ECA Standard - RC1
- 1 Version control
- 2 Introduction
- 3 API Specification
- 4 Customer Experience Guidelines (CEGs)
- 4.1 Example 1: Age verification
- 4.1.1 View prototype
- 4.2 Example 2: Onboarding for a service
- 4.2.1 View prototype
- 4.3 Example 3: Secure login via QR code
- 4.3.1 View prototype
- 4.4 Example 4: Persistent login
- 4.4.1 View prototype
- 4.5 Example 5: Account sign-up with AIS
- 4.5.1 View prototype
- 4.6 Example 6: eCommerce checkout with PIS
- 4.6.1 View prototype
- 4.1 Example 1: Age verification
- 5 Implementation considerations/risks
- 6 Appendix 1: ECA Intellectual Property Rights Policy
Version control
This is a draft standard published by OBIE. This standard is subject to change at any time and is optional for implementation by any firm who choses to use it.
Version | Date | Author(s) | Comments |
|---|---|---|---|
DRAFT 0.1 | Feb 15, 2021 | OBIE Standards Team | Initial draft for review by ECA Working Group |
DRAFT 0.2 | Feb 17, 2021 | OBIE Standards Team | Version for formal consultation |
DRAFT 0.3 | Mar 10, 2021 | OBIE Standards Team | Including updates from consultation for approval by ECA Working Group |
RC1 | May 6, 2021 | OBIE Standards Team | DRAFT 0.3 Approved by ECA Working Group and uplifted to Release Candidate 1 (RC1) |
DRAFT 1.0 | TBC | OBIE Standards Team | Approved by ECA Working Group and ready for submission to OBIE and other standards bodies |
Introduction
Background
The aim of this work is to design an open Extended Customer Attribute (ECA) Standard to support the sharing additional customer data, which is not required under PSD2 nor the CMA Order, and which can be surfaced by ASPSPs and provided to relying parties on a commercial basis. This data can be used for a number of identity verification use cases and is of particular relevance to the UK government’s work (in particular the proposed trust framework for digital identity) as well as the OpenID Foundation’s eKYC & Identity Assurance work.
It has been agreed that a common, open ECA Standard such as that already developed by OBIE would be beneficial to support a number of use cases, providing clarity around the data elements, presentation of consent to the customer, and provision of this data to relying parties. The ECA Standard is modelled on the principles used the within the PSD2 customer journeys for TPPs, for example, gathering of consent and authentication at the ASPSP. The prototype journeys provided within this standard are designed to reflect ECA example journeys, some of which may sit outside the PSD2 framework. Certain journeys may demonstrate a combination of PSD2 and ECA data sharing in which case certain PSD2 principles will directly apply. Design of the standard needs to be inclusive and OBIE will ensure a wide range of participation in developing the ECA Standard so that it reflects views of both providing (ASPSPs) and relying parties (other entities and/or TPPs).
This ECA Standard is being developed on behalf of seven contributing members (the 6 largest UK ASPSPs plus TSB Bank). The scope will be limited to producing a standard based on extending the latest OBIE Standard (https://standards.openbanking.org.uk/) to meet the set of use cases as defined below.
This work is not covered by the activity defined by the CMA’s Revised Roadmap but is an area of interest to many participants and it is hoped that extending the OBIE Standard to cover such data will allow the ecosystem to continue to innovate and flourish.
Key design principles
A number of key design principles were agreed for the development of the ECA Standard, namely:
Developed as an initial draft to enable any participating firms to launch MVP or pilot activity.
Aligned to the emerging UK Government Trust Framework model, albeit not necessarily initially constrained by this (as it still being drafted).
Published under the MIT Open Licence to ensure it is free from IPR claims so that it can be submitted to other standard bodies without issue.
Will be submitted to OBIE for inclusion (as an optional/premium API) into the OBIE Standard.
Out of scope of the CMA Order, thus OBIE will not mandate implementation for the CMA9 (or any other firms).
Must be aligned to (i.e. not conflict nor contradict) PSD2/RTS, CMA Order, GDPR or any other relevant regulation.
Should not re-invent the wheel, so should re-use rather than replicate other relevant standards wherever possible.
Will generate value for people and small businesses and be designed to avoid harm.
The initial ECA Standard will thus focus on a set of (relatively) simple extensions to the current OBIE Standard and Trust Framework as follows:
Be based on the current OBIE API interaction flows and FAPI security profile.
Make use of the existing OBIE Directory, so that the APIs can be accessed by existing authorised TPPs, without the need for OBIE (or any other body) to create nor validate additional roles or scopes (e.g. Digital Identity Service Providers). Albeit this should not necessarily restrict access by other firms under contract with an ASPSP.
Initially focus on the provision (not consumption) of additional data (beyond CMA Order/PSD2 data) by ASPSPs.
However, this should be extensible (e.g. in a future version) to enable:
data consumption by ASPSPs and potentially both provision and consumption by other data holders; and
use cases which require access to data from multiple sources (e.g. bank accounts and government services).
Cover both personal and business accounts, in particular considering data attributes which relate to both:
the authenticating user; and
the owner(s) of the account.
but perhaps leaving more complex multi-user accounts out of scope for now.
Use cases
The initial use cases have been prioritised based on the following considerations:
Do-ability: should be (relatively) easy for ASPSPs to build.
Market readiness: should meet one or more high priority, high value and/or high volume market needs.
Commercial value: should thus provide ASPSPs a strong commercial benefit (either directly or indirectly) which aligns to their commercial strategy/objectives.
Value for end users: use cases which help drive better outcomes and/or generate value for end (personal and business) users and/or bring broader societal benefits.
The following high level use cases have been identified as in scope for the initial ECA Standard:
ID | Use Case | Notes |
|---|---|---|
1 | Onboarding | Provision of one or more data attributes which can be shared with a relying party (e.g. a utility company) to facilitate account opening with that party. |
2 | Ongoing validation or data sharing | Provision of long lived consent to the relying party for either basic attribute validation and/or data sharing. |
3 | E-commerce | Provision of validation and/or data attributes specifically in the context of ecommerce, to include ‘PISP plus' and Gift Aid examples. |
4 | Authentication as a service | e.g. Register/Login with BankID |
5 | Attribute verification | No data provided back, rather a binary Y/N verification by ASPSP of data provided by relying party (e.g. Is the user over 18? Is this the correct postcode?). |
Data model overview
To facilitate these use cases, the following data should be covered by the ECA Standard. This is further developed in the Attributes section below
Personal and Business | Personal | Business |
|---|---|---|
|
|
|
For each of these data objects, we will also consider:
The date/time the field was last updated.
The level of assurance at the time of update (e.g. the method by which it was checked), however, this should be aligned to emerging standards in this regard (e.g. GPG 45).
Whether the data relates to:
the authenticating user; or
the owner(s) of the account.
Not all providers will have all of these fields.
The above list of fields is not exhaustive and may change as the project progresses.
Intellectual Property Rights (IPR)
As per key design principle #3, any work produced as a result of this activity will be published under an open licence and may be shared with and submitted to other standards bodies. Therefore any contributions to this work must be made with the understanding that there are no IPR associated with any such contributions and the contributor warrants that their contributions are free from any IPR claims.
All contributions are made in accordance with the IPR Policy set out below in Appendix 1.
Regulatory considerations (PSD2/GRPR)
The ECA standard and ECA customer journeys have been developed to replicate the design principles of the OBIE Standard. OBIE has used a design approach which leverages on the current PSD2 principles and overlays them to support the ECA use cases. It is important to note that while the principles of consent and authentication will feature in each of the use cases, they may not necessarily be underpinned by a relevant regulatory requirement under PSD2 as they may not be linked to a payment activity within the regulation. It is the sole responsibility of participants to consider applicable regulatory obligations and ensure that they have been appropriate met for any of the use cases they are engaging in. This is especially important in use cases which combine payment services under PSD2 and data sharing under ECA. Participants must also ensure that they meet any applicable regulatory obligations under GDPR in relation to processing personal data.
API Specification
The ECA Standard will use the specification that is under active development by the OpenID foundation eKYC & IDA Working Group, namely, the “OpenID for Identity Assurance” specification. There is an associated specification that will add support for legal entity use cases called “OpenID for authority”.
Advantages of this specification include:
Developed under the OpenID Foundation
Builds directly on OpenID and FAPI so is sufficiently secure for data sharing.
A fairly simple technical extension to OpenID and FAPI
FAPI provides for Relying Party identification and signing mechanisms
Privacy preserving through requests for specific claims in any combination
Provides access to attributes directly from the OpenID provider via OpenID ID Token or UserInfo endpoint
OpenID with eKYC & IDA Supports most use cases
Age verification is in roadmap for Q1 2021 as part of eKYC & IDA Implementers Draft 3
Will support use cases for both personal and business use cases
eKYC & IDA base spec is already in production for similar use cases elsewhere in the world
Can support use cases that require data from multiple sources
Verified claims are presented in a JWT so a plethora of libraries are available
The OpenID for Identity Assurance specification already supports a majority of the use cases defined in the ECA scope and will support the remaining in scope use cases in the future. The specification has also been developed in a way that means it is highly flexible with regard to use cases and can be readily extended with new attributes. It also allows requesting parties to be very specific about which attributes are required thus addressing data leakage and privacy concerns at a protocol level.
The specification (OpenID for Identity Assurance)
The work of the eKYC & IDA Working group is still underway and currently has an approved Implementers Draft 2 specification.
Implementers Draft 2 supports the following use cases that the ECA Standard is intended to support:
Onboarding
Ongoing validation or data sharing
Ecommerce
Authentication as a service
The roadmap for the eKYC & IDA specification includes an Implementers Draft 3 which is scheduled for Q1 2021 and currently includes the addition of age verification features and could also include registration of additional attributes required for the ECA Standard. Roadmap items for the eKYC & IDA spec that are of interest to the ECA Standard are:
Attribute verification
Support for legal entity use cases
Conformance testing facilities
Data Model
In the context of the OpenID for Identity Assurance specification attributes can be used in a flexible fashion but there are a set of attributes in the specification that are going to be registered into the IANA JSON Web Token Registry to ensure consistent use internationally. It is appropriate for globally relevant attributes identified as part of the ECA Standard to be added to that set.
There is discussion on-going within and between various bodies about how interoperability can be achieved with respect to more localised attribute requirements. The OIDF, IANA, OIX and other stakeholders are considering this matter. One suggestion is registration of a UK specific profile that contains attributes that are only relevant in a UK context (such as national insurance number).
The data model for ECA is being developed with four attribute types:
Natural person attributes
Session attributes
Legal entity attributes
Verification attributes: attributes about the verification of the "verified attributes"
Attributes
Natural Person attributes
Description | attribute name | Registration context | Comments |
|---|---|---|---|
Full Name | name | Registered IANA via OpenID Connect Core 1.0, Section 5.1 |
|
| given_name | Registered IANA via OpenID Connect Core 1.0, Section 5.1 |
|
| middle_name | Registered IANA via OpenID Connect Core 1.0, Section 5.1 |
|
| family_name | Registered IANA via OpenID Connect Core 1.0, Section 5.1 |
|
phone_number | phone_number | Registered IANA via OpenID Connect Core 1.0, Section 5.1 | not strongly formatted |
| msisdn | Proposed by OpenID for Identity Assurance in scope of Implementers Draft 3 | Defined to use ITU-T E.164 format |
Phone number(s) | phone_numbers |
| Re-use phone number and msisdn singular claims Establish a structured object that is an array including:
|
e-mail address | Registered IANA via OpenID Connect Core 1.0, Section 5.1 |
| |
e-mail addresses | emails |
| Re-use email Establish a structured object that is an array including:
|
Date of birth | birthdate | Registered IANA via OpenID Connect Core 1.0, Section 5.1 | represented as an ISO 8601:2004 [ISO8601‑2004] |
age | age |
|
|
age verification | age_is_at_least | Proposed by OpenID for Identity Assurance in scope of Implementers Draft 3 |
|
age verification | age_is_at_most | Proposed by OpenID for Identity Assurance in scope of Implementers Draft 3 |
|
Previous/maiden name | birth_family_name | Proposed by OpenID for Identity Assurance in Implementers Draft 2 | is family name what is intended or should this be a structured object with given, middle and family? |
Previous names | previous_names |
| is this needed? should it be a structured object with given names and middle names and family names? what about date periods? |
Current Address | address | Registered IANA via OpenID Connect Core 1.0, Section 5.1.1 | start date not supported in current definition
|
Previous address(es) | previous_addresses |
| suggest an array of address objects with additional date to and from for each |
End-User’s place of birth | place_of_birth | Proposed by OpenID for Identity Assurance in Implementers Draft 2 | The value of this member is a JSON structure |
End-User’s nationalities | nationalities | Proposed by OpenID for Identity Assurance in Implementers Draft 2 | in ICAO 2-letter codes [@!ICAO-Doc9303], e.g. "US" or "DE". 3-letter codes MAY be used when there is no corresponding ISO 2-letter code, such as "EUE". |
Residence Status | residence_status |
| From gov.uk alpha on digital identity structured object with array of status and nations |
End-User’s salutation, e.g. “Mr.” | salutation | Proposed by OpenID for Identity Assurance in Implementers Draft 2 |
|
End-User’s title, e.g. “Dr.” | title | Proposed by OpenID for Identity Assurance in Implementers Draft 2 |
|
Stage name, religious name or any other type of alias/pseudonym | also_known_as | Proposed by OpenID for Identity Assurance in Implementers Draft 2 |
|
Gender of end user | gender | Registered IANA via OpenID Connect Core 1.0, Section 5.1 |
|
Qualifications | qualifications |
| From gov.uk alpha on digital identity structured object with array of qualification and level of attainment |
Employment history | employment_history |
| From gov.uk alpha on digital identity structured object with array of job titles and employer
|
Income | income |
| From gov.uk alpha on digital identity |
Citizen registration number |
|
| From gov.uk alpha on digital identity |
Biometric information |
|
| From gov.uk alpha on digital identity |
Details of authority that the end user has over another entity | authority | Proposed by OpenID for Authority draft | Structured object containing data about the authority the end user has over another entity (such as a legal entity) Includes sub-elements:
|
Session attributes
Description | attribute name | Registration context | Comments |
|---|---|---|---|
Authentication Context Class Reference | acr | Registered IANA via OpenID Connect Core 1.0, Section 2 | Trust framework possibly appropriate to define valid values for this claim |
Authentication Methods References | amr | Registered IANA via OpenID Connect Core 1.0, Section 2 | Trust framework possibly appropriate to define valid values for this claim |
Legal entity attributes
Description | attribute name | Registration context | Comments |
|---|
© Open Banking Limited 2019 | https://www.openbanking.org.uk/open-licence | https://www.openbanking.org.uk