From 9f6e0e008fb49e82d9e4d6212383b4fe2dc64796 Mon Sep 17 00:00:00 2001 From: Keith Hazelton Date: Tue, 13 Apr 2021 08:53:36 -0500 Subject: [PATCH] Update identifier-guidance.adoc --- identifier-guidance.adoc | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/identifier-guidance.adoc b/identifier-guidance.adoc index d33c6e7..57404ba 100644 --- a/identifier-guidance.adoc +++ b/identifier-guidance.adoc @@ -5,7 +5,7 @@ In this document, terminology on identifiers follows section 1.2 of _eduPerson 2020-01_, https://wiki.refeds.org/display/STAN/eduPerson+2020-01#eduPerson202001-IdentifierConcepts. *IAM's own internal id*: generated by IAM system, for internal IAM system use only. Every person known to the IAM system gets one. - Example id name: iid, example id structure: UUID. Not name based, + Example id name: iid, example id structure: UUID. Not name based. *public IAM id*: generated by IAM system, can be asserted to other systems. Every person known to the IAM system gets one. Example id name: subject-id. It is strongly recommended that adopters follow section 3.3.1 of _SAML V2.0 Subject Identifier Attributes Profile Version 1.0_, https://docs.oasis-open.org/security/saml-subject-id-attr/v1.0/cs01/saml-subject-id-attr-v1.0-cs01.html, and be structured as 'uniqueId' + '@' + 'scope' where uniqueId is 1-127 alphanumeric characters (A-Z,0-9), or "-", or "=". The first character must be alphanumeric. Matches must be _case insensitive_. A uniqueId may be name-based or not at the choice of the deployer. Be aware that some applications will display the public IAM id in their UI.