<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.2 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-sbriz-identity-trust-system-00" category="std" consensus="true" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.18.2 -->
  <front>
    <title abbrev="Identity Trust">Identity Trust System</title>
    <seriesInfo name="Internet-Draft" value="draft-sbriz-identity-trust-system-00"/>
    <author initials="L." surname="Sbriz" fullname="Luigi Sbriz">
      <organization>Cybersecurity &amp; Privacy Senior Consultant</organization>
      <address>
        <email>luigi@sbriz.eu</email>
      </address>
    </author>
    <date year="2023" month="November" day="16"/>
    <area>SEC</area>
    <workgroup>Web Authorization Protocol</workgroup>
    <abstract>
      <?line 79?>

<t>This document describes the identity trust system, which is an open identity authentication system that does not require federation of authentication domains. It is based on a symmetric authentication protocol and a specific infrastructure to ensure trust in the identity providers (IdPs). Regarding the main components:</t>
      <ol spacing="normal" type="1"><li>
          <t>Symmetric authentication protocol - Both entities <bcp14>MUST</bcp14> recognize each other and are authenticated by their identity provider according to a symmetric scheme. This protocol builds on and extends the OAuth Authorization Framework RFC6749.</t>
        </li>
        <li>
          <t>Trustees' network - A special network, dedicated to creating a protected environment for exchanging authentication messages between IdPs, constitutes the infrastructure to avoid domain federation.</t>
        </li>
        <li>
          <t>Custodian concept - IdPs are divided into two typologies to better protect personal data. A generic IdP (called trustee) for pure digital authentication and a specific IdP (called custodian) under the control of the country's authority with legal right to the individual's real data to ensure physical identity.</t>
        </li>
      </ol>
    </abstract>
  </front>
  <middle>
    <?line 87?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The current model of access to Internet protected resources requires that the identity of the user, i.e. the <strong><em>resource owner</em></strong>, be authenticated by the resource manager, i.e. the <strong><em>service provider</em></strong>. Authentication can be indirect, this means that there is a trusted third party for both, called <strong><em>identity provider</em></strong>, which performs the authentication process. The mechanism is defined by <xref target="RFC6749"/>.</t>
      <t>This mechanism is asymmetrical, only the resource owner needs to be recognized but not vice versa. Furthermore, the digital identity has value only within its own digital ecosystem (authentication domain or set of domains in a relationship of trust between each other). Changing digital ecosystem, a new user is needed for the resource owner.</t>
      <t>It is possible to improve this process by requiring equal dignity in recognition, i.e. each entity must be recognized by the other. Consequently, the identity recognition process will be symmetrical and presents a great advantage. It is no longer necessary to define a trust between domains or create new users to be able to operate in an ecosystem different from your own.</t>
      <t>It is necessary to modify the authentication protocol to implement symmetric recognition of the digital identity. Furthermore, a network infrastructure dedicated to identity providers is required to guarantee confidentiality and reliability in the exchange of messages between them. Additionally, dividing IdPs into two categories improves security. One category will be made up of those who are only authorized to recognize digital identity, while the other category is that of identity providers with the legal authority to also manage real identity.</t>
      <section anchor="use-cases-of-both-authentication-schemes">
        <name>Use cases of both authentication schemes</name>
        <t>Figure 1 shows a use case describing the components of the classic identity recognition method with asymmetry in the authentication process <xref target="RFC6749"/>. A SVG image is available <eref target="https://github.com/Luigi-Sbriz/identity/images/1_Asymmetric-depiction.svg">here</eref>. The scenario depicted represents a resource owner who needs to retrieve a resource from the service provider. The identity provider <bcp14>MUST</bcp14> verify the identity of the resource owner before accessing the resource server.</t>
        <artwork><![CDATA[
                  ┌───────────┐
                  │Identity   │
                  │           │
                  │Provider   │
                  └─────┬─────┘
                Digital │ecosystem
               .........│..............................
               :  ┌─────┴─────┐                       :
               :  │Authorizati│                       :
               :  │           │                       :
               :  │on Server  │                       :
               :  └─────┬─────┘                       :
               :        │                             :
               :        │                             :
┌───────────┐  :  ┌─────┴─────┐        ┌───────────┐  :  ┌───────────┐
│Resource   │  :  │User       │        │Relying    │  :  │Service    │
│           ├─────┤           ├────────┤           ├─────┤           │
│Owner      │  :  │Agent      │        │Party      │  :  │Provider   │
└───────────┘  :  └───────────┘        └─────┬─────┘  :  └───────────┘
               :                             │        :
               :                             │        :
               :                       ┌─────┴─────┐  :
               :                       │Resource   │  :
               :                       │           │  :
               :                       │Server     │  :
               :                       └───────────┘  :
               :......................................:

     Figure 1: Abstract Authorization Flow - Asymmetrical Case
]]></artwork>
        <t>Figure 2 shows a use case describing the components necessary to enable the identity authentication process in a symmetrical way that can operate in different digital ecosystems. A SVG image is available <eref target="https://github.com/Luigi-Sbriz/identity/images/2_Symmetric-depiction.svg">here</eref>. The new scenario depicts two different ecosystems, one for the resource owner and the other for the service provider. This means there <bcp14>MUST</bcp14> be two different identity providers interacting with each other to ensure the authentication process.</t>
        <artwork><![CDATA[
                  ┌───────────┐        ┌───────────┐
                  │Identity   │        │Identity   │
                  │           │        │           │
                  │Provider C │        │Provider S │
                  └─────┬─────┘        └─────┬─────┘
                Digital │ecosystem   Digital │ecosystem
                        │C                   │S
               .........│.........  .........│.........
               :  ┌─────┴─────┐  :  :  ┌─────┴─────┐  :
               :  │Authorizati│  :  :  │Authorizati│  :
               :  │           ╞════════╡           │  :
               :  │on Server C│  :  :  │on Server S│  :
               :  └─────┬─────┘  :  :  └─────┬─────┘  :
               :        │        :  :        │        :
               :        │        :  :        │        :
┌───────────┐  :  ┌─────┴─────┐  :  :  ┌─────┴─────┐  :  ┌───────────┐
│Resource   │  :  │User       │  :  :  │Relying    │  :  │Service    │
│           ├─────┤           ├────────┤           ├─────┤           │
│Owner      │  :  │Agent      │  :  :  │Party      │  :  │Provider   │
└───────────┘  :  └───────────┘  :  :  └─────┬─────┘  :  └───────────┘
               :                 :  :        │        :
               :                 :  :        │        :
               :                 :  :  ┌─────┴─────┐  :
               :                 :  :  │Resource   │  :
               :                 :  :  │           │  :
               :                 :  :  │Server     │  :
               :                 :  :  └───────────┘  :
               :.................:  :.................:

     Figure 2: Abstract Authorization Flow - Symmetrical Case
]]></artwork>
        <t>The two representations are very similar to each other but it is noted that the symmetric protocol introduces direct communication between the identity providers' authentication servers to allow the circular transit of authentication messages. Therefore, no trust is needed between domains. The idea was first exposed in some articles published on ISACA Journal (see <xref target="LS1"/>, <xref target="LS2"/>, <xref target="LS3"/>, <xref target="LS4"/>) with some specific use cases and examples.</t>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>Some terms are used with a precise meaning.</t>
      <ul spacing="normal">
        <li>
          <t>"<strong><em>resource owner</em></strong>": 
An entity capable of granting access to a protected resource. When the resource owner is a person, it is referred to as an end-user or an individual. This is sometimes abbreviated as "<strong><em>RO</em></strong>".</t>
        </li>
        <li>
          <t>"<strong><em>service provider</em></strong>": 
An entity capable of managing access to a protected resource. It is generally a legal person. This is sometimes abbreviated as "<strong><em>SP</em></strong>".</t>
        </li>
        <li>
          <t>"<strong><em>identity provider</em></strong>": 
An entity capable of managing and recognizing the identity of registered entities. The set of all entities registered by the identity provider is also known as the IdP's digital ecosystem. This is sometimes abbreviated as "<strong><em>IdP</em></strong>".</t>
        </li>
        <li>
          <t>"<strong><em>resource server</em></strong>": 
The server hosting the protected resources, capable of accepting and responding to protected resource requests using access tokens. The resource server is often accessible via an API. This is sometimes abbreviated as "<strong><em>RS</em></strong>".</t>
        </li>
        <li>
          <t>"<strong><em>client</em></strong>" or "<strong><em>user agent</em></strong>": 
An application making protected resource requests on behalf of the resource owner and with its authorization. The term "client" does not imply any particular implementation characteristics (e.g., whether the application executes on a server, a desktop, or other devices).</t>
        </li>
        <li>
          <t>"<strong><em>relying party</em></strong>": 
An application making protected resource authorization on behalf of the service provider and also managing its identity. The "relying party" acts as the "client" but on service provider side. This is sometimes abbreviated as "<strong><em>RP</em></strong>".</t>
        </li>
        <li>
          <t>"<strong><em>authorization server</em></strong>": 
The server issuing access tokens to the client after successfully authenticating the resource owner and obtaining authorization. This is sometimes abbreviated as "<strong><em>AS</em></strong>".</t>
        </li>
        <li>
          <t>"<strong><em>access token</em></strong>": 
The concept is the same of the <xref target="RFC6749"/>, a tiny piece of code that contains the necessary authentication data, issued by the authorization server.</t>
        </li>
        <li>
          <t>"<strong><em>identity token</em></strong>" or "<strong><em>ID token</em></strong>": 
The structure is similar to access token but it is used as proof that the user has been authenticated. The ID token may have additional information about the user and, it is signed by the issuer with its private key. To verify the token, the issuer's public key is used.</t>
        </li>
        <li>
          <t>"<strong><em>digital ecosystem</em></strong>": 
Internet environment composed of all entities based on the same identity provider.</t>
        </li>
      </ul>
      <t>The detail of the information exchanged in the interactions between the authorization server and the requesting client, or between relying party and resource server, or the composition of tokens, is beyond the scope of this specification.</t>
    </section>
    <section anchor="symmetric-authentication-protocol">
      <name>Symmetric authentication protocol</name>
      <t>The symmetric authentication flow is conceptually not too dissimilar from the classic one on a single ecosystem <xref target="RFC5234"/>, except that the authentication is dual because the two flows reflect the same operations symmetrically. Both the <strong>client</strong> (<em>resource owner</em>) and the <strong>server</strong> (<em>service provider</em>) <bcp14>MUST</bcp14> authenticate their identity through their IdP. The details of each basic operation are the same as the corresponding individual ecosystem specification <xref target="RFC6749"/> and maintain alignment with it over time.</t>
      <t>Considering two entities, a consumer and a resource provider, each must authenticate to the other's environment. The sequence will be:</t>
      <t><strong><em>1.</em></strong> Entities exchange the access tokens received from their authentication server with each other.<br/>
        <strong><em>2.</em></strong> Entities send the received token to their authentication server.<br/>
        <strong><em>3.</em></strong> Authentication servers exchange access tokens with each other.<br/>
        <strong><em>4.</em></strong> Authentication servers verify tokens with their original.<br/>
        <strong><em>5.</em></strong> Authentication servers send the result to their own entity.<br/>
        <strong><em>6.</em></strong> Entities are authenticated and can now exchange information.</t>
      <t>Conceptually, in a client-server schema, the authentication process begins with the resource owner requesting access to the protected resource to the service provider. Both respond with their access tokens and request their IdP to validate the received token. The IdPs exchange tokens for validation and send the result to their entity. On success, access to the resource is allowed.</t>
      <t>Figure 3 shows the abstract depiction of the symmetric authentication sequence. A SVG image is available <eref target="https://github.com/Luigi-Sbriz/identity/images/3_Symmetric-sequence-diagram.svg">here</eref>.</t>
      <artwork><![CDATA[
┌───────────┐                                            ┌───────────┐
│Relying    ├-(1)--Request Authentication--------------->│Authorizati│
│           │                                            │           │
│Party      │<-(2)-Return Server Token-------------------┤on Server S│
└───────────┘                                            └───────────┘
┌───────────┐      ┌───────────┐      ┌───────────┐      ┌───────────┐
│Resource   │      │User       │      │Authorizati│      │Relying    │
│           │      │           │      │           │      │           │
│Owner      │      │Agent      │      │on Server C│      │Party      │
└─────┬─────┘      └─────┬─────┘      └─────┬─────┘      └─────┬─────┘
      |      Request     |                  |                  |
      ├-(3)--Protected-->+-(4)--Send Access Request----------->|
      |      Resource    |                  |                  |
      |                  |<-(5)-Return Server Token------------┘
      |                  |                  |
      |                  ├(6)-Request Client|
      |                  |  Token & Send    |
      |                  |  Server Token--->|
      |                  |                  |
      |<-(7)-Request Credentials via UA-----┤
      |                  |                  |
      └-(8)--Present Credentials via UA---->|
                         |                  |
                         └<-(9)---Return    |
                            Client Token----┘
┌───────────┐      ┌───────────┐      ┌───────────┐      ┌───────────┐
│User       │      │Authorizati│      │Authorizati│      │Relying    │
│           │      │           │      │           │      │           │
│Agent      │      │on Server C│      │on Server S│      │Party      │
└─────┬─────┘      └─────┬─────┘      └─────┬─────┘      └─────┬─────┘
      |                  |                  |                  |
      ├-(10)--Request Protected Resource & Send Client Token-->|
      |                  |                  |                  |
      |                  |<-(12)---Send     |<-(11)---Send     |
      |                  |  Client Token----┤  Client Token----┤
      |                  |                  |                  |
      |                  ├-(13)---Return    |                  |
      |                  |  Server Token--->|                  |
      |                  |                  |                  |
      └<-(14)--Return of |                  └-(15)--Return of  |
         Authorization---┘                     Authorization-->┘
┌───────────┐      ┌───────────┐      ┌───────────┐      ┌───────────┐
│Resource   │      │User       │      │Relying    │      │Resource   │
│           │      │           │      │           │      │           │
│Owner      │      │Agent      │      │Party      │      │Server     │
└─────┬─────┘      └─────┬─────┘      └─────┬─────┘      └─────┬─────┘
      |                  |                  |                  |
      |                  |                  ├(16)Call Protected|
      |                  |                  | Resource-------->|
      |                  |                  |                  |
      └<-(19)-----Return |<-(18)-----Return |<-(17)-----Return |
        Protect.Resource-┘ Protect.Resource-┘ Protect.Resource-┘

Figure 3: Symmetric Authentication Protocol - Sequence diagram
]]></artwork>
      <t>(1) - (2)       The <strong><em>RP</em></strong> requests authentication to its <strong><em>AS</em></strong> (marked "S" as server) and receives the server token (access token from the service provider's AS). The relying party must be provided with its own access token to resolve multiple requests.<br/>
(3) - (5)       The <strong><em>RO</em></strong> requests access to the protected resource via the user agent. The <strong><em>UA</em></strong> activates the authentication process by requesting access to the <strong><em>RP</em></strong>, which responds by providing the server token. The response may also include the server ID token.<br/>
(6) - (9)       The <strong><em>UA</em></strong> requests the client token (access token from the client's AS) to its <strong><em>AS</em></strong> (marked "C" as client), sending also the server token received from <strong><em>RP</em></strong>. The client's <strong><em>AS</em></strong> requests credentials from the <strong><em>RO</em></strong> and returns the client token to the <strong><em>UA</em></strong>.<br/>
(10) - (11)     The <strong><em>UA</em></strong> requests the protected resource from the <strong><em>RP</em></strong> by sending the client token. Then, relying party requests to service provider's AS to verify the client token.<br/>
(12) - (15)     Both authentication servers must verify that the tokens received match the originals. Then, client's AS informs the <strong><em>UA</em></strong> of the outcome and the same is done by the service provider's AS to the <strong><em>RP</em></strong>. The outcome sent to the relying party may also include the client ID token.<br/>
(16) - (17)     The <strong><em>RP</em></strong> notifies the <strong><em>RS</em></strong> of the legitimate request of '<strong><em>UA</em></strong>. The <strong><em>RS</em></strong> returns the protected resource to <strong><em>RP</em></strong>.<br/>
(18) - (19) The <strong><em>RP</em></strong> sends the protected resource to <strong><em>UA</em></strong>, which then presents it to the requester <strong><em>RO</em></strong>.</t>
      <t><strong><em>Notes regarding some steps:</em></strong><br/>
(4) If the server token is not available at this time, sequence (1) - (2) will be executed between steps (4) and (5) to provide the server token. Additionally, this change may also be necessary for a periodic refresh of the server token or if the entities are both clients.<br/>
(6) The client's authorization could be performed in advance and the client token stored securely by the user agent for handling multiple authentication requests. This means performing only the server token communication here, avoiding the following steps (7) - (9) because already done.</t>
      <t>The verification of the authenticity of the tokens is carried out by the IdPs who exchange messages on a dedicated network to reduce the risk of intrusion. Security is strengthened by the presence of two interfaces for the exchange of tokens, one is for the party in trust and the other is for the opposing party. If one is compromised, the other interrupts the flow avoiding authorization. The trust placed in the mutual validation of messages avoids having to merge authentication domains, leaving great flexibility to the system as a whole.</t>
      <t>Identity recognition information resides only with the trusted identity provider. This reduces the need to store too much personal information in Internet registrations. Furthermore, to easily identify which IdP holds the entity's authentication credentials, it can be easily extracted from the username structure if this is defined following the same technique used to compose an email address <xref target="RFC5322"/>, that means an username, an @ sign, and a domain name.</t>
    </section>
    <section anchor="identity-provider-trustee-concepts">
      <name>Identity Provider - Trustee Concepts</name>
      <t>An IdP is a service provider that verifies the authenticity of a digital identity so that it is truly what it claims to be. The service provided is the guarantee of recognition of the identity of natural or legal persons in digital communication. For this role as an identity guarantor it can also be called an <strong>ID trustee</strong>. When processing personal data, the laws of the country to which the data subject belongs must be considered. It could also provide additional services (e-mail, voice mail, anonymous account,...) but always in full compliance with current legislation and only if they do not present a risk for the data subject.</t>
      <t>The infrastructure underlying symmetric communication is a dedicated network to the exchange of authentication messages between IdPs. Ideally, each IdP always has two connectors, one to communicate with its trusted entity and the other to exchange messages with another IdP. With its own entity the mechanism is exactly the one defined by <xref target="RFC6749"/>. With other IdPs, a reserved channel is required for the exchange of tokens, which provides guarantees on the integrity of the messages and their origin. This channel <bcp14>SHOULD</bcp14> have low latency because it represents an additional step compared to the single ecosystem authentication scheme. The intended mechanism for sharing messages is that of a mail server <xref target="RFC5321"/>.</t>
      <t>The dedicated network for the identity providers is not technically necessary for the authentication protocol but is essential for security, to reduce the risk of fraud or identity theft and, to ensure trust in lawful behavior. There <bcp14>MUST</bcp14> also be an international control body for the IdPs and the IdP network, an authority with the task of governing the overall system, i.e. defining technical standards, or carrying out audits to ensure compliance with the rules, or acting to exclude nodes in case of violation of the rules.</t>
      <t>An IdP <bcp14>MUST</bcp14> be a legal person subject to both the laws of the country where it is established and international certifications to protect data treatment and service provision in terms of security and quality.</t>
    </section>
    <section anchor="identity-provider-custodian-concepts">
      <name>Identity Provider - Custodian Concepts</name>
      <t>The identity provider must carry out a recognition and registration of the user's personal data before being able to guarantee its identity. The collection of data from legal entities, as they are public, is not particularly critical, while for the natural person the protection provided by the law in force for the holder of the digital identity must be enforced. Consequently, it is useful to divide the set of IdPs into two categories, in the first the set of IdPs (also called trustees) that only manage the operation of digital identities and in the second those that guarantee to the trustees that the identity of the user is real. This last category of IdPs, called custodians (IdCs), should operate under the responsibility of the legal authority that manages the real identity of the individual (i.e. who issues the identity card). IdCs are the only guarantors of the link between physical and digital identity, the only ones to issue a digital identity with legal value. IdCs do not provide guarantees on identities associated with legal entities, which are managed directly by IdPs.</t>
      <t>Through the legal digital identity, each user can request the issuing of a new digital identity to the trusted IdP. The latter will request the IdC to confirm the authenticity of the identification data received from the user, that is, the user could send an ID token with the contact information of its IdC. The request will be handled entirely online and will not require any additional data from the data subject other than the identification information that it decides to provide. The new identity will be useful to satisfy the typical needs of Internet transactions by providing precise guarantees.</t>
      <ul spacing="normal">
        <li>
          <t>The <strong><em>identity custodian</em></strong> is the guarantor of the existence of the natural person and has the ability to uniquely identify them but only following a formal request from the relevant authority.</t>
        </li>
        <li>
          <t>The <strong><em>identity provider</em></strong> receives the identification data that the data subject has decided to provide and will match these to the digital identity.</t>
        </li>
        <li>
          <t>The <strong><em>service provider</em></strong> will have the guarantee that the user is linked to a real person for security, contractual or legal reasons.</t>
        </li>
        <li>
          <t>The <strong><em>data subject</em></strong> can provide personal information according to their need, also maintaining anonymity.</t>
        </li>
        <li>
          <t>The <strong><em>public authority</em></strong> that manages the real data will be able to identify the individual with certainty in case of violations of the law (i.e. to protect the service provider).</t>
        </li>
      </ul>
      <section anchor="issuing-of-a-new-digital-identity">
        <name>Issuing of a New Digital Identity</name>
        <t>Figure 4 shows a use case describing the request of a new digital identity from an identity provider. A SVG image is available <eref target="https://github.com/Luigi-Sbriz/identity/images/4_New-identity-use-case.svg">here</eref>.</t>
        <artwork><![CDATA[
                  ┌───────────┐        ┌───────────┐
                  │Identity   │        │Identity   │
                  │           │        │           │
                  │Custodian  │        │Provider   │
                  └─────┬─────┘        └─────┬─────┘
                Digital │ecosystem   Digital │ecosystem
                        │IdC                 │IdP
               .........│.........  .........│.........
               :  ┌─────┴─────┐  :  :  ┌─────┴─────┐  :
               :  │Authorizat.│  :  :  │Authorizat.│  :
               :  │           ╞════════╡           │  :
               :  │Server IdC │  :  :  │Server IdP │  :
               :  └─────┬─────┘  :  :  └─────┬─────┘  :
               :        │        :  :        │        :
               :        │        :  :        │        :
┌───────────┐  :  ┌─────┴─────┐  :  :  ┌─────┴─────┐  :
│Data       │  :  │User       │  :  :  │Relying    │  :
│           ├─────┤           ├────────┤           │  :
│Subject    │  :  │Agent      │  :  :  │Party  IdP │  :
└───────────┘  :  └───────────┘  :  :  └───────────┘  :
               :.................:  :.................:

     Figure 4: Abstract of New Digital Identity Request
]]></artwork>
        <t>Figure 5 shows the abstract representation of the message exchange sequence to request a new digital identity. A SVG image is available <eref target="https://github.com/Luigi-Sbriz/identity/images/5_New-identity-sequence-diagram.svg">here</eref>.</t>
        <artwork><![CDATA[
┌───────────┐      ┌───────────┐      ┌───────────┐      ┌───────────┐
│Data       │      │User       │      │Authorizat.│      │Relying    │
│           │      │           │      │           │      │           │
│Subject    │      │Agent      │      │Server IdC │      │Party  IdP │
└───────────┘      └─────┬─────┘      └─────┬─────┘      └─────┬─────┘
      |                  |                  |                  |
      ├-(1)-Request New->+-(2)--Send New Identity Request----->|
      |     Identity     |                  |                  |
      |                  |<--(3)--Return IdP Token-------------┘
      |                  |                  |
      |                  ├(4)--Request IdC  |
      |                  |     Token & Send |
      |                  |     IdP Token--->|
      |                  |                  |
      |<-(5)-Request Credentials via UA-----┤
      |                  |                  |
      └-(6)--Present Credentials via UA---->|
                         |                  |
                         └<--(7)--Return    |
                                  IdC Token-┘
┌───────────┐      ┌───────────┐      ┌───────────┐      ┌───────────┐
│User       │      │Authorizat.│      │Authorizat.│      │Relying    │
│           │      │           │      │           │      │           │
│Agent      │      │Server IdC │      │Server IdP │      │Party  IdP │
└─────┬─────┘      └─────┬─────┘      └─────┬─────┘      └─────┬─────┘
      |                  |                  |                  |
      ├-(8)--Request New Identity & Send IdC Token------------>|
      |                  |                  |                  |
      |                  |<--(10)--Send IdC |<--(9)--Send IdC  |
      |                  |         Token----┤        Token-----┤
      |                  |                  |                  |
      |                  ├-(11)--Return IdP |                  |
      |                  |     Token & Send |                  |
      |                  |     ID Token---->|                  |
      |                  |                  |                  |
      └<-(12)---Return   |                  └-(13)---Return    |
                ID Token-┘                     Client Token--->┘
┌───────────┐                ┌───────────┐               ┌───────────┐
│Data       │                │User       │               │Relying    │
│           │                │           │               │           │
│Subject    │                │Agent      │               │Party  IdP │
└─────┬─────┘                └─────┬─────┘               └─────┬─────┘
      |                            |                           |
      └<-(15)------Return ID Token-┘<-(14)-Return Client Token-┘

Figure 5: New Digital Identity Request - Sequence diagram
]]></artwork>
        <t>(1) - (3)       The <strong><em>data subject</em></strong> requests the new digital identity via the user agent to the identity provider. The <strong><em>UA</em></strong> activates the authentication process by requesting the new identity to the <strong><em>RP</em></strong>, which responds by providing the IdP token (access token from IdP's AS).<br/>
(4) - (7)       The <strong><em>UA</em></strong> requests the IdC token (access token from the custodian's AS) to its <strong><em>AS</em></strong>, sending also the IdP token received from <strong><em>RP</em></strong>. The custodian's <strong><em>AS</em></strong> requests credentials from the <strong><em>data subject</em></strong> and returns the IdC token to the <strong><em>UA</em></strong>.<br/>
(8) - (9)       The <strong><em>UA</em></strong> requests the new digital identity from the <strong><em>RP</em></strong> by sending the IdC token. Then, relying party requests to identity provider's AS to verify the IdC token.<br/>
(10) - (11)     Both authentication servers must verify that the tokens received match the originals. If required by data subject, the custodian's AS will send an additional ID token with personal data.<br/>
(12) - (13)     Custodian's AS informs the <strong><em>UA</em></strong> of the outcome and, if required, sends also a copy of the ID token. The identity provider's AS sends to the <strong><em>RP</em></strong> the client token (related the new identity provided by IdP).<br/>
(14) - (15) The <strong><em>RP</em></strong> sends the client token to <strong><em>UA</em></strong>, which then informs the <strong><em>data subject</em></strong> of the outcome and, if required, sends a readable copy of the ID token to check the personal information shared.</t>
        <t><strong><em>Notes regarding some steps:</em></strong><br/>
(3) If the relying party does not have the IdP token available, this will be requested from the authentication server after step (2).<br/>
(4) IdC token does not contains any real identity information as default. If requested, an ID token with a standard set of real information can be included during this step.</t>
        <t>Any new digital identity with legal value is issued according to the rules defined by the relevant authority. It is presumable that there is also physical recognition of the data subject before the provision of credentials but no reference model is defined in this document.</t>
      </section>
    </section>
    <section anchor="sustainable-digital-identity-trust-schema">
      <name>Sustainable Digital Identity Trust Schema</name>
      <t>For the effectiveness of the identity trust system based on the paradigm of trust towards a third party recognizable as reliable, it is necessary to guarantee a transparent and verifiable mechanism. The objective is to achieve universal participation and it is only possible if trust in the system as a whole is demonstrable. For this reason it is necessary to establish founding principles that guide the rules to guarantee equal dignity and balance in all components of the system. The following nine principles are established:</t>
      <ol spacing="normal" type="1"><li>
          <t>The digital identity can be cancelled or deleted without impacting the physical identity.</t>
        </li>
        <li>
          <t>The digital identity must be linkable to the physical identity in a verifiable manner.</t>
        </li>
        <li>
          <t>Only the authority that legally manages the individual's physical identity can verify this link.</t>
        </li>
        <li>
          <t>The authentication system must be flexible (i.e., able to adapt to technological evolutions or emerging needs).</t>
        </li>
        <li>
          <t>The authentication system must be accessible to all (i.e., without discriminatory costs).</t>
        </li>
        <li>
          <t>The authentication system must be secure (i.e., continuously aligned with security best practices).</t>
        </li>
        <li>
          <t>The authentication system must be privacy-friendly (i.e., not requiring any personal information unless strictly necessary).</t>
        </li>
        <li>
          <t>The authentication system must be resilient (i.e., with availability appropriate for needs and the ability to cope with adversity).</t>
        </li>
        <li>
          <t>The authentication system technology must be open (i.e., able to evolve based on transparent shared standards and verifiable developments).</t>
        </li>
      </ol>
      <t>To guarantee the principles set out, the requirements of the authentication system <bcp14>MUST</bcp14> include the protection of personal data and the guarantee of anonymity for lawful purposes, that is:</t>
      <ol spacing="normal" type="1"><li>
          <t>Ensure mutual recognition to guarantee the identity of the provider to the consumer.</t>
        </li>
        <li>
          <t>Ensure the ability to authenticate the digital identities of consumers and providers against their real-world identity without exposing real data</t>
        </li>
      </ol>
      <t>Naturally, the ability to validate the authenticity of the relationship between digital identity and physical identity lies only with the public authority responsible for managing the citizen's identity.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Integrity and resilience are the most critical parameters. Symmetric authentication should avoid the risk of man-in-the-middle attack because it should successfully attack both message flows at the same time. The trustee is a critical component and must be subjected to rigorous checks on compliance with the standards. Referring to the term identification, we mean at least three different types, the device, the digital user and the individual.</t>
      <ul spacing="normal">
        <li>
          <t>The <strong><em>device</em></strong> is identified with technical methods suited to the various needs. For example, geolocalization using International Mobile Equipment Identity (IMEI) <xref target="ITU1"/> and Integrated Circuit Card ID (ICCID) <xref target="ITU2"/>.</t>
        </li>
        <li>
          <t>The <strong><em>digital user</em></strong> is well managed by <xref target="RFC6749"/> but inside the digital ecosystem. To manage users of multiple domains, either the user registrations are duplicated for each domain involved, or the domains involved are joined in a trust relationship.</t>
        </li>
        <li>
          <t>The <strong><em>individual</em></strong> is well managed with classic physical methods (e.g. photo ID) but the link with the digital identity needs to be improved because the quality is not satisfactory. This topic is beyond the scope of this specification and it was explored for example in <xref target="LS3"/>.</t>
        </li>
      </ul>
      <t>An in-depth defense system <bcp14>SHOULD</bcp14> consider all the components involved and in this case not just the pure digital authentication of the user. In this document only the digital user is treated but extensions applicable to mixed situations with multiple types are certainly welcome to improve the overall security profile.</t>
      <section anchor="user-registration">
        <name>User registration</name>
        <t>It is important to control the amount of data exchanged during the authentication process but also that the data required to issue a new digital identity are the only ones strictly necessary. To assign access credentials to a protected resource to a user, a process of recording the user's identification and contact data is necessary, as they are necessary for the authentication of the digital identity and for the attribution of access rights to the resource. Data provided or exchanged with IdPs <bcp14>MUST</bcp14> comply with the need-to-know principle. Three ways of recording are required.</t>
        <section anchor="registration-with-an-identity-custodian-idc">
          <name>Registration with an identity custodian (IdC).</name>
          <t>The IdC has the legal authority to retain all personal data essential to complete the process of recognizing the real individual. Consequently it also has full authority over digital identity data and registration is subject to the law of the individual's country of origin.</t>
        </section>
        <section anchor="registration-with-an-identity-provider-idp">
          <name>Registration with an identity provider (IdP).</name>
          <t>The IdP has to guarantee the authenticity of the digital identity and the collection of personal data <bcp14>SHOULD</bcp14> be limited to the sole purpose of this operation. For the registration of a natural person, the IdP requests confirmation from the IdC of the real identity of the applicant before issuing the digital identity. The process is completely online and does not require any physical recognition. For legal entities, the data is provided by the owner or a delegate.</t>
        </section>
        <section anchor="registration-with-a-service-provider-sp">
          <name>Registration with a service provider (SP).</name>
          <t>The service provider <bcp14>SHOULD</bcp14> know only the data necessary to build the authorization roles to govern access to resources and nothing more. These are provided directly by the user or by an ID token, in addition to those received automatically from their IdP relating to digital identity.</t>
        </section>
      </section>
    </section>
    <section anchor="conclusions">
      <name>Conclusions</name>
      <t>The identity management system, to operate in different digital ecosystems, should rely on a common authentication protocol that symmetrically performs the same operations in complete transparency, entrusting the decision on recognition to a trusted third party. The trust in the reliability of the recognition carried out by the identity guarantor (IdP or IdC) cannot be based on the technological component alone. It is therefore necessary to involve a supervisory authority of the overall system for technological aspects and the authorities of the data subject's country for data protection.</t>
      <t>To improve trust between two entities, in this identification scheme, the objective is to provide three guarantees:</t>
      <ol spacing="normal" type="1"><li>
          <t>The mutual recognition between consumer and supplier.</t>
        </li>
        <li>
          <t>The control and minimization of the personal information processed</t>
        </li>
        <li>
          <t>In case of legal need, the ability to match the digital identities of consumer and supplier against their real-world identity.</t>
        </li>
      </ol>
      <t>Technically, due to the strong synergy obtained it is advisable to maintain alignment with <xref target="RFC6749"/> and the related specifications.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC6749">
          <front>
            <title>The OAuth 2.0 Authorization Framework</title>
            <author fullname="D. Hardt" initials="D." role="editor" surname="Hardt"/>
            <date month="October" year="2012"/>
            <abstract>
              <t>The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf. This specification replaces and obsoletes the OAuth 1.0 protocol described in RFC 5849. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6749"/>
          <seriesInfo name="DOI" value="10.17487/RFC6749"/>
        </reference>
        <reference anchor="RFC5322">
          <front>
            <title>Internet Message Format</title>
            <author fullname="P. Resnick" initials="P." role="editor" surname="Resnick"/>
            <date month="October" year="2008"/>
            <abstract>
              <t>This document specifies the Internet Message Format (IMF), a syntax for text messages that are sent between computer users, within the framework of "electronic mail" messages. This specification is a revision of Request For Comments (RFC) 2822, which itself superseded Request For Comments (RFC) 822, "Standard for the Format of ARPA Internet Text Messages", updating it to reflect current practice and incorporating incremental changes that were specified in other RFCs. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5322"/>
          <seriesInfo name="DOI" value="10.17487/RFC5322"/>
        </reference>
        <reference anchor="RFC5321">
          <front>
            <title>Simple Mail Transfer Protocol</title>
            <author fullname="J. Klensin" initials="J." surname="Klensin"/>
            <date month="October" year="2008"/>
            <abstract>
              <t>This document is a specification of the basic protocol for Internet electronic mail transport. It consolidates, updates, and clarifies several previous documents, making all or parts of most of them obsolete. It covers the SMTP extension mechanisms and best practices for the contemporary Internet, but does not provide details about particular extensions. Although SMTP was designed as a mail transport and delivery protocol, this specification also contains information that is important to its use as a "mail submission" protocol for "split-UA" (User Agent) mail reading systems and mobile environments. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5321"/>
          <seriesInfo name="DOI" value="10.17487/RFC5321"/>
        </reference>
        <reference anchor="RFC5234">
          <front>
            <title>Augmented BNF for Syntax Specifications: ABNF</title>
            <author fullname="D. Crocker" initials="D." role="editor" surname="Crocker"/>
            <author fullname="P. Overell" initials="P." surname="Overell"/>
            <date month="January" year="2008"/>
            <abstract>
              <t>Internet technical specifications often need to define a formal syntax. Over the years, a modified version of Backus-Naur Form (BNF), called Augmented BNF (ABNF), has been popular among many Internet specifications. The current specification documents ABNF. It balances compactness and simplicity with reasonable representational power. The differences between standard BNF and ABNF involve naming rules, repetition, alternatives, order-independence, and value ranges. This specification also supplies additional rule definitions and encoding for a core lexical analyzer of the type common to several Internet specifications. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="68"/>
          <seriesInfo name="RFC" value="5234"/>
          <seriesInfo name="DOI" value="10.17487/RFC5234"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="ITU1" target="https://www.itu.int/dms_pub/itu-t/opb/tut/T-TUT-CCICT-2020-PDF-E.pdf">
          <front>
            <title>QTR-RLB-IMEI - Reliability of International Mobile Station Equipment Identity (IMEI), Technical Report</title>
            <author>
              <organization>International Telecommunications Union</organization>
            </author>
            <date year="2020" month="July"/>
          </front>
          <annotation>Switzerland</annotation>
        </reference>
        <reference anchor="ITU2" target="https://www.itu.int/rec/T-REC-E.118">
          <front>
            <title>E.118: The International Telecommunication Charge Card</title>
            <author>
              <organization>International Telecommunications Union</organization>
            </author>
            <date year="2006" month="May"/>
          </front>
        </reference>
        <reference anchor="LS1" target="https://www.isaca.org/resources/isaca-journal/issues/2022/volume-2/a-symmetrical-framework-for-the-exchange-of-identity-credentials-based-on-the-trust-paradigm-part-1">
          <front>
            <title>A Symmetrical Framework for the Exchange of Identity Credentials Based on the Trust Paradigm, Part 1: Identity Trust Abstract Model, ISACA Journal, vol.2</title>
            <author initials="L." surname="Sbriz" fullname="Luigi Sbriz">
              <organization/>
            </author>
            <date year="2022" month="April"/>
          </front>
        </reference>
        <reference anchor="LS2" target="https://www.isaca.org/resources/isaca-journal/issues/2022/volume-2/a-symmetrical-framework-for-the-exchange-of-identity-credentials-based-on-the-trust-paradigm-part-2">
          <front>
            <title>A Symmetrical Framework for the Exchange of Identity Credentials Based on the Trust Paradigm, Part 2: Identity Trust Service Implementation, ISACA Journal, vol.2</title>
            <author initials="L." surname="Sbriz" fullname="Luigi Sbriz">
              <organization/>
            </author>
            <date year="2022" month="April"/>
          </front>
        </reference>
        <reference anchor="LS3" target="https://www.isaca.org/resources/isaca-journal/issues/2023/volume-1/how-to-digitally-verify-human-identity">
          <front>
            <title>How to Digitally Verify Human Identity: The Case of Voting, ISACA Journal, vol.1</title>
            <author initials="L." surname="Sbriz" fullname="Luigi Sbriz">
              <organization/>
            </author>
            <date year="2023" month="January"/>
          </front>
        </reference>
        <reference anchor="LS4" target="https://www.isaca.org/resources/isaca-journal/issues/2023/volume-6/modeling-an-identity-trust-system">
          <front>
            <title>Modeling an Identity Trust System, ISACA Journal, vol.6</title>
            <author initials="L." surname="Sbriz" fullname="Luigi Sbriz">
              <organization/>
            </author>
            <date year="2023" month="November"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 475?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>This document was prepared using text editor with Markdown syntax (kramdown-rfc dialect).</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
