Security & Identity Standards
OAuth, OpenID Connect und Identity-Standards-Referenz
App Security Standards
OpenID Connect & OAuth Standards
-
OpenID Connect Core 1.0
https://openid.net/specs/openid-connect-core-1_0.htmlThe core OpenID Connect specification defining authentication layer on top of OAuth 2.0.
-
OAuth 2.0 Authorization Framework - RFC 6749
https://www.rfc-editor.org/rfc/rfc6749.htmlThe OAuth 2.0 authorization framework enabling third-party applications to obtain limited access to HTTP services.
-
OAuth 2.1 (draft)
https://datatracker.ietf.org/doc/html/draft-ietf-oauth-v2-1-14Consolidates OAuth 2.0 and its extensions into a single document with updated security best practices.
-
FAPI 1.0 - Financial-grade API - Part 1: Baseline
https://openid.net/specs/openid-financial-api-part-1-1_0.htmlBaseline security profile for financial-grade APIs.
-
FAPI 1.0 - Financial-grade API - Part 2: Advanced
https://openid.net/specs/openid-financial-api-part-2-1_0.htmlAdvanced security profile for high-risk financial APIs.
-
FAPI 2.0 - Financial-grade API Security Profile 2.0
https://openid.net/specs/fapi-security-profile-2_0-final.htmlNext generation of Financial-grade API security profile with enhanced security features.
-
OAuth 2.0 Demonstrating Proof of Possession (DPoP) - RFC 9449
https://www.rfc-editor.org/rfc/rfc9449.htmlApplication-level proof-of-possession mechanism for OAuth 2.0 access tokens.
-
OAuth 2.0 for Browser-Based Apps (draft)
https://datatracker.ietf.org/doc/html/draft-ietf-oauth-browser-based-appsBest current practices for implementing OAuth 2.0 authorization flows in browser-based applications.
-
OAuth 2.0 Device Authorization Grant - RFC 8628
https://www.rfc-editor.org/rfc/rfc8628.htmlOAuth 2.0 extension for devices that lack a browser or have limited input capability.
-
OAuth Cross-Device Security (draft)
https://datatracker.ietf.org/doc/draft-ietf-oauth-cross-device-security/Security best practices for OAuth 2.0 cross-device flows to protect against various attacks.
-
Client-Initiated Backchannel Authentication (CIBA)
https://openid.net/specs/openid-client-initiated-backchannel-authentication-core-1_0.htmlDecoupled authentication flow allowing authentication initiation from one device and confirmation from another.
-
Proof Key for Code Exchange (PKCE) - RFC 7636
https://www.rfc-editor.org/rfc/rfc7636.htmlSecurity extension to the OAuth 2.0 Authorization Code flow to prevent authorization code interception attacks.
-
OAuth 2.0 Pushed Authorization Requests (PAR) - RFC 9126
https://datatracker.ietf.org/doc/html/rfc9126OAuth 2.0 extension that allows clients to push the authorization request payload directly to the authorization server before initiating the authorization flow, protecting against request tampering and improving security.
JWT Standards
-
JSON Web Token (JWT) - RFC 7519
https://www.rfc-editor.org/rfc/rfc7519.htmlCompact, URL-safe means of representing claims to be transferred between two parties.
-
JSON Web Signature (JWS) - RFC 7515
https://www.rfc-editor.org/rfc/rfc7515.htmlRepresents content secured with digital signatures or Message Authentication Codes (MACs) using JSON.
-
JSON Web Encryption (JWE) - RFC 7516
https://www.rfc-editor.org/rfc/rfc7516.htmlRepresents encrypted content using JSON-based data structures.
-
JSON Web Key (JWK) - RFC 7517
https://www.rfc-editor.org/rfc/rfc7517.htmlJSON data structure that represents a cryptographic key.
-
JSON Web Algorithms (JWA) - RFC 7518
https://www.rfc-editor.org/rfc/rfc7518.htmlCryptographic algorithms and identifiers for use with JWS, JWE, and JWK.
-
JSON Web Token Best Current Practices - RFC 8725
https://www.rfc-editor.org/rfc/rfc8725.htmlBest practices for creating and validating JSON Web Tokens securely.
Additional Security RFCs
-
RFC 8485 - Vectors of Trust
https://www.rfc-editor.org/rfc/rfc8485.htmlMethod for expressing trustworthiness of authentication events and identity assertions.
-
Authentication Method Reference Values - RFC 8176
https://datatracker.ietf.org/doc/html/rfc8176Authentication Method Reference (AMR) values for OAuth and OpenID Connect.
-
OpenID Connect EAP ACR Values 1.0
https://openid.net/specs/openid-connect-eap-acr-values-1_0.htmlAuthentication Context Class Reference (ACR) values for OpenID Connect Extended Authentication Profile.
-
OAuth 2.0 Token Exchange - RFC 8693
https://www.rfc-editor.org/rfc/rfc8693.htmlProtocol for exchanging one security token for another to enable delegation and impersonation scenarios.
-
OAuth 2.0 Token Revocation - RFC 7009
https://www.rfc-editor.org/rfc/rfc7009.htmlMechanism for clients to indicate to the authorization server that a token is no longer needed.
-
OAuth 2.0 Token Introspection - RFC 7662
https://www.rfc-editor.org/rfc/rfc7662.htmlMethod for a resource server to query an authorization server to determine token metadata.
Identity Standards
Self-Sovereign Identity (SSI) Standards
-
W3C Verifiable Credentials Data Model 2.0
https://www.w3.org/TR/vc-data-model-2.0/Standard data model for expressing verifiable credentials and verifiable presentations on the web.
-
W3C Decentralized Identifiers (DIDs) 1.0
https://www.w3.org/TR/did-core/New type of identifier for verifiable, decentralized digital identity.
-
Trust DID Web (draft)
https://identity.foundation/trustdidweb/Enhanced DID method building on did:web with additional trust and security features.
-
OpenID for Verifiable Credential Issuance 1.0
https://openid.net/specs/openid-4-verifiable-credential-issuance-1_0.htmlProtocol for issuing verifiable credentials using OAuth 2.0 authorization framework.
-
OpenID for Verifiable Presentations 1.0
https://openid.net/specs/openid-4-verifiable-presentations-1_0.htmlProtocol for presenting verifiable credentials to relying parties using OpenID Connect.
-
OAuth Selective Disclosure JWT (SD-JWT) (draft)
https://datatracker.ietf.org/doc/draft-ietf-oauth-selective-disclosure-jwt/Mechanism enabling selective disclosure of individual claims from a JSON object.
-
OAuth SD-JWT-based Verifiable Credentials (SD-JWT VC) (draft)
https://datatracker.ietf.org/doc/draft-ietf-oauth-sd-jwt-vc/Data model for verifiable credentials based on SD-JWT with selective disclosure capabilities.
-
OAuth Status List (draft)
https://datatracker.ietf.org/doc/draft-ietf-oauth-status-list/Privacy-preserving status information for credentials including revocation and suspension.
-
did:web Method Specification
https://w3c-ccg.github.io/did-method-web/DID method using existing web infrastructure with domain names and HTTP(S).
Additional Identity Standards
-
WebAuthn - Web Authentication API
https://www.w3.org/TR/webauthn-3/API enabling strong authentication on the web using public key cryptography and hardware tokens.
-
FIDO2 Specifications
https://fidoalliance.org/specifications/Standards for passwordless authentication including WebAuthn and CTAP protocols.
-
FIDO Alliance Passkeys
https://fidoalliance.org/passkeys/Passkeys are a passwordless authentication method, designed as a simpler and more secure alternative to passwords. They leverage public key cryptography and tie credential access to the user's device, reducing phishing risk. Supported by the FIDO Alliance and major platform providers.
-
OpenID Connect for Identity Assurance 1.0
https://openid.net/specs/openid-connect-4-identity-assurance-1_0.htmlExtension to OpenID Connect for communicating identity assurance levels and evidence.
-
SAML 2.0 - Security Assertion Markup Language
https://docs.oasis-open.org/security/saml/Post2.0/sstc-saml-tech-overview-2.0.htmlXML-based framework for exchanging authentication and authorization data between parties.
Additional Resources
For more information on implementing these standards, visit:
- OpenID Foundation - OpenID Connect and FAPI specifications
- IETF Datatracker - OAuth and JWT RFCs and drafts
- W3C Technical Reports - Verifiable Credentials, DIDs, and WebAuthn
- Decentralized Identity Foundation - DID methods and SSI standards
- OWASP ASVS - Application Security Verification Standard
- SwIYu Introduction - Swiss Identity and Access Management
- OSS Projects - See implementations of these standards in practice