Swedish eID Framework - Registry for identifiers

Version 1.6 - 2020-01-17

Registration number: 2019-309 (previously: ELN-0603)


Table of Contents

  1. Background

  2. Structure

    2.1. URI Identifiers

    2.2. OID Identifiers

  3. Assigned Identifiers

    3.1. URL Identifiers

    3.1.1. Authentication Context URIs

    3.1.1.1. Sign Message Authentication Context URIs (deprecated)

    3.1.2. Attribute Sets

    3.1.3. Entity Category Identifiers

    3.1.3.1. Service Entity Categories

    3.1.3.2. Entity Categories for Service Properties

    3.1.3.3. Entity Categories for Service Type

    3.1.3.4. Entity Categories for Service Contract

    3.1.4. SAML Protocol Status Codes

    3.1.5. Central Signing

    3.1.6. Authentication Context

    3.1.7. Sign Response Status Codes

    3.1.8. Name Registration Authorities

    3.1.9. eIDAS Identifiers

    3.1.9.1. eIDAS Proxy Service Aliases

    3.1.9.2. eIDAS Connector Aliases

    3.2. OID Identifiers

    3.2.1. ASN.1 Declarations

  4. References

  5. Changes between versions

1. Background

The implementation of a Swedish infrastructure for electronic identification and electronic signature requires various types of identifiers to represent objects in protocols and data structures.

This document defines the structure for identifiers assigned by the Swedish eID Framework and provides a registry for assigned identifiers.

The following types of identifiers are assigned in this document:

This registry is limited to registering assigned identifiers. Identifiers in this registry are typically defined within the context of a separate specification, which defines the semantic meaning of the identifier within the context of a particular protocol and/or data structure. Where applicable, this registry provides references to the documents where the exact meaning of each identifier is defined.

2. Structure

The basic structure of identifiers assigned by the Swedish eID Framework is based on the following components:

Parameter Description
Prefix The leading portion of the identifier that associates the identifier with this registry and identifies the Swedish e-identification board or Sweden Connect as the assigner of the identifier.
Category A code for the category of an identifier. Each category is a defined context for a collection of identifiers within the scope of a protocol, service or object type.
Version (optional) An indicator of the version of the object represented by this identifier. The exact semantic of the version indicator, if present, is defined within each category.
Identifier A sequence of characters or numbers (according to the syntax of the identifier type), which distinguish this identifier among all other identifiers within a particular prefix, category and version.

2.1. URI Identifiers

All URI identifiers in this registry are of URL type (Uniform Resource Locator), assigned under the prefixes http://id.elegnamnden.se and http://id.swedenconnect.se.

These URL identifiers are defined using the following structure:

2.2. OID Identifiers

An object identifier consists of a node in a hierarchically-assigned namespace, formally defined using the ITU-T's ASN.1 standard, X.690. Successive numbers of the nodes, starting at the root of the tree, identify each node in the tree. Designers set up new nodes by registering them under the node's registration authority. The root of the tree contains the following three arcs:

Object identifiers are in this document represented as a string containing a sequence of integers separated by a dot (“.”), e.g. 2.3.4.25, where each integer represents a node in the hierarchy.

The node assigned to the Swedish E-identification Board/Sweden Connect is: 1.2.752.201.

This represents a hierarchical structure of nodes in the following sequence:

This node is used as the Prefix (root node) for all OID identifiers in this registry, using the following structure:

1.2.752.201.{category}.{identifier}

OID identifiers according to this structure assign a node for each category and an identifier node under this category node. No node in this structure is assigned as version node. Version is handled, when necessary, within the identifier portion of the OID, typically by assigning a new identifier.

Note: The OID 1.2.752.201 was assigned to the Swedish E-identification Board, but this organisation has been overtaken by the Swedish Agency for Digital Government (DIGG) who now uses this OID arc for the Sweden Connect Technical Framework.

3. Assigned Identifiers

3.1. URL Identifiers

The following category codes are defined:

Code Category
loa Level of Assurance. Identifiers representing level of assurance for federated identity (Tillitsnivå).
ac Attribute profile.
ec Entity Category. Generic service type declarations for service matching.
sprop Service Property. Specific entity category identifiers for specific service property.
st Service Type. Specific entity category identifiers for defined types of services in the federation.
contract Service contract. Specific entity category identifiers for declaring contract, or business agreement, affiliation within a federation.
csig Central Signing Service – Identifiers used by the central signing service infrastructure.
auth-cont Authentication context information schema.
status SAML Protocol status codes.
sig-status Sign response status codes.
eidas Identifiers used for integration with the eIDAS Framework.
ns XML Schema namespaces.

3.1.1. Authentication Context URIs

Authentication Context URIs representing assurance levels (Tillitsnivåer) relevant to [TillitRamv] and [EidDeploy].

URL Object Reference
http://id.elegnamnden.se/loa/1.0/loa1 Assurance level 1. [TillitRamv]
http://id.elegnamnden.se/loa/1.0/loa2 Assurance level 2. [TillitRamv]
http://id.elegnamnden.se/loa/1.0/loa3 Assurance level 3. [TillitRamv]
http://id.swedenconnect.se/loa/1.0/
uncertified-loa3
A URI that is indented to be used by uncertified providers that make a self declaration of providing an assurance level comparable to Assurance level 3 - http://id.elegnamnden.se/loa/1.0/loa3.
http://id.elegnamnden.se/loa/1.0/loa4 Assurance level 4. [TillitRamv]
http://id.elegnamnden.se/loa/1.0/eidas-low Authentication accordance to eIDAS assurance level low for non-notified and notified eID schemes. [eIDAS]
http://id.elegnamnden.se/loa/1.0/eidas-sub Authentication accordance to eIDAS assurance level substantial for non-notified and notified eID schemes. [eIDAS]
http://id.elegnamnden.se/loa/1.0/eidas-high Authentication accordance to eIDAS assurance level high for non-notified and notified eID schemes. [eIDAS]
http://id.elegnamnden.se/loa/1.0/eidas-nf-low Authentication accordance to eIDAS assurance level low using an eID scheme that MUST be notified. [eIDAS]
http://id.elegnamnden.se/loa/1.0/eidas-nf-sub Authentication accordance to eIDAS assurance level substantial using an eID scheme that MUST be notified. [eIDAS]
http://id.elegnamnden.se/loa/1.0/eidas-nf-high Authentication accordance to eIDAS assurance level high using an eID scheme that MUST be notified. [eIDAS]

NOTE: eIDAS assurance levels low, substantial and high have the following AuthnContextClassRef URI:s defined by the EU commission:

3.1.1.1. Sign Message Authentication Context URIs (deprecated)

DEPRECATED

The use of Sign Message Authentication Context URIs is deprecated. See section 7 of [EidDeploy] for details.

Authentication Context URIs extending the above URIs with specific meaning for use with authentication requests that includes a sign message that must be displayed to the user (see section 7 of [EidDeploy]).

URL Object
http://id.elegnamnden.se/loa/1.0/loa2-sigmessage Authentication according to assurance level 2 with extended requirements for displaying signature messages.
http://id.elegnamnden.se/loa/1.0/loa3-sigmessage Authentication according to assurance level 3 with extended requirements for displaying signature messages.
http://id.swedenconnect.se/loa/1.0/
uncertified-loa3-sigmessage
Authentication according to uncertified-loa3, as defined above, with extended requirements for displaying signature messages.
http://id.elegnamnden.se/loa/1.0/loa4-sigmessage Authentication according to assurance level 4 with extended requirements for displaying signature messages.
http://id.elegnamnden.se/loa/1.0/eidas-low-sigm Authentication accordance to eIDAS assurance level low (notified or non-notified eID schemes) with extended requirements for displaying signature messages.
http://id.elegnamnden.se/loa/1.0/eidas-sub-sigm Authentication accordance to eIDAS assurance level substantial (notified or non-notified eID schemes) with extended requirements for displaying signature messages.
http://id.elegnamnden.se/loa/1.0/eidas-high-sigm Authentication accordance to eIDAS assurance level high (notified or non-notified eID schemes) with extended requirements for displaying signature messages.
http://id.elegnamnden.se/loa/1.0/eidas-nf-low-sigm Authentication accordance to eIDAS assurance level low using an eID scheme that MUST be notified, with extended requirements for displaying signature messages.
http://id.elegnamnden.se/loa/1.0/eidas-nf-sub-sigm Authentication accordance to eIDAS assurance level substantial using an eID scheme that MUST be notified, with extended requirements for displaying signature messages.
http://id.elegnamnden.se/loa/1.0/eidas-nf-high-sigm Authentication accordance to eIDAS assurance level high with an eID scheme that MUST be notified, with extended requirements for displaying signature messages.

3.1.2. Attribute Sets

Identifiers for attribute sets defined in the Attribute Profile Specification for the Swedish eID Framework.

Identifier URL Object Reference
ELN-AP-Pseudonym-01 http://id.elegnamnden.se/ap/1.0/pseudonym-01 Pseudonym identity attribute set. [EidAttributes]
ELN-AP-NaturalPerson-01 http://id.elegnamnden.se/ap/1.0/natural-person-01 Personal identity without civic registration number attribute set. [EidAttributes]
ELN-AP-Pnr-01 http://id.elegnamnden.se/ap/1.0/pnr-01 Personal identity with civic registration number attribute set. [EidAttributes]
ELN-AP-OrgPerson-01 http://id.elegnamnden.se/ap/1.0/org-person-01 Organizational identity attribute set. [EidAttributes]
ELN-AP-eIDAS-NatPer-01 http://id.elegnamnden.se/ap/1.0/eidas-natural-person-01 Natural person identity for the eIDAS Framework. [EidAttributes]
DIGG-AP-HSAid-01 http://id.swedenconnect.se/ap/1.0/hsaid-01 Natural Person Identity with HSA-ID [EidAttributes]

3.1.3. Entity Category Identifiers

Identifiers for categories of service entities, specified as an “Entity Attribute” in the federation metadata.

3.1.3.1. Service Entity Categories

Identifiers for entity categories representing alternative sets of requirements.

URL Object Reference
http://id.elegnamnden.se/ec/1.0/loa2-pnr Service consuming/providing assertions based on assurance level 2, implementing the attribute set ”ELN-AP-Pnr-01”. [EidEntityCat]
http://id.elegnamnden.se/ec/1.0/loa3-pnr Service consuming/providing assertions based on assurance level 3, implementing the attribute set ”ELN-AP-Pnr-01”. [EidEntityCat]
http://id.swedenconnect.se/ec/sc/
uncertified-loa3-pnr
Service consuming/providing assertions based on uncertified-loa3, as defined above, implementing the attribute set ”ELN-AP-Pnr-01”.
http://id.elegnamnden.se/ec/1.0/loa4-pnr Service consuming/providing assertions based on assurance level 4, implementing the attribute set ”ELN-AP-Pnr-01”. [EidEntityCat]
http://id.elegnamnden.se/ec/1.0/eidas-naturalperson Service consuming/providing assertions based on any eIDAS assurance level, implementing the attribute set “ELN-AP-eIDAS-NatPer-01”. [EidEntityCat]
http://id.elegnamnden.se/ec/1.0/eidas-pnr-delivery Service providing assertions to eIDAS services via Swedish eIDAS-node [EidEntityCat]
http://id.swedenconnect.se/ec/1.0/loa3-hsaid Service consuming/providing assertions based on assurance level 3, implementing the attribute set ”DIGG-AP-HSAid-01”. [EidEntityCat]
http://id.swedenconnect.se/ec/sc/
uncertified-loa3-hsaid
Service consuming/providing assertions based on uncertified-loa3, as defined above, implementing the attribute set ”DIGG-AP-HSAid-01”.

3.1.3.2. Entity Categories for Service Properties

Identifiers for defined service properties.

URL Object Reference
http://id.elegnamnden.se/sprop/1.0/mobile-auth Service adapted to require/provide user authentication based on mobile devices. [EidEntityCat]
http://id.elegnamnden.se/sprop/1.0/scal2 Service adapted to support authentication requests from signature services supporting Sole Control Assurance Level 2 (SCAL2). [EidEntityCat]

3.1.3.3. Entity Categories for Service Type

Identifiers for defined service types.

URL Object Reference
http://id.elegnamnden.se/st/1.0/sigservice Electronic signature service [EidEntityCat]
http://id.elegnamnden.se/st/1.0/public-sector-sp Public sector Service Provider [EidEntityCat]
http://id.elegnamnden.se/st/1.0/private-sector-sp Private sector Service Provider [EidEntityCat]

3.1.3.4. Entity Categories for Service Contract

Service Contract Entity Category identifiers are indented for performing service matching based on contracts, or business agreements, between providing and consuming services.

All Service Contract identifiers are prefixed with http://id.swedenconnect.se/contract/<org>, where org is the identifier for the defining organization.

The Swedish eID Framework specifications do not define any Service Contract identifiers. Instead the federation operator, or other parties, may define identifiers suitable for representing how consuming and providing services should be matched based on their respective agreements.

3.1.4. SAML Protocol Status Codes

Status code identifiers for use in SAML Response messages. The list below extends the list of second-level status codes defined in section 3.2.2.2 of [SAML2Core].

URL Object Reference
http://id.elegnamnden.se/status/1.0/cancel Status code representing a cancelled operation. [EidDeploy]
http://id.elegnamnden.se/status/1.0/fraud Status code indicating a fraudulent request. [EidDeploy]
http://id.elegnamnden.se/status/1.0/possibleFraud Status code indicating a possible fraudulent request. [EidDeploy]

3.1.5. Central Signing

Identifiers used in the protocol for requesting services form a central signing service.

URL Object Reference
http://id.elegnamnden.se/csig/1.0/dss-ext/ns Deprecated. XML schema name space for the protocol extensions to the OASIS DSS protocol (version 1.0).
http://id.elegnamnden.se/csig/1.0/eid2-dss/profile Deprecated. Implementation profile identifier for the protocol extensions to the OASIS DSS protocol (version 1.0).
http://id.elegnamnden.se/csig/1.1/dss-ext/ns XML schema name space for the protocol extensions to the OASIS DSS protocol (version 1.1). [EidDSSExt]
http://id.elegnamnden.se/csig/1.1/dss-ext/profile Implementation profile identifier for the protocol extensions to the OASIS DSS protocol (version 1.1). [EidCSignProf]
http://id.elegnamnden.se/csig/1.1/sap/ns XML schema name space for the Signature Activation Protocol, extending version 1.1 of the DSS protocol extension [EidSigSAP]

3.1.6. Authentication Context

Identifiers associated with the Authentication Context X.509 extension

URL Object Reference
http://id.elegnamnden.se/auth-cont/1.0/saci XML schema namespace for SAML Authentication Context Information in the Authentication Context X.509 certificate extension [RFC7773]
http://id.swedenconnect.se/auth-cont/1.0/ext-auth-info XML schema namespace for Extended Authentication Information in the Authentication Context X.509 certificate extension [CertProf]

3.1.7. Sign Response Status Codes

Status code identifiers for the DSS Extension for SAML based Central Signing service. The following identifiers provide defined status codes for inclusion in a <ResultMinor> element of the <Result> element of a sign response message according to the OASIS standard “Digital Signature Service Core Protocols, Elements, and Bindings Version 1.0” [OASIS-DSS].

URL Object Reference
http://id.elegnamnden.se/sig-status/1.0/req-expired The time window for the signature request has expired. [EidCSignProf]
http://id.elegnamnden.se/sig-status/1.0/user-mismatch The authenticated user does not match the signer identity attributes in the request. [EidCSignProf]
http://id.elegnamnden.se/sig-status/1.0/unsupported-loa The requested level of assurance for user authentication is not supported. [EidCSignProf]
http://id.elegnamnden.se/sig-status/1.0/sigmessage-error A requirement to display sign message was included in the sign request, but the sign service could not establish that the sign message was displayed to the user. [EidCSignProf]
http://id.elegnamnden.se/sig-status/1.0/user-cancel The end user cancelled the signature operation. [EidCSignProf]

3.1.8. Name Registration Authorities

Some protocols require a URI identifier to uniquely identify the entity responsible for a particular namespace.

URL Object Reference
http://id.elegnamnden.se/eln/name-registration-authority Identifying the Swedish e-Identification Board* as name registration authority, responsible for a particular namespace. [CertProf]

[*]: This also covers the Swedish Agency for Digital Government (DIGG) which has overtaken the Swedish E-identification Board's assignments.

3.1.9. eIDAS Identifiers

This section defines identifiers used within the Swedish eID Framework to integrate with the eIDAS Framework.

3.1.9.1. eIDAS Proxy Service Aliases

Each country within the eIDAS federation provides an eIDAS Proxy Service that is a Proxy Identity Provider for the authentication services within that specific country. The entityID identifier for an eIDAS Proxy Service in another country is not known to a Swedish Service Provider, but there are cases in which the Swedish Service Provider needs to refer to a specific eIDAS Proxy Service. Therefore, this specification defines an URI identifier format for eIDAS Proxy Service aliases. The format is as follows:

http://id.swedenconnect.se/eidas/1.0/proxy-service/{country-code}

where {country-code} is the country identifier in ISO 3166-1 alpha-2 format [ISO 3166].

A consumer of an eIDAS Proxy Service alias URI MUST accept the country code part of the URI in both lower and upper case letters.

3.1.9.2. eIDAS Connector Aliases

A Swedish Identity Provider that delivers authentication services to eIDAS, via the Swedish eIDAS Proxy Service, will receive the entityID of the Service Provider from another country that has requested user authentication in a <saml2p:RequesterID> element of the authentication request. Along with this information, the Swedish Proxy Service will also include another RequesterID element that holds the "eIDAS Connector alias" URI, telling from which country the requesting Service Provider resides.

The format of this alias is as follows:

http://id.swedenconnect.se/eidas/1.0/connector/{country-code}

where {country-code} is the country identifier in ISO 3166-1 alpha-2 format [ISO 3166].

A consumer of an eIDAS Connector alias URI MUST accept the country code part of the URI in both lower and upper case letters.

3.2. OID Identifiers

Defined categories:

Code Category
0 ASN.1 modules
1 Test identifiers
2 Policy identifiers
3 Attribute identifiers
4 ”Qualified Certificate” Statement identifiers (RFC 3739)
5 X.509 certificate extension identifiers

The following OIDs are defined in the ASN.1 declarations in 3.2.1:

OID Object Reference
1.2.752.201.5.1 Authentication Context extension [RFC7773]
1.2.752.201.3.1 Organization Affiliation Attribute [EidAttributes]
1.2.752.201.3.2 Transaction Identifier [EidAttributes]
1.2.752.201.3.3 Authentication Context Parameters [EidAttributes]
1.2.752.201.3.4 Provisional ID [EidAttributes]
1.2.752.201.3.5 Provisional ID Persistence Indicator [EidAttributes]
1.2.752.201.3.6 Personal Identity Number Binding URI [EidAttributes]
1.2.752.201.3.7 eIDAS Person Identifier [EidAttributes]
1.2.752.201.3.8 Birth name [EidAttributes]
1.2.752.201.3.9 eIDAS Natural Person Address [EidAttributes]
1.2.752.201.3.10 User Certificate [EidAttributes]
1.2.752.201.3.11 User Signature [EidAttributes]
1.2.752.201.3.12 Signature Activation Data [EidAttributes]
1.2.752.201.3.13 Authentication Server Signature [EidAttributes]
1.2.752.201.3.14 Sign Message Digest [EidAttributes]

3.2.1. ASN.1 Declarations

Object Identifier Registry for Sweden Connect*

id-eleg OBJECT IDENTIFIER ::= {iso(1) member-body(2) se(752) e-legitimationsnamnden(201)}

-- Sweden Connect arcs
id-mod    OBJECT IDENTIFIER ::= { id-eleg 0 }    -- ASN.1 modules
id-test   OBJECT IDENTIFIER ::= { id-eleg 1 }    -- OIDs for test
id-pol    OBJECT IDENTIFIER ::= { id-eleg 2 }    -- Policy
id-attr   OBJECT IDENTIFIER ::= { id-eleg 3 }    -- Attributes
id-qcs    OBJECT IDENTIFIER ::= { id-eleg 4 }    -- QC Statement
id-ce     OBJECT IDENTIFIER ::= { id-eleg 5 }    -- Cert Extensions

-- Sweden Connect Modules
id-mod-auth-context-88 OBJECT IDENTIFIER ::= { id-mod 1 }    -- Used in RFC 7773
id-mod-auth-context-08 OBJECT IDENTIFIER ::= { id-mod 2 }    -- Used in RFC 7773

-- Sweden Connect OIDs for test

-- Sweden Connect Policy

-- Sweden Connect Attributes
id-attr-org-affiliation      OBJECT IDENTIFIER ::= { id-attr 1 }    -- Organizational affiliation
id-attr-transaction-id       OBJECT IDENTIFIER ::= { id-attr 2 }    -- Transaction identifier
id-attr-auth-context-params  OBJECT IDENTIFIER ::= { id-attr 3 }    -- Authentication context parameters
id-attr-prid                 OBJECT IDENTIFIER ::= { id-attr 4 }    -- Provisional ID
id-attr-prid-persistence     OBJECT IDENTIFIER ::= { id-attr 5 }    -- Provisional ID persistence indicator
id-attr-pnr-binding          OBJECT IDENTIFIER ::= { id-attr 6 }    -- Personal Identity Number binding URI
id-attr-eidas-pid            OBJECT IDENTIFIER ::= { id-attr 7 }    -- eIDAS Person Identifier
id-attr-birth-name           OBJECT IDENTIFIER ::= { id-attr 8 }    -- Birth name
id-attr-eidas-np-address     OBJECT IDENTIFIER ::= { id-attr 9 }    -- eIDAS Natural Person Address
id-attr-user-certificate     OBJECT IDENTIFIER ::= { id-attr 10 }   -- User certificate
id-attr-user-signature       OBJECT IDENTIFIER ::= { id-attr 11 }   -- User signature
id-attr-sad                  OBJECT IDENTIFIER ::= { id-attr 12 }   -- Signature activation data
id-attr-auth-srv-signature   OBJECT IDENTIFIER ::= { id-attr 13 }   -- Authentication server signature
id-attr-sign-message-digest  OBJECT IDENTIFIER ::= { id-attr 14 }   -- Sign message digest

-- Sweden Connect QC Statement extension
id-qcs-sid         OBJECT IDENTIFIER ::= { id-qcs 1 }   -- Semantics Identifiers
id-qcs-statement   OBJECT IDENTIFIER ::= { id-qcs 2 }   -- QC statements

-- Sweden Connect Certificate Extensions
id-ce-authContext  OBJECT IDENTIFIER ::= { id-ce 1 }    -- Auth context extension used in RFC 7773
id-ce-svt          OBJECT IDENTIFIER ::= { id-ce 2 }    -- Signature Validation Token extension

[*]: The OID 1.2.752.201 was assigned to the Swedish E-identification Board, but this organisation has been overtaken by the Swedish Agency for Digital Government (DIGG) who now uses this OID arc for the Sweden Connect Technical Framework.

4. References

[SAML2Core]

OASIS Standard, Assertions and Protocols for the OASIS Security Assertion Markup Language (SAML) V2.0, March 2005.

[OASIS-DSS]

Digital Signature Service Core Protocols, Elements, and Bindings Version 1.0.

[TillitRamv]

Tillitsramverk för Svensk e-legitimation - 2018-158.

[RFC7773]

RFC7773: Authentication Context Certificate Extension.

[EidDeploy]

Deployment Profile for the Swedish eID Framework.

[EidEntityCat]

Entity Categories for the Swedish eID Framework.

[EidDSSExt]

DSS Extension for Federated Central Signing Services.

[EidSigSAP]

Signature Activation Protocol for Federated Signing.

[EidCSignProf]

Implementation Profile for Using OASIS DSS in Central Signing Services.

[CertProf]

Certificate profile for certificates issued by Central Signing services

[EidAttributes]

Attribute Specification for the Swedish eID Framework.

[eIDAS]

REGULATION (EU) No 910/2014 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 23 July 2014 on electronic identification and trust services for electronic transactions in the internal market and repealing Directive 1999/93/EC. Including implementation acts of the regulation and associated technical specifications.

[ISO 3166]

Country Codes - ISO 3166, https://www.iso.org/iso-3166-country-codes.html.

5. Changes between versions

Changes between version 1.5 and version 1.6:

Changes between version 1.4 and version 1.5:

Changes between version 1.3 and version 1.4:

Changes between version 1.2 and version 1.3:

Changes between version 1.1 and version 1.2:

Changes between version 1.0 and version 1.1: