[scim] SCIM Events and Subject Identifiers Proposed Standard

Phillip Hunt <phil.hunt@independentid.com> Mon, 26 June 2023 18:43 UTC

Return-Path: <phil.hunt@independentid.com>
X-Original-To: scim@ietfa.amsl.com
Delivered-To: scim@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 10E2DC15109A for <scim@ietfa.amsl.com>; Mon, 26 Jun 2023 11:43:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.892
X-Spam-Level:
X-Spam-Status: No, score=-1.892 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=independentid-com.20221208.gappssmtp.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id H50cebBSCkTW for <scim@ietfa.amsl.com>; Mon, 26 Jun 2023 11:43:41 -0700 (PDT)
Received: from mail-pl1-x62a.google.com (mail-pl1-x62a.google.com [IPv6:2607:f8b0:4864:20::62a]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4289FC14F747 for <scim@ietf.org>; Mon, 26 Jun 2023 11:43:41 -0700 (PDT)
Received: by mail-pl1-x62a.google.com with SMTP id d9443c01a7336-1b801e6ce85so9638265ad.1 for <scim@ietf.org>; Mon, 26 Jun 2023 11:43:40 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=independentid-com.20221208.gappssmtp.com; s=20221208; t=1687805020; x=1690397020; h=date:to:references:message-id:subject:mime-version:from:from:to:cc :subject:date:message-id:reply-to; bh=SmgTyz8DV0hkZpBOIArNjANeN7nf4faoc1+oXEj6hmI=; b=LtL5XuNmz1yqgjB4JoGiMAHdHvNJfA1DaeFqF9Lm/H6Z1bYpLPm2xlm5O+eGWtVv3Q beR4pBGwJprB5ZzkBeTYfTAkVw+EnPUhvMt4Cp0NREjf7I0nAjG9178EUf71chv1aMkK Fc1ID9QDQ97rX5OtBjuxr2KPD3EZsOKpA36abKeBUwtQSHgGHJ6Fzyaa9gl4FjFwigmS B0rn+1db5SmQmE0h3ok2yUtX/g06He9FP8rhC9eUkeX3qPDXqSvDAj0ISrjIdRNrmOyS XS/Mizs5xhv7Pm1QKUCnmp9+2Fmsa+q6RieQwyb8QFkgUudcdhPr06eVlYwOgv7lKKCQ GJpA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1687805020; x=1690397020; h=date:to:references:message-id:subject:mime-version:from :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=SmgTyz8DV0hkZpBOIArNjANeN7nf4faoc1+oXEj6hmI=; b=UDqbBHWY8wLmqGNAAuOPjbzZIDkXAPetsGDTJ+3AhW2fDK6dH0mKOS3L8T7j3noWde szISeAPLVDr3Pavf02sKR0LLMA84wn/Fh/TdA4Mv69W/pV4i3UtyS078QiZ06G2Ja/GY ddZ5HbTomn0rmWLt6kCR2VwomNgPiHaTauC5oeTpNqZ+icM1t0UtS10fTkk/FDMZBx10 dEcTiBGMof5wopKED3uXr9lxvqBHieXB8h0/cWZrfgZgf108yJ/bWBxkz5XtT2yPQ1q0 VxJhwIku8skkWPSeCUAMQSy5F3o+jQMoGC1ziGPtQZFgztVMYS0aBfUdXBWGCHxpOrxX EV4A==
X-Gm-Message-State: AC+VfDyC+89cfsdPBHiCaYWvy/0sclGi2BxXHmV7QJRaQh6IJHyKN2ID 2zU14itRT76b2fm0aKRIqkkBqXw+GDRkHMemZEs=
X-Google-Smtp-Source: ACHHUZ53WCywyC+h3IwneJ9IiZUVF/ZChasRFMBVO20VAl3f+IgQf9056P6dcf3DxVzibHbdij/H4Q==
X-Received: by 2002:a17:902:650e:b0:1b6:b445:36d0 with SMTP id b14-20020a170902650e00b001b6b44536d0mr8769550plk.26.1687805019935; Mon, 26 Jun 2023 11:43:39 -0700 (PDT)
Received: from smtpclient.apple ([2001:569:540c:4900:fdea:c7d8:1b24:1288]) by smtp.gmail.com with ESMTPSA id x16-20020a170902ec9000b001b7cbc5871csm4501991plg.53.2023.06.26.11.43.39 for <scim@ietf.org> (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Mon, 26 Jun 2023 11:43:39 -0700 (PDT)
From: Phillip Hunt <phil.hunt@independentid.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_9181CC60-F9A1-4AD4-8CE3-5B34007F34B0"
Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3731.600.7\))
Message-Id: <4A25D1EC-321A-44CF-8AD9-D2E3DD983A62@independentid.com>
References: <168780294513.55882.3696051601310818487@ietfa.amsl.com>
To: SCIM WG <scim@ietf.org>
Date: Mon, 26 Jun 2023 11:43:28 -0700
X-Mailer: Apple Mail (2.3731.600.7)
Archived-At: <https://mailarchive.ietf.org/arch/msg/scim/XRdNhkQfLMifrl6nyd1FHKmZYzw>
Subject: [scim] SCIM Events and Subject Identifiers Proposed Standard
X-BeenThere: scim@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Simple Cloud Identity Management BOF <scim.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/scim>, <mailto:scim-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/scim/>
List-Post: <mailto:scim@ietf.org>
List-Help: <mailto:scim-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/scim>, <mailto:scim-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 26 Jun 2023 18:43:42 -0000

FYI.  The Subject Identifiers draft which the SCIM Events depends on has been approved (meaning it will an RFC shortly).

I will update the SCIM Events draft to reference the new version.

I believe that the OpenID Shared Signals group is also looking at depending on this draft for RISC and CAEP security events.

==> For the SCIM Events draft, the use of Subject Identifiers allows more flexibility for non-SCIM receivers to match SCIM Resources to local entities. In the initial proposal only SCIM Id and externalId was used.  As detailed in the draft, a SCIM Event’s publisher is able to issue other unique identifiers like username, email etc.

Phillip Hunt
phil.hunt@independentid.com





> Begin forwarded message:
> 
> From: The IESG <iesg-secretary@ietf.org>
> Subject: [Id-event] Protocol Action: 'Subject Identifiers for Security Event Tokens' to Proposed Standard (draft-ietf-secevent-subject-identifiers-18.txt)
> Date: June 26, 2023 at 11:09:05 AM PDT
> To: "IETF-Announce" <ietf-announce@ietf.org>
> Cc: The IESG <iesg@ietf.org>, draft-ietf-secevent-subject-identifiers@ietf.org, id-event@ietf.org, rdd@cert.org, rfc-editor@rfc-editor.org, secevent-chairs@ietf.org, yaronf.ietf@gmail.com
> 
> The IESG has approved the following document:
> - 'Subject Identifiers for Security Event Tokens'
>  (draft-ietf-secevent-subject-identifiers-18.txt) as Proposed Standard
> 
> This document is the product of the Security Events Working Group.
> 
> The IESG contact persons are Paul Wouters and Roman Danyliw.
> 
> A URL of this Internet-Draft is:
> https://datatracker.ietf.org/doc/draft-ietf-secevent-subject-identifiers/
> 
> 
> 
> 
> 
> Technical Summary
> 
>   Security events communicated within Security Event Tokens may support
>   a variety of identifiers to identify subjects related to the event.
>   This specification formalizes the notion of subject identifiers as
>   structured information that describe a subject, and named formats
>   that define the syntax and semantics for encoding subject identifiers
>   as JSON objects.  It also defines a registry for defining and
>   allocating names for such formats, as well as the sub_id JSON Web
>   Token (JWT) claim.
> 
> Working Group Summary
> 
> There was nothing notable in the WG process beyond the long dormancy this document had.
> 
> Document Quality
> 
> This is a dependency of the GNAP WG, and GNAP participants have been involved in the later development stages of this draft.
> 
> Personnel
> 
> - Document Shepherd:  Yaron Sheffer
> - Responsible AD: Roman Danyliw
> 
> _______________________________________________
> Id-event mailing list
> Id-event@ietf.org
> https://www.ietf.org/mailman/listinfo/id-event