Registry for identifiers assigned by the Swedish e- identification board
|
|
|
- Ronald Bell
- 11 years ago
- Views:
Transcription
1 Registry for identifiers assigned by the Swedish e- identification board Version
2 1 BACKGROUND STRUCTURE URI IDENTIFIERS OID IDENTIFIERS MAINTENANCE OF THE IDENTIFIER REGISTRY ASSIGNED IDENTIFIERS URL IDENTIFIERS LEVEL OF ASSURANCE (TILLITSNIVÅ) ENTITY CATEGORY IDENTIFIERS Service Entity Category Entity Category for Service Property Entity Category for Service Type CENTRAL SIGNERING AUTHENTICATION CONTEXT SIGN RESPONSE STATUS CODES OID IDENTIFIERS ASN.1 DECLARATIONS REFERENCES
3 1 Background The implementation of a Swedish infrastructure for electronic identification and electronic signature requires various types of identifiers to represent objects in protocols and data structures. This document defines the structure for identifiers assigned by the Swedish e-identification board and provides a registry for assigned identifiers. The following types of identifiers are assigned in this document: URI (Uniform Resource Identifier) OID (Object Identifier) This registry is limited to registering assigned identifiers. Identifiers in this registry are typically defined within the context of a separate specification, which defines the semantic meaning of the identifier within the context of a particular protocol and/or data structure. Where applicable, this registry provides references to the documents where the exact meaning of each identifier is defined. 3
4 2 Structure The basic structure of identifiers assigned by the Swedish e-identification board is based on the following components Grundstruktur för E-legitimationsnämndens identifierare bygger på följande grundläggande parametrar: Parameter Prefix Category Version (optional) Identifier Description The leading portion of the identifier which associates the identifier with this registry and identifies the Swedish e-identification board as the assigner of the identifier. A code for the category of an identifier. Each category is a defined context for a collection of identifiers within the scope of a protocol, service or object type. An indicator of the version of the object represented by this identifier. The exact semantic of the version indicator, if present, is defined within each category. A sequence of characters or numbers (according to the syntax of the identifier type), which distinguish this identifier among all other identifiers within a particular prefix, category and version. 2.1 URI identifiers All URI identifiers in this registry are of URL type (Uniform Resource Locator), assigned under the prefix These URL identifiers are defined using the following structure: OID identifiers An object identifier consists of a node in a hierarchically-assigned namespace, formally defined using the ITU-T's ASN.1 standard, X.690. Successive numbers of the nodes, starting at the root of the tree, identify each node in the tree. Designers set up new nodes by registering them under the node's registration authority. The root of the tree contains the following three arcs: 0: ITU-T 1: ISO 2: joint-iso-itu-t 4
5 Object identifiers are in this document represented as a string containing a sequence of integers separated by a dot (. ), e.g , where each integer represents a node in the hierarchy. The node assigned to the Swedish e-identification board is: This represents a hierarchical structure of nodes in the following sequence: 1 = ISO 2 = ISO member body 752 = The Swedish Standardization Institute (SIS-ITS) 201 = Swedish e-identification board This node is used as the Prefix (root node) for all OID identifiers in this registry, using the following structure: {category}.{identifier} OID identifiers according to this structure assign a node for each category and an identifier node under this category node. No node in this structure is assigned as version node. Version is handled, when necessary, within the identifier portion of the OID, typically by assigning a new identifier. 5
6 3 Maintenance of the identifier registry This document and updates of this document is currently available at: This is a temporary location until a permanent location has been assigned for this document. The proposed permanent location is ( 6
7 4 Assigned Identifiers 4.1 URL identifiers The following category codes are defined: Code loa ec sprop st csig auth-cont sig-status Category Level of Assurance. Identifiers representing level of assurance for federated identity (Tillitsnivå) Entity Category. Generic service type declarations for service matching. Service Property. Specific entity category identifiers for specific service property. Service Type. Specific entity category identifiers for defined types of services in the federation. Central Signing Service Identifiers used by the central signing service infrastructure Authentication context information schema Sign response status codes Level of Assurance (Tillitsnivå) Assurance levels (Tillitsnivåer) according to the assurance framework for the Swedish eid framework (Tillitsramverket för svensk e- legitimation). URL Object Reference Assurance level 1 [TillitRamv] Assurance level 2 [TillitRamv] Assurance level 3 [TillitRamv] Assurance level 4 [TillitRamv] 7
8 4.1.2 Entity category identifiers Identifiers for categories of service entities, specified as an EntityAttribute in the federation metadata Service Entity Category Identifiers for entity categories representing alternative sets of requirements. URL Object Reference Service consuming/providing assertions based on assurance level 3, implementing the attribute profile ELN-AP-Pnr-01. [EntityCat] Entity Category for Service Property Identifiers for defined service properties. URL Object Reference Service adapted to require/provide user [EntityCat] authentication based on mobile devices Entity Category for Service Type Identifiers for defined service types. URL Object Reference Electronic signature service [EntityCat] 8
9 4.1.3 Central Signering Identifiers used in the protocol for requesting services form a central signing service. URL Object Reference XML schema name space for the Eid2 [CSignProt] protocol extensions to the OASIS DSS protocol. Implementation profile identifier for the Eid2 protocol extensions to the OASIS DSS protocol. [CSignProf] Authentication context Identifiers associated with the Authentication Context X.509 extension URL Object Referens XML schema name space for SAML Authentication Context Information in the Authentication Context X.509 certificate extension [AuthContExt] 9
10 4.1.5 Sign response status codes Status code identifiers for the Eid2 DSS Extension for SAML based Central Signing service. The following identifiers provide defined status codes for inclusion in a <ResultMinor> element of the <Result> element of a sign response message according to the OASIS standard Digital Signature Service Core Protocols, Elements, and Bindings Version 1.0. URL Object Referens The time window for the signature [OASIS-DSS] request has expired. The authenticated user does not [OASIS-DSS] match the signer identity attributes in the request. The requested level of assurance for user authentication is not supported. [OASIS-DSS] 10
11 4.2 OID identifiers Defined categories: Code Category 0 ASN.1 modules 1 Test identifiers 2 Policy identifiers 3 Attribute identifiers 4 Qualified Certificate Statement identifiers (RFC 3739) 5 X.509 certificate extension identifiers The following OIDs are defined in the ASN.1 declarations in 4.2.1: OID Object Referens Authentication Context extension [AuthContExt] Organization Affiliation Attribute [AttrProf] 11
12 4.2.1 ASN.1 declarations -- Object Identifier Registry for the Swedish E-identification board id-eleg OBJECT IDENTIFIER ::= {iso(1) member-body(2) se(752) e-legitimationsnamnden(201)} -- E-legnamnden arcs id-mod OBJECT IDENTIFIER ::= { id-eleg 0 } -- ASN.1 modules id-test OBJECT IDENTIFIER ::= { id-eleg 1 } -- OIDs for test id-pol OBJECT IDENTIFIER ::= { id-eleg 2 } -- Policy id-attr OBJECT IDENTIFIER ::= { id-eleg 3 } -- Attributes id-qcs OBJECT IDENTIFIER ::= { id-eleg 4 } -- QC Statement id-ce OBJECT IDENTIFIER ::= { id-eleg 5 } -- Cert Extensions -- E-legnamnden modules id-mod-qcauthcontext OBJECT IDENTIFIER ::= { id-mod 1 } -- E-legnamnden OIDs for test -- E-legnamnden Policy -- E-legnamnden Attributes id-attr-org-affiliation OBJECT IDENTIFIER ::= { id-attr 1 } -- E-legnamnden QC Statement extension id-qcs-sid OBJECT IDENTIFIER ::= { id-qcs 1 } -- Semantics Identifiers id-qcs-statement OBJECT IDENTIFIER ::= { id-qcs 2 } - QC statements -- E-legnamnden Certificate Extensions id-ce-authcontext OBJECT IDENTIFIER ::= { id-ce 1 } 12
13 5 References References to documents identified in section 4. ID Title URL [AuthContExt] Authentication Context Certificate Extension draft-santesson-auth-context-extension-04 [EntityCat] Entity Categories for the Swedish eid Framework [TillitRamv] Tillitsramverk för svensk E-legitimatioin [CSignProt] Eid2 DSS Extension for SAML based Central Signing service - Version 1.0 [CSignProf] Implementation profile for using OASIS DSS in Central Signing services [AttrProf] Attribute Profile for the Swedish eid Framework [OASIS-DSS] Digital Signature Service Core Protocols, Elements, and Bindings Version
Digital Imaging and Communications in Medicine (DICOM) Part 10: Media Storage and File Format for Media Interchange
Digital Imaging and Communications in Medicine (DICOM) Part 10: Media Storage and File Format for Media Interchange Published by National Electrical Manufacturers Association 1300 N. 17th Street Rosslyn,
Principles to be observed by Pre-LOUs that wish to integrate into the Interim Global Legal Entity Identifier System (GLEIS)
Principles to be observed by Pre-LOUs that wish to integrate into the Interim Global Legal Entity Identifier System (GLEIS) Executive Summary This note establishes the principles that should be observed
Quality Authenticator Scheme
COMPETITIVENESS AND INNOVATION FRAMEWORK PROGRAMME ICT Policy Support Programme (ICT PSP) Towards pan-european recognition of electronic IDs (eids) ICT PSP call identifier: ICT-PSP/2007/1 ICT PSP Theme/objective
ETSI TS 102 640-1 V2.1.1 (2010-01) Technical Specification
TS 102 640-1 V2.1.1 (2010-01) Technical Specification Electronic Signatures and Infrastructures (ESI); Registered Electronic Mail (REM); Part 1: Architecture 2 TS 102 640-1 V2.1.1 (2010-01) Reference RTS/ESI-000064-1
USI Registry System. User Guide. for
USI Registry System User Guide for Training Organisations VET Admission Bodies VET Related Bodies Version 2.0 April 2015 This user guide has been prepared to assist users of the Unique Student Identifier
Guidelines for the Selection, Configuration, and Use of Transport Layer Security (TLS) Implementations
NIST Special Publication 800-52 Revision 1 Guidelines for the Selection, Configuration, and Use of Transport Layer Security (TLS) Implementations Tim Polk Kerry McKay Santosh Chokhani http://dx.doi.org/10.6028/nist.sp.800-52r1
Preservation Metadata and the OAIS Information Model. A Metadata Framework to Support the Preservation of Digital Objects
Preservation Metadata and the OAIS Information Model A Metadata Framework to Support the Preservation of Digital Objects A Report by The OCLC/RLG Working Group on Preservation Metadata http://www.oclc.org/research/pmwg/
U.S. National Archives and Records Administration (NARA)
U.S. National Archives and Records Administration (NARA) Technical Guidelines for Digitizing Archival Materials for Electronic Access: Creation of Production Master Files Raster Images For the Following
GS1 System Architecture Document. How GS1 Standards fit together
How GS1 Standards fit together Release 4.0.1, Approved, 11 May 2015 Document Summary Document Item Document Name Current Value GS1 System Architecture Document Document Date 11 May 2015 Document Version
ETSI TS 102 822-2 V1.4.1 (2007-11) Technical Specification
TS 102 822-2 V1.4.1 (2007-11) Technical Specification Broadcast and On-line Services: Search, select, and rightful use of content on personal storage systems ("TV-Anytime"); Part 2: Phase 1 - System description
METADATA STANDARDS AND METADATA REGISTRIES: AN OVERVIEW
METADATA STANDARDS AND METADATA REGISTRIES: AN OVERVIEW Bruce E. Bargmeyer, Environmental Protection Agency, and Daniel W. Gillman, Bureau of Labor Statistics Daniel W. Gillman, Bureau of Labor Statistics,
Oracle SQL Developer. Data Modeler User s Guide Release 2.0 E13677-01
Oracle SQL Developer Data Modeler User s Guide Release 2.0 E13677-01 June 2009 Provides conceptual and usage information about Oracle SQL Developer Data Modeler, a data modeling and database design tool
COUNTER Online Metrics
COUNTER Online Metrics www.projectcounter.org The COUNTER Code of Practice for e-resources: Release 4 Published April 2012 Abstract COUNTER provides an international, extendible Code of Practice for e-resources
CERTIFICATE POLICIES (CP) Legal Person Certificate ICE SECURITY DATA SEGURIDAD EN DATOS Y FIRMA DIGITAL, S.A. CP
CERTIFICATE POLICIES (CP) Certificate ICE SECURITY DATA SEGURIDAD EN DATOS Y FIRMA DIGITAL, S.A. CP Certificate INDEX 1. LEGAL FRAMEWORK... 5 1.1. Legal Base... 5 1.2. Validation... 5 1.3. Legal Support...
How To Validate Software
General Principles of Software Validation; Final Guidance for Industry and FDA Staff Document issued on: January 11, 2002 This document supersedes the draft document, "General Principles of Software Validation,
Guide for Applicants COSME calls for proposals 2015
Guide for Applicants COSME calls for proposals 2015 CONTENTS I. Introduction... 3 II. Preparation of the proposal... 3 II.1. Relevant documents... 3 II.2. Participants... 4 Consortium coordinator... 4
Statement on Standards for Continuing Professional Education (CPE) Programs
Statement on Standards for Continuing Professional Education (CPE) Programs Revised January 2012 Table of Contents Introduction... i Preamble... ii Article I - Definitions... 1 Article II General Guidelines
IHE IT Infrastructure Technical Framework. Volume 2b (ITI TF-2b) Transactions Part B Sections 3.29 3.64
Integrating the Healthcare Enterprise 5 10 IHE IT Infrastructure Technical Framework Volume 2b (ITI TF-2b) Transactions Part B Sections 3.29 3.64 15 20 Revision 11 Final Text September 23, 2014 25 Please
UPnP Device Architecture 1.1
UPnP Device Architecture 1.1 Document Revision Date: October 15, 2008 2008 Contributing Members of the UPnP Forum. All rights reserved. See http://www.upnp.org/info/cpyright.asp for more information. Authors*
TECHNICAL REPORT. DSL Forum TR-069. CPE WAN Management Protocol. May 2004. Produced by: DSLHome-Technical Working Group
TECHNICAL REPORT DSL Forum CPE WAN Management Protocol May 2004 Produced by: DSLHome-Technical Working Group Editors: Jeff Bernstein, 2Wire Tim Spets, Westell Working Group Co-Chairs: Greg Bathrick, Texas
REFERENCE MODEL FOR AN OPEN ARCHIVAL INFORMATION SYSTEM (OAIS)
Recommendation for Space Data System Practices REFERENCE MODEL FOR AN OPEN ARCHIVAL INFORMATION SYSTEM (OAIS) RECOMMENDED PRACTICE CCSDS 650.0-M-2 MAGENTA BOOK June 2012 Recommendation for Space Data System
IT Project Management Practices Guide
IT Project Management Practices Guide Introduction The IT Project Management Practices Guide (Guide) contains a repeatable, institutionwide approach for the management of application development and/or
All Your Clouds are Belong to us Security Analysis of Cloud Management Interfaces
All Your Clouds are Belong to us Security Analysis of Cloud Management Interfaces Juraj Somorovsky, Mario Heiderich, Meiko Jensen, Jörg Schwenk Chair for Network and Data Security Horst Görtz Institute
Understanding Metadata
Understanding Metadata What is Metadata?... 1 What Does Metadata Do?... 1 Structuring Metadata... 2 Metadata Schemes and Element Sets... 3 Dublin Core...3 TEI and METS...4 MODS...5 EAD and LOM...6 ,
ISO/IEC Directives Part 2
ISO/IEC DIR 2 ISO/IEC Directives Part 2 Edition 6.0 2011-04 Rules for the structure and drafting of International Standards ISO/IEC DIR 2:2011(E) THIS PUBLICATION IS COPYRIGHT PROTECTED Copyright 2011
A brief overview of developing a conceptual data model as the first step in creating a relational database.
Data Modeling Windows Enterprise Support Database Services provides the following documentation about relational database design, the relational database model, and relational database software. Introduction
SUMMARY NOMENCLATURE 1. INTRODUCTION
ADVANCED CAD PLM INTEGRATION IN A NAVAL SHIPBUILDING ENVIRONMENT F. Alonso, SENER Ingeniería y Sistemas S.A., Spain C. Gonzalez, SENER Ingeniería y Sistemas S.A., Spain R. Perez, SENER Ingeniería y Sistemas
The detailed process of becoming a FIRST member is described at http://first.org/membership/.
FIRST Site Visit Requirements and Assessment Document originally produced by CERT Program at the Software Engineering Institute at Carnegie Mellon University And Cisco Systems PSIRT Revision When Who What
Managing digital records without an electronic record management system
Managing digital records without an electronic record management system Crown copyright 2012 You may re-use this information (excluding logos) free of charge in any format or medium, under the terms of
Health Care Innovation Awards Round Two
Health Care Innovation Awards Round Two U.S. Department of Health and Human Services Centers for Medicare & Medicaid Services (CMS) Center for Medicare & Medicaid Innovation (CMMI) Cooperative Agreement
