%%%
title = "DataRight+ Security Profile: Baseline" area = "Internet" workgroup = "datarightplus" submissionType = "independent"
[seriesInfo] name = "Internet-Draft" value = "draft-authors-datarightplus-infosec-baseline-latest" stream = "independent" status = "experimental"
date = 2024-02-17T00:00:00Z
[[author]] initials="S." surname="Low" fullname="Stuart Low" organization="Biza.io" [author.address] email = "[email protected]"
[[author]] initials="B." surname="Kolera" fullname="Ben Kolera" organization="Biza.io" [author.address] email = "[email protected]"
%%%
.# Abstract
The DataRight+ Security Profile: Baseline is intended to be a compatible profile of the [@!CDS] presented as a profile of [@!FAPI-1.0-Advanced]. This profile focuses primarily on the obligations between Provider and Initiator with respect to authorisation requests and does so as an overlay on the underlying FAPI profile combined with the inclusion of specified authorisation types.
This profile does not attempt to provide elaboration on registration protocols, certificate profiles, federation or other components specified within the [@!CDS]. Further terminology used is deliberately jurisdiction agnostic, please refer to [@!DATARIGHTPLUS-ROSETTA] for specific ecosystem mappings.
.# Notational Conventions
The keywords "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in [@!RFC2119].
{mainmatter}
This document specifies methods for the following:
- method of obtaining OAuth2 tokens as originally described within the [@!CDS] and;
- requirements related to participants for initiating authorisations and obtaining ongoing authorisation credentials
This document does not seek to:
- specify correlation elements between technical and the legal obligations contained within documents such as the CDR Rules;
- restate unchanged requirements from upstream specifications
- consider historical obligations which have expired
This specification uses the term "JSON Web Token (JWT)" as defined by [@!JWT] and the terms "Consumer", "Ecosystem Authority", "Initiator", "Personally Identifiable Information (PII)", "Provider", "User" as defined by [@!DATARIGHTPLUS-ROSETTA].
The specification also defines the following terms:
Pairwise Pseudonymous Identifier (PPID) : Identifier that identifies the Consumer to a Initiator that cannot be correlated with the Consumer's PPID at another Initiator.
User Identifier : A User Identifier is a unique piece of information, typically a username, which identifies the User
The authorisation server SHALL support the provisions specified in clause 5.2.2 of [@!FAPI-1.0-Advanced] with the following sections replaced:
- Section 5.2.2-1: SHALL accept only PAR issued request object passed by reference using the
request_uri
parameter; - Section 5.2.2-2: SHALL require the
response_type
valuecode
in conjunction with theresponse_mode
valuejwt
; - Section 5.2.2-11: SHALL support the pushed authorization request endpoint as described in PAR;
- Section 5.2.2-14: SHALL authenticate the confidential client using
private_key_jwt
specified in section 9 of [@!OIDC-Core]
In addition, the authorisation server:
- SHALL support the [@!OIDC-Core] scopes
openid
andprofile
; - SHALL support signed ID tokens and MAY support signed and encrypted ID tokens;
- SHALL issue access tokens with an expiry time of between 2 and 10 minutes;
- SHALL provide the lifetime remaining of an access token as an attribute named
expires_in
within the token endpoint response; - SHALL generate the
sub
as a PPID as described in Section 8 of [@!OIDC-Core]; - SHALL issue
request_uri
values which are one-time use and expire between 10 seconds and 90 seconds (this overrides [@RFC9126] clause 4); - SHALL NOT specify duplicate
kid
parameters within the endpoint advertised atjwks_uri
; - SHALL support a Token End Point as specified in Section 3.1.3 of [@!OIDC-Core];
- SHALL support a UserInfo Endpoint as specified in Section 5.3 of [@!OIDC-Core];
- SHALL for each Provider, utilise a different issuer as specified in Section 1.2 of [@!OIDC-Core];
- SHALL support discovery, as defined in OpenID Connect Discovery 1.0 [@!OIDC-Discovery];
- SHALL support an introspection endpoint, as defined in [@!RFC7662];
- SHALL support a revocation endpoint, as defined in [@!RFC7009];
- SHALL ensure all operations meet at least the requirements of Credential Level
CL1
rules of [@!TDIF]; - SHALL NOT utilise refresh token rotation
During the authorisation flow, the authorisation server:
- SHALL request a User Identifier that can identify the relationship between the user and the Consumer;
- SHALL request a User Identifier already known by the User;
- SHALL use a one-time password (OTP) provided to the Consumer through an existing channel or mechanism;
- SHALL NOT request the User to provide a known password;
- SHALL NOT introduce friction designed to make the authorisation process more difficult than it needs to be
The discovery document from the authorisation server:
- SHALL support the
require_pushed_authorization_requests
parameter as described in [@!RFC9126] at the OpenID Connect Discovery 1.0 [@!OIDC-Discovery] endpoint; - SHALL support the
require_pushed_authorization_requests
parameter as described in [@!RFC9126] at the [@!RFC8414] endpoint;
The introspection endpoint:
- SHALL NOT support introspection of access tokens
- SHALL include the
sub
,exp
andscope
attributes - SHALL NOT include the
username
attribute
The revocation endpoint:
- SHALL support revocation of refresh tokens
- SHALL support revocation of access tokens
- MAY support revocation of ID tokens
The authorisation server:
- SHALL support the [@!OIDC-Core] claims of
sub
,auth_time
,name
,given_name
family_name
andlast_updated
; - SHALL ignored and not authorise any other claims outlined in [@!OIDC-Core];
- SHOULD support the [@!OIDC-Core]
acr
claim; - MAY support the [@!OIDC-Core] claims of
email
,email_verified
,phone_number
andphone_number_verified
;
The resource server provided by Providers:
- SHALL support the provisions specified in clause 5.2.2 of [@!FAPI-1.0-Baseline];
The Initiators authorisation client:
- SHALL support the provisions specified in clause 5.2.3 and 5.2.4 of [@!FAPI-1.0-Baseline];
- SHALL support pushed authorisation requests as described in [@!RFC9126];
- SHALL obtain the consent of the Consumer prior to commencing authorisation with the Provider;
- SHALL submit authorisation requests containing a
exp
claim, in accordance with [@!JWT] Section 4.1.4; - SHALL submit authorisation requests containing a
exp
claim that is less than or equal to3600
; - SHALL submit authorisation requests containing a
nbf
claim in accordance with [@!JWT] Section 4.1.5
Note: The form and structure of the consent obtained by the authorisation client is outside the scope of this document.
The resource server SHALL support the provisions specified in clause 6.2.2 of [@!FAPI-1.0-Baseline] with the following sections replaced:
- Section 6.2.2-3: SHALL send the last time the customer logged into the client in the x-fapi-auth-date header where the value is supplied as a HTTP-date as in Section 7.1.1.1 of RFC7231, e.g., x-fapi-auth-date: Tue, 11 Sep 2012 19:43:31 GMT;
- Section 6.2.2-4: SHALL send the customer’s IP address if this data is available in the x-fapi-customer-ip-address header, e.g., x-fapi-customer-ip-address: 2001:DB8::1893:25c8:1946 or x-fapi-customer-ip-address: 198.51.100.119; and
Section 8.5 of [@!FAPI-1.0-Advanced] SHALL apply.
In addition:
- Use of Mutual TLS is REQUIRED at all Authenticated Resource Server endpoints except where required for Discovery or Consumer browser access (ie. Authorisation endpoint);
- All parties SHALL apply the certificate management policy requirements of the relevant Ecosystem Authority
Claims available via the profile scope will only return the details of the User which may be different to the Consumer.
Providers SHOULD explicitly capture Claims requested by the Initiator. If the data cluster or [OIDC] profile scope changes meaning in future this ensures the Provider only returns what the Consumer initially authorised to disclose.
Initiators SHOULD record the following information each time an authorisation flow is executed:
- User Identifier;
- timestamp;
- IP;
- scopes;
- duration
The following people contributed to this document:
- Stuart Low (Biza.io) - Editor
- Ben Kolera (Biza.io)
{backmatter}
<title>Consumer Data Standards (CDS)</title>Data Standards Body (Treasury)
<title abbrev="FAPI 1.0 Baseline">Financial-grade API Security Profile 1.0 - Part 1: Baseline</title>Nat ConsultingYubicoIllumila
<title>OpenID Connect Core 1.0 incorporating errata set 1</title> NRI Ping Identity Microsoft Google Salesforce
<title>OpenID Connect Discovery 1.0 incorporating errata set 1</title> NRI Ping Identity Microsoft Illumila
<title abbrev="FAPI 1.0 Advanced">Financial-grade API Security Profile 1.0 - Part 2: Advanced</title>Nat ConsultingYubico Illumila
<title>JSON Web Token (JWT)</title> Microsoft Ping Identity Nomura Research Institute
<title>DataRight+ Rosetta Stone</title>Biza.io
<title>Trusted Digital Identity Framework ( TDIF)</title>Commonwealth of Australia (Digital Transformation Agency)
<title>OAuth 2.0 Pushed Authorization Requests</title>yes.comPing IdentityNAT.ConsultingMoneyhub Financial TechnologyAuth0