@@ -38,7 +38,7 @@ normative:
3838 NIST-AUTH :
3939 target : https://pages.nist.gov/800-63-3/sp800-63-3.html
4040 title : " Digital Identity Guidelines, Authentication and Lifecycle Management"
41- author :
41+ author :
4242 -
4343 ins : P. Grassi
4444 name : Paul Grassi
@@ -52,7 +52,7 @@ normative:
5252 NIST-FED :
5353 target : https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-63c.pdf
5454 title : " Digital Identity Guidelines, Federation and Assertions"
55- author :
55+ author :
5656 -
5757 ins : P. A. Grassi
5858 name : Paul A. Grassi
@@ -68,7 +68,7 @@ normative:
6868 -
6969 ins : E. M. Nadeau
7070 name : Ellen M. Nadeau
71- NIST-IDPROOF :
71+ NIST-IDPROOF :
7272 target : https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-63a.pdf
7373 title : " Digital Identity Guidelines, Enrollment and Identity Proofing"
7474 author :
@@ -110,10 +110,10 @@ normative:
110110 name : John Bradley
111111 org : Yubico
112112 date : 2021-05
113- WebAuthn :
113+ WebAuthn :
114114 target : https://www.w3.org/TR/webauthn/
115115 title : " Web Authentication: An API for accessing Public Key Credentials Level 2"
116- author :
116+ author :
117117 -
118118 ins : D. Balfanz
119119 name : Dirk Balfanz
@@ -139,9 +139,9 @@ conform to the SSF Profile. This document specifies the event-types required to
139139achieve this goal.
140140
141141# # Notational Considerations
142- The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD",
143- " SHOULD NOT" , "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this
144- document are to be interpreted as described in BCP 14 {{RFC2119}} {{RFC8174}}
142+ The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD",
143+ " SHOULD NOT" , "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this
144+ document are to be interpreted as described in BCP 14 {{RFC2119}} {{RFC8174}}
145145when, and only when, they appear in all capitals, as shown here.
146146
147147# Optional Event Claims {#optional-event-claims}
@@ -150,7 +150,7 @@ definition.
150150
151151event_timestamp
152152: OPTIONAL, JSON number : the time at which the event described by this SET
153- occurred. Its value is a JSON number representing the number of seconds
153+ occurred. Its value is a JSON number representing the number of seconds
154154 from 1970-01-01T0:0:0Z as measured in UTC until the date/time.
155155
156156initiating_entity
@@ -210,15 +210,15 @@ Event Type URI:
210210
211211` https://schemas.openid.net/secevent/caep/event-type/session-revoked`
212212
213- Session Revoked signals that the session identified by the subject has been
214- revoked. The explicit session identifier may be directly referenced in the
213+ Session Revoked signals that the session identified by the subject has been
214+ revoked. The explicit session identifier may be directly referenced in the
215215subject or other properties of the session may be included to allow the
216216receiver to identify applicable sessions.
217217
218- When a Complex Claim is used as the subject, the revocation event applies
218+ When a Complex Claim is used as the subject, the revocation event applies
219219to any session derived from matching those combined claims.
220220
221- The actual reason why the session was revoked might be specified with the
221+ The actual reason why the session was revoked might be specified with the
222222nested `reason_admin` and/or `reason_user` claims described in {{optional-event-claims}}.
223223
224224# ## Event-Specific Claims {#session-revoked-claims}
@@ -260,6 +260,7 @@ NOTE: The event type URI is wrapped, the backslash is the continuation character
260260 " events " : {
261261 " https://schemas.openid.net/secevent/caep/event-type/session-revoked " : {
262262 " subject " : {
263+ " format " : " complex" ,
263264 " session " : {
264265 " format " : " opaque" ,
265266 " id " : " dMTlD|1600802906337.16|16008.16"
@@ -298,6 +299,7 @@ NOTE: The event type URI is wrapped, the backslash is the continuation character
298299 " events " : {
299300 " https://schemas.openid.net/secevent/caep/event-type/session-revoked " : {
300301 " subject " : {
302+ " format " : " complex" ,
301303 " user " : {
302304 " format " : " iss_sub" ,
303305 " iss " : " https://idp.example.com/123456789/" ,
@@ -333,10 +335,10 @@ Event Type URI:
333335
334336` https://schemas.openid.net/secevent/caep/event-type/token-claims-change`
335337
336- Token Claims Change signals that a claim in a token, identified by the
337- subject claim, has changed.
338+ Token Claims Change signals that a claim in a token, identified by the
339+ subject claim, has changed.
338340
339- The actual reason why the claims change occurred might be specified with the
341+ The actual reason why the claims change occurred might be specified with the
340342nested `reason_admin` and/or `reason_user` claims made in {{optional-event-claims}}.
341343
342344# ## Event-Specific Claims {#token-claims-change-claims}
@@ -435,14 +437,14 @@ Event Type URI:
435437
436438` https://schemas.openid.net/secevent/caep/event-type/credential-change`
437439
438- The Credential Change event signals that a credential was created, changed,
440+ The Credential Change event signals that a credential was created, changed,
439441revoked or deleted. Credential Change scenarios include :
440442
441443 - password/PIN change/reset
442444 - certificate enrollment, renewal, revocation and deletion
443445 - second factor / passwordless credential enrollment or deletion (U2F, FIDO2, OTP, app-based)
444446
445- The actual reason why the credential change occurred might be specified with the
447+ The actual reason why the credential change occurred might be specified with the
446448nested `reason_admin` and/or `reason_user` claims made in {{optional-event-claims}}.
447449
448450# ## Event-Specific Claims {#credential-change-claims}
@@ -522,19 +524,19 @@ Event Type URI:
522524
523525` https://schemas.openid.net/secevent/caep/event-type/assurance-level-change`
524526
525- The Assurance Level Change event signals that there has been a change in
526- authentication method since the initial user login. This change can be from
527- a weak authentication method to a strong authentication method, or vice versa.
527+ The Assurance Level Change event signals that there has been a change in
528+ authentication method since the initial user login. This change can be from
529+ a weak authentication method to a strong authentication method, or vice versa.
528530
529- In the first scenario, Assurance Level Change will an increase, while in the
530- second scenario it will be a decrease. For example, a user can start a session
531- with Service Provider A using single factor authentication (such as a password).
532- The user can then open another session with Service Provider B using
533- two-factor authentication (such as OTP). In this scenario an increase
534- Assurance Level Change event will signal to Service Provider A that user has
531+ In the first scenario, Assurance Level Change will an increase, while in the
532+ second scenario it will be a decrease. For example, a user can start a session
533+ with Service Provider A using single factor authentication (such as a password).
534+ The user can then open another session with Service Provider B using
535+ two-factor authentication (such as OTP). In this scenario an increase
536+ Assurance Level Change event will signal to Service Provider A that user has
535537authenticated with a stronger authentication method.
536538
537- The actual reason why the assurance level changed might be specified with the
539+ The actual reason why the assurance level changed might be specified with the
538540nested `reason_admin` and/or `reason_user` claims made in {{optional-event-claims}}.
539541
540542# ## Event-Specific Claims {#assurance-level-change-claims}
@@ -627,7 +629,7 @@ Event Type URI:
627629
628630Device Compliance Change signals that a device's compliance status has changed.
629631
630- The actual reason why the status change occurred might be specified with the
632+ The actual reason why the status change occurred might be specified with the
631633nested `reason_admin` and/or `reason_user` claims made in {{optional-event-claims}}.
632634
633635# ## Event-Specific Claims {#device-compliance-change-claims}
@@ -662,6 +664,7 @@ NOTE: The event type URI is wrapped, the backslash is the continuation character
662664 " events " : {
663665 " https://schemas.openid.net/secevent/caep/event-type/device-compliance-change " : {
664666 " subject " : {
667+ " format " : " complex" ,
665668 " device " : {
666669 " format " : " iss_sub" ,
667670 " iss " : " https://idp.example.com/123456789/" ,
0 commit comments