You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: openid-sharedsignals-framework-1_0.md
+11-11Lines changed: 11 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -238,7 +238,7 @@ This Shared Signals Framework specification defines a Subject Principal to be
238
238
the entities about which an event can be sent by Transmitters and received by
239
239
Receivers using the Shared Signals Framework.
240
240
241
-
Subject Principals are the managed entities in a SSF Transmitter or Receiver.
241
+
Subject Principals are the managed entities in an SSF Transmitter or Receiver.
242
242
These include human or robotic principals, devices, customer tenants in a
243
243
multi-tenanted service, organizational units within a tenant, groups of subject
244
244
principals, or other entities that are managed by Transmitters and Receivers.
@@ -251,7 +251,7 @@ Subject Principals are identified by Subject Members defined below.
251
251
# Subject Members in SSF Events {#subject-ids}
252
252
253
253
## Subject Members {#subject-members}
254
-
A Subject Member of a SSF event describes a subject of the event. A top-level claim named `sub_id` MUST be used to describe the primary subject of the event.
254
+
A Subject Member of an SSF event describes a subject of the event. A top-level claim named `sub_id` MUST be used to describe the primary subject of the event.
255
255
256
256
### Existing CAEP and RISC Events
257
257
Event types already defined in the CAEP ({{CAEP}}) and RISC ({{RISC}}) specifications MAY use a `subject` field within the `events` claim of the SSF event to describe the primary Subject Principal of the event. SSF Transmitters MUST include the top-level `sub_id` claim even for these existing event types.
@@ -269,7 +269,7 @@ Each Subject Member MUST refer to exactly one Subject Principal. The value of a
269
269
270
270
A Simple Subject Member has a claim name and a value that is a "Subject
271
271
Identifier" as defined in the Subject Identifiers for Security Event Tokens
272
-
{{SUBIDS}}. Below is a non-normative example of a Simple Subject Member in a SSF
272
+
{{SUBIDS}}. Below is a non-normative example of a Simple Subject Member in an SSF
273
273
event.
274
274
275
275
~~~ json
@@ -318,7 +318,7 @@ group
318
318
Additional Subject Member names MAY be used in Complex Subjects. Each member name MAY
319
319
appear at most once in the Complex Subject value.
320
320
321
-
Below is a non-normative example of a Complex Subject claim in a SSF event.
321
+
Below is a non-normative example of a Complex Subject claim in an SSF event.
322
322
323
323
~~~ json
324
324
"sub_id": {
@@ -344,7 +344,7 @@ Subject Principal.
344
344
345
345
## Subject Identifiers in SSF Events {#subject-ids-in-ssf}
346
346
347
-
A Subject Identifier in a SSF event MUST have an identifier format that is any
347
+
A Subject Identifier in an SSF event MUST have an identifier format that is any
348
348
one of:
349
349
350
350
* Defined in the IANA Registry defined in Subject Identifiers for Security
@@ -463,7 +463,7 @@ The following are hypothetical examples of SETs that conform to the Shared Signa
463
463
}
464
464
}
465
465
~~~
466
-
{: #subject-ids-ex-simple title="Example: SET Containing a SSF Event with a Simple Subject Member"}
466
+
{: #subject-ids-ex-simple title="Example: SET Containing an SSF Event with a Simple Subject Member"}
467
467
468
468
~~~ json
469
469
{
@@ -507,7 +507,7 @@ The following are hypothetical examples of SETs that conform to the Shared Signa
507
507
}
508
508
}
509
509
~~~
510
-
{: #subject-ids-ex-complex title="Example: SET Containing a SSF Event with a Complex Subject Member"}
510
+
{: #subject-ids-ex-complex title="Example: SET Containing an SSF Event with a Complex Subject Member"}
511
511
512
512
~~~ json
513
513
{
@@ -533,7 +533,7 @@ The following are hypothetical examples of SETs that conform to the Shared Signa
533
533
}
534
534
}
535
535
~~~
536
-
{: #subject-properties-ex title="Example: SET Containing a SSF Event with a Simple Subject and a Property Member"}
536
+
{: #subject-properties-ex title="Example: SET Containing an SSF Event with a Simple Subject and a Property Member"}
537
537
538
538
~~~ json
539
539
{
@@ -559,7 +559,7 @@ The following are hypothetical examples of SETs that conform to the Shared Signa
559
559
}
560
560
}
561
561
~~~
562
-
{: #subject-custom-type-ex title="Example: SET Containing a SSF Event with a Proprietary Subject Identifier Format"}
562
+
{: #subject-custom-type-ex title="Example: SET Containing an SSF Event with a Proprietary Subject Identifier Format"}
@@ -1819,7 +1819,7 @@ A Transmitter MAY respond to verification event requests even if the event is no
1819
1819
1820
1820
1821
1821
#### Verification Event {#verification-event}
1822
-
The Verification Event is a SSF Event with the event type: "https://schemas.openid.net/secevent/ssf/event-type/verification". The event contains the following attribute:
1822
+
The Verification Event is an SSF Event with the event type: "https://schemas.openid.net/secevent/ssf/event-type/verification". The event contains the following attribute:
1823
1823
1824
1824
state
1825
1825
@@ -2096,7 +2096,7 @@ The signature key can be obtained through "jwks_uri", see {{discovery}}.
2096
2096
2097
2097
### SSF Event Subject {#event-subjects}
2098
2098
The primary Subject Member of SSF events is described in the "Subject Members" section ({{subject-ids}}). The JWT "sub" claim MUST NOT be present in any SET containing
2099
-
a SSF event.
2099
+
an SSF event.
2100
2100
2101
2101
### SSF Event Properties {#event-properties}
2102
2102
The SSF event MAY contain additional claims within the event payload that are
0 commit comments