Disclaimer
...
Principle | Reasoning |
---|---|
Simplifying the Data Access Path for Data Receivers | The OIDC Federation model, particularly as outlined in Section 11.1 of the OIDC Federation specification, introduces an automated registration mechanism. This allows Data Receivers to initiate Authentication Requests directly, bypassing traditional registration with Data Providers. Upon integration into the Ecosystem Trust Framework, Data Receivers are allocated a unique client_id, bound to their created encryption and transport certificates. These credentials are utilized to authenticate requests and secure token issuance via the Data Provider's Authorization Server Endpoint. To enable this process, Data Providers must proactively acquire relevant metadata based on their client_id from the Trust Anchor, ensuring the Data Receiver metadata is always up-to-date. |
Reduce Interoperability problems and improve standardization | The DCR framework, employed in both Brazil and the UK's Open Banking implementations, necessitates that Clients ( Data Receivers ) initiate contact with the Servers ( Data Providers ) registration endpoint to onboard. This process has led to:
|
Ensuring Responsibility Spread for Client Registration to the fewest number of actors | On the Proposed Registration Framework, the responsibility for registration entirely rests with the Data Providers. They are required to actively consult and regularly update data from the Trust Anchor (Trust Framework). This ensures they keep an up-to-date registry of all authorized Clients in the Ecosystem. The Standard also specifies that when Data Providers encounter an Authentication Request from an unrecognized Data Receiver, they must fetch the client's data from the Trust Anchor. This is to accurately ascertain the client's access scopes, regardless of whether the regular updates have been properly conducted. |
Support Cross Border Integration | OIDC Federation supports the setup of unified trust network across multiple trust anchors through standardized metadata acquisition mechanisms. This structure can be used to promote interoperability and trust among clients and servers across different ecosystems, fostering a seamless cross-border integration framework. |
...
shall rely on ecosystem discovery services provided by the Trust Framework only;
shall derive necessary Authorisation Server metadata by relying on an Authorization Servers OpenID Connect Discovery services only;
shall obtain the information about the Resource Server endpoints using the Trust Framework Participants endpoint, reached on < To Be Included Once TF is Live >
Shall use endpoints advertised in mtls_endpoint_aliases as per clause 5 RFC 8705 OAuth 2.0 Mutual-TLS Client Authentication and Certificate-Bound Access Tokens;
...
shall trust all the Entity Statements issued by the “Open Finance UAE” Trust Anchor, whose entity configuration can be reached on < To Be Included Once TF is Live >
shall validate the Trust Chain Entity Statements signature using the keys supplied only by the Open Finance UAE Federation
shall obtain the list of authorised relying parties and their Entity Identifiers by using the Open Finance UAE Federation list endpoint
shall register the Relying Parties and issue them Client Identifiers (client_id) that have a value equal to their Entity Identifiers on Open Finance UAE Federation
shall obtain the Relying Parties Entity Statements by calling their Well Known URIs, issued by the Trust Framework, which can be obtained by appending “/.well-known/openid-federation” to their Entity Identifiers
shall only trust the information provided on the Entity Statement until the time defined on the “exp” claim
shall maintain an updated registry of the authorised Relying Parties metadata by periodically fetching the Entity Statements and the Entity Identifiers from the Federation List Endpoint.
where an unknown Client Identifier is received on a Client Authentication Request the Authorisation Server shall verify the Entity Statement validity against the Open Finance UAE Federation Trust Chain properly considering the Relying Party Metadata before processing the Request.
...