<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.36 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-sbriz-identity-trust-system-05" category="std" consensus="true" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.33.0 -->
  <front>
    <title abbrev="Identity Trust">Identity Trust System</title>
    <seriesInfo name="Internet-Draft" value="draft-sbriz-identity-trust-system-05"/>
    <author initials="L." surname="Sbriz" fullname="Luigi Sbriz">
      <organization>Cybersecurity, Risk &amp; Privacy Senior Consultant</organization>
      <address>
        <postal>
          <country>Italy</country>
        </postal>
        <email>luigi@sbriz.eu</email>
      </address>
    </author>
    <date year="2026" month="May" day="02"/>
    <area>SEC</area>
    <workgroup>Web Authorization Protocol</workgroup>
    <abstract>
      <?line 92?>

<t>This document defines an <strong>identity trust system</strong>, which is a digital identity authentication system based on a symmetric exchange of authentication messages that does not require federation of authentication domains. The main components are:
1. <strong>Symmetric authentication protocol</strong> - A protocol for the mutual recognition of entities based on a symmetric exchange of authentication messages through the mediation of Identity Providers (IdPs). It builds on and extends the OAuth Authorization Framework RFC6749.
2. <strong>Trustees network</strong> - A IdPs network infrastructure that provides a secure environment for exchanging authentication messages.
3. <strong>Custodian concept</strong> - A special category of IdPs to protect physical identity and personal data. The generic IdP is called "<strong><em>trustee</em></strong>" and is only responsible for digital authentication, while the special IdP called "<strong><em>custodian</em></strong>" has the legal right to process the individual's real data and maintain the relationship with the digital identity. The <strong><em>custodian</em></strong> acts under the direct control of the legal authorities of the individual's country.</t>
    </abstract>
  </front>
  <middle>
    <?line 99?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The typical access model to Internet protected resources requires that the identity of the user, i.e. the <strong><em>resource owner</em></strong>, be authenticated by the resource manager, i.e. the <strong><em>service provider</em></strong>. The authentication process is not the primary task of the service provider and therefore can be entrusted to a trusted third party shared between the user and the service provider, known as an <strong><em>identity provider</em></strong>. A popular authentication mechanism is defined by <xref target="RFC6749"/>.</t>
      <t>This mechanism is asymmetric; only the resource owner must be recognized but not vice versa. Furthermore, the digital identity has value only within the digital ecosystem of the identity provider; i.e. its authentication domain or in a set of domains in a relationship of trust between them (federation). It follows that when the digital ecosystem changes, the user is no longer recognized and the resource owner needs a new user to be recognized in the new digital environment. With a symmetric authentication scheme, creating a new user is no longer necessary. Furthermore, there is no need to even create a trust relationship between the domains. Trust is assigned to the entity that guarantees identity authentication process, i.e. the identity provider that guarantees the inviolability and veracity of the authentication messages exchanged.</t>
      <t>The concept behind symmetric authentication is a requirement of peer recognition, meaning each entity must also be recognized by the other <xref target="LS1"/>. The peer-to-peer relationship requires an identity recognition process based on a mirrored sequence of messages exchanged. A symmetric process relies on trust in an identity provider for sharing messages. There is a significant advantage: it is no longer necessary to define a federation between domains or create new users in order to operate within a different ecosystem.</t>
      <t>Implementing an identity trust system requires adopting an authentication protocol that supports the symmetric exchange of identification messages. For security reasons, this protocol requires IdPs to have a dedicated infrastructure to certify the validity of messages. By dividing IDPs into two categories, the amount of personal data required for transactions is reduced, and real identities are better protected. One category consists of IdPs authorized only to manage digital identities. The other category consists of Identity Providers (IdPs) who have the legal authority to manage real identities. These IdPs will act as guarantors of the authenticity of digital identities used by providers in the first category. Below is an abstract representation of the asymmetric and symmetric authentication methods <xref target="LS4"/>.</t>
      <section anchor="use-cases-of-both-authentication-schemes">
        <name>Use cases of both authentication schemes</name>
        <t>Figure 1 depicts the use case of the classic identity recognition method with <strong>asymmetry</strong> in the process of exchanging authentication messages <xref target="RFC6749"/>. A SVG image is available <eref target="https://raw.githubusercontent.com/Luigi-Sbriz/identity/main/images/1_Asymmetric-depiction.svg">here</eref>. The scenario depicted represents a resource owner who needs to retrieve a resource from the service provider. Before the resource owner can access the resource server, the identity provider <bcp14>MUST</bcp14> verify their identity. The relying party who manages the resource does not provide any information about its identity, it provides the resource only to authorized requests.</t>
        <artwork><![CDATA[
                  ┌───────────┐
                  │Identity   │
                  │           │
                  │Provider   │
                  └─────┬─────┘
                Digital │ecosystem
               .........│..............................
               :  ┌─────┴─────┐                       :
               :  │Authorizati│                       :
               :  │           ├──────────────┐        :
               :  │on Server  │              │        :
               :  └─────┬─────┘              │        :
               :        │                    │        :
┌───────────┐  :  ┌─────┴─────┐        ┌─────┴─────┐  :  ┌───────────┐
│Resource   │  :  │User       │        │Relying    │  :  │Service    │
│           ├─────┤           ├────────┤           ├─────┤           │
│Owner      │  :  │Agent      │        │Party      │  :  │Provider   │
└───────────┘  :  └───────────┘        └─────┬─────┘  :  └───────────┘
               :                             │        :
               :                       ┌─────┴─────┐  :
               :                       │Resource   │  :
               :                       │           │  :
               :                       │Server     │  :
               :                       └───────────┘  :
               :......................................:

Figure 1: Use case of the authorization flow - Asymmetrical case
]]></artwork>
        <t>Figure 2 depicts the use case with the components needed to enable the identity authentication process in a <strong>symmetric</strong> manner capable of operating in different digital ecosystems. A SVG image is available <eref target="https://raw.githubusercontent.com/Luigi-Sbriz/identity/main/images/2_Symmetric-depiction.svg">here</eref>. The new scenario depicts two different ecosystems, one for the resource owner (client accessing the resource) and the other for the service provider (server managing the resource). This means that any entity involved in the authentication process will have its own identity provider, and they will interact with each other to ensure the completion of the symmetric authentication process.</t>
        <artwork><![CDATA[
                  ┌───────────┐        ┌───────────┐
                  │Identity   │        │Identity   │
                  │           │        │           │
                  │Provider C │        │Provider S │
                  └─────┬─────┘        └─────┬─────┘
                Digital │ecosystem   Digital │ecosystem
                        │C                   │S
               .........│.........  .........│.........
               :  ┌─────┴─────┐  :  :  ┌─────┴─────┐  :
               :  │Authorizati│  :  :  │Authorizati│  :
               :  │           ╞════════╡           │  :
               :  │on Server C│  :  :  │on Server S│  :
               :  └─────┬─────┘  :  :  └─────┬─────┘  :
               :        │        :  :        │        :
┌───────────┐  :  ┌─────┴─────┐  :  :  ┌─────┴─────┐  :  ┌───────────┐
│Resource   │  :  │User       │  :  :  │Relying    │  :  │Service    │
│           ├─────┤           ├────────┤           ├─────┤           │
│Owner      │  :  │Agent      │  :  :  │Party      │  :  │Provider   │
└───────────┘  :  └───────────┘  :  :  └─────┬─────┘  :  └───────────┘
               :                 :  :        │        :
               :                 :  :  ┌─────┴─────┐  :
               :                 :  :  │Resource   │  :
               :                 :  :  │           │  :
               :                 :  :  │Server     │  :
               :                 :  :  └───────────┘  :
               :.................:  :.................:

Figure 2: Use case of the authorization flow - Symmetrical case
]]></artwork>
        <t>The two representations are very similar to each other but note that the symmetric protocol requires direct communication between the identity providers' authentication servers to allow the circular transit of authentication messages. Therefore, no trust between domains or new users is necessary. This idea was first exposed in some articles published on ISACA Journal (see <xref target="LS1"/>, <xref target="LS2"/>, <xref target="LS3"/>, <xref target="LS4"/>, <xref target="LS5"/>, <xref target="LS6"/>) with some specific use cases and examples of potential implementations.</t>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>Some terms are used with a precise meaning.</t>
      <ul spacing="normal">
        <li>
          <t>"<strong><em>resource owner</em></strong>": 
An entity capable of granting access to a protected resource. When the resource owner is a person, it is also referred to as "<strong><em>end user</em></strong>", "<strong><em>consumer</em></strong>" or "<strong><em>individual</em></strong>". This is sometimes abbreviated as "<strong><em>RO</em></strong>".</t>
        </li>
        <li>
          <t>"<strong><em>service provider</em></strong>": 
An entity capable of managing access to a protected resource. It is generally a legal person. This is sometimes abbreviated as "<strong><em>SP</em></strong>".</t>
        </li>
        <li>
          <t>"<strong><em>identity provider</em></strong>": 
An entity capable of managing and recognizing the identity of registered entities. The set of all entities registered by the identity provider is also known as the IdP's digital ecosystem. This is sometimes abbreviated as "<strong><em>IdP</em></strong>".</t>
        </li>
        <li>
          <t>"<strong><em>resource server</em></strong>": 
The server hosting the protected resources, capable of accepting and responding to protected resource requests using access tokens. The resource server is often accessible via an API. This is sometimes abbreviated as "<strong><em>RS</em></strong>".</t>
        </li>
        <li>
          <t>"<strong><em>client</em></strong>", for software is also referred to as "<strong><em>user agent</em></strong>": 
An application making protected resource requests on behalf of the resource owner and with its authorization. The term "client" does not imply any particular implementation characteristics (e.g., whether the application executes on a server, a desktop, or other devices).</t>
        </li>
        <li>
          <t>"<strong><em>relying party</em></strong>": 
An application making protected resource authorization on behalf of the service provider and also managing its identity. The "relying party" acts as the "client" but on service provider side. This is sometimes abbreviated as "<strong><em>RP</em></strong>".</t>
        </li>
        <li>
          <t>"<strong><em>authorization server</em></strong>": 
The server issuing access tokens to the client after successfully authenticating the resource owner and obtaining authorization. This is sometimes abbreviated as "<strong><em>AS</em></strong>".</t>
        </li>
        <li>
          <t>"<strong><em>access token</em></strong>": 
The concept is the same of the <xref target="RFC6749"/>, a tiny piece of code that contains the necessary authentication data, issued by the authorization server.</t>
        </li>
        <li>
          <t>"<strong><em>identity token</em></strong>" or "<strong><em>ID token</em></strong>": 
The structure is similar to access token but it is used as proof that the user has been authenticated. The ID token may have additional information about the user and, it is signed by the issuer with its private key. To verify the token, the issuer's public key is used.</t>
        </li>
        <li>
          <t>"<strong><em>digital ecosystem</em></strong>": 
Internet environment composed of all entities based on the same identity provider.</t>
        </li>
      </ul>
      <t>The detail of the information exchanged or protocols in the interactions between the authorization server and the requesting client, or between relying party and resource server, or the composition of tokens, is beyond the scope of this specification.</t>
    </section>
    <section anchor="symmetric-authentication-protocol">
      <name>Symmetric authentication protocol</name>
      <t>The symmetric authentication flow is conceptually not too dissimilar from the classic one referring to the single ecosystem <xref target="RFC5234"/>, except that the authentication is dual because the two flows reflect the same operations symmetrically. Both the <strong>client</strong> (<em>resource owner</em>) and the <strong>server</strong> (<em>service provider</em>) <bcp14>MUST</bcp14> authenticate their identity through their IdP. The details of each basic operation in the symmetric process are the same as the corresponding single ecosystem specification <xref target="RFC6749"/> and <bcp14>MUST</bcp14> maintain alignment with it over time.</t>
      <t>The authentication sequence between a consumer and a resource provider operating in different environments will be:</t>
      <t><strong><em>1.</em></strong> Entities exchange the access tokens received from their authentication server with each other.<br/>
        <strong><em>2.</em></strong> Entities send the received token to their authentication server.<br/>
        <strong><em>3.</em></strong> Authentication servers exchange access tokens with each other.<br/>
        <strong><em>4.</em></strong> Authentication servers verify tokens with their original.<br/>
        <strong><em>5.</em></strong> Authentication servers send the result to their own entity.<br/>
        <strong><em>6.</em></strong> Entities are authenticated and can now exchange information.</t>
      <t>Conceptually, in a client-server schema, the authentication process begins with the resource owner requesting access to the protected resource to the service provider. Both respond with their access tokens and request their IdP to validate the received token. The IdPs exchange tokens for validation and send the result to their entity. On success, access to the resource is allowed.</t>
      <t>Figure 3 shows the abstract depiction of the symmetric authentication sequence. A SVG image is available <eref target="https://raw.githubusercontent.com/Luigi-Sbriz/identity/main/images/3_Symmetric-sequence-diagram.svg">here</eref>.</t>
      <artwork><![CDATA[
┌───────────┐                                            ┌───────────┐
│Relying    ├-(1)--Request Authentication--------------->│Authorizati│
│           │                                            │           │
│Party      │<-(2)-Return Server Token-------------------┤on Server S│
└───────────┘                                            └───────────┘
┌───────────┐      ┌───────────┐      ┌───────────┐      ┌───────────┐
│Resource   │      │User       │      │Authorizati│      │Relying    │
│           │      │           │      │           │      │           │
│Owner      │      │Agent      │      │on Server C│      │Party      │
└─────┬─────┘      └─────┬─────┘      └─────┬─────┘      └─────┬─────┘
      |      Request     |                  |                  |
      ├-(3)--Protected-->+-(4)--Send Access Request----------->|
      |      Resource    |                  |                  |
      |                  |<-(5)-Return Server Token------------┘
      |                  |                  |
      |                  ├(6)-Request Client|
      |                  |  Token & Send    |
      |                  |  Server Token--->|
      |                  |                  |
      |<-(7)-Request Credentials via UA-----┤
      |                  |                  |
      └-(8)--Present Credentials via UA---->|
                         |                  |
                         └<-(9)---Return    |
                            Client Token----┘
┌───────────┐      ┌───────────┐      ┌───────────┐      ┌───────────┐
│User       │      │Authorizati│      │Authorizati│      │Relying    │
│           │      │           │      │           │      │           │
│Agent      │      │on Server C│      │on Server S│      │Party      │
└─────┬─────┘      └─────┬─────┘      └─────┬─────┘      └─────┬─────┘
      |                  |                  |                  |
      ├-(10)--Request Protected Resource & Send Client Token-->|
      |                  |                  |                  |
      |                  |<-(12)---Send     |<-(11)---Send     |
      |                  |  Client Token----┤  Client Token----┤
      |                  |                  |                  |
      |                  ├-(13)---Return    |                  |
      |                  |  Server Token--->|                  |
      |                  |                  |                  |
      └<-(14)--Return of |                  └-(15)--Return of  |
         Authorization---┘                     Authorization-->┘
┌───────────┐      ┌───────────┐      ┌───────────┐      ┌───────────┐
│Resource   │      │User       │      │Relying    │      │Resource   │
│           │      │           │      │           │      │           │
│Owner      │      │Agent      │      │Party      │      │Server     │
└─────┬─────┘      └─────┬─────┘      └─────┬─────┘      └─────┬─────┘
      |                  |                  |                  |
      |                  |                  ├(16)Call Protected|
      |                  |                  | Resource-------->|
      |                  |                  |                  |
      └<-(19)-----Return |<-(18)-----Return |<-(17)-----Return |
        Protect.Resource-┘ Protect.Resource-┘ Protect.Resource-┘

Figure 3: Symmetric Authentication Protocol - Sequence diagram
]]></artwork>
      <t>(1) - (2)       The <strong><em>RP</em></strong> requests authentication to its <strong><em>AS</em></strong> (marked "S" as server) and receives the server token (access token from the service provider's AS). The relying party must be provided with its own access token to resolve multiple requests.<br/>
(3) - (5)       The <strong><em>RO</em></strong> requests access to the protected resource via the user agent. The <strong><em>UA</em></strong> activates the authentication process by requesting access to the <strong><em>RP</em></strong>, which responds by providing the server token. The response may also include the server ID token.<br/>
(6) - (9)       The <strong><em>UA</em></strong> requests the client token (access token from the client's AS) to its <strong><em>AS</em></strong> (marked "C" as client), sending also the server token received from <strong><em>RP</em></strong>. The client's <strong><em>AS</em></strong> requests credentials from the <strong><em>RO</em></strong> and returns the client token to the <strong><em>UA</em></strong>.<br/>
(10) - (11)     The <strong><em>UA</em></strong> requests the protected resource from the <strong><em>RP</em></strong> by sending the client token. Then, relying party requests to service provider's AS to verify the client token.<br/>
(12) - (15)     Both authentication servers must verify that the tokens received match the originals. Then, client's AS informs the <strong><em>UA</em></strong> of the outcome and the same is done by the service provider's AS to the <strong><em>RP</em></strong>. The outcome sent to the relying party may also include the client ID token.<br/>
(16) - (17)     The <strong><em>RP</em></strong> notifies the <strong><em>RS</em></strong> of the legitimate request of '<strong><em>UA</em></strong>. The <strong><em>RS</em></strong> returns the protected resource to <strong><em>RP</em></strong>.<br/>
(18) - (19) The <strong><em>RP</em></strong> sends the protected resource to <strong><em>UA</em></strong>, which then presents it to the requester <strong><em>RO</em></strong>.</t>
      <t><strong><em>Notes regarding some steps:</em></strong><br/>
(4) If the server token is not available at this time, sequence (1) - (2) will be executed between steps (4) and (5) to provide the server token. Additionally, this change may also be necessary for a periodic refresh of the server token or if the entities are both clients.<br/>
(6) The client's authorization could be performed in advance and the client token stored securely by the user agent for handling multiple authentication requests. This means performing only the server token communication here, avoiding the following steps (7) - (9) because already done.</t>
      <t>The verification of the authenticity of the tokens is carried out by the IdPs who exchange messages on a dedicated network to reduce the risk of intrusion. Security is strengthened by the presence of two interfaces for the exchange of tokens, one is for the party in trust and the other is for the opposing party. If one is compromised, the other interrupts the flow avoiding authorization. The trust placed in the mutual validation of messages avoids having to merge authentication domains, leaving great flexibility to the system as a whole.</t>
      <t>Identity recognition information resides only with a trusted identity provider. This reduces the need to store too much personal information in Internet registrations. Furthermore, to easily identify which IdP holds the entity's authentication credentials, it can be easily extracted from the username structure if this is defined following the same technique used to compose an email address <xref target="RFC5322"/>, that means an username, an @ sign, and a domain name.</t>
    </section>
    <section anchor="identity-provider-trustee-concept">
      <name>Identity Provider - Trustee Concept</name>
      <t>The symmetric authentication protocol bases its functioning on the existence of trusted entities, called <strong><em>identity providers (IdPs)</em></strong>. The identity provider is the owner of a digital ecosystem and, in addition to the authentication service in its own domain, also guarantees the secure transmission of authentication messages on other domains according to the symmetric authentication scheme already mentioned. Before being able to use the authentication service, it is necessary to register the natural or legal persons who need the digital identity. The integrity and confidentiality of this information must be guaranteed both in the registration process and in the authentication phases. The need for a high degree of confidentiality of the link between the digital identity and the real one requires the creation of a special category of IdPs with constraints linked to the laws of the real world.</t>
      <t>In the specific network between IdPs, authentication messages are exchanged to ensure digital identity. Each IdP acts as a point of reference for the identity authentication service in its digital ecosystem, and must be able to communicate with every other IdP to recognize identities belonging to other ecosystems, securely from intrusions or tampering. The effectiveness of the entire authentication system depends on the trust placed in these identity providers but it must be deserved. This requires a robust organisation, subject to systematic oversight by independent certification body, to ensure transparent operational management by the IdPs.</t>
      <section anchor="importance-of-this-role">
        <name>Importance of this role</name>
        <t>The identity provider is the guarantor of the authenticity of the relationship between digital credentials and the identity of natural or legal persons in digital communication. For this role it can also be called an <strong>ID trustee</strong> and the greatest criticality it must face is the inviolability of the messages exchanged. Furthermore, when processing personal data, the laws of the country to which the data subject belongs must be considered. It may also provide additional services (e.g. anonymous email, answering machine, anonymous accounts,...), but always in full compliance with the applicable law and only if they do not present risk for the data subject. Anonymization services are intended exclusively for the intended recipient but not for the authority exercising the applicable law (e.g. for a whistleblowing).</t>
        <t>An IdP <bcp14>MUST</bcp14> be a legal entity subject to both the laws of the country to which it belongs and to international certification bodies, to guarantee compliance with this standard, the security of the information processed, the expected level of quality of service and the lawful processing of data.</t>
      </section>
      <section anchor="infrastructure">
        <name>Infrastructure</name>
        <t>The infrastructure underlying symmetric communication is the IdP Network <xref target="LS2"/>, dedicated to the exchange of authentication messages between IdPs. Ideally, each IdP always has two connectors, one to communicate with its trusted entity and the other to exchange messages with another IdP. With its own entity the mechanism is exactly the one defined by <xref target="RFC6749"/>. With other IdPs, a reserved channel is required for the exchange of tokens, which provides guarantees on the integrity of the messages and their origin. This channel <bcp14>SHOULD</bcp14> have low latency because it represents an additional step compared to the single ecosystem authentication scheme. The intended mechanism for sharing messages is that of a mail server <xref target="RFC5321"/>. The process for adding a new node (IdP) in the IdP Network <bcp14>MUST</bcp14> require the identification of the legal entity that owns the node, but also the registration of identification data of the installed network devices, for security controls on the reliability of the node itself. Any variation must be promptly updated or the node will be disabled.</t>
        <t>The dedicated network for the identity providers is not technically necessary for the authentication protocol but is essential for security, to reduce the risk of fraud or identity theft and, to ensure trust in lawful behavior. There <bcp14>MUST</bcp14> also be an international control body over IdPs and the management of the IdP Network. This authority will be responsible for governing the overall system, i.e. defining technical standards, or carrying out audits to ensure compliance with the rules, or acting to exclude nodes in case of violation of the rules.</t>
      </section>
    </section>
    <section anchor="identity-provider-custodian-concept">
      <name>Identity Provider - Custodian Concept</name>
      <t>The relationship between digital and physical identity should be managed only by a particular identity provider, called <strong><em>identity custodian (IdC)</em></strong>, who has the legal authority to manage the personal data of the natural person. Only in this way it will be the perfect candidate to guarantee the identity provider the validity of the request for the release of a new digital identity, without having to disclose the physical identity to the IdP. Guaranteeing the digital identity of a user corresponding to a legal entity will not be the task of the identity custodian but of an authority or a process compliant with the law of the country to which the legal entity belongs. The identity token contains the indication between users of a natural person or a legal entity. The identity token makes it possible to distinguish the user of a natural or legal person and to know who has guaranteed the physical identity. An identity custodian can also act as an identity trustee, keeping roles distinct in communication protocols.</t>
      <section anchor="general-schema">
        <name>General schema</name>
        <t>The identity custodian certifies that it is a real identity that requires the digital identity but can also provide personal data to identity trustee with the consent of the data subject. The identity trustee provides the authentication service for its digital ecosystem. A use case describing the relationship between identity custodian, identity trustee, and digital identity is provided in figure 4. A SVG image is available <eref target="https://raw.githubusercontent.com/Luigi-Sbriz/identity/main/images/4_Identity-custodian-concept.svg">here</eref>.</t>
        <artwork><![CDATA[
............................              ............................
: Real ecosystem X         :              :         Real ecosystem Y :
:              ...................  ...................              :
:              :Digital          :  :          Digital:              :
:              :ecosystem A      :  :      ecosystem B:              :
:              :  ┌───────────┐  :  :  ┌───────────┐  :              :
:              :  │  Digital  │  :  :  │  Digital  │  :              :
:      ┌──────────┤           ├────────┤           ├──────────┐      :
:      │       :  │Identity A │  :  :  │Identity B │  :       │      :
:      │       :  └─────┬─────┘  :  :  └─────┬─────┘  :       │      :
:      │       :        │        :  :        │        :       │      :
:┌─────┴─────┐ :  ┌─────┴─────┐  :  :  ┌─────┴─────┐  : ┌─────┴─────┐:
:│ Identity  │ :  │ Identity  │  :  :  │ Identity  │  : │ Identity  │:
:│           ╞════╡           ╞════════╡           ╞════╡           │:
:│Custodian X│ :  │Provider A │  :  :  │Provider B │  : │Custodian Y│:
:└───────────┘ :  └───────────┘  :  :  └───────────┘  : └───────────┘:
: Real         :                 :  :                 :         Real :
: identity A   :.................:  :.................:   identity B :
:                          :              :                          :
:..........................:              :..........................:

Figure 4: The Identity Custodian Use Case
]]></artwork>
        <t>Generally, identity provider must carry out the recognition and registration of the user's personal data before being able to guarantee its identity. The collection of the data of the natural person must be carried out in accordance with the protection provided for by the regulations in force. To ensure that the processing of personal data is restricted and controlled, it is useful to divide the set of IdPs into two categories. In the first, there will be IdPs (also called trustees) that only manage digital identity operations, and in the second, IdCs (identity custodians) that guarantee trustees that the applicant's identity is real. The IdC's category should operate under the responsibility of the legal authority that manages the real identity of the individual (i.e. who issues the identity card).</t>
        <t>Through the identity custodian, each individual can request the issuing of a new digital identity to their trusted IdP. It will be the trusted IdP who will ask for confirmation of the applicant's authenticity directly from the IdC. The applicant must send an ID token with their IdC contact information to initiate the request. The request will be managed entirely online and will not require any personal data from the data subject but, subject to consent, everything will be sent by the IdC. The new identity will be useful to meet the typical needs of transactions on the Internet, with the right confidentiality for the holder and an added value for the authority, being able to identify the real person. The digital legal identity to sign contracts should be managed directly by IdC.</t>
        <t>In short the roles involved in the trust-based authentication system.
- The <strong><em>identity custodian</em></strong> is the guarantor of the existence of the natural person and has the ability to uniquely identify it but only following a formal request from the legitimate authority.<br/>
- The <strong><em>identity provider</em></strong> receives the identification data that the data subject has decided to provide and will match these to the digital identity.<br/>
- The <strong><em>service provider</em></strong> will have the guarantee that the user is linked to a real person for security, contractual or legal reasons.<br/>
- The <strong><em>data subject</em></strong> can provide personal information according to their need, also maintaining anonymity.<br/>
- The <strong><em>public authority</em></strong> that manages the real data will be able to identify the individual with certainty in case of violations of the law (i.e. to protect the service provider).</t>
        <section anchor="issuing-of-a-new-digital-identity">
          <name>Issuing of a New Digital Identity</name>
          <t>The request for a new digital identity is activated by the natural person towards the chosen trustee. The trustee will request confirmation from the identity custodian if the request lawfully came from a real person. In case of confirmation, it will record the personal data that the data subject has authorized IdC to transfer. A use case describing the request of a new digital identity is provided in figure 5. A SVG image is available <eref target="https://raw.githubusercontent.com/Luigi-Sbriz/identity/main/images/5_New-identity-use-case.svg">here</eref>.</t>
          <artwork><![CDATA[
                  ┌───────────┐        ┌───────────┐
                  │Identity   │        │Identity   │
                  │           │        │           │
                  │Custodian  │        │Provider   │
                  └─────┬─────┘        └─────┬─────┘
                  IdC   │              IdP   │
               ecosystem│           ecosystem│
               .........│.........  .........│.........
               :  ┌─────┴─────┐  :  :  ┌─────┴─────┐  :
               :  │Authorizat.│  :  :  │Authorizat.│  :
               :  │           ╞════════╡           │  :
               :  │Server IdC │  :  :  │Server IdP │  :
               :  └─────┬─────┘  :  :  └─────┬─────┘  :
               :        │        :  :        │        :
┌───────────┐  :  ┌─────┴─────┐  :  :  ┌─────┴─────┐  :
│Data       │  :  │User       │  :  :  │Relying    │  :
│           ├─────┤           ├────────┤           │  :
│Subject    │  :  │Agent      │  :  :  │Party  IdP │  :
└───────────┘  :  └───────────┘  :  :  └───────────┘  :
               :.................:  :.................:

Figure 5: Abstract of New Digital Identity Request
]]></artwork>
          <t>Figure 6 shows the abstract representation of the message exchange sequence to request a new digital identity. A SVG image is available <eref target="https://raw.githubusercontent.com/Luigi-Sbriz/identity/main/images/6_New-identity-sequence-diagram.svg">here</eref>.</t>
          <artwork><![CDATA[
┌───────────┐      ┌───────────┐      ┌───────────┐      ┌───────────┐
│Data       │      │User       │      │Authorizat.│      │Relying    │
│           │      │           │      │           │      │           │
│Subject    │      │Agent      │      │Server IdC │      │Party  IdP │
└───────────┘      └─────┬─────┘      └─────┬─────┘      └─────┬─────┘
      |                  |                  |                  |
      ├-(1)-Request New->+-(2)--Send New Identity Request----->|
      |     Identity     |                  |                  |
      |                  |<--(3)--Return IdP Token-------------┘
      |                  |                  |
      |                  ├(4)--Request IdC  |
      |                  |     Token & Send |
      |                  |     IdP Token--->|
      |                  |                  |
      |<-(5)-Request Credentials via UA-----┤
      |                  |                  |
      └-(6)--Present Credentials via UA---->|
                         |                  |
                         └<--(7)--Return    |
                                  IdC Token-┘
┌───────────┐      ┌───────────┐      ┌───────────┐      ┌───────────┐
│User       │      │Authorizat.│      │Authorizat.│      │Relying    │
│           │      │           │      │           │      │           │
│Agent      │      │Server IdC │      │Server IdP │      │Party  IdP │
└─────┬─────┘      └─────┬─────┘      └─────┬─────┘      └─────┬─────┘
      |                  |                  |                  |
      ├-(8)--Request New Identity & Send IdC Token------------>|
      |                  |                  |                  |
      |                  |<--(10)--Send IdC |<--(9)--Send IdC  |
      |                  |         Token----┤        Token-----┤
      |                  |                  |                  |
      |                  ├-(11)--Return IdP |                  |
      |                  |     Token & Send |                  |
      |                  |     ID Token---->|                  |
      |                  |                  |                  |
      └<-(12)---Return   |                  └-(13)---Return    |
                ID Token-┘                     Client Token--->┘
┌───────────┐                ┌───────────┐               ┌───────────┐
│Data       │                │User       │               │Relying    │
│           │                │           │               │           │
│Subject    │                │Agent      │               │Party  IdP │
└─────┬─────┘                └─────┬─────┘               └─────┬─────┘
      |                            |                           |
      └<-(15)------Return ID Token-┘<-(14)-Return Client Token-┘

Figure 6: New Digital Identity Request - Sequence diagram
]]></artwork>
          <t>(1) - (3)       The <strong><em>data subject</em></strong> requests the new digital identity via the user agent to the identity provider. The <strong><em>UA</em></strong> activates the authentication process by requesting the new identity to the <strong><em>RP</em></strong>, which responds by providing the IdP token (access token from IdP's AS).<br/>
(4) - (7)       The <strong><em>UA</em></strong> requests the IdC token (access token from the custodian's AS) to its <strong><em>AS</em></strong>, sending also the IdP token received from <strong><em>RP</em></strong>. The custodian's <strong><em>AS</em></strong> requests credentials from the <strong><em>data subject</em></strong> and returns the IdC token to the <strong><em>UA</em></strong>.<br/>
(8) - (9)       The <strong><em>UA</em></strong> requests the new digital identity from the <strong><em>RP</em></strong> by sending the IdC token. Then, relying party requests to identity provider's AS to verify the IdC token.<br/>
(10) - (11)     Both authentication servers must verify that the tokens received match the originals. If required by data subject, the custodian's AS will send an additional ID token with personal data.<br/>
(12) - (13)     Custodian's AS informs the <strong><em>UA</em></strong> of the outcome and, if required, sends also a copy of the ID token. The identity provider's AS sends to the <strong><em>RP</em></strong> the client token (related the new identity provided by IdP).<br/>
(14) - (15) The <strong><em>RP</em></strong> sends the client token to <strong><em>UA</em></strong>, which then informs the <strong><em>data subject</em></strong> of the outcome and, if required, sends a readable copy of the ID token to check the personal information shared.</t>
          <t><strong><em>Notes regarding some steps:</em></strong><br/>
(3) If the relying party does not have the IdP token available, this will be requested from the authentication server after step (2).<br/>
(4) IdC token does not contains any real identity information as default. If requested, an ID token with a standard set of real information can be included during this step.</t>
          <t>Any new digital identity with legal value is issued according to the rules defined by the relevant authority. It is presumable that there is also physical recognition of the data subject before the provision of credentials but no reference model is defined in this document.</t>
        </section>
      </section>
    </section>
    <section anchor="framework-for-a-sustainable-digital-identity-trust-system">
      <name>Framework for a sustainable digital identity trust system</name>
      <t>For the effectiveness of the identity trust system <xref target="LS4"/> based on the paradigm of trust towards a third party recognizable as reliable, it is necessary to guarantee a transparent and verifiable mechanism. The objective is to achieve universal participation and it is only possible if trust in the system as a whole is demonstrable. For this reason it is necessary to establish founding principles that guide the rules to guarantee equal dignity and balance in all components of the system. The following nine principles are established:</t>
      <ol spacing="normal" type="1"><li>
          <t>The digital identity <bcp14>MUST</bcp14> be cancelled or deleted without affecting the physical identity.</t>
        </li>
        <li>
          <t>The digital identity <bcp14>MUST</bcp14> be linkable to the physical identity in a verifiable manner.</t>
        </li>
        <li>
          <t>Only the authority that legally manages the individual's identity <bcp14>MUST</bcp14> be able to verify the link between the physical and digital identity.</t>
        </li>
        <li>
          <t>The authentication system <bcp14>MUST</bcp14> be flexible (i.e., able to adapt to technological evolutions or emerging needs).</t>
        </li>
        <li>
          <t>The authentication system <bcp14>MUST</bcp14> be accessible to all potential users (i.e., without discriminatory costs).</t>
        </li>
        <li>
          <t>The authentication system <bcp14>MUST</bcp14> be secure (i.e., continuously aligned with security best practices).</t>
        </li>
        <li>
          <t>The authentication system <bcp14>MUST</bcp14> be privacy-friendly (i.e., not requiring any personal information unless strictly necessary).</t>
        </li>
        <li>
          <t>The authentication system <bcp14>MUST</bcp14> be resilient (i.e., with availability appropriate for needs and the ability to cope with adversity).</t>
        </li>
        <li>
          <t>The authentication system <bcp14>MUST</bcp14> be based on open technology (i.e., able to evolve based on transparent shared standards and verifiable developments).</t>
        </li>
      </ol>
      <t>To guarantee the principles set out, the requirements of the authentication system <bcp14>MUST</bcp14> include the protection of personal data and the guarantee of anonymity for lawful purposes, that is:</t>
      <ol spacing="normal" type="1"><li>
          <t>Ensure mutual recognition to guarantee the identity of the provider to the consumer.</t>
        </li>
        <li>
          <t>Ensure the capability to authenticate the digital identities of consumers and providers against their real-world identity, without unnecessarily exposing real data.</t>
        </li>
      </ol>
      <t>The capability to validate the authenticity of the relationship between digital identity and physical identity lies only with the public authority responsible for managing the citizen's identity. Operationally, it is implemented through a digital identity recognition service (i.e. IdC), technologically compliant with the operational protocols of an identity provider but under the supervision of the public authority.</t>
      <t>This authentication framework can be used to securely verify the up-to-date data on passports <xref target="LS2"/> and identity cards, as well as to implement an effective I-voting model <xref target="LS3"/>. Reading a QR code in the <strong><em>passport</em></strong> allows the user's identity to be verified using an identity trust system. Automatically verifying this information with the custodian ensures the accuracy of the user's personal information (<xref target="LS2"/>). When placed on an <strong><em>identity card</em></strong>, a QR code based on an identity trust system allows authorized access to complete and up-to-date information about a user's identity, such as their current address or driver's license. At the same time, it eliminates unnecessary information from the card. Adopting an identity trust system enables the development of a secure <strong><em>I-voting</em></strong> solution that provides remote election office members with access to the necessary real identity information (<xref target="LS3"/>).</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>There are some cautionary points regarding security that need to be considered (<xref target="LS3"/>).
- Integrity and resilience are the most critical parameters. The integrity of the messages is fundamental to guarantee the authenticity of the identity, while the availability of an authentication service is essential to ensuring the feasibility of the entire process.
- Symmetric authentication contrast the risk of man-in-the-middle attack because it should successfully attack both message flows at the same time.
- As a critical component of the identity system, the trustee must undergo rigorous checks to ensure compliance with applicable cybersecurity standards.
- The relying party and the resource server should be on separate servers and use a dedicated communication channel.</t>
      <t>Referring to the term identification, we mean at least three different types, the device, the digital user and the individual.</t>
      <ul spacing="normal">
        <li>
          <t>The <strong><em>device</em></strong> is identified with technical methods suited to the various needs. For example, geolocalization using International Mobile Equipment Identity (IMEI) <xref target="ITU1"/> and Integrated Circuit Card ID (ICCID) <xref target="ITU2"/>.</t>
        </li>
        <li>
          <t>The <strong><em>digital user</em></strong> is well managed by <xref target="RFC6749"/> but inside the digital ecosystem. To manage users of multiple domains, either the user registrations are duplicated for each domain involved, or the domains involved are joined in a trust relationship.</t>
        </li>
        <li>
          <t>The <strong><em>individual</em></strong>, or natural person, is well managed with classic physical methods (e.g. photo ID) but the link with the digital identity needs to be improved because the quality is not satisfactory. This topic is beyond the scope of this specification and it was explored for example in <xref target="LS3"/>.</t>
        </li>
      </ul>
      <t>An in-depth defense system <bcp14>SHOULD</bcp14> consider all the components involved and in this case not just the pure digital authentication of the user. This document only addresses digital users, but extensions applicable to mixed situations with more typologies are welcome in order to improve the overall security profile.</t>
      <section anchor="user-registration">
        <name>User registration</name>
        <t>It is important to control the amount of data exchanged during the authentication process but also that the data required to issue a new digital identity are the only ones strictly necessary <xref target="LS6"/>. To assign access credentials to a protected resource to a user, a process of recording the user's identification and contact data is necessary, as they are necessary for the authentication of the digital identity and for the attribution of access rights to the resources (<xref target="LS6"/>). Data provided or exchanged with IdPs <bcp14>MUST</bcp14> comply with the need-to-know principle. There are three possible methods for registering identities.</t>
        <section anchor="registration-with-an-identity-custodian-idc">
          <name>Registration with an identity custodian (IdC).</name>
          <t>The IdC has the legal authority to retain all personal data essential to complete the process of recognizing the real individual. The manner in which information about an individual is collected, validated, and recorded by the IdC depends solely on the laws of the individual's country of origin (<xref target="LS4"/>). The outcome must be a set of information that is available in a suitable format for answering authentication requests.</t>
        </section>
        <section anchor="registration-with-an-identity-provider-idp">
          <name>Registration with an identity provider (IdP).</name>
          <t>The IdP has to guarantee the authenticity of the digital identity and the collection of personal data <bcp14>SHOULD</bcp14> be limited to the sole purpose of this operation. For the registration of a natural person (<xref target="LS5"/>), the IdP requests confirmation from the IdC of the real identity of the applicant before issuing the digital identity. The process is completely online and does not require any physical recognition. For legal entities, the data is provided by the owner or a delegate.</t>
        </section>
        <section anchor="registration-with-a-service-provider-sp">
          <name>Registration with a service provider (SP).</name>
          <t>The service provider <bcp14>SHOULD</bcp14> know only the data necessary to build the authorization roles to govern access to resources and nothing more (<xref target="LS5"/>). These are provided directly  by the user, in addition to those received automatically from the IdP relating to digital identity.</t>
        </section>
      </section>
    </section>
    <section anchor="conclusions">
      <name>Conclusions</name>
      <t>To operate effectively between the different digital ecosystems, the identity management system <bcp14>MUST</bcp14> be based on a common authentication protocol that symmetrically carries out the same operations in complete transparency, entrusting the decision on recognition to a trusted third party. Confidence in the reliability of recognition carried out by the identity guarantor (IdP or IdC) cannot be based on the technological component alone. It is therefore necessary to involve an independent supervisory authority for technological aspects and the local competent public authority responsible for data protection.</t>
      <t>To improve trust in the digital operations between the consumer and the service provider three guarantees must be provided.</t>
      <ol spacing="normal" type="1"><li>
          <t>The mutual recognition between consumer and service provider.</t>
        </li>
        <li>
          <t>The control and minimization of the personal information processed.</t>
        </li>
        <li>
          <t>The ability to match consumers' and providers' digital identities with their real-world identities in the event of a legal need.</t>
        </li>
      </ol>
      <t>Due to the strong synergy that can be achieved, it is advisable to maintain constant technical alignment with the standard <xref target="RFC6749"/> and the related specifications to implement point-to-point authentication, within the broader symmetric authentication framework.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC6749">
          <front>
            <title>The OAuth 2.0 Authorization Framework</title>
            <author fullname="D. Hardt" initials="D." role="editor" surname="Hardt"/>
            <date month="October" year="2012"/>
            <abstract>
              <t>The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf. This specification replaces and obsoletes the OAuth 1.0 protocol described in RFC 5849. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6749"/>
          <seriesInfo name="DOI" value="10.17487/RFC6749"/>
        </reference>
        <reference anchor="RFC5322">
          <front>
            <title>Internet Message Format</title>
            <author fullname="P. Resnick" initials="P." role="editor" surname="Resnick"/>
            <date month="October" year="2008"/>
            <abstract>
              <t>This document specifies the Internet Message Format (IMF), a syntax for text messages that are sent between computer users, within the framework of "electronic mail" messages. This specification is a revision of Request For Comments (RFC) 2822, which itself superseded Request For Comments (RFC) 822, "Standard for the Format of ARPA Internet Text Messages", updating it to reflect current practice and incorporating incremental changes that were specified in other RFCs. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5322"/>
          <seriesInfo name="DOI" value="10.17487/RFC5322"/>
        </reference>
        <reference anchor="RFC5321">
          <front>
            <title>Simple Mail Transfer Protocol</title>
            <author fullname="J. Klensin" initials="J." surname="Klensin"/>
            <date month="October" year="2008"/>
            <abstract>
              <t>This document is a specification of the basic protocol for Internet electronic mail transport. It consolidates, updates, and clarifies several previous documents, making all or parts of most of them obsolete. It covers the SMTP extension mechanisms and best practices for the contemporary Internet, but does not provide details about particular extensions. Although SMTP was designed as a mail transport and delivery protocol, this specification also contains information that is important to its use as a "mail submission" protocol for "split-UA" (User Agent) mail reading systems and mobile environments. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5321"/>
          <seriesInfo name="DOI" value="10.17487/RFC5321"/>
        </reference>
        <reference anchor="RFC5234">
          <front>
            <title>Augmented BNF for Syntax Specifications: ABNF</title>
            <author fullname="D. Crocker" initials="D." role="editor" surname="Crocker"/>
            <author fullname="P. Overell" initials="P." surname="Overell"/>
            <date month="January" year="2008"/>
            <abstract>
              <t>Internet technical specifications often need to define a formal syntax. Over the years, a modified version of Backus-Naur Form (BNF), called Augmented BNF (ABNF), has been popular among many Internet specifications. The current specification documents ABNF. It balances compactness and simplicity with reasonable representational power. The differences between standard BNF and ABNF involve naming rules, repetition, alternatives, order-independence, and value ranges. This specification also supplies additional rule definitions and encoding for a core lexical analyzer of the type common to several Internet specifications. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="68"/>
          <seriesInfo name="RFC" value="5234"/>
          <seriesInfo name="DOI" value="10.17487/RFC5234"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="ITU1" target="https://www.itu.int/dms_pub/itu-t/opb/tut/T-TUT-CCICT-2020-PDF-E.pdf">
          <front>
            <title>QTR-RLB-IMEI - Reliability of International Mobile Station Equipment Identity (IMEI), Technical Report</title>
            <author>
              <organization>International Telecommunications Union</organization>
            </author>
            <date year="2020" month="July"/>
          </front>
        </reference>
        <reference anchor="ITU2" target="https://www.itu.int/rec/T-REC-E.118">
          <front>
            <title>E.118: The International Telecommunication Charge Card</title>
            <author>
              <organization>International Telecommunications Union</organization>
            </author>
            <date year="2006" month="May"/>
          </front>
        </reference>
        <reference anchor="LS1" target="https://www.isaca.org/resources/isaca-journal/issues/2022/volume-2/a-symmetrical-framework-for-the-exchange-of-identity-credentials-based-on-the-trust-paradigm-part-1">
          <front>
            <title>A Symmetrical Framework for the Exchange of Identity Credentials Based on the Trust Paradigm, Part 1: Identity Trust Abstract Model, ISACA Journal, vol.2</title>
            <author initials="L." surname="Sbriz" fullname="Luigi Sbriz">
              <organization/>
            </author>
            <date year="2022" month="April"/>
          </front>
        </reference>
        <reference anchor="LS2" target="https://www.isaca.org/resources/isaca-journal/issues/2022/volume-2/a-symmetrical-framework-for-the-exchange-of-identity-credentials-based-on-the-trust-paradigm-part-2">
          <front>
            <title>A Symmetrical Framework for the Exchange of Identity Credentials Based on the Trust Paradigm, Part 2: Identity Trust Service Implementation, ISACA Journal, vol.2</title>
            <author initials="L." surname="Sbriz" fullname="Luigi Sbriz">
              <organization/>
            </author>
            <date year="2022" month="April"/>
          </front>
        </reference>
        <reference anchor="LS3" target="https://www.isaca.org/resources/isaca-journal/issues/2023/volume-1/how-to-digitally-verify-human-identity">
          <front>
            <title>How to Digitally Verify Human Identity: The Case of Voting, ISACA Journal, vol.1</title>
            <author initials="L." surname="Sbriz" fullname="Luigi Sbriz">
              <organization/>
            </author>
            <date year="2023" month="January"/>
          </front>
        </reference>
        <reference anchor="LS4" target="https://www.isaca.org/resources/isaca-journal/issues/2023/volume-6/modeling-an-identity-trust-system">
          <front>
            <title>Modeling an Identity Trust System, ISACA Journal, vol.6</title>
            <author initials="L." surname="Sbriz" fullname="Luigi Sbriz">
              <organization/>
            </author>
            <date year="2023" month="November"/>
          </front>
        </reference>
        <reference anchor="LS5" target="https://www.isaca.org/resources/isaca-journal/issues/2025/volume-2/the-role-of-the-identity-provider">
          <front>
            <title>The Role of the Identity Provider, ISACA Journal, vol.2</title>
            <author initials="L." surname="Sbriz" fullname="Luigi Sbriz">
              <organization/>
            </author>
            <date year="2025" month="February"/>
          </front>
        </reference>
        <reference anchor="LS6" target="https://www.isaca.org/resources/isaca-journal/issues/2026/volume-2/the-link-between-data-sovereignty-and-digital-identity">
          <front>
            <title>The Link Between Data Sovereignty and Digital Identity, ISACA Journal, vol.2</title>
            <author initials="L." surname="Sbriz" fullname="Luigi Sbriz">
              <organization/>
            </author>
            <date year="2026" month="March"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 528?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>This document was prepared using a text editor with Markdown syntax (kramdown-rfc dialect).</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
