-
Notifications
You must be signed in to change notification settings - Fork 11
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[KYC Fill-in] Attributes to be included in the request body? #90
Comments
CAMARA and especially KYC-Fill-in use OIDC authorization code flow or CIBA when it come to personal data.
OIDC defines standard claims and how to request them. KYC-Fill-in can use these OIDC standard claims to request personal user data. We (this group) could extend the list of "standard" claims and add claims mentioned in KYC Fill-in yaml e.g. idDocument. I think this is important for data minimization under e.g. GDPR Art. 5 (c) and ICO. |
@AxelNennker Hi Axel , Can you please explain what you mean by the link between standard claims in OIDC and data minimization? I think data minimization has more to do what use case you have and whether the data is really needed for the use case or not. Not so much which standards are being followed describing claims. |
The current fill-in API does return everything the API provider has in there database. That response is not minimized. I suggest that we add all the fields/properties/attributes/claims from the response as scopes to the request definition. |
@AxelNennker I see the issue now. Scopes may be a solution for that, but don't you run the risk that the scope string may become very complex / long ? |
@AxelNennker A simpler solution may be to specify the fields that are needed in the request body. That allows the answer to be minimized as well. However, in case of a consent use case, you still need to acquire consent for all possible data fields that are allowed for that API Consumer. If you choose to handle it through scopes, you can also tailor the consent question, so that you only need to ask the consent for data that is actually asked at that time. |
OIDC standardizes some standard claims and they are requested as scope values. I would go the same way with Fill-In. |
hi, according to what has been designed in the KYC APIs, phoneNumber might be added as optionnal to the swagger design with the same rules of management and usage. WDYT Gilles |
define "complex / long"... the scope value might be long but for one API consumer it is probably always the same. regarding "long":
Should URL length become a concern the POST is always there. regarding "complex": |
Putting the OIDC request parameters in a POST request puts the fields in the request body. The API consumer could tailor the consent question but ultimately consent management is done be the operator. OIDC defines that the API consumer can always ask that the API producer enters the consent collection flow by issuing an OIDC request with `prompt=consent&scope="openid dpv:... kyc-1 kyc-2...". If e.g. the API consumer's the mobile app knows the MSISDN of the device, the mobile app can add login_hint=tel:MSISDN whether on-net or off-net. I would not limit KYC to "the device currently being used by the end-user" because we are breaking that paradigm with CIBA already. |
@AxelNennker Hi Axel, I think that for both KYC Match and KYC Fill-In a method is required to define which attributes are allowed. In both API's, you can have use cases where not all attributes may be collected according to the GDPR. For example, verifying an ID document number may not be allowed when you just need to verify someone's address. However, we should also try to keep matters simple for developers. How about the folllowing: The maximum set of attributes an API Consumer is allowed to ask is defined at onboarding. When the API's are being consumed, the API Consumer should be able to ask for either all the attributes he is allowed (as defined at onboarding), or a subset of specific attributes (in case he needs to ask at that point in the flow for less data). Would this be an option ? |
I think this may be a more business decision whether you want to include the phone number with KYC Fill In . Please note there is also a Number Verification version by which you can share the phonenumber. And isn't the phone number already included in the current version? |
Thanks @GillesInnov35 , @HuubAppelboom , Our original proposal about a year ago included the phoneNumber, so, we would be happy to support this idea. Best regards, |
hi @HuubAppelboom, as it is explained for Tenure, phone number (optionnal) placed in the body request could be used for 2-Legged auth. (API tests for example). |
Putting the OIDC request parameters in a POST request puts the fields in the request body. The API consumer could tailor the consent question but ultimately consent management is done be the operator. OIDC defines that the API consumer can always ask that the API producer enters the consent collection flow by issuing an OIDC request with `prompt=consent&scope="openid dpv:... kyc-1 kyc-2...". If e.g. the API consumer's the mobile app knows the MSISDN of the device, the mobile app can add login_hint=tel:MSISDN whether on-net or off-net. |
Problem description
For KYC Fill-in, in addition to the current 'none in the request body', to consider including Phone Number?, 3rdPartyId?, attributes which the 3rdParty wants to receive.
(Spin off from Issue #65, item No.10, as per Action Item #13.03)
BR
The text was updated successfully, but these errors were encountered: