You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: 02 - Deployment Profile for the Swedish eID Framework.md
+5-5Lines changed: 5 additions & 5 deletions
Original file line number
Diff line number
Diff line change
@@ -968,7 +968,7 @@ especially important in cases of re-use of already established security
968
968
contexts at the Identity Provider side (Single Sign On).
969
969
970
970
Each identity assertion MUST have a `<saml:Subject>` element that
971
-
specifies the principal that is the subject of all of the statements in
971
+
specifies the principal that is the subject of all the statements in
972
972
the assertion.
973
973
974
974
The value of the `<saml:NameID>` element under the
@@ -1505,7 +1505,7 @@ A service wishing to receive encrypted messages where SHA-1 is not used as the k
1505
1505
```
1506
1506
*Example of how a service announces that it wishes that the peer uses SHA-256 as the key transport digest when encrypting using RSA-OAEP-MGF1P.*
1507
1507
1508
-
> \[*\]: Note that the use if SHA-1 in this context (both as digest algoritm and as mask generation function) is limited to providing randomness of padding data and as a hash over optional OAEP parameter data which typically is an empty string. It is not used as a hash function to assert the integrity of the encrypted data. No weaknesses of SHA-1 is is known to be relevant to its use in this context.
1508
+
> \[*\]: Note that the use if SHA-1 in this context (both as digest algoritm and as mask generation function) is limited to providing randomness of padding data and as a hash over optional OAEP parameter data which typically is an empty string. It is not used as a hash function to assert the integrity of the encrypted data. No weaknesses of SHA-1 are known to be relevant to its use in this context.
1509
1509
1510
1510
<aname="normative-references"></a>
1511
1511
## 9. Normative References
@@ -1650,7 +1650,7 @@ A service wishing to receive encrypted messages where SHA-1 is not used as the k
1650
1650
1651
1651
**Changes between version 1.7 and 1.8:**
1652
1652
1653
-
- Section 7.1.2 was updated to state that the requirement to include both a SAD and a SignMessage extension only applies when the requested CertType is "QC/SSCD". Voluntary use of SAD for other types of signatures (e.g. non qualified signatures) does not automatically trigger a requirement to include SignMessage.
1653
+
- Section 7.1.2 was updated to state that the requirement to include both a SAD and a SignMessage extension only applies when the requested CertType is "QC/SSCD". Voluntary use of SAD for other types of signatures (e.g., nonqualified signatures) does not automatically trigger a requirement to include SignMessage.
1654
1654
1655
1655
**Changes between version 1.6 and 1.7:**
1656
1656
@@ -1667,7 +1667,7 @@ A service wishing to receive encrypted messages where SHA-1 is not used as the k
1667
1667
**Changes between version 1.5 and 1.6:**
1668
1668
1669
1669
- In order to facilitate algorithm interoperability between peers additions concerning "Metadata Profile for Algorithm Support" \[[SAML2MetaAlgSupport](#saml2metaalg)\] was added. Section 2.1.1 was updated with a section defining how preferred algorithms are declared in metadata, and sections 5.2, 6.1 and 7.2.1 was updated with requirements for algorithm selection during signing and encryption.
1670
-
- Section 5.3, "Message Content", was re-structured with sub-chapters for requested authentication contexts, scoping and principal selection.
1670
+
- Section 5.3, "Message Content", was re-structured with subchapters for requested authentication contexts, scoping and principal selection.
1671
1671
- The `PrincipalSelection` and `RequestedPrincipalSelection` extensions were introduced to sections 2.1.3, 5.3.3 and 7.2.
1672
1672
- The link for the "Tillitsramverk för Svensk e-legitimation" specification was updated.
1673
1673
- This profile is no longer normatively dependent upon SAML2Int. Therefore, the profile has been updated with requirements that previously was implicit (due to the normative dependency to SAML2Int).
@@ -1713,7 +1713,7 @@ and the use of the `signMessageDigest` attribute was introduced.
1713
1713
- In section 7.1, a set of authentication context URIs for the eIDAS
1714
1714
Framework was added.
1715
1715
1716
-
- In section 6.4, the requirement to use the sub-level status code
1716
+
- In section 6.4, the requirement to use the sublevel status code
1717
1717
`http://id.elegnamnden.se/status/1.0/cancel` was added. This status
Copy file name to clipboardExpand all lines: 03 - Registry for Identifiers.md
+6-6Lines changed: 6 additions & 6 deletions
Original file line number
Diff line number
Diff line change
@@ -262,7 +262,7 @@ The assurance levels defined in section [3.1.1](#authentication-context-uris) ma
262
262
|`http://id.swedenconnect.se/loa/1.0/`<br/>`uncertified-loa2`| URI that is indented to be used by uncertified providers that make a self declaration of providing an assurance level comparable to Assurance level 2 - `http://id.elegnamnden.se/loa/1.0/loa2`. | This document |
263
263
|`http://id.swedenconnect.se/loa/1.0/`<br/>`uncertified-loa3`| URI that is indented to be used by uncertified providers that make a self declaration of providing an assurance level comparable to Assurance level 3 - `http://id.elegnamnden.se/loa/1.0/loa3`. | This document |
264
264
265
-
Proxy providers that have eIDAS authentication as an option MUST NOT use the eIDAS authentication context URIs defined in section [3.1.1](#authentication-context-uris). Instead they should use:
265
+
Proxy providers that have eIDAS authentication as an option MUST NOT use the eIDAS authentication context URIs defined in section [3.1.1](#authentication-context-uris), instead they should use:
266
266
267
267
|**URL**|**Object**|**Reference**|
268
268
| :--- | :--- | :--- |
@@ -339,7 +339,7 @@ Service Contract Entity Category identifiers are indented for performing service
339
339
340
340
All Service Contract identifiers are prefixed with `http://id.swedenconnect.se/contract/<org>`, where `org` is the identifier for the defining organization.
341
341
342
-
The Sweden Connect Framework specifications do not define any Service Contract identifiers. Instead the federation operator, or other parties, may define identifiers suitable for representing how consuming and providing services should be matched based on their respective agreements.
342
+
The Sweden Connect Framework specifications do not define any Service Contract identifiers, instead the federation operator, or other parties, may define identifiers suitable for representing how consuming and providing services should be matched based on their respective agreements.
343
343
344
344
<aname="general-entity-categories"></a>
345
345
##### 3.1.3.5. General Entity Categories
@@ -425,7 +425,7 @@ This section defines identifiers used within the Sweden Connect Framework to int
425
425
<aname="eidas-proxy-service-aliases"></a>
426
426
##### 3.1.9.1. eIDAS Proxy Service Aliases
427
427
428
-
Each country within the eIDAS federation provides an eIDAS Proxy Service that is a Proxy Identity Provider for the authentication services within that specific country. The entityID identifier for an eIDAS Proxy Service in another country is not known to a Swedish Service Provider, but there are cases in which the Swedish Service Provider needs to refer to a specific eIDAS Proxy Service. Therefore, this specification defines an URI identifier format for eIDAS Proxy Service aliases. The format is as follows:
428
+
Each country within the eIDAS federation provides an eIDAS Proxy Service that is a Proxy Identity Provider for the authentication services within that specific country. The entityID identifier for an eIDAS Proxy Service in another country is not known to a Swedish Service Provider, but there are cases in which the Swedish Service Provider needs to refer to a specific eIDAS Proxy Service. Therefore, this specification defines a URI identifier format for eIDAS Proxy Service aliases. The format is as follows:
@@ -583,7 +583,7 @@ Object Identifier Registry for Sweden Connect<sup>*</sup>
583
583
584
584
<aname="sc-saml-umsg"></a>
585
585
**\[SC.SAML.UMsg\]**
586
-
> [User Message Extension in SAML Authentication Requests](https://docs.swedenconnect.se/technical-framework/updates/18_-_User_Message_Extension_in_SAML_Authentication_Requests.html).
586
+
> [User Message Extension in SAML Authentication Requests](https://docs.swedenconnect.se/technical-framework/latest/18_-_User_Message_Extension_in_SAML_Authentication_Requests.html).
587
587
588
588
<aname="sc-dss-ext"></a>
589
589
**\[SC.DSS.Ext\]**
@@ -603,7 +603,7 @@ Object Identifier Registry for Sweden Connect<sup>*</sup>
603
603
604
604
<aname="id-binding"></a>
605
605
**\[ID-Binding\]**
606
-
> [Binding eIDAS Identities to Records in the Swedish Population Register](https://docs.swedenconnect.se/technical-framework/Identity_Binding.html)
606
+
> [Binding eIDAS Identities to Records in the Swedish Population Register](https://docs.swedenconnect.se/technical-framework/Identity_Binding.html)
607
607
608
608
<aname="svt-pdf"></a>
609
609
**\[SVT-PDF\]**
@@ -638,7 +638,7 @@ Object Identifier Registry for Sweden Connect<sup>*</sup>
638
638
639
639
- Section, 3.1.3.5, "General Entity Categories", was introduced and `http://id.swedenconnect.se/general-ec/1.0/secure-authenticator-binding` and `http://id.swedenconnect.se/general-ec/1.0/accepts-coordination-number` was added.
640
640
641
-
- In section 3.2, an object identifier (OID) for Signature Validation Token extension was added and one OID for a SVT timestamp policy.
641
+
- In section 3.2, an object identifier (OID) for Signature Validation Token extension was added and one OID for an SVT timestamp policy.
642
642
643
643
- Added service entity categories `http://id.swedenconnect.se/ec/1.0/loa3-orgid` and `http://id.swedenconnect.se/ec/1.0/loa3-name` to section 3.1.3.1.
0 commit comments