OpenID Connect for Identity Assurance was initiated from an Intellectual Property Rights donation from yes.com of an extension to OpenID Connect that they had created.
OpenID Connect for Identity Assurance is primarily focussed on addressing use-cases where the details of the assurance process used to verify and validate the end-users identity need to be explicitly communicated.
The working group believes it’s a good fit for account opening, staff on-boarding, account Credential Recovery and access to restricted services where communication of how the underlying Identity Proofing was established is needed.
Examples include
OpenID Connect for Identity Assurance fulfills the criteria for portability and interoperability mechanisms of Digital ID systems as defined in FATF-Digital-Identity.
In such use cases, the Relying Parties (RPs) need to know the Assurance Level of the user Claims attested by the OpenID Connect Providers (OPs) along with evidences related to the identity verification process (Identity Assurance).
Identity assurance significantly differs from Authentication Assurance, which requires a different representation in the OpenID Connect protocol that is defined in this specification.
The Authentication Assurance level for authentication is a property of a certain OpenID Connect transaction, determined by the Authentication Mechanism employed and the underlying user account management processes. The acr Claim as defined in Section 2 of the OpenID Connect specification OpenID is sufficient to convey this information.
The Identity Assurance for user Claims, i.e. the binding of a certain Claim value to the person controlling the respective user account, typically varies among the different user Claims. For example, the assurance an OpenID Connect Provider typically will be able to attest for an e-mail address will be "Self-Asserted", "verified by opt-in", or "verified by the respective e-mail provider via an attribute exchange protocol". The family name of a user, in contrast, might have been verified in accordance with the respective Anti-Money Laundering Law by showing an Identity Card to a trained employee of the OpenID Connect Provider operator.
Identity assurance therefore requires a way to convey a Level Of Assurance data along with and coupled to the respective user Claims. This specification proposes a suitable representation and mechanisms the Relying Party will utilize to request verified person data and accompanying Identity Assurance data.
Security concerns relating to exchange of sensitive personal data via OIDC4IDA should be addressed simply through use of the output of the FAPI Working Group which you can read about in this white paper.