Skip to content

Commit 32050a8

Browse files
committed
New Session Established Event Type
1 parent 9a922a7 commit 32050a8

File tree

1 file changed

+65
-0
lines changed

1 file changed

+65
-0
lines changed

openid-caep-specification-1_0.md

Lines changed: 65 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -79,6 +79,21 @@ normative:
7979
ins: J. L. Fenton
8080
name: James L. Fenton
8181
date: 2017-06
82+
OpenID.Core:
83+
author:
84+
- ins: N. Sakimura
85+
name: Nat Sakimura
86+
- ins: J. Bradley
87+
name: John Bradley
88+
- ins: M.B. Jones
89+
name: Michael B. Jones
90+
- ins: B. de Medeiros
91+
name: Breno de Medeiros
92+
- ins: C. Mortimore
93+
name: Chuck Mortimore
94+
date: November 2014
95+
target: http://openid.net/specs/openid-connect-core-1_0.html#IDToken
96+
title: OpenID Connect Core 1.0 - ID Token
8297
RFC2119:
8398
RFC8174:
8499
RFC5280:
@@ -691,6 +706,56 @@ NOTE: The event type URI is wrapped, the backslash is the continuation character
691706
~~~
692707
{: #device-compliance-change-examples-out-of-compliance title="Example: Device No Longer Compliant - Complex Subject + optional claims"}
693708

709+
## Session Established {#session-established}
710+
Event Type URI:
711+
712+
`https://schemas.openid.net/secevent/caep/event-type/session-established`
713+
714+
The Session Established event signifies that the Transmitter has created a new session for a user for use with the Transmitter. Receivers may use this information for a number of reasons, including:
715+
716+
* A service acting as a Transmitter can close the loop with the IdP after a user has been federated from the IdP
717+
* An IdP can detect unintended logins
718+
* A Receiver can establish an inventory of user sessions
719+
720+
### Event Specific Claims {#session-established-event-specific-claims}
721+
The following optional claims MAY be included in the Session Established event:
722+
723+
ip
724+
: The IP address of the user as observed by the Transmitter (**NOTE**, this can be different from the one observed by the Receiver for the same user because of network translation)
725+
726+
fp_ua
727+
: Fingerprint of the user agent computed by the Transmitter. (**NOTE**, this is not to identify the session, but to present some qualities of the session)
728+
729+
acr
730+
: The authentication context class reference of the session, as established by the Transmitter. The value of this field MUST be interpreted in the same way as the corresponding field in an OpenID Connect ID Token {{OpenID.Core}}
731+
732+
amr
733+
: The authentication method reference of the session, as established by the Transmitter. The value of this field MUST be interpreted in the same way as the corresponding field in an OpenID Connect ID Token {{OpenID.Core}}
734+
735+
### Examples {#session-established-examples}
736+
The following is a non-normative example of the `session-established` event type:
737+
738+
~~~json
739+
{
740+
"iss": "https://idp.example.com/123456789/",
741+
"jti": "24c63fb56e5a2d77a6b512616ca9fa24",
742+
"iat": 1615305159,
743+
"aud": "https://sp.example.com/caep",
744+
"events": {
745+
"https://schemas.openid.net/secevent/caep/event-type/session-established": {
746+
"subject": {
747+
"format": "email",
748+
"email": "someuser@somedomain.com"
749+
},
750+
"ip": "192.168.1.12",
751+
"fp_ua": "abb0b6e7da81a42233f8f2b1a8ddb1b9a4c81611",
752+
"acr": "AAL2",
753+
"amr": "otp"
754+
}
755+
}
756+
}
757+
~~~
758+
694759
--- back
695760

696761
# Acknowledgements

0 commit comments

Comments
 (0)