ISO/IEC 26131:2024
(Main)Information technology - OpenID connect - OpenID connect core 1.0 incorporating errata set 2
Information technology - OpenID connect - OpenID connect core 1.0 incorporating errata set 2
OpenID Connect 1.0 is a simple identity layer on top of the OAuth 2.0 protocol. It enables Clients to verify the identity of the End-User based on the authentication performed by an Authorization Server, as well as to obtain basic profile information about the End-User in an interoperable and REST-like manner. This document defines the core OpenID Connect functionality: authentication built on top of OAuth 2.0 and the use of Claims to communicate information about the End-User. It also describes the security and privacy considerations for using OpenID Connect.
Titre manque
General Information
- Status
- Published
- Publication Date
- 30-Sep-2024
- Technical Committee
- ISO/IEC JTC 1 - Information technology
- Drafting Committee
- ISO/IEC JTC 1 - Information technology
- Current Stage
- 6060 - International Standard published
- Start Date
- 01-Oct-2024
- Due Date
- 14-Feb-2027
- Completion Date
- 01-Oct-2024
Overview
ISO/IEC 26131:2024 - OpenID Connect Core 1.0 (incorporating errata set 2) specifies a simple identity layer built on top of the OAuth 2.0 framework. It defines how Clients (Relying Parties) can verify End-User identity using an Authorization Server (OpenID Provider) and obtain interoperable profile information in a REST-like manner. The standard describes the use of ID Tokens (JWTs), Claims, registration and discovery mechanisms, and the security and privacy considerations required for robust OpenID Connect (OIDC) implementations.
Key topics and technical requirements
- Authentication on OAuth 2.0: Defines how authentication is implemented as an extension of OAuth 2.0 (use of the openid scope and ID Token delivery).
- ID Token and JWT: Specifies ID Token format, validation rules and interaction with JSON Web Token (JWT) constructs.
- Flows: Details core authorization flows - Authorization Code, Implicit, and Hybrid - including endpoint behavior, request/response formats, and validation.
- Claims and UserInfo: Standard claims, claim languages/scripts, UserInfo endpoint behavior, and how Clients request and consume claims.
- Client registration & discovery: Assumes prior discovery (OpenID Connect Discovery) and supports dynamic client registration patterns.
- Security requirements: Extensive guidance on token handling, signature/encryption (JWS/JWE), TLS, token lifetimes, replay and substitution threats, and recommended mitigations.
- Privacy considerations: Guidance on PII handling, correlation risks, offline access, and data access monitoring.
- Operational details: Client authentication methods, key rotation, refresh token use, serializations (JSON/Form/Query), and implementation notes for compatibility and interoperability.
- Self-Issued Provider & Subject Identifiers: Support for self-issued providers and subject identifier algorithms (including pairwise identifiers).
Practical applications & who uses it
- Identity Providers (IdPs) / OpenID Providers implementing interoperable authentication and token services.
- Application developers and architects building web, mobile, or API-based systems that require single sign-on (SSO), federated identity, or secure user profile retrieval.
- Security engineers designing token validation, encryption/signature policies and secure OAuth/OIDC deployments.
- Enterprise SSO & consumer “social login” integrations, federations and API authorization systems that need standardized identity assertions. Benefits include standardized ID Tokens, interoperable claims exchange, improved security posture, and consistent client-server behavior across providers.
Related standards
- OAuth 2.0 Authorization Framework (RFC 6749)
- OAuth 2.0 Bearer Token Usage (RFC 6750)
- JSON Web Token (JWT), JSON Web Signature (JWS), JSON Web Encryption (JWE)
- OpenID Connect Discovery 1.0
- OpenID Connect Dynamic Client Registration 1.0
- RFC 2119 (requirements language)
Keywords: OpenID Connect, ISO/IEC 26131, OAuth 2.0, ID Token, JWT, claims, authentication, Relying Party, OpenID Provider, discovery, dynamic registration, SSO, security, privacy.
Frequently Asked Questions
ISO/IEC 26131:2024 is a standard published by the International Organization for Standardization (ISO). Its full title is "Information technology - OpenID connect - OpenID connect core 1.0 incorporating errata set 2". This standard covers: OpenID Connect 1.0 is a simple identity layer on top of the OAuth 2.0 protocol. It enables Clients to verify the identity of the End-User based on the authentication performed by an Authorization Server, as well as to obtain basic profile information about the End-User in an interoperable and REST-like manner. This document defines the core OpenID Connect functionality: authentication built on top of OAuth 2.0 and the use of Claims to communicate information about the End-User. It also describes the security and privacy considerations for using OpenID Connect.
OpenID Connect 1.0 is a simple identity layer on top of the OAuth 2.0 protocol. It enables Clients to verify the identity of the End-User based on the authentication performed by an Authorization Server, as well as to obtain basic profile information about the End-User in an interoperable and REST-like manner. This document defines the core OpenID Connect functionality: authentication built on top of OAuth 2.0 and the use of Claims to communicate information about the End-User. It also describes the security and privacy considerations for using OpenID Connect.
ISO/IEC 26131:2024 is classified under the following ICS (International Classification for Standards) categories: 35.030 - IT Security. The ICS classification helps identify the subject area and facilitates finding related standards.
You can purchase ISO/IEC 26131:2024 directly from iTeh Standards. The document is available in PDF format and is delivered instantly after payment. Add the standard to your cart and complete the secure checkout process. iTeh Standards is an authorized distributor of ISO standards.
Standards Content (Sample)
International
Standard
ISO/IEC 26131
First edition
Information technology — OpenID
2024-10
connect — OpenID connect core 1.0
incorporating errata set 2
Reference number
© ISO/IEC 2024
All rights reserved. Unless otherwise specified, or required in the context of its implementation, no part of this publication may
be reproduced or utilized otherwise in any form or by any means, electronic or mechanical, including photocopying, or posting on
the internet or an intranet, without prior written permission. Permission can be requested from either ISO at the address below
or ISO’s member body in the country of the requester.
ISO copyright office
CP 401 • Ch. de Blandonnet 8
CH-1214 Vernier, Geneva
Phone: +41 22 749 01 11
Email: copyright@iso.org
Website: www.iso.org
Published in Switzerland
© ISO/IEC 2024 – All rights reserved
ii
Foreword
ISO (the International Organization for Standardization) and IEC (the International Electrotechnical
Commission) form the specialized system for worldwide standardization. National bodies that are
members of ISO or IEC participate in the development of International Standards through technical
committees established by the respective organization to deal with particular fields of technical activity.
ISO and IEC technical committees collaborate in fields of mutual interest. Other international
organizations, governmental and non-governmental, in liaison with ISO and IEC, also take part in the
work.
The procedures used to develop this document and those intended for its further maintenance
are described in the ISO/IEC Directives, Part 1. In particular, the different approval criteria needed
for the different types of document should be noted (see www.iso.org/directives or
www.iec.ch/members_experts/refdocs).
ISO and IEC draw attention to the possibility that the implementation of this document may involve the
use of (a) patent(s). ISO and IEC take no position concerning the evidence, validity or applicability of any
claimed patent rights in respect thereof. As of the date of publication of this document, ISO and IEC had
not received notice of (a) patent(s) which may be required to implement this document. However,
implementers are cautioned that this may not represent the latest information, which may be obtained
from the patent database available at www.iso.org/patents and https://patents.iec.ch. ISO and IEC shall
not be held responsible for identifying any or all such patent rights.
Any trade name used in this document is information given for the convenience of users and does not
constitute an endorsement.
For an explanation of the voluntary nature of standards, the meaning of ISO specific terms and
expressions related to conformity assessment, as well as information about ISO's adherence to the
World Trade Organization (WTO) principles in the Technical Barriers to Trade (TBT), see
www.iso.org/iso/foreword.html. In the IEC, see www.iec.ch/understanding-standards.
This document was prepared by the OpenID Foundation (OIDF) (as OpenID Connect Core 1.0
incorporating errata set 2) and drafted in accordance with its editorial rules. It was adopted, under the
JTC 1 PAS procedure, by Joint Technical Committee ISO/IEC JTC 1, Information technology.
Any feedback or questions on this document should be directed to the user’s national standards body. A
complete listing of these bodies can be found at www.iso.org/members.html and www.iec.ch/national-
committees.
© ISO/IEC 2024 – All rights reserved
iii
Abstract
OpenID Connect 1.0 is a simple identity layer on top of the OAuth 2.0
protocol. It enables Clients to verify the identity of the End-User based
on the authentication performed by an Authorization Server, as well as
to obtain basic profile information about the End-User in an
interoperable and REST-like manner.
This specification defines the core OpenID Connect functionality:
authentication built on top of OAuth 2.0 and the use of Claims to
communicate information about the End-User. It also describes the
security and privacy considerations for using OpenID Connect.
© ISO/IEC 2024 – All rights reserved
iv
Table of Contents
1. Introduction
1.1. Requirements Notation and Conventions
1.2. Terminology
1.3. Overview
2. ID Token
3. Authentication
3.1. Authentication using the Authorization Code
Flow
3.1.1. Authorization Code Flow Steps
3.1.2. Authorization Endpoint
3.1.2.1. Authentication Request
3.1.2.2. Authentication Request Validation
3.1.2.3. Authorization Server Authenticates End-
User
3.1.2.4. Authorization Server Obtains End-User
Consent/Authorization
3.1.2.5. Successful Authentication Response
3.1.2.6. Authentication Error Response
3.1.2.7. Authentication Response Validation
3.1.3. Token Endpoint
3.1.3.1. Token Request
3.1.3.2. Token Request Validation
3.1.3.3. Successful Token Response
3.1.3.4. Token Error Response
3.1.3.5. Token Response Validation
3.1.3.6. ID Token
3.1.3.7. ID Token Validation
3.1.3.8. Access Token Validation
3.2. Authentication using the Implicit Flow
3.2.1. Implicit Flow Steps
3.2.2. Authorization Endpoint
3.2.2.1. Authentication Request
3.2.2.2. Authentication Request Validation
3.2.2.3. Authorization Server Authenticates End-
User
3.2.2.4. Authorization Server Obtains End-User
Consent/Authorization
3.2.2.5. Successful Authentication Response
3.2.2.6. Authentication Error Response
3.2.2.7. Redirect URI Fragment Handling
3.2.2.8. Authentication Response Validation
3.2.2.9. Access Token Validation
3.2.2.10. ID Token
3.2.2.11. ID Token Validation
3.3. Authentication using the Hybrid Flow
3.3.1. Hybrid Flow Steps
3.3.2. Authorization Endpoint
© ISO/IEC 2024 – All rights reserved
v
3.3.2.1. Authentication Request
3.3.2.2. Authentication Request Validation
3.3.2.3. Authorization Server Authenticates End-
User
3.3.2.4. Authorization Server Obtains End-User
Consent/Authorization
3.3.2.5. Successful Authentication Response
3.3.2.6. Authentication Error Response
3.3.2.7. Redirect URI Fragment Handling
3.3.2.8. Authentication Response Validation
3.3.2.9. Access Token Validation
3.3.2.10. Authorization Code Validation
3.3.2.11. ID Token
3.3.2.12. ID Token Validation
3.3.3. Token Endpoint
3.3.3.1. Token Request
3.3.3.2. Token Request Validation
3.3.3.3. Successful Token Response
3.3.3.4. Token Error Response
3.3.3.5. Token Response Validation
3.3.3.6. ID Token
3.3.3.7. ID Token Validation
3.3.3.8. Access Token
3.3.3.9. Access Token Validation
4. Initiating Login from a Third Party
5. Claims
5.1. Standard Claims
5.1.1. Address Claim
5.1.2. Additional Claims
5.2. Claims Languages and Scripts
5.3. UserInfo Endpoint
5.3.1. UserInfo Request
5.3.2. Successful UserInfo Response
5.3.3. UserInfo Error Response
5.3.4. UserInfo Response Validation
5.4. Requesting Claims using Scope Values
5.5. Requesting Claims using the "claims" Request
Parameter
5.5.1. Individual Claims Requests
5.5.1.1. Requesting the "acr" Claim
5.5.2. Languages and Scripts for Individual Claims
5.6. Claim Types
5.6.1. Normal Claims
5.6.2. Aggregated and Distributed Claims
5.6.2.1. Example of Aggregated Claims
5.6.2.2. Example of Distributed Claims
5.7. Claim Stability and Uniqueness
6. Passing Request Parameters as JWTs
6.1. Passing a Request Object by Value
© ISO/IEC 2024 – All rights reserved
vi
6.1.1. Request using the "request" Request
Parameter
6.2. Passing a Request Object by Reference
6.2.1. URI Referencing the Request Object
6.2.2. Request using the "request_uri" Request
Parameter
6.2.3. Authorization Server Fetches Request
Object
6.2.4. "request_uri" Rationale
6.3. Validating JWT-Based Requests
6.3.1. Encrypted Request Object
6.3.2. Signed Request Object
6.3.3. Request Parameter Assembly and Validation
7. Self-Issued OpenID Provider
7.1. Self-Issued OpenID Provider Discovery
7.2. Self-Issued OpenID Provider Registration
7.2.1. Providing Information with the
"registration" Request Parameter
7.3. Self-Issued OpenID Provider Request
7.4. Self-Issued OpenID Provider Response
7.5. Self-Issued ID Token Validation
8. Subject Identifier Types
8.1. Pairwise Identifier Algorithm
9. Client Authentication
10. Signatures and Encryption
10.1. Signing
10.1.1. Rotation of Asymmetric Signing Keys
10.2. Encryption
10.2.1. Rotation of Asymmetric Encryption Keys
11. Offline Access
12. Using Refresh Tokens
12.1. Refresh Request
12.2. Successful Refresh Response
12.3. Refresh Error Response
13. Serializations
13.1. Query String Serialization
13.2. Form Serialization
13.3. JSON Serialization
14. String Operations
15. Implementation Considerations
15.1. Mandatory to Implement Features for All
OpenID Providers
15.2. Mandatory to Implement Features for Dynamic
OpenID Providers
15.3. Discovery and Registration
15.4. Mandatory to Implement Features for Relying
Parties
15.5. Implementation Notes
15.5.1. Authorization Code Implementation Notes
© ISO/IEC 2024 – All rights reserved
vii
15.5.2. Nonce Implementation Notes
15.5.3. Redirect URI Fragment Handling
Implementation Notes
15.6. Compatibility Notes
15.7. Related Specifications and Implementer's
Guides
16. Security Considerations
16.1. Request Disclosure
16.2. Server Masquerading
16.3. Token Manufacture/Modification
16.4. Access Token Disclosure
16.5. Server Response Disclosure
16.6. Server Response Repudiation
16.7. Request Repudiation
16.8. Access Token Redirect
16.9. Token Reuse
16.10. Eavesdropping or Leaking Authorization Codes
(Secondary Authenticator Capture)
16.11. Token Substitution
16.12. Timing Attack
16.13. Other Crypto Related Attacks
16.14. Signing and Encryption Order
16.15. Issuer Identifier
16.16. Implicit Flow Threats
16.17. TLS Requirements
16.18. Lifetimes of Access Tokens and Refresh
Tokens
16.19. Symmetric Key Entropy
16.20. Need for Signed Requests
16.21. Need for Encrypted Requests
16.22. HTTP 307 Redirects
16.23. Custom URI Schemes on iOS
17. Privacy Considerations
17.1. Personally Identifiable Information
17.2. Data Access Monitoring
17.3. Correlation
17.4. Offline Access
18. IANA Considerations
18.1. JSON Web Token Claims Registration
18.1.1. Registry Contents
18.2. OAuth Parameters Registration
18.2.1. Registry Contents
18.3. OAuth Extensions Error Registration
18.3.1. Registry Contents
18.4. URI Scheme Registration
18.4.1. Registry Contents
19. References
19.1. Normative References
19.2. Informative References
© ISO/IEC 2024 – All rights reserved
viii
Appendix A. Authorization Examples
A.1. Example using response_type=code
A.2. Example using response_type=id_token
A.3. Example using response_type=id_token token
A.4. Example using response_type=code id_token
A.5. Example using response_type=code token
A.6. Example using
response_type=code id_token token
A.7. RSA Key Used in Examples
© ISO/IEC 2024 – All rights reserved
ix
Information technology — OpenID Connect — OpenID
Connect Core 1.0 incorporating errata set 2
TOC
1. Introduction
OpenID Connect 1.0 is a simple identity layer on top of the OAuth 2.0
[RFC6749] protocol. It enables Clients to verify the identity of the End-
User based on the authentication performed by an Authorization Server,
as well as to obtain basic profile information about the End-User in an
interoperable and REST-like manner.
The OpenID Connect Core 1.0 specification defines the core OpenID
Connect functionality: authentication built on top of OAuth 2.0 and the
use of Claims to communicate information about the End-User. It also
describes the security and privacy considerations for using OpenID
Connect.
As background, the OAuth 2.0 Authorization Framework [RFC6749] and
OAuth 2.0 Bearer Token Usage [RFC6750] specifications provide a
general framework for third-party applications to obtain and use limited
access to HTTP resources. They define mechanisms to obtain and use
Access Tokens to access resources but do not define standard methods
to provide identity information. Notably, without profiling OAuth 2.0, it
is incapable of providing information about the authentication of an
End-User. Readers are expected to be familiar with these specifications.
OpenID Connect implements authentication as an extension to the
OAuth 2.0 authorization process. Use of this extension is requested by
Clients by including the openid scope value in the Authorization
Request. Information about the authentication performed is returned in
a JSON Web Token (JWT) [JWT] called an ID Token (see Section 2).
OAuth 2.0 Authentication Servers implementing OpenID Connect are
also referred to as OpenID Providers (OPs). OAuth 2.0 Clients using
OpenID Connect are also referred to as Relying Parties (RPs).
This specification assumes that the Relying Party has already obtained
configuration information about the OpenID Provider, including its
Authorization Endpoint and Token Endpoint locations. This information
is normally obtained via Discovery, as described in OpenID Connect
Discovery 1.0 [OpenID.Discovery], or may be obtained via other
mechanisms.
© ISO/IEC 2024 – All rights reserved
Likewise, this specification assumes that the Relying Party has already
obtained sufficient credentials and provided information needed to use
the OpenID Provider. This is normally done via Dynamic Registration, as
described in OpenID Connect Dynamic Client Registration 1.0
[OpenID.Registration], or may be obtained via other mechanisms.
The previous versions of this specification are:
• OpenID Connect Core 1.0 incorporating errata set 1
[OpenID.Core.Errata1]
• OpenID Connect Core 1.0 (final) [OpenID.Core.Final]
TOC
1.1. Requirements Notation and Conventions
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT
RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be
interpreted as described in RFC 2119 [RFC2119].
In the .txt version of this specification, values are quoted to indicate
that they are to be taken literally. When using these values in protocol
messages, the quotes MUST NOT be used as part of the value. In the
HTML version of this specification, values to be taken literally are
indicated by the use of this fixed-width font.
All uses of JSON Web Signature (JWS) [JWS] and JSON Web Encryption
(JWE) [JWE] data structures in this specification utilize the JWS
Compact Serialization or the JWE Compact Serialization; the JWS JSON
Serialization and the JWE JSON Serialization are not used.
TOC
1.2. Terminology
This specification uses the terms "Access Token", "Authorization Code",
"Authorization Endpoint", "Authorization Grant", "Authorization Server",
"Client", "Client Authentication", "Client Identifier", "Client Secret",
"Grant Type", "Protected Resource", "Redirection URI", "Refresh Token",
"Resource Server", "Response Type", and "Token Endpoint" defined by
OAuth 2.0 [RFC6749], the terms "Claim Name", "Claim Value", "JSON
Web Token (JWT)", "JWT Claims Set", and "Nested JWT" defined by
JSON Web Token (JWT) [JWT], the terms "Base64url Encoding",
© ISO/IEC 2024 – All rights reserved
"Header Parameter", and "JOSE Header" defined by JSON Web
Signature (JWS) [JWS], the term "User Agent" defined by RFC 7230
[RFC7230], and the term "Response Mode" defined by OAuth 2.0
Multiple Response Type Encoding Practices [OAuth.Responses].
This specification also defines the following terms:
Authentication
Process used to achieve sufficient confidence in the binding
between the Entity and the presented Identity.
Authentication Request
OAuth 2.0 Authorization Request using extension
parameters and scopes defined by OpenID Connect to
request that the End-User be authenticated by the
Authorization Server, which is an OpenID Connect Provider,
to the Client, which is an OpenID Connect Relying Party.
Authentication Context
Information that the Relying Party can require before it
makes an entitlement decision with respect to an
authentication response. Such context can include, but is
not limited to, the actual authentication method used or
level of assurance such as ISO/IEC 29115 [ISO29115] entity
authentication assurance level.
Authentication Context Class
Set of authentication methods or procedures that are
considered to be equivalent to each other in a particular
context.
Authentication Context Class Reference
Identifier for an Authentication Context Class.
Authorization Code Flow
OAuth 2.0 flow in which an Authorization Code is returned
from the Authorization Endpoint and all tokens are returned
from the Token Endpoint.
Authorization Request
OAuth 2.0 Authorization Request as defined by [RFC6749].
Claim
Piece of information asserted about an Entity.
© ISO/IEC 2024 – All rights reserved
Claim Type
Syntax used for representing a Claim Value. This
specification defines Normal, Aggregated, and Distributed
Claim Types.
Claims Provider
Server that can return Claims about an Entity.
Credential
Data presented as evidence of the right to use an identity or
other resources.
End-User
Human participant.
Entity
Something that has a separate and distinct existence and
that can be identified in a context. An End-User is one
example of an Entity.
Essential Claim
Claim specified by the Client as being necessary to ensure a
smooth authorization experience for the specific task
requested by the End-User.
Hybrid Flow
OAuth 2.0 flow in which an Authorization Code is returned
from the Authorization Endpoint, some tokens are returned
from the Authorization Endpoint, and others are returned
from the Token Endpoint.
ID Token
JSON Web Token (JWT) [JWT] that contains Claims about
the Authentication event. It MAY contain other Claims.
Identifier
Value that uniquely characterizes an Entity in a specific
context.
Identity
Set of attributes related to an Entity.
© ISO/IEC 2024 – All rights reserved
Implicit Flow
OAuth 2.0 flow in which all tokens are returned from the
Authorization Endpoint and neither the Token Endpoint nor
an Authorization Code are used.
Issuer
Entity that issues a set of Claims.
Issuer Identifier
Verifiable Identifier for an Issuer. An Issuer Identifier is a
case-sensitive URL using the https scheme that contains
scheme, host, and optionally, port number and path
components and no query or fragment components.
Message
Request or a response between an OpenID Relying Party and
an OpenID Provider.
OpenID Provider (OP)
OAuth 2.0 Authorization Server that is capable of
Authenticating the End-User and providing Claims to a
Relying Party about the Authentication event and the End-
User.
Request Object
JWT that contains a set of request parameters as its Claims.
Request URI
URL that references a resource containing a Request Object.
The Request URI contents MUST be retrievable by the
Authorization Server.
Pairwise Pseudonymous Identifier (PPID)
Identifier that identifies the Entity to a Relying Party that
cannot be correlated with the Entity's PPID at another
Relying Party.
Personally Identifiable Information (PII)
Information that (a) can be used to identify the natural
person to whom such information relates, or (b) is or might
be directly or indirectly linked to a natural person to whom
such information relates.
© ISO/IEC 2024 – All rights reserved
Relying Party (RP)
OAuth 2.0 Client application requiring End-User
Authentication and Claims from an OpenID Provider.
Sector Identifier
Host component of a URL used by the Relying Party's
organization that is an input to the computation of pairwise
Subject Identifiers for that Relying Party.
Self-Issued OpenID Provider
Personal, self-hosted OpenID Provider that issues self-
signed ID Tokens.
Subject Identifier
Locally unique and never reassigned identifier within the
Issuer for the End-User, which is intended to be consumed
by the Client.
UserInfo Endpoint
Protected Resource that, when presented with an Access
Token by the Client, returns authorized information about
the End-User represented by the corresponding
Authorization Grant. The UserInfo Endpoint URL MUST use
the https scheme and MAY contain port, path, and query
parameter components.
Validation
Process intended to establish the soundness or correctness
of a construct.
Verification
Process intended to test or prove the truth or accuracy of a
fact or value.
Voluntary Claim
Claim specified by the Client as being useful but not
Essential for the specific task requested by the End-User.
IMPORTANT NOTE TO READERS: The terminology definitions in this
section are a normative portion of this specification, imposing
requirements upon implementations. All the capitalized words in the
text of this specification, such as "Issuer Identifier", reference these
defined terms. Whenever the reader encounters them, their definitions
found in this section must be followed.
© ISO/IEC 2024 – All rights reserved
For more background on some of the terminology used, see Internet
Security Glossary, Version 2 [RFC4949], ISO/IEC 29115 Entity
Authentication Assurance [ISO29115], and ITU-T X.1252 [X.1252].
TOC
1.3. Overview
The OpenID Connect protocol, in abstract, follows the following steps.
1. The RP (Client) sends a request to the OpenID Provider
(OP).
2. The OP authenticates the End-User and obtains
authorization.
3. The OP responds with an ID Token and usually an Access
Token.
4. The RP can send a request with the Access Token to the
UserInfo Endpoint.
5. The UserInfo Endpoint returns Claims about the End-
User.
These steps are illustrated in the following diagram:
+--------+ +--------+
| | | |
| |---------(1) AuthN Request-------->| |
| | | |
| | +--------+ | |
| | | | | |
| | | End- |<--(2) AuthN & AuthZ-->| |
| | | User | | |
| RP | | | | OP |
| | +--------+ | |
| | | |
| |<--------(3) AuthN Response--------| |
| | | |
| |---------(4) UserInfo Request----->| |
| | | |
| |<--------(5) UserInfo Response-----| |
| | | |
+--------+ +--------+
© ISO/IEC 2024 – All rights reserved
TOC
2. ID Token
The primary extension that OpenID Connect makes to OAuth 2.0 to
enable End-Users to be Authenticated is the ID Token data structure.
The ID Token is a security token that contains Claims about the
Authentication of an End-User by an Authorization Server when using a
Client, and potentially other requested Claims. The ID Token is
represented as a JSON Web Token (JWT) [JWT].
The following Claims are used within the ID Token for all OAuth 2.0
flows used by OpenID Connect:
iss
REQUIRED. Issuer Identifier for the Issuer of the response.
The iss value is a case-sensitive URL using the https
scheme that contains scheme, host, and optionally, port
number and path components and no query or fragment
components.
sub
REQUIRED. Subject Identifier. A locally unique and never
reassigned identifier within the Issuer for the End-User,
which is intended to be consumed by the Client, e.g.,
24400320 or
AItOawmwtWwcT0k51BayewNvutrJUqsvl6qs7A4. It MUST
NOT exceed 255 ASCII [RFC20] characters in length. The
sub value is a case-sensitive string.
aud
REQUIRED. Audience(s) that this ID Token is intended for.
It MUST contain the OAuth 2.0 client_id of the Relying
Party as an audience value. It MAY also contain identifiers
for other audiences. In the general case, the aud value is an
array of case-sensitive strings. In the common special case
when there is one audience, the aud value MAY be a single
case-sensitive string.
exp
REQUIRED. Expiration time on or after which the ID Token
MUST NOT be accepted by the RP when performing
authentication with the OP. The processing of this parameter
requires that the current date/time MUST be before the
expiration date/time listed in the value. Implementers MAY
provide for some small leeway, usually no more than a few
© ISO/IEC 2024 – All rights reserved
minutes, to account for clock skew. Its value is a JSON
[RFC8259] number representing the number of seconds
from 1970-01-01T00:00:00Z as measured in UTC until the
date/time. See RFC 3339 [RFC3339] for details regarding
date/times in general and UTC in particular. NOTE: The ID
Token expiration time is unrelated the lifetime of the
authenticated session between the RP and the OP.
iat
REQUIRED. Time at which the JWT was issued. Its value is
a JSON number representing the number of seconds from
1970-01-01T00:00:00Z as measured in UTC until the
date/time.
auth_time
Time when the End-User authentication occurred. Its value
is a JSON number representing the number of seconds from
1970-01-01T00:00:00Z as measured in UTC until the
date/time. When a max_age request is made or when
auth_time is requested as an Essential Claim, then this
Claim is REQUIRED; otherwise, its inclusion is OPTIONAL.
(The auth_time Claim semantically corresponds to the
OpenID 2.0 PAPE [OpenID.PAPE] auth_time response
parameter.)
nonce
String value used to associate a Client session with an ID
Token, and to mitigate replay attacks. The value is passed
through unmodified from the Authentication Request to the
ID Token. If present in the ID Token, Clients MUST verify
that the nonce Claim Value is equal to the value of the
nonce parameter sent in the Authentication Request. If
present in the Authentication Request, Authorization Servers
MUST include a nonce Claim in the ID Token with the Claim
Value being the nonce value sent in the Authentication
Request. Authorization Servers SHOULD perform no other
processing on nonce values used. The nonce value is a
case-sensitive string.
acr
OPTIONAL. Authentication Context Class Reference. String
specifying an Authentication Context Class Reference value
that identifies the Authentication Context Class that the
authentication performed satisfied. The value "0" indicates
the End-User authentication did not meet the requirements
of ISO/IEC 29115 [ISO29115] level 1. For historic reasons,
the value "0" is used to indicate that there is no confidence
that the same person is actually there. Authentications with
© ISO/IEC 2024 – All rights reserved
level 0 SHOULD NOT be used to authorize access to any
resource of any monetary value. (This corresponds to the
OpenID 2.0 PAPE [OpenID.PAPE] nist_auth_level 0.) An
absolute URI or an RFC 6711 [RFC6711] registered name
SHOULD be used as the acr value; registered names MUST
NOT be used with a different meaning than that which is
registered. Parties using this claim will need to agree upon
the meanings of the values used, which may be context
specific. The acr value is a case-sensitive string.
amr
OPTIONAL. Authentication Methods References. JSON array
of strings that are identifiers for authentication methods
used in the authentication. For instance, values might
indicate that both password and OTP authentication
methods were used. The amr value is an array of case-
sensitive strings. Values used in the amr Claim SHOULD be
from those registered in the IANA Authentication Method
Reference Values registry [IANA.AMR] established by
[RFC8176]; parties using this claim will need to agree upon
the meanings of any unregistered values used, which may
be context specific.
azp
OPTIONAL. Authorized party - the party to which the ID
Token was issued. If present, it MUST contain the OAuth 2.0
Client ID of this party. The azp value is a case-sensitive
string containing a StringOrURI value. Note that in practice,
the azp Claim only occurs when extensions beyond the
scope of this specification are used; therefore,
implementations not using such extensions are encouraged
to not use azp and to ignore it when it does occur.
ID Tokens MAY contain other Claims. Any Claims used that are not
understood MUST be ignored. See Sections 3.1.3.6, 3.3.2.11, 5.1, and
7.4 for additional Claims defined by this specification.
ID Tokens MUST be signed using JWS [JWS] and optionally both signed
and then encrypted using JWS [JWS] and JWE [JWE] respectively,
thereby providing authentication, integrity, non-repudiation, and
optionally, confidentiality, per Section 16.14. If the ID Token is
encrypted, it MUST be signed then encrypted, with the result being a
Nested JWT, as defined in [JWT]. ID Tokens MUST NOT use none as the
alg value unless the Response Type used returns no ID Token from the
Authorization Endpoint (such as when using the Authorization Code
Flow) and the Client explicitly requested the use of none at Registration
time.
© ISO/IEC 2024 – All rights reserved
ID Tokens SHOULD NOT use the JWS or JWE x5u, x5c, jku, or jwk
Header Parameter fields. Instead, references to keys used are
communicated in advance using Discovery and Registration parameters,
per Section 10.
The following is a non-normative example of the set of Claims (the JWT
Claims Set) in an ID Token:
{
"iss": "https://server.example.com",
"sub": "24400320",
"aud": "s6BhdRkqt3",
"nonce": "n-0S6_WzA2Mj",
"exp": 1311281970,
"iat": 1311280970,
"auth_time": 1311280969,
"acr": "urn:mace:incommon:iap:silver"
}
TOC
3. Authentication
OpenID Connect performs authentication to log in the End-User or to
determine that the End-User is already logged in. OpenID Connect
returns the result of the Authentication performed by the Server to the
Client in a secure manner so that the Client can rely on it. For this
reason, the Client is called Relying Party (RP) in this case.
The Authentication result is returned in an ID Token, as defined in
Section 2. It has Claims expressing such information as the Issuer, the
Subject Identifier, when the authentication was performed, etc.
Authentication can follow one of three paths: the Authorization Code
Flow (response_type=code), the Implicit Flow
(response_type=id_token token or response_type=id_token), or the
Hybrid Flow (using other Response Type values defined in OAuth 2.0
Multiple Response Type Encoding Practices [OAuth.Responses]). The
flows determine how the ID Token and Access Token are returned to
the Client.
The characteristics of the three flows are summarized in the following
non-normative table. The table is intended to provide some guidance on
which flow to choose in particular contexts.
© ISO/IEC 2024 – All rights reserved
Authorization Code Implicit Hybrid
Property
Flow Flow Flow
All tokens returned from
no yes no
Authorization Endpoint
All tokens returned from Token
yes no no
Endpoint
Tokens not revealed to User Agent yes no no
Client can be authenticated yes no yes
Refresh Token possible yes no yes
Communication in one round trip no yes no
Most communication server-to-
yes no varies
server
OpenID Connect Authentication Flows
The flow used is determined by the response_type value contained in
the Authorization Request. These response_type values select these
flows:
"response_type" value Flow
code
Authorization Code Flow
id_token Implicit Flow
id_token token Implicit Flow
code id_token
Hybrid Flow
code token
Hybrid Flow
code id_token token
Hybrid Flow
© ISO/IEC 2024 – All rights reserved
OpenID Connect "response_type" Values
All but the code Response Type value, which is defined by OAuth 2.0
[RFC6749], are defined in the OAuth 2.0 Multiple Response Type
Encoding Practices [OAuth.Responses] specification. NOTE: While OAuth
2.0 also defines the token Response Type value for the Implicit Flow,
OpenID Connect does not use this Response Type, since no ID Token
would be returned.
TOC
3.1. Authentication using the Authorization Code Flow
This section describes how to perform authentication using the
Authorization Code Flow. When using the Authorization Code Flow, all
tokens are returned from the Token Endpoint.
The Authorization Code Flow returns an Authorization Code to the
Client, which can then exchange it for an ID Token and an Access Token
directly. This provides the benefit of not exposing any tokens to the
User Agent and possibly other malicious applications with access to the
User Agent. The Authorization Server can also authenticate the Client
before exchanging the Authorization Code for an Access Token. The
Authorization Code flow is suitable for Clients that can securely maintain
a Client Secret between themselves and the Authorization Server.
TOC
3.1.1. Authorization Code Flow Steps
The Authorization Code Flow goes through the following steps.
1. Client prepares an Authentication Request containing the
desired request parameters.
2. Client sends the request to the Authorization Server.
3. Authorization Server Authenticates the End-User.
© ISO/IEC 2024 – All rights reserved
4. Authorization Server obtains End-User
Consent/Authorization.
5. Authorization Server sends the End-User back to the
Client with an Authorization Code.
6. Client requests a response using the Authorization Code
at the Token Endpoint.
7. Client receives a response that contains an ID Token and
Access Token in the response body.
8. Client validates the ID token and retrieves the End-
User's Subject Identifier.
TOC
3.1.2. Authorization Endpoint
The Authorization Endpoint performs Authentication of the End-User.
This is done by sending the User Agent to the Authorization Server's
Authorization Endpoint for Authentication and Authorization, using
request parameters defined by OAuth 2.0 and additional parameters
and parameter values defined by OpenID Connect.
Communication with the Authorization Endpoint MUST utilize TLS. See
Section 16.17 for more information on using TLS.
TOC
3.1.2.1. Authentication Request
An Authentication Request is an OAuth 2.0 Authorization Request that
requests that the End-User be authenticated by the Authorization
Server.
Authorization Servers MUST support the use of the HTTP GET and POST
methods defined in RFC 7231 [RFC7231] at the Authorization Endpoint.
Clients MAY use the HTTP GET or POST methods to send the
Authorization Request to the Authorization Server. If using the HTTP
GET method, the request parameters are serialized using URI Query
String Serialization, per Section 13.1. If using the HTTP POST method,
the request parameters are serialized using Form Serialization, per
Section 13.2.
© ISO/IEC 2024 – All rights reserved
OpenID Connect uses the following OAuth 2.0 request parameters with
the Authorization Code Flow:
scope
REQUIRED. OpenID Connect requests MUST contain the
openid scope value. If the openid scope value is not
present, the behavior is entirely unspecified. Other scope
values MAY be present. Scope values used that are not
understood by an implementation SHOULD be ignored. See
Sections 5.4 and 11 for additional scope values defined by
this specification.
response_type
REQUIRED. OAuth 2.0 Response Type value that determines
the authorization processing flow to be used, including what
parameters are returned from the endpoints used. When
using the Authorization Code Flow, this value is code.
client_id
REQUIRED. OAuth 2.0 Client Identifier valid at the
Authorization Server.
redirect_uri
REQUIRED. Redirection URI to which the response will be
sent. This URI MUST exactly match one of the Redirection
URI values for the Client pre-registered at the OpenID
Provider, with the matching performed as described in
Section 6.2.1 of [RFC3986] (Simple String Comparison).
When using this flow, the Redirection URI SHOULD use the
https scheme; however, it MAY use the http scheme,
provided that the Client Type is confidential, as defined
in Section 2.1 of OAuth 2.0, and provided the OP allows the
use of http Redirection URIs in this case. Also, if the Client
is a native application, it MAY use the http scheme with
localhost or the IP loopback literals 127.0.0.1 or [::1]
as the hostname. The Redirection URI MAY use an alternate
scheme, such as one that is intended to identify a callback
into a native application.
state
RECOMMENDED. Opaque value used to maintain state
between the request and the callback. Typically, Cross-Site
Request Forgery (CSRF, XSRF) mitigation is done by
cryptographically binding the value of this parameter with a
browser cookie.
© ISO/IEC 2024 – All rights reserved
OpenID Connect also uses the following OAuth 2.0 request parameter,
which is defined in OAuth 2.0 Multiple Response Type Encoding
Practices [OAuth.Responses]:
response_mode
OPTIONAL. Informs the Authorization Server of the
mechanism to be used for returning parameters from the
Authorization Endpoint. This use of this parameter is NOT
RECOMMENDED when the Response Mode that would be
requested is the default mode specified for the Response
Type.
This specification also defines the following request parameters:
nonce
OPTIONAL. String value used to associate a Client session
with an ID Token, and to mitigate replay attacks. The value
is passed through unmodified from the Authentication
Request to the ID Token. Sufficient entropy MUST be present
in the nonce values used to prevent attackers from guessing
values. For implementation notes, see Section 15.5.2.
display
OPTIONAL. ASCII string value that specifies how the
Authorization Server displays the authentication and
consent user interface pages to the End-User. The defined
values are:
page
The Authorization Server SHOULD display the
authentication and consent UI consistent with
a full User Agent page view. If the display
parameter is not specified, this is the default
display mode.
popup
The Authorization Server SHOULD display the
authentication and consent UI consistent with
a popup User Agent window. The popup User
Agent window should be of an appropriate size
for a login-focused dialog and should not
obscure the entire window that it is popping up
over.
© ISO/IEC 2024 – All rights reserved
touch
The Authorization Server SHOULD display the
authentication and consent UI consistent with
a device that leverages a touch interface.
wap
The Authorization Server SHOULD display the
authentication and consent UI consistent with
a "feature phone" type display.
The Authorization Server MAY also attempt to detect the
capabilities of the User Agent and present an appropriate
display.
If an OP receives a display value outside the set defined
above that it does not understand, it MAY return an error or
it MAY ignore it; in practice, not returning errors for not-
understood values will help facilitate phasing in extensions
using new display values.
prompt
OPTIONAL. Space-delimited, case-sensitive list of ASCII
string values that specifies whether the Authorization Server
prompts the End-User for reauthentication and consent. The
defined values are:
none
The Authorization Server MUST NOT display
any authentication or consent user interface
pages. An error is returned if an End-User is
not already authenticated or the Client does not
have pre-configured consent for the requested
Claims or does not fulfill other conditions for
processing the request. The error code will
typically be login_required,
interaction_required, or another code
defined in Section 3.1.2.6. This can be used as
a method to check for existing authentication
and/or consent.
login
The Authorization Server SHOULD prompt the
End-User for reauthentication. If it cannot
reauthenticate the End-User, it MUST return an
error, typically login_required.
© ISO/IEC 2024 – All rights reserved
consent
The Authorization Server SHOULD prompt the
End-User for consent before returning
information to the Client. If it cannot obtain
consent, it MUST return an error, typically
consent_required.
select_account
The Authorization Server SHOULD prompt the
End-User to select a user account. This enables
an End-User who has multiple accounts at the
Authorization Server to select amongst the
multiple accounts that they might have current
sessions for. If it cannot obtain an account
selection choice made by the End-User, it MUST
return an error, typically
account_selection_required.
The prompt parameter can be used by the Client to make
sure that the End-User is still present for the current session
or to bring attention to the request. If this parameter
contains none with any other value, an error is returned.
If an OP receives a prompt value outside the set defined
above that it does not understand, it MAY return an error or
it MAY ignore it; in practice, no
...
La norme ISO/IEC 26131:2024 présente des éléments clés touchant à la technologie de l'information, en particulier au protocole OpenID Connect. Le champ d'application de cette norme est clairement défini, en indiquant que OpenID Connect 1.0 sert de couche d'identité simple au-dessus du protocole OAuth 2.0. Cela permet aux clients de vérifier l'identité de l'utilisateur final selon l'authentification effectuée par un serveur d'autorisation. De plus, la norme permet d'obtenir des informations de profil de base sur l'utilisateur final de manière interopérable et semblable à REST. Parmi les points forts de cette norme, on note la clarté de la définition des fonctionnalités essentielles d'OpenID Connect, notamment l'authentification reposant sur OAuth 2.0 et l'utilisation de "Claims" pour communiquer des informations concernant l'utilisateur final. Cette approche favorise une intégration fluide et sécurisée pour les développeurs souhaitant mettre en œuvre une solution d'authentification efficace. En outre, la norme aborde des considérations importantes relatives à la sécurité et à la vie privée lorsque l'on utilise OpenID Connect, ajoutant ainsi une couche de responsabilité pour les implémentations. Cette dimension est particulièrement pertinente dans le contexte actuel où la protection des données personnelles est primordiale. La norme ISO/IEC 26131:2024 constitue donc une référence curriculaire essentielle pour toute organisation souhaitant s'engager dans l'utilisation d'OpenID Connect, en garantissant une authentification sécurisée et respectueuse de la vie privée des utilisateurs.
Die Norm ISO/IEC 26131:2024 legt den Rahmen für OpenID Connect 1.0 fest, eine einfache Identitätsschicht, die auf dem OAuth 2.0-Protokoll basiert. Der Anwendungsbereich dieser Norm ist besonders relevant in der heutigen digitalen Welt, da sie es Clients ermöglicht, die Identität des Endbenutzers zu überprüfen, basierend auf der Authentifizierung, die durch einen Autorisierungsserver durchgeführt wird. Dies fördert nicht nur ein höheres Maß an Sicherheit, sondern sorgt auch für Interoperabilität und Benutzerfreundlichkeit. Ein wesentlicher Stärke dieser Norm ist die klare Definition der grundlegenden Funktionen von OpenID Connect. Die Einbindung von Authentifizierung auf Basis von OAuth 2.0 ist entscheidend, da sie eine standardisierte Methode zur Verwaltung von Benutzerdaten und -identitäten bereitstellt. Durch die Verwendung von Claims zur Kommunikation von Informationen über den Endbenutzer stellt die Norm sicher, dass diese Informationen strukturiert und nachvollziehbar übermittelt werden, was für zahlreiche Anwendungen in der Informationstechnologie von Bedeutung ist. Darüber hinaus befasst sich die Norm auch eingehend mit Sicherheits- und Datenschutzaspekten, die für die Nutzung von OpenID Connect von großer Wichtigkeit sind. Diese Überlegungen sind entscheidend, um das Vertrauen der Benutzer in digitale Identitätssysteme zu stärken und um sicherzustellen, dass sensible Informationen angemessen geschützt werden. Daher ist ISO/IEC 26131:2024 eine unverzichtbare Ressource für Unternehmen und Entwickler, die auf moderne Web-Technologien und Identitätsmanagement-Frameworks setzen. Insgesamt bietet die Norm ISO/IEC 26131:2024 eine fundierte Grundlage für die Implementierung von OpenID Connect, indem sie sowohl die technischen als auch die sicherheitsrelevanten Aspekte beleuchtet, die für die Authentifizierung und Identitätsverwaltung in vernetzten Systemen erforderlich sind.
The ISO/IEC 26131:2024 standard provides a comprehensive framework for OpenID Connect, defining its core functionalities and enhancing the understanding of identity management in a digital environment. The scope of this standard is notably pivotal, as it establishes OpenID Connect 1.0 as a reliable identity layer built upon the well-recognized OAuth 2.0 protocol. This integration enables Clients to authenticate End-Users seamlessly through the Authorization Server's verification process. One of the strengths of this standard lies in its emphasis on interoperability and its REST-like approach, making the implementation of authentication mechanisms more straightforward for developers. By facilitating basic profile information retrieval about End-Users, the standard simplifies processes while ensuring that services can interact fluidly across diverse platforms. This added layer of interoperability is critical in today's multi-faceted digital landscape where various applications must communicate securely and efficiently. Furthermore, the document's incorporation of security and privacy considerations strengthens its relevance in a time where data protection is paramount. By outlining specific guidelines for safeguarding user identity and sensitive information, ISO/IEC 26131:2024 not only enhances trust in the OpenID Connect framework but also aligns with emerging regulatory demands for data privacy across regions. Overall, ISO/IEC 26131:2024 stands out as a vital standard for any organization looking to implement OpenID Connect effectively. Its clear definitions, security provisions, and commitment to interoperability ensure that it remains a cornerstone for identity management solutions in the ever-evolving landscape of information technology.
ISO/IEC 26131:2024は、情報技術に関する重要な標準であり、OpenID Connectのコア機能を定義しています。この標準は、OAuth 2.0プロトコルの上に構築されるシンプルなアイデンティティレイヤーを提供し、クライアントが認証サーバーによって実施された認証に基づいてエンドユーザーのアイデンティティを確認できるようにします。また、エンドユーザーに関する基本的なプロフィール情報をインターロペラブルでRESTライクな方法で取得することも可能です。 この標準の強みは、認証のプロセスを簡素化し、他のシステムとの相互運用性を向上させる点にあります。特に、OpenID Connectは多様なアプリケーションやプラットフォームで広く採用されており、その実用性とユーザーエクスペリエンスの向上に寄与しています。さらに、セキュリティとプライバシーに関する配慮も明記されており、現代のウェブ環境におけるデータ保護のニーズに応える内容となっています。 ISO/IEC 26131:2024は、認証と情報共有の新しい基準を設定し、企業や開発者がエンドユーザーのアイデンティティを安全かつ効率的に管理できるようサポートしています。オープンな基盤に基づいているため、さまざまなビジネスシーンでの適用が期待され、デジタルアイデンティティの管理における重要な資源となるでしょう。この標準の適用により、ユーザーの信頼を高めつつ、セキュリティの強化も図れるため、その実効性は高い評価を受けています。 全体的に、ISO/IEC 26131:2024は、OpenID Connectの導入と関連するプラクティスの基盤を築くものであり、その重要性は今後ますます増していくと考えられます。
ISO/IEC 26131:2024 표준은 OpenID Connect 1.0에 대한 핵심 기능을 정의하고 있으며, OAuth 2.0 프로토콜 위에 구축된 간단한 신원 계층을 제공합니다. 이 표준은 클라이언트가 인가 서버에서 수행된 인증을 기반으로 최종 사용자(End-User)의 신원을 확인하고, 상호 운용 가능하며 REST와 유사한 방식으로 최종자에 대한 기본 프로필 정보를 획득할 수 있도록 합니다. ISO/IEC 26131:2024은 OpenID Connect의 기본 기능을 잘 규명하며, 이를 통해 사용자는 다양한 애플리케이션과 웹 서비스 간에 신뢰할 수 있는 인증 프로세스를 통해 안전하게 상호작용할 수 있습니다. 이 표준이 제공하는 인증 방법은 단순히 사용자 신원을 확인하는 것을 넘어, 최종 사용자의 정보(Claims)를 효율적으로 전달하고 관리할 수 있는 길을 열어줍니다. 또한, ISO/IEC 26131:2024은 OpenID Connect 사용 시 고려해야 할 보안 및 개인 정보 보호 문제를 상세히 설명하고 있습니다. 이는 기업 및 개발자들이 이 표준을 통해 안전하게 OpenID Connect를 구현하고 사용할 수 있도록 지원하는 중요한 요소입니다. 이 기준이 제정됨으로써, 디지털 환경에서의 신원 인증이 응집력 있고 신뢰할 수 있게 되며, 사용자는 보안 요소를 결합하여 다양한 플랫폼에서 편리한 인증 경험을 하게 됩니다. 따라서 ISO/IEC 26131:2024 표준은 오늘날 정보 기술 환경에서 매우 중요한 역할을 하게 됩니다.










Questions, Comments and Discussion
Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.
Loading comments...