<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-sbriz-identity-trust-system-03" category="std" consensus="true" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.28.1 -->
  <front>
    <title abbrev="Identity Trust">Identity Trust System</title>
    <seriesInfo name="Internet-Draft" value="draft-sbriz-identity-trust-system-03"/>
    <author initials="L." surname="Sbriz" fullname="Luigi Sbriz">
      <organization>Cybersecurity, Risk &amp; Privacy Senior Consultant</organization>
      <address>
        <postal>
          <country>Italy</country>
        </postal>
        <email>luigi@sbriz.eu</email>
      </address>
    </author>
    <date year="2025" month="May" day="10"/>
    <area>SEC</area>
    <workgroup>Web Authorization Protocol</workgroup>
    <abstract>
      <?line 84?>

<t>This document defines an <strong>identity trust system</strong>, which is a digital identity authentication system based on a symmetric exchange of authentication messages that does not require federation of authentication domains. The main components are:</t>
      <ol spacing="normal" type="1"><li>
          <t><strong>Symmetric authentication protocol</strong> - A protocol for the mutual recognition of entities based on a collaboration scheme between Identity Providers (IdPs) and a symmetric exchange of authentication messages. It builds on and extends the OAuth Authorization Framework RFC6749.</t>
        </li>
        <li>
          <t><strong>Trustees network</strong> - Network infrastructure that provides a secure environment for the exchange of authentication messages between IdPs.</t>
        </li>
        <li>
          <t><strong>Custodian concept</strong> - This is a special type of IdP to protect personal data and the relationship between digital and physical identity. The generic IdP is called a "<strong><em>trustee</em></strong>" and is only responsible for digital authentication, while the special IdP, called a "<strong><em>custodian</em></strong>", has the legal right to process the individual's real data and maintain the relationship with the digital identity. It acts under the control of the authorities of the individual's country.</t>
        </li>
      </ol>
    </abstract>
  </front>
  <middle>
    <?line 92?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The typical model of access to Internet protected resources requires that the identity of the user, i.e. the <strong><em>resource owner</em></strong>, be authenticated by the resource manager, i.e. the <strong><em>service provider</em></strong>. The authentication process is not the primary task of the service provider and therefore can be entrusted to a third party shared between the user and the service provider, known as an <strong><em>identity provider</em></strong>. A popular authentication mechanism is defined by <xref target="RFC6749"/>.</t>
      <t>This mechanism is asymmetric, only the resource owner must be recognized but not vice versa. Furthermore, the digital identity has value only within the digital ecosystem of the identity provider, i.e. its authentication domain or in a set of domains in a relationship of trust between them. It follows that when the digital ecosystem changes, the resource owner needs a new user to be recognized in the new digital environment. Instead, with a symmetric authentication scheme, the new user is no longer necessary. Moreover, it is not even necessary to create a trust relationship between domains. Trust is assigned only to the entity that guarantees identity authentication process, i.e. the identity provider that guarantees the inviolability and truthfulness of the authentication messages exchanged.</t>
      <t>The concept used to build symmetric authentication is the request for equal dignity in recognition, i.e. each entity must be recognized by the other. To achieve this equal relationship, an identity recognition process based on a mirrored sequence of messages exchanged is necessary. Consequently, basing this symmetric process on the trust assigned to the identity provider has a great advantage, it is no longer necessary to define a specific trust between domains or create new users to be able to operate in an ecosystem different from that of belonging.</t>
      <t>To implement this solution it is necessary to modify the authentication protocol to support the symmetric exchange of identification messages, and also implement a similar message exchange mechanism between identity providers. For security reasons, an infrastructure dedicated to identity providers is required. Furthermore, dividing IdPs into two categories reduces the amount of personal data used in registrations. The first category will be made up of those who are only authorized to recognize digital identity. The second category consists of those with the legal authority to also manage the real identity. The second category will act as a guarantor of the authenticity of the identity used in registration on the providers of the first category.</t>
      <section anchor="use-cases-of-both-authentication-schemes">
        <name>Use cases of both authentication schemes</name>
        <t>Figure 1 depicts the use case of the classic identity recognition method with asymmetry in the process of exchanging authentication messages <xref target="RFC6749"/>. A SVG image is available <eref target="https://raw.githubusercontent.com/Luigi-Sbriz/identity/main/images/1_Asymmetric-depiction.svg">here</eref>. The scenario depicted represents a resource owner who needs to retrieve a resource from the service provider. The identity provider <bcp14>MUST</bcp14> verify the identity of the resource owner before accessing the resource server. The relying party who manages the resource does not provide any information about its identity, it provides the resource only to authorized requests.</t>
        <artwork><![CDATA[
                  ┌───────────┐
                  │Identity   │
                  │           │
                  │Provider   │
                  └─────┬─────┘
                Digital │ecosystem
               .........│..............................
               :  ┌─────┴─────┐                       :
               :  │Authorizati│                       :
               :  │           ├──────────────┐        :
               :  │on Server  │              │        :
               :  └─────┬─────┘              │        :
               :        │                    │        :
┌───────────┐  :  ┌─────┴─────┐        ┌─────┴─────┐  :  ┌───────────┐
│Resource   │  :  │User       │        │Relying    │  :  │Service    │
│           ├─────┤           ├────────┤           ├─────┤           │
│Owner      │  :  │Agent      │        │Party      │  :  │Provider   │
└───────────┘  :  └───────────┘        └─────┬─────┘  :  └───────────┘
               :                             │        :
               :                       ┌─────┴─────┐  :
               :                       │Resource   │  :
               :                       │           │  :
               :                       │Server     │  :
               :                       └───────────┘  :
               :......................................:

Figure 1: Use case of the authorization flow - Asymmetrical case
]]></artwork>
        <t>Figure 2 depicts the use case with the components needed to enable the identity authentication process in a symmetric manner capable of operating in different digital ecosystems. A SVG image is available <eref target="https://raw.githubusercontent.com/Luigi-Sbriz/identity/main/images/2_Symmetric-depiction.svg">here</eref>. The new scenario depicts two different ecosystems, one for the resource owner (client accessing the resource) and the other for the service provider (server managing the resource). This means that any entity involved in the authentication process will have its own identity provider, and they will interact with each other to ensure the completion of the symmetric authentication process.</t>
        <artwork><![CDATA[
                  ┌───────────┐        ┌───────────┐
                  │Identity   │        │Identity   │
                  │           │        │           │
                  │Provider C │        │Provider S │
                  └─────┬─────┘        └─────┬─────┘
                Digital │ecosystem   Digital │ecosystem
                        │C                   │S
               .........│.........  .........│.........
               :  ┌─────┴─────┐  :  :  ┌─────┴─────┐  :
               :  │Authorizati│  :  :  │Authorizati│  :
               :  │           ╞════════╡           │  :
               :  │on Server C│  :  :  │on Server S│  :
               :  └─────┬─────┘  :  :  └─────┬─────┘  :
               :        │        :  :        │        :
┌───────────┐  :  ┌─────┴─────┐  :  :  ┌─────┴─────┐  :  ┌───────────┐
│Resource   │  :  │User       │  :  :  │Relying    │  :  │Service    │
│           ├─────┤           ├────────┤           ├─────┤           │
│Owner      │  :  │Agent      │  :  :  │Party      │  :  │Provider   │
└───────────┘  :  └───────────┘  :  :  └─────┬─────┘  :  └───────────┘
               :                 :  :        │        :
               :                 :  :  ┌─────┴─────┐  :
               :                 :  :  │Resource   │  :
               :                 :  :  │           │  :
               :                 :  :  │Server     │  :
               :                 :  :  └───────────┘  :
               :.................:  :.................:

Figure 2: Use case of the authorization flow - Symmetrical case
]]></artwork>
        <t>The two representations are very similar to each other but note that the symmetric protocol requires direct communication between the identity providers' authentication servers to allow the circular transit of authentication messages. Therefore, no trust between domains or new users is necessary. This idea was first exposed in some articles published on ISACA Journal (see <xref target="LS1"/>, <xref target="LS2"/>, <xref target="LS3"/>, <xref target="LS4"/>, <xref target="LS5"/>) with some specific use cases and examples of potential implementations.</t>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>Some terms are used with a precise meaning.</t>
      <ul spacing="normal">
        <li>
          <t>"<strong><em>resource owner</em></strong>": 
An entity capable of granting access to a protected resource. When the resource owner is a person, it is also referred to as "<strong><em>end user</em></strong>", "<strong><em>consumer</em></strong>" or "<strong><em>individual</em></strong>". This is sometimes abbreviated as "<strong><em>RO</em></strong>".</t>
        </li>
        <li>
          <t>"<strong><em>service provider</em></strong>": 
An entity capable of managing access to a protected resource. It is generally a legal person. This is sometimes abbreviated as "<strong><em>SP</em></strong>".</t>
        </li>
        <li>
          <t>"<strong><em>identity provider</em></strong>": 
An entity capable of managing and recognizing the identity of registered entities. The set of all entities registered by the identity provider is also known as the IdP's digital ecosystem. This is sometimes abbreviated as "<strong><em>IdP</em></strong>".</t>
        </li>
        <li>
          <t>"<strong><em>resource server</em></strong>": 
The server hosting the protected resources, capable of accepting and responding to protected resource requests using access tokens. The resource server is often accessible via an API. This is sometimes abbreviated as "<strong><em>RS</em></strong>".</t>
        </li>
        <li>
          <t>"<strong><em>client</em></strong>", for software is also referred to as "<strong><em>user agent</em></strong>": 
An application making protected resource requests on behalf of the resource owner and with its authorization. The term "client" does not imply any particular implementation characteristics (e.g., whether the application executes on a server, a desktop, or other devices).</t>
        </li>
        <li>
          <t>"<strong><em>relying party</em></strong>": 
An application making protected resource authorization on behalf of the service provider and also managing its identity. The "relying party" acts as the "client" but on service provider side. This is sometimes abbreviated as "<strong><em>RP</em></strong>".</t>
        </li>
        <li>
          <t>"<strong><em>authorization server</em></strong>": 
The server issuing access tokens to the client after successfully authenticating the resource owner and obtaining authorization. This is sometimes abbreviated as "<strong><em>AS</em></strong>".</t>
        </li>
        <li>
          <t>"<strong><em>access token</em></strong>": 
The concept is the same of the <xref target="RFC6749"/>, a tiny piece of code that contains the necessary authentication data, issued by the authorization server.</t>
        </li>
        <li>
          <t>"<strong><em>identity token</em></strong>" or "<strong><em>ID token</em></strong>": 
The structure is similar to access token but it is used as proof that the user has been authenticated. The ID token may have additional information about the user and, it is signed by the issuer with its private key. To verify the token, the issuer's public key is used.</t>
        </li>
        <li>
          <t>"<strong><em>digital ecosystem</em></strong>": 
Internet environment composed of all entities based on the same identity provider.</t>
        </li>
      </ul>
      <t>The detail of the information exchanged or protocols in the interactions between the authorization server and the requesting client, or between relying party and resource server, or the composition of tokens, is beyond the scope of this specification.</t>
    </section>
    <section anchor="symmetric-authentication-protocol">
      <name>Symmetric authentication protocol</name>
      <t>The symmetric authentication flow is conceptually not too dissimilar from the classic one referring to the single ecosystem <xref target="RFC5234"/>, except that the authentication is dual because the two flows reflect the same operations symmetrically. Both the <strong>client</strong> (<em>resource owner</em>) and the <strong>server</strong> (<em>service provider</em>) <bcp14>MUST</bcp14> authenticate their identity through their IdP. The details of each basic operation in the symmetric process are the same as the corresponding single ecosystem specification <xref target="RFC6749"/> and <bcp14>MUST</bcp14> maintain alignment with it over time.</t>
      <t>The authentication sequence between a consumer and a resource provider operating in different environments will be:</t>
      <t><strong><em>1.</em></strong> Entities exchange the access tokens received from their authentication server with each other.<br/>
        <strong><em>2.</em></strong> Entities send the received token to their authentication server.<br/>
        <strong><em>3.</em></strong> Authentication servers exchange access tokens with each other.<br/>
        <strong><em>4.</em></strong> Authentication servers verify tokens with their original.<br/>
        <strong><em>5.</em></strong> Authentication servers send the result to their own entity.<br/>
        <strong><em>6.</em></strong> Entities are authenticated and can now exchange information.</t>
      <t>Conceptually, in a client-server schema, the authentication process begins with the resource owner requesting access to the protected resource to the service provider. Both respond with their access tokens and request their IdP to validate the received token. The IdPs exchange tokens for validation and send the result to their entity. On success, access to the resource is allowed.</t>
      <t>Figure 3 shows the abstract depiction of the symmetric authentication sequence. A SVG image is available <eref target="https://raw.githubusercontent.com/Luigi-Sbriz/identity/main/images/3_Symmetric-sequence-diagram.svg">here</eref>.</t>
      <artwork><![CDATA[
┌───────────┐                                            ┌───────────┐
│Relying    ├-(1)--Request Authentication--------------->│Authorizati│
│           │                                            │           │
│Party      │<-(2)-Return Server Token-------------------┤on Server S│
└───────────┘                                            └───────────┘
┌───────────┐      ┌───────────┐      ┌───────────┐      ┌───────────┐
│Resource   │      │User       │      │Authorizati│      │Relying    │
│           │      │           │      │           │      │           │
│Owner      │      │Agent      │      │on Server C│      │Party      │
└─────┬─────┘      └─────┬─────┘      └─────┬─────┘      └─────┬─────┘
      |      Request     |                  |                  |
      ├-(3)--Protected-->+-(4)--Send Access Request----------->|
      |      Resource    |                  |                  |
      |                  |<-(5)-Return Server Token------------┘
      |                  |                  |
      |                  ├(6)-Request Client|
      |                  |  Token & Send    |
      |                  |  Server Token--->|
      |                  |                  |
      |<-(7)-Request Credentials via UA-----┤
      |                  |                  |
      └-(8)--Present Credentials via UA---->|
                         |                  |
                         └<-(9)---Return    |
                            Client Token----┘
┌───────────┐      ┌───────────┐      ┌───────────┐      ┌───────────┐
│User       │      │Authorizati│      │Authorizati│      │Relying    │
│           │      │           │      │           │      │           │
│Agent      │      │on Server C│      │on Server S│      │Party      │
└─────┬─────┘      └─────┬─────┘      └─────┬─────┘      └─────┬─────┘
      |                  |                  |                  |
      ├-(10)--Request Protected Resource & Send Client Token-->|
      |                  |                  |                  |
      |                  |<-(12)---Send     |<-(11)---Send     |
      |                  |  Client Token----┤  Client Token----┤
      |                  |                  |                  |
      |                  ├-(13)---Return    |                  |
      |                  |  Server Token--->|                  |
      |                  |                  |                  |
      └<-(14)--Return of |                  └-(15)--Return of  |
         Authorization---┘                     Authorization-->┘
┌───────────┐      ┌───────────┐      ┌───────────┐      ┌───────────┐
│Resource   │      │User       │      │Relying    │      │Resource   │
│           │      │           │      │           │      │           │
│Owner      │      │Agent      │      │Party      │      │Server     │
└─────┬─────┘      └─────┬─────┘      └─────┬─────┘      └─────┬─────┘
      |                  |                  |                  |
      |                  |                  ├(16)Call Protected|
      |                  |                  | Resource-------->|
      |                  |                  |                  |
      └<-(19)-----Return |<-(18)-----Return |<-(17)-----Return |
        Protect.Resource-┘ Protect.Resource-┘ Protect.Resource-┘

Figure 3: Symmetric Authentication Protocol - Sequence diagram
]]></artwork>
      <t>(1) - (2)       The <strong><em>RP</em></strong> requests authentication to its <strong><em>AS</em></strong> (marked "S" as server) and receives the server token (access token from the service provider's AS). The relying party must be provided with its own access token to resolve multiple requests.<br/>
(3) - (5)       The <strong><em>RO</em></strong> requests access to the protected resource via the user agent. The <strong><em>UA</em></strong> activates the authentication process by requesting access to the <strong><em>RP</em></strong>, which responds by providing the server token. The response may also include the server ID token.<br/>
(6) - (9)       The <strong><em>UA</em></strong> requests the client token (access token from the client's AS) to its <strong><em>AS</em></strong> (marked "C" as client), sending also the server token received from <strong><em>RP</em></strong>. The client's <strong><em>AS</em></strong> requests credentials from the <strong><em>RO</em></strong> and returns the client token to the <strong><em>UA</em></strong>.<br/>
(10) - (11)     The <strong><em>UA</em></strong> requests the protected resource from the <strong><em>RP</em></strong> by sending the client token. Then, relying party requests to service provider's AS to verify the client token.<br/>
(12) - (15)     Both authentication servers must verify that the tokens received match the originals. Then, client's AS informs the <strong><em>UA</em></strong> of the outcome and the same is done by the service provider's AS to the <strong><em>RP</em></strong>. The outcome sent to the relying party may also include the client ID token.<br/>
(16) - (17)     The <strong><em>RP</em></strong> notifies the <strong><em>RS</em></strong> of the legitimate request of '<strong><em>UA</em></strong>. The <strong><em>RS</em></strong> returns the protected resource to <strong><em>RP</em></strong>.<br/>
(18) - (19) The <strong><em>RP</em></strong> sends the protected resource to <strong><em>UA</em></strong>, which then presents it to the requester <strong><em>RO</em></strong>.</t>
      <t><strong><em>Notes regarding some steps:</em></strong><br/>
(4) If the server token is not available at this time, sequence (1) - (2) will be executed between steps (4) and (5) to provide the server token. Additionally, this change may also be necessary for a periodic refresh of the server token or if the entities are both clients.<br/>
(6) The client's authorization could be performed in advance and the client token stored securely by the user agent for handling multiple authentication requests. This means performing only the server token communication here, avoiding the following steps (7) - (9) because already done.</t>
      <t>The verification of the authenticity of the tokens is carried out by the IdPs who exchange messages on a dedicated network to reduce the risk of intrusion. Security is strengthened by the presence of two interfaces for the exchange of tokens, one is for the party in trust and the other is for the opposing party. If one is compromised, the other interrupts the flow avoiding authorization. The trust placed in the mutual validation of messages avoids having to merge authentication domains, leaving great flexibility to the system as a whole.</t>
      <t>Identity recognition information resides only with a trusted identity provider. This reduces the need to store too much personal information in Internet registrations. Furthermore, to easily identify which IdP holds the entity's authentication credentials, it can be easily extracted from the username structure if this is defined following the same technique used to compose an email address <xref target="RFC5322"/>, that means an username, an @ sign, and a domain name.</t>
    </section>
    <section anchor="identity-provider-trustee-concept">
      <name>Identity Provider - Trustee Concept</name>
      <t>The symmetric authentication protocol bases its functioning on the existence of trusted entities, called <strong><em>identity providers (IdPs)</em></strong>. The identity provider is the owner of a digital ecosystem and, in addition to the authentication service in its own domain, also guarantees the secure transmission of authentication messages on other domains according to the symmetric authentication scheme already mentioned. Before being able to use the authentication service, it is necessary to register the natural or legal persons who need the digital identity. The integrity and confidentiality of this information must be guaranteed both in the registration process and in the authentication phases. The need for a high degree of confidentiality of the link between the digital identity and the real one requires the creation of a special category of IdPs with constraints linked to the laws of the real world.</t>
      <t>In the specific network between IdPs, authentication messages are exchanged to ensure digital identity. Each IdP acts as a point of reference for the identity authentication service in its digital ecosystem, and must be able to communicate with every other IdP to recognize identities belonging to other ecosystems, securely from intrusions or tampering. The effectiveness of the entire authentication system depends on the trust placed in these identity providers but it must be deserved. This requires a robust organisation, subject to systematic oversight by independent certification body, to ensure transparent operational management by the IdPs.</t>
      <section anchor="importance-of-this-role">
        <name>Importance of this role</name>
        <t>The identity provider is the guarantor of the authenticity of the relationship between digital credentials and the identity of natural or legal persons in digital communication. For this role it can also be called an <strong>ID trustee</strong> and the greatest criticality it must face is the inviolability of the messages exchanged. Furthermore, when processing personal data, the laws of the country to which the data subject belongs must be considered. It may also provide additional services (e.g. anonymous email, answering machine, anonymous accounts,...), but always in full compliance with the applicable law and only if they do not present risk for the data subject. Anonymization services are intended exclusively for the intended recipient but not for the authority exercising the applicable law (e.g. for a whistleblowing).</t>
        <t>An IdP <bcp14>MUST</bcp14> be a legal entity subject to both the laws of the country to which it belongs and to international certification bodies, to guarantee compliance with this standard, the security of the information processed, the expected level of quality of service and the lawful processing of data.</t>
      </section>
      <section anchor="infrastructure">
        <name>Infrastructure</name>
        <t>The infrastructure underlying symmetric communication is the IdP Network, dedicated to the exchange of authentication messages between IdPs. Ideally, each IdP always has two connectors, one to communicate with its trusted entity and the other to exchange messages with another IdP. With its own entity the mechanism is exactly the one defined by <xref target="RFC6749"/>. With other IdPs, a reserved channel is required for the exchange of tokens, which provides guarantees on the integrity of the messages and their origin. This channel <bcp14>SHOULD</bcp14> have low latency because it represents an additional step compared to the single ecosystem authentication scheme. The intended mechanism for sharing messages is that of a mail server <xref target="RFC5321"/>. The process for adding a new node (IdP) in the IdP Network <bcp14>MUST</bcp14> require the identification of the legal entity that owns the node, but also the registration of identification data of the installed network devices, for security controls on the reliability of the node itself. Any variation must be promptly updated or the node will be disabled.</t>
        <t>The dedicated network for the identity providers is not technically necessary for the authentication protocol but is essential for security, to reduce the risk of fraud or identity theft and, to ensure trust in lawful behavior. There <bcp14>MUST</bcp14> also be an international control body over IdPs and the management of the IdP Network. This authority will be responsible for governing the overall system, i.e. defining technical standards, or carrying out audits to ensure compliance with the rules, or acting to exclude nodes in case of violation of the rules.</t>
      </section>
    </section>
    <section anchor="identity-provider-custodian-concept">
      <name>Identity Provider - Custodian Concept</name>
      <t>The relationship between digital and physical identity should be managed only by a particular identity provider, called <strong><em>identity custodian (IdC)</em></strong>, who has the legal authority to manage the personal data of the natural person. Only in this way it will be the perfect candidate to guarantee the identity provider the validity of the request for the release of a new digital identity, without having to disclose the physical identity to the IdP. Guaranteeing the digital identity of a user corresponding to a legal entity will not be the task of the identity custodian but of an authority or a process compliant with the law of the country to which the legal entity belongs. The identity token contains the indication between users of a natural person or a legal entity. The identity token makes it possible to distinguish the user of a natural or legal person and to know who has guaranteed the physical identity. An identity custodian can also act as an identity trustee, keeping roles distinct in communication protocols.</t>
      <section anchor="general-schema">
        <name>General schema</name>
        <t>The identity custodian certifies that it is a real identity that requires the digital identity but can also provide personal data to identity trustee with the consent of the data subject. The identity trustee provides the authentication service for its digital ecosystem. A use case describing the relationship between identity custodian, identity trustee, and digital identity is provided in figure 4. A SVG image is available <eref target="https://raw.githubusercontent.com/Luigi-Sbriz/identity/main/images/4_Identity-custodian-concept.svg">here</eref>.</t>
        <artwork><![CDATA[
............................              ............................
: Real ecosystem X         :              :         Real ecosystem Y :
:              ...................  ...................              :
:              :Digital          :  :          Digital:              :
:              :ecosystem A      :  :      ecosystem B:              :
:              :  ┌───────────┐  :  :  ┌───────────┐  :              :
:              :  │  Digital  │  :  :  │  Digital  │  :              :
:      ┌──────────┤           ├────────┤           ├──────────┐      :
:      │       :  │Identity A │  :  :  │Identity B │  :       │      :
:      │       :  └─────┬─────┘  :  :  └─────┬─────┘  :       │      :
:      │       :        │        :  :        │        :       │      :
:┌─────┴─────┐ :  ┌─────┴─────┐  :  :  ┌─────┴─────┐  : ┌─────┴─────┐:
:│ Identity  │ :  │ Identity  │  :  :  │ Identity  │  : │ Identity  │:
:│           ╞════╡           ╞════════╡           ╞════╡           │:
:│Custodian X│ :  │Provider A │  :  :  │Provider B │  : │Custodian Y│:
:└───────────┘ :  └───────────┘  :  :  └───────────┘  : └───────────┘:
: Real         :                 :  :                 :         Real :
: identity A   :.................:  :.................:   identity B :
:                          :              :                          :
:..........................:              :..........................:

Figure 4: The Identity Custodian Use Case
]]></artwork>
        <t>Generally, identity provider must carry out the recognition and registration of the user's personal data before being able to guarantee its identity. The collection of the data of the natural person must be carried out in accordance with the protection provided for by the regulations in force. To ensure that the processing of personal data is restricted and controlled, it is useful to divide the set of IdPs into two categories. In the first, there will be IdPs (also called trustees) that only manage digital identity operations, and in the second, IdCs (identity custodians) that guarantee trustees that the applicant's identity is real. The IdC's category should operate under the responsibility of the legal authority that manages the real identity of the individual (i.e. who issues the identity card).</t>
        <t>Through the identity custodian, each individual can request the issuing of a new digital identity to their trusted IdP. It will be the trusted IdP who will ask for confirmation of the applicant's authenticity directly from the IdC. The applicant must send an ID token with their IdC contact information to initiate the request. The request will be managed entirely online and will not require any personal data from the data subject but, subject to consent, everything will be sent by the IdC. The new identity will be useful to meet the typical needs of transactions on the Internet, with the right confidentiality for the holder and an added value for the authority, being able to identify the real person. The digital legal identity to sign contracts should be managed directly by IdC.</t>
        <t>In short the roles involved in the trust-based authentication system.
- The <strong><em>identity custodian</em></strong> is the guarantor of the existence of the natural person and has the ability to uniquely identify it but only following a formal request from the legitimate authority.<br/>
- The <strong><em>identity provider</em></strong> receives the identification data that the data subject has decided to provide and will match these to the digital identity.<br/>
- The <strong><em>service provider</em></strong> will have the guarantee that the user is linked to a real person for security, contractual or legal reasons.<br/>
- The <strong><em>data subject</em></strong> can provide personal information according to their need, also maintaining anonymity.<br/>
- The <strong><em>public authority</em></strong> that manages the real data will be able to identify the individual with certainty in case of violations of the law (i.e. to protect the service provider).</t>
        <section anchor="issuing-of-a-new-digital-identity">
          <name>Issuing of a New Digital Identity</name>
          <t>The request for a new digital identity is activated by the natural person towards the chosen trustee. The trustee will request confirmation from the identity custodian if the request lawfully came from a real person. In case of confirmation, it will record the personal data that the data subject has authorized IdC to transfer. A use case describing the request of a new digital identity is provided in figure 5. A SVG image is available <eref target="https://raw.githubusercontent.com/Luigi-Sbriz/identity/main/images/5_New-identity-use-case.svg">here</eref>.</t>
          <artwork><![CDATA[
                  ┌───────────┐        ┌───────────┐
                  │Identity   │        │Identity   │
                  │           │        │           │
                  │Custodian  │        │Provider   │
                  └─────┬─────┘        └─────┬─────┘
                  IdC   │              IdP   │
               ecosystem│           ecosystem│
               .........│.........  .........│.........
               :  ┌─────┴─────┐  :  :  ┌─────┴─────┐  :
               :  │Authorizat.│  :  :  │Authorizat.│  :
               :  │           ╞════════╡           │  :
               :  │Server IdC │  :  :  │Server IdP │  :
               :  └─────┬─────┘  :  :  └─────┬─────┘  :
               :        │        :  :        │        :
┌───────────┐  :  ┌─────┴─────┐  :  :  ┌─────┴─────┐  :
│Data       │  :  │User       │  :  :  │Relying    │  :
│           ├─────┤           ├────────┤           │  :
│Subject    │  :  │Agent      │  :  :  │Party  IdP │  :
└───────────┘  :  └───────────┘  :  :  └───────────┘  :
               :.................:  :.................:

Figure 5: Abstract of New Digital Identity Request
]]></artwork>
          <t>Figure 6 shows the abstract representation of the message exchange sequence to request a new digital identity. A SVG image is available <eref target="https://raw.githubusercontent.com/Luigi-Sbriz/identity/main/images/6_New-identity-sequence-diagram.svg">here</eref>.</t>
          <artwork><![CDATA[
┌───────────┐      ┌───────────┐      ┌───────────┐      ┌───────────┐
│Data       │      │User       │      │Authorizat.│      │Relying    │
│           │      │           │      │           │      │           │
│Subject    │      │Agent      │      │Server IdC │      │Party  IdP │
└───────────┘      └─────┬─────┘      └─────┬─────┘      └─────┬─────┘
      |                  |                  |                  |
      ├-(1)-Request New->+-(2)--Send New Identity Request----->|
      |     Identity     |                  |                  |
      |                  |<--(3)--Return IdP Token-------------┘
      |                  |                  |
      |                  ├(4)--Request IdC  |
      |                  |     Token & Send |
      |                  |     IdP Token--->|
      |                  |                  |
      |<-(5)-Request Credentials via UA-----┤
      |                  |                  |
      └-(6)--Present Credentials via UA---->|
                         |                  |
                         └<--(7)--Return    |
                                  IdC Token-┘
┌───────────┐      ┌───────────┐      ┌───────────┐      ┌───────────┐
│User       │      │Authorizat.│      │Authorizat.│      │Relying    │
│           │      │           │      │           │      │           │
│Agent      │      │Server IdC │      │Server IdP │      │Party  IdP │
└─────┬─────┘      └─────┬─────┘      └─────┬─────┘      └─────┬─────┘
      |                  |                  |                  |
      ├-(8)--Request New Identity & Send IdC Token------------>|
      |                  |                  |                  |
      |                  |<--(10)--Send IdC |<--(9)--Send IdC  |
      |                  |         Token----┤        Token-----┤
      |                  |                  |                  |
      |                  ├-(11)--Return IdP |                  |
      |                  |     Token & Send |                  |
      |                  |     ID Token---->|                  |
      |                  |                  |                  |
      └<-(12)---Return   |                  └-(13)---Return    |
                ID Token-┘                     Client Token--->┘
┌───────────┐                ┌───────────┐               ┌───────────┐
│Data       │                │User       │               │Relying    │
│           │                │           │               │           │
│Subject    │                │Agent      │               │Party  IdP │
└─────┬─────┘                └─────┬─────┘               └─────┬─────┘
      |                            |                           |
      └<-(15)------Return ID Token-┘<-(14)-Return Client Token-┘

Figure 6: New Digital Identity Request - Sequence diagram
]]></artwork>
          <t>(1) - (3)       The <strong><em>data subject</em></strong> requests the new digital identity via the user agent to the identity provider. The <strong><em>UA</em></strong> activates the authentication process by requesting the new identity to the <strong><em>RP</em></strong>, which responds by providing the IdP token (access token from IdP's AS).<br/>
(4) - (7)       The <strong><em>UA</em></strong> requests the IdC token (access token from the custodian's AS) to its <strong><em>AS</em></strong>, sending also the IdP token received from <strong><em>RP</em></strong>. The custodian's <strong><em>AS</em></strong> requests credentials from the <strong><em>data subject</em></strong> and returns the IdC token to the <strong><em>UA</em></strong>.<br/>
(8) - (9)       The <strong><em>UA</em></strong> requests the new digital identity from the <strong><em>RP</em></strong> by sending the IdC token. Then, relying party requests to identity provider's AS to verify the IdC token.<br/>
(10) - (11)     Both authentication servers must verify that the tokens received match the originals. If required by data subject, the custodian's AS will send an additional ID token with personal data.<br/>
(12) - (13)     Custodian's AS informs the <strong><em>UA</em></strong> of the outcome and, if required, sends also a copy of the ID token. The identity provider's AS sends to the <strong><em>RP</em></strong> the client token (related the new identity provided by IdP).<br/>
(14) - (15) The <strong><em>RP</em></strong> sends the client token to <strong><em>UA</em></strong>, which then informs the <strong><em>data subject</em></strong> of the outcome and, if required, sends a readable copy of the ID token to check the personal information shared.</t>
          <t><strong><em>Notes regarding some steps:</em></strong><br/>
(3) If the relying party does not have the IdP token available, this will be requested from the authentication server after step (2).<br/>
(4) IdC token does not contains any real identity information as default. If requested, an ID token with a standard set of real information can be included during this step.</t>
          <t>Any new digital identity with legal value is issued according to the rules defined by the relevant authority. It is presumable that there is also physical recognition of the data subject before the provision of credentials but no reference model is defined in this document.</t>
        </section>
      </section>
    </section>
    <section anchor="sustainable-digital-identity-trust-schema">
      <name>Sustainable Digital Identity Trust Schema</name>
      <t>For the effectiveness of the identity trust system based on the paradigm of trust towards a third party recognizable as reliable, it is necessary to guarantee a transparent and verifiable mechanism. The objective is to achieve universal participation and it is only possible if trust in the system as a whole is demonstrable. For this reason it is necessary to establish founding principles that guide the rules to guarantee equal dignity and balance in all components of the system. The following nine principles are established:</t>
      <ol spacing="normal" type="1"><li>
          <t>The digital identity can be cancelled or deleted without impacting the physical identity.</t>
        </li>
        <li>
          <t>The digital identity must be linkable to the physical identity in a verifiable manner.</t>
        </li>
        <li>
          <t>Only the authority that legally manages the individual's physical identity can verify this link.</t>
        </li>
        <li>
          <t>The authentication system must be flexible (i.e., able to adapt to technological evolutions or emerging needs).</t>
        </li>
        <li>
          <t>The authentication system must be accessible to all potential users (i.e., without discriminatory costs).</t>
        </li>
        <li>
          <t>The authentication system must be secure (i.e., continuously aligned with security best practices).</t>
        </li>
        <li>
          <t>The authentication system must be privacy-friendly (i.e., not requiring any personal information unless strictly necessary).</t>
        </li>
        <li>
          <t>The authentication system must be resilient (i.e., with availability appropriate for needs and the ability to cope with adversity).</t>
        </li>
        <li>
          <t>The authentication system technology must be open (i.e., able to evolve based on transparent shared standards and verifiable developments).</t>
        </li>
      </ol>
      <t>To guarantee the principles set out, the requirements of the authentication system <bcp14>MUST</bcp14> include the protection of personal data and the guarantee of anonymity for lawful purposes, that is:</t>
      <ol spacing="normal" type="1"><li>
          <t>Ensure mutual recognition to guarantee the identity of the provider to the consumer.</t>
        </li>
        <li>
          <t>Ensure the capability to authenticate the digital identities of consumers and providers against their real-world identity, without unnecessarily exposing real data.</t>
        </li>
      </ol>
      <t>The capability to validate the authenticity of the relationship between digital identity and physical identity lies only with the public authority responsible for managing the citizen's identity. Operationally, it is implemented through a digital identity recognition service (i.e. IdC), technologically compliant with the operational protocols of an identity provider but under the supervision of the public authority.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>There are some cautionary points regarding security that need to be considered.
- Integrity and resilience are the most critical parameters. The integrity of the messages is fundamental to guarantee the authenticity of the identity, while the availability of the authentication service is the basis for ensuring the feasibility of the entire process.
- Symmetric authentication contrast the risk of man-in-the-middle attack because it should successfully attack both message flows at the same time.
- The trustee is a critical component of the identity system and must be subjected to rigorous checks on compliance with the standards.
- The relying party and the resourse server should be on different servers using a dedicated communication channel.</t>
      <t>Referring to the term identification, we mean at least three different types, the device, the digital user and the individual.</t>
      <ul spacing="normal">
        <li>
          <t>The <strong><em>device</em></strong> is identified with technical methods suited to the various needs. For example, geolocalization using International Mobile Equipment Identity (IMEI) <xref target="ITU1"/> and Integrated Circuit Card ID (ICCID) <xref target="ITU2"/>.</t>
        </li>
        <li>
          <t>The <strong><em>digital user</em></strong> is well managed by <xref target="RFC6749"/> but inside the digital ecosystem. To manage users of multiple domains, either the user registrations are duplicated for each domain involved, or the domains involved are joined in a trust relationship.</t>
        </li>
        <li>
          <t>The <strong><em>individual</em></strong>, or natural person, is well managed with classic physical methods (e.g. photo ID) but the link with the digital identity needs to be improved because the quality is not satisfactory. This topic is beyond the scope of this specification and it was explored for example in <xref target="LS3"/>.</t>
        </li>
      </ul>
      <t>An in-depth defense system <bcp14>SHOULD</bcp14> consider all the components involved and in this case not just the pure digital authentication of the user. In this document only the digital user is treated but extensions applicable to mixed situations with multiple types are certainly welcome to improve the overall security profile.</t>
      <section anchor="user-registration">
        <name>User registration</name>
        <t>It is important to control the amount of data exchanged during the authentication process but also that the data required to issue a new digital identity are the only ones strictly necessary. To assign access credentials to a protected resource to a user, a process of recording the user's identification and contact data is necessary, as they are necessary for the authentication of the digital identity and for the attribution of access rights to the resource. Data provided or exchanged with IdPs <bcp14>MUST</bcp14> comply with the need-to-know principle. Three ways of recording are required.</t>
        <section anchor="registration-with-an-identity-custodian-idc">
          <name>Registration with an identity custodian (IdC).</name>
          <t>The IdC has the legal authority to retain all personal data essential to complete the process of recognizing the real individual. Consequently it also has full authority over digital identity data and registration is subject to the law of the individual's country of origin.</t>
        </section>
        <section anchor="registration-with-an-identity-provider-idp">
          <name>Registration with an identity provider (IdP).</name>
          <t>The IdP has to guarantee the authenticity of the digital identity and the collection of personal data <bcp14>SHOULD</bcp14> be limited to the sole purpose of this operation. For the registration of a natural person, the IdP requests confirmation from the IdC of the real identity of the applicant before issuing the digital identity. The process is completely online and does not require any physical recognition. For legal entities, the data is provided by the owner or a delegate.</t>
        </section>
        <section anchor="registration-with-a-service-provider-sp">
          <name>Registration with a service provider (SP).</name>
          <t>The service provider <bcp14>SHOULD</bcp14> know only the data necessary to build the authorization roles to govern access to resources and nothing more. These are provided directly by the user or by an ID token, in addition to those received automatically from their IdP relating to digital identity.</t>
        </section>
      </section>
    </section>
    <section anchor="conclusions">
      <name>Conclusions</name>
      <t>To operate effectively between the different digital ecosystems, the identity management system <bcp14>MUST</bcp14> be based on a common authentication protocol that symmetrically carries out the same operations in complete transparency, entrusting the decision on recognition to a trusted third party. Confidence in the reliability of recognition carried out by the identity guarantor (IdP or IdC) cannot be based on the technological component alone. It is therefore necessary to involve an independent supervisory authority for technological aspects and the local competent public authority responsible for data protection.</t>
      <t>To improve trust in the digital operations between the consumer and the service provider three guarantees must be provided.</t>
      <ol spacing="normal" type="1"><li>
          <t>The mutual recognition between consumer and service provider.</t>
        </li>
        <li>
          <t>The control and minimization of the personal information processed.</t>
        </li>
        <li>
          <t>In case of legal need, the ability to match the digital identities of consumer and provider against their real-world identity.</t>
        </li>
      </ol>
      <t>Due to the strong synergy that can be achieved, it is advisable to maintain constant technical alignment with the standard <xref target="RFC6749"/> and the related specifications to implement point-to-point authentication, within the broader symmetric authentication framework.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC6749">
          <front>
            <title>The OAuth 2.0 Authorization Framework</title>
            <author fullname="D. Hardt" initials="D." role="editor" surname="Hardt"/>
            <date month="October" year="2012"/>
            <abstract>
              <t>The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf. This specification replaces and obsoletes the OAuth 1.0 protocol described in RFC 5849. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6749"/>
          <seriesInfo name="DOI" value="10.17487/RFC6749"/>
        </reference>
        <reference anchor="RFC5322">
          <front>
            <title>Internet Message Format</title>
            <author fullname="P. Resnick" initials="P." role="editor" surname="Resnick"/>
            <date month="October" year="2008"/>
            <abstract>
              <t>This document specifies the Internet Message Format (IMF), a syntax for text messages that are sent between computer users, within the framework of "electronic mail" messages. This specification is a revision of Request For Comments (RFC) 2822, which itself superseded Request For Comments (RFC) 822, "Standard for the Format of ARPA Internet Text Messages", updating it to reflect current practice and incorporating incremental changes that were specified in other RFCs. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5322"/>
          <seriesInfo name="DOI" value="10.17487/RFC5322"/>
        </reference>
        <reference anchor="RFC5321">
          <front>
            <title>Simple Mail Transfer Protocol</title>
            <author fullname="J. Klensin" initials="J." surname="Klensin"/>
            <date month="October" year="2008"/>
            <abstract>
              <t>This document is a specification of the basic protocol for Internet electronic mail transport. It consolidates, updates, and clarifies several previous documents, making all or parts of most of them obsolete. It covers the SMTP extension mechanisms and best practices for the contemporary Internet, but does not provide details about particular extensions. Although SMTP was designed as a mail transport and delivery protocol, this specification also contains information that is important to its use as a "mail submission" protocol for "split-UA" (User Agent) mail reading systems and mobile environments. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5321"/>
          <seriesInfo name="DOI" value="10.17487/RFC5321"/>
        </reference>
        <reference anchor="RFC5234">
          <front>
            <title>Augmented BNF for Syntax Specifications: ABNF</title>
            <author fullname="D. Crocker" initials="D." role="editor" surname="Crocker"/>
            <author fullname="P. Overell" initials="P." surname="Overell"/>
            <date month="January" year="2008"/>
            <abstract>
              <t>Internet technical specifications often need to define a formal syntax. Over the years, a modified version of Backus-Naur Form (BNF), called Augmented BNF (ABNF), has been popular among many Internet specifications. The current specification documents ABNF. It balances compactness and simplicity with reasonable representational power. The differences between standard BNF and ABNF involve naming rules, repetition, alternatives, order-independence, and value ranges. This specification also supplies additional rule definitions and encoding for a core lexical analyzer of the type common to several Internet specifications. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="68"/>
          <seriesInfo name="RFC" value="5234"/>
          <seriesInfo name="DOI" value="10.17487/RFC5234"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="ITU1" target="https://www.itu.int/dms_pub/itu-t/opb/tut/T-TUT-CCICT-2020-PDF-E.pdf">
          <front>
            <title>QTR-RLB-IMEI - Reliability of International Mobile Station Equipment Identity (IMEI), Technical Report</title>
            <author>
              <organization>International Telecommunications Union</organization>
            </author>
            <date year="2020" month="July"/>
          </front>
        </reference>
        <reference anchor="ITU2" target="https://www.itu.int/rec/T-REC-E.118">
          <front>
            <title>E.118: The International Telecommunication Charge Card</title>
            <author>
              <organization>International Telecommunications Union</organization>
            </author>
            <date year="2006" month="May"/>
          </front>
        </reference>
        <reference anchor="LS1" target="https://www.isaca.org/resources/isaca-journal/issues/2022/volume-2/a-symmetrical-framework-for-the-exchange-of-identity-credentials-based-on-the-trust-paradigm-part-1">
          <front>
            <title>A Symmetrical Framework for the Exchange of Identity Credentials Based on the Trust Paradigm, Part 1: Identity Trust Abstract Model, ISACA Journal, vol.2</title>
            <author initials="L." surname="Sbriz" fullname="Luigi Sbriz">
              <organization/>
            </author>
            <date year="2022" month="April"/>
          </front>
        </reference>
        <reference anchor="LS2" target="https://www.isaca.org/resources/isaca-journal/issues/2022/volume-2/a-symmetrical-framework-for-the-exchange-of-identity-credentials-based-on-the-trust-paradigm-part-2">
          <front>
            <title>A Symmetrical Framework for the Exchange of Identity Credentials Based on the Trust Paradigm, Part 2: Identity Trust Service Implementation, ISACA Journal, vol.2</title>
            <author initials="L." surname="Sbriz" fullname="Luigi Sbriz">
              <organization/>
            </author>
            <date year="2022" month="April"/>
          </front>
        </reference>
        <reference anchor="LS3" target="https://www.isaca.org/resources/isaca-journal/issues/2023/volume-1/how-to-digitally-verify-human-identity">
          <front>
            <title>How to Digitally Verify Human Identity: The Case of Voting, ISACA Journal, vol.1</title>
            <author initials="L." surname="Sbriz" fullname="Luigi Sbriz">
              <organization/>
            </author>
            <date year="2023" month="January"/>
          </front>
        </reference>
        <reference anchor="LS4" target="https://www.isaca.org/resources/isaca-journal/issues/2023/volume-6/modeling-an-identity-trust-system">
          <front>
            <title>Modeling an Identity Trust System, ISACA Journal, vol.6</title>
            <author initials="L." surname="Sbriz" fullname="Luigi Sbriz">
              <organization/>
            </author>
            <date year="2023" month="November"/>
          </front>
        </reference>
        <reference anchor="LS5" target="https://www.isaca.org/resources/isaca-journal/issues/2025/volume-2/the-role-of-the-identity-provider">
          <front>
            <title>The Role of the Identity Provider, ISACA Journal, vol.2</title>
            <author initials="L." surname="Sbriz" fullname="Luigi Sbriz">
              <organization/>
            </author>
            <date year="2025" month="February"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 519?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>This document was prepared using a text editor with Markdown syntax (kramdown-rfc dialect).</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
