also include the server ID token.<br/>
(6) - (9)       The <strong><em>UA</em></strong> requests the client token (access token from the client's AS) to its <strong><em>AS</em></strong> (marked "C" as client), sending also the server token received from <strong><em>RP</em></strong>. The client's <strong><em>AS</em></strong> requests credentials from the <strong><em>RO</em></strong> and returns the client token to the <strong><em>UA</em></strong>.<br/>
(10) - (11)     The <strong><em>UA</em></strong> requests the protected resource from the <strong><em>RP</em></strong> by sending the client token. Then, relying party requests to service provider's AS to verify the client token.<br/>
(12) - (15)     Both authentication servers must verify that the tokens received match the originals. Then, client's AS informs the <strong><em>UA</em></strong> of the outcome and the same is done by the service provider's AS to the <strong><em>RP</em></strong>. The outcome sent to the relying party may also include the client ID token.<br/>
(16) - (17)     The <strong><em>RP</em></strong> notifies the <strong><em>RS</em></strong> of the legitimate request of '<strong><em>UA</em></strong>. The <strong><em>RS</em></strong> returns the protected resource to <strong><em>RP</em></strong>.<br/>
(18) - (19) The <strong><em>RP</em></strong> sends the protected resource to <strong><em>UA</em></strong>, which then presents it to the requester <strong><em>RO</em></strong>.</t>
      <t><strong><em>Notes regarding some steps:</em></strong><br/>
(4) If the server token is not available at this time, sequence (1) - (2) will be executed between steps (4) and (5) to provide the server token. Additionally, this change may also be necessary for a periodic refresh of the server token or if the entities are both clients.<br/>
(6) The client's authorization could be performed in advance and the client token stored securely by the user agent for handling multiple authentication requests. This means performing only the server token communication here, avoiding the following steps (7) - (9) because already done.</t>
      <t>The verification of the authenticity of the tokens is carried out by the IdPs who exchange messages on a dedicated network to reduce the risk of intrusion. Security is strengthened by the presence of two interfaces for the exchange of tokens, one is for the party in trust and the other is for the opposing party. If one is compromised, the other interrupts the flow avoiding authorization. The trust placed in the mutual validation of messages avoids having to merge authentication domains, leaving great flexibility to the system as a whole.</t>
      <t>Identity recognition information resides only with a trusted identity provider. This reduces the need to store too much personal information in Internet registrations. Furthermore, to easily identify which IdP holds the entity's authentication credentials, it can be easily extracted from the username structure if this is defined following the same technique used to compose an email address <xref target="RFC5322"/>, that means an username, an @ sign, and a domain name.</t>
    </section>
    <section anchor="identity-provider-trustee-concept">
      <name>Identity Provider - Trustee Concept</name>
      <t>The symmetric authentication protocol bases its functioning on the existence of trusted entities, called <strong><em>identity providers (IdPs)</em></strong>, in a network among themselves (IdP Network), exchanging authentication messages to guarantee the digital identity. Each IdP acts as a point of reference for the identity authentication service in its digital ecosystem, and must be able to communicate with every other IdP to recognize identities belonging to other ecosystems, securely from intrusions or tampering. The effectiveness of the entire authentication system depends on the trust placed in these identity providers but it must be deserved. This requires a robust organisation, subject to systematic oversight by independent certification body, to ensure transparent management by IdPs.</t>
      <section anchor="importance-of-this-role">
        <name>Importance of this role</name>
        <t>The identity provider is the guarantor of the authenticity of the relationship between digital credentials and the identity of natural or legal persons in digital communication. For this role it can also be called an <strong>ID trustee</strong> and the greatest criticality it must face is the inviolability of the messages exchanged. Furthermore, when processing personal data, the laws of the country to which the data subject belongs must be considered. It may also provide additional services (e.g. anonymous email, answering machine, anonymous accounts,...), but always in full compliance with the applicable law and only if they do not present risk for the data subject. Anonymization services are intended exclusively for the intended recipient but not for the authority exercising the applicable law (e.g. for a whistleblowing).</t>
        <t>An IdP <bcp14>MUST</bcp14> be a legal entity subject to both the laws of the country to which it belongs and to international certification bodies, to guarantee compliance with this standard, the security of the information processed, the expected level of quality of service and the lawful processing of data.</t>
      </section>
      <section anchor="infrastructure">
        <name>Infrastructure</name>
        <t>The infrastructure underlying symmetric communication is the IdP Network, dedicated to the exchange of authentication messages between IdPs. Ideally, each IdP always has two connectors, one to communicate with its trusted entity and the other to exchange messages with another IdP. With its own entity the mechanism is exactly the one defined by <xref target="RFC6749"/>. With other IdPs, a reserved channel is required for the exchange of tokens, which provides guarantees on the integrity of the messages and their origin. This channel <bcp14>SHOULD</bcp14> have low latency because it represents an additional step compared to the single ecosystem authentication scheme. The intended mechanism for sharing messages is that of a mail server <xref target="RFC5321"/>. The process for adding a new node (IdP) in the IdP Network <bcp14>MUST</bcp14> require the identification of the legal entity that owns the node, but also the registration of identification data of the installed network devices, for security controls on the reliability of the node itself. Any variation must be promptly updated or the node will be disabled. .</t>
        <t>The dedicated network for the identity providers is not technically necessary for the authentication protocol but is essential for security, to reduce the risk of fraud or identity theft and, to ensure trust in lawful behavior. There <bcp14>MUST</bcp14> also be an international control body over IdPs and the management of the IdP Network. This authority will be responsible for governing the overall system, i.e. defining technical standards, or carrying out audits to ensure compliance with the rules, or acting to exclude nodes in case of violation of the rules.</t>
      </section>
    </section>
    <section anchor="identity-provider-custodian-concept">
      <name>Identity Provider - Custodian Concept</name>
      <t>The relationship between digital and physical identity should be managed only by a particular identity provider, called <strong><em>identity custodian (IdC)</em></strong>, who has the legal authority to manage the personal data of the natural person. Only in this way it will be the perfect candidate to guarantee the identity provider the validity of the request for the release of a new digital identity, without having to disclose the physical identity to the IdP. Guaranteeing the digital identity of a user corresponding to a legal entity will not be the task of the identity custodian but of an authority or a process compliant with the law of the country to which the legal entity belongs. The identity token contains the indication between users of a natural person or a legal entity. The identity token makes it possible to distinguish the user of a natural or legal person and to know who has guaranteed the physical identity. An identity custodian can also act as an identity trustee, keeping roles distinct in communication protocols.</t>
      <section anchor="general-schema">
        <name>General schema</name>
        <t>The identity custodian certifies that it is a real identity that requires the digital identity but can also provide personal data to identity trustee with the consent of the data subject. The identity trustee provides the authentication service for its digital ecosystem. A use case describing the relationship between identity custodian, identity trustee, and digital identity is provided in figure 4. A SVG image is available <eref target="https://raw.githubusercontent.com/Luigi-Sbriz/identity/main/images/4_Identity-custodian-concept.svg">here</eref>.</t>
        <artwork><![CDATA[
............................              ............................
: Real ecosystem X         :              :         Real ecosystem Y :
:              ...................  ...................              :
:              :Digital          :  :          Digital:              :
:              :ecosystem A      :  :      ecosystem B:              :
:              :  ┌───────────┐  :  :  ┌───────────┐  :              :
:              :  │  Digital  │  :  :  │  Digital  │  :              :
:      ┌──────────┤           ├────────┤           ├──────────┐      :
:      │       :  │Identity A │  :  :  │Identity B │  :       │      :
:      │       :  └─────┬─────┘  :  :  └─────┬─────┘  :       │      :
:      │       :        │        :  :        │        :       │      :
:┌─────┴─────┐ :  ┌─────┴─────┐  :  :  ┌─────┴─────┐  : ┌─────┴─────┐:
:│ Identity  │ :  │ Identity  │  :  :  │ Identity  │  : │ Identity  │:
:│           ╞════╡           ╞════════╡           ╞════╡           │:
:│Custodian X│ :  │Provider A │  :  :  │Provider B │  : │Custodian Y│:
:└───────────┘ :  └───────────┘  :  :  └───────────┘  : └───────────┘:
: Real         :                 :  :                 :         Real :
: identity A   :.................:  :.................:   identity B :
:                          :              :                          :
:..........................:              :..........................:

Figure 4: The Identity Custodian Use Case
]]></artwork>
        <t>Generally, identity provider must carry out the recognition and registration of the user's personal data before being able to guarantee its identity. The collection of the data of the natural person must be carried out in accordance with the protection provided for by the regulations in force. To ensure that the processing of personal data is restricted and controlled, it is useful to divide the set of IdPs into two categories. In the first, there will be IdPs (also called trustees) that only manage digital identity operations, and in the second, IdCs (identity custodians) that guarantee trustees that the applicant's identity is real. The IdC's category should operate under the responsibility of the legal authority that manages the real identity of the individual (i.e. who issues the identity card).</t>
        <t>Through the identity custodian, each individual can request the issuing of a new digital identity to their trusted IdP. It will be the trusted IdP who will ask for confirmation of the applicant's authenticity directly from the IdC. The applicant must send an ID token with their IdC contact information to initiate the request. The request will be managed entirely online and will not require any personal data from the data subject but, subject to consent, everything will be sent by the IdC. The new identity will be useful to meet the typical needs of transactions on the Internet, with the right confidentiality for the holder and an added value for the authority, being able to identify the real person. The digital legal identity to sign contracts should be managed directly by IdC.</t>
        <t>In short the roles involved in the trust-based authentication system.
- The <strong><em>identity custodian</em></strong> is the guarantor of the existence of the natural person and has the ability to uniquely identify it but only following a formal request from the legitimate authority.<br/>
- The <strong><em>identity provider</em></strong> receives the identification data that the data subject has decided to provide and will match these to the digital identity.<br/>
- The <strong><em>service provider</em></strong> will have the guarantee that the user is linked to a real person for security, contractual or legal reasons.<br/>
- The <strong><em>data subject</em></strong> can provide personal information according to their need, also maintaining anonymity.<br/>
- The <strong><em>public authority</em></strong> that manages the real data will be able to identify the individual with certainty in case of violations of the law (i.e. to protect the service provider).</t>
        <section anchor="issuing-of-a-new-digital-identity">
          <name>Issuing of a New Digital Identity</name>
          <t>The request for a new digital identity is activated by the natural person towards the chosen trustee. The trustee will request confirmation from the identity custodian if the request lawfully came from a real person. In case of confirmation, it will record the personal data that the data subject has authorized IdC to transfer. A use case describing the request of a new digital identity is provided in figure 5. A SVG image is available <eref target="https://raw.githubusercontent.com/Luigi-Sbriz/identity/main/images/5_New-identity-use-case.svg">here</eref>.</t>
          <artwork><![CDATA[
                  ┌───────────┐        ┌───────────┐
                  │Identity   │        │Identity   │
                  │           │        │           │
                  │Custodian  │        │Provider   │
                  └─────┬─────┘        └─────┬─────┘
                  IdC   │              IdP   │
               ecosystem│           ecosystem│
               .........│.........  .........│.........
               :  ┌─────┴─────┐  :  :  ┌─────┴─────┐  :
               :  │Authorizat.│  :  :  │Authorizat.│  :
               :  │           ╞════════╡           │  :
               :  │Server IdC │  :  :  │Server IdP │  :
               :  └─────┬─────┘  :  :  └─────┬─────┘  :
               :        │        :  :        │        :
┌───────────┐  :  ┌─────┴─────┐  :  :  ┌─────┴─────┐  :
│Data       │  :  │User       │  :  :  │Relying    │  :
│           ├─────┤           ├────────┤           │  :
│Subject    │  :  │Agent      │  :  :  │Party  IdP │  :
└───────────┘  :  └───────────┘  :  :  └───────────┘  :
               :.................:  :.................:

Figure 5: Abstract of New Digital Identity Request
]]></artwork>
          <t>Figure 6 shows the abstract representation of the message exchange sequence to request a new digital identity. A SVG image is available <eref target="https://raw.githubusercontent.com/Luigi-Sbriz/identity/main/images/6_New-identity-sequence-diagram.svg">here</eref>.</t>
          <artwork><![CDATA[
┌───────────┐      ┌───────────┐      ┌───────────┐      ┌───────────┐
│Data       │      │User       │      │Authorizat.│      │Relying    │
│           │      │           │      │           │      │           │
│Subject    │      │Agent      │      │Server IdC │      │Party  IdP │
└───────────┘      └─────┬─────┘      └─────┬─────┘      └─────┬─────┘
      |                  |                  |                  |
      ├-(1)-Request New->+-(2)--Send New Identity Request----->|
      |     Identity     |                  |                  |
      |                  |<--(3)--Return IdP Token-------------┘
      |                  |                  |
      |                  ├(4)--Request IdC  |
      |                  |     Token & Send |
      |                  |     IdP Token--->|
      |                  |                  |
      |<-(5)-Request Credentials via UA-----┤
      |                  |                  |
      └-(6)--Present Credentials via UA---->|
                         |                  |
                         └<--(7)--Return    |
                                  IdC Token-┘
┌───────────┐      ┌───────────┐      ┌───────────┐      ┌───────────┐
│User       │      │Authorizat.│      │Authorizat.│      │Relying    │
│           │      │           │      │           │      │           │
│Agent      │      │Server IdC │      │Server IdP │      │Party  IdP │
└─────┬─────┘      └─────┬─────┘      └─────┬─────┘      └─────┬─────┘
      |                  |                  |                  |
      ├-(8)--Request New Identity & Send IdC Token------------>|
      |                  |                  |                  |
      |                  |<--(10)--Send IdC |<--(9)--Send IdC  |
      |                  |         Token----┤        Token-----┤
      |                  |                  |                  |
      |                  ├-(11)--Return IdP |                  |
      |                  |     Token & Send |                  |
      |                  |     ID Token---->|                  |
      |                  |                  |                  |
      └<-(12)---Return   |                  └-(13)---Return    |
                ID Token-┘                     Client Token--->┘
┌───────────┐                ┌───────────┐               ┌───────────┐
│Data       │                │User       │               │Relying    │
│           │                │           │               │           │
│Subject    │                │Agent      │               │Party  IdP │
└─────┬─────┘                └─────┬─────┘               └─────┬─────┘
      |                            |                           |
      └<-(15)------Return ID Token-┘<-(14)-Return Client Token-┘

Figure 6: New Digital Identity Request - Sequence diagram
]]></artwork>
          <t>(1) - (3)       The <strong><em>data subject</em></strong> requests the new digital identity via the user agent to the identity provider. The <strong><em>UA</em></strong> activates the authentication process by requesting the new identity to the <strong><em>RP</em></strong>, which responds by providing the IdP token (access token from IdP's AS).<br/>
(4) - (7)       The <strong><em>UA</em></strong> requests the IdC token (access token from the custodian's AS) to its <strong><em>AS</em></strong>, sending also the IdP token received from <strong><em>RP</em></strong>. The custodian's <strong><em>AS</em></strong> requests credentials from the <strong><em>data subject</em></strong> and returns the IdC token to the <strong><em>UA</em></strong>.<br/>
(8) - (9)       The <strong><em>UA</em></strong> requests the new digital identity from the <strong><em>RP</em></strong> by sending the IdC token. Then, relying party requests to identity provider's AS to verify the IdC token.<br/>
(10) - (11)     Both authentication servers must verify that the tokens received match the originals. If required by data subject, the custodian's AS will send an additional ID token with personal data.<br/>
(12) - (13)     Custodian's AS informs the <strong><em>UA</em></strong> of the outcome and, if required, sends also a copy of the ID token. The identity provider's AS sends to the <strong><em>RP</em></strong> the client token (related the new identity provided by IdP).<br/>
(14) - (15) The <strong><em>RP</em></strong> sends the client token to <strong><em>UA</em></strong>, which then informs the <strong><em>data subject</em></strong> of the outcome and, if required, sends a readable copy of the ID token to check the personal information shared.</t>
          <t><strong><em>Notes regarding some steps:</em></strong><br/>
(3) If the relying party does not have the IdP token available, this will be requested from the authentication server after step (2).<br/>
(4) IdC token does not contains any real identity information as default. If requested, an ID token with a standard set of real information can be included during this step.</t>
          <t>Any new digital identity with legal value is issued according to the rules defined by the relevant authority. It is presumable that there is also physical recognition of the data subject before the provision of credentials but no reference model is defined in this document.</t>
        </section>
      </section>
    </section>
    <section anchor="sustainable-digital-identity-trust-schema">
      <name>Sustainable Digital Identity Trust Schema</name>
      <t>For the effectiveness of the identity trust system based on the paradigm of trust towards a third party recognizable as reliable, it is necessary to guarantee a transparent and verifiable mechanism. The objective is to achieve universal participation and it is only possible if trust in the system as a whole is demonstrable. For this reason it is necessary to establish founding principles that guide the rules to guarantee equal dignity and balance in all components of the system. The following nine principles are established:</t>
      <ol spacing="normal" type="1"><li>
          <t>The digital identity can be cancelled or deleted without impacting the physical identity.</t>
        </li>
        <li>
          <t>The digital identity must be linkable to the physical identity in a verifiable manner.</t>
        </li>
        <li>
          <t>Only the authority that legally manages the individual's physical identity can verify this link.</t>
        </li>
        <li>
          <t>The authentication system must be flexible (i.e., able to adapt to technological evolutions or emerging needs).</t>
        </li>
        <li>
          <t>The authentication system must be accessible to all potential users (i.e., without discriminatory costs).</t>
        </li>
        <li>
          <t>The authentication system must be secure (i.e., continuously aligned with security best practices).</t>
        </li>
        <li>
          <t>The authentication system must be privacy-friendly (i.e., not requiring any personal information unless strictly necessary).</t>
        </li>
        <li>
          <t>The authentication system must be resilient (i.e., with availability appropriate for needs and the ability to cope with adversity).</t>
        </li>
        <li>
          <t>The authentication system technology must be open (i.e., able to evolve based on transparent shared standards and verifiable developments).</t>
        </li>
      </ol>
      <t>To guarantee the principles set out, the requirements of the authentication system <bcp14>MUST</bcp14> include the protection of personal data and the guarantee of anonymity for lawful purposes, that is:</t>
      <ol spacing="normal" type="1"><li>
          <t>Ensure mutual recognition to guarantee the identity of the provider to the consumer.</t>
        </li>
        <li>
          <t>Ensure the capability to authenticate the digital identities of consumers and providers against their real-world identity, without unnecessarily exposing real data.</t>
        </li>
      </ol>
      <t>The capability to validate the authenticity of the relationship between digital identity and physical identity lies only with the public authority responsible for managing the citizen's identity. Operationally, it is implemented through a digital identity recognition service (i.e. IdC), technologically compliant with the operational protocols of an identity provider but under the supervision of the public authority.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>There are some cautionary points regarding security that need to be considered.
- Integrity and resilience are the most critical parameters. The integrity of the messages is fundamental to guarantee the authenticity of the identity, while the availability of the authentication service is the basis for ensuring the feasibility of the entire process.
- Symmetric authentication contrast the risk of man-in-the-middle attack because it should successfully attack both message flows at the same time.
- The trustee is a critical component and must be subjected to rigorous checks on compliance with the standards.
- The relying party and the resourse server should be on different servers using a dedicated communication channel.</t>
      <t>Referring to the term identification, we mean at least three different types, the device, the digital user and the individual.</t>
      <ul spacing="normal">
        <li>
          <t>The <strong><em>device</em></strong> is identified with technical methods suited to the various needs. For example, geolocalization using International Mobile Equipment Identity (IMEI) <xref target="ITU1"/> and Integrated Circuit Card ID (ICCID) <xref target="ITU2"/>.</t>
        </li>
        <li>
          <t>The <strong><em>digital user</em></strong> is well managed by <xref target="RFC6749"/> but inside the digital ecosystem. To manage users of multiple domains, either the user registrations are duplicated for each domain involved, or the domains involved are joined in a trust relationship.</t>
        </li>
        <li>
          <t>The <strong><em>individual</em></strong>, or natural person, is well managed with classic physical methods (e.g. photo ID) but the link with the digital identity needs to be improved because the quality is not satisfactory. This topic is beyond the scope of this specification and it was explored for example in <xref target="LS3"/>.</t>
        </li>
      </ul>
      <t>An in-depth defense system <bcp14>SHOULD</bcp14> consider all the components involved and in this case not just the pure digital authentication of the user. In this document only the digital user is treated but extensions applicable to mixed situations with multiple types are certainly welcome to improve the overall security profile.</t>
      <section anchor="user-registration">
        <name>User registration</name>
        <t>It is important to control the amount of data exchanged during the authentication process but also that the data required to issue a new digital identity are the only ones strictly necessary. To assign access credentials to a protected resource to a user, a process of recording the user's identification and contact data is necessary, as they are necessary for the authentication of the digital identity and for the attribution of access rights to the resource. Data provided or exchanged with IdPs <bcp14>MUST</bcp14> comply with the need-to-know principle. Three ways of recording are required.</t>
        <section anchor="registration-with-an-identity-custodian-idc">
          <name>Registration with an identity custodian (IdC).</name>
          <t>The IdC has the legal authority to retain all personal data essential to complete the process of recognizing the real individual. Consequently it also has full authority over digital identity data and registration is subject to the law of the individual's country of origin.</t>
        </section>
        <section anchor="registration-with-an-identity-provider-idp">
          <name>Registration with an identity provider (IdP).</name>
          <t>The IdP has to guarantee the authenticity of the digital identity and the collection of personal data <bcp14>SHOULD</bcp14> be limited to the sole purpose of this operation. For the registration of a natural person, the IdP requests confirmation from the IdC of the real identity of the applicant before issuing the digital identity. The process is completely online and does not require any physical recognition. For legal entities, the data is provided by the owner or a delegate.</t>
        </section>
        <section anchor="registration-with-a-service-provider-sp">
          <name>Registration with a service provider (SP).</name>
          <t>The service provider <bcp14>SHOULD</bcp14> know only the data necessary to build the authorization roles to govern access to resources and nothing more. These are provided directly by the user or by an ID token, in addition to those received automatically from their IdP relating to digital identity.</t>
        </section>
      </section>
    </section>
    <section anchor="conclusions">
      <name>Conclusions</name>
      <t>To operate effectively between the different digital ecosystems, the identity management system <bcp14>MUST</bcp14> be based on a common authentication protocol that symmetrically carries out the same operations in complete transparency, entrusting the decision on recognition to a trusted third party. Confidence in the reliability of recognition carried out by the identity guarantor (IdP or IdC) cannot be based on the technological component alone. It is therefore necessary to involve an independent supervisory authority for technological aspects and the local competent public authority responsible for data protection.</t>
      <t>To improve trust in the digital operations between the consumer and the service provider three guarantees must be provided.</t>
      <ol spacing="normal" type="1"><li>
          <t>The mutual recognition between consumer and service provider.</t>
        </li>
        <li>
          <t>The control and minimization of the personal information processed.</t>
        </li>
        <li>
          <t>In case of legal need, the ability to match the digital identities of consumer and provider against their real-world identity.</t>
        </li>
      </ol>
      <t>Due to the strong synergy that can be achieved, it is advisable to maintain constant technical alignment with the standard <xref target="RFC6749"/> and the related specifications to implement point-to-point authentication, within the broader symmetric authentication framework.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC6749">
          <front>
            <title>The OAuth 2.0 Authorization Framework</title>
            <author fullname="D. Hardt" initials="D." role="editor" surname="Hardt"/>
            <date month="October" year="2012"/>
            <abstract>
              <t>The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf. This specification replaces and obsoletes the OAuth 1.0 protocol described in RFC 5849. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6749"/>
          <seriesInfo name="DOI" value="10.17487/RFC6749"/>
        </reference>
        <reference anchor="RFC5322">
          <front>
            <title>Internet Message Format</title>
            <author fullname="P. Resnick" initials="P." role="editor" surname="Resnick"/>
            <date month="October" year="2008"/>
            <abstract>
              <t>This document specifies the Internet Message Format (IMF), a syntax for text messages that are sent between computer users, within the framework of "electronic mail" messages. This specification is a revision of Request For Comments (RFC) 2822, which itself superseded Request For Comments (RFC) 822, "Standard for the Format of ARPA Internet Text Messages", updating it to reflect current practice and incorporating incremental changes that were specified in other RFCs. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5322"/>
          <seriesInfo name="DOI" value="10.17487/RFC5322"/>
        </reference>
        <reference anchor="RFC5321">
          <front>
            <title>Simple Mail Transfer Protocol</title>
            <author fullname="J. Klensin" initials="J." surname="Klensin"/>
            <date month="October" year="2008"/>
            <abstract>
              <t>This document is a specification of the basic protocol for Internet electronic mail transport. It consolidates, updates, and clarifies several previous documents, making all or parts of most of them obsolete. It covers the SMTP extension mechanisms and best practices for the contemporary Internet, but does not provide details about particular extensions. Although SMTP was designed as a mail transport and delivery protocol, this specification also contains information that is important to its use as a "mail submission" protocol for "split-UA" (User Agent) mail reading systems and mobile environments. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5321"/>
          <seriesInfo name="DOI" value="10.17487/RFC5321"/>
        </reference>
        <reference anchor="RFC5234">
          <front>
            <title>Augmented BNF for Syntax Specifications: ABNF</title>
            <author fullname="D. Crocker" initials="D." role="editor" surname="Crocker"/>
            <author fullname="P. Overell" initials="P." surname="Overell"/>
            <date month="January" year="2008"/>
            <abstract>
              <t>Internet technical specifications often need to define a formal syntax. Over the years, a modified version of Backus-Naur Form (BNF), called Augmented BNF (ABNF), has been popular among many Internet specifications. The current specification documents ABNF. It balances compactness and simplicity with reasonable representational power. The differences between standard BNF and ABNF involve naming rules, repetition, alternatives, order-independence, and value ranges. This specification also supplies additional rule definitions and encoding for a core lexical analyzer of the type common to several Internet specifications. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="68"/>
          <seriesInfo name="RFC" value="5234"/>
          <seriesInfo name="DOI" value="10.17487/RFC5234"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="ITU1" target="https://www.itu.int/dms_pub/itu-t/opb/tut/T-TUT-CCICT-2020-PDF-E.pdf">
          <front>
            <title>QTR-RLB-IMEI - Reliability of International Mobile Station Equipment Identity (IMEI), Technical Report</title>
            <author>
              <organization>International Telecommunications Union</organization>
            </author>
            <date year="2020" month="July"/>
          </front>
        </reference>
        <reference anchor="ITU2" target="https://www.itu.int/rec/T-REC-E.118">
          <front>
            <title>E.118: The International Telecommunication Charge Card</title>
            <author>
              <organization>International Telecommunications Union</organization>
            </author>
            <date year="2006" month="May"/>
          </front>
        </reference>
        <reference anchor="LS1" target="https://www.isaca.org/resources/isaca-journal/issues/2022/volume-2/a-symmetrical-framework-for-the-exchange-of-identity-credentials-based-on-the-trust-paradigm-part-1">
          <front>
            <title>A Symmetrical Framework for the Exchange of Identity Credentials Based on the Trust Paradigm, Part 1: Identity Trust Abstract Model, ISACA Journal, vol.2</title>
            <author initials="L." surname="Sbriz" fullname="Luigi Sbriz">
              <organization/>
            </author>
            <date year="2022" month="April"/>
          </front>
        </reference>
        <reference anchor="LS2" target="https://www.isaca.org/resources/isaca-journal/issues/2022/volume-2/a-symmetrical-framework-for-the-exchange-of-identity-credentials-based-on-the-trust-paradigm-part-2">
          <front>
            <title>A Symmetrical Framework for the Exchange of Identity Credentials Based on the Trust Paradigm, Part 2: Identity Trust Service Implementation, ISACA Journal, vol.2</title>
            <author initials="L." surname="Sbriz" fullname="Luigi Sbriz">
              <organization/>
            </author>
            <date year="2022" month="April"/>
          </front>
        </reference>
        <reference anchor="LS3" target="https://www.isaca.org/resources/isaca-journal/issues/2023/volume-1/how-to-digitally-verify-human-identity">
          <front>
            <title>How to Digitally Verify Human Identity: The Case of Voting, ISACA Journal, vol.1</title>
            <author initials="L." surname="Sbriz" fullname="Luigi Sbriz">
              <organization/>
            </author>
            <date year="2023" month="January"/>
          </front>
        </reference>
        <reference anchor="LS4" target="https://www.isaca.org/resources/isaca-journal/issues/2023/volume-6/modeling-an-identity-trust-system">
          <front>
            <title>Modeling an Identity Trust System, ISACA Journal, vol.6</title>
            <author initials="L." surname="Sbriz" fullname="Luigi Sbriz">
              <organization/>
            </author>
            <date year="2023" month="November"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 508?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>This document was prepared using text editor with Markdown syntax (kramdown-rfc dialect).</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
