Skip to content

Commit 8fcc3a7

Browse files
December 2024 release
1 parent f6b93ba commit 8fcc3a7

13 files changed

+251
-239
lines changed

00 - Swedish eID Framework - Introduction.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@
88

99
# Introduction to the Sweden Connect Technical Framework
1010

11-
### 2024-12-02
11+
### 2024-12-04
1212

1313
Registration number: **2019-267**
1414

00 - Tekniskt ramverk - Introduktion.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@
88

99
# En introduktion till Sweden Connect Tekniskt ramverk
1010

11-
### 2024-12-02
11+
### 2024-12-04
1212

1313
Diarienummer: **2019-267**
1414

02 - Deployment Profile for the Swedish eID Framework.md

Lines changed: 53 additions & 53 deletions
Large diffs are not rendered by default.

03 - Registry for Identifiers.md

Lines changed: 89 additions & 89 deletions
Large diffs are not rendered by default.

04 - Attribute Specification for the Swedish eID Framework.md

Lines changed: 26 additions & 30 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@
88

99
# Attribute Specification for the Swedish eID Framework
1010

11-
### Version 1.8 - 2024-12-04 - *Draft version*
11+
### Version 1.8 - 2024-12-04
1212

1313
Registration number: **2019-310**
1414

@@ -156,7 +156,7 @@ the provider.
156156
**Note**: An Attribute Provider may also release other attributes, not
157157
specified by the defined attribute sets it supports. See further section
158158
6.2.1, “Attribute Release and Consuming Rules”, of “Deployment Profile for the Swedish
159-
eID Framework” (\[[EidDeployProf](#eiddeployprof)\]).
159+
eID Framework” (\[[SC.SAML.Profile](#sc-saml-profile)\]).
160160

161161
In order to comply with a defined attribute set, the following attribute
162162
requirements apply:
@@ -228,7 +228,7 @@ The “Organizational Identity for Natural Persons” attribute set provides bas
228228

229229
**Typical use**: In an attribute release policy that provides basic organizational identity information about a natural person.
230230

231-
The "Organizational Identity for Natural Persons" attribute set defines a minimum set of attributes needed to provide organizational identity information about a person. Should an attribute consumer require additional attributes, such as surname and given name, the personal identity number or an organizational unit name, this can be achieved by either requesting other attribute sets or by explicitly requesting individual attributes. See further section 6.2.1, “Attribute Release and Consuming Rules”, of “Deployment Profile for the Swedish eID Framework” (\[[EidDeployProf](#eiddeployprof)\]).
231+
The "Organizational Identity for Natural Persons" attribute set defines a minimum set of attributes needed to provide organizational identity information about a person. Should an attribute consumer require additional attributes, such as surname and given name, the personal identity number or an organizational unit name, this can be achieved by either requesting other attribute sets or by explicitly requesting individual attributes. See further section 6.2.1, “Attribute Release and Consuming Rules”, of “Deployment Profile for the Swedish eID Framework” (\[[SC.SAML.Profile](#sc-saml-profile)\]).
232232

233233
> \[*\]: The `displayName` attribute MAY contain personal information such as the given name or surname, but it MAY also be used as an anonymized display name, for example, "Administrator 123". This is decided by the issuing organization.
234234
@@ -374,9 +374,9 @@ Attributes with a “No” value in the column "Multi-valued" MUST NOT have more
374374

375375
Attributes with a "Yes" value in the column "Scoped" are scoped attributes. A scoped attribute expresses values in a string-valued attribute of the form `value@scope`, where `scope` takes the form of a domain name or something similar such as an organizational identifier.
376376

377-
An Identity Provider wishing to release scoped attributes must register the scopes with the federation operator. After the federation operator has authorized the Identity Provider for the given scopes, they are declared in the Identity Provider's metadata entry. See section 2.1.3.1 of \[[EidDeployProf](#eiddeployprof)\] for details.
377+
An Identity Provider wishing to release scoped attributes must register the scopes with the federation operator. After the federation operator has authorized the Identity Provider for the given scopes, they are declared in the Identity Provider's metadata entry. See section 2.1.3.1 of \[[SC.SAML.Profile](#sc-saml-profile)\] for details.
378378

379-
A Service Provider consuming a scoped attribute SHOULD assert that the issuing Identity Provider is authorized to issue attributes with the given scope by checking the Identity Provider's metadata entry as described in section 6.2.1 of \[[EidDeployProf](#eiddeployprof)\].
379+
A Service Provider consuming a scoped attribute SHOULD assert that the issuing Identity Provider is authorized to issue attributes with the given scope by checking the Identity Provider's metadata entry as described in section 6.2.1 of \[[SC.SAML.Profile](#sc-saml-profile)\].
380380

381381
**Note:** The `value` part of a scoped attribute MAY contain a `@`-character, for example when the value part is an email address, or a User Principal Name (UPN). Therefore, consumers of scoped attributes MUST use the last `@`-character as a delimiting character when splitting a scoped attribute into its `value` and `scope` parts.
382382

@@ -435,7 +435,7 @@ process.
435435

436436
The `authServerSignature` may be included in assertions in cases where there are requirements to include a digitally signed proof from the authentication server at which the end user authenticated. This is mainly useful in cases where the SAML Identity Provider delegates end user authentication to a subordinate authentication server.
437437

438-
> \[*\]: Note that an authentication process, may be “authentication for signature” as specified in section 7 of \[[EidDeployProf](#eiddeployprof)\].
438+
> \[*\]: Note that an authentication process, may be “authentication for signature” as specified in section 7 of \[[SC.SAML.Profile](#sc-saml-profile)\].
439439
440440
<a name="the-sad-attribute"></a>
441441
#### 3.2.3. The sad Attribute
@@ -444,23 +444,23 @@ The `sad` attribute holds Signature Activation Data that is required by a
444444
signature service in order to service a signature request in accordance
445445
with CEN EN 419 241-2. The `sad` attribute holds a single string
446446
attribute value. The format of the string value is defined in the "Signature Activation Protocol
447-
for Federated Signing" specification \[[SigSAP](#sigsap)\].
447+
for Federated Signing" specification \[[SC.SAP](#sc-sap)\].
448448

449449
<a name="the-signmessagedigest-attribute"></a>
450450
#### 3.2.4. The signMessageDigest Attribute
451451

452452
The `signMessageDigest` attribute is included in an assertion as a proof that an Identity Provider displayed
453453
a sign message for the user and that the user actively confirmed acceptance of this sign message. This sign
454454
message is the `SignMessage` extension that may be included in an authentication request by Signature Service
455-
Service Providers. See section 7 of \[[EidDeployProf](#eiddeployprof)\] for details.
455+
Service Providers. See section 7 of \[[SC.SAML.Profile](#sc-saml-profile)\] for details.
456456

457457
The attribute value format for the `signMessageDigest` attribute is `digest-algorithm-identifier;sign-message-digest`, where
458458
`digest-algorithm-identifier` is the XML Security algorithm URI identifier of the selected digest algorithm and
459-
`sign-message-digest` is `base64(digest(msg))`. The `msg` is the UTF-8 encoded bytes of the sign message that was displayed. It equals the `csig:Message` element value of the `csig:SignMessage` (\[[DSSExt](#dssext)\]). Thus, if the `csig:Message` element is encrypted into a `csig:EncryptedMessage`, the element value after decryption should be used.
459+
`sign-message-digest` is `base64(digest(msg))`. The `msg` is the UTF-8 encoded bytes of the sign message that was displayed. It equals the `csig:Message` element value of the `csig:SignMessage` (\[[SC.DSS.Ext](#dssext)\]). Thus, if the `csig:Message` element is encrypted into a `csig:EncryptedMessage`, the element value after decryption should be used.
460460

461461
Entities compliant with this specification MUST use `http://www.w3.org/2001/04/xmlenc#sha256` as the digest algorithm,
462462
unless the recipient of the `signMessageDigest` attribute has declared another digest algorithm as preferred in its
463-
metadata entry (see section 2.1.1.3 of [[EidDeployProf](#eiddeployprof)\]). In those cases this algorithm MAY be used.
463+
metadata entry (see section 2.1.1.3 of [[SC.SAML.Profile](#sc-saml-profile)\]). In those cases this algorithm MAY be used.
464464

465465
**Example:**
466466

@@ -496,7 +496,7 @@ This specification does not impose any specific requirements concerning the pers
496496

497497
**Note**: In the general case, an attribute consumer MUST NOT assume a particular format or meaning of the personal identifier part since different organizations may use different formats. An attribute consumer should also be aware that a personal identifier separated from its organizational identifier code can not be regarded as unique.
498498

499-
**Note**: The `orgAffiliation` is a [scoped attribute](#scoped-attributes) meaning that producing and consuming such an attribute MUST follow the rules given in sections 2.1.3.1 and 6.2.1 of \[[EidDeployProf](#eiddeployprof)\].
499+
**Note**: The `orgAffiliation` is a [scoped attribute](#scoped-attributes) meaning that producing and consuming such an attribute MUST follow the rules given in sections 2.1.3.1 and 6.2.1 of \[[SC.SAML.Profile](#sc-saml-profile)\].
500500

501501
<a name="the-previouspersonalidentitynumber-attribute"></a>
502502
#### 3.2.6. The previousPersonalIdentityNumber Attribute
@@ -547,7 +547,7 @@ the user in a common format regardless of the composition of the
547547
original attributes received from the authenticating source. The `prid`
548548
attribute value is not stored in any registry, but derived from the
549549
received attributes at each authentication instant according to defined
550-
algorithms specified in \[[ConstructedAttr](#constructedattr)\]. The algorithm ensures that
550+
algorithms specified in \[[SC.Constructed](#sc-constructed)\]. The algorithm ensures that
551551
each `prid` is unique for each authenticated entity, but does not ensure
552552
persistence. If the attributes received for an entity changes over time,
553553
the `prid` attribute may also change dependent on the defined `prid`
@@ -565,7 +565,7 @@ This may assist users with low persistence expectancy to regain control
565565
of their user account, should their `prid` change in the future.
566566

567567
The specification “eIDAS Constructed Attributes Specification for the
568-
Swedish eID Framework”, \[[ConstructedAttr](#constructedattr)\], declares the details for
568+
Swedish eID Framework”, \[[SC.Constructed](#sc-constructed)\], declares the details for
569569
how the `prid` and `pridPersistence` attributes are generated and how they
570570
should be processed.
571571

@@ -588,7 +588,7 @@ process.
588588
<a name="conversion-of-eidas-attributes"></a>
589589
#### 3.3.3. Conversion of eIDAS Attributes
590590

591-
The attributes specified within eIDAS (\[[eIDAS\_Attr](#eidas-attr)\]) does not use
591+
The attributes specified within eIDAS (\[[eIDAS.Attributes](#eidas-attr)\]) does not use
592592
simple string type values. Instead each attribute is represented using
593593
its own dedicated XML data type. This affects interoperability in a
594594
negative way since most standard SAML software need to be modified to
@@ -618,15 +618,15 @@ Swedish eID Framework.
618618
| EmailAddress<br />`http://eidas.europa.eu/attributes/naturalperson/EmailAddress` | mail<br />urn:oid:0.9.2342.19200300.100.1.3 |
619619

620620
**Note**: When converting an eIDAS attribute that makes use of
621-
“transliteration” (as described in section 2.4 of \[[eIDAS\_Attr](#eidas-attr)\])
621+
“transliteration” (as described in section 2.4 of \[[eIDAS.Attributes](#eidas-attr)\])
622622
attribute values having the `LatinScript` attribute set to `false` will not
623623
be part of the resulting attribute.
624624

625625
<a name="conversion-of-eidas-currentaddress"></a>
626626
##### 3.3.3.1. Conversion of eIDAS CurrentAddress
627627

628628
The eIDAS attribute `CurrentAddress` is defined in section 2.2.9 of
629-
\[[eIDAS\_Attr](#eidas-attr)\]. Its value is a Base64-encoding of an XML-structure of
629+
\[[eIDAS.Attributes](#eidas-attr)\]. Its value is a Base64-encoding of an XML-structure of
630630
the type CurrentAddressStructuredType.
631631

632632
<xsd:complexType name="CurrentAddressStructuredType">
@@ -729,7 +729,7 @@ following attribute:
729729
730730
<a name="id-binding"></a>
731731
**\[ID-Binding\]**
732-
> [Binding of eIDAS Attributes to Swedish Personal Identity Numbers](https://docs.swedenconnect.se/technical-framework/Identity_Binding.html)
732+
> [Binding eIDAS Identities to Records in the Swedish Population Register](https://docs.swedenconnect.se/technical-framework/Identity_Binding.html)
733733
734734
<a name="x520"></a>
735735
**\[X.520\]**
@@ -755,28 +755,24 @@ following attribute:
755755
**\[SambiAttr\]**
756756
> [Sambi Attributspecifikation](https://wiki.federationer.internetstiftelsen.se/pages/viewpage.action?pageId=46465316).
757757
758-
<a name="tillitramv"></a>
759-
**\[TillitRamv\]**
760-
> [Tillitsramverket för Svensk e-legitimation](https://www.digg.se/digitala-tjanster/e-legitimering/tillitsnivaer-for-e-legitimering/tillitsramverk-for-svensk-e-legitimation).
761-
762-
<a name="eiddeployprof"></a>
763-
**\[EidDeployProf\]**
758+
<a name="sc-saml-profile"></a>
759+
**\[SC.SAML.Profile\]**
764760
> [Deployment Profile for the Swedish eID Framework](https://docs.swedenconnect.se/technical-framework/latest/02_-_Deployment_Profile_for_the_Swedish_eID_Framework.html).
765761
766-
<a name="constructedattr"></a>
767-
**\[ConstructedAttr\]**
762+
<a name="sc-constructed"></a>
763+
**\[SC.Constructed\]**
768764
> [eIDAS Constructed Attributes Specification for the Swedish eID Framework](https://docs.swedenconnect.se/technical-framework/latest/11_-_eIDAS_Constructed_Attributes_Specification_for_the_Swedish_eID_Framework.html).
769765
770766
<a name="eidas-attr"></a>
771-
**\[eIDAS\_Attr\]**
772-
> [eIDAS SAML Attribute Profile, version 1.2, 21 May 2019](https://docs.swedenconnect.se/technical-framework/mirror/eidas/eIDAS_SAML_Attribute_Profile_v1.2-FINAL.pdf).
767+
**\[eIDAS.Attributes\]**
768+
> [eIDAS SAML Attribute Profile, version 1.4, 31 October 2023](https://docs.swedenconnect.se/technical-framework/mirror/eidas/eIDAS_SAML_Attribute_Profile_v1.4_final.pdf).
773769
774-
<a name="sigsap"></a>
775-
**\[SigSAP\]**
770+
<a name="sc-sap"></a>
771+
**\[SC.SAP\]**
776772
> [Signature Activation Protocol for Federated Signing](https://docs.swedenconnect.se/technical-framework/latest/13_-_Signature_Activation_Protocol.html).
777773
778774
<a name="dssext"></a>
779-
**\[DSSExt\]**
775+
**\[SC.DSS.Ext\]**
780776
> [DSS Extension for Federated Central Signing Services](https://docs.swedenconnect.se/technical-framework/latest/09_-_DSS_Extension_for_Federated_Signing_Services.html).
781777
782778
<a name="changes-between-versions"></a>

0 commit comments

Comments
 (0)