ISO/IEC 26133:2024
(Main)Information technology - OpenID connect - OpenID connect dynamic client registration 1.0 incorporating errata set 2
Information technology - OpenID connect - OpenID connect dynamic client registration 1.0 incorporating errata set 2
OpenID Connect 1.0 is a simple identity layer on top of the OAuth 2.0 protocol. It enables Clients to verify the identity of the End-User based on the authentication performed by an Authorization Server, as well as to obtain basic profile information about the End-User in an interoperable and REST-like manner. This document defines how an OpenID Connect Relying Party can dynamically register with the End-User's OpenID Provider, providing information about itself to the OpenID Provider, and obtaining information needed to use it, including the OAuth 2.0 Client ID for this Relying Party.
Titre manque
General Information
- Status
- Published
- Publication Date
- 30-Sep-2024
- Technical Committee
- ISO/IEC JTC 1 - Information technology
- Drafting Committee
- ISO/IEC JTC 1 - Information technology
- Current Stage
- 6060 - International Standard published
- Start Date
- 01-Oct-2024
- Due Date
- 14-Feb-2027
- Completion Date
- 01-Oct-2024
Overview
ISO/IEC 26133:2024 - Information technology - OpenID Connect Dynamic Client Registration 1.0 (incorporating errata set 2) standardizes how an OpenID Connect Relying Party (Client) dynamically registers with an OpenID Provider (OP). Built on top of OAuth 2.0, it defines REST-like registration and management of client metadata, how Clients obtain an OAuth 2.0 Client ID, and how registration information is retrieved and updated in a secure, interoperable way.
Key Topics and Technical Requirements
- Client Metadata: Defines required and optional metadata such as redirect_uris, response_types, grant_types, application_type, contacts, client_name, logo_uri, policy_uri, tos_uri, jwks_uri and jwks. These values are input to registration requests and output in registration responses.
- Client Registration Endpoint: REST endpoint for initial dynamic registration. Specifies request/response payloads and error handling.
- Client Configuration Endpoint: Endpoint for reading and managing a registered Client’s configuration; includes use of a Registration Access Token to secure access.
- Tokens: Distinguishes Registration Access Token (for managing client registration) and optional Initial Access Token (service-specific, for restricting access to registration endpoint).
- JWK Management: Support for jwks_uri (recommended for key rotation) and jwks (by-value JWK Set for limited use cases). JWK Sets must not include private or symmetric keys.
- Identifier and Privacy Controls: sector_identifier_uri for pairwise subject identifier calculations and subject_type (pairwise or public).
- ID Token / UserInfo Security: Parameters for id_token_signed_response_alg, id_token_encrypted_response_alg/enc, userinfo_signed_response_alg, and userinfo_encrypted_response_alg to control signing/encryption requirements (default signing alg RS256; default enc example A128CBC-HS256 where applicable).
- Validation & String Operations: Rules for exact matching of redirect URIs and string comparisons per RFCs; normalization and validation guidance.
- Security Considerations: Addresses impersonation risks, native app leakage, and TLS requirements. Also covers implementation considerations including stateless dynamic registration patterns.
- IANA Considerations & Registries: Metadata and token authentication registries for extensibility.
Practical Applications and Who Should Use It
- Identity and access management architects designing OpenID Connect Providers (OPs).
- Application developers and SSO integrators implementing dynamic onboarding of Relying Parties (web, mobile, native).
- Security engineers who must enforce token protection, TLS, and key rotation policies.
- Platform operators automating client provisioning and lifecycle management to improve scalability and reduce manual configuration.
- Vendors building identity servers, OAuth/OIDC middleware, and interoperability/test harnesses.
Related Standards (for implementation)
- OAuth 2.0 (RFC 6749)
- OpenID Connect Core 1.0 and Discovery 1.0
- JSON Web Key (JWK), JSON Web Signature (JWS), JSON Web Encryption (JWE), JWT, JWA
- RFCs referenced for URI and JSON handling (e.g., RFC3986, RFC8259)
Keywords: ISO/IEC 26133:2024, OpenID Connect dynamic client registration, OAuth 2.0 client registration, client metadata, jwks_uri, registration access token, sector_identifier_uri.
Frequently Asked Questions
ISO/IEC 26133:2024 is a standard published by the International Organization for Standardization (ISO). Its full title is "Information technology - OpenID connect - OpenID connect dynamic client registration 1.0 incorporating errata set 2". This standard covers: OpenID Connect 1.0 is a simple identity layer on top of the OAuth 2.0 protocol. It enables Clients to verify the identity of the End-User based on the authentication performed by an Authorization Server, as well as to obtain basic profile information about the End-User in an interoperable and REST-like manner. This document defines how an OpenID Connect Relying Party can dynamically register with the End-User's OpenID Provider, providing information about itself to the OpenID Provider, and obtaining information needed to use it, including the OAuth 2.0 Client ID for this Relying Party.
OpenID Connect 1.0 is a simple identity layer on top of the OAuth 2.0 protocol. It enables Clients to verify the identity of the End-User based on the authentication performed by an Authorization Server, as well as to obtain basic profile information about the End-User in an interoperable and REST-like manner. This document defines how an OpenID Connect Relying Party can dynamically register with the End-User's OpenID Provider, providing information about itself to the OpenID Provider, and obtaining information needed to use it, including the OAuth 2.0 Client ID for this Relying Party.
ISO/IEC 26133:2024 is classified under the following ICS (International Classification for Standards) categories: 35.030 - IT Security. The ICS classification helps identify the subject area and facilitates finding related standards.
You can purchase ISO/IEC 26133:2024 directly from iTeh Standards. The document is available in PDF format and is delivered instantly after payment. Add the standard to your cart and complete the secure checkout process. iTeh Standards is an authorized distributor of ISO standards.
Standards Content (Sample)
International
Standard
ISO/IEC 26133
First edition
Information technology — OpenID
2024-10
connect — OpenID connect dynamic
client registration 1.0 incorporating
errata set 2
Reference number
© ISO/IEC 2024
All rights reserved. Unless otherwise specified, or required in the context of its implementation, no part of this publication may
be reproduced or utilized otherwise in any form or by any means, electronic or mechanical, including photocopying, or posting on
the internet or an intranet, without prior written permission. Permission can be requested from either ISO at the address below
or ISO’s member body in the country of the requester.
ISO copyright office
CP 401 • Ch. de Blandonnet 8
CH-1214 Vernier, Geneva
Phone: +41 22 749 01 11
Email: copyright@iso.org
Website: www.iso.org
Published in Switzerland
© ISO/IEC 2024 – All rights reserved
ii
Foreword
ISO (the International Organization for Standardization) and IEC (the International Electrotechnical
Commission) form the specialized system for worldwide standardization. National bodies that are
members of ISO or IEC participate in the development of International Standards through technical
committees established by the respective organization to deal with particular fields of technical activity.
ISO and IEC technical committees collaborate in fields of mutual interest. Other international
organizations, governmental and non-governmental, in liaison with ISO and IEC, also take part in the
work.
The procedures used to develop this document and those intended for its further maintenance
are described in the ISO/IEC Directives, Part 1. In particular, the different approval criteria needed
for the different types of document should be noted (see www.iso.org/directives or
www.iec.ch/members_experts/refdocs).
ISO and IEC draw attention to the possibility that the implementation of this document may involve the
use of (a) patent(s). ISO and IEC take no position concerning the evidence, validity or applicability of any
claimed patent rights in respect thereof. As of the date of publication of this document, ISO and IEC had
not received notice of (a) patent(s) which may be required to implement this document. However,
implementers are cautioned that this may not represent the latest information, which may be obtained
from the patent database available at www.iso.org/patents and https://patents.iec.ch. ISO and IEC shall
not be held responsible for identifying any or all such patent rights.
Any trade name used in this document is information given for the convenience of users and does not
constitute an endorsement.
For an explanation of the voluntary nature of standards, the meaning of ISO specific terms and
expressions related to conformity assessment, as well as information about ISO's adherence to the
World Trade Organization (WTO) principles in the Technical Barriers to Trade (TBT), see
www.iso.org/iso/foreword.html. In the IEC, see www.iec.ch/understanding-standards.
This document was prepared by the OpenID Foundation (OIDF) (as OpenID Connect Dynamic Client
Registration 1.0 incorporating errata set 2) and drafted in accordance with its editorial rules. It was
adopted, under the JTC 1 PAS procedure, by Joint Technical Committee ISO/IEC JTC 1, Information
technology.
Any feedback or questions on this document should be directed to the user’s national standards body. A
complete listing of these bodies can be found at www.iso.org/members.html and www.iec.ch/national-
committees.
© ISO/IEC 2024 – All rights reserved
iii
Abstract
OpenID Connect 1.0 is a simple identity layer on top of the OAuth 2.0
protocol. It enables Clients to verify the identity of the End-User based
on the authentication performed by an Authorization Server, as well as
to obtain basic profile information about the End-User in an
interoperable and REST-like manner.
This specification defines how an OpenID Connect Relying Party can
dynamically register with the End-User's OpenID Provider, providing
information about itself to the OpenID Provider, and obtaining
information needed to use it, including the OAuth 2.0 Client ID for this
Relying Party.
© ISO/IEC 2024 – All rights reserved
iv
Table of Contents
1. Introduction
1.1. Requirements Notation and Conventions
1.2. Terminology
2. Client Metadata
2.1. Metadata Languages and Scripts
3. Client Registration Endpoint
3.1. Client Registration Request
3.2. Client Registration Response
3.3. Client Registration Error Response
4. Client Configuration Endpoint
4.1. Forming the Client Configuration Endpoint URL
4.2. Client Read Request
4.3. Client Read Response
4.4. Client Read Error Response
5. "sector_identifier_uri" Validation
6. String Operations
7. Validation
8. Implementation Considerations
8.1. Compatibility Notes
8.2. Implementation Notes on Stateless Dynamic
Client Registration
9. Security Considerations
9.1. Impersonation
9.2. Native Code Leakage
9.3. TLS Requirements
10. IANA Considerations
10.1. OAuth Dynamic Client Registration Metadata
Registration
10.1.1. Registry Contents
10.2. OAuth Token Endpoint Authentication Methods
Registration
10.2.1. Registry Contents
11. References
11.1. Normative References
11.2. Informative References
© ISO/IEC 2024 – All rights reserved
v
Information technology — OpenID Connect — OpenID
Connect Dynamic Client Registration 1.0 incorporating
errata set 2
TOC
1. Introduction
OpenID Connect 1.0 is a simple identity layer on top of the OAuth 2.0
[RFC6749] protocol. It enables Clients to verify the identity of the End-
User based on the authentication performed by an Authorization Server,
as well as to obtain basic profile information about the End-User in an
interoperable and REST-like manner.
In order for an OpenID Connect Relying Party to utilize OpenID Connect
services for an End-User, the RP needs to register with the OpenID
Provider to provide the OP information about itself and to obtain
information needed to use it, including an OAuth 2.0 Client ID. This
specification describes how an RP can register with an OP, and how
registration information for the RP can be retrieved.
The previous versions of this specification are:
• OpenID Connect Registration 1.0 incorporating errata set
1 [OpenID.Registration.Errata1]
• OpenID Connect Registration 1.0 (final)
[OpenID.Registration.Final]
TOC
1.1. Requirements Notation and Conventions
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT
RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be
interpreted as described in RFC 2119 [RFC2119].
In the .txt version of this specification, values are quoted to indicate
that they are to be taken literally. When using these values in protocol
messages, the quotes MUST NOT be used as part of the value. In the
HTML version of this specification, values to be taken literally are
indicated by the use of this fixed-width font.
© ISO/IEC 2024 – All rights reserved
All uses of JSON Web Signature (JWS) [JWS] and JSON Web Encryption
(JWE) [JWE] data structures in this specification utilize the JWS
Compact Serialization or the JWE Compact Serialization; the JWS JSON
Serialization and the JWE JSON Serialization are not used.
TOC
1.2. Terminology
This specification uses the terms "Access Token", "Authorization Code",
"Authorization Endpoint", "Authorization Server", "Client", "Client
Authentication", "Client Identifier", "Client Secret", "Grant Type",
"Protected Resource", "Redirection URI", "Refresh Token", "Response
Type", and "Token Endpoint" defined by OAuth 2.0 [RFC6749], the
terms "JSON Web Token (JWT)" and "Nested JWT" defined by JSON
Web Token (JWT) [JWT], the term "Base64url Encoding" defined by
JSON Web Signature (JWS) [JWS], and the terms defined by OpenID
Connect Core 1.0 [OpenID.Core].
This specification defines the following additional terms:
Client Registration Endpoint
OAuth 2.0 Protected Resource through which a Client can be
registered at an Authorization Server.
Client Configuration Endpoint
OAuth 2.0 Endpoint through which registration information
for a registered Client can be managed. This URL for this
endpoint is returned by the Authorization Server in the Client
Information Response.
Registration Access Token
OAuth 2.0 Bearer Token issued by the Authorization Server
through the Client Registration Endpoint that is used to
authenticate the caller when accessing the Client's
registration information at the Client Configuration
Endpoint. This Access Token is associated with a particular
registered Client.
Initial Access Token
OAuth 2.0 Access Token optionally issued by an
Authorization Server granting access to its Client
Registration Endpoint. The contents of this token are service
specific and are out of scope for this specification. The
means by which the Authorization Server issues this token
© ISO/IEC 2024 – All rights reserved
and the means by which the Registration Endpoint validates
it are also out of scope.
IMPORTANT NOTE TO READERS: The terminology definitions in this
section are a normative portion of this specification, imposing
requirements upon implementations. All the capitalized words in the
text of this specification, such as "Client Registration Endpoint",
reference these defined terms. Whenever the reader encounters them,
their definitions found in this section must be followed.
TOC
2. Client Metadata
Clients have metadata associated with their unique Client Identifier at
the Authorization Server. These can range from human-facing display
strings, such as a Client name, to items that impact the security of the
protocol, such as the list of valid redirect URIs.
The Client Metadata values are used in two ways:
• as input values to registration requests, and
• as output values in registration responses and read
responses.
These Client Metadata values are used by OpenID Connect:
redirect_uris
REQUIRED. Array of Redirection URI values used by the
Client. One of these registered Redirection URI values MUST
exactly match the redirect_uri parameter value used in
each Authorization Request, with the matching performed as
(Simple String
described in Section 6.2.1 of [RFC3986]
Comparison).
response_types
OPTIONAL. JSON [RFC8259] array containing a list of the
OAuth 2.0 response_type values that the Client is
declaring that it will restrict itself to using. If omitted, the
default is that the Client will use only the code Response
Type.
© ISO/IEC 2024 – All rights reserved
grant_types
OPTIONAL. JSON array containing a list of the OAuth 2.0
Grant Types that the Client is declaring that it will restrict
itself to using. The Grant Type values used by OpenID
Connect are:
• authorization_code: The
Authorization Code Grant Type
described in OAuth 2.0 Section 4.1.
• implicit: The Implicit Grant Type
described in OAuth 2.0 Section 4.2.
• refresh_token: The Refresh Token
Grant Type described in OAuth 2.0
Section 6.
The following table lists the correspondence between
response_type values that the Client will use and
grant_type values that MUST be included in the registered
grant_types list:
• code: authorization_code
• id_token: implicit
• id_token token: implicit
• code id_token:
authorization_code, implicit
• code token:
authorization_code, implicit
• code id_token token:
authorization_code, implicit
If omitted, the default is that the Client will use only the
authorization_code Grant Type.
application_type
OPTIONAL. Kind of the application. The default, if omitted,
is web. The defined values are native or web. Web Clients
using the OAuth Implicit Grant Type MUST only register
URLs using the https scheme as redirect_uris; they
MUST NOT use localhost as the hostname. Native Clients
MUST only register redirect_uris using custom URI
schemes or loopback URLs using the http scheme; loopback
URLs use localhost or the IP loopback literals 127.0.0.1
or [::1] as the hostname. Authorization Servers MAY place
additional constraints on Native Clients. Authorization
Servers MAY reject Redirection URI values using the http
© ISO/IEC 2024 – All rights reserved
scheme, other than the loopback case for Native Clients. The
Authorization Server MUST verify that all the registered
redirect_uris conform to these constraints. This
prevents sharing a Client ID across different types of Clients.
contacts
OPTIONAL. Array of e-mail addresses of people responsible
for this Client. This might be used by some providers to
enable a Web user interface to modify the Client information.
client_name
OPTIONAL. Name of the Client to be presented to the End-
User. If desired, representation of this Claim in different
languages and scripts is represented as described in
Section 2.1.
logo_uri
OPTIONAL. URL that references a logo for the Client
application. If present, the server SHOULD display this
image to the End-User during approval. The value of this
field MUST point to a valid image file. If desired,
representation of this Claim in different languages and
scripts is represented as described in Section 2.1.
client_uri
OPTIONAL. URL of the home page of the Client. The value of
this field MUST point to a valid Web page. If present, the
server SHOULD display this URL to the End-User in a
followable fashion. If desired, representation of this Claim in
different languages and scripts is represented as described
in Section 2.1.
policy_uri
OPTIONAL. URL that the Relying Party Client provides to the
End-User to read about how the profile data will be used.
The value of this field MUST point to a valid web page. The
OpenID Provider SHOULD display this URL to the End-User
if it is given. If desired, representation of this Claim in
different languages and scripts is represented as described
in Section 2.1.
tos_uri
OPTIONAL. URL that the Relying Party Client provides to the
End-User to read about the Relying Party's terms of service.
The value of this field MUST point to a valid web page. The
OpenID Provider SHOULD display this URL to the End-User
if it is given. If desired, representation of this Claim in
© ISO/IEC 2024 – All rights reserved
different languages and scripts is represented as described
in Section 2.1.
jwks_uri
OPTIONAL. URL for the Client's JWK Set [JWK] document,
which MUST use the https scheme. If the Client signs
requests to the Server, it contains the signing key(s) the
Server uses to validate signatures from the Client. The JWK
Set MAY also contain the Client's encryption keys(s), which
are used by the Server to encrypt responses to the Client.
When both signing and encryption keys are made available,
a use (public key use) parameter value is REQUIRED for all
keys in the referenced JWK Set to indicate each key's
intended usage. Although some algorithms allow the same
key to be used for both signatures and encryption, doing so
is NOT RECOMMENDED, as it is less secure. The JWK x5c
parameter MAY be used to provide X.509 representations of
keys provided. When used, the bare key values MUST still
be present and MUST match those in the certificate. The JWK
Set MUST NOT contain private or symmetric key values.
jwks
OPTIONAL. Client's JWK Set [JWK] document, passed by
value. The semantics of the jwks parameter are the same
as the jwks_uri parameter, other than that the JWK Set is
passed by value, rather than by reference. This parameter
is intended only to be used by Clients that, for some reason,
are unable to use the jwks_uri parameter, for instance, by
native applications that might not have a location to host the
contents of the JWK Set. If a Client can use jwks_uri, it
MUST NOT use jwks. One significant downside of jwks is
that it does not enable key rotation (which jwks_uri does,
as described in Section 10 of OpenID Connect Core 1.0
[OpenID.Core]). The jwks_uri and jwks parameters MUST
NOT be used together. The JWK Set MUST NOT contain
private or symmetric key values.
sector_identifier_uri
OPTIONAL. URL using the https scheme to be used in
calculating Pseudonymous Identifiers by the OP. The URL
references a file with a single JSON array of redirect_uri
values. Please see Section 5. Providers that use pairwise
sub (subject) values SHOULD utilize the
sector_identifier_uri value provided in the Subject
Identifier calculation for pairwise identifiers.
© ISO/IEC 2024 – All rights reserved
subject_type
OPTIONAL. subject_type requested for responses to this
Client. The subject_types_supported discovery
parameter contains a list of the supported subject_type
values for the OP. Valid types include pairwise and
public.
id_token_signed_response_alg
OPTIONAL. JWS alg algorithm [JWA] REQUIRED for signing
the ID Token issued to this Client. The value none MUST
alg value unless the Client
NOT be used as the ID Token
uses only Response Types that return no ID Token from the
Authorization Endpoint (such as when only using the
Authorization Code Flow). The default, if omitted, is RS256.
The public key for validating the signature is provided by
retrieving the JWK Set referenced by the jwks_uri element
from OpenID Connect Discovery 1.0 [OpenID.Discovery].
id_token_encrypted_response_alg
OPTIONAL. JWE alg algorithm [JWA] REQUIRED for
encrypting the ID Token issued to this Client. If this is
requested, the response will be signed then encrypted, with
the result being a Nested JWT, as defined in [JWT]. The
default, if omitted, is that no encryption is performed.
id_token_encrypted_response_enc
OPTIONAL. JWE enc algorithm [JWA] REQUIRED for
encrypting the ID Token issued to this Client. If
id_token_encrypted_response_alg is specified, the
default id_token_encrypted_response_enc value is
A128CBC-HS256. When
id_token_encrypted_response_enc is included,
id_token_encrypted_response_alg MUST also be
provided.
userinfo_signed_response_alg
OPTIONAL. JWS alg algorithm [JWA] REQUIRED for signing
UserInfo Responses. If this is specified, the response will be
JWT [JWT] serialized, and signed using JWS. The default, if
omitted, is for the UserInfo Response to return the Claims
as a UTF-8 [RFC3629] encoded JSON object using the
application/json content-type.
© ISO/IEC 2024 – All rights reserved
userinfo_encrypted_response_alg
OPTIONAL. JWE [JWE] alg algorithm [JWA] REQUIRED for
encrypting UserInfo Responses. If both signing and
encryption are requested, the response will be signed then
encrypted, with the result being a Nested JWT, as defined in
[JWT]. The default, if omitted, is that no encryption is
performed.
userinfo_encrypted_response_enc
OPTIONAL. JWE enc algorithm [JWA] REQUIRED for
encrypting UserInfo Responses. If
userinfo_encrypted_response_alg is specified, the
default userinfo_encrypted_response_enc value is
A128CBC-HS256. When
userinfo_encrypted_response_enc is included,
userinfo_encrypted_response_alg MUST also be
provided.
request_object_signing_alg
OPTIONAL. JWS [JWS] alg algorithm [JWA] that MUST be
used for signing Request Objects sent to the OP. All Request
Objects from this Client MUST be rejected, if not signed with
this algorithm. Request Objects are described in Section 6.1
of OpenID Connect Core 1.0 [OpenID.Core]. This algorithm
MUST be used both when the Request Object is passed by
value (using the request parameter) and when it is passed
by reference (using the request_uri parameter). Servers
SHOULD support RS256. The value none MAY be used. The
default, if omitted, is that any algorithm supported by the
OP and the RP MAY be used.
request_object_encryption_alg
OPTIONAL. JWE [JWE] alg algorithm [JWA] the RP is
declaring that it may use for encrypting Request Objects
sent to the OP. This parameter SHOULD be included when
symmetric encryption will be used, since this signals to the
OP that a client_secret value needs to be returned from
which the symmetric key will be derived, that might not
otherwise be returned. The RP MAY still use other supported
encryption algorithms or send unencrypted Request Objects,
even when this parameter is present. If both signing and
encryption are requested, the Request Object will be signed
then encrypted, with the result being a Nested JWT, as
defined in [JWT]. The default, if omitted, is that the RP is
not declaring whether it might encrypt any Request Objects.
© ISO/IEC 2024 – All rights reserved
request_object_encryption_enc
OPTIONAL. JWE enc algorithm [JWA] the RP is declaring that
it may use for encrypting Request Objects sent to the OP. If
request_object_encryption_alg is specified, the
default request_object_encryption_enc value is
A128CBC-HS256. When
request_object_encryption_enc is included,
request_object_encryption_alg MUST also be
provided.
token_endpoint_auth_method
OPTIONAL. Requested Client Authentication method for the
Token Endpoint. The options are client_secret_post,
client_secret_basic, client_secret_jwt,
private_key_jwt, and none, as described in Section 9 of
OpenID Connect Core 1.0 [OpenID.Core]. Other
authentication methods MAY be defined by extensions. If
omitted, the default is client_secret_basic -- the HTTP
Basic Authentication Scheme specified in Section 2.3.1 of
OAuth 2.0 [RFC6749].
token_endpoint_auth_signing_alg
OPTIONAL. JWS [JWS] alg algorithm [JWA] that MUST be
used for signing the JWT [JWT] used to authenticate the
Client at the Token Endpoint for the private_key_jwt and
client_secret_jwt authentication methods. All Token
Requests using these authentication methods from this
Client MUST be rejected, if the JWT is not signed with this
algorithm. Servers SHOULD support RS256. The value none
MUST NOT be used. The default, if omitted, is that any
algorithm supported by the OP and the RP MAY be used.
default_max_age
OPTIONAL. Default Maximum Authentication Age. Specifies
that the End-User MUST be actively authenticated if the End-
User was authenticated longer ago than the specified
number of seconds. The max_age request parameter
overrides this default value. If omitted, no default Maximum
Authentication Age is specified.
require_auth_time
OPTIONAL. Boolean value specifying whether the
auth_time Claim in the ID Token is REQUIRED. It is
REQUIRED when the value is true. (If this is false, the
auth_time Claim can still be dynamically requested as an
individual Claim for the ID Token using the claims request
© ISO/IEC 2024 – All rights reserved
parameter described in Section 5.5.1 of OpenID Connect
Core 1.0 [OpenID.Core].) If omitted, the default value is
false.
default_acr_values
OPTIONAL. Default requested Authentication Context Class
Reference values. Array of strings that specifies the default
acr values that the OP is being requested to use for
processing requests from this Client, with the values
appearing in order of preference. The Authentication
Context Class satisfied by the authentication performed is
returned as the acr Claim Value in the issued ID Token. The
acr Claim is requested as a Voluntary Claim by this
parameter. The acr_values_supported discovery
element contains a list of the supported acr values
supported by the OP. Values specified in the acr_values
request parameter or an individual acr Claim request
override these default values.
initiate_login_uri
OPTIONAL. URI using the https scheme that a third party
can use to initiate a login by the RP, as specified in Section
4 of OpenID Connect Core 1.0 [OpenID.Core]. The URI
MUST accept requests via both GET and POST. The Client
MUST understand the login_hint and iss parameters and
SHOULD support the target_link_uri parameter.
request_uris
OPTIONAL. Array of request_uri values that are pre-
registered by the RP for use at the OP. These URLs MUST
use the https scheme unless the target Request Object is
signed in a way that is verifiable by the OP. Servers MAY
cache the contents of the files referenced by these URIs and
not retrieve them at the time they are used in a request.
OPs can require that request_uri values used be pre-
registered with the
require_request_uri_registration discovery
parameter.
If the contents of the request file could ever change, these
URI values SHOULD include the base64url-encoded SHA-
256 hash value of the file contents referenced by the URI as
the value of the URI fragment. If the fragment value used
for a URI changes, that signals the server that its cached
value for that URI with the old fragment value is no longer
valid.
© ISO/IEC 2024 – All rights reserved
Additional Client Metadata parameters MAY also be used. Some are
defined by other specifications, such as OpenID Connect RP-Initiated
Logout 1.0 [OpenID.RPInitiated].
TOC
2.1. Metadata Languages and Scripts
Human-readable Client Metadata values and Client Metadata values that
reference human-readable values MAY be represented in multiple
languages and scripts. For example, values such as client_name,
tos_uri, policy_uri, logo_uri, and client_uri might have multiple
locale-specific values in some Client registrations.
To specify the languages and scripts, BCP47 [RFC5646] language tags
are added to Client Metadata member names, delimited by a #
character. The same syntax is used for representing languages and
scripts for Client Metadata as is used for Claims, as described in Section
5.2 (Claims Languages and Scripts) of OpenID Connect Core 1.0
[OpenID.Core].
If such a human-readable field is sent without a language tag, parties
using it MUST NOT make any assumptions about the language,
character set, or script of the string value, and the string value MUST be
used as-is wherever it is presented in a user interface. To facilitate
interoperability, it is RECOMMENDED that any human-readable fields
sent without language tags contain values suitable for display on a wide
variety of systems.
TOC
3. Client Registration Endpoint
The Client Registration Endpoint is an OAuth 2.0 Protected Resource
through which a new Client registration can be requested. The OpenID
Provider MAY require an Initial Access Token that is provisioned out-of-
band (in a manner that is out of scope for this specification) to restrict
registration requests to only authorized Clients or developers. The Client
Registration Endpoint SHOULD support the use of Cross-Origin Resource
Sharing (CORS) [CORS] and/or other methods as appropriate to enable
JavaScript Clients and other Browser-Based Clients to access it.
© ISO/IEC 2024 – All rights reserved
To support open Dynamic Registration, the Client Registration Endpoint
SHOULD accept registration requests without OAuth 2.0 Access Tokens.
These requests MAY be rate-limited or otherwise limited to prevent a
denial-of-service attack on the Client Registration Endpoint. If an Initial
Access Token is required for Client registration, the Client Registration
Endpoint MUST be able to accept these Access Tokens in the manner
described in the OAuth 2.0 Bearer Token Usage [RFC6750]
specification.
TOC
3.1. Client Registration Request
To register a new Client at the Authorization Server, the Client sends an
HTTP POST message to the Client Registration Endpoint with any Client
Metadata parameters that the Client chooses to specify for itself during
the registration. The Authorization Server assigns this Client a unique
Client Identifier, optionally assigns a Client Secret, and associates the
Metadata given in the request with the issued Client Identifier. The
Authorization Server MAY provision default values for any items omitted
in the Client Metadata.
The Client sends an HTTP POST to the Client Registration Endpoint with
a content type of application/json with the parameters represented
as top-level members of the root JSON object.
The following is a non-normative example registration request (with line
wraps within values for display purposes only):
POST /connect/register HTTP/1.1
Content-Type: application/json
Accept: application/json
Host: server.example.com
Authorization: Bearer eyJhbGciOiJSUzI1NiJ9.eyJ .
{
"application_type": "web",
"redirect_uris":
["https://client.example.org/callback",
"https://client.example.org/callback2"],
"client_name": "My Example",
"client_name#ja-Jpan-JP":
"ククククククク",
"logo_uri": "https://client.example.org/logo.png",
"subject_type": "pairwise",
"sector_identifier_uri":
© ISO/IEC 2024 – All rights reserved
"https://other.example.net/file_of_redirect_uris.json",
"token_endpoint_auth_method": "client_secret_basic",
"jwks_uri":
"https://client.example.org/my_public_keys.jwks",
"userinfo_encrypted_response_alg": "RSA-OAEP-256",
"userinfo_encrypted_response_enc": "A128CBC-HS256",
"contacts": ["ve7jtb@example.org",
"mary@example.org"],
"request_uris":
["https://client.example.org/rf.txt
#qpXaRLh_n93TTR9F252ValdatUQvQiJi5BDub2BeznA"]
}
TOC
3.2. Client Registration Response
Upon successful registration, the Client Registration Endpoint returns
the newly created Client Identifier and, if applicable, a Client Secret,
along with all registered Metadata about this Client, including any fields
provisioned by the Authorization Server itself. The Authorization Server
MAY reject or replace any of the Client's requested field values, other
than the redirect_uris value, and substitute them with suitable
values. If this happens, the Authorization Server MUST include these
fields in the response to the Client. An Authorization Server MAY ignore
values provided by the client and MUST ignore any fields sent by the
Client that it does not understand.
The response MAY contain a Registration Access Token that can be used
by the Client to perform subsequent operations upon the
...
The ISO/IEC 26133:2024 standard provides a comprehensive framework for implementing OpenID Connect Dynamic Client Registration, which is crucial in today’s information technology landscape. This standard delineates the procedures and protocols necessary for a Relying Party (RP) to dynamically register with an End-User's OpenID Provider, thereby facilitating secure and efficient identity management. One of the primary strengths of this standard lies in its clear definitions and guidelines, which enable seamless interaction between clients and authorization servers. By establishing protocols based on the OAuth 2.0 framework, ISO/IEC 26133:2024 enhances interoperability and supports REST-like interactions, which are pivotal in modern web applications. This focus on interoperability is particularly beneficial for organizations as it simplifies integration processes and ensures compatibility across different systems. The relevance of this document extends beyond mere compliance; it addresses the growing need for secure identity verification in various applications, from web services to mobile applications. By ensuring that clients can verify the identity of End-Users efficiently, the standard plays a significant role in enhancing user trust and confidence in digital transactions. ISO/IEC 26133:2024 is also designed to adapt to the evolving needs of the technology landscape by incorporating errata set 2, which demonstrates the standard's commitment to continuous improvement and adaptation. This feature is essential for organizations seeking to implement the most up-to-date practices in client registration and identity management. In summary, the ISO/IEC 26133:2024 standard stands out due to its robust framework that facilitates the dynamic registration of clients with OpenID Providers. Its emphasis on interoperability, user verification, and adaptability solidifies its position as a key resource for organizations leveraging OpenID Connect in securing digital identities.
La norme ISO/IEC 26133:2024, intitulée "Technologies de l'information - OpenID connect - Enregistrement dynamique de client OpenID connect 1.0 intégrant les errata set 2", présente un cadre standardisé pour la gestion de l'identité dans le contexte des technologies modernes. Ce document clarifie et standardise la manière dont un Parti de confiance OpenID Connect peut s'inscrire dynamiquement auprès du Fournisseur d'OpenID de l'Utilisateur final, renforçant ainsi l'interopérabilité dans l'écosystème numérique. Le champ d'application de cette norme est particulièrement pertinent dans l'ère numérique actuelle où l'authentification et la gestion des identités sont essentielles pour la sécurité des utilisateurs. L'intégration d'OpenID Connect avec le protocole OAuth 2.0 permet aux clients de confirmer l'identité de l'utilisateur final, tout en accédant à des informations de profil basiques de manière RESTful. Cette approche simplifie le processus d'authentification et améliore l'expérience utilisateur, tout en respectant les exigences de sécurité. Parmi ses points forts, cette norme offre une méthode définie pour le partage d'informations entre le client et le fournisseur d'identité, ce qui réduit considérablement les risques d'erreur et facilite la mise en œuvre. En fournissant des directives claires concernant l'inscription dynamique, la norme permet une intégration rapide et efficace dans diverses applications, promouvant une adoption plus large d'OpenID Connect dans divers secteurs d'activité. La norme ISO/IEC 26133:2024 est non seulement conforme aux attentes actuelles en matière d'authentification sécurisée, mais elle anticipe également les besoins futurs des entreprises qui cherchent à adopter des solutions de gestion d'identité robustes et évolutives. Par conséquent, elle est un référentiel incontournable pour toute organisation souhaitant utiliser OpenID Connect de manière efficace et sécurisée.
Die ISO/IEC 26133:2024 ist ein entscheidendes Dokument im Bereich der Informationstechnologie, das sich auf OpenID Connect konzentriert, insbesondere auf die dynamische Registrierung von Clients. Diese Norm ermöglicht es einer OpenID Connect-Relying Party, sich effizient und sicher bei dem OpenID-Provider des Endnutzers zu registrieren. Der Fokus auf die einfache Identitätsschicht über das OAuth 2.0-Protokoll hebt die Relevanz dieser Norm in der aktuellen digitalen Landschaft hervor, da sie eine standardisierte Methode zur Authentifizierung und zum Austausch von Profildaten bietet. Ein wesentlicher Vorteil dieser Norm ist ihre Interoperabilität, die es verschiedenen Systemen ermöglicht, nahtlos zusammenzuarbeiten. Durch die Definition klarer Prozesse und Anforderungen für die dynamische Client-Registrierung können Unternehmen sicherstellen, dass ihre Anwendungen sicher und vertrauenswürdig sind. Darüber hinaus fördert die Norm die Nutzung von REST-ähnlichen Schnittstellen, was die Integration und Entwicklung vereinheitlicht und beschleunigt. Die ISO/IEC 26133:2024 ist von hoher Bedeutung, da sie sowohl Entwicklern als auch Unternehmen hilft, Sicherheitsmaßnahmen zu implementieren, die auf anerkannten Standards basieren. In einer Zeit, in der Datenschutz und Benutzeridentität immer mehr in den Vordergrund rücken, bietet dieses Dokument ein unverzichtbares Rahmenwerk, um Vertrauenswürdigkeit und Sicherheit in der digitalen Interaktion zu gewährleisten. Die stärkere Fokussierung auf die Bedürfnisse der Endbenutzer und die Erleichterung der Client-Registrierung durch klare Vorgaben stärken die allgemeine Benutzererfahrung und tragen dazu bei, das Vertrauen in digitale Dienste zu erhöhen. Insgesamt hat die ISO/IEC 26133:2024 das Potenzial, als Leitfaden für die Implementierung von OpenID Connect in verschiedenen Anwendungen zu dienen und sichert somit einen wesentlichen Beitrag zur Weiterentwicklung sicherer Authentifizierungsmethoden im digitalen Raum.
ISO/IEC 26133:2024 표준은 OpenID Connect 1.0을 기반으로 하여 OAuth 2.0 프로토콜 위에 자리잡은 간단한 신원 확인 계층을 제공합니다. 이 표준은 클라이언트가 인증 서버에 의해 수행된 인증을 기반으로 최종 사용자의 신원을 검증하고, 상호 운용 가능하며 REST와 유사한 방식으로 최종 사용자에 대한 기본 프로필 정보를 획득할 수 있도록 합니다. ISO/IEC 26133:2024의 주요 강점은 OpenID Connect 의존당사자가 최종 사용자의 OpenID 제공자와 동적으로 등록하는 방법을 명확히 정의함으로써, 클라이언트가 OpenID 제공자에게 자신의 정보를 제공하고 이를 사용하기 위해 필요한 정보를 얻을 수 있도록 지원한다는 점입니다. 이러한 동적 클라이언트 등록 기능은 신원 확인 프로세스를 보다 유연하고 효과적으로 만들어, 사용자 경험을 크게 향상시키는 데 기여합니다. 또한, ISO/IEC 26133:2024는 폭넓은 호환성을 제공합니다. 다양한 애플리케이션 및 서비스 간에 일관된 인증 및 신원 확인 절차를 보장하여, 디지털 환경에서의 신뢰성을 높입니다. 이러한 점에서 이 표준은 정보 기술 분야에서의 중요성과 적절성을 갖추고 있으며, 특히 클라우드 기반 서비스와 모바일 애플리케이션에서의 활용 가능성이 큽니다. 결론적으로 ISO/IEC 26133:2024는 정보 기술 분야의 동적 클라이언트 등록 및 신원 확인을 위한 중요한 기준을 제공하며, 기업과 사용자 모두에게 실질적인 이점을 제공합니다.
ISO/IEC 26133:2024は、情報技術の分野におけるOpenID Connectのダイナミッククライアント登録に関する標準であり、特にOAuth 2.0プロトコルの上に構築されたシンプルなアイデンティティレイヤーを提供します。この標準の適用範囲は、エンドユーザーの認証を行うオーソリゼーションサーバーによって、クライアントがエンドユーザーの身元を確認できるようにすることに加え、エンドユーザーに関する基本的なプロフィール情報をインターロパブルかつRESTライクな方法で取得することです。 このドキュメントは、OpenID Connect Relying PartyがエンドユーザーのOpenIDプロバイダーにダイナミックに登録できる方法を定義しており、その際には自らの情報をOpenIDプロバイダーに提供し、同時に使用に必要な情報、つまりこのRelying PartyのためのOAuth 2.0クライアントIDを取得する手順が明確に示されています。 ISO/IEC 26133:2024の強みは、システムが互いに効果的に連携するための標準化されたメカニズムを提供する点にあります。特に、クライアントとエンドユーザー間の信頼性を確保するための手法が記述されており、これにより、安全かつ効率的なデジタルアイデンティティの管理が可能となります。また、異なるシステム間での相互運用性を高めることで、開発者にとっての導入障壁を低くし、さまざまなサービスとの統合を容易にしています。 この標準は、現代のネットワーク環境におけるセキュリティニーズに応じて設計されており、その結果、ユーザーのプライバシーを保護するだけでなく、企業や開発者にとっても価値のある指針を提供しています。今後のデジタルサービスの普及を支えるために、ISO/IEC 26133:2024は極めて重要であり、情報技術分野での信頼性のあるアイデンティティ管理に寄与するといえるでしょう。










Questions, Comments and Discussion
Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.
Loading comments...