Internet-Draft | OIDC standard claims for CWT | November 2024 |
Maldant | Expires 9 May 2025 | [Page] |
This document registers OpenId Connect standards claims already used in JSON Web Tokens for CBOR Web Tokens.¶
This note is to be removed before publishing as an RFC.¶
The latest revision of this draft can be found at https://beltram.github.io/rfc-spice-oidc-cwt/draft-maldant-spice-oidc-cwt.html. Status information for this document may be found at https://datatracker.ietf.org/doc/draft-maldant-spice-oidc-cwt/.¶
Discussion of this document takes place on the Secure Patterns for Internet CrEdentials Working Group mailing list (mailto:[email protected]), which is archived at https://mailarchive.ietf.org/arch/browse/spice/. Subscribe at https://www.ietf.org/mailman/listinfo/spice/.¶
Source for this draft and an issue tracker can be found at https://github.com/beltram/rfc-spice-oidc-cwt.¶
This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.¶
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.¶
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."¶
This Internet-Draft will expire on 9 May 2025.¶
Copyright (c) 2024 IETF Trust and the persons identified as the document authors. All rights reserved.¶
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Revised BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Revised BSD License.¶
OpenId Connect [OIDCCore] is an authentication standard including standard claims already in use for JSON Web Tokens (JWT) [RFC7519]. CBOR Web Tokens (CWT) [RFC8392] have a claims registry, but do not include most of these claims. This draft aims at unifying use of OIDC claims in JWTs and CWTs.¶
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here.¶
This document registers existing OpenID Connect standard claims already used in JSON Web Tokens [RFC7519] for use in CBOR Web Tokens [RFC8392] without changing their semantics. The Security and Privacy Considerations respectively of Sections 16 and 17 of [OIDCCore] also apply.¶
All claims defined in this document are placed in the (CBOR Web Token (CWT) Claims) [IANA.CWT.Claims] Registry (part of the eponymous registry group). No new IANA registry is created.¶
In case any of the suggested code points would have been claimed by the time of the Working Group last call, IANA is asked to assign Claim Key values from the 170-256 range.¶
Claim Name: name¶
Claim Description: End-User's full name in displayable form including all name parts, possibly including titles and suffixes, ordered according to the End-User's locale and preferences.¶
JWT Claim Name: name¶
Claim Key: TBD1 (170 suggested)¶
Claim Value Type(s): text string¶
Change Controller: IETF¶
Claim Name: updated_at¶
Claim Description: Time the End-User's information was last updated. Its value is a number representing the number of seconds from 1970-01-01T00:00:00Z as measured in UTC until the date/time.¶
JWT Claim Name: updated_at¶
Claim Key: TBD19 (188 suggested)¶
Claim Value Type(s): uint¶
Change Controller: IETF¶