Only by use of Trust can a Claim be assumed to be True as Authentication would be done by an Identity Provider (IDP) or a Verifier which involves Trust.
Using the JWT Claims Set is one method where Claims also solve the concern of data being added in transit. Because the information encoded and Digitally Signed by the Issuing Authority, nothing is added in transit unless the Issuing Authority is involved – in this way, the source of data can be directly controlled.
Verifiable Claims and Verified Claims are another method.
We can for our purposes use Claim the same as we would use assertion in regards to Authentication
Verified Claims are a fix because they don’t simply tell you something about the subject; they give you context and the ability to verify that information. Verifiable Claims There are two core types of attributes that a claim can reference:
Comment1: Claims may or may not be directed to specific Parties (aud). (KimC, DickH, PaulT)
Comment2: A Claim is an association between a Claimant, a Digital Identity, and an Identity Attribute (PaulT)
Here is an OAuth 2.0 example: "Curity states that the Resource Owner has this list of attributes."
Asserting Party | Subject | Claims |
---|---|---|
Curity | Resource Owner | Attributes |
In OAuth 2.0 Claim might and often are mapped to a OAuth Scopes (scope of access).
verified_claims are defined as Claims about an End-User, typical a Natural Person, where those Claims were Bound to a particular Digital Identity in the course of an Identity Verification process.
The OpenID Connect Standard Claims specification only defines a single set of standard OAuth Scopes defines the Access Request for the Claim:
Scope | Claims |
---|---|
email, email_verified | |
address | address |
profile | name, family_name, given_name, middle_name, nickname, preferred_username, profile, picture, website, gender, birthdate, zoneinfo, locale, updated_at |
phone | phone_number, phone_number_verified |
openid | sub, auth_time, acr |