Registration number: 2019-309
Copyright © The Swedish Agency for Digital Government (Digg), 2015-2024. All Rights Reserved.
-
2.1. URI Identifiers
2.2. OID Identifiers
-
3.1. URL Identifiers
3.1.1. Authentication Context URIs
3.1.1.1. Authentication Context URIs for Swedish Non-residents
3.1.1.2. Authentication Context URIs for Uncertified Providers
3.1.2. Attribute Sets
3.1.3. Entity Category Identifiers
3.1.3.1. Service Entity Categories
3.1.3.2. Entity Categories for Service Properties
3.1.3.3. Entity Categories for Service Type
3.1.3.4. Entity Categories for Service Contract
3.1.3.5. General Entity Categories
3.1.4. SAML Protocol Status Codes
3.1.5. Central Signing
3.1.6. Authentication Context
3.1.7. Sign Response Status Codes
3.1.8. Name Registration Authorities
3.1.9. eIDAS Identifiers
3.1.9.1. eIDAS Proxy Service Aliases
3.1.9.2. eIDAS Connector Aliases
3.1.9.3. Identity Binding Processes
3.2. OID Identifiers
3.2.1. ASN.1 Declarations
The implementation of a Swedish infrastructure for electronic identification and electronic signature requires various types of identifiers to represent objects in protocols and data structures.
This document defines the structure for identifiers assigned by the Swedish eID Framework and provides a registry for assigned identifiers.
The following types of identifiers are assigned in this document:
-
URI (Uniform Resource Identifier)
-
OID (Object Identifier)
This registry is limited to registering assigned identifiers. Identifiers in this registry are typically defined within the context of a separate specification, which defines the semantic meaning of the identifier within the context of a particular protocol and/or data structure. Where applicable, this registry provides references to the documents where the exact meaning of each identifier is defined.
The basic structure of identifiers assigned by the Swedish eID Framework is based on the following components:
Parameter | Description |
---|---|
Prefix | The leading portion of the identifier that associates the identifier with this registry and identifies the Swedish e-identification board or Sweden Connect as the assigner of the identifier. |
Category | A code for the category of an identifier. Each category is a defined context for a collection of identifiers within the scope of a protocol, service or object type. |
Version (optional) | An indicator of the version of the object represented by this identifier. The exact semantic of the version indicator, if present, is defined within each category. |
Identifier | A sequence of characters or numbers (according to the syntax of the identifier type), which distinguish this identifier among all other identifiers within a particular prefix, category and version. |
All URI identifiers in this registry are of URL type (Uniform Resource
Locator), assigned under the prefixes http://id.elegnamnden.se
and http://id.swedenconnect.se
.
These URL identifiers are defined using the following structure:
http://id.elegnamnden.se/{category}[/{version}]/{identifier}
, or,http://id.swedenconnect.se/{category}[/{version}]/{identifier}
.
An object identifier consists of a node in a hierarchically-assigned namespace, formally defined using the ITU-T's ASN.1 standard, X.690. Successive numbers of the nodes, starting at the root of the tree, identify each node in the tree. Designers set up new nodes by registering them under the node's registration authority. The root of the tree contains the following three arcs:
- 0: ITU-T
- 1: ISO
- 2: joint-iso-itu-t
Object identifiers are in this document represented as a string containing a sequence of integers separated by a dot (“.”), e.g. 2.3.4.25, where each integer represents a node in the hierarchy.
The node assigned to the Swedish E-identification Board/Sweden Connect is: 1.2.752.201.
This represents a hierarchical structure of nodes in the following sequence:
- 1 = ISO
- 2 = ISO member body
- 752 = The Swedish Standardization Institute (SIS-ITS)
- 201 = Swedish E-identification Board (see note below)
This node is used as the Prefix (root node) for all OID identifiers in this registry, using the following structure:
1.2.752.201.{category}.{identifier}
OID identifiers according to this structure assign a node for each category and an identifier node under this category node. No node in this structure is assigned as version node. Version is handled, when necessary, within the identifier portion of the OID, typically by assigning a new identifier.
Note: The OID 1.2.752.201 was assigned to the Swedish E-identification Board, but this organisation has been overtaken by the Swedish Agency for Digital Government (DIGG) who now uses this OID arc for the Sweden Connect Technical Framework.
The following category codes are defined:
Code | Category |
---|---|
loa | Level of Assurance. Identifiers representing level of assurance for federated identity (Tillitsnivå). |
ac | Attribute profile. |
ec | Entity Category. Generic service type declarations for service matching. |
sprop | Service Property. Specific entity category identifiers for specific service property. |
st | Service Type. Specific entity category identifiers for defined types of services in the federation. |
contract | Service contract. Specific entity category identifiers for declaring contract, or business agreement, affiliation within a federation. |
csig | Central Signing Service – Identifiers used by the central signing service infrastructure. |
auth-cont | Authentication context information schema. |
status | SAML Protocol status codes. |
sig-status | Sign response status codes. |
eidas | Identifiers used for integration with the eIDAS Framework. |
ns | XML Schema namespaces. |
Authentication Context URIs representing assurance levels (Tillitsnivåer) relevant to [TillitRamv] and [EidDeploy].
URL | Object | Reference |
---|---|---|
http://id.elegnamnden.se/loa/1.0/loa1 |
Assurance level 1. | [TillitRamv] |
http://id.elegnamnden.se/loa/1.0/loa2 |
Assurance level 2. | [TillitRamv] |
http://id.elegnamnden.se/loa/1.0/loa3 |
Assurance level 3. | [TillitRamv] |
http://id.elegnamnden.se/loa/1.0/loa4 |
Assurance level 4. | [TillitRamv] |
http://id.elegnamnden.se/loa/1.0/eidas-low * |
Authentication accordance to eIDAS assurance level low for non-notified and notified eID schemes. | [eIDAS] |
http://id.elegnamnden.se/loa/1.0/eidas-sub * |
Authentication accordance to eIDAS assurance level substantial for non-notified and notified eID schemes. | [eIDAS] |
http://id.elegnamnden.se/loa/1.0/eidas-high * |
Authentication accordance to eIDAS assurance level high for non-notified and notified eID schemes. | [eIDAS] |
http://id.elegnamnden.se/loa/1.0/eidas-nf-low * |
Authentication accordance to eIDAS assurance level low using an eID scheme that MUST be notified. | [eIDAS] |
http://id.elegnamnden.se/loa/1.0/eidas-nf-sub * |
Authentication accordance to eIDAS assurance level substantial using an eID scheme that MUST be notified. | [eIDAS] |
http://id.elegnamnden.se/loa/1.0/eidas-nf-high * |
Authentication accordance to eIDAS assurance level high using an eID scheme that MUST be notified. | [eIDAS] |
NOTE: eIDAS assurance levels low, substantial and high have the
following AuthnContextClassRef
URI:s defined by the EU commission:
-
http://eidas.europa.eu/LoA/low
-
http://eidas.europa.eu/NotNotified/LoA/low
(for non-notified eID schemes) -
http://eidas.europa.eu/LoA/substantial
-
http://eidas.europa.eu/NotNotified/LoA/substantial
(for non-notified eID schemes) -
http://eidas.europa.eu/LoA/high
-
http://eidas.europa.eu/NotNotified/LoA/high
(for non-notified eID schemes)
[*]: The authentication context URI:s are intended to be used to represent authentication over the eIDAS authentication framework using an official eIDAS-connector. Authorization to issue assertions using these authentication context URI:s is determined by declaration of the "assurance certification" for the connector (see section 2.1.3 of [EidDeploy]).
The Swedish assurance framework, [TillitRamv], states that a Swedish eID according to any of the defined assurance levels must only be issued to an individual holding a Swedish personal identity number (personnummer) or a Swedish coordination number (samordningsnummer).
In some cases, a certified eID-issuer may also issue eIDs to persons that do not hold a Swedish identity number (non-residents). If this is the case, and the original identification of the person has a strength that corresponds to the requirements put in [TillitRamv], a certified Identity Provider MAY use the URIs defined below:
URL | Object | Reference |
---|---|---|
http://id.swedenconnect.se/loa/1.0/ loa2-nonresident |
A URI that is indented to be used by a level 2-certified providers that authenticate a non-resident eID holder according to assurance level 2 - http://id.elegnamnden.se/loa/1.0/loa2 . |
This document |
http://id.swedenconnect.se/loa/1.0/ loa3-nonresident |
A URI that is indented to be used by a level 3-certified providers that authenticate a non-resident eID holder according to assurance level 3 - http://id.elegnamnden.se/loa/1.0/loa3 . |
This document |
http://id.swedenconnect.se/loa/1.0/ loa4-nonresident |
A URI that is indented to be used by a level 4-certified providers that authenticate a non-resident eID holder according to assurance level 4 - http://id.elegnamnden.se/loa/1.0/loa4 . |
This document |
Note: An Identity Provider that includes any of the above URIs in an issued assertion
MUST NOT provide the personalIdentityNumber
attribute in the assertion. This is per
definition since these URIs are intended to be used for non-residents (i.e., they do not hold
a Swedish identity number).
The assurance levels defined in section 3.1.1 may only be used by Identity Providers that have been reviewed and approved by the Swedish Agency for Digital Government (DIGG) according to [TillitRamv]. For Identity Providers that have not undergone a review process but make a self declaration to be compliant with [TillitRamv] this specification defines the following authentication context URIs:
URL | Object | Reference |
---|---|---|
http://id.swedenconnect.se/loa/1.0/ uncertified-loa2 |
URI that is indented to be used by uncertified providers that make a self declaration of providing an assurance level comparable to Assurance level 2 - http://id.elegnamnden.se/loa/1.0/loa2 . |
This document |
http://id.swedenconnect.se/loa/1.0/ uncertified-loa3 |
URI that is indented to be used by uncertified providers that make a self declaration of providing an assurance level comparable to Assurance level 3 - http://id.elegnamnden.se/loa/1.0/loa3 . |
This document |
Proxy Identity Providers that have eIDAS authentication as an option MUST NOT use the eIDAS authentication context URIs defined in section 3.1.1. Instead they should use:
URL | Object | Reference |
---|---|---|
http://id.swedenconnect.se/loa/1.0/ uncertified-eidas-low |
Should be used if a proxy IdP receives http://id.elegnamnden.se/loa/1.0/eidas-low or http://id.elegnamnden.se/loa/1.0/eidas-nf-low in an assertion from the official Swedish eIDAS-connector. |
This document |
http://id.swedenconnect.se/loa/1.0/ uncertified-eidas-sub |
Should be used if a proxy IdP receives http://id.elegnamnden.se/loa/1.0/eidas-sub or http://id.elegnamnden.se/loa/1.0/eidas-nf-sub in an assertion from the official Swedish eIDAS-connector. |
This document |
http://id.swedenconnect.se/loa/1.0/ uncertified-eidas-high |
Should be used if a proxy IdP receives http://id.elegnamnden.se/loa/1.0/eidas-high or http://id.elegnamnden.se/loa/1.0/eidas-nf-high in an assertion from the official Swedish eIDAS-connector. |
This document |
Identifiers for attribute sets defined in the Attribute Profile Specification for the Swedish eID Framework.
Identifier | URL | Object | Reference |
---|---|---|---|
ELN-AP-Pseudonym-01 | http://id.elegnamnden.se/ap/1.0/pseudonym-01 |
Pseudonym identity attribute set. | [EidAttributes] |
ELN-AP-NaturalPerson-01 | http://id.elegnamnden.se/ap/1.0/natural-person-01 |
Personal identity without civic registration number attribute set. | [EidAttributes] |
ELN-AP-Pnr-01 | http://id.elegnamnden.se/ap/1.0/pnr-01 |
Personal identity with civic registration number attribute set. | [EidAttributes] |
ELN-AP-OrgPerson-01 | http://id.elegnamnden.se/ap/1.0/org-person-01 |
Organizational identity attribute set. | [EidAttributes] |
ELN-AP-eIDAS-NatPer-01 | http://id.elegnamnden.se/ap/1.0/eidas-natural-person-01 |
Natural person identity for the eIDAS Framework. | [EidAttributes] |
DIGG-AP-HSAid-01 | http://id.swedenconnect.se/ap/1.0/hsaid-01 |
Natural Person Identity with HSA-ID | [EidAttributes] |
Identifiers for categories of service entities, specified as an “Entity Attribute” in the federation metadata.
Identifiers for entity categories representing alternative sets of requirements.
URL | Object | Reference |
---|---|---|
http://id.elegnamnden.se/ ec/1.0/loa2-pnr |
Service consuming/providing assertions based on assurance level 2, implementing the attribute set http://id.elegnamnden.se/ap/1.0/pnr-01 . |
[EidEntityCat] |
http://id.elegnamnden.se/ ec/1.0/loa3-pnr |
Service consuming/providing assertions based on assurance level 3, implementing the attribute set http://id.elegnamnden.se/ap/1.0/pnr-01 . |
[EidEntityCat] |
http://id.swedenconnect.se/ ec/sc/uncertified-loa3-pnr |
Service consuming/providing assertions based on uncertified-loa3, as defined above, implementing the attribute set http://id.elegnamnden.se/ap/1.0/pnr-01 . |
|
http://id.elegnamnden.se/ ec/1.0/loa4-pnr |
Service consuming/providing assertions based on assurance level 4, implementing the attribute set http://id.elegnamnden.se/ap/1.0/pnr-01 . |
[EidEntityCat] |
http://id.elegnamnden.se/ ec/1.0/eidas-naturalperson |
Service consuming/providing assertions based on any eIDAS assurance level, implementing the attribute set http://id.elegnamnden.se/ap/1.0/eidas-natural-person-01 . |
[EidEntityCat] |
http://id.elegnamnden.se/ ec/1.0/eidas-pnr-delivery |
Service providing assertions to eIDAS services via Swedish eIDAS-node | [EidEntityCat] |
http://id.swedenconnect.se/ ec/1.0/loa3-hsaid |
Service consuming/providing assertions based on assurance level 3, implementing the attribute set http://id.swedenconnect.se/ap/1.0/hsaid-01 . |
|
http://id.swedenconnect.se/ ec/sc/uncertified-loa3-hsaid |
Service consuming/providing assertions based on uncertified-loa3, as defined above, implementing the attribute set http://id.swedenconnect.se/ap/1.0/hsaid-01 . |
|
http://id.swedenconnect.se/ ec/1.0/loa2-orgid |
Service consuming/providing assertions based on assurance level 2, implementing the attribute set http://id.elegnamnden.se/ap/1.0/org-person-01 . |
[EidEntityCat] |
http://id.swedenconnect.se/ ec/1.0/loa3-orgid |
Service consuming/providing assertions based on assurance level 3, implementing the attribute set http://id.elegnamnden.se/ap/1.0/org-person-01 . |
[EidEntityCat] |
http://id.swedenconnect.se/ ec/1.0/loa4-orgid |
Service consuming/providing assertions based on assurance level 4, implementing the attribute set http://id.elegnamnden.se/ap/1.0/org-person-01 . |
[EidEntityCat] |
http://id.swedenconnect.se/ ec/1.0/loa2-name |
Service consuming/providing assertions based on assurance level 2, implementing the attribute set http://id.elegnamnden.se/ap/1.0/natural-person-01 . |
[EidEntityCat] |
http://id.swedenconnect.se/ ec/1.0/loa3-name |
Service consuming/providing assertions based on assurance level 3, implementing the attribute set http://id.elegnamnden.se/ap/1.0/natural-person-01 . |
[EidEntityCat] |
http://id.swedenconnect.se/ ec/1.0/loa4-name |
Service consuming/providing assertions based on assurance level 4, implementing the attribute set http://id.elegnamnden.se/ap/1.0/natural-person-01 . |
[EidEntityCat] |
Identifiers for defined service properties.
URL | Object | Reference |
---|---|---|
http://id.elegnamnden.se/sprop/1.0/mobile-auth |
Service adapted to require/provide user authentication based on mobile devices. | [EidEntityCat] |
http://id.elegnamnden.se/sprop/1.0/scal2 |
Service adapted to support authentication requests from signature services supporting Sole Control Assurance Level 2 (SCAL2). | [EidEntityCat] |
Identifiers for defined service types.
URL | Object | Reference |
---|---|---|
http://id.elegnamnden.se/st/1.0/sigservice |
Electronic signature service | [EidEntityCat] |
http://id.elegnamnden.se/st/1.0/public-sector-sp |
Public sector Service Provider | [EidEntityCat] |
http://id.elegnamnden.se/st/1.0/private-sector-sp |
Private sector Service Provider | [EidEntityCat] |
Service Contract Entity Category identifiers are indented for performing service matching based on contracts, or business agreements, between providing and consuming services.
All Service Contract identifiers are prefixed with http://id.swedenconnect.se/contract/<org>
, where org
is the identifier for the defining organization.
The Swedish eID Framework specifications do not define any Service Contract identifiers. Instead the federation operator, or other parties, may define identifiers suitable for representing how consuming and providing services should be matched based on their respective agreements.
An entity category of the General Entity Category type is a category that does not fit into any of the other category types regarding definitions and matching rules.
General category identifiers are prefixed with http://id.swedenconnect.se/general-ec
.
URL | Object | Reference |
---|---|---|
http://id.swedenconnect.se/general-ec/ 1.0/secure-authenticator-binding |
Indicator that a secure authenticator binding is required, or supported. | [EidEntityCat] |
http://id.swedenconnect.se/general-ec/ 1.0/accepts-coordination-number |
Category for opt-in for the acceptance of Swedish coordination numbers in the personalIdentityNumber attribute. | [EidEntityCat] |
http://id.swedenconnect.se/general-ec/ 1.0/supports-user-message |
Indicator that an Identity Provider supports the UserMessage authentication request extension, see [UserMessageExt]. |
[EidEntityCat] |
Status code identifiers for use in SAML Response messages. The list below extends the list of second-level status codes defined in section 3.2.2.2 of [SAML2Core].
URL | Object | Reference |
---|---|---|
http://id.elegnamnden.se/status/1.0/cancel |
Status code representing a cancelled operation. | [EidDeploy] |
http://id.elegnamnden.se/status/1.0/fraud |
Status code indicating a fraudulent request. | [EidDeploy] |
http://id.elegnamnden.se/status/1.0/possibleFraud |
Status code indicating a possible fraudulent request. | [EidDeploy] |
Identifiers used in the protocol for requesting services form a central signing service.
URL | Object | Reference |
---|---|---|
http://id.elegnamnden.se/csig/1.0/dss-ext/ns |
Deprecated. XML schema name space for the protocol extensions to the OASIS DSS protocol (version 1.0). | |
http://id.elegnamnden.se/csig/1.0/eid2-dss/profile |
Deprecated. Implementation profile identifier for the protocol extensions to the OASIS DSS protocol (version 1.0). | |
http://id.elegnamnden.se/csig/1.1/dss-ext/ns |
XML schema name space for the protocol extensions to the OASIS DSS protocol (version 1.1). | [EidDSSExt] |
http://id.elegnamnden.se/csig/1.1/dss-ext/profile |
Implementation profile identifier for the protocol extensions to the OASIS DSS protocol (version 1.1). | [EidCSignProf] |
http://id.elegnamnden.se/csig/1.1/sap/ns |
XML schema name space for the Signature Activation Protocol, extending version 1.1 of the DSS protocol extension | [EidSigSAP] |
Identifiers associated with the Authentication Context X.509 extension
URL | Object | Reference |
---|---|---|
http://id.elegnamnden.se/auth-cont/1.0/saci |
XML schema namespace for SAML Authentication Context Information in the Authentication Context X.509 certificate extension | [RFC7773] |
http://id.swedenconnect.se/auth-cont/1.0/ext-auth-info |
XML schema namespace for Extended Authentication Information in the Authentication Context X.509 certificate extension | [CertProf] |
Status code identifiers for the DSS Extension for SAML based Central Signing service. The following identifiers provide defined status codes
for inclusion in a <ResultMinor>
element of the <Result>
element of a sign response message according to the OASIS standard “Digital Signature Service Core Protocols, Elements, and Bindings Version 1.0” [OASIS-DSS].
URL | Object | Reference |
---|---|---|
http://id.elegnamnden.se/sig-status/1.0/req-expired |
The time window for the signature request has expired. | [EidCSignProf] |
http://id.elegnamnden.se/sig-status/1.0/user-mismatch |
The authenticated user does not match the signer identity attributes in the request. | [EidCSignProf] |
http://id.elegnamnden.se/sig-status/1.0/unsupported-loa |
The requested level of assurance for user authentication is not supported. | [EidCSignProf] |
http://id.elegnamnden.se/sig-status/1.0/sigmessage-error |
A requirement to display sign message was included in the sign request, but the sign service could not establish that the sign message was displayed to the user. | [EidCSignProf] |
http://id.elegnamnden.se/sig-status/1.0/user-cancel |
The end user cancelled the signature operation. | [EidCSignProf] |
http://id.swedenconnect.se/sig-status/1.1/authn-failed |
The authentication during the signature operation failed. | [EidCSignProf] |
http://id.swedenconnect.se/sig-status/1.1/security-violation |
The Signature Service, or Identity Provider authenticating the end user, has detected a security violation (such as a possible fraud). | [EidCSignProf] |
Some protocols require a URI identifier to uniquely identify the entity responsible for a particular namespace.
URL | Object | Reference |
---|---|---|
http://id.elegnamnden.se/eln/name-registration-authority |
Identifying the Swedish e-Identification Board* as name registration authority, responsible for a particular namespace. | [CertProf] |
[*]: This also covers the Swedish Agency for Digital Government (DIGG) which has overtaken the Swedish E-identification Board's assignments.
This section defines identifiers used within the Swedish eID Framework to integrate with the eIDAS Framework.
Each country within the eIDAS federation provides an eIDAS Proxy Service that is a Proxy Identity Provider for the authentication services within that specific country. The entityID identifier for an eIDAS Proxy Service in another country is not known to a Swedish Service Provider, but there are cases in which the Swedish Service Provider needs to refer to a specific eIDAS Proxy Service. Therefore, this specification defines an URI identifier format for eIDAS Proxy Service aliases. The format is as follows:
http://id.swedenconnect.se/eidas/1.0/proxy-service/{country-code}
where {country-code}
is the country identifier in ISO 3166-1 alpha-2 format [ISO 3166].
A consumer of an eIDAS Proxy Service alias URI MUST accept the country code part of the URI in both lower and upper case letters.
A Swedish Identity Provider that delivers authentication services to eIDAS, via the Swedish eIDAS Proxy Service, will receive the entityID of the Service Provider from another country that has requested user authentication in a <saml2p:RequesterID>
element of the authentication request. Along with this information, the Swedish Proxy Service will also include another RequesterID
element that holds the "eIDAS Connector alias" URI, telling from which country the requesting Service Provider resides.
The format of this alias is as follows:
http://id.swedenconnect.se/eidas/1.0/connector/{country-code}
where {country-code}
is the country identifier in ISO 3166-1 alpha-2 format [ISO 3166].
A consumer of an eIDAS Connector alias URI MUST accept the country code part of the URI in both lower and upper case letters.
Section 3.3.2 of [EidAttributes] describes how the personalIdentityNumberBinding
attribute is assigned with one or more "Identity Binding Process URI:s" after an identity binding. The possible values are:
URI | Object | Reference |
---|---|---|
http://id.swedenconnect.se/ id-binding/process/populationregister |
Unique match of name and birth date between eIDAS identity and the Swedish Population register. | [ID-Binding] |
http://id.swedenconnect.se/ id-binding/process/swedish-eid |
Digitally signed attestation using a Swedish eID. | [ID-Binding] |
The Binding eIDAS Identities to Records in the Swedish Population Register ([ID-Binding]) document defines the above processes in detail.
Defined categories:
Code | Category |
---|---|
0 | ASN.1 modules |
1 | Test identifiers |
2 | Policy identifiers |
3 | Attribute identifiers |
4 | ”Qualified Certificate” Statement identifiers (RFC 3739) |
5 | X.509 certificate extension identifiers |
The following OIDs are defined in the ASN.1 declarations in 3.2.1:
OID | Object | Reference |
---|---|---|
1.2.752.201.5.1 | Authentication Context Extension | [RFC7773] |
1.2.752.201.5.2 | Signature Validation Token Extension | [SVT-PDF] |
1.2.752.201.2.1 | Object identifier for the Signature Validation Token RFC 3161 timestamp policy | |
1.2.752.201.3.1 | Organization Affiliation Attribute | [EidAttributes] |
1.2.752.201.3.2 | Transaction Identifier | [EidAttributes] |
1.2.752.201.3.3 | Authentication Context Parameters | [EidAttributes] |
1.2.752.201.3.4 | Provisional ID | [EidAttributes] |
1.2.752.201.3.5 | Provisional ID Persistence Indicator | [EidAttributes] |
1.2.752.201.3.6 | Personal Identity Number Binding URI | [EidAttributes] |
1.2.752.201.3.7 | eIDAS Person Identifier | [EidAttributes] |
1.2.752.201.3.8 | Birth name | [EidAttributes] |
1.2.752.201.3.9 | eIDAS Natural Person Address | [EidAttributes] |
1.2.752.201.3.10 | User Certificate | [EidAttributes] |
1.2.752.201.3.11 | User Signature | [EidAttributes] |
1.2.752.201.3.12 | Signature Activation Data | [EidAttributes] |
1.2.752.201.3.13 | Authentication Server Signature | [EidAttributes] |
1.2.752.201.3.14 | Sign Message Digest | [EidAttributes] |
1.2.752.201.3.15 | Previous Personal Identity Number | [EidAttributes] |
1.2.752.201.3.16 | Mapped Personal Identity Number | [EidAttributes] |
Object Identifier Registry for Sweden Connect*
id-eleg OBJECT IDENTIFIER ::= {iso(1) member-body(2) se(752) e-legitimationsnamnden(201)}
-- Sweden Connect arcs
id-mod OBJECT IDENTIFIER ::= { id-eleg 0 } -- ASN.1 modules
id-test OBJECT IDENTIFIER ::= { id-eleg 1 } -- OIDs for test
id-pol OBJECT IDENTIFIER ::= { id-eleg 2 } -- Policy
id-attr OBJECT IDENTIFIER ::= { id-eleg 3 } -- Attributes
id-qcs OBJECT IDENTIFIER ::= { id-eleg 4 } -- QC Statement
id-ce OBJECT IDENTIFIER ::= { id-eleg 5 } -- Cert Extensions
-- Sweden Connect Modules
id-mod-auth-context-88 OBJECT IDENTIFIER ::= { id-mod 1 } -- Used in RFC 7773
id-mod-auth-context-08 OBJECT IDENTIFIER ::= { id-mod 2 } -- Used in RFC 7773
-- Sweden Connect OIDs for test
-- Sweden Connect Policies
id-pol-svt-ts-policy OBJECT IDENTIFIER ::= { id-pol 1 } -- SVT RFC 3161 timestamp policy
-- Sweden Connect Attributes
id-attr-org-affiliation OBJECT IDENTIFIER ::= { id-attr 1 } -- Organizational affiliation
id-attr-transaction-id OBJECT IDENTIFIER ::= { id-attr 2 } -- Transaction identifier
id-attr-auth-context-params OBJECT IDENTIFIER ::= { id-attr 3 } -- Authentication context parameters
id-attr-prid OBJECT IDENTIFIER ::= { id-attr 4 } -- Provisional ID
id-attr-prid-persistence OBJECT IDENTIFIER ::= { id-attr 5 } -- Provisional ID persistence indicator
id-attr-pnr-binding OBJECT IDENTIFIER ::= { id-attr 6 } -- Personal Identity Number binding URI
id-attr-eidas-pid OBJECT IDENTIFIER ::= { id-attr 7 } -- eIDAS Person Identifier
id-attr-birth-name OBJECT IDENTIFIER ::= { id-attr 8 } -- Birth name
id-attr-eidas-np-address OBJECT IDENTIFIER ::= { id-attr 9 } -- eIDAS Natural Person Address
id-attr-user-certificate OBJECT IDENTIFIER ::= { id-attr 10 } -- User certificate
id-attr-user-signature OBJECT IDENTIFIER ::= { id-attr 11 } -- User signature
id-attr-sad OBJECT IDENTIFIER ::= { id-attr 12 } -- Signature activation data
id-attr-auth-srv-signature OBJECT IDENTIFIER ::= { id-attr 13 } -- Authentication server signature
id-attr-sign-message-digest OBJECT IDENTIFIER ::= { id-attr 14 } -- Sign message digest
id-attr-previous-pid-number OBJECT IDENTIFIER ::= { id-attr 15 } -- Previous personal identity number
id-attr-mapped-pid-number OBJECT IDENTIFIER ::= { id-attr 16 } -- Mapped personal identity number
-- Sweden Connect QC Statement extension
id-qcs-sid OBJECT IDENTIFIER ::= { id-qcs 1 } -- Semantics Identifiers
id-qcs-statement OBJECT IDENTIFIER ::= { id-qcs 2 } -- QC statements
-- Sweden Connect Certificate Extensions
id-ce-authContext OBJECT IDENTIFIER ::= { id-ce 1 } -- Auth context extension used in RFC 7773
id-ce-svt OBJECT IDENTIFIER ::= { id-ce 2 } -- Signature Validation Token extension
[*]: The OID 1.2.752.201 was assigned to the Swedish E-identification Board, but this organisation has been overtaken by the Swedish Agency for Digital Government (DIGG) who now uses this OID arc for the Sweden Connect Technical Framework.
Digital Signature Service Core Protocols, Elements, and Bindings Version 1.0.
Implementation Profile for Using OASIS DSS in Central Signing Services.
Certificate profile for certificates issued by Central Signing services
Binding eIDAS Identities to Records in the Swedish Population Register
REGULATION (EU) No 910/2014 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 23 July 2014 on electronic identification and trust services for electronic transactions in the internal market and repealing Directive 1999/93/EC. Including implementation acts of the regulation and associated technical specifications.
Country Codes - ISO 3166, https://www.iso.org/iso-3166-country-codes.html.
Changes between version 1.7 and version 1.b:
-
Section 3.1.7, "Sign Response Status Codes", were extended with error codes for
authn-failed
andsecurity-violation
. -
Section 3.1.9.3, "Identity Binding Processes", was introduced where binding process URI:s for matching eIDAS identities to Swedish identity numbers are listed.
-
The
http://id.swedenconnect.se/general-ec/1.0/supports-user-message
entity category was added to section, 3.1.3.5, "General Entity Categories".
Changes between version 1.6 and version 1.7:
-
Section, 3.1.3.5, "General Entity Categories", was introduced and
http://id.swedenconnect.se/general-ec/1.0/secure-authenticator-binding
andhttp://id.swedenconnect.se/general-ec/1.0/accepts-coordination-number
was added. -
In section 3.2, an object identifier (OID) for Signature Validation Token extension was added and one OID for a SVT timestamp policy.
-
Added service entity categories
http://id.swedenconnect.se/ec/1.0/loa3-orgid
andhttp://id.swedenconnect.se/ec/1.0/loa3-name
to section 3.1.3.1. -
In section 3.2, the attributes for "previous personal identity number" (
1.2.752.201.3.15
) and "mapped personal identity number" (1.2.752.201.3.16
) were added. -
Section 3.1.3.1, "Service Entity Categories", was updated with categories for loaX-name and loaX-orgid.
-
Authentication context URIs for non-residents and uncertified providers were added to sections 3.1.1.1 and 3.1.1.2.
Changes between version 1.5 and version 1.6:
-
The specification was renamed from "Registry for identifiers assigned by the Swedish e-identification board" to "Swedish eID Framework - Registry for identifiers".
-
The authentication context URIs
http://id.swedenconnect.se/loa/1.0/uncertified-loa3
andhttp://id.swedenconnect.se/loa/1.0/uncertified-loa3-sigmessage
were introduced in sections 3.1.1 and 3.1.1.1, and the service entity categoryhttp://id.swedenconnect.se/ec/sc/uncertified-loa3-pnr
was added to section 3.1.3.1. -
A description of Service Contract Entity Categories was added to section 3.1.3.4.
-
In section 3.1.1, the EU commission
AuthnContextClassRef
URI:s for non-notified schemes were changed. -
Section 3.1.9.2, "eIDAS Connector Aliases", defining the URI format for representing country affiliation of eIDAS connector services, was added.
-
The link for the "Tillitsramverk för Svensk e-legitimation" specification was updated.
-
Added the attribute SignMessageDigest (1.2.752.201.3.14) to section 3.2.
-
The Sign Message Authentication Context URIs defined in section 3.1.1.1 are deprecated.
-
The XML Schema namespace identifier
http://id.swedenconnect.se/auth-cont/1.0/ext-auth-info
was added. This XML Schema defines an XML extension for the Authentication Context Extension to provide extended authentication information. -
Associating the OID registry with Sweden Connect.
-
Aligned registered module OID:s with RFC 7773.
-
Adding a new extension OID for Signature Validation Tokens in timestamp extensions.
-
Added attribute set and service entity categories for HSA-ID.
Changes between version 1.4 and version 1.5:
-
Added identifier for the service property entity category
http://id.elegnamnden.se/sprop/1.0/scal2
-
Added XML Schema name space identifier
http://id.elegnamnden.se/csig/1.1/sap/ns
. This XML Schema defines XML elements related to the Signature Activation Protocol. -
Added Semantics Identifiers section 3.1.8 to define a name registration authority URI necessary to express a provisional ID attribute in an X.509 certificate according to ETSI EN 319 412-1.
-
Added Authentication Context URI:s
http://id.elegnamnden.se/loa/1.0/eidas-nf-low
andhttp://id.elegnamnden.se/loa/1.0/eidas-nf-low-sigm
to section 3.1.1. -
Added section 3.1.9, "eIDAS Identifiers", that describes the format for eIDAS Proxy Service Alias URI identifiers.
Changes between version 1.3 and version 1.4:
-
Attributes and URI:s for the eIDAS Framework was added.
-
The SAML status code identifier
http://id.elegnamnden.se/status/1.0/cancel
was added to be used in SAML Response messages to indicate a cancelled operation. -
Added the SAML status code identifiers
http://id.elegnamnden.se/status/1.0/fraud
andhttp://id.elegnamnden.se/status/1.0/possibleFraud
were added to be used in SAML Response messages to alert fraudulent requests. -
Added attribute definitions for “Birth name”, “User certificate”, “User signature”, "Authentication Server Signature" and “Signature activation data”. See chapter 3.2.
-
Added the Service Type Entity Categories
http://id.elegnamnden.se/st/1.0/public-sector-sp
andhttp://id.elegnamnden.se/st/1.0/private-sector-sp
to section 3.1.3.3.
Changes between version 1.2 and version 1.3:
-
Object identifiers for the attributes “Transaction identifier”, “Authentication Context Parameters”, “Provisional ID” and “Provisional ID quality indicator” were defined and added to section 3.2.
-
Chapter 3.1.7, “XML Schema namespaces”, was removed since the “Level of Assurance context class declarations” are deprecated and thus, the namespace
http://id.elegnamnden.se/ns/1.0/loa-context-params
is no longer part of the Swedish eID Framework. -
Authentication Context URIs for use by signature services during authentication was added to section 3.1.1.
-
Service entity categories for future use within the eIDAS Framework were added to section 3.1.3.1.
-
The status code identifier
http://id.elegnamnden.se/sig-status/1.0/sigmessage-error
was added to section 3.1.6 and the signature response status codehttp://id.elegnamnden.se/sig-status/1.0/user-cancel
was added to section 3.1.7.
Changes between version 1.1 and version 1.2:
- URI identifiers for Attribute Profiles as specified in [AttrProf] were introduced.
Changes between version 1.0 and version 1.1:
-
In chapter 3.1.3.1, “Service Entity Categories”, service entity categories for Level of Assurance 2 and 4 were introduced.
-
Chapter 3.1.7, “XML Schema namespaces”, was added.
-
Typos were fixed.