diff --git a/draft-diagrams/AAI/AbstractAAI.drawio.svg b/draft-diagrams/AAI/AbstractAAI.drawio.svg deleted file mode 100644 index 67b2770..0000000 --- a/draft-diagrams/AAI/AbstractAAI.drawio.svg +++ /dev/null @@ -1,4 +0,0 @@ - - - -
Broker
Broker
Clearinghouse
Clearinghouse
Text is not SVG - cannot display
\ No newline at end of file diff --git a/draft-diagrams/AAI/GA4GH_JWT-only_flow.png b/draft-diagrams/AAI/GA4GH_JWT-only_flow.png deleted file mode 100644 index b1c50b3..0000000 Binary files a/draft-diagrams/AAI/GA4GH_JWT-only_flow.png and /dev/null differ diff --git a/draft-diagrams/AAI/LifeScienceAAI.drawio.svg b/draft-diagrams/AAI/LifeScienceAAI.drawio.svg deleted file mode 100644 index fe6b54d..0000000 --- a/draft-diagrams/AAI/LifeScienceAAI.drawio.svg +++ /dev/null @@ -1,4 +0,0 @@ - - - -
REMS Luxemb.
REMS Luxemb.
eduGAIN IdP
eduGAIN IdP
eduGAIN IdP
eduGAIN IdP
Google
account
Google...
Apple account
Apple accou...
ORCID
account
ORCID...
LS username
+
 password
LS username...
REMS Finland
(Resource Entitlement Management System, )
visa issuer



REMS Finland...
...
...
...
...
ControlledAccessGrants
visas
ControlledAccessGrants...
ControlledAccessGrants
visas
ControlledAccessGrants...
ControlledAccessGrants
visas
ControlledAccessGrants...
proxy SP
proxy SP
internal visa issuer for
AffiliationAndRole
AcceptedTermsAndPolicies
ResearcherStatus
LinkedIdentities
visas




internal visa issuer for...
Passport issuer /
OIDC Provider /
OAuth 2 AS





Passport issuer /...
visas
visas
LifeScience AAI
(ELIXIR, GDI, EJP RD, BBMRI)
LifeScience AAI...
Passport clearinghouse /
 OIDC Relying Party /
OAuth 2 client



Passport clearinghouse /...

user 
attributes
management system
user...
user
attributes
user...
user identity
user identity
user affiliation
user affiliation
Identity Providers
Identity Providers
authentication
authentication
REMS Estonia
REMS Estonia
REMS Sweden
REMS Sweden
REMS Belgium
REMS Belgium
REMS France
REMS France
ControlledAccessGrants
visas
ControlledAccessGrants...
...
...
Visa
Issuers
Visa...
Data Access Committeeresearcherdata access requestdata access requestdata access granted
Text is not SVG - cannot display
\ No newline at end of file diff --git a/draft-diagrams/AAI/README.md b/draft-diagrams/AAI/README.md deleted file mode 100644 index 3881caa..0000000 --- a/draft-diagrams/AAI/README.md +++ /dev/null @@ -1,81 +0,0 @@ -# Authentication and Authorization Infrastructure - -## [Link to Specification](https://ga4gh.github.io/data-security/) - -## Introduction - -The Authentication and Authorizations Infrastructure (AAI) specification -leverages OpenID Connect (OIDC) to authenticate researchers -desiring to access clinical and genomic resources from data -holders adhering to GA4GH standards. Beyond standard OIDC authentication, AAI enables -data holders to obtain security-related attributes and authorizations of those -researchers. In parallel, the Data Use and Researcher Identity (DURI) Work Stream has developed a standard -representation for researcher authorizations and attributes known as Researcher-ID. -At its core, the AAI specification defines cryptographically secure tokens for exchanging -these researcher attributes called Visas and how various -participants can interact to authenticate researchers, and obtain and validate Visas. - -This specification also provides for federated multilateral authorization infrastructure for greater -interoperability between biomedical institutions sharing restricted datasets. - -### What is OpenID Connect? - -OpenID Connect is a simple identity layer, on top of the OAuth 2.0 protocol, that supports identity verification and the ability to -obtain basic profile information about end users. The AAI specification extends this to define tokens, -endpoints, and flows that enable an OIDC provider (called a Broker) to -provide Passports and Visas to downstream consumers called Passport Clearinghouses. Passports can then be used for -authorization purposes by downstream systems. - -## Passports specification -The AAI and Passports specifications rely on each other for full functionality and will likely be merged in a future version. The Passports specification from the Data Use and Researcher Identities Work Stream can be found [here](https://ga4gh-duri.github.io/researcher_ids/ga4gh_passport_v1.html). - -## Version history - -[Changelog](https://ga4gh.github.io/data-security/changes-1_2) for v1.2 - -Full version history available [here](https://ga4gh.github.io/data-security/aai-openid-connect-profile#specification-revision-history) - - -## Contributors - -GA4GH is an open community and contribution is not limited to those named below. -Names listed alphabetically by surname. Repository maintainers listed [here](./MAINTAINER.md). - -### Core Developers for v1.2 - -- Max Barkley - DNAstack -- Tom Conner - Broad Institute -- Martin Kuba - ELIXIR Czech Republic -- Andrew Patterson - The University of Melbourne Centre for Cancer Research -- Kurt Rodarmer - National Center for Biotechnology Information - NIH - -### Reviewers for v1.2 - -- Francis Jeanson - Peter Munk Cardiac Centre and Ted Rogers Centre for Heart Research -- David Glazer - Verily Life Sciences -- Timothy Slade - RTI International -- Dylan Spalding - ELIXIR Finland - -### Technical Programme Manager - -- Fabio Liberante - Global Alliance for Genomics and Health - -## Work Stream Leadership - -### Data Security - -- David Bernick - Broad Institute -- Lucila Ohno-Machado - Yale University School of Medicine -- Previously - Jean-Pierre Hubaux - Swiss Federal Institute of Technology Lausanne - -### Data Use and Researcher Identities - -- Jaime Guidry-Auvil - National Cancer Institute - NIH -- Tommi Nyrönen - ELIXIR Finland - - -## Demonstration Implementation - -[Life Science RI](https://lifescience-ri.eu/) have implemented this v1.2 specification from the finalised draft for use across the Life Science RI platforms. -Information on creating an account is available [here](https://lifescience-ri.eu/ls-login/users/how-to-get-and-use-life-science-id.html). -With an account, the test service [here](https://echo.aai.elixir-czech.org/) will return a technical view of the various tokens created and shared in an example flow using Passport/AAI 1.2. \ No newline at end of file diff --git a/draft-diagrams/AAI/aai background fig 1.JPG b/draft-diagrams/AAI/aai background fig 1.JPG deleted file mode 100644 index f1da29f..0000000 Binary files a/draft-diagrams/AAI/aai background fig 1.JPG and /dev/null differ diff --git a/draft-diagrams/AAI/aai background fig 2.png b/draft-diagrams/AAI/aai background fig 2.png deleted file mode 100644 index b90fe23..0000000 Binary files a/draft-diagrams/AAI/aai background fig 2.png and /dev/null differ diff --git a/draft-diagrams/AAI/assets/AAI-compliant.svg b/draft-diagrams/AAI/assets/AAI-compliant.svg deleted file mode 100644 index db406e2..0000000 --- a/draft-diagrams/AAI/assets/AAI-compliant.svg +++ /dev/null @@ -1,20 +0,0 @@ - - - - - - - - \ No newline at end of file diff --git a/draft-diagrams/AAI/assets/AAI-verified.svg b/draft-diagrams/AAI/assets/AAI-verified.svg deleted file mode 100644 index 64cfbef..0000000 --- a/draft-diagrams/AAI/assets/AAI-verified.svg +++ /dev/null @@ -1,20 +0,0 @@ - - - - - - - - \ No newline at end of file diff --git a/draft-diagrams/AAI/assets/Analyze.svg b/draft-diagrams/AAI/assets/Analyze.svg deleted file mode 100644 index 4688cea..0000000 --- a/draft-diagrams/AAI/assets/Analyze.svg +++ /dev/null @@ -1,25 +0,0 @@ - - - - - - - - - - - - - \ No newline at end of file diff --git a/draft-diagrams/AAI/assets/Approved.svg b/draft-diagrams/AAI/assets/Approved.svg deleted file mode 100644 index db1cc14..0000000 --- a/draft-diagrams/AAI/assets/Approved.svg +++ /dev/null @@ -1,45 +0,0 @@ - - - - - - - - - - APPROVED - - \ No newline at end of file diff --git a/draft-diagrams/AAI/assets/Consents.svg b/draft-diagrams/AAI/assets/Consents.svg deleted file mode 100644 index ddea9d1..0000000 --- a/draft-diagrams/AAI/assets/Consents.svg +++ /dev/null @@ -1,55 +0,0 @@ - - - - - - - - - - - - - - - - \ No newline at end of file diff --git a/draft-diagrams/AAI/assets/Data-Access-Committee.svg b/draft-diagrams/AAI/assets/Data-Access-Committee.svg deleted file mode 100644 index cd28bce..0000000 --- a/draft-diagrams/AAI/assets/Data-Access-Committee.svg +++ /dev/null @@ -1,77 +0,0 @@ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - \ No newline at end of file diff --git a/draft-diagrams/AAI/assets/Data-Access-Request.svg b/draft-diagrams/AAI/assets/Data-Access-Request.svg deleted file mode 100644 index fa6bbad..0000000 --- a/draft-diagrams/AAI/assets/Data-Access-Request.svg +++ /dev/null @@ -1,23 +0,0 @@ - - - - - - - - - - \ No newline at end of file diff --git a/draft-diagrams/AAI/assets/Data-Curator.svg b/draft-diagrams/AAI/assets/Data-Curator.svg deleted file mode 100644 index c7ba0f3..0000000 --- a/draft-diagrams/AAI/assets/Data-Curator.svg +++ /dev/null @@ -1,30 +0,0 @@ - - - - - - - - - \ No newline at end of file diff --git a/draft-diagrams/AAI/assets/Data-donor.svg b/draft-diagrams/AAI/assets/Data-donor.svg deleted file mode 100644 index 1e08252..0000000 --- a/draft-diagrams/AAI/assets/Data-donor.svg +++ /dev/null @@ -1,30 +0,0 @@ - - - - - - - - - \ No newline at end of file diff --git a/draft-diagrams/AAI/assets/Download.svg b/draft-diagrams/AAI/assets/Download.svg deleted file mode 100644 index 15ce5c8..0000000 --- a/draft-diagrams/AAI/assets/Download.svg +++ /dev/null @@ -1,20 +0,0 @@ - - - - - - - - - \ No newline at end of file diff --git a/draft-diagrams/AAI/assets/Find-datasets.svg b/draft-diagrams/AAI/assets/Find-datasets.svg deleted file mode 100644 index 7dd5891..0000000 --- a/draft-diagrams/AAI/assets/Find-datasets.svg +++ /dev/null @@ -1,36 +0,0 @@ - - - - - - - - - - - - - - - - - - - \ No newline at end of file diff --git a/draft-diagrams/AAI/assets/Lock.svg b/draft-diagrams/AAI/assets/Lock.svg deleted file mode 100644 index bdcfa64..0000000 --- a/draft-diagrams/AAI/assets/Lock.svg +++ /dev/null @@ -1,31 +0,0 @@ - - - - - - - - - - - - \ No newline at end of file diff --git a/draft-diagrams/AAI/assets/Magnifying-glass.svg b/draft-diagrams/AAI/assets/Magnifying-glass.svg deleted file mode 100644 index fd61d47..0000000 --- a/draft-diagrams/AAI/assets/Magnifying-glass.svg +++ /dev/null @@ -1,22 +0,0 @@ - - - - - - - - - \ No newline at end of file diff --git a/draft-diagrams/AAI/assets/Passport-Broker.svg b/draft-diagrams/AAI/assets/Passport-Broker.svg deleted file mode 100644 index 6b63d94..0000000 --- a/draft-diagrams/AAI/assets/Passport-Broker.svg +++ /dev/null @@ -1,140 +0,0 @@ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - \ No newline at end of file diff --git a/draft-diagrams/AAI/assets/Passport-Visa-Issuer.svg b/draft-diagrams/AAI/assets/Passport-Visa-Issuer.svg deleted file mode 100644 index 7464f34..0000000 --- a/draft-diagrams/AAI/assets/Passport-Visa-Issuer.svg +++ /dev/null @@ -1,83 +0,0 @@ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - \ No newline at end of file diff --git a/draft-diagrams/AAI/assets/Passport-clearinghouse.svg b/draft-diagrams/AAI/assets/Passport-clearinghouse.svg deleted file mode 100644 index 540cbe3..0000000 --- a/draft-diagrams/AAI/assets/Passport-clearinghouse.svg +++ /dev/null @@ -1,46 +0,0 @@ - - - - - - - - - - - - - - \ No newline at end of file diff --git a/draft-diagrams/AAI/assets/Passport.svg b/draft-diagrams/AAI/assets/Passport.svg deleted file mode 100644 index 66992b9..0000000 --- a/draft-diagrams/AAI/assets/Passport.svg +++ /dev/null @@ -1,24 +0,0 @@ - - - - - - - Passport - - \ No newline at end of file diff --git a/draft-diagrams/AAI/assets/Repository.svg b/draft-diagrams/AAI/assets/Repository.svg deleted file mode 100644 index f5bae6d..0000000 --- a/draft-diagrams/AAI/assets/Repository.svg +++ /dev/null @@ -1,13 +0,0 @@ - - - - - - - - \ No newline at end of file diff --git a/draft-diagrams/AAI/assets/Researcher.svg b/draft-diagrams/AAI/assets/Researcher.svg deleted file mode 100644 index 97acbe9..0000000 --- a/draft-diagrams/AAI/assets/Researcher.svg +++ /dev/null @@ -1,58 +0,0 @@ - - - - - - - - - - - - - - - - - - - \ No newline at end of file diff --git a/draft-diagrams/AAI/assets/Services.svg b/draft-diagrams/AAI/assets/Services.svg deleted file mode 100644 index 5bcaa45..0000000 --- a/draft-diagrams/AAI/assets/Services.svg +++ /dev/null @@ -1,17 +0,0 @@ - - - - - - - - - - - - \ No newline at end of file diff --git a/draft-diagrams/AAI/assets/Visa-assertion-blue.svg b/draft-diagrams/AAI/assets/Visa-assertion-blue.svg deleted file mode 100644 index 92f34f9..0000000 --- a/draft-diagrams/AAI/assets/Visa-assertion-blue.svg +++ /dev/null @@ -1,46 +0,0 @@ - - - - - - - - - - - - - - - - - - - - - - - - - - \ No newline at end of file diff --git a/draft-diagrams/AAI/assets/Visa-assertion-green.svg b/draft-diagrams/AAI/assets/Visa-assertion-green.svg deleted file mode 100644 index 04d4435..0000000 --- a/draft-diagrams/AAI/assets/Visa-assertion-green.svg +++ /dev/null @@ -1,46 +0,0 @@ - - - - - - - - - - - - - - - - - - - - - - - - - - \ No newline at end of file diff --git a/draft-diagrams/AAI/assets/Visa-assertion-orange.svg b/draft-diagrams/AAI/assets/Visa-assertion-orange.svg deleted file mode 100644 index 8ef4df4..0000000 --- a/draft-diagrams/AAI/assets/Visa-assertion-orange.svg +++ /dev/null @@ -1,46 +0,0 @@ - - - - - - - - - - - - - - - - - - - - - - - - - - \ No newline at end of file diff --git a/draft-diagrams/AAI/assets/aai-library.xml b/draft-diagrams/AAI/assets/aai-library.xml deleted file mode 100644 index b1bef7c..0000000 --- a/draft-diagrams/AAI/assets/aai-library.xml +++ /dev/null @@ -1,163 +0,0 @@ -[ - { - "data": "data:image/svg+xml;base64,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", - "w": 400, - "h": 400, - "title": "AAI-compliant", - "aspect": "fixed" - }, - { - "data": "data:image/svg+xml;base64,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", - "w": 400, - "h": 400, - "title": "AAI-verified", - "aspect": "fixed" - }, - { - "data": "data:image/svg+xml;base64,PHN2ZyB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciIHZpZXdCb3g9IjAgMCA0MDAgNDAwIiBkYXRhLW5hbWU9IkxheWVyIDEiIGlkPSJMYXllcl8xIj4mI3hhOyAgPGRlZnM+JiN4YTsgICAgPHN0eWxlPiYjeGE7ICAgICAgLmNscy0xIHsmI3hhOyAgICAgICAgZmlsbDogIzlmNzliMDsmI3hhOyAgICAgICAgc3Ryb2tlLXdpZHRoOiAwcHg7JiN4YTsgICAgICB9JiN4YTsmI3hhOyAgICAgIC5jbHMtMiB7JiN4YTsgICAgICAgIGZpbGw6IG5vbmU7JiN4YTsgICAgICAgIHN0cm9rZTogIzlmNzliMDsmI3hhOyAgICAgICAgc3Ryb2tlLW1pdGVybGltaXQ6IDEwOyYjeGE7ICAgICAgICBzdHJva2Utd2lkdGg6IDEwLjU2cHg7JiN4YTsgICAgICB9JiN4YTsgICAgPC9zdHlsZT4mI3hhOyAgPC9kZWZzPiYjeGE7ICA8cGF0aCBkPSJtMzA3LjI2LDI0MS42MWMzNy45LDAsNjguNjItMzAuNzIsNjguNjItNjguNjJzLTMwLjcyLTY4LjYyLTY4LjYyLTY4LjYyYy0xMC4yOCwwLTIwLDIuMzMtMjguNzYsNi4zOC0xMS44LTQ0LjU2LTUyLjM4LTc3LjQxLTEwMC42NS03Ny40MS01Ny41MSwwLTEwNC4xMyw0Ni42Mi0xMDQuMTMsMTA0LjEzLDAsNS4xLjM4LDEwLjEsMS4wOSwxNS0xLjk0LS4yNi0zLjktLjQzLTUuOTEtLjQzLTI0LjczLDAtNDQuNzgsMjAuMDUtNDQuNzgsNDQuNzhzMjAuMDIsNDQuNzUsNDQuNzIsNDQuNzhoMHMyMzYuMjQsMCwyMzYuMjQsMGgyLjE3WiIgY2xhc3M9ImNscy0xIi8+JiN4YTsgIDxwYXRoIGQ9Im0xMzAuNjQsMjAzLjd2OTMuOTFjMCw5LjcyLTcuODgsMTcuNTktMTcuNTksMTcuNTlINDUuMjQiIGNsYXNzPSJjbHMtMiIvPiYjeGE7ICA8bGluZSB5Mj0iMzQ2LjQ3IiB4Mj0iMjAwIiB5MT0iMjAzLjciIHgxPSIyMDAiIGNsYXNzPSJjbHMtMiIvPiYjeGE7ICA8cGF0aCBkPSJtMjcyLjM4LDIyNy44djM4Ljg0YzAsOS43Miw3Ljg4LDE3LjU5LDE3LjU5LDE3LjU5aDUxLjA0IiBjbGFzcz0iY2xzLTIiLz4mI3hhOyAgPGNpcmNsZSByPSIxNC44NiIgY3k9IjI4NC4yMyIgY3g9IjM1Mi44IiBjbGFzcz0iY2xzLTEiLz4mI3hhOyAgPGNpcmNsZSByPSIxNC44NiIgY3k9IjM1MS44IiBjeD0iMjAwIiBjbGFzcz0iY2xzLTEiLz4mI3hhOyAgPGNpcmNsZSByPSIxNC44NiIgY3k9IjMxNS4yIiBjeD0iNDUuMjQiIGNsYXNzPSJjbHMtMSIvPiYjeGE7PC9zdmc+", - "w": 400, - "h": 400, - "title": "Analyze", - "aspect": "fixed" - }, - { - "data": "data:image/svg+xml;base64,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", - "w": 400, - "h": 400, - "title": "Approved", - "aspect": "fixed" - }, - { - "data": "data:image/svg+xml;base64,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", - "w": 400, - "h": 400, - "title": "Consents", - "aspect": "fixed" - }, - { - "data": "data:image/svg+xml;base64,PHN2ZyB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciIHZpZXdCb3g9IjAgMCA0MDAgNDAwIiBkYXRhLW5hbWU9IkxheWVyIDEiIGlkPSJMYXllcl8xIj4mI3hhOyAgPGRlZnM+JiN4YTsgICAgPHN0eWxlPiYjeGE7ICAgICAgLmNscy0xLCAuY2xzLTIgeyYjeGE7ICAgICAgICBzdHJva2Utd2lkdGg6IDIuMDhweDsmI3hhOyAgICAgIH0mI3hhOyYjeGE7ICAgICAgLmNscy0xLCAuY2xzLTIsIC5jbHMtMywgLmNscy00LCAuY2xzLTUsIC5jbHMtNiB7JiN4YTsgICAgICAgIHN0cm9rZTogIzFiNzViYTsmI3hhOyAgICAgICAgc3Ryb2tlLW1pdGVybGltaXQ6IDEwOyYjeGE7ICAgICAgfSYjeGE7JiN4YTsgICAgICAuY2xzLTEsIC5jbHMtNyB7JiN4YTsgICAgICAgIGZpbGw6ICMxYjc1YmE7JiN4YTsgICAgICB9JiN4YTsmI3hhOyAgICAgIC5jbHMtMiwgLmNscy00IHsmI3hhOyAgICAgICAgZmlsbDogbm9uZTsmI3hhOyAgICAgIH0mI3hhOyYjeGE7ICAgICAgLmNscy0zLCAuY2xzLTggeyYjeGE7ICAgICAgICBmaWxsOiAjYzBlMGYxOyYjeGE7ICAgICAgfSYjeGE7JiN4YTsgICAgICAuY2xzLTMsIC5jbHMtNSwgLmNscy02IHsmI3hhOyAgICAgICAgc3Ryb2tlLWxpbmVjYXA6IHJvdW5kOyYjeGE7ICAgICAgICBzdHJva2Utd2lkdGg6IDYuNzVweDsmI3hhOyAgICAgIH0mI3hhOyYjeGE7ICAgICAgLmNscy00IHsmI3hhOyAgICAgICAgc3Ryb2tlLXdpZHRoOiA0Ljc5cHg7JiN4YTsgICAgICB9JiN4YTsmI3hhOyAgICAgIC5jbHMtOSwgLmNscy03LCAuY2xzLTggeyYjeGE7ICAgICAgICBzdHJva2Utd2lkdGg6IDBweDsmI3hhOyAgICAgIH0mI3hhOyYjeGE7ICAgICAgLmNscy05LCAuY2xzLTUgeyYjeGE7ICAgICAgICBmaWxsOiAjNGVhZGRhOyYjeGE7ICAgICAgfSYjeGE7JiN4YTsgICAgICAuY2xzLTYgeyYjeGE7ICAgICAgICBmaWxsOiAjZjJmMmYyOyYjeGE7ICAgICAgfSYjeGE7ICAgIDwvc3R5bGU+JiN4YTsgIDwvZGVmcz4mI3hhOyAgPGc+JiN4YTsgICAgPGc+JiN4YTsgICAgICA8Y2lyY2xlIHI9IjMxLjA4IiBjeT0iMTA0LjYyIiBjeD0iMTk5LjI3IiBjbGFzcz0iY2xzLTMiLz4mI3hhOyAgICAgIDxwYXRoIGQ9Im0xNTQuMDMsMTc4LjAxYzAtMjUuMjEsMjAuNDMtNDIuMzEsNDUuNjQtNDIuMzFzNDUuNjQsMTcuMSw0NS42NCw0Mi4zMSIgY2xhc3M9ImNscy0zIi8+JiN4YTsgICAgPC9nPiYjeGE7ICAgIDxnPiYjeGE7ICAgICAgPGNpcmNsZSByPSIzMS4wOCIgY3k9IjEwMy44NiIgY3g9IjEwNC40MSIgY2xhc3M9ImNscy02Ii8+JiN4YTsgICAgICA8cGF0aCBkPSJtNTkuMTYsMTc3LjI2YzAtMjUuMjEsMjAuNDMtNDIuMzEsNDUuNjQtNDIuMzFzNDUuNjQsMTcuMSw0NS42NCw0Mi4zMSIgY2xhc3M9ImNscy02Ii8+JiN4YTsgICAgPC9nPiYjeGE7ICAgIDxwYXRoIGQ9Im0yNDUuMzcsMTgxLjQzYzAtMTYuNTItMi44Mi0zMC45My0xNS4wNy0zNS43MS03LjM1LTIuODctNy40MiwzLjYxLTMwLjk5LDMuNjEtMjIuMjYsMC0yMS43OC04LjY3LTI5LjY4LTQuOTctMTAuODQsNS4wOC0xNi43NywyMS43OC0xNi43NywzNy4wNyIgY2xhc3M9ImNscy03Ii8+JiN4YTsgICAgPGc+JiN4YTsgICAgICA8Y2lyY2xlIHI9IjMxLjA4IiBjeT0iMTA0LjYyIiBjeD0iMjk0Ljk2IiBjbGFzcz0iY2xzLTUiLz4mI3hhOyAgICAgIDxwYXRoIGQ9Im0yNDkuNzEsMTc4LjAxYzAtMjUuMjEsMjAuNDMtNDIuMzEsNDUuNjQtNDIuMzFzNDUuNjQsMTcuMSw0NS42NCw0Mi4zMSIgY2xhc3M9ImNscy01Ii8+JiN4YTsgICAgPC9nPiYjeGE7ICAgIDxwYXRoIGQ9Im0zNDEuMDUsMTgxLjQzYzAtMTYuNTItMi44Mi0zMC45My0xNS4wNy0zNS43MS03LjM1LTIuODctNy40MiwzLjYxLTMwLjk5LDMuNjEtMjIuMjYsMC0yMS43OC04LjY3LTI5LjY4LTQuOTctMTAuODQsNS4wOC0xNi43NywyMS43OC0xNi43NywzNy4wNyIgY2xhc3M9ImNscy03Ii8+JiN4YTsgICAgPHBhdGggZD0ibTE1MS4wMSwxODAuOTVjMC0xNi42Ni0yLjg1LTMxLjIxLTE1LjItMzYuMDItNy40MS0yLjg5LTcuNDgsMy42NC0zMS4yNiwzLjY0LTIyLjQ1LDAtMjEuOTctOC43NS0yOS45NC01LjAxLTEwLjkzLDUuMTMtMTUuNjcsMjEuNTgtMTUuNjcsMzciIGNsYXNzPSJjbHMtNyIvPiYjeGE7ICA8L2c+JiN4YTsgIDxwYXRoIGQ9Im00MC40NywxODQuMDNoMzE5LjA1djExMC4yYzAsMTguMjEtMTQuNzgsMzIuOTktMzIuOTksMzIuOTlINzMuNDZjLTE4LjIxLDAtMzIuOTktMTQuNzgtMzIuOTktMzIuOTl2LTExMC4yaDBaIiBjbGFzcz0iY2xzLTgiLz4mI3hhOyAgPHJlY3Qgcnk9IjcuMzgiIHJ4PSI3LjM4IiBoZWlnaHQ9IjMwLjI3IiB3aWR0aD0iMzcyLjI1IiB5PSIxNzUuMzYiIHg9IjEzLjg4IiBjbGFzcz0iY2xzLTkiLz4mI3hhOyAgPGc+JiN4YTsgICAgPGxpbmUgeTI9IjI2Ni4xNSIgeDI9IjI1Ny41NyIgeTE9IjIyNS44NiIgeDE9IjIzNy4wMiIgY2xhc3M9ImNscy0yIi8+JiN4YTsgICAgPHBhdGggZD0ibTI1Ny40NywyNjYuMjFjMCw3LjYxLTkuMTMsMTMuNzgtMjAuMzgsMTMuNzhzLTIwLjM4LTYuMTctMjAuMzgtMTMuNzhoNDAuNzZaIiBjbGFzcz0iY2xzLTEiLz4mI3hhOyAgICA8cGF0aCBkPSJtMTgzLjE5LDI2Ni4yMWMwLDcuNjEtOS4xMywxMy43OC0yMC4zOCwxMy43OHMtMjAuMzgtNi4xNy0yMC4zOC0xMy43OGg0MC43NloiIGNsYXNzPSJjbHMtMSIvPiYjeGE7ICAgIDxsaW5lIHkyPSIzMDIuNzUiIHgyPSIxOTkuOTUiIHkxPSIyMjUuOTIiIHgxPSIxOTkuOTUiIGNsYXNzPSJjbHMtNCIvPiYjeGE7ICAgIDxsaW5lIHkyPSIyNjYuMTUiIHgyPSIxNDIuNSIgeTE9IjIyNi4wMyIgeDE9IjE2Mi44OCIgY2xhc3M9ImNscy0yIi8+JiN4YTsgICAgPHBhdGggZD0ibTIyNS40NSwzMTAuNTNoLTUwLjgzYy0uMiwwLS4yOC0uMjUtLjEyLS4zN2w5LjgxLTcuMzZzLjA4LS4wNC4xMi0uMDRoMzEuMnMuMDkuMDEuMTIuMDRsOS44MSw3LjM2Yy4xNi4xMi4wNy4zNy0uMTIuMzdaIiBjbGFzcz0iY2xzLTEiLz4mI3hhOyAgICA8Y2lyY2xlIHI9IjIuNDgiIGN5PSIyMjQuOTYiIGN4PSIxOTkuOTUiIGNsYXNzPSJjbHMtNyIvPiYjeGE7ICAgIDxwb2x5Z29uIHBvaW50cz0iMjM3LjYzIDIyNC44MiAxNjIuMjQgMjI1IDE2MS43MiAyMjYuMDMgMTgyLjMxIDI2Ni42MSAxODQuMTYgMjY1LjY4IDE2NC41NyAyMjcuMDcgMjM1LjMzIDIyNi45IDIxNS43NCAyNjUuNjggMjE3LjU5IDI2Ni42MSAyMzguMTcgMjI1Ljg4IDIzNy42MyAyMjQuODIiIGNsYXNzPSJjbHMtNyIvPiYjeGE7ICA8L2c+JiN4YTs8L3N2Zz4=", - "w": 400, - "h": 400, - "title": "Data-Access-Committee", - "aspect": "fixed" - }, - { - "data": "data:image/svg+xml;base64,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", - "w": 400, - "h": 400, - "title": "Data-Access-Request", - "aspect": "fixed" - }, - { - "data": "data:image/svg+xml;base64,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", - "w": 400, - "h": 400, - "title": "Data-Curator", - "aspect": "fixed" - }, - { - "data": "data:image/svg+xml;base64,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", - "w": 400, - "h": 400, - "title": "Data-donor", - "aspect": "fixed" - }, - { - "data": "data:image/svg+xml;base64,PHN2ZyB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciIHZpZXdCb3g9IjAgMCA0MDAgNDAwIiBkYXRhLW5hbWU9IkxheWVyIDEiIGlkPSJMYXllcl8xIj4mI3hhOyAgPGRlZnM+JiN4YTsgICAgPHN0eWxlPiYjeGE7ICAgICAgLmNscy0xIHsmI3hhOyAgICAgICAgc3Ryb2tlLWxpbmVjYXA6IHJvdW5kOyYjeGE7ICAgICAgfSYjeGE7JiN4YTsgICAgICAuY2xzLTEsIC5jbHMtMiB7JiN4YTsgICAgICAgIGZpbGw6IG5vbmU7JiN4YTsgICAgICAgIHN0cm9rZTogIzlmNzliMDsmI3hhOyAgICAgICAgc3Ryb2tlLW1pdGVybGltaXQ6IDEwOyYjeGE7ICAgICAgICBzdHJva2Utd2lkdGg6IDE4cHg7JiN4YTsgICAgICB9JiN4YTsgICAgPC9zdHlsZT4mI3hhOyAgPC9kZWZzPiYjeGE7ICA8Y2lyY2xlIHI9IjE2OC40OSIgY3k9IjIwMCIgY3g9IjIwMCIgY2xhc3M9ImNscy0yIi8+JiN4YTsgIDxsaW5lIHkyPSIyNzQuOTIiIHgyPSIyMDAiIHkxPSIxMDQuMjciIHgxPSIyMDAiIGNsYXNzPSJjbHMtMSIvPiYjeGE7ICA8cG9seWxpbmUgcG9pbnRzPSIxMjIuODcgMjE4LjkxIDE5OC42IDI5NC42NCAyNzMuNDYgMjE5Ljc4IiBjbGFzcz0iY2xzLTEiLz4mI3hhOzwvc3ZnPg==", - "w": 400, - "h": 400, - "title": "Download", - "aspect": "fixed" - }, - { - "data": "data:image/svg+xml;base64,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", - "w": 400, - "h": 400, - "title": "Find-datasets", - "aspect": "fixed" - }, - { - "data": "data:image/svg+xml;base64,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", - "w": 400, - "h": 400, - "title": "Lock", - "aspect": "fixed" - }, - { - "data": "data:image/svg+xml;base64,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", - "w": 400, - "h": 400, - "title": "Magnifying-glass", - "aspect": "fixed" - }, - { - "data": "data:image/svg+xml;base64,<svg xmlns:xlink="http://www.w3.org/1999/xlink" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 400 400" data-name="Layer 1" id="Layer_1">&#xa;  <defs>&#xa;    <style>&#xa;      .cls-1 {&#xa;        filter: url(#drop-shadow-2);&#xa;      }&#xa;&#xa;      .cls-2 {&#xa;        fill: #f2f2f2;&#xa;      }&#xa;&#xa;      .cls-2, .cls-3, .cls-4, .cls-5, .cls-6, .cls-7, .cls-8, .cls-9, .cls-10, .cls-11 {&#xa;        stroke-width: 0px;&#xa;      }&#xa;&#xa;      .cls-3 {&#xa;        fill: #faa633;&#xa;      }&#xa;&#xa;      .cls-4 {&#xa;        fill: #76787a;&#xa;      }&#xa;&#xa;      .cls-5 {&#xa;        fill: #4faedc;&#xa;      }&#xa;&#xa;      .cls-6 {&#xa;        fill: #1b75bb;&#xa;      }&#xa;&#xa;      .cls-7 {&#xa;        fill: #ccc;&#xa;      }&#xa;&#xa;      .cls-8 {&#xa;        fill: #b3b3b3;&#xa;      }&#xa;&#xa;      .cls-9 {&#xa;        fill: #8cc63e;&#xa;      }&#xa;&#xa;      .cls-10 {&#xa;        fill: #fff;&#xa;      }&#xa;&#xa;      .cls-11 {&#xa;        fill: #e6e6e6;&#xa;      }&#xa;    </style>&#xa;    <filter filterUnits="userSpaceOnUse" id="drop-shadow-2">&#xa;      <feOffset dy="0" dx="-7.66"/>&#xa;      <feGaussianBlur stdDeviation="95.79" result="blur"/>&#xa;      <feFlood flood-opacity=".25" flood-color="#000"/>&#xa;      <feComposite operator="in" in2="blur"/>&#xa;      <feComposite in="SourceGraphic"/>&#xa;    </filter>&#xa;  </defs>&#xa;  <g class="cls-1">&#xa;    <g>&#xa;      <path d="m297.88,24.31L64.14,56.38c-3.62.5-6.47,3.35-6.96,6.97l-18.72,138.68,244.07-33.49c.7-.1,1.26-.64,1.38-1.33l23.09-133.45c.94-5.42-3.67-10.19-9.12-9.45Z" class="cls-6"/>&#xa;      <path d="m37.94,202.56l.08-.59L56.74,63.29c.51-3.81,3.53-6.84,7.34-7.36l233.74-32.08.06.45-.06-.45c2.74-.38,5.42.55,7.34,2.54,1.92,1.99,2.76,4.7,2.28,7.43l-23.09,133.45c-.16.9-.86,1.58-1.76,1.7l-244.65,33.57ZM297.94,24.75L64.2,56.83c-3.41.47-6.11,3.18-6.57,6.59l-18.64,138.09,243.48-33.41c.51-.07.91-.46,1-.97l23.09-133.45c.42-2.44-.32-4.87-2.04-6.65-1.72-1.78-4.12-2.61-6.57-2.28h0Z" class="cls-6"/>&#xa;    </g>&#xa;    <g>&#xa;      <rect transform="translate(-35.38 26.1) rotate(-7.81)" ry="4.54" rx="4.54" height="175.49" width="248.36" y="184.33" x="49.24" class="cls-2"/>&#xa;      <path d="m65.6,376.22c-1.01,0-1.99-.33-2.81-.95-.99-.75-1.63-1.85-1.8-3.08l-23.28-169.67c-.04-.32.04-.63.23-.89.19-.26.47-.42.79-.46l245.29-33.66c.32-.04.63.04.89.23.26.19.42.48.46.79l23.28,169.67c.17,1.23-.15,2.46-.9,3.45-.75.99-1.85,1.63-3.08,1.8h0l-238.43,32.72c-.21.03-.43.04-.64.04Zm-26.22-173.5l23.23,169.25c.11.8.53,1.51,1.17,2,.64.49,1.44.7,2.25.59l238.43-32.72.11.81-.11-.81c.8-.11,1.51-.53,2-1.17.49-.65.7-1.44.59-2.25l-23.23-169.25-244.44,33.55Z" class="cls-6"/>&#xa;    </g>&#xa;    <polygon points="320.77 38.9 85.58 71.22 38.47 200.88 284.52 167.11 320.77 38.9" class="cls-11"/>&#xa;    <path d="m330.94,324.59l-232.08,30.71c-3.54.47-6.9-1.69-7.95-5.1l-51.65-149.42,245.25-33.66,52.44,148.03c1.37,4.33-1.51,8.85-6.01,9.44Z" class="cls-8"/>&#xa;    <g>&#xa;      <path d="m300.26,319.51l-172.63,21.66c-8.25,1.04-16.83-3.27-19.15-9.62l-30.02-82.05c-2.32-6.35,2.49-12.33,10.74-13.37l172.63-21.66c8.25-1.04,16.83,3.27,19.15,9.62l30.02,82.05c2.32,6.35-2.49,12.33-10.74,13.37Z" class="cls-10"/>&#xa;      <path d="m300.26,319.51l-172.63,21.66c-8.25,1.04-16.83-3.27-19.15-9.62l-.49-1.34,202.52-25.41.49,1.34c2.32,6.35-2.49,12.33-10.74,13.37Z" class="cls-7"/>&#xa;      <path d="m283.59,231.22l-202.52,25.41-2.61-7.13c-2.32-6.35,2.49-12.33,10.74-13.37l172.63-21.66c8.25-1.04,16.83,3.27,19.15,9.62l2.61,7.13Z" class="cls-5"/>&#xa;      <g>&#xa;        <path d="m184.22,255.61c-.99,0-1.85-.74-1.98-1.75-.14-1.09.64-2.09,1.73-2.23l90.1-11.31c1.09-.14,2.09.64,2.23,1.73.14,1.09-.64,2.09-1.73,2.23l-90.1,11.31c-.08.01-.17.02-.25.02Z" class="cls-4"/>&#xa;        <path d="m191.88,276.56c-.99,0-1.85-.74-1.98-1.75-.14-1.09.64-2.09,1.73-2.23l90.1-11.31c1.1-.14,2.09.64,2.23,1.73.14,1.09-.64,2.09-1.73,2.23l-90.1,11.31c-.08.01-.17.02-.25.02Z" class="cls-4"/>&#xa;        <path d="m194.39,283.4c-.99,0-1.85-.74-1.98-1.75-.14-1.09.64-2.09,1.73-2.23l52.98-6.65c1.09-.14,2.09.64,2.23,1.73.14,1.09-.64,2.09-1.73,2.23l-52.98,6.65c-.08.01-.17.02-.25.02Z" class="cls-7"/>&#xa;        <path d="m199.44,297.21c-.99,0-1.85-.74-1.98-1.75-.14-1.09.64-2.09,1.73-2.23l90.1-11.31c1.09-.14,2.09.64,2.23,1.73.14,1.09-.64,2.09-1.73,2.23l-90.1,11.31c-.08.01-.17.02-.25.02Z" class="cls-4"/>&#xa;        <path d="m201.94,304.05c-.99,0-1.85-.74-1.98-1.75-.14-1.09.64-2.09,1.73-2.23l90.1-11.31c1.09-.14,2.09.64,2.23,1.73.14,1.09-.64,2.09-1.73,2.23l-90.1,11.31c-.08.01-.17.02-.25.02Z" class="cls-7"/>&#xa;        <path d="m204.4,310.77c-.99,0-1.85-.74-1.98-1.75-.14-1.09.64-2.09,1.73-2.23l67.83-8.51c1.09-.14,2.09.64,2.23,1.73.14,1.09-.64,2.09-1.73,2.23l-67.83,8.51c-.08.01-.17.02-.25.02Z" class="cls-7"/>&#xa;        <path d="m186.61,262.14c-.99,0-1.85-.74-1.98-1.75-.14-1.09.64-2.09,1.73-2.23l82.68-10.37c1.1-.14,2.09.64,2.23,1.73.14,1.09-.64,2.09-1.73,2.23l-82.68,10.37c-.08.01-.17.02-.25.02Z" class="cls-7"/>&#xa;      </g>&#xa;      <path d="m123.39,335.58c-.33,0-.62-.25-.66-.58-.05-.37.21-.7.58-.74l41.34-5.19c.37-.04.7.21.74.58.05.37-.21.7-.58.74l-41.34,5.19s-.06,0-.08,0Z" class="cls-10"/>&#xa;      <path d="m172.15,329.46c-.33,0-.62-.25-.66-.58-.05-.37.21-.7.58-.74l85.89-10.78c.37-.05.7.21.74.58.05.37-.21.7-.58.74l-85.89,10.78s-.06,0-.08,0Z" class="cls-10"/>&#xa;      <path d="m264.89,317.82c-.33,0-.62-.25-.66-.58-.05-.37.21-.7.58-.74l33.91-4.26c.37-.05.7.21.74.58.05.37-.21.7-.58.74l-33.91,4.26s-.06,0-.08,0Z" class="cls-10"/>&#xa;      <path d="m125.18,342.58c-7.93,0-15.63-4.41-17.89-10.59l-30.01-82.05c-1.1-3-.81-6.1.8-8.75,2.07-3.39,6.06-5.68,10.97-6.3l172.63-21.66c8.79-1.1,17.98,3.58,20.49,10.43l30.01,82.05c1.1,3,.81,6.1-.8,8.75-2.07,3.39-6.06,5.68-10.97,6.3h0l-172.63,21.66c-.86.11-1.73.16-2.6.16Zm139.15-127c-.78,0-1.56.05-2.34.15l-172.63,21.66c-4.14.52-7.47,2.38-9.14,5.12-1.22,2-1.42,4.28-.58,6.57l30.01,82.05c2.13,5.82,10.12,9.77,17.81,8.8l172.63-21.66c4.14-.52,7.47-2.38,9.14-5.12,1.22-2,1.42-4.28.58-6.57l-30.02-82.05c-1.91-5.23-8.56-8.95-15.47-8.95Z" class="cls-5"/>&#xa;      <g>&#xa;        <path d="m124.73,265.03l5.21-5.69c.2-.22.6-.26.92-.1l8.57,4.17c.2.1.44.12.65.06l8.56-2.54c.32-.1.72.02.92.28l5.24,6.68c.12.16.33.27.56.3l9.61,1.28c.36.05.66.3.68.58l.5,7.4c.01.18.13.35.32.46l8.09,4.76c.31.18.41.5.25.73l-4.37,6.14c-.1.15-.1.33,0,.5l4.4,6.97c.17.26.06.56-.25.68l-8.07,3.23c-.19.08-.31.22-.32.4l-.47,7.31c-.02.28-.31.47-.67.45l-9.61-.54c-.23-.01-.44.06-.56.19l-5.21,5.69c-.2.22-.6.26-.92.1l-8.57-4.17c-.2-.1-.44-.12-.65-.06l-8.56,2.54c-.32.1-.72-.02-.92-.28l-5.24-6.68c-.12-.16-.33-.27-.56-.3l-9.61-1.28c-.36-.05-.66-.3-.68-.58l-.5-7.4c-.01-.18-.13-.35-.32-.46l-8.09-4.76c-.31-.18-.41-.5-.25-.73l4.37-6.14c.1-.15.1-.33,0-.5l-4.4-6.97c-.17-.26-.06-.56.25-.68l8.07-3.23c.19-.08.31-.22.32-.4l.47-7.31c.02-.28.31-.47.67-.45l9.61.54c.23.01.44-.06.56-.19Z" class="cls-5"/>&#xa;        <path d="m143.17,303.46l-17.91-7.56c-1.28-.54-1.88-2.01-1.34-3.29.54-1.28,2.01-1.88,3.29-1.34l13.32,5.62,9.66-22.23c.55-1.27,2.03-1.86,3.31-1.3,1.27.55,1.86,2.03,1.3,3.31l-11.64,26.8Z" class="cls-10"/>&#xa;      </g>&#xa;    </g>&#xa;    <path d="m355.95,259.19l-232.08,30.71c-3.54.47-6.9-1.69-7.95-5.1l-76.65-84.03,245.25-33.66,77.44,82.64c1.37,4.33-1.51,8.85-6.01,9.44Z" class="cls-7"/>&#xa;    <g>&#xa;      <path d="m330.82,256.79l-171.78,21.76c-8.21,1.04-18.66-2.01-23.34-6.82l-60.45-62.13c-4.68-4.81-1.81-9.55,6.41-10.59l171.78-21.76c8.21-1.04,18.66,2.01,23.34,6.82l60.45,62.13c4.68,4.81,1.81,9.55-6.41,10.59Z" class="cls-10"/>&#xa;      <path d="m330.82,256.79l-171.78,21.76c-8.21,1.04-18.66-2.01-23.34-6.82l-.98-1.01,201.52-25.53.98,1.01c4.68,4.81,1.81,9.55-6.41,10.59Z" class="cls-7"/>&#xa;      <path d="m282.03,189.47l-201.52,25.53-5.25-5.4c-4.68-4.81-1.81-9.55,6.41-10.59l171.78-21.76c8.21-1.04,18.66,2.01,23.34,6.82l5.25,5.4Z" class="cls-3"/>&#xa;      <g>&#xa;        <path d="m186.69,211.41c-.89,0-1.67-.66-1.78-1.57-.12-.98.57-1.88,1.56-2.01l89.66-11.36c.99-.13,1.88.57,2.01,1.56.12.98-.57,1.88-1.56,2.01l-89.66,11.36c-.08,0-.15.01-.23.01Z" class="cls-4"/>&#xa;        <path d="m202.12,227.28c-.89,0-1.67-.66-1.78-1.57-.12-.98.57-1.88,1.56-2.01l89.66-11.36c.99-.13,1.88.57,2.01,1.56.12.98-.57,1.88-1.56,2.01l-89.66,11.36c-.08,0-.15.01-.23.01Z" class="cls-4"/>&#xa;        <path d="m207.16,232.46c-.89,0-1.67-.66-1.78-1.57-.12-.98.57-1.88,1.56-2.01l52.72-6.68c.98-.13,1.88.57,2.01,1.56.12.98-.57,1.88-1.56,2.01l-52.72,6.68c-.08,0-.15.01-.23.01Z" class="cls-7"/>&#xa;        <path d="m217.34,242.92c-.89,0-1.67-.66-1.78-1.57-.12-.98.57-1.88,1.56-2.01l89.66-11.36c.98-.13,1.88.57,2.01,1.56.12.98-.57,1.88-1.56,2.01l-89.66,11.36c-.08,0-.15.01-.23.01Z" class="cls-4"/>&#xa;        <path d="m222.38,248.1c-.89,0-1.67-.66-1.78-1.57-.12-.98.57-1.88,1.56-2.01l89.66-11.36c.99-.13,1.88.57,2.01,1.56.12.98-.57,1.88-1.56,2.01l-89.66,11.36c-.08,0-.15.01-.23.01Z" class="cls-7"/>&#xa;        <path d="m227.33,253.18c-.89,0-1.67-.66-1.78-1.57-.12-.98.57-1.88,1.56-2.01l67.49-8.55c.98-.13,1.88.57,2.01,1.56.12.98-.57,1.88-1.56,2.01l-67.49,8.55c-.08,0-.15.01-.23.01Z" class="cls-7"/>&#xa;        <path d="m191.5,216.36c-.89,0-1.67-.66-1.78-1.57-.12-.98.57-1.88,1.56-2.01l82.27-10.42c.99-.13,1.88.57,2.01,1.56.12.98-.57,1.88-1.56,2.01l-82.27,10.42c-.08,0-.15.01-.23.01Z" class="cls-7"/>&#xa;      </g>&#xa;      <path d="m152.41,274.47c-.3,0-.56-.22-.59-.52-.04-.33.19-.63.52-.67l41.14-5.21c.33-.04.63.19.67.52.04.33-.19.63-.52.67l-41.14,5.21s-.05,0-.08,0Z" class="cls-10"/>&#xa;      <path d="m200.93,268.32c-.3,0-.56-.22-.59-.52-.04-.33.19-.63.52-.67l85.46-10.83c.33-.04.63.19.67.52.04.33-.19.63-.52.67l-85.46,10.83s-.05,0-.08,0Z" class="cls-10"/>&#xa;      <path d="m293.22,256.63c-.3,0-.56-.22-.59-.52-.04-.33.19-.63.52-.67l33.75-4.27c.33-.04.63.19.67.52.04.33-.19.63-.52.67l-33.75,4.27s-.05,0-.08,0Z" class="cls-10"/>&#xa;      <path d="m155.75,279.88c-7.82,0-16.61-2.99-20.85-7.36l-60.45-62.13c-2.25-2.31-3.06-4.82-2.27-7.05.99-2.83,4.4-4.81,9.35-5.44l171.78-21.76c8.51-1.08,19.41,2.13,24.29,7.15l60.45,62.13c2.25,2.31,3.06,4.82,2.27,7.05-.99,2.83-4.4,4.81-9.35,5.44l-171.78,21.76c-1.11.14-2.27.21-3.44.21Zm101.07-101.7c-1.11,0-2.19.06-3.24.2l-171.78,21.76c-4.01.51-6.81,1.98-7.5,3.95-.62,1.78.61,3.55,1.76,4.73l60.45,62.13c4.45,4.58,14.49,7.49,22.39,6.49l171.78-21.76.14,1.12-.14-1.12c4.01-.51,6.81-1.98,7.5-3.95.62-1.78-.61-3.55-1.76-4.73l-60.45-62.13c-3.86-3.97-11.92-6.68-19.14-6.68Z" class="cls-3"/>&#xa;      <g>&#xa;        <path d="m128.89,220.15l3.39-4.52c.13-.17.53-.22.92-.11l10.4,2.95c.25.07.51.08.7.03l7.99-2.21c.3-.08.76,0,1.06.18l7.83,4.97c.19.12.44.2.69.21l10.45.7c.4.03.79.21.91.43l3.16,5.67c.07.13.26.26.5.34l10.11,3.42c.38.13.61.37.52.55l-2.36,4.84c-.06.11.01.26.18.38l7.06,5.22c.27.2.26.43-.01.53l-7.24,2.72c-.17.06-.24.18-.19.32l2.12,5.63c.08.21-.15.37-.54.37l-10.19-.13c-.24,0-.43.06-.51.17l-3.39,4.52c-.13.17-.53.22-.92.11l-10.4-2.95c-.25-.07-.51-.08-.7-.03l-7.99,2.21c-.3.08-.76,0-1.06-.18l-7.83-4.97c-.19-.12-.44-.2-.69-.21l-10.45-.7c-.4-.03-.79-.21-.91-.43l-3.16-5.67c-.07-.13-.26-.26-.5-.34l-10.11-3.42c-.38-.13-.61-.37-.52-.55l2.36-4.84c.06-.11-.01-.26-.18-.38l-7.06-5.22c-.27-.2-.26-.43.01-.53l7.24-2.72c.17-.06.24-.18.19-.32l-2.12-5.63c-.08-.21.15-.37.54-.37l10.19.13c.24,0,.43-.06.51-.17Z" class="cls-3"/>&#xa;        <path d="m161.17,249.45l-21.06-5.21c-1.21-.3-1.95-1.53-1.65-2.74.3-1.21,1.53-1.95,2.74-1.65l16.11,3.99,2.03-16.61c.15-1.24,1.29-2.12,2.52-1.97,1.24.15,2.12,1.28,1.97,2.52l-2.64,21.68Z" class="cls-10"/>&#xa;      </g>&#xa;    </g>&#xa;    <g>&#xa;      <path d="m250.5,163.85l-168.81,23.54c-8.07,1.13-12.93-3.3-10.84-9.89l26.95-85.13c2.09-6.58,10.32-12.84,18.39-13.96l168.81-23.54c8.07-1.13,12.93,3.3,10.84,9.89l-26.95,85.13c-2.09,6.58-10.32,12.84-18.39,13.96Z" class="cls-10"/>&#xa;      <path d="m250.5,163.85l-168.81,23.54c-8.07,1.13-12.93-3.3-10.84-9.89l.44-1.39,198.05-27.61-.44,1.39c-2.09,6.58-10.32,12.84-18.39,13.96Z" class="cls-11"/>&#xa;      <path d="m293.51,72.16l-198.05,27.61,2.34-7.4c2.09-6.58,10.32-12.84,18.39-13.96l168.81-23.54c8.07-1.13,12.93,3.3,10.84,9.89l-2.34,7.4Z" class="cls-9"/>&#xa;      <g>&#xa;        <path d="m189.82,97.94c-.94,0-1.77-.7-1.9-1.66-.15-1.05.59-2.02,1.64-2.17l88.11-12.28c1.06-.15,2.02.59,2.17,1.64.15,1.05-.59,2.02-1.64,2.17l-88.11,12.28c-.09.01-.18.02-.27.02Z" class="cls-4"/>&#xa;        <path d="m182.94,119.68c-.94,0-1.77-.7-1.9-1.66-.15-1.05.59-2.02,1.64-2.17l88.11-12.28c1.05-.15,2.02.59,2.17,1.64.15,1.05-.59,2.02-1.64,2.17l-88.11,12.28c-.09.01-.18.02-.27.02Z" class="cls-4"/>&#xa;        <path d="m180.7,126.77c-.94,0-1.77-.7-1.9-1.66-.15-1.05.59-2.02,1.64-2.17l51.81-7.22c1.05-.15,2.02.59,2.17,1.64.15,1.05-.59,2.02-1.64,2.17l-51.81,7.22c-.09.01-.18.02-.27.02Z" class="cls-7"/>&#xa;        <path d="m176.16,141.11c-.94,0-1.77-.7-1.9-1.66-.15-1.05.59-2.02,1.64-2.17l88.11-12.28c1.06-.15,2.02.59,2.17,1.64.15,1.05-.59,2.02-1.64,2.17l-88.11,12.28c-.09.01-.18.02-.27.02Z" class="cls-4"/>&#xa;        <path d="m173.91,148.2c-.94,0-1.77-.7-1.9-1.66-.15-1.05.59-2.02,1.64-2.17l88.11-12.28c1.05-.15,2.02.59,2.17,1.64.15,1.05-.59,2.02-1.64,2.17l-88.11,12.28c-.09.01-.18.02-.27.02Z" class="cls-7"/>&#xa;        <path d="m171.7,155.17c-.94,0-1.77-.7-1.9-1.66-.15-1.05.59-2.02,1.64-2.17l66.33-9.25c1.05-.15,2.02.59,2.17,1.64.15,1.05-.59,2.02-1.64,2.17l-66.33,9.25c-.09.01-.18.02-.27.02Z" class="cls-7"/>&#xa;        <path d="m187.68,104.72c-.94,0-1.77-.7-1.9-1.66-.15-1.05.59-2.02,1.64-2.17l80.85-11.27c1.06-.15,2.02.59,2.17,1.64.15,1.05-.59,2.02-1.64,2.17l-80.85,11.27c-.09.01-.18.02-.27.02Z" class="cls-7"/>&#xa;      </g>&#xa;      <path d="m82,181.55c-.31,0-.59-.23-.63-.55-.05-.35.2-.67.55-.72l40.42-5.64c.35-.05.67.2.72.55.05.35-.2.67-.55.72l-40.42,5.64s-.06,0-.09,0Z" class="cls-10"/>&#xa;      <path d="m129.68,174.9c-.31,0-.59-.23-.63-.55-.05-.35.2-.67.55-.72l83.99-11.71c.35-.05.67.2.72.55.05.35-.2.67-.55.72l-83.99,11.71s-.06,0-.09,0Z" class="cls-10"/>&#xa;      <path d="m220.38,162.26c-.31,0-.59-.23-.63-.55-.05-.35.2-.67.55-.72l33.16-4.62c.36-.05.68.2.72.55.05.35-.2.67-.55.72l-33.16,4.62s-.06,0-.09,0Z" class="cls-10"/>&#xa;      <path d="m79.28,189c-3.65,0-6.68-1.17-8.52-3.35-1.88-2.23-2.34-5.28-1.29-8.59l26.95-85.13c2.27-7.17,10.87-13.74,19.57-14.95l168.81-23.54c4.8-.67,8.86.48,11.12,3.16,1.88,2.23,2.34,5.28,1.29,8.59l-26.95,85.13c-2.27,7.17-10.87,13.74-19.57,14.95l-.2-1.43.2,1.43-168.81,23.54c-.9.13-1.77.19-2.61.19ZM287.44,56.14c-.71,0-1.46.05-2.23.16l-168.81,23.54c-7.56,1.05-15.29,6.87-17.22,12.97l-26.95,85.13c-.75,2.36-.49,4.39.75,5.86,1.61,1.91,4.72,2.7,8.52,2.17l168.81-23.54c7.56-1.05,15.28-6.87,17.22-12.97l26.95-85.13c.75-2.36.49-4.39-.75-5.86-1.28-1.52-3.51-2.33-6.28-2.33Z" class="cls-9"/>&#xa;      <g>&#xa;        <path d="m129.05,108.24l8.4-5.94c.32-.23.7-.27.89-.11l4.94,4.29c.12.1.32.12.54.06l9.33-2.69c.35-.1.63.02.64.28l.31,6.91c0,.16.12.28.31.31l7.77,1.28c.29.05.39.31.22.6l-4.41,7.69c-.1.18-.11.36-.01.48l4.12,4.9c.16.19.05.51-.26.76l-7.94,6.4c-.19.15-.31.34-.32.52l-.63,7.22c-.02.27-.31.58-.67.71l-9.35,3.4c-.22.08-.43.24-.55.42l-5.21,7.6c-.2.29-.59.49-.9.47l-8.25-.51c-.2-.01-.43.06-.63.21l-8.4,5.94c-.32.23-.7.27-.89.11l-4.94-4.29c-.12-.1-.32-.12-.54-.06l-9.33,2.69c-.35.1-.63-.02-.64-.28l-.31-6.91c0-.16-.12-.28-.31-.31l-7.77-1.28c-.29-.05-.39-.31-.22-.6l4.41-7.69c.1-.18.11-.36.01-.48l-4.12-4.9c-.16-.19-.05-.51.26-.76l7.94-6.4c.19-.15.31-.34.32-.52l.63-7.22c.02-.27.31-.58.67-.71l9.35-3.4c.22-.08.43-.24.55-.42l5.21-7.6c.2-.29.59-.49.9-.47l8.25.51c.2.01.43-.06.63-.21Z" class="cls-9"/>&#xa;        <path d="m121.61,147.83l-11.32-7.92c-1.09-.77-1.36-2.28-.6-3.37.77-1.09,2.27-1.36,3.37-.6l8,5.6,24.19-24.12c.95-.94,2.48-.94,3.42,0,.94.95.94,2.48,0,3.42l-27.06,26.98Z" class="cls-10"/>&#xa;      </g>&#xa;    </g>&#xa;  </g>&#xa;</svg>", - "w": 400, - "h": 400, - "title": "Passport-Broker", - "aspect": "fixed" - }, - { - "data": "data:image/svg+xml;base64,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", - "w": 400, - "h": 400, - "title": "Passport-clearinghouse", - "aspect": "fixed" - }, - { - "data": "data:image/svg+xml;base64,<svg xmlns:xlink="http://www.w3.org/1999/xlink" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 400 400" data-name="Layer 1" id="Layer_1">&#xa;  <defs>&#xa;    <style>&#xa;      .cls-1 {&#xa;        filter: url(#drop-shadow-1);&#xa;      }&#xa;&#xa;      .cls-2 {&#xa;        fill: #f2f2f2;&#xa;      }&#xa;&#xa;      .cls-2, .cls-3, .cls-4, .cls-5, .cls-6, .cls-7, .cls-8 {&#xa;        stroke-width: 0px;&#xa;      }&#xa;&#xa;      .cls-3 {&#xa;        fill: #faa633;&#xa;      }&#xa;&#xa;      .cls-4 {&#xa;        fill: #76787a;&#xa;      }&#xa;&#xa;      .cls-5 {&#xa;        fill: #1b75bb;&#xa;      }&#xa;&#xa;      .cls-6 {&#xa;        fill: #ccc;&#xa;      }&#xa;&#xa;      .cls-7 {&#xa;        fill: #fff;&#xa;      }&#xa;&#xa;      .cls-8 {&#xa;        fill: #e6e6e6;&#xa;      }&#xa;    </style>&#xa;    <filter filterUnits="userSpaceOnUse" id="drop-shadow-1">&#xa;      <feOffset dy="0" dx="-6.77"/>&#xa;      <feGaussianBlur stdDeviation="84.65" result="blur"/>&#xa;      <feFlood flood-opacity=".25" flood-color="#000"/>&#xa;      <feComposite operator="in" in2="blur"/>&#xa;      <feComposite in="SourceGraphic"/>&#xa;    </filter>&#xa;  </defs>&#xa;  <g class="cls-1">&#xa;    <g>&#xa;      <path d="m318.29,22.19L79.64,54.94c-3.7.51-6.6,3.42-7.1,7.12l-19.11,141.59,249.2-34.2c.72-.1,1.29-.65,1.41-1.36l23.57-136.26c.96-5.54-3.75-10.41-9.31-9.65Z" class="cls-5"/>&#xa;      <path d="m52.89,204.19l.08-.6,19.11-141.59c.52-3.89,3.61-6.98,7.49-7.51l238.65-32.75c2.82-.38,5.53.56,7.51,2.6,1.96,2.03,2.81,4.79,2.33,7.58l-23.57,136.26c-.16.91-.88,1.61-1.81,1.74l-249.8,34.28ZM318.36,22.64L79.7,55.39c-3.48.48-6.24,3.24-6.71,6.73l-19.03,140.99,248.6-34.12c.52-.07.94-.47,1.02-.99l23.57-136.26c.43-2.49-.33-4.97-2.08-6.79-1.76-1.82-4.23-2.68-6.71-2.32h0Z" class="cls-5"/>&#xa;    </g>&#xa;    <g>&#xa;      <path transform="translate(-35.64 28.55) rotate(-7.81)" d="m67.73,185.58h246.97c1.82,0,3.3,1.48,3.3,3.3v147.88c0,15.45-12.55,28-28,28H92.43c-15.45,0-28-12.55-28-28v-147.88c0-1.82,1.48-3.3,3.3-3.3Z" class="cls-2"/>&#xa;      <path d="m104.73,378c-7.03,0-13.83-2.28-19.53-6.6-6.9-5.23-11.35-12.84-12.52-21.42l-19.32-140.78c-.47-3.45,1.95-6.64,5.4-7.11l240.36-32.98c3.46-.48,6.64,1.94,7.12,5.4l19.32,140.78c2.43,17.72-10,34.11-27.72,36.54l-188.62,25.88c-1.49.2-2.99.31-4.48.31Zm195.24-207.3c-.21,0-.42.01-.64.04l-240.36,32.98c-1.23.17-2.32.81-3.07,1.8-.75.99-1.07,2.21-.9,3.44l19.32,140.78c1.11,8.14,5.34,15.36,11.88,20.32,6.55,4.97,14.63,7.1,22.78,5.97l188.62-25.88c8.14-1.11,15.36-5.34,20.32-11.89,4.97-6.55,7.09-14.64,5.97-22.78l-19.32-140.78c-.32-2.33-2.32-4.02-4.61-4.02Z" class="cls-5"/>&#xa;    </g>&#xa;    <polygon points="337.74 33.16 97.6 66.16 53.43 202.47 299.32 168.67 337.74 33.16" class="cls-6"/>&#xa;    <polygon points="347.12 43.66 104.12 77.01 54.25 202.36 304.65 168 347.12 43.66" class="cls-8"/>&#xa;    <g>&#xa;      <path transform="translate(-35.63 28.66) rotate(-7.81)" d="m113.13,203.37h157.82c15.19,0,27.52,12.33,27.52,27.52v93.13c0,12.66-10.28,22.93-22.93,22.93H108.54c-12.66,0-22.93-10.28-22.93-22.93v-93.13c0-15.19,12.33-27.52,27.52-27.52Z" class="cls-7"/>&#xa;      <path d="m283.91,335.15l-165.77,22.83c-9.59,1.32-22.86-5-24.18-14.59h0s210.89-28.94,210.89-28.94h0c1.32,9.59-11.35,19.39-20.94,20.7Z" class="cls-6"/>&#xa;      <path d="m291.18,214.79l-210.89,28.94h0c-1.91-13.93,2.1-28.51,21.76-28.68l160.44-22.02c18.28-4.59,26.77,7.83,28.68,21.76h0Z" class="cls-3"/>&#xa;      <g>&#xa;        <path d="m185.85,244.67c-1.15,0-2.15-.85-2.31-2.02-.18-1.28.72-2.46,2-2.64l93.82-12.88c1.24-.16,2.46.72,2.64,2,.18,1.28-.72,2.46-2,2.64l-93.82,12.88c-.11.02-.21.02-.32.02Z" class="cls-4"/>&#xa;        <path d="m189.75,273.04c-1.15,0-2.15-.85-2.31-2.02-.18-1.28.72-2.46,2-2.64l93.82-12.87c1.25-.2,2.46.72,2.64,2,.18,1.28-.72,2.46-2,2.64l-93.82,12.87c-.11.02-.21.02-.32.02Z" class="cls-4"/>&#xa;        <path d="m191.02,282.31c-1.15,0-2.15-.85-2.31-2.02-.18-1.28.72-2.46,2-2.64l55.17-7.57c1.24-.2,2.46.72,2.64,2,.18,1.28-.72,2.46-2,2.64l-55.17,7.57c-.11.02-.21.02-.32.02Z" class="cls-6"/>&#xa;        <path d="m193.58,301.01c-1.15,0-2.15-.85-2.31-2.02-.18-1.28.72-2.46,2-2.64l93.82-12.88c1.25-.19,2.46.72,2.64,2,.18,1.28-.72,2.46-2,2.64l-93.82,12.88c-.11.02-.21.02-.32.02Z" class="cls-4"/>&#xa;        <path d="m194.86,310.28c-1.15,0-2.15-.85-2.31-2.02-.18-1.28.72-2.46,2-2.64l93.82-12.88c1.24-.2,2.46.72,2.64,2,.18,1.28-.72,2.46-2,2.64l-93.82,12.88c-.11.02-.21.02-.32.02Z" class="cls-6"/>&#xa;        <path d="m196.11,319.38c-1.15,0-2.15-.85-2.31-2.02-.18-1.28.72-2.46,2-2.64l70.63-9.69c1.27-.18,2.46.72,2.64,2,.18,1.28-.72,2.46-2,2.64l-70.63,9.69c-.11.02-.21.02-.32.02Z" class="cls-6"/>&#xa;        <path d="m187.07,253.52c-1.15,0-2.15-.85-2.31-2.02-.18-1.28.72-2.46,2-2.64l86.09-11.81c1.27-.15,2.46.72,2.64,2,.18,1.28-.72,2.46-2,2.64l-86.09,11.81c-.11.02-.21.02-.32.02Z" class="cls-6"/>&#xa;      </g>&#xa;      <path d="m108.77,350.88c-.39,0-.72-.28-.77-.67-.06-.43.24-.82.66-.88l43.05-5.91c.47-.07.82.24.88.66.06.43-.24.82-.66.88l-43.05,5.91s-.07.01-.11.01Z" class="cls-7"/>&#xa;      <path d="m159.55,343.91c-.39,0-.72-.28-.77-.67-.06-.43.24-.82.66-.88l89.43-12.27c.46-.07.82.24.88.66.06.43-.24.82-.66.88l-89.43,12.27s-.07.01-.11.01Z" class="cls-7"/>&#xa;      <path d="m256.12,330.66c-.39,0-.72-.28-.77-.67-.06-.43.24-.82.66-.88l35.31-4.84c.49-.06.82.24.88.66.06.43-.24.82-.66.88l-35.31,4.84s-.07.01-.11.01Z" class="cls-7"/>&#xa;      <path d="m116.56,359.23c-5.46,0-10.74-1.77-15.17-5.12-5.36-4.07-8.81-9.97-9.72-16.64l-13.08-95.29c-1.89-13.75,7.77-26.47,21.52-28.36l163.93-22.5c13.69-1.9,26.47,7.77,28.36,21.52l13.08,95.3c.92,6.66-.82,13.28-4.88,18.64-4.07,5.36-9.97,8.81-16.64,9.72l-163.93,22.5c-1.16.16-2.32.24-3.47.24Zm150.92-165.19c-1,0-2.01.07-3.04.21l-163.93,22.5c-12.13,1.67-20.66,12.9-18.99,25.04l13.08,95.29c.81,5.88,3.86,11.09,8.59,14.68,4.72,3.59,10.54,5.11,16.45,4.31l163.93-22.5c5.88-.81,11.09-3.86,14.68-8.58,3.58-4.73,5.12-10.57,4.31-16.45l-13.08-95.3c-1.53-11.12-11.08-19.21-22-19.21Z" class="cls-3"/>&#xa;      <g>&#xa;        <path d="m123.17,256.15l6.36-7.51c.24-.28.65-.33.96-.11l7.95,5.83c.19.14.43.18.65.1l9.18-3.2c.35-.12.73.05.89.4l4.09,9.12c.1.22.29.37.52.42l9.55,1.97c.36.07.61.42.58.8l-.87,9.96c-.02.24.07.47.24.63l7.35,6.62c.28.25.33.68.12.98l-5.6,8.14c-.13.19-.17.44-.09.67l3.18,9.49c.12.36-.04.75-.38.91l-8.82,4.13c-.21.1-.36.29-.4.53l-1.84,9.81c-.07.37-.4.63-.77.59l-9.68-.98c-.23-.02-.46.07-.61.25l-6.36,7.51c-.24.28-.65.33-.96.11l-7.95-5.83c-.19-.14-.43-.18-.65-.1l-9.18,3.2c-.35.12-.73-.05-.89-.4l-4.09-9.12c-.1-.22-.29-.37-.52-.42l-9.55-1.97c-.36-.07-.61-.42-.58-.8l.87-9.96c.02-.24-.07-.47-.24-.63l-7.35-6.62c-.28-.25-.33-.68-.12-.98l5.6-8.14c.13-.19.17-.44.09-.67l-3.18-9.49c-.12-.36.04-.75.38-.91l8.82-4.13c.21-.1.36-.29.4-.53l1.84-9.81c.07-.37.4-.63.77-.59l9.68.98c.23.02.46-.07.61-.25Z" class="cls-3"/>&#xa;        <path d="m135.29,308.13l-17.48-11.05c-1.37-.87-1.78-2.69-.92-4.07.87-1.37,2.69-1.78,4.07-.92l11.84,7.49,13.99-29.68c.69-1.47,2.47-2.09,3.92-1.41,1.47.69,2.11,2.45,1.41,3.92l-16.83,35.71Z" class="cls-7"/>&#xa;      </g>&#xa;    </g>&#xa;  </g>&#xa;</svg>", - "w": 400, - "h": 400, - "title": "Passport-Visa-Issuer", - "aspect": "fixed" - }, - { - "data": "data:image/svg+xml;base64,<svg xmlns:xlink="http://www.w3.org/1999/xlink" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 400 400" data-name="Layer 1" id="Layer_1">&#xa;  <defs>&#xa;    <style>&#xa;      .cls-1 {&#xa;        fill: #fff;&#xa;        font-family: CaptainComic, 'Captain Comic';&#xa;        font-size: 39.9px;&#xa;      }&#xa;&#xa;      .cls-2 {&#xa;        fill: #1b75bb;&#xa;        stroke-width: 0px;&#xa;      }&#xa;&#xa;      .cls-3 {&#xa;        letter-spacing: -.1em;&#xa;      }&#xa;    </style>&#xa;  </defs>&#xa;  <rect transform="translate(-29.11 34.14) rotate(-9.1)" height="323.34" width="244.92" y="38.33" x="77.54" class="cls-2"/>&#xa;  <text transform="translate(86.26 149.33) rotate(-9.1)" class="cls-1"><tspan y="0" x="0" class="cls-3">P</tspan><tspan y="0" x="21.07">assport</tspan></text>&#xa;  <image xlink:href="data:image/png;base64,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" transform="translate(127.17 176.37) rotate(-9.1) scale(.39)" height="345" width="353"/>&#xa;</svg>", - "w": 400, - "h": 400, - "title": "Passport", - "aspect": "fixed" - }, - { - "data": "data:image/svg+xml;base64,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", - "w": 400, - "h": 400, - "title": "Repository", - "aspect": "fixed" - }, - { - "data": "data:image/svg+xml;base64,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", - "w": 400, - "h": 400, - "title": "Researcher", - "aspect": "fixed" - }, - { - "data": "data:image/svg+xml;base64,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", - "w": 400, - "h": 400, - "title": "Services", - "aspect": "fixed" - }, - { - "data": "data:image/svg+xml;base64,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", - "w": 400, - "h": 400, - "title": "Visa-assertion-blue", - "aspect": "fixed" - }, - { - "data": "data:image/svg+xml;base64,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", - "w": 400, - "h": 400, - "title": "Visa-assertion-green", - "aspect": "fixed" - }, - { - "data": "data:image/svg+xml;base64,PHN2ZyB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciIHZpZXdCb3g9IjAgMCA0MDAgNDAwIiBkYXRhLW5hbWU9IkxheWVyIDEiIGlkPSJMYXllcl8xIj4mI3hhOyAgPGRlZnM+JiN4YTsgICAgPHN0eWxlPiYjeGE7ICAgICAgLmNscy0xIHsmI3hhOyAgICAgICAgZmlsbDogI2ZhYTYzMzsmI3hhOyAgICAgIH0mI3hhOyYjeGE7ICAgICAgLmNscy0xLCAuY2xzLTIsIC5jbHMtMywgLmNscy00IHsmI3hhOyAgICAgICAgc3Ryb2tlLXdpZHRoOiAwcHg7JiN4YTsgICAgICB9JiN4YTsmI3hhOyAgICAgIC5jbHMtMiB7JiN4YTsgICAgICAgIGZpbGw6ICM3Njc4N2E7JiN4YTsgICAgICB9JiN4YTsmI3hhOyAgICAgIC5jbHMtMyB7JiN4YTsgICAgICAgIGZpbGw6ICNjY2M7JiN4YTsgICAgICB9JiN4YTsmI3hhOyAgICAgIC5jbHMtNCB7JiN4YTsgICAgICAgIGZpbGw6ICNmZmY7JiN4YTsgICAgICB9JiN4YTsgICAgPC9zdHlsZT4mI3hhOyAgPC9kZWZzPiYjeGE7ICA8cmVjdCB0cmFuc2Zvcm09InRyYW5zbGF0ZSguOTUgLS45NCkgcm90YXRlKC4yNykiIHJ5PSIxOC43MiIgcng9IjE4LjcyIiBoZWlnaHQ9IjI0Ny4zMyIgd2lkdGg9IjM2Ni42NiIgeT0iNzYuMzQiIHg9IjE2LjY3IiBjbGFzcz0iY2xzLTQiLz4mI3hhOyAgPHBhdGggZD0ibTM2MS4xMywzMjQuNDdsLTMxNS4xMy0xLjYxYy02Ljc2LS4wMy0yOS44Ni0xMi4wMi0yOS44My0xOC43OGwuMDUtMTEuNDgsMzY2LjY2LDEuNzMtLjA4LDguNjVjLS4wMyw2Ljc2LTE0LjkxLDIxLjUzLTIxLjY3LDIxLjVaIiBjbGFzcz0iY2xzLTMiLz4mI3hhOyAgPHBhdGggZD0ibTM4My43MSwxMjEuMDZsLTM2Ni42Ni0xLjczaDBjLjExLTI0LjIyLDEuNzEtNDYuMjYsNDQuMDYtNDMuNjVsMjc4Ljk1LDEuMzJjNDMuNjUtMS44Niw0My43NiwxOS44NCw0My42NSw0NC4wNmgwWiIgY2xhc3M9ImNscy0xIi8+JiN4YTsgIDxnPiYjeGE7ICAgIDxwYXRoIGQ9Im0xOTcuMzcsMTQ2LjU0Yy0yLjIxLS4wMy00LTEuODMtMy45OC00LjA1LjAxLTIuMjMsMS44Mi00LjAzLDQuMDUtNC4wMWwxNjMuMTMuNzdoLjAzYzIuMjEuMDMsNCwxLjgzLDMuOTgsNC4wNS0uMDEsMi4yMy0xLjgyLDQuMDMtNC4wNSw0LjAxbC0xNjMuMTMtLjc3aC0uMDNaIiBjbGFzcz0iY2xzLTIiLz4mI3hhOyAgICA8cGF0aCBkPSJtMTk3LjE0LDE5NS44N2MtMi4yMS0uMDMtNC0xLjgzLTMuOTgtNC4wNSwwLTIuMjMsMS44Mi00LjAzLDQuMDUtNC4wMWwxNjMuMTMuNzdoLjAzYzIuMjEuMDMsNCwxLjgzLDMuOTgsNC4wNSwwLDIuMjMtMS44Miw0LjAzLTQuMDUsNC4wMWwtMTYzLjEzLS43N2gtLjAzWiIgY2xhc3M9ImNscy0yIi8+JiN4YTsgICAgPHBhdGggZD0ibTE5Ny4wNywyMTEuOThjLTIuMjEtLjAzLTQtMS44My0zLjk4LTQuMDUsMC0yLjIzLDEuODItNC4wMyw0LjA1LTQuMDFsOTUuOTEuNDVoLjAzYzIuMjEuMDMsNCwxLjgzLDMuOTgsNC4wNS0uMDEsMi4yMy0xLjgyLDQuMDMtNC4wNSw0LjAxbC05NS45MS0uNDVoLS4wM1oiIGNsYXNzPSJjbHMtMyIvPiYjeGE7ICAgIDxwYXRoIGQ9Im0xOTYuOTEsMjQ0LjVjLTIuMjEtLjAzLTQtMS44My0zLjk4LTQuMDUuMDEtMi4yMywxLjgyLTQuMDMsNC4wNS00LjAxbDE2My4xMy43N2guMDNjMi4yMS4wMyw0LDEuODMsMy45OCw0LjA1LS4wMSwyLjIzLTEuODIsNC4wMy00LjA1LDQuMDFsLTE2My4xMy0uNzdoLS4wM1oiIGNsYXNzPSJjbHMtMiIvPiYjeGE7ICAgIDxwYXRoIGQ9Im0xOTYuODQsMjYwLjYyYy0yLjIxLS4wMy00LTEuODMtMy45OC00LjA1LDAtMi4yMywxLjgyLTQuMDMsNC4wNS00LjAxbDE2My4xMi43N2guMDNjMi4yMS4wMyw0LDEuODMsMy45OCw0LjA1LDAsMi4yMy0xLjgyLDQuMDMtNC4wNSw0LjAxbC0xNjMuMTItLjc3aC0uMDNaIiBjbGFzcz0iY2xzLTMiLz4mI3hhOyAgICA8cGF0aCBkPSJtMTk2Ljc1LDI3Ni40M2MtMi4yMS0uMDMtNC0xLjgzLTMuOTgtNC4wNS4wMS0yLjIzLDEuODItNC4wMyw0LjA1LTQuMDFsMTIyLjguNThoLjAzYzIuMjEuMDMsNCwxLjgzLDMuOTgsNC4wNS0uMDEsMi4yMy0xLjgyLDQuMDMtNC4wNSw0LjAxbC0xMjIuOC0uNThoLS4wM1oiIGNsYXNzPSJjbHMtMyIvPiYjeGE7ICAgIDxwYXRoIGQ9Im0xOTcuMywxNjEuOTNjLTIuMjEtLjAzLTQtMS44My0zLjk4LTQuMDUsMC0yLjIzLDEuODItNC4wMyw0LjA1LTQuMDFsMTQ5LjY3LjdoLjAzYzIuMjEuMDMsNCwxLjgzLDMuOTgsNC4wNSwwLDIuMjMtMS44Miw0LjAzLTQuMDUsNC4wMWwtMTQ5LjY3LS43aC0uMDNaIiBjbGFzcz0iY2xzLTMiLz4mI3hhOyAgPC9nPiYjeGE7ICA8cGF0aCBkPSJtMzkuODQsMzA4Ljk4Yy0uNzMsMC0xLjMzLS42MS0xLjMyLTEuMzUsMC0uNzUuNi0xLjM0LDEuMzQtMS4zNGw3NC44NC4zNmguMDFjLjczLDAsMS4zMy42MSwxLjMyLDEuMzUsMCwuNzUtLjYsMS4zNC0xLjM0LDEuMzRsLTc0Ljg0LS4zNmgtLjAxWiIgY2xhc3M9ImNscy00Ii8+JiN4YTsgIDxwYXRoIGQ9Im0xMjguMTIsMzA5LjM5Yy0uNzMsMC0xLjMzLS42MS0xLjMyLTEuMzUsMC0uNzUuNi0xLjM0LDEuMzQtMS4zNGwxNTUuNS43NGguMDFjLjczLDAsMS4zMy42MSwxLjMyLDEuMzUsMCwuNzUtLjYsMS4zNC0xLjM0LDEuMzRsLTE1NS41LS43NGgtLjAxWiIgY2xhc3M9ImNscy00Ii8+JiN4YTsgIDxwYXRoIGQ9Im0yOTYuMDIsMzEwLjE4Yy0uNzMsMC0xLjMzLS42MS0xLjMyLTEuMzUsMC0uNzUuNi0xLjM0LDEuMzQtMS4zNGw2MS4zOS4yOWguMDFjLjczLDAsMS4zMy42MSwxLjMyLDEuMzUsMCwuNzUtLjYsMS4zNC0xLjM0LDEuMzRsLTYxLjM5LS4yOWgtLjAxWiIgY2xhc3M9ImNscy00Ii8+JiN4YTsgIDxwYXRoIGQ9Im00My43OCwzMjUuNDdjLTE2LjY5LS4yMS0zMC4xNy0xMy45LTMwLjEtMzAuNjNsLjkxLTE5MS40M2MuMDQtOC4xNCwzLjI0LTE1Ljc4LDkuMDItMjEuNTIsNS43OC01LjczLDEzLjQ2LTguODYsMjEuNi04LjgzbDMxMC43NiwxLjQ3Yy4wOSwwLC4xNiwwLC4yNSwwLDguMDUuMSwxNS42LDMuMywyMS4yOCw5LjAzLDUuNzMsNS43OSw4Ljg2LDEzLjQ2LDguODIsMjEuNmwtLjksMTkxLjQzYy0uMDgsMTYuODItMTMuODIsMzAuNDMtMzAuNjQsMzAuMzRoLjAxcy0zMTAuNzctMS40Ny0zMTAuNzctMS40N2MtLjA5LDAtLjE2LDAtLjI1LDBaTTM1Ni4xNiw3OS42MWgtLjJzLTMxMC43Ni0xLjQ3LTMxMC43Ni0xLjQ3Yy02LjgtLjAzLTEzLjE5LDIuNTktMTguMDEsNy4zNi00LjgyLDQuNzctNy40OSwxMS4xNC03LjUyLDE3LjkzbC0uOTEsMTkxLjQzYy0uMDYsMTMuOTQsMTEuMTksMjUuMzUsMjUuMSwyNS41MmguMTlzMzEwLjc4LDEuNDcsMzEwLjc4LDEuNDdjMTQsLjA2LDI1LjQ1LTExLjI3LDI1LjUyLTI1LjI5bC45LTE5MS40M2MuMDMtNi43OC0yLjU4LTEzLjE4LTcuMzYtMTgtNC43My00Ljc3LTExLjAyLTcuNDQtMTcuNzItNy41MloiIGNsYXNzPSJjbHMtMSIvPiYjeGE7ICA8Zz4mI3hhOyAgICA8cGF0aCBkPSJtODcuMTYsMTUwLjlsMTIuNjctMTEuMjdjLjQ4LS40MywxLjItLjQxLDEuNjYuMDRsMTIuMTQsMTEuODdjLjI5LjI4LjY5LjQsMS4wOC4zM2wxNi40NC0zLjIzYy42Mi0uMTIsMS4yMy4yNiwxLjQyLjg5bDQuNzYsMTYuNTRjLjExLjM5LjQuNzEuNzguODRsMTUuOCw1LjY4Yy42LjIyLjk0Ljg2Ljc5LDEuNWwtMy45LDE2Ljc4Yy0uMDkuNCwwLC44Mi4yNywxLjEzbDEwLjkzLDEzLjA2Yy40MS41LjQsMS4yMy0uMDQsMS43MWwtMTEuNTEsMTIuNTJjLS4yNy4zLS4zOS43MS0uMzIsMS4xMWwzLjEzLDE2Ljk1Yy4xMi42NC0uMjUsMS4yNy0uODYsMS40NmwtMTYuMDQsNC45MWMtLjM4LjEyLS42OC40Mi0uODIuOGwtNS41MSwxNi4yOWMtLjIxLjYyLS44NC45Ny0xLjQ1LjgybC0xNi4yNy00LjAyYy0uMzktLjEtLjc5LDAtMS4wOS4yN2wtMTIuNjcsMTEuMjdjLS40OC40My0xLjIuNDEtMS42Ni0uMDRsLTEyLjE0LTExLjg3Yy0uMjktLjI4LS42OS0uNC0xLjA4LS4zM2wtMTYuNDQsMy4yM2MtLjYyLjEyLTEuMjMtLjI2LTEuNDItLjg5bC00Ljc2LTE2LjU0Yy0uMTEtLjM5LS40LS43MS0uNzgtLjg0bC0xNS44LTUuNjhjLS42LS4yMi0uOTQtLjg2LS43OS0xLjVsMy45LTE2Ljc4Yy4wOS0uNCwwLS44Mi0uMjctMS4xM2wtMTAuOTMtMTMuMDZjLS40MS0uNS0uNC0xLjIzLjA0LTEuNzFsMTEuNTEtMTIuNTJjLjI3LS4zLjM5LS43MS4zMi0xLjExbC0zLjEzLTE2Ljk1Yy0uMTItLjY0LjI1LTEuMjcuODYtMS40NmwxNi4wNC00LjkxYy4zOC0uMTIuNjgtLjQyLjgyLS44bDUuNTEtMTYuMjljLjIxLS42Mi44NC0uOTcsMS40NS0uODJsMTYuMjcsNC4wMmMuMzkuMS43OSwwLDEuMDktLjI3WiIgY2xhc3M9ImNscy0xIi8+JiN4YTsgICAgPHBhdGggZD0ibTk1LjI0LDI0Mi40N2wtMjcuMTItMjMuMDdjLTIuMTQtMS44MS0yLjQtNS4wMS0uNTgtNy4xNSwxLjgxLTIuMTQsNS4wMS0yLjQsNy4xNS0uNThsMTguMzksMTUuNjQsMzEuMDQtNDcuMjNjMS41My0yLjMzLDQuNjktMi45OSw3LjAyLTEuNDUsMi4zNCwxLjU0LDMsNC42OCwxLjQ2LDcuMDJsLTM3LjM1LDU2LjgyWiIgY2xhc3M9ImNscy00Ii8+JiN4YTsgIDwvZz4mI3hhOzwvc3ZnPg==", - "w": 400, - "h": 400, - "title": "Visa-assertion-orange", - "aspect": "fixed" - } -] \ No newline at end of file diff --git a/draft-diagrams/AAI/assets/nih-ras.drawio b/draft-diagrams/AAI/assets/nih-ras.drawio deleted file mode 100644 index b519a8e..0000000 --- a/draft-diagrams/AAI/assets/nih-ras.drawio +++ /dev/null @@ -1,276 +0,0 @@ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - diff --git a/draft-diagrams/AAI/claim_flow_of_data_basic.svg b/draft-diagrams/AAI/claim_flow_of_data_basic.svg deleted file mode 100644 index 73b5c2b..0000000 --- a/draft-diagrams/AAI/claim_flow_of_data_basic.svg +++ /dev/null @@ -1 +0,0 @@ - \ No newline at end of file diff --git a/draft-diagrams/AAI/embedded_Claims_flow.png b/draft-diagrams/AAI/embedded_Claims_flow.png deleted file mode 100644 index 407aaa4..0000000 Binary files a/draft-diagrams/AAI/embedded_Claims_flow.png and /dev/null differ diff --git a/draft-diagrams/AAI/flow.png b/draft-diagrams/AAI/flow.png deleted file mode 100644 index 904f685..0000000 Binary files a/draft-diagrams/AAI/flow.png and /dev/null differ diff --git a/draft-diagrams/AAI/nih-ras.drawio.svg b/draft-diagrams/AAI/nih-ras.drawio.svg deleted file mode 100644 index 7240360..0000000 --- a/draft-diagrams/AAI/nih-ras.drawio.svg +++ /dev/null @@ -1,4 +0,0 @@ - - - -
perform
analysis
perform...
search
 for data
search...
ResearcherData RepositoryGA4GH DRSAAI ClearinghouseNIH RASPassport BrokerVisa IssuerAnalysis ServicesDiscovery Services
authorize
authorize
validate
validate
Data Access CommitteeRAS Identity ProvidersResearcher Identities
login
login
login
login
authenticate
authenticate
authenticate
authenticate
AAI VerifiedPassportand Visas
data and consent
data and consent
data donor
consent
consent
data custodianConsents
data
data
Text is not SVG - cannot display
\ No newline at end of file diff --git a/draft-diagrams/aai-faq.html b/draft-diagrams/aai-faq.html deleted file mode 100644 index 64ac847..0000000 --- a/draft-diagrams/aai-faq.html +++ /dev/null @@ -1,607 +0,0 @@ - - - - - - - - -AAI FAQ | GA4GH Data Security - - - - - - - - - - - - - - - - - - -
-
-
- -
-

AAI FAQ

-
- -
-

A collection of questions (and hopefully useful answers).

- -
- -

Background

- -

Why Brokers?

- -

We have found that there are widely used Identity Providers (IdP). -These authentication mechanisms provide no authorization -information (custom claims or scopes) but are ubiquitous for authentication at the institution level. -The use of a Broker and Clearinghouse -enables attaching information to the usual OIDC flow so that IdPs -can be used with customized claims and scopes.

- -

Here is a diagram of a single broker. This is one possible way to use this spec.

- -

- -

In this diagram, the Broker relies on a separate service for fetching visas, which -stores assertions from multiple sources. The visa assertions are obtained by the -Clearinghouse after a successful login, and used to determine a researcher’s -access in the Clearinghouse system.

- -

The Broker, Clearinghouse, and Visa Issuer may be separate services (as shown -in this diagram), but in other configurations they may be run as parts of a single -service, or as separate services run by single organization. Data holders and data -controllers should explore their options to decide what best fits their needs.

- -

Flows

- -

The following sequence diagrams are included to help explain the intended flows -documented in the accompanying specification.

- -

What is the complete end to end flow using token exchange?

- -

(last updated June 2022)

- -

This flow is the preferred flow for v1.2+ of the specification.

- -

The exchange flow does not ever distribute the initial Passport-Scoped Access Token beyond -the client application. A token exchange operation is executed by the client, in -exchange for a Passport JWT that may be used downstream to access resources. In this example flow, the -Passport is included as authorization in the POST to a DRS server. The token -exchange has also specified known resources that will limit the audience -of the Passport.

- - - - - - Researcher - - AAI - - Data Controller - - Data Holder - - - - - - - - - User Agent - - - - Client - - Broker - - - IdP - - - Visa Issuer(s) - - Clearing House - - Data - - - - - OIDC - - - ref - OIDC flow results in the client holding a *Passport-Scoped Access Token*. - - - - - Exchange - - - Token exchange - - - (note: for clarity these form values have not actually been URL encoded) - Content-Type: application/x-www-form-urlencoded -   - grant_type=urn:ietf:params:oauth:grant-type:token-exchange - &requested_token_type=urn:ga4gh:params:oauth:token-type:passport - &subject_token_type=urn:ietf:params:oauth:token-type:access_token - &subject_token=<Passport-Scoped Access Token> - &resource=https://drs.example.com/dataset1 - &resource=https://drs.example.com/dataset2 - - - Informative Only (not defined in the specification) - - - Fetch signed visa(s) for user - - - Return signed visa(s) for user - - - [ - "<visa1>", - "<visa2>" - ] - - - Token exchange return - - - { - "access_token": "<Passport>", - "issued_token_type": "urn:ga4gh:params:oauth:token-type:passport", - "token_type": "Bearer" - } -   - ▼ Passport content as example (decoded from the base64 of the JWT Passport) ▼ -   - { - "typ": "vnd.ga4gh.passport+jwt", - "alg": "<algorithm-identifier>", - "kid": "<key-identifier>" - } . - { - "iss": "https://<issuer-website>", - "sub": "<subject-identifier>", - "aud": [ - "https://drs.example.com" - ], - "iat": <seconds-since-epoch>, - "exp": <seconds-since-epoch>, - "jti": "<token-identifier>", - "ga4gh_passport_v1": [ - "<visa1>", - "<visa2>", - ... - ] - } . <signature> - - - - - Use - - - Client requests data - - - POST /ga4gh/drs/v1/objects/dataset1/access/s3 HTTP/1.1 - Host: drs.example.com - Content-Type: application/json -   - { - "passports": [ - "<Passport>" - ] - } - - - Decision is made to release data using information contained in the - passport token - and this decision is coordinated with the data system to - facilitate that actual data release. - - - Client is given data - - - - -
- -

What is the complete end to end flow using /userinfo?

- -

(last updated June 2022)

- -

This flow is the flow for v1.0 implementations of the specification.

- -

The flow as used by Elixir uses the initial Passport-Scoped Access Token as -a token handed to downstream resource servers. These servers can use this token, in conjunction -with a callback to the broker’s Userinfo Endpoint, to obtain the Passport content in -JSON format.

- - - - - - Researcher - - AAI - - Data Controller - - Data Holder - - - - - - - - - User Agent - - - - Client - - Broker - - - IdP - - - Visa Issuer(s) - - Clearing House - - Data - - - - - OIDC - - - ref - OIDC flow results in the client holding a *Passport-Scoped Access Token*. - - - - - Use - - - Client requests data - - - { - Authorization: Bearer <Passport-Scoped Access Token> - } - - - Clearing house asks for list of signed visa(s) - - - { - Authorization: Bearer <Passport-Scoped Access Token> - } - - - Informative Only (not defined in the specification) - - - Fetch signed visa(s) for user - - - Return signed visa(s) for user - - - [ - "<visa1>", - "<visa2>" - ] - - - UserInfo endpoint returns list of signed visa(s) - - - { - "iss": "https://<issuer-website>/", - "sub": "<subject-identifier>", - "ga4gh_passport_v1": [ - "<visa1>", - "<visa2>", - ... - ] - } - - - Decision is made to release data using information contained in the - passport - and this decision is coordinated with the data system to - facilitate that actual data release. - - - Client is given data - - - - -
- -

Trust

- -

What’s with all the signed passports and visas etc? Why so complex?

- -

(last updated July 2022)

- -

The practical operation of a loosely coupled -federated ecosystem like GA4GH Passports requires establishing trust -relationships between the participating entities (see -OpenID Connect Federation -for an interesting discussion of the properties of multilateral federations).

- -

Any entity that is asked to make a decision about sharing data needs to have a priori -made the decision “which other entities do I trust?”. In genomics, a single decision -to allow data sharing might involve simultaneous trusting of -multiple entities - human genomics is complex!

- -

When presented with a -Passport and Visas from entities that they trust - they can rely on the information (claims) provided -to make data sharing decisions. If presented with information from entities that are -untrusted - the content of the message is irrelevant as there is no basis on which to believe -the content.

- -

So we can see that trust is a crucial element of a working federation. How do we establish -these trust relationships?

- -

GA4GH Passports and Visas leverage the mechanisms -present in JWT as used -by the OIDC standards -to cryptographically “sign” tokens containing claims. Signed tokens can be -“verified” using public/private keys.

- -

Why are the Visa claims formatted as JWTs inside the Passport?

- -

(last updated August 2022)

- -

If visas were not signed separately from a Passport, then Clearinghouses would require a high degree of confidence that -the signing Passport Issuer or Broker was accurately representing the contents of Visas from the original Visa Issuer; -there would be no mechanisms to prevent a malicious or defective Passport Issuer from misrepresenting Visa contents. -By signing Visas separately from Passports, we prevent intermediate parties from tampering with Visa contents, -allowing Clearinghouses to safely rely on Visa contents based on their trust relationship with the Visa Issuer.

- -

What are the ways that key management is done in practice?

- -

(last updated July 2022)

- -

There are a variety of approaches that can be used for key -management for Passports and Visas. We will first detail those that can be used for Passports -and then discuss some extra wrinkles for Visas.

- -

For this discussion we assume there is a concrete JWT from issuer https://issuer.example.org -(possibly a Broker or a Visa Issuer).

- -

My clearinghouse service ‘trusts’ the above issuer to help make data -access decisions - and that trust is stated probably through some sort of explicit -configuration. For our example, let’s imagine it has a hypothetical YAML configuration file

- -
trusted_brokers:
-  - https://issuer.example.org
-  - https://login.broker.com
-
-trusted_visa_issuers:
-  - https://dac.gov.world
-
- -

The service now wants to verify a Passport or Visa -JWT purporting to be from that issuer.

- -
- -

Use jku in the header of the JWT

- -

The JKU is the URL of a JSON file containing the issuers’ public keys.

- -
{
-  "iss": "https://issuer.example.org",
-  "jku": "https://issuer.example.org/public-keys.json",
-  "kid": "key-october-1"
-}
-
- -

For our concrete example we say that it is a JSON file residing -at https://issuer.example.org/public-keys.json (see -RFC 7517 “JSON Web Key”).

- -

IMPORTANTLY, for the secure use of this key management technique - the JKU -MUST also be allow-listed as part of the configuration of OUR service. -For example:

- -
trusted_brokers:
-  - issuer: https://issuer.example.org
-    jku: https://issuer.example.org/public-keys.json
-
-  - issuer: https://login.broker.com
-    jku: https://keys.broker.com/set
-
- -

It is NEVER valid to even attempt to access a JKU from a JWT header - unless the URL -is already known to belong to the given issuer. See -“JWT Forgery via unvalidated jku parameter”.

- -

To verify a JWT, the content of the JKU file is loaded and the kid is -looked up in key set. The signature is validated using the public key found.

- -

Although this configuration requires explicit registration of JKUs, the content -of the key sets can allow the best practice of key rotation.

- -

The content of the JKU file is designed to be cached aggressively, but as long as -the file is fetched every few days/weeks, the set of keys -can evolve/rotate.

- -
- -

Use the kid in the header of the JWT along with OIDC Discovery

- -

The OpenID Connect Discovery -protocol allows the use of the JWT issuer URL - in conjunction with a fetch -of a /.well-known/openid-configuration - to look up the location of the public key set file. See -OpenID Provider Metadata specification -and the jwks_uri entry.

- -

As with JKU - it is important that OIDC discovery is limited only to JWT issuer URLs that are -in some way allow-listed. It is NEVER valid to perform discovery on an arbitrary issuer -encountered in a JWT. Luckily, the concept of allow-listing issuers is already in some way -inherent to the way trust relationships are established, and hence this allow list should -already be present in the system.

- -

Also as with JKU, the content of the discovery protocol and key sets can be cached -aggressively. This means that the double step of the discovery protocol is not -required on every JWT verification.

- -
- -

Exchange public keys beforehand with each trusted entity

- -

This is an approach used by the NIH - and is appropriate if the number -of trusted entities is small - such that the public keys of each trusted entity can be exchanged -out of band (and their rotation/updating can also be managed out of band).

- -

Configuration may be

- -
trusted_brokers:
-  - issuer: https://issuer.example.org
-    keys:
-      key-october-1: "ABCDTRTFDSFSDFSF...."
-
-  - issuer: https://login.broker.com
-    keys:
-      kid123456: "ABCDTRTFDSFSDFSF...."
-
- -

For any kid -encountered in a JWT, the corresponding public key is already available for signature validation.

- -

An even safer version of this approach is to perform -the key verification across every public key you hold before even decoding the JWT JSON -and then confirm the kid. This avoids ever even needing to JSON decode -data from untrusted entities.

- -
- -

Requirement for JKU in Visas

- -

When it comes to Visas, there is an extra wrinkle - unlike Brokers, Visa Issuers do not -need to have been part of an OIDC flow. It is possible that the visa issuer URI is not -even a locatable reference -(e.g. urn:example.com:dac-world-visa-issuer).

- -

Therefore the OIDC Discovery technique is not appropriate and hence the requirements -of the AAI standard regarding the presence of JKUs.

- -
- -

Client Software

- -

Use of GA4GH passport/visas in Single Page Apps (SPAs)

- -

It is currently recommended that single page apps (SPA) such as a React/VueJS websites -are NOT used for scenarios where the single page app code is solely responsible for the handling of -genomic passports and tokens.

- -

A SPA contains all the source of the application in public - and hence cannot -possess a ‘client secret’ in an OIDC flow (the ‘client secret’ is used to prove the identity of the -client software and is an important risk mitigation that prevents unconstrained -use of an accidentally leaked/stolen token).

- -

Techniques such as PKCE can be used to allow a SPA to participate in an OIDC flow - and this is not -forbidden by the specification - but there -are still unresolved questions about how SPAs can prove client identity in things like the token -exchange that retrieves passports or other tokens.

- -

Therefore if writing SPA websites for genomic data handling, it is recommended to use -a backend set of services to execute OIDC flows and token exchanges (even if the rest of the SPA -can operate purely on the front end). These -backend service can hold secrets and hence can prove client identity - and the backend -service can then securely participate in token exchange and retain tokens/passports.

- -

There is an emerging standard DPoP that may remove some of these limitations - -(OAuth 2.0 Demonstrating Proof-of-Possession at the Application Layer)

-
    -
  • and it will be considered for future versions of the AAI specification.
  • -
- -
- - -
- -
- -
-
- - - diff --git a/draft-diagrams/aai-implementations.html b/draft-diagrams/aai-implementations.html deleted file mode 100644 index aa8ce20..0000000 --- a/draft-diagrams/aai-implementations.html +++ /dev/null @@ -1,127 +0,0 @@ - - - - - - - - -AAI Implementations | GA4GH Data Security - - - - - - - - - - - - - - - - - - -
-
-
- -
-

AAI Implementations

-
- -
-

ELIXIR / Life Sciences AAI

- -

this

- -

NIH RAS

- -

this

- -

GA4GH driver projects implementing AAI and Passports

- -

As of November 2023, the following driver projects implement AAI / Passports:

- -
    -
  • Biomedical Research Hub
  • -
  • EJP RD (using LifeScience AAI)
  • -
  • ELIXIR (using LifeScience AAI)
  • -
  • GDI (using LifeScience AAI)
  • -
  • Human Cell Atlas
  • -
- -

These driver projects are planning or developing an implementation of AAI / Passports:

- -
    -
  • All of Us
  • -
  • Australian Genomics
  • -
  • Autism Sharing Initiative
  • -
  • Genomics England
  • -
  • H3Africa
  • -
  • ICGC ARGO
  • -
  • IPCHiP
  • -
  • Monarch Initiative
  • -
  • NCI CRDC
  • -
  • NCPI
  • -
  • NHLBI BioData Catalyst
  • -
- -

Source

- -
- -
- -
-
- - - diff --git a/draft-diagrams/aai-openid-connect-profile.html b/draft-diagrams/aai-openid-connect-profile.html deleted file mode 100644 index e7b1c3c..0000000 --- a/draft-diagrams/aai-openid-connect-profile.html +++ /dev/null @@ -1,1335 +0,0 @@ - - - - - - - - -AAI OIDC Profile | GA4GH Data Security - - - - - - - - - - - - - - - - - - -
-
-
- -
-

AAI OIDC Profile

-
- -
-

Abstract

- -

This specification defines a profile for using the OpenID Connect protocol -[OIDC-Core] to provide federated multilateral authorization infrastructure for greater -interoperability between biomedical institutions sharing restricted datasets. (OpenID Connect is a simple -identity layer, on top of the OAuth 2.0 protocol, that supports identity verification and the ability to -obtain basic profile information about end users.) In particular, this specification defines tokens, -endpoints, and flows that enable an OIDC provider (called a Broker) to -provide Passports and Visas to downstream consumers called -Passport Clearinghouses. Passports can then be used for -authorization purposes by downstream systems.

- -

Table of Contents

- - - -
- -

Introduction

- -

This specification -leverages OpenID Connect (OIDC) to authenticate researchers -desiring to access clinical and genomic resources from data -holders -adhering to GA4GH standards. Beyond standard OIDC authentication, AAI enables -data holders to obtain security-related attributes and authorizations of those -researchers. The Data Use and Researcher Identity (DURI) Work Stream has developed a standard -representation for researcher authorizations and attributes [Researcher-ID].

- -

Technical Summary

- -

At its core, the AAI specification defines cryptographically secure tokens for exchanging -researcher attributes called Visas, and how various -participants can interact to authenticate researchers, and obtain and validate Visas.

- -

The main components identified in the specification are:

-
    -
  • -Visa Issuers, that cryptographically sign researcher attributes in the -form of Visas.
  • -
  • -Brokers, that authenticate researchers and provide Visas.
  • -
  • -Clients, that perform actions that may require data access on behalf of researchers, -relying on tokens issued by Brokers and Visa Issuers.
  • -
  • -Passport Clearinghouses, that accept tokens containing or -otherwise availing researcher visas for the purposes of enforcing access control.
  • -
- -

Visa Tokens

- -

Visas are used -for securely transmitting authorizations or attributes of a researcher. -Visas are tokens [JWT] signed by Visa Issuers and -validated by Passport Clearinghouses.

- -

Separation of Data Holders and Data Access Committees

- -

It is a fairly common situation that, for a single dataset, the Data Access Committee (DAC) (the authority managing -who has access to a dataset) is not the same party as the -Data Holder (the organization -that hosts the data, while respecting the DAC’s access policies).

- -

For these situations, AAI is a standard mechanism for data holders to obtain -and validate existing authorizations from DACs, by specifying the interactions -between Visa Issuers, Brokers, and -Passport Clearinghouses.

- -

The AAI standard enables Data Holders and Visa Issuers to recognize -and accept identities from multiple Brokers — allowing for a more federated -approach. An organization can still use this specification with a single -Broker and Visa Issuer, -though they may find in that case that there are few benefits beyond standard OIDC.

- -
- -

Notation and Conventions

- -

Terms defined in Terminology appear as capitalized -links, e.g. Passport.

- -

References to Relevant Specifications appear -as bracket-enclosed links, e.g. [OIDC-Core].

- -

The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL NOT”, “SHOULD”, -“SHOULD NOT”, “RECOMMENDED”, “MAY”, and “OPTIONAL” in this specification are to -be interpreted as described in [RFC2119].

- -
- -

Terminology

- -

This specification inherits terminology from the OpenID -Connect [OIDC-Core] -and OAuth 2.0 Authorization Framework [RFC6749] specifications.

- -

Broker – An OIDC Provider service that -authenticates a user (potentially by relying on an Identity Provider), -collects user’s Visas from internal and/or external Visa Issuers, -and provides them to Passport Clearinghouses.

- -

Claim – as defined -by the JWT specification [RFC7519] – A piece of information asserted about a subject, -represented as a name/value pair consisting of -a claim name (a string) and a claim value (any JSON value).

- -

Client – as discussed in the OAuth 2.0 Authorization Framework [RFC6749] specification

- -

Data Holder – An organization that -holds a specific set of data (or its copy) and respects -and enforces the Data Access Committee’s (DAC’s) decisions on who can access it.

- -

-GA4GH Claim – A Claim as defined by a GA4GH -documented technical standard that is making use of this AAI specification. Typically -this is the ga4gh_passport_v1 or ga4gh_visa_v1 Claim for Passports v1.x. -A GA4GH Claim is asserted by the entity that signed the token in which it is contained (not by GA4GH).

- -

Identity Provider (IdP) – A -service that provides to users an identity, authenticates it, and provides -assertions to a Broker using standard protocols, such as OpenID Connect, SAML or -other federation protocols. Examples: eduGAIN, Facebook, NIH -eRA Commons. IdPs MAY be Visa Assertion Sources.

- -

JWT – JSON Web Token as defined in [RFC7519]. -A JWT contains a set of Claims.

- -

Passport Clearinghouse – -A service that consumes Visas and uses them to make an -authorization decision based on inspecting them and -allows access to a specific set of underlying resources in the target -environment or platform. This abstraction allows for a variety of models for -how systems consume these Visas in order to provide access to resources. -Access can be granted by either issuing new access tokens for downstream -services (i.e. the Passport Clearinghouse may act like an authorization server) -or by providing access to the underlying resources directly (i.e. the Passport -Clearinghouse may act like a resource server). Some Passport Clearinghouses may -issue Passports that contain a new set or subset of Visas for downstream consumption.

- -

Passport-Scoped Access Token – -An OIDC access token with scope -including the identifier ga4gh_passport_v1.

- -

The access token MUST be a JWS-encoded JWT token containing openid and ga4gh_passport_v1 -entries in the value of its scope Claim. -It is RECOMMENDED that Passport-Scoped Access Tokens follow the JWT Profile for OAuth 2.0 Access Tokens specification [RFC9068].

- -

Passport – A signed and verifiable JWT that contains Visas.

- -

Passport Issuer – -A service that creates and signs Passports.

- -

Token Endpoint – a Broker’s implementation of the [OIDC-Core] Token Endpoint.

- -

Token Exchange – -The protocol defined in [RFC 8693] as an extension of OAuth 2.0 -for exchanging access tokens for other tokens. A token exchange is performed by calling the Token Endpoint.

- -

UserInfo Endpoint – a Broker’s implementation of the [OIDC-Core] UserInfo Endpoint.

- -

-Visa – A -Visa encodes a Visa Assertion in compact and digitally signed -format that can be passed as a URL-safe string value.

- -

A Visa MUST be signed by a Visa Issuer. A Visa MAY be passed -through various Brokers as needed while retaining the -signature of the original Visa Issuer.

- -

-Visa Assertion – a piece of information about a user that is asserted by a Visa Assertion Source. It is then encoded by a Visa Issuer into a Visa.

- -

Visa Assertion Source – the source organization of -a Visa Assertion, which SHOULD include the organization associated with making the assertion, although it MAY optionally identify a sub-organization or a -specific assignment within the organization that made the assertion.

- -
    -
  • This is NOT necessarily the organization that signs the Visa; it is the -organization that has the authority to make the assertion on behalf of the -user and is responsible for making and maintaining the assertion.
  • -
- -

-Visa Issuer – A service that signs Visas. This service:

- - -
- -

Relevant Specifications

- -

-[IANA-JWT] – Standard JWT Claim name assignments, -Internet Assigned Numbers Authority

- -

-[OIDC-Core] – OpenID Connect Core 1.0 (OIDC) – - Authorization Code Flow - will generate id_tokens and access_tokens from the Broker.

- -

-[OIDC-Client] – OpenID Connect Basic Client Implementer’s Guide 1.0

- -

-[OIDC-Discovery] – OpenID Connect Discovery 1.0

- -

-[Passport] – GA4GH Passport Specification, Data Use and Researcher Identity (DURI) Work Stream – Defines Passport and Visa formats.

- -

-[Researcher-ID] – GA4GH Passport Specification, Data Use and Researcher Identity (DURI) Work Stream – Defines researcher identities for GA4GH Passports and Visas.

- -

-[RFC2119] - Key words for use in RFCs to Indicate Requirement Levels

- -

-[RFC5246] - Transport Layer Security (TLS). - Information passed among clients, applications, resource servers, - Brokers, and Passport Clearinghouses - MUST be protected using TLS.

- -

-[RFC6749] – The OAuth 2.0 Authorization Framework

- -

-[RFC6819] - - Lodderstedt, T, McGloin, M., and P. Hunt, - “OAuth 2.0 Threat Model and Security Considerations”, - RFC 6819, January 2013.

- -

-[RFC7515] – JSON Web Signature (JWS) is the - specific JWT to use for this spec.

- -

-[RFC7519] – JSON Web Token (JWT) – Specific implementations MAY extend - this structure with their own service-specific JWT Claim names as top-level - members of this JSON object. The JWTs specified here follow the JWS - specification [RFC7515].

- -

-[RFC7636] – Proof Key for Code Exchange by OAuth Public Clients (PKCE)

- -

-[RFC7662] – J. Richer, Ed., “OAuth 2.0 Token Introspection”, October 2015

- -

-[RFC8693] - Jones, M., Nadalin, A., Campbell, B., Ed., Bradley, J., - and C. Mortimore, “OAuth 2.0 Token Exchange”, RFC 8693, - DOI 10.17487/RFC8693, January 2020.

- -

-[RFC8725] - Sheffer, Y., Hardt, D., and M. Jones, “JSON Web Token Best - Current Practices”, BCP 225, RFC 8725, - DOI 10.17487/RFC8725, February 2020.

- -

-[RFC9068] – JWT Profile for OAuth 2.0 Access Tokens

- -
- -

Overview of Interactions

- -

Full Login and Token Exchange Interaction

- -

In the full token exchange flow recommended in this document, the client does not ever distribute the initial -Passport-Scoped Access Token to other services. A token exchange operation is executed by the client, in -exchange for a Passport JWT that may be used downstream to access resources. In this example flow, the -Passport is included as authorization in the POST to a Clearinghouse that holds data.

- - - - - - Researcher - - AAI - - Data Access Committee - - Data Holder - - - - - - User Agent - - - - Client - - Broker and Passport Issuer - - Visa Issuer - - Passport Clearinghouse - - - - - OIDC - - - Initiates login - - - Send redirect to Broker - - - Follow redirects - - - ref - Broker authenticates user (potentially with external IdP) - - - Send redirect to client with authorization code - - - Follow redirect with code - - - Request Passport-Scoped Access Token with code and client credentials - - - Respond with Passport-Scoped Access Token - - - - - Exchange - - - Request to exchange Passport-Scoped Access Token for Passport - - - - Exchange of visas, if needed (protocol unspecified) - - - Response with Passport - - - - - Use - - - User initiates action requiring data - - - Client requests data with Passport - - - Request public keys - - - Respond with public keys - - - Clearinghouse responds with data - - - - -

Notable differences between this diagram and interaction specified in AAI/Passport v1.0:

-
    -
  • The Passport Clearinghouse is no longer required to be a Client of the Broker
  • -
  • The Passport-Scoped Access Token is only ever shared between the Client and the Broker
  • -
  • An additional Token Exchange request is used to exchange the Passport-Scoped Access Token for a Passport Token, -which can be sent to a Passport Clearinghouse. The Passport Token carries only the authorization in a user’s -Visas, whereas the Passport-Scoped Access Token contains authorizations above and beyond the Visas.
  • -
- -

Flow of Assertions

- -

- -

The above diagram shows how Visa Assertions flow from a Visa Assertion Source -to a Passport Clearinghouse that uses them.

- -

Implementations may introduce clients, services, and protocols -to provide the mechanisms to move the data between the -Visa Assertion Sources and the Broker. These mechanisms are unspecified by the scope of this specification except that -they MUST adhere to security and privacy best practices, such as those outlined -in this specification, in their handling of protocols, claims, tokens and -related data. The flow between these components -MAY be indirect or conversely services shown as being separate MAY be -combined into one service. For example, some implementations MAY deploy one -service that handles the responsibilities of both the Visa Issuer and -the Broker.

- -

Here are two non-normative examples illustrating two of many possible mechanisms:

- -

- -

- -
- -

Profile Requirements

- -

Conformance for Clients/Applications

- -

Clients are applications which want to access data on behalf of users, and are responsible for using the standard described here to do so securely.

- -
    -
  1. OAuth defines two client types in section 2.1 of [RFC6749]. -
      -
    1. -

      Confidential clients (which are able to keep the client secret secure, typically server-side web-applications) - MUST implement OAuth2 Authorization Code - Flow (see OIDC Basic Client Implementer’s Guide 1.0 [OIDC-Client]).

      -
    2. -
    3. -

      Public clients (single pages apps or mobile apps) SHOULD implement Authorization Code Flow - with [PKCE].

      -
    4. -
    -
  2. -
  3. -

    Protection of Confidential Information

    - -
      -
    1. -

      Sensitive information (e.g., including client secrets, -authorization codes, id_tokens, access_tokens) MUST be passed over -encrypted channels as per [OIDC-Client].

      -
    2. -
    3. -

      All responses that contain tokens, secrets, or other sensitive -information MUST include the following HTTP response header fields and -values as per [OIDC-Client].

      - -
        -
      1. -

        Cache-Control: no-cache, no-store

        -
      2. -
      3. -

        Pragma: no-cache

        -
      4. -
      -
    4. -
    -
  4. -
  5. Clients MUST provide protection against client attacks as outlined in -[RFC6819].
  6. -
- -
- -

Conformance for Brokers

-

Brokers operate downstream from IdPs or provide their own IdP service. They issue id_tokens -and access_tokens (and potentially refresh tokens) for consumption within the GA4GH compliant environment.

- -
    -
  1. -

    Broker MUST be an OpenID Provider

    - -
      -
    1. -

      Broker MUST conform to the OIDC Core specification [OIDC-Core].

      -
    2. -
    3. -

      Broker MUST support the OIDC Discovery specification [OIDC-Discovery] -and provide proper metadata -(i.e. must have a jwks_uri as required that’s reachable by a Passport Clearinghouse)

      -
    4. -
    5. -

      A Broker MUST issue Passport-Scoped Access Tokens -(access_tokens).

      - -
        -
      1. This document makes no specifications beyond those in [OIDC-Core].
      2. -
      -
    6. -
    7. -

      Access tokens MUST be in JWS format

      - -
        -
      1. -

        Access tokens for GA4GH use MUST be a GA4GH JWT using -Passport-Scoped Access Token format.

        -
      2. -
      3. -

        Access tokens MUST NOT contain GA4GH Claims directly in the access token.

        -
      4. -
      5. -

        Access tokens MAY contain additional non-GA4GH Claims directly in the access token.

        -
      6. -
      -
    8. -
    -
  2. -
  3. -

    Broker MUST support a Token Endpoint and UserInfo Endpoint.

    - -
      -
    1. -

      Token Exchange at the Token Endpoint SHOULD be used for Visas in -preference to the UserInfo Endpoint.

      -
    2. -
    3. -

      When presented with a valid Passport-scoped Access Token, -the UserInfo endpoint MUST provide Visas as described in the section -Visas provided by a Broker via UserInfo Endpoint.

      -
    4. -
    -
  4. -
  5. -

    Brokers operate downstream from IdPs or provide their own IdP service. They -issue id_tokens and access_tokens (and potentially refresh tokens) for -consumption within the GA4GH compliant environment.

    -
  6. -
  7. -

    Broker MAY support Token Exchange. If implemented, it MUST behave as described -for passport issuance in Conformance For Passport Issuers.

    -
  8. -
  9. -

    Broker MUST provide protection against attacks as outlined in -[RFC6819].

    -
  10. -
  11. -

    The user represented by the identity of the access token MUST have agreed to -release claims related to the requested scopes as part of generating tokens. -Brokers MUST adhere to -section 3.1.2.4 -of [OIDC-Core].

    - -
      -
    1. -

      The user represented by a researcher identity MUST approve the release -of these claims to relying parties with sufficient granularity to -allow for responsible disclosure of information best practices as well -as to meet privacy regulations that may be applicable within or between -jurisdictions where the user’s identity will be used (e.g. GDPR for -a European Union user).

      -
    2. -
    3. -

      If the user’s release agreement has been remembered as part of a user’s -settings such that the user no longer needs to be prompted, then the -user MUST have the ability to remove this setting (i.e. be prompted -again in the future). If a feature is to bypass prompts by remembering -settings is available, it MUST only be used as an opt-in feature with -explicit controls available to the user.

      -
    4. -
    5. -

      A user’s withdrawal of this agreement does not need to apply to -previously generated access tokens.

      -
    6. -
    -
  12. -
  13. -

    When a Broker acts as a Visa Issuer then it MUST adhere to the Conformance -for Visa Issuers section of this -specification.

    - -

    When a Broker provides Visas from other Visa Issuers, it is providing -them “as is” (i.e. it provides no additional assurance as to the quality, -authenticity, or trustworthiness of the Claims from such tokens and any such -assurances are made by the issuer of the Visa, i.e. the Visa Issuer).

    -
  14. -
- -
- -

-

Conformance for Visa Issuers

- -

Visa Issuers issue signed JWTs (Visas) asserting facts about researchers, which may be used by Passport Clearinghouses -to justify granting access to data. This specification defines the format of the Visas and endpoints Visa Issuers -should have in order for Passport Clearinghouses to validate those Visas. This document does not specify how a Broker -obtains Visas contained in a Passport or returned from the Userinfo Endpoint.

- -
    -
  1. -

    A Visa Issuer MUST provide one or more of the following - types of Visas:

    - -
      -
    1. -

      - - - -Visa Document Token – The Visa Issuer does not need to -be an OIDC provider, and MAY provide tokens of this type without any -revocation process.

      - -
        -
      1. The token MUST conform with JWS format [RFC7515] requirements
      2. -
      3. The token MUST be signed by a Visa Issuer.
      4. -
      5. The JWS header MUST contain jku as specified by section -4.1.2 of [RFC7515], and -MUST provide the corresponding endpoint to fetch -the public key used to sign the Visa Document Token.
      6. -
      7. The token is not treated as an access token, but validity -checks outlined elsewhere in this specification still apply.
      8. -
      9. -Visas MUST be signed with a conformant signing algorithm.
      10. -
      11. The scope Claim, if included, MUST NOT contain “openid” as -a space-delimited substring of the scope JWT Claim.
      12. -
      13. Payload Claims are specified in -Visa Format in [Passport].
      14. -
      -
    2. -
    3. -

      -Visa Access Token – The Visa Issuer is providing an OIDC provider -service and issues OIDC-compliant access tokens in a specific format that can -be used as a Visa. Details are specified in the AAI Profile 1.0 specification.

      -
    4. -
    - -

    The Visa Access Token is proposed for removal in a future - version of the specification. Current and future specifications emphasize use of Visas embedded in a Passport, which are not access tokens. New implementations should issue Visas - as Visa Document Tokens.

    -
  2. -
  3. -

    By signing a Visa, a Visa Issuer asserts that - the Visa Assertions made available by the Visa were legitimately derived - from their Visa Assertion Sources, and the content is - presented and/or transformed without misrepresenting the original intent.

    -
  4. -
- -
- -

Conformance for Passport Issuers

- -

Passport Issuers are used to package Visas into signed Passports. Passports are signed JWTs -that use this format to contain Visas.

- -
    -
  1. -

    Passport Issuers MUST be Brokers.

    -
  2. -
  3. -

    Passports MUST be signed with a conformant signing algorithm.

    -
  4. -
  5. -

    Passports MAY be issued from a Token Endpoint using Token Exchange, with the following clarifications:

    - -
      -
    1. -

      The Token Endpoint MAY also support other OAuth2 grant types.

      -
    2. -
    3. -

      Client authentication is REQUIRED (using OAuth2 client authentication in [RFC6749] is RECOMMENDED).

      -
    4. -
    5. -

      The requested_token_type parameter MUST be present with the value urn:ga4gh:params:oauth:token-type:passport.

      -
    6. -
    7. -

      The subject_token parameter value MUST be a valid Passport-Scoped Access Token.

      -
    8. -
    9. -

      The subject_token_type parameter value MUST be urn:ietf:params:oauth:token-type:access_token.

      -
    10. -
    11. -

      The Token Endpoint MAY accept or require any other optional parameters defined in [RFC8693].

      -
    12. -
    -
  6. -
- -


-Passport Issuing via Token Exchange (non-normative example)

- - - - - - Researcher - - AAI - - Data Access Committee (1) - - Data Access Committee (2) - - - - - - User Agent - - - - Client - - Broker and Passport Issuer - - Visa Issuer (1) - - Visa Issuer (2) - - - - - OIDC - - - Initiates login - - - Send redirect to Broker - - - Follow redirects - - - ref - Broker authenticates user - (potentially with external IdP) - - - Send redirect to client with authorization code - - - Follow redirect with code - - - Request Passport-Scoped Access Token - - - Respond with Passport-Scoped Access Token - - - - - Token Exchange - - - Request to exchange Passport-Scoped - Access Token for Passport - - - ref - Signed visas can be sourced from multiple visa issuers - either on demand or via batch transfer/cached - - - - Obtain Visa A - - - - Obtain Visa B - - - - Obtain Visa C - - - Response with Passport containing Visas A, B, C - - - - -
- -

Conformance for Passport Clearinghouses

- -

Passport Clearinghouses consume Passports containing Visas in order to grant access to data.

- -
    -
  1. -

    Passport Clearinghouses MUST trust at least one Broker.

    - -
      -
    1. -

      Passport Clearinghouses MAY trust more than one Broker

      -
    2. -
    3. -

      The Passport Clearinghouse is responsible for assessing the risk in choosing to trust a token from a Broker.

      -
    4. -
    -
  2. -
  3. -

    Passport Clearinghouses MUST process access tokens to access a Broker’s Token or UserInfo Endpoint to get access to Visas OR MUST process Passports directly.

    - -
      -
    1. -

      For access token flows, Passport Clearinghouses MUST either check the validity of the access token or treat the access -token as opaque.

      -
    2. -
    3. -

      For Passport flows, Passport Clearinghouses MUST check the validity of the Passport.

      -
    4. -
    -
  4. -
  5. -

    A Passport Clearinghouse service can be a Broker itself and would follow the -Conformance For Brokers.

    -
  6. -
  7. -

    Passport Clearinghouses MUST provide protection against attacks as outlined in -[RFC6819].

    - -
      -
    1. -Section 5.1.6 of [RFC6819] states Ensure that client applications do not share tokens with 3rd parties. This profile provides a mechanism for Clearinghouses to consume access tokens from multiple brokers in a manner that does not involve 3rd parties. Client applications SHOULD take care to not spread the tokens to any other services that would be considered 3rd parties.
    2. -
    -
  8. -
  9. -

    If making use of Visas:

    - -
      -
    1. -

      The Passport Clearinghouse MUST validate that all JWT checks pass (such as -the JWT hasn’t expired) as described elsewhere in this specification and -the underlying OIDC specifications.

      -
    2. -
    3. -

      If making use of Visa Access Tokens:

      - -
        -
      1. -

        Token checks MUST be performed to ensure it complies with the access -token specification.

        -
      2. -
      3. -

        In addition to other validation checks, a Visa is considered -invalid if it is more than 1 hour old (as per the iat Claim) AND -Access Token Polling does not confirm that the token is still -valid (e.g. provide a success status code).

        -
      4. -
      -
    4. -
    5. -

      If making use of Visa Document Tokens:

      - -
        -
      1. -

        Fetching the public keys using the jku is not required if a Passport -Clearinghouse has received the keys for the given iss via a trusted, -out-of-band process.

        -
      2. -
      3. -

        If a Passport Clearinghouse is to use the jku URL to fetch the public -keys to verify the signature, then it MUST verify that the jku is -trusted for the given iss as part of the Passport Clearinghouse’s -trusted issuer configuration. This check MUST be performed before -calling the jku endpoint.

        -
      4. -
      -
    6. -
    -
  10. -
  11. -

    Access Token Polling: Clients MAY use access tokens, -including Visas, to occasionally check which Visas are still valid -at the associated Token or UserInfo Endpoint in order to establish -whether the user still meets the access requirements.

    - -

    This MUST NOT be done more than once per hour (excluding any optional retries) -per Passport Clearinghouse. Any request retries MUST include exponential backoff -delays based on best practices (e.g. include appropriate jitter). At a -minimum, the client MUST stop checking once any of the following occurs:

    - -
      -
    1. -

      The system can reasonably determine that authorization related to these -Claims is no longer needed by the user. For example, all downstream cloud -tasks have terminated and the related systems will no longer be using the -access token nor any downstream tokens that were authorized by evaluating -access requirements against Claims in the token.

      -
    2. -
    3. -

      The JWT access token has expired as per the exp field.

      -
    4. -
    5. -

      The client has detected that the user owning the identity or a system -administrator has revoked the access token or a refresh token related to -minting the access token.

      -
    6. -
    7. -

      The endpoint returns an HTTP status that is not retryable, e.g. HTTP status 400.

      -
    8. -
    9. -

      If the endpoint returns an updated set of Visas (this is -an OPTIONAL feature of a Visa Issuer), then the Passport -Clearinghouse MUST use the updated Visas and ignore the original -GA4GH Claim values in the Visa Access Token. If the Passport -Clearinghouse is unable to adjust for the updated Visas, then -it MUST act as though the token was revoked.

      -
    10. -
    -
  12. -
- -
- -

-

GA4GH JWT Formats

- -

This specification builds on the JWT format defined in [RFC7519]. -A well-formed JWS-Encoded JSON Web Token (JWT) consists of three concatenated -Base64url-encoded strings, separated by dots (.) The three sections are: header, -payload and signature. These JWTs follow JWS [RFC7515] -and utilize a number of standard JWT Claim names [IANA-JWT] -as per the registration process. -This profile is agnostic to the format of the id_token.

- -
- -

-

-

Passport-Scoped Access Token

- -

This is the format for the token that is issued by Brokers, extending the definition of -the [OIDC-Core] access token.

- -

Header

- -
{
- "typ": "<jwt-type-identifier>",
- "alg": "<algorithm-identifier>",
- "kid": "<key-identifier>"
-}
-
- - -

Payload

- -
{
- "iss": "https://<issuer-website>/",
- "sub": "<subject-identifier>",
- "idp": "<short-idp-identifier>",
- "aud": [
-  "<client-id1>",
-  "<client-id2>" ...
- ],
- "iat": <seconds-since-epoch>,
- "exp": <seconds-since-epoch>,
- "jti": <token-identifier>,
- "scope": "openid ga4gh_passport_v1 <additional-scopes>",
- <additional claims>
-}
-
-
    -
  • -

    iss: REQUIRED. MUST be able to be appended with -.well-known/openid-configuration to get spec of Broker.

    -
  • -
  • -

    sub: REQUIRED. Authenticated user unique identifier.

    -
  • -
  • -

    idp: OPTIONAL. SHOULD contain the IDP the user used to auth with. -This does not have to be unique and -can be used just to help inform if that is what a Visa Issuer -or Data Holder needs.

    -
  • -
  • -

    aud: OPTIONAL. If provided, it MUST contain the OAuth Client ID of the -relying party.

    -
  • -
  • -

    iat: REQUIRED. Time issued.

    -
  • -
  • -

    exp: REQUIRED. Time expired.

    -
  • -
  • -

    jti: RECOMMENDED. a unique identifier for the token as per -section 4.1.7 of [RFC7519]

    -
  • -
  • -

    scope: REQUIRED. Includes verified scopes. MUST include openid and ga4gh_passport_v1. -The scope Claim is defined by section 4.2 -of [RFC8693].

    -
  • -
  • -

    GA4GH Claims (ga4gh_passport_v1 or ga4gh_visa_v1): MUST NOT be included.

    -
  • -
  • -

    additional Claims: OPTIONAL. Any other additional non-GA4GH Claims are allowed. This specification does not dictate the format of other Claims.

    -
  • -
- -
- -

Visas provided by a Broker via UserInfo Endpoint

- -

The UserInfo Endpoint MAY use application/json -or application/jwt response content type. It is RECOMMENDED that if desiring to return a JWT, a Token Endpoint supporting -Token Exchange exists to do that and that the UserInfo Endpoint returns an application/json response. -Only the GA4GH claims must be as prescribed here. Refer to [OIDC-Core] for more information.

- -

The UserInfo response MUST include a ga4gh_passport_v1 Claim with a list of Visas -if a Passport-Scoped Access Token was used for accessing it.

- -
- -

Passport Format

- -

Passport Issuers MUST issue a Passport conforming to the requirements in this section when a Token Exchange -with the requested_token_type=urn:ga4gh:params:oauth:token-type:passport is successfully performed -(as described in the Conformance for Passport Issuers section).

- -

Passports are defined as signed JWTs. The JWT specification [RFC7519] -states that JWTs can be either signed and encoded using JWS Compact Serialization, -or encrypted and encoded using JWE Compact Serialization. -Passports are signed JWTs, which implies that they must be encoded using JWS Compact Serialization [RFC7515].

- -

Header

- -

This spec prescribes the following JWS headers for Passports -in addition to the guidelines established in [RFC7515]:

- -
    -
  • -typ: REQUIRED where the value must be vnd.ga4gh.passport+jwt for Passports.
  • -
- -

Payload

- -

Only the GA4GH claims must be as prescribed here. See the -JWT specification [RFC7519] for more details.

- -
{
- "iss": "https://<issuer-website>/",
- "sub": "<subject-identifier>",
- "aud": [
-  "<client-id1>",
-  "<client-id2>" ...
- ],
- "iat": <seconds-since-epoch>,
- "exp": <seconds-since-epoch>,
- "ga4gh_passport_v1": [
-    <Passport Visa>,
-    <Passport Visa (if more than one)>,
-    ...
- ]
-}
-
- -
    -
  • -

    iss: REQUIRED.

    -
  • -
  • -

    sub: REQUIRED. Please note that [OIDC-Core] in its section - Subject Identifier Types - allows the use of PPIDs (Pairwise Pseudonymous Identifiers) providing different sub value to each client - to preclude correlation of user’s activities at different clients. Even if a public identifier is used (same for all clients), - the value of the sub claim of a Passports may be different from the values of sub claims of its Visas, - and the values may need to be linked using LinkedIdentities - visas.

    -
  • -
  • -

    aud: OPTIONAL.

    -
  • -
  • -

    iat: REQUIRED.

    -
  • -
  • -

    exp: REQUIRED.

    -
  • -
  • -

    jti: RECOMMENDED.

    -
  • -
  • -

    ga4gh_passport_v1: REQUIRED. An array of GA4GH Visas. May be empty if a - user has no visas. See the [Passport] specification - for more details on types of visas.

    -
  • -
- -
- -

Signing Algorithms

- -

JWTs MUST be issued with signatures using the ES256 or RS256 algorithm.

- -
- -

Security Considerations

- -

The confidentiality and integrity of tokens must be secured, taking -JSON Web Token Best Current Practices in [RFC8725] -into consideration. Of special concern are:

-
    -
  • Revoking access tokens and Visa Assertions
  • -
  • Limiting damage of leaked tokens
  • -
- -
- -

Specification Revision History

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
VersionDateEditorNotes
1.2.02023-01Andrew Patterson, Martin Kuba, Kurt Rodarmer, Tom Conner, Max BarkleyIntroduce token exchange and Passport format, incorporate Visas, update diagrams
1.1.02021-07Craig Voisin -abandoned version now reserved, new concepts moved to v1.2
1.0.42021-07Craig VoisinImprove existing terminology and define Passport and Visa JWTs
1.0.32021-06Craig VoisinLinks for “scope” claim
1.0.22020-02David BernickClarify risk scenarios
1.0.12019-10David BernickClarify that non-GA4GH claims are allowed in tokens
1.0.02019-10Approved by GA4GH Steering Committee 
0.9.92019-10David Bernick, Craig Voisin, Mikael LindenApproved standard
0.9.52019-09Craig VoisinUpdate claim flow diagram and definitions
0.9.42019-08Craig VoisinEmbedded tokens for signed RI Claim Objects
0.9.32019-08Craig VoisinSupport for RI’s embedded tokens
0.9.22019-07David BernickMade changes based on feedback from review
0.9.12019-06Craig VoisinAdded terminology links
0.9.02017-Mikael Linden, Craig Voisin, David BernickInitial working version
- -
- -
- -
-
- - - diff --git a/draft-diagrams/assets/main.css b/draft-diagrams/assets/main.css deleted file mode 100644 index fbb59e6..0000000 --- a/draft-diagrams/assets/main.css +++ /dev/null @@ -1,701 +0,0 @@ -/** - * Reset some basic elements - */ -body, h1, h2, h3, h4, h5, h6, -p, blockquote, pre, hr, -dl, dd, ol, ul, figure { - margin: 0; - padding: 0; -} - -/** - * Basic styling - */ -body { - font: 400 16px/1.5 -apple-system, BlinkMacSystemFont, "Segoe UI", Roboto, Helvetica, Arial, sans-serif, "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Symbol"; - color: #111; - background-color: #fdfdfd; - -webkit-text-size-adjust: 100%; - -webkit-font-feature-settings: "kern" 1; - -moz-font-feature-settings: "kern" 1; - -o-font-feature-settings: "kern" 1; - font-feature-settings: "kern" 1; - font-kerning: normal; - display: flex; - min-height: 100vh; - flex-direction: column; -} - -/** - * Set `margin-bottom` to maintain vertical rhythm - */ -h1, h2, h3, h4, h5, h6, -p, blockquote, pre, -ul, ol, dl, figure, -.highlight { - margin-bottom: 15px; -} - -/** - * `main` element - */ -main { - display: block; /* Default value of `display` of `main` element is 'inline' in IE 11. */ -} - -/** - * Images - */ -img { - max-width: 100%; - vertical-align: middle; -} - -/** - * Figures - */ -figure > img { - display: block; -} - -figcaption { - font-size: 14px; -} - -/** - * Lists - */ -ul, ol { - margin-left: 30px; -} - -li > ul, -li > ol { - margin-bottom: 0; -} - -/** - * Headings - */ -h1, h2, h3, h4, h5, h6 { - font-weight: 400; -} - -/** - * Links - */ -a { - color: #2a7ae2; - text-decoration: none; -} -a:visited { - color: #1756a9; -} -a:hover { - color: #111; - text-decoration: underline; -} -.social-media-list a:hover { - text-decoration: none; -} -.social-media-list a:hover .username { - text-decoration: underline; -} - -/** - * Blockquotes - */ -blockquote { - color: #828282; - border-left: 4px solid #e8e8e8; - padding-left: 15px; - font-size: 18px; - letter-spacing: -1px; - font-style: italic; -} -blockquote > :last-child { - margin-bottom: 0; -} - -/** - * Code formatting - */ -pre, -code { - font-size: 15px; - border: 1px solid #e8e8e8; - border-radius: 3px; - background-color: #eef; -} - -code { - padding: 1px 5px; -} - -pre { - padding: 8px 12px; - overflow-x: auto; -} -pre > code { - border: 0; - padding-right: 0; - padding-left: 0; -} - -/** - * Wrapper - */ -.wrapper { - max-width: -webkit-calc(1200px - (30px * 2)); - max-width: calc(1200px - (30px * 2)); - margin-right: auto; - margin-left: auto; - padding-right: 30px; - padding-left: 30px; -} -@media screen and (max-width: 800px) { - .wrapper { - max-width: -webkit-calc(1200px - (30px)); - max-width: calc(1200px - (30px)); - padding-right: 15px; - padding-left: 15px; - } -} - -/** - * Clearfix - */ -.footer-col-wrapper:after, .wrapper:after { - content: ""; - display: table; - clear: both; -} - -/** - * Icons - */ -.svg-icon { - width: 16px; - height: 16px; - display: inline-block; - fill: #828282; - padding-right: 5px; - vertical-align: text-top; -} - -.social-media-list li + li { - padding-top: 5px; -} - -/** - * Tables - */ -table { - margin-bottom: 30px; - width: 100%; - text-align: left; - color: #3f3f3f; - border-collapse: collapse; - border: 1px solid #e8e8e8; -} -table tr:nth-child(even) { - background-color: #f7f7f7; -} -table th, table td { - padding: 10px 15px; -} -table th { - background-color: #f0f0f0; - border: 1px solid #dedede; - border-bottom-color: #c9c9c9; -} -table td { - border: 1px solid #e8e8e8; -} - -/** - * Site header - */ -.site-header { - border-top: 5px solid #424242; - border-bottom: 1px solid #e8e8e8; - min-height: 55.95px; - position: relative; -} - -.site-title { - font-size: 26px; - font-weight: 300; - line-height: 54px; - letter-spacing: -1px; - margin-bottom: 0; - float: left; -} -.site-title, .site-title:visited { - color: #424242; -} - -.site-nav { - float: right; - line-height: 54px; -} -.site-nav .nav-trigger { - display: none; -} -.site-nav .menu-icon { - display: none; -} -.site-nav .page-link { - color: #111; - line-height: 1.5; -} -.site-nav .page-link:not(:last-child) { - margin-right: 20px; -} -@media screen and (max-width: 600px) { - .site-nav { - position: absolute; - top: 9px; - right: 15px; - background-color: #fdfdfd; - border: 1px solid #e8e8e8; - border-radius: 5px; - text-align: right; - } - .site-nav label[for=nav-trigger] { - display: block; - float: right; - width: 36px; - height: 36px; - z-index: 2; - cursor: pointer; - } - .site-nav .menu-icon { - display: block; - float: right; - width: 36px; - height: 26px; - line-height: 0; - padding-top: 10px; - text-align: center; - } - .site-nav .menu-icon > svg { - fill: #424242; - } - .site-nav input ~ .trigger { - clear: both; - display: none; - } - .site-nav input:checked ~ .trigger { - display: block; - padding-bottom: 5px; - } - .site-nav .page-link { - display: block; - padding: 5px 10px; - margin-left: 20px; - } - .site-nav .page-link:not(:last-child) { - margin-right: 0; - } -} - -/** - * Site footer - */ -.site-footer { - border-top: 1px solid #e8e8e8; - padding: 30px 0; -} - -.footer-heading { - font-size: 18px; - margin-bottom: 15px; -} - -.contact-list, -.social-media-list { - list-style: none; - margin-left: 0; -} - -.footer-col-wrapper { - font-size: 15px; - color: #828282; - margin-left: -15px; -} - -.footer-col { - float: left; - margin-bottom: 15px; - padding-left: 15px; -} - -.footer-col-1 { - width: -webkit-calc(35% - (30px / 2)); - width: calc(35% - (30px / 2)); -} - -.footer-col-2 { - width: -webkit-calc(20% - (30px / 2)); - width: calc(20% - (30px / 2)); -} - -.footer-col-3 { - width: -webkit-calc(45% - (30px / 2)); - width: calc(45% - (30px / 2)); -} - -@media screen and (max-width: 800px) { - .footer-col-1, - .footer-col-2 { - width: -webkit-calc(50% - (30px / 2)); - width: calc(50% - (30px / 2)); - } - .footer-col-3 { - width: -webkit-calc(100% - (30px / 2)); - width: calc(100% - (30px / 2)); - } -} -@media screen and (max-width: 600px) { - .footer-col { - float: none; - width: -webkit-calc(100% - (30px / 2)); - width: calc(100% - (30px / 2)); - } -} -/** - * Page content - */ -.page-content { - padding: 30px 0; - flex: 1; -} - -.page-heading { - font-size: 32px; -} - -.post-list-heading { - font-size: 28px; -} - -.post-list { - margin-left: 0; - list-style: none; -} -.post-list > li { - margin-bottom: 30px; -} - -.post-meta { - font-size: 14px; - color: #828282; -} - -.post-link { - display: block; - font-size: 24px; -} - -/** - * Posts - */ -.post-header { - margin-bottom: 30px; -} - -.post-title { - font-size: 42px; - letter-spacing: -1px; - line-height: 1; -} -@media screen and (max-width: 800px) { - .post-title { - font-size: 36px; - } -} - -.post-content { - margin-bottom: 30px; -} -.post-content h2 { - font-size: 32px; -} -@media screen and (max-width: 800px) { - .post-content h2 { - font-size: 28px; - } -} -.post-content h3 { - font-size: 26px; -} -@media screen and (max-width: 800px) { - .post-content h3 { - font-size: 22px; - } -} -.post-content h4 { - font-size: 20px; -} -@media screen and (max-width: 800px) { - .post-content h4 { - font-size: 18px; - } -} - -/** - * Syntax highlighting styles - */ -.highlight { - background: #fff; -} -.highlighter-rouge .highlight { - background: #eef; -} -.highlight .c { - color: #998; - font-style: italic; -} -.highlight .err { - color: #a61717; - background-color: #e3d2d2; -} -.highlight .k { - font-weight: bold; -} -.highlight .o { - font-weight: bold; -} -.highlight .cm { - color: #998; - font-style: italic; -} -.highlight .cp { - color: #999; - font-weight: bold; -} -.highlight .c1 { - color: #998; - font-style: italic; -} -.highlight .cs { - color: #999; - font-weight: bold; - font-style: italic; -} -.highlight .gd { - color: #000; - background-color: #fdd; -} -.highlight .gd .x { - color: #000; - background-color: #faa; -} -.highlight .ge { - font-style: italic; -} -.highlight .gr { - color: #a00; -} -.highlight .gh { - color: #999; -} -.highlight .gi { - color: #000; - background-color: #dfd; -} -.highlight .gi .x { - color: #000; - background-color: #afa; -} -.highlight .go { - color: #888; -} -.highlight .gp { - color: #555; -} -.highlight .gs { - font-weight: bold; -} -.highlight .gu { - color: #aaa; -} -.highlight .gt { - color: #a00; -} -.highlight .kc { - font-weight: bold; -} -.highlight .kd { - font-weight: bold; -} -.highlight .kp { - font-weight: bold; -} -.highlight .kr { - font-weight: bold; -} -.highlight .kt { - color: #458; - font-weight: bold; -} -.highlight .m { - color: #099; -} -.highlight .s { - color: #d14; -} -.highlight .na { - color: #008080; -} -.highlight .nb { - color: #0086B3; -} -.highlight .nc { - color: #458; - font-weight: bold; -} -.highlight .no { - color: #008080; -} -.highlight .ni { - color: #800080; -} -.highlight .ne { - color: #900; - font-weight: bold; -} -.highlight .nf { - color: #900; - font-weight: bold; -} -.highlight .nn { - color: #555; -} -.highlight .nt { - color: #000080; -} -.highlight .nv { - color: #008080; -} -.highlight .ow { - font-weight: bold; -} -.highlight .w { - color: #bbb; -} -.highlight .mf { - color: #099; -} -.highlight .mh { - color: #099; -} -.highlight .mi { - color: #099; -} -.highlight .mo { - color: #099; -} -.highlight .sb { - color: #d14; -} -.highlight .sc { - color: #d14; -} -.highlight .sd { - color: #d14; -} -.highlight .s2 { - color: #d14; -} -.highlight .se { - color: #d14; -} -.highlight .sh { - color: #d14; -} -.highlight .si { - color: #d14; -} -.highlight .sx { - color: #d14; -} -.highlight .sr { - color: #009926; -} -.highlight .s1 { - color: #d14; -} -.highlight .ss { - color: #990073; -} -.highlight .bp { - color: #999; -} -.highlight .vc { - color: #008080; -} -.highlight .vg { - color: #008080; -} -.highlight .vi { - color: #008080; -} -.highlight .il { - color: #099; -} - -ol ol { - list-style-type: lower-alpha; -} - -ol ol ol { - list-style-type: lower-roman; -} - -ol ol ol ol { - list-style-type: circle; -} - -ol ol ol ol ol { - list-style-type: disc; -} - -li:only-child { - margin-bottom: 1em; -} - -.rationale { - background: rgba(170, 170, 170, 0.2); - border-left: 5px solid #008; - border-radius: 5px; - box-shadow: 0 1px 2px rgba(0, 0, 0, 0.12), 0 3px 10px rgba(0, 0, 0, 0.08); - padding: 0.8rem; -} -.rationale::before { - color: #008; - content: "RATIONALE"; - display: block; - font-weight: bold; - font-size: 0.75em; - padding-bottom: 0.125rem; -} - -.deprecation { - background: rgba(221, 221, 221, 0.2); - border-left: 5px solid #FFA500; - border-radius: 5px; - box-shadow: 0 1px 2px rgba(0, 0, 0, 0.12), 0 3px 10px rgba(0, 0, 0, 0.08); - padding: 0.8rem; -} -.deprecation::before { - color: #FFA500; - content: "DEPRECATION WARNING"; - display: block; - font-weight: bold; - font-size: 0.75em; - padding-bottom: 0.125rem; -} - -/*# sourceMappingURL=main.css.map */ \ No newline at end of file diff --git a/draft-diagrams/assets/main.css.map b/draft-diagrams/assets/main.css.map deleted file mode 100644 index 8f17265..0000000 --- a/draft-diagrams/assets/main.css.map +++ /dev/null @@ -1 +0,0 @@ -{"version":3,"sourceRoot":"","sources":["../vendor/bundle/ruby/2.7.0/gems/minima-2.5.1/_sass/minima/_base.scss","../_sass/minima.scss","../vendor/bundle/ruby/2.7.0/gems/minima-2.5.1/_sass/minima/_layout.scss","../vendor/bundle/ruby/2.7.0/gems/minima-2.5.1/_sass/minima/_syntax-highlighting.scss"],"names":[],"mappings":"AAAA;AAAA;AAAA;AAGA;AAAA;AAAA;EAGE;EACA;;;AAKF;AAAA;AAAA;AAGA;EACE;EACA,OCLiB;EDMjB,kBCLiB;EDMjB;EACA;EACG;EACE;EACG;EACR;EACA;EACA;EACA;;;AAKF;AAAA;AAAA;AAGA;AAAA;AAAA;AAAA;EAIE;;;AAKF;AAAA;AAAA;AAGA;EACE;;;AAKF;AAAA;AAAA;AAGA;EACE;EACA;;;AAKF;AAAA;AAAA;AAGA;EACE;;;AAGF;EACE,WChEiB;;;ADqEnB;AAAA;AAAA;AAGA;EACE,aCtEiB;;;AD0EjB;AAAA;EAEE;;;AAMJ;AAAA;AAAA;AAGA;EACE,aC1FiB;;;AD+FnB;AAAA;AAAA;AAGA;EACE,OC3FiB;ED4FjB;;AAEA;EACE;;AAGF;EACE,OCrGe;EDsGf;;AAGF;EACE;;AAEA;EACE;;;AAMN;AAAA;AAAA;AAGA;EACE,OCnHiB;EDoHjB;EACA;EC1FA;ED4FA;EACA;;AAEA;EACE;;;AAMJ;AAAA;AAAA;AAGA;AAAA;ECzGE;ED4GA;EACA;EACA;;;AAGF;EACE;;;AAGF;EACE;EACA;;AAEA;EACE;EACA;EACA;;;AAMJ;AAAA;AAAA;AAGA;EACE;EACA;EACA;EACA;EACA,eC3KiB;ED4KjB,cC5KiB;;AA2BjB;ED2IF;IAUI;IACA;IACA;IACA;;;;AAMJ;AAAA;AAAA;AAGA;EACE;EACA;EACA;;;AAKF;AAAA;AAAA;AAIA;EACI;EACA;EACA;EACA;EACA;EACA;;;AAIF;EACE;;;AAMJ;AAAA;AAAA;AAGA;EACE,eC7NiB;ED8NjB;EACA,YCrNiB;EDsNjB;EACA;EACA;;AAEE;EACE;;AAGJ;EACE;;AAEF;EACE;EACA;EACA;;AAEF;EACE;;;AE3PJ;AAAA;AAAA;AAGA;EACE;EACA;EACA;EAGA;;;AAGF;ED+BE;EC7BA;EACA;EACA;EACA;EACA;;AAEA;EAEE,ODJe;;;ACQnB;EACE;EACA;;AAEA;EACI;;AAGJ;EACE;;AAGF;EACE,OD3Be;EC4Bf,aDhCe;;ACmCf;EACE;;ADPJ;ECXF;IAuBI;IACA;IACA;IACA,kBDvCe;ICwCf;IACA;IACA;;EAEA;IACE;IACA;IACA;IACA;IACA;IACA;;EAGF;IACE;IACA;IACA;IACA;IACA;IACA;IACA;;EAEA;IACE,MD1DW;;EC8Df;IACE;IACA;;EAGF;IACE;IACA;;EAGF;IACE;IACA;IAKA;;EAHA;IACE;;;;AASR;AAAA;AAAA;AAGA;EACE;EACA;;;AAGF;EDrEE;ECuEA;;;AAGF;AAAA;EAEE;EACA;;;AAGF;EDhFE;ECkFA,OD7GiB;EC8GjB;;;AAIF;EACE;EACA;EACA;;;AAGF;EACE;EACA;;;AAGF;EACE;EACA;;;AAGF;EACE;EACA;;;AD/GA;ECmHA;AAAA;IAEE;IACA;;EAGF;IACE;IACA;;;AD3HF;ECgIA;IACE;IACA;IACA;;;AAMJ;AAAA;AAAA;AAGA;EACE;EACA;;;AAGF;ED3IE;;;AC+IF;ED/IE;;;ACmJF;EACE;EACA;;AAEA;EACE,eDzLe;;;AC6LnB;EACE,WDjMiB;ECkMjB,ODzLiB;;;AC4LnB;EACE;EDlKA;;;ACwKF;AAAA;AAAA;AAGA;EACE,eD7MiB;;;ACgNnB;ED/KE;ECiLA;EACA;;ADxLA;ECqLF;ID/KE;;;;ACyLF;EACE,eD3NiB;;AC6NjB;ED5LA;;AANA;ECkMA;ID5LA;;;ACoMA;EDpMA;;AANA;EC0MA;IDpMA;;;AC4MA;ED5MA;;AANA;ECkNA;ID5MA;;;;AE3CF;AAAA;AAAA;AAGA;EACE;;AAGA;EACE;;AAGF;EAAS;EAAa;;AACtB;EAAS;EAAgB;;AACzB;EAAS;;AACT;EAAS;;AACT;EAAS;EAAa;;AACtB;EAAS;EAAa;;AACtB;EAAS;EAAa;;AACtB;EAAS;EAAa;EAAmB;;AACzC;EAAS;EAAa;;AACtB;EAAS;EAAa;;AACtB;EAAS;;AACT;EAAS;;AACT;EAAS;;AACT;EAAS;EAAa;;AACtB;EAAS;EAAa;;AACtB;EAAS;;AACT;EAAS;;AACT;EAAS;;AACT;EAAS;;AACT;EAAS;;AACT;EAAS;;AACT;EAAS;;AACT;EAAS;;AACT;EAAS;;AACT;EAAS;EAAa;;AACtB;EAAS;;AACT;EAAS;;AACT;EAAS;;AACT;EAAS;;AACT;EAAS;EAAa;;AACtB;EAAS;;AACT;EAAS;;AACT;EAAS;EAAa;;AACtB;EAAS;EAAa;;AACtB;EAAS;;AACT;EAAS;;AACT;EAAS;;AACT;EAAS;;AACT;EAAS;;AACT;EAAS;;AACT;EAAS;;AACT;EAAS;;AACT;EAAS;;AACT;EAAS;;AACT;EAAS;;AACT;EAAS;;AACT;EAAS;;AACT;EAAS;;AACT;EAAS;;AACT;EAAS;;AACT;EAAS;;AACT;EAAS;;AACT;EAAS;;AACT;EAAS;;AACT;EAAS;;AACT;EAAS;;AACT;EAAS;;AACT;EAAS;;AACT;EAAS;;;AFdX;EAAQ;;;AACR;EAAW;;;AACX;EAAc;;;AACd;EAAiB;;;AAIjB;EACE;;;AAeA;EACE;EACA;EACA,eAbY;EAcZ;EACA;;AAEA;EACE;EACA;EACA;EACA;EACA;EACA;;;AAbJ;EACE;EACA;EACA,eAbY;EAcZ;EACA;;AAEA;EACE;EACA;EACA;EACA;EACA;EACA","sourcesContent":["/**\n * Reset some basic elements\n */\nbody, h1, h2, h3, h4, h5, h6,\np, blockquote, pre, hr,\ndl, dd, ol, ul, figure {\n margin: 0;\n padding: 0;\n}\n\n\n\n/**\n * Basic styling\n */\nbody {\n font: $base-font-weight #{$base-font-size}/#{$base-line-height} $base-font-family;\n color: $text-color;\n background-color: $background-color;\n -webkit-text-size-adjust: 100%;\n -webkit-font-feature-settings: \"kern\" 1;\n -moz-font-feature-settings: \"kern\" 1;\n -o-font-feature-settings: \"kern\" 1;\n font-feature-settings: \"kern\" 1;\n font-kerning: normal;\n display: flex;\n min-height: 100vh;\n flex-direction: column;\n}\n\n\n\n/**\n * Set `margin-bottom` to maintain vertical rhythm\n */\nh1, h2, h3, h4, h5, h6,\np, blockquote, pre,\nul, ol, dl, figure,\n%vertical-rhythm {\n margin-bottom: $spacing-unit / 2;\n}\n\n\n\n/**\n * `main` element\n */\nmain {\n display: block; /* Default value of `display` of `main` element is 'inline' in IE 11. */\n}\n\n\n\n/**\n * Images\n */\nimg {\n max-width: 100%;\n vertical-align: middle;\n}\n\n\n\n/**\n * Figures\n */\nfigure > img {\n display: block;\n}\n\nfigcaption {\n font-size: $small-font-size;\n}\n\n\n\n/**\n * Lists\n */\nul, ol {\n margin-left: $spacing-unit;\n}\n\nli {\n > ul,\n > ol {\n margin-bottom: 0;\n }\n}\n\n\n\n/**\n * Headings\n */\nh1, h2, h3, h4, h5, h6 {\n font-weight: $base-font-weight;\n}\n\n\n\n/**\n * Links\n */\na {\n color: $brand-color;\n text-decoration: none;\n\n &:visited {\n color: darken($brand-color, 15%);\n }\n\n &:hover {\n color: $text-color;\n text-decoration: underline;\n }\n\n .social-media-list &:hover {\n text-decoration: none;\n\n .username {\n text-decoration: underline;\n }\n }\n}\n\n\n/**\n * Blockquotes\n */\nblockquote {\n color: $grey-color;\n border-left: 4px solid $grey-color-light;\n padding-left: $spacing-unit / 2;\n @include relative-font-size(1.125);\n letter-spacing: -1px;\n font-style: italic;\n\n > :last-child {\n margin-bottom: 0;\n }\n}\n\n\n\n/**\n * Code formatting\n */\npre,\ncode {\n @include relative-font-size(0.9375);\n border: 1px solid $grey-color-light;\n border-radius: 3px;\n background-color: #eef;\n}\n\ncode {\n padding: 1px 5px;\n}\n\npre {\n padding: 8px 12px;\n overflow-x: auto;\n\n > code {\n border: 0;\n padding-right: 0;\n padding-left: 0;\n }\n}\n\n\n\n/**\n * Wrapper\n */\n.wrapper {\n max-width: -webkit-calc(#{$content-width} - (#{$spacing-unit} * 2));\n max-width: calc(#{$content-width} - (#{$spacing-unit} * 2));\n margin-right: auto;\n margin-left: auto;\n padding-right: $spacing-unit;\n padding-left: $spacing-unit;\n @extend %clearfix;\n\n @include media-query($on-laptop) {\n max-width: -webkit-calc(#{$content-width} - (#{$spacing-unit}));\n max-width: calc(#{$content-width} - (#{$spacing-unit}));\n padding-right: $spacing-unit / 2;\n padding-left: $spacing-unit / 2;\n }\n}\n\n\n\n/**\n * Clearfix\n */\n%clearfix:after {\n content: \"\";\n display: table;\n clear: both;\n}\n\n\n\n/**\n * Icons\n */\n\n.svg-icon {\n width: 16px;\n height: 16px;\n display: inline-block;\n fill: #{$grey-color};\n padding-right: 5px;\n vertical-align: text-top;\n}\n\n.social-media-list {\n li + li {\n padding-top: 5px;\n }\n}\n\n\n\n/**\n * Tables\n */\ntable {\n margin-bottom: $spacing-unit;\n width: 100%;\n text-align: $table-text-align;\n color: lighten($text-color, 18%);\n border-collapse: collapse;\n border: 1px solid $grey-color-light;\n tr {\n &:nth-child(even) {\n background-color: lighten($grey-color-light, 6%);\n }\n }\n th, td {\n padding: ($spacing-unit / 3) ($spacing-unit / 2);\n }\n th {\n background-color: lighten($grey-color-light, 3%);\n border: 1px solid darken($grey-color-light, 4%);\n border-bottom-color: darken($grey-color-light, 12%);\n }\n td {\n border: 1px solid $grey-color-light;\n }\n}\n","@charset \"utf-8\";\n\n// Define defaults for each variable.\n\n$base-font-family: -apple-system, BlinkMacSystemFont, \"Segoe UI\", Roboto, Helvetica, Arial, sans-serif, \"Apple Color Emoji\", \"Segoe UI Emoji\", \"Segoe UI Symbol\" !default;\n$base-font-size: 16px !default;\n$base-font-weight: 400 !default;\n$small-font-size: $base-font-size * 0.875 !default;\n$base-line-height: 1.5 !default;\n\n$spacing-unit: 30px !default;\n\n$text-color: #111 !default;\n$background-color: #fdfdfd !default;\n$brand-color: #2a7ae2 !default;\n\n$grey-color: #828282 !default;\n$grey-color-light: lighten($grey-color, 40%) !default;\n$grey-color-dark: darken($grey-color, 25%) !default;\n\n$table-text-align: left !default;\n\n// Width of the content area\n// changed from minima default (GA4GH)\n$content-width: 1200px !default;\n\n$on-palm: 600px !default;\n$on-laptop: 800px !default;\n\n// Use media queries like this:\n// @include media-query($on-palm) {\n// .wrapper {\n// padding-right: $spacing-unit / 2;\n// padding-left: $spacing-unit / 2;\n// }\n// }\n@mixin media-query($device) {\n @media screen and (max-width: $device) {\n @content;\n }\n}\n\n@mixin relative-font-size($ratio) {\n font-size: $base-font-size * $ratio;\n}\n\n// Import partials.\n@import\n\"minima/base\",\n\"minima/layout\",\n\"minima/syntax-highlighting\"\n;\n\n// due to estensive nested lists we set styling (GA4GH added)\n\nol ol { list-style-type: lower-alpha; }\nol ol ol { list-style-type: lower-roman; }\nol ol ol ol { list-style-type: circle; }\nol ol ol ol ol { list-style-type: disc; }\n\n// a fix for Kramdowns markup/css that doesn't leave enough space at the end of single item lists (GA4GH added)\n\nli:only-child {\n margin-bottom: 1em;\n}\n\n// custom CSS for callouts (GA4GH added)\n\n$border-radius: 5px;\n\n$callouts: (\n // rationale example callout\n rationale: (#008, rgba(#aaa, .2), 'RATIONALE'),\n // deprecation warning callout\n deprecation: (#FFA500, rgba(#ddd, .2), 'DEPRECATION WARNING'),\n);\n\n@each $class, $props in $callouts {\n .#{$class} {\n background: nth($props, 2);\n border-left: $border-radius solid nth($props, 1);\n border-radius: $border-radius;\n box-shadow: 0 1px 2px rgba(0, 0, 0, 0.12), 0 3px 10px rgba(0, 0, 0, 0.08);\n padding: .8rem;\n\n &::before {\n color: nth($props, 1);\n content: nth($props, 3);\n display: block;\n font-weight: bold;\n font-size: .75em;\n padding-bottom: .125rem;\n }\n }\n}\n","/**\n * Site header\n */\n.site-header {\n border-top: 5px solid $grey-color-dark;\n border-bottom: 1px solid $grey-color-light;\n min-height: $spacing-unit * 1.865;\n\n // Positioning context for the mobile navigation icon\n position: relative;\n}\n\n.site-title {\n @include relative-font-size(1.625);\n font-weight: 300;\n line-height: $base-line-height * $base-font-size * 2.25;\n letter-spacing: -1px;\n margin-bottom: 0;\n float: left;\n\n &,\n &:visited {\n color: $grey-color-dark;\n }\n}\n\n.site-nav {\n float: right;\n line-height: $base-line-height * $base-font-size * 2.25;\n\n .nav-trigger {\n display: none;\n }\n\n .menu-icon {\n display: none;\n }\n\n .page-link {\n color: $text-color;\n line-height: $base-line-height;\n\n // Gaps between nav items, but not on the last one\n &:not(:last-child) {\n margin-right: 20px;\n }\n }\n\n @include media-query($on-palm) {\n position: absolute;\n top: 9px;\n right: $spacing-unit / 2;\n background-color: $background-color;\n border: 1px solid $grey-color-light;\n border-radius: 5px;\n text-align: right;\n\n label[for=\"nav-trigger\"] {\n display: block;\n float: right;\n width: 36px;\n height: 36px;\n z-index: 2;\n cursor: pointer;\n }\n\n .menu-icon {\n display: block;\n float: right;\n width: 36px;\n height: 26px;\n line-height: 0;\n padding-top: 10px;\n text-align: center;\n\n > svg {\n fill: $grey-color-dark;\n }\n }\n\n input ~ .trigger {\n clear: both;\n display: none;\n }\n\n input:checked ~ .trigger {\n display: block;\n padding-bottom: 5px;\n }\n\n .page-link {\n display: block;\n padding: 5px 10px;\n\n &:not(:last-child) {\n margin-right: 0;\n }\n margin-left: 20px;\n }\n }\n}\n\n\n\n/**\n * Site footer\n */\n.site-footer {\n border-top: 1px solid $grey-color-light;\n padding: $spacing-unit 0;\n}\n\n.footer-heading {\n @include relative-font-size(1.125);\n margin-bottom: $spacing-unit / 2;\n}\n\n.contact-list,\n.social-media-list {\n list-style: none;\n margin-left: 0;\n}\n\n.footer-col-wrapper {\n @include relative-font-size(0.9375);\n color: $grey-color;\n margin-left: -$spacing-unit / 2;\n @extend %clearfix;\n}\n\n.footer-col {\n float: left;\n margin-bottom: $spacing-unit / 2;\n padding-left: $spacing-unit / 2;\n}\n\n.footer-col-1 {\n width: -webkit-calc(35% - (#{$spacing-unit} / 2));\n width: calc(35% - (#{$spacing-unit} / 2));\n}\n\n.footer-col-2 {\n width: -webkit-calc(20% - (#{$spacing-unit} / 2));\n width: calc(20% - (#{$spacing-unit} / 2));\n}\n\n.footer-col-3 {\n width: -webkit-calc(45% - (#{$spacing-unit} / 2));\n width: calc(45% - (#{$spacing-unit} / 2));\n}\n\n@include media-query($on-laptop) {\n .footer-col-1,\n .footer-col-2 {\n width: -webkit-calc(50% - (#{$spacing-unit} / 2));\n width: calc(50% - (#{$spacing-unit} / 2));\n }\n\n .footer-col-3 {\n width: -webkit-calc(100% - (#{$spacing-unit} / 2));\n width: calc(100% - (#{$spacing-unit} / 2));\n }\n}\n\n@include media-query($on-palm) {\n .footer-col {\n float: none;\n width: -webkit-calc(100% - (#{$spacing-unit} / 2));\n width: calc(100% - (#{$spacing-unit} / 2));\n }\n}\n\n\n\n/**\n * Page content\n */\n.page-content {\n padding: $spacing-unit 0;\n flex: 1;\n}\n\n.page-heading {\n @include relative-font-size(2);\n}\n\n.post-list-heading {\n @include relative-font-size(1.75);\n}\n\n.post-list {\n margin-left: 0;\n list-style: none;\n\n > li {\n margin-bottom: $spacing-unit;\n }\n}\n\n.post-meta {\n font-size: $small-font-size;\n color: $grey-color;\n}\n\n.post-link {\n display: block;\n @include relative-font-size(1.5);\n}\n\n\n\n/**\n * Posts\n */\n.post-header {\n margin-bottom: $spacing-unit;\n}\n\n.post-title {\n @include relative-font-size(2.625);\n letter-spacing: -1px;\n line-height: 1;\n\n @include media-query($on-laptop) {\n @include relative-font-size(2.25);\n }\n}\n\n.post-content {\n margin-bottom: $spacing-unit;\n\n h2 {\n @include relative-font-size(2);\n\n @include media-query($on-laptop) {\n @include relative-font-size(1.75);\n }\n }\n\n h3 {\n @include relative-font-size(1.625);\n\n @include media-query($on-laptop) {\n @include relative-font-size(1.375);\n }\n }\n\n h4 {\n @include relative-font-size(1.25);\n\n @include media-query($on-laptop) {\n @include relative-font-size(1.125);\n }\n }\n}\n","/**\n * Syntax highlighting styles\n */\n.highlight {\n background: #fff;\n @extend %vertical-rhythm;\n\n .highlighter-rouge & {\n background: #eef;\n }\n\n .c { color: #998; font-style: italic } // Comment\n .err { color: #a61717; background-color: #e3d2d2 } // Error\n .k { font-weight: bold } // Keyword\n .o { font-weight: bold } // Operator\n .cm { color: #998; font-style: italic } // Comment.Multiline\n .cp { color: #999; font-weight: bold } // Comment.Preproc\n .c1 { color: #998; font-style: italic } // Comment.Single\n .cs { color: #999; font-weight: bold; font-style: italic } // Comment.Special\n .gd { color: #000; background-color: #fdd } // Generic.Deleted\n .gd .x { color: #000; background-color: #faa } // Generic.Deleted.Specific\n .ge { font-style: italic } // Generic.Emph\n .gr { color: #a00 } // Generic.Error\n .gh { color: #999 } // Generic.Heading\n .gi { color: #000; background-color: #dfd } // Generic.Inserted\n .gi .x { color: #000; background-color: #afa } // Generic.Inserted.Specific\n .go { color: #888 } // Generic.Output\n .gp { color: #555 } // Generic.Prompt\n .gs { font-weight: bold } // Generic.Strong\n .gu { color: #aaa } // Generic.Subheading\n .gt { color: #a00 } // Generic.Traceback\n .kc { font-weight: bold } // Keyword.Constant\n .kd { font-weight: bold } // Keyword.Declaration\n .kp { font-weight: bold } // Keyword.Pseudo\n .kr { font-weight: bold } // Keyword.Reserved\n .kt { color: #458; font-weight: bold } // Keyword.Type\n .m { color: #099 } // Literal.Number\n .s { color: #d14 } // Literal.String\n .na { color: #008080 } // Name.Attribute\n .nb { color: #0086B3 } // Name.Builtin\n .nc { color: #458; font-weight: bold } // Name.Class\n .no { color: #008080 } // Name.Constant\n .ni { color: #800080 } // Name.Entity\n .ne { color: #900; font-weight: bold } // Name.Exception\n .nf { color: #900; font-weight: bold } // Name.Function\n .nn { color: #555 } // Name.Namespace\n .nt { color: #000080 } // Name.Tag\n .nv { color: #008080 } // Name.Variable\n .ow { font-weight: bold } // Operator.Word\n .w { color: #bbb } // Text.Whitespace\n .mf { color: #099 } // Literal.Number.Float\n .mh { color: #099 } // Literal.Number.Hex\n .mi { color: #099 } // Literal.Number.Integer\n .mo { color: #099 } // Literal.Number.Oct\n .sb { color: #d14 } // Literal.String.Backtick\n .sc { color: #d14 } // Literal.String.Char\n .sd { color: #d14 } // Literal.String.Doc\n .s2 { color: #d14 } // Literal.String.Double\n .se { color: #d14 } // Literal.String.Escape\n .sh { color: #d14 } // Literal.String.Heredoc\n .si { color: #d14 } // Literal.String.Interpol\n .sx { color: #d14 } // Literal.String.Other\n .sr { color: #009926 } // Literal.String.Regex\n .s1 { color: #d14 } // Literal.String.Single\n .ss { color: #990073 } // Literal.String.Symbol\n .bp { color: #999 } // Name.Builtin.Pseudo\n .vc { color: #008080 } // Name.Variable.Class\n .vg { color: #008080 } // Name.Variable.Global\n .vi { color: #008080 } // Name.Variable.Instance\n .il { color: #099 } // Literal.Number.Integer.Long\n}\n"],"file":"main.css"} \ No newline at end of file diff --git a/draft-diagrams/assets/minima-social-icons.svg b/draft-diagrams/assets/minima-social-icons.svg deleted file mode 100644 index fa7399f..0000000 --- a/draft-diagrams/assets/minima-social-icons.svg +++ /dev/null @@ -1,33 +0,0 @@ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - diff --git a/draft-diagrams/changes-1_2.html b/draft-diagrams/changes-1_2.html deleted file mode 100644 index b7340d0..0000000 --- a/draft-diagrams/changes-1_2.html +++ /dev/null @@ -1,239 +0,0 @@ - - - - - - - - -Changes Between Versions 1.0 and 1.2 | GA4GH Data Security - - - - - - - - - - - - - - - - - - -
-
-
- -
-

Changes Between Versions 1.0 and 1.2

-
- -
-

This document lists changes between

-
    -
  • GA4GH AAI OIDC Profile 1.0.0 and 1.2 -
  • -
  • GA4GH Passport 1.0.0 and 1.2
  • -
- -

Table of Contents

- - - -

Terminology changes

- -
    -
  • Removed double definitions of same concepts like “Claim Source” in AAI and “Passport Visa Assertion Source” in Passport.
  • -
  • Made distinction between claim as an abstract assertion and a JWT/OIDC claim as a pair of a string key and a JSON value.
  • -
  • Renamed “Data Owner” to “Data Controller” to be compatible with European GDPR
  • -
- -

Changed terms

- -
    -
  • -Claim Management System removed, the term was not used
  • -
  • claim → Visa Assertion -
  • -
  • -Claim RepositoryVisa Assertion Repository -
  • -
  • -Claim SourceVisa Assertion Source -
  • -
  • -Claim ClearinghousePassport Clearinghouse -
  • -
  • -Embedded TokenVisa -
  • -
  • -Embedded Token IssuerVisa Issuer -
  • -
  • -Embedded Access TokenVisa Access Token -
  • -
  • -Embedded Document TokenVisa Document Token -
  • -
  • -Flow of ClaimsFlow of Assertions -
  • -
  • -Passport Bearer TokenPassport-Scoped Access Token -
  • -
  • -Data OwnerData Controller -
  • -
- -

New terms

- -
    -
  • -Passport - A signed and verifiable JWT container for holding Visas.
  • -
  • -Passport Issuer - a service that creates and signs Passports.
  • -
  • -Token Endpoint – as defined by OIDC
  • -
  • -UserInfo Endpoint - as defined by OIDC
  • -
- -

Introduced Token Exchange mechanism

- -

The standardized mechanism for exchanging access tokens for other tokens defined in RFC 8693 OAuth 2.0 Token Exchange -was added and used for releasing Passports.

- -

Redefined Passport as a JWT containing Visas

- -

In version 1.0, Passport was defined as ”GA4GH-compatible access token along with the Passport Claim that is returned from Passport Broker service endpoints using such an access token“, -thus as a tuple of an access token and a list of Visas that can be obtained from UserInfo endpoint using the access token.

- -

In version 1.2, Passport is defined as “a signed and verifiable JWT container for holding Visas“, thus as a token that can be passed among systems.

- -

For backward compatibility with version 1.0, list of Visas is still provided as a claim value from UserInfo endpoint.

- -

Defined Passport Issuer

- -

A Passport Issuer is a service that creates and signs Passports. -A Broker is an OIDC Provider service that collects Visas from Visa Issuers and provides them to Passport Clearinghouses.

- -

Broker may optionally become a Passport Issuer by supporting Token Exchange for issuance of Passports.

- -

Brokers conforming to version 1.0 are still compatible with version 1.2, because Token Exchange support is optional.

- -

Added more signing algorithms

- -

The version 1.0 allowed only RS256 algorithm for JWT signing. -It is RSA-based algorithm using keys of size 2048 bits or larger and SHA-256 hash function.

- -

The AAI specification version 1.2 allows also the ES256 algorithm which is -ECDSA-based using P-256 elliptic curve and SHA-256 hash function.

- -

Elliptic Curve Cryptography allows much shorter keys and signatures than RSA. -A short Elliptic Curve key of around 256 bits provides the same security as a 3072 bit RSA key.

- -

For a detailed discussion of signing algorithms, see the article -JWTs: Which Signing Algorithm Should I Use?

- -

Media types for JWTs

- -

In version 1.0, all the mentioned JWTs (access tokens, visas) used in their typ (media type) header parameter -the generic value JWT that marks a generic JWT.

- -

In version 1.2, the typ header parameter is used to distinguish the various types of JWTs:

- -
    -
  • access tokens conforming to RFC9038 -use the value at+jwt -
  • -
  • Passports use the value vnd.ga4gh.passport+jwt -
  • -
  • Visas are recommended to use the value vnd.ga4gh.visa+jwt but allowed to use JWT -for backward compatibility with version 1.0
  • -
- -

Proposed Deprecations

- -

Visa Access Tokens (also referred to as Embedded Access Tokens)

- -

It is proposed that the 1.x versions of this specification will be the last to support -Visa Access Tokens. New implementations should issue Visas -as Visa Document Tokens.

- -
- -
- -
-
- - - diff --git a/draft-diagrams/changes-1_2_1.html b/draft-diagrams/changes-1_2_1.html deleted file mode 100644 index 1f8b16b..0000000 --- a/draft-diagrams/changes-1_2_1.html +++ /dev/null @@ -1,97 +0,0 @@ - - - - - - - - -Changes in v1.2.1 | GA4GH Data Security - - - - - - - - - - - - - - - - - - -
-
-
- -
-

Changes in v1.2.1

-
- -
-

This document lists changes between 1.2 and 1.2.1

- -
    -
  • Added DURI Passport specs to AAI repository
  • -
  • Added table of versions
  • -
- - -
- -
- -
-
- - - diff --git a/draft-diagrams/check-links.py b/draft-diagrams/check-links.py deleted file mode 100644 index 502aea8..0000000 --- a/draft-diagrams/check-links.py +++ /dev/null @@ -1,92 +0,0 @@ -from bs4 import BeautifulSoup -import os -from pprint import pprint -import re - -anchors = set() -local_hrefs = set() -external_hrefs = set() - -for root, dirs, files in os.walk('build'): - for relpath in files: - if 'htm' in relpath: - with open(os.path.join(root, relpath)) as fh: - content = fh.read() - - if relpath == 'index.html': - base = '' - - base = relpath.replace('.html','') - - soup = BeautifulSoup(content, 'html.parser') - for link in soup.find_all('a'): - href = link.get('href') - name = link.get('name') - if href is None: - anchors.add(f"{base}#{name}") - #print("No href: "+str(link)) - else: - if href in ['/local/', - '/local/aai-openid-connect-profile', - '/local/aai-faq', - '/local/changes-1_2']: - pass - elif href.startswith('#'): - local_hrefs.add(f"{base}{href}") - else: - external_hrefs.add(href) - - for heading in ['h1','h2','h3', 'strong']: - for link in soup.find_all(heading): - id = link.get('id') - if id is not None: - anchors.add(f"{base}#{id}") - #print("No href: "+str(link)) - - - -line_links_from_duri_passport = """ -[GA4GH AAI OIDC Profile](https://github.com/ga4gh/data-security/blob/master/AAI/AAIConnectProfile.md#terminology) -* **[Passport](https://github.com/ga4gh/data-security/blob/master/AAI/AAIConnectProfile.md#term-passport)** -* **[Passport-Scoped Access Token](https://github.com/ga4gh/data-security/blob/master/AAI/AAIConnectProfile.md#term-passport-scoped-access-token)** -* **[Passport Clearinghouse](https://github.com/ga4gh/data-security/blob/master/AAI/AAIConnectProfile.md#term-passport-clearinghouse)** -* **[Visa Assertion](https://github.com/ga4gh/data-security/blob/master/AAI/AAIConnectProfile.md#term-visa-assertion)** -* **[Visa Assertion Source](https://github.com/ga4gh/data-security/blob/master/AAI/AAIConnectProfile.md#term-visa-assertion-source)** -* **[Visa Issuer](https://github.com/ga4gh/data-security/blob/master/AAI/AAIConnectProfile.md#term-visa-issuer)** -* **[Visa](https://github.com/ga4gh/data-security/blob/master/AAI/AAIConnectProfile.md#term-visa)** -* **[JWT](https://github.com/ga4gh/data-security/blob/master/AAI/AAIConnectProfile.md#term-jwt)** -* **[GA4GH Claim](https://github.com/ga4gh/data-security/blob/master/AAI/AAIConnectProfile.md#term-ga4gh-claim)** -* **[Broker](https://github.com/ga4gh/data-security/blob/master/AAI/AAIConnectProfile.md#term-broker)** -Please see the [Flow of Assertions](https://github.com/ga4gh/data-security/blob/master/AAI/AAIConnectProfile.md#flow-of-assertions) - [GA4GH AAI Specification Visa formats](https://github.com/ga4gh/data-security/blob/master/AAI/AAIConnectProfile.md#visa-issued-by-visa-issuer) - [GA4GH AAI Specification](https://github.com/ga4gh/data-security/blob/master/AAI/AAIConnectProfile.md) -[Conformance for Visa Issuers](https://github.com/ga4gh/data-security/blob/master/AAI/AAIConnectProfile.md#conformance-for-visa-issuers) - for [Visa Document Token Format](https://github.com/ga4gh/data-security/blob/master/AAI/AAIConnectProfile.md#visa-document-token-format) -- For [Visa Access Token Format](https://github.com/ga4gh/data-security/blob/master/AAI/AAIConnectProfile.md#visa-access-token-format) -- REQUIRED.The section [Signing Algorithms](https://github.com/ga4gh/data-security/blob/master/AAI/AAIConnectProfile.md#signing-algorithms) -if the Visa is encoded as a [Visa Access Token](https://github.com/ga4gh/data-security/blob/master/AAI/AAIConnectProfile.md#term-visa-access-token-format). -""" - -print ("\n\nChecking anchors to which DURI passport links\n") -for line_from_duri in line_links_from_duri_passport.split('\n'): - #print(line_from_duri) - m = re.search(r'AAIConnectProfile.md#([^)]*)', line_from_duri) - if m: - target = f"aai-openid-connect-profile#{m.group(1)}" - if target in anchors: - print (f"valid {target}") - else: - print (f"INVALID ------ {target}") - -#pprint(anchors) - -print ("\n\nChecking links within AAI\n") -for local_href in local_hrefs: - if local_href in anchors: - print(f"valid {local_href}") - else: - print(f"INVALID ---- {local_href}") - -print ("\n\nListing links from AAI to external hrefs\n") -pprint(external_hrefs) - diff --git a/draft-diagrams/feed.xml b/draft-diagrams/feed.xml deleted file mode 100644 index 309f60c..0000000 --- a/draft-diagrams/feed.xml +++ /dev/null @@ -1 +0,0 @@ -Jekyll2023-12-21T14:16:31+00:00/data-security/draft-diagrams/feed.xmlGA4GH Data SecurityAAI \ No newline at end of file diff --git a/draft-diagrams/ga4gh-custom-visas.html b/draft-diagrams/ga4gh-custom-visas.html deleted file mode 100644 index ee2e7c0..0000000 --- a/draft-diagrams/ga4gh-custom-visas.html +++ /dev/null @@ -1,126 +0,0 @@ - - - - - - - - -GA4GH Passport Custom Visa Registry | GA4GH Data Security - - - - - - - - - - - - - - - - - - -
-
-
- -
-

GA4GH Passport Custom Visa Registry

-
- -
-

GA4GH Passport Custom Visa Registry

- -

Introduction

- -

This document captures Passport Custom Visa -Types that have gone -through the GA4GH Passport custom visa proposal -process.

- -

For more information about this process, please refer to the Passport -Custom Visa Types -section of the Passport specification or reach out to maintainers -on the Update Procedure page.

- -

Custom Visa Registry

- - - - - - - - - - - - - - - - - - - - -
DateVisa NameVisa Type StringShort DescriptionDocumentation Links
2020-06-30NIH RAS Controlled Accesshttps://ras.nih.gov/visas/v1.1Multiple controlled access authorizations encoded into a single visa with a more detailed list of attributes per authorization. Currently encodes a detailed list of attribrutes that come from NIH’s dbGaP visa source repository.RAS Service Offerings
- -
- -
- -
-
- - - diff --git a/draft-diagrams/ga4gh-passport.html b/draft-diagrams/ga4gh-passport.html deleted file mode 100644 index 069fe4e..0000000 --- a/draft-diagrams/ga4gh-passport.html +++ /dev/null @@ -1,1669 +0,0 @@ - - - - - - - - -GA4GH Passport | GA4GH Data Security - - - - - - - - - - - - - - - - - - -
-
-
- -
-

GA4GH Passport

-
- -
-

GA4GH Passport

- -

Version: 1.2.1

- -

Work Stream Name: Data Use and Researcher Identity (DURI)

- -

Product Name: GA4GH Passport

- -

Product Description: This document provides the GA4GH technical -specification for a GA4GH Passport to be -consumed by Passport Clearinghouses in a -standardized approach to determine whether or not data access should be -granted. Additionally, the specification provides guidance on encoding -specific use cases, including -Visas for Registered Access as -described in the “Registered access: authorizing data -access” publication. -Refer to the Overview for an introduction to how data -objects and services defined in this specification fit together.

- -

Table of Contents

- -
    -
  • toc
  • -
- -

Terminology

- -

Inherited Definitions

- -

The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL NOT”, “SHOULD”, -“SHOULD NOT”, “RECOMMENDED”, “MAY”, and “OPTIONAL” in this document are to be -interpreted as described in RFC 2119.

- -

This specification inherits terminology from the -GA4GH AAI OIDC Profile -specification, namely these terms:

- - - -

Term Definitions

- -

Passport Claim

- -
    -
  • -

    The ga4gh_passport_v1 claim. It is a GA4GH Claim -with a claim value being a list of Visas.

    -
  • -
  • -

    Visas from multiple Visa Issuers can be bundled together in the -same ga4gh_passport_v1 claim.

    -
  • -
  • -

    For example, the following structure encodes a Passport Claim:

    - -
    -
    "ga4gh_passport_v1" : [
    -    <Visa>,
    -    <Visa (if more than one)>,
    -    ...
    -]
    -
    -

    Visa Claim

    -
  • -
  • -

    The ga4gh_visa_v1 claim. It is a GA4GH Claim -with a claim value being a Visa Object.

    -
  • -
  • -

    For example, the following structure encodes a Visa Claim:

    - -
    -
    "ga4gh_visa_v1" : {
    -    "type": "<visa-type>",
    -    "asserted": <seconds-since-epoch>,
    -    "value": "<value-string>",
    -    "source": "<source-URL>",
    -}
    -
    -
  • -
- -

Visa Identity

- -
    -
  • The {sub, iss} pair of JWT standard claims (RFC7519 section -4.1.1) that are -included within a Visa that represents a -given user (sub for subject) within the issuer’s (iss) system.
  • -
- -

Visa Object

- -
    -
  • -

    A claim value for - the ga4gh_visa_v1 claim name. The claim value is a JSON object - that provides claims that describe Visa’s - properties that cannot be described by the standard JWT claims like sub or exp.

    -
  • -
  • -

    The ga4gh_visa_v1 claim is required to define a GA4GH v1 visa and - contains controlled vocabulary as defined in this document. This object - is not the entire visa, and there are other important claims within - Visa JWTs that MAY be specific to its visa type as well as other - JWT claims that are required as per this specification and the GA4GH - AAI OIDC specification.

    -
  • -
  • -

    For claim definitions, refer to the Visa Object Claims section of this specification.

    -
  • -
- -

Visa Type

- -
    -
  • -

    The “type” claim value of a Visa Object -that represents the semantics of the assertion and informs all parties -involved in the authoring or handling the assertion how to interpret -other Visa Object Claims.

    -
  • -
  • -

    For example, a Visa Type of “AffiliationAndRole” per the -Standard Visa Type Definitions -specifies the semantics of the Visa as well as the -expected encoding of the “value” claim value for this purpose.

    -
  • -
  • -

    In addition to Standard Visa Type Definitions, there -MAY also be Visas with Custom Visa Types.

    -
  • -
- -

Overview

- -

Please see the Flow of Assertions -section in the GA4GH AAI OIDC Profile specification for an overview of interaction among the specified parties.

- -

General Requirements

- -
    -
  1. -

    Each Visa may have a different expiry.

    -
  2. -
  3. -

    Visas MUST have an indication of -which organization made the Visa Assertion (i.e. the -“source” claim), but Visas do not generally indicate -individual persons involved in making the assertion (i.e. who assigned/signed -the assertion) as detailed identity information is not needed to make an -access decision.

    -
  4. -
  5. -

    Additional information about identity -that is not needed to make an access decision SHOULD not be included in the -Visas. Identity description, encoding audit details, other data -for non-access purposes are not the intent of these Visas, -and must be handled via other means beyond the scope of this specification -should they be needed for entities and systems with sufficient authority to -process such information.

    -
  6. -
  7. -

    The Passport Claim -MUST only be present in a response when Passport-Scoped Access Token is provided.

    -
  8. -
  9. -

    If the Broker is the Visa Issuer, -it MUST set the iss to itself and sign such Visas with an -appropriate private key as described in the GA4GH AAI OIDC specification.

    -
  10. -
  11. -

    Visas are designed for machine -interpretation only in order to make an access decision and is a non-goal to -support rich user interface requirements nor do these claims fully encode the -audit trail.

    -
  12. -
  13. -

    A Visa Object MAY -contain the “conditions” claim to restrict the Visa -to only be valid when the conditions are met.

    - -
      -
    • For example, an identity can have several affiliations and a -Visa with type “ControlledAccessGrants” MAY establish a -dependency on one of them being present in the Passport by using the -conditions claim.
    • -
    -
  14. -
  15. -

    Processing a Passport within a Passport Clearinghouse MUST abide by the following:

    - -
      -
    1. -

      Passport Clearinghouses MUST reject all requests that include Passports -that fail the necessary checks as described in the GA4GH AAI OIDC specification.

      -
    2. -
    3. -

      A Passport Clearinghouse MUST ignore all Visas it does not -need to process a particular request.

      -
    4. -
    5. -

      Passport Clearinghouses MUST ignore Passports and Visas -unless:

      - -
        -
      1. -

        The Passport Clearinghouse has sufficient trust relationships -with all of: the Broker, Visa Assertion Source, -Visa Issuer; or

        -
      2. -
      3. -

        The Passport Clearinghouse can rely on a trusted service that -provides sufficient trust of any of the Broker, -Visa Assertion Source and/or Visa Issuer -such that the Passport Clearinghouse can establish trust of all -three such parties.

        -
      4. -
      -
    6. -
    7. -

      When combining Visas with multiple Visa Identities for the purposes of evaluating -authorization, a Passport Clearinghouse MUST check the -LinkedIdentities Visas by trusted issuers -and ensure that trusted sources have asserted that these -Visa Identities represent the same end user.

      -
    8. -
    -
  16. -
- -

Support for User Interfaces

- -

(e.g. mapping a URI string to a human-readable description for a user -interface.)

- -

For example, a user interface mapping of -“https://doi.org/10.1038/s41431-018-0219-y” to a human readable description -such as “this person is a bona fide researcher as described by the ‘Registered -access: authorizing data access’ publication”.

- -

It is a non-goal for this specification to consider the processes and data for -the purpose of supporting user interfaces.

- -

Passport Claim Format

- -

The Passport Claim name maps to an array of Visas.

- -

Non-normative example of a set of Visas, encoded as JWS Compact Serialization strings:

- -
{
-  "ga4gh_passport_v1": [
-    "<eyJhbGciOiJI...aaa>",
-    "<eyJhbGciOiJI...bbb>"
-  ]
-}
-
- -

For a more reader-friendly example, see the Example Passport -Claim section of the specification.

- -

Visa Requirements

- -
    -
  • -

    Visas MUST conform to one of the -GA4GH AAI Specification Visa formats -as JWS Compact Serialization strings as defined by RFC7515 section -7.1.

    -
  • -
  • -

    Visa Issuers, Brokers, and Passport Clearinghouses -MUST conform to the -GA4GH AAI Specification -requirements for Visas in their use of Visas.

    -
  • -
  • -

    Validation, as outlined elsewhere in this specification and the -GA4GH AAI Specification, MUST be performed before Visas are -used for identity or authorization.

    -
  • -
- -

Visa Format

- -

Visas are signed JWTs encoded into strings using JWS Compact Serialization. -When decoded, their structure is:

- -
{
-  ["typ": "vnd.ga4gh.visa+jwt | at+jwt | JWT",]
-  "alg": "<signing-algorithm>",
-  ["jku": "<json-web-keys-set-URL>",]
-  "kid": "<signing-key-identifier>"
-}.
-{
-  "iss": "<issuer-URL>",
-  "sub": "<subject-identifier>",
-  ["scope": "openid ...",]
-  "jti": "<token-identifier>",
-  "iat": <seconds-since-epoch>,
-  "exp": <seconds-since-epoch>,
-  "ga4gh_visa_v1": {
-    "type": "<visa-type>",
-    "asserted": <seconds-since-epoch>,
-    "value": "<value-string>",
-    "source": "<source-URL>",
-    ["conditions": [...],]
-    ["by": "<by-identifier>"]
-  }
-}.<signature>
-
-

The standard JWT payload claims iss, sub, iat, exp are all REQUIRED.

- -

One of scope or jku MUST be present as described in -Conformance for Visa Issuers -within the AAI specification.

- -

Claims within the ga4gh_visa_v1 Visa Object are as described -in the Visa Object Claims section of this specification.

- -

typ

- -
    -
  • OPTIONAL. The value of the typ header claim is RECOMMENDED to be vnd.ga4gh.visa+jwt -for Visa Document Token Format -visas. The value JWT marking general JWTs MAY also be used.
  • -
  • For Visa Access Token Format -visas the value is unspecified, but it would likely be at+jwt as required by section 2.1 of RFC 9068 -for JWT access tokens.
  • -
  • The typ header claim is specified by section 5.1 of JWT RFC -to contain media type of the JWT for disambiguation. -The full recommended media type for GA4GH Visas is application/vnd.ga4gh.visa+jwt where the subtype consist of -the “vendor tree” prefix vnd, the “producer name” ga4gh, and the “product designation” visa -followed by the +jwt structured syntax suffix (specified in section 3.2 -and section 4.2.8 of RFC 6838). -Then section 4.1.9 of JWS RFC recommends to omit the prefix -application/ to keep messages compact.
  • -
- -

alg

- -
    -
  • REQUIRED.The section Signing Algorithms -in the AAI specification lists possible algorithms used in the alg header claim.
  • -
- -

exp

- -
    -
  • -

    REQUIRED. Generally, it is seconds since unix epoch of when the -Visa Assertion Source -requires such an assertion to be no longer valid. A Visa -Assertion Source MAY choose to make an assertion very long lived. -However, a Visa Issuer MAY -choose an earlier timestamp in order to limit the assertion’s duration -within downstream Passport Clearinghouses.

    -
  • -
  • -

    Access is NOT necessarily removed by the exp timestamp. Instead, -this timestamp may be viewed as a cut-off after which no new access -will be granted and action to remove any existing access may -commence anytime shortly after this cut-off period.

    -
  • -
  • -

    Its use by a Passport Clearinghouse is described in the -Visa Expiry section and -Token Revocation section.

    -
  • -
- -

Visa Object Claims

- -

Although standard claims within a Visa Object -are defined in this section, other claims MAY exist within the object -and should be ignored by any Passport Clearinghouse that is not familiar -with the use of such claims. Claim names are reserved for definition by -GA4GH (or a body it elects).

- -

type

- - - -

asserted

- -
    -
  • -

    REQUIRED. Seconds since unix epoch that represents when the - Visa Assertion Source made the claim.

    -
  • -
  • -

    Note that the standard iat JWT claim on the Visa reflects the timestamp - of when the Visa was minted whereas the asserted claim - reflects when the Visa Assertion Source made the assertion.

    -
  • -
  • -

    asserted MAY be used by a Passport Clearinghouse as described in the - Visa Expiry section.

    -
  • -
  • -

    If a Visa Assertion repository does not include enough - information to construct an asserted timestamp, a Visa Issuer MAY use a recent timestamp (for - example, the current timestamp) if the Visa Assertion repository - is kept up to date such that the Visa Issuer can ensure that - the assertion is valid at or near the time of minting the Visa. - However, generally it is RECOMMENDED to have the - Visa Assertion repository provide more accurate asserted information.

    -
  • -
- -

value

- -
    -
  • -

    REQUIRED. A string that represents any of the scope, process, identifier and - version of the assertion. The format of the string can vary by the - Visa Type.

    -
  • -
  • -

    For example, value: "https://doi.org/10.1038/s41431-018-0219-y" when type: "ResearcherStatus" - represents a version of Registered Access Bona Fide - researcher status. Note that Registered Access requires more than one - Visa as outlined in the Registered - Access section.

    -
  • -
  • -

    For the purposes of enforcing its policies for access, a Passport - Clearinghouse evaluating the value claim MUST:

    - -
      -
    • -

      Validate URL strings as per the URL Claim -requirements if the Visa Type definition indicates the value -is a URL (as indicated by the type claim).

      -
    • -
    • -

      Value strings MUST be full string case-sensitive matches -unless the Visa Type defines a safe and reliable format for -partitioning the value into substrings and matching on the various -substrings. For example, the standard -AffiliationAndRole Visa Type can be -reliably partitioned by splitting the string at the first “@” sign if such -exists, or otherwise producing an error (i.e. denying permission).

      -
    • -
    -
  • -
- -

source

- -
    -
  • -

    REQUIRED. A URL Claim that provides at a minimum the -organization that made the assertion. If there is no organization -making the assertion, the source claim value MUST be set to -“https://no.organization”.

    -
  • -
  • -

    For complex organizations that may require more specific information -regarding which part of the organization made the assertion, this claim MAY -also encode some substructure to the organization that represents the -origin of the authority of the assertion. When this approach is chosen, then:

    - -
      -
    • -

      The additional substructure MUST only encode the sub-organization or -department but no other details or variables that would make it -difficult to enumerate the full set of possible values or cause Passport -Clearinghouses confusion about which URLs to whitelist.

      -
    • -
    • -

      The additional information SHOULD be encoded into the subdomain or path -whenever possible and SHOULD generally avoid the use of query parameters -or anchors to represent the sub-organization.

      -
    • -
    • -

      Some organizations MAY wish to attribute the source to a particular -Data Access Committee (DAC), especially for -ControlledAccessGrants Visa Types. -For example:

      - -

      source: "https://www.ebi.ac.uk/ega/dacs/EGAC00000000001"

      - -

      could represent one particular logical “DAC” organization as referred -to by the EBI organization, and could be maintained by the EBI as a -permanent identifier for this DAC.

      -
    • -
    -
  • -
- -

conditions

- -
    -
  • -

    OPTIONAL. A set of conditions on a -Visa Object indicates that the Visa is -only valid if the clauses of the conditions match other Visas -elsewhere in the Passport and such content is both valid -(e.g. hasn’t expired; signature of Visa has been verified against -the public key; etc.) and if such content is accepted by the Passport -Clearinghouse (e.g. the issuer is trusted; the source claim meets any -policy criteria that has been established, etc.).

    -
  • -
  • -

    A Passport Clearinghouse MUST always check for the presence of -the conditions claim and if present it MUST only accept the -Visa if it can confirm that the conditions have been met.

    -
  • -
  • -

    Although it is RECOMMENDED to always implement full condition checking -capabilities as described in this section, if a Passport Clearinghouse will be -deployed for a more limited purpose where it is not expected to ever receive -Visas with conditions, then such a Passport Clearinghouse MAY choose to -not implement full condition checking. However, even in this case it MUST -still check for the presence of the conditions claim on Visa -Objects and reject (ignore) any Visas that contain a non-empty -conditions claim value. Likewise if not all condition matching algorithms -are implemented, it MUST reject any Visas that contain patterns -that are not supported.

    -
  • -
  • -

    Format:

    - -
    -
    "conditions": [
    -  [
    -    { // Condition clause 1
    -      "type": "<visa-type>",
    -      "<visa-object-claim-name-1>": "<match-type>:<match-value>",
    -      "<visa-object-claim-name-2>": "<match-type>:<match-value>",
    -      ...
    -    }, // AND
    -    { // Condition clause 2
    -      ...
    -    }
    -  ], // OR
    -  [
    -    { // Condition clause 3
    -      "type": "<visa-type>",
    -      "<visa-object-claim-name>": "<match-type>:<match-value>",
    -      ...
    -    }
    -  ],
    -  ...
    -]
    -
    -
  • -
  • -

    The conditions value is a two-nested-lists structure in Disjunctive -Normal Form:

    - -
      -
    • -

      The outer level list is a set of OR clauses

      -
    • -
    • -

      The inner level list is a set of AND clauses that contain “Condition -Clauses”

      -
    • -
    • -

      A Condition Clause MUST specify a “type” claim with a value as a -Visa Type plus it MUST include at least one other claim with a -name that matches a valid Visa Object claim name.

      -
    • -
    • -

      The values of Condition Clause claims MUST have a string prefix followed -by a colon and then string suffix, except for type where it MUST be -assumed to be “const” and is not specified.

      - -
        -
      • -

        If prefix is “const”, then suffix MUST use case sensitive full string -matching.

        -
      • -
      • -

        If prefix is “pattern”, then suffix MUST use full string Pattern -Matching to match input.

        -
      • -
      • -

        If prefix is “split_pattern”, then the full suffix MUST use full -string Pattern Matching on each full -substring from splitting the corresponding Visa Object -claim value that is being compared by the “;” character. If any one -full substring matches, then the Condition Clause claim has found a -match. “split_pattern” SHOULD only be used on claims where the -Visa Type has been specified in a format that makes splitting -on this character to be reliable, such as URI-encoded substrings with -semicolon separators (see LinkedIdentities as an -example).

        - -
          -
        • For example: a Condition Clause claim value of -“split_pattern:123,https:%2F%2Fexample?.org” will match a -Visa Object claim value of -“001,https::%2F%2Fexample1.org;123,https::%2F%2Fexample2.org;456,https::%2F%2Fexample3.org” -because this comparison value will be split into: -
          -
          [
          -  "001,https::%2F%2Fexample1.org",
          -  "123,https::%2F%2Fexample2.org",
          -  "456,https::%2F%2Fexample3.org"
          -]
          -
          -

          and the second entry in that list is a match using the Pattern -Matching definition with 123,https:%2F%2Fexample?.org as the -pattern to use.

          -
        • -
        -
      • -
      • -

        If prefix is unknown or unsupported, then the Condition Clause must -fail to match.

        -
      • -
      -
    • -
    -
  • -
  • -

    Condition Clause claims are restricted to only Visa Object Claims -(e.g. value, source, etc.) with string value -definitions.

    - -
      -
    • -

      It MUST NOT include conditions (i.e. a condition cannot be placed on -another condition)

      -
    • -
    • -

      It MUST NOT contain a timestamp claim such as asserted.

      -
    • -
    -
  • -
  • -

    The Passport Clearinghouse MUST verify that for each Condition Clause -present, there exists a valid single corresponding -Visa Object such that:

    - -
      -
    • -

      Checking the correctness of the Condition Clause MUST be performed first. -For example, a type claim MUST be present.

      -
    • -
    • -

      Ignore Visa Objects that have the conditions claim present. -This will avoid deep nesting of condition evaluation (i.e. avoid condition -loops, stack overflows, etc).

      -
    • -
    • -

      A Condition Clause claim matches when the <match-type> algorithm -matches a corresponding Visa Object’s claim in the Passport.

      -
    • -
    • -

      Visa Object Claims that are not specified -in the Condition Clause are not required to match (i.e. any value will be -accepted within that claim, including if the claim is not present in the -Visa Object).

      -
    • -
    • -

      All Condition Clause claims that are specified within one Condition -Clause MUST match the same Visa Object in the Passport.

      -
    • -
    -
  • -
  • -

    Non-normative example:

    - -
    -
    "conditions": [
    -  [
    -    {
    -      "type": "AffiliationAndRole",
    -      "value": "const:faculty@uni-heidelberg.de",
    -      "by": "const:so"
    -    }, // AND
    -    {
    -      "type": "ResearcherStatus",
    -      "value": "const:https://doi.org/10.1038/s41431-018-0219-y",
    -    }
    -  ], // OR
    -  [
    -    {
    -      "type": "AffiliationAndRole",
    -      "value": "pattern:faculty@*",
    -      "source": "const:https://visas.elixir.org"
    -      "by": "const:system"
    -    }
    -  ]
    -]
    -
    - -

    Would match a corresponding AffiliationAndRole assertion within the same -Visa Object that has any of the following:

    - -
      -
    • -

      On “Visa match 1”:

      - -
        -
      • -

        type = “AffilationAndRole”; AND

        -
      • -
      • -

        value = “faculty\@uni-heidelberg.de”; AND

        -
      • -
      • -

        by = “so”

        -
      • -
      - -

      AND on any other Visa as well as checking “Visa match 1”:

      - - -
    • -
    • -

      OR, alternative acceptance is matching just one Visa:

      - -
        -
      • -

        type = “AffilationAndRole”; AND

        -
      • -
      • -

        value starts with “faculty\@”; AND

        -
      • -
      • -

        source = “https://visas.elixir.org”; AND

        -
      • -
      • -

        by = “system”

        -
      • -
      -
    • -
    -
  • -
- -
Pattern Matching
- -
    -
  • -

    Pattern Matching is only for use as specified by -“conditions”.

    -
  • -
  • -

    MUST Use full string case-sensitive character pattern comparison.

    -
  • -
  • -

    MUST support special meaning characters as the specification of patterns:

    - -
      -
    • -

      ? : A <question-mark> is a pattern that SHALL match any single -character.

      -
    • -
    • -

      * : An <asterisk> is a pattern that SHALL match multiple characters:

      - -
        -
      • -

        Match any string, including the empty string and null string.

        -
      • -
      • -

        Match the greatest possible number of characters that still allows -the remainder of the pattern to match the string.

        -
      • -
      -
    • -
    -
  • -
  • -

    There is no escape character for special characters such as patterns. -? is always treated as the <question-mark> pattern and * is always -treated as the <asterisk> pattern.

    -
  • -
  • -

    A method evaluating a pattern on a string of input SHALL return a true if -the input has found one or more possible ways to match or false if it does -not.

    -
  • -
- -

by

- -
    -
  • -

    OPTIONAL. The level or type of authority within the “source” organization -of the assertion.

    -
  • -
  • -

    A Passport Clearinghouse MAY use this claim as part of an authorization -decision based on the policies that it enforces.

    -
  • -
  • -

    Fixed vocabulary values for this claim are:

    - -
      -
    • -

      self: The Visa Identity for which the assertion is being made -and the person who made the assertion is the same person.

      -
    • -
    • -

      peer: A person at the source organization has made this assertion on -behalf of the Visa Identity’s person, and the person who is making -the assertion has the same Visa Type and value in that source -organization. The source claim represents the peer’s -organization that is making the assertion, which is not necessarily -the same organization as the Visa Identity’s organization.

      -
    • -
    • -

      system: The source organization’s information system has made the -assertion based on system data or metadata that it stores.

      -
    • -
    • -

      so: The person (also known as “signing official”) making the assertion -within the source organization possesses direct authority (as part of -their formal duties) to bind the organization to their assertion that the -Visa Identity did possess such authority at the time the -assertion was made.

      -
    • -
    • -

      dac: A Data Access Committee or other authority that is responsible -as a grantee decision-maker for the given value and source claims -pair.

      -
    • -
    -
  • -
  • -

    If this claim is not provided, then none of the above values can be assumed -as the level or type of authority and the authority MUST be assumed to be -“unknown”. Any policy expecting a specific value as per the list above MUST -fail to accept an “unknown” value.

    -
  • -
- -

URL Claims

- -

A Visa Object Claim that is defined as being of URL -format (see RFC3986 section -1.1.3) with the following -limitations:

- -
    -
  1. -

    For the purposes of evaluating access, the URL MUST be treated as a simple -unique persistent string identifier.

    -
  2. -
  3. -

    The URL is a canonical identifier and as such it is important that Passport -Clearinghouses MUST match this identifier consistently using a -case-sensitive full string comparison.

    - -
      -
    • -

      If TLS is available on the resource, then its persistent identifier URL -SHOULD use the “https” scheme even if the resource will also resolve using -the “http” scheme.

      -
    • -
    • -

      When the URL is being used to represent an organization or a well defined -child organization within a “source” claim, it is RECOMMENDED -to use a URL as a persistent organizational ontology identifier, whether -managed directly or by a third-party service such as -GRID when reasonable to do so.

      -
    • -
    -
  4. -
  5. -

    The URL SHOULD also be as short as reasonably possible while avoiding -collisions, and MUST NOT exceed 255 characters.

    -
  6. -
  7. -

    The URL MUST NOT be fetched as part of policy evaluation when making an -access decision. For policy evaluation, it is considered an opaque string.

    -
  8. -
  9. -

    URLs SHOULD resolve to a human readable document for a policy maker to -reason about.

    -
  10. -
- -

GA4GH Standard Visa Type Definitions

- -

Note: in addition to these GA4GH standard Visa Types, there is also -the ability to for a Visa Issuer to encode Custom Visa Types.

- -

AffiliationAndRole

- -
    -
  • -

    The Visa Identity’s role within the identity’s affiliated institution -as specified by one of the following:

    - -
      -
    • -

      eduPersonScopedAffiliation -attributed value of: faculty, student, or member.
      -This term is defined by eduPerson by the affiliated organization -(organization after the \@-sign).

      - -
        -
      • -

        Example: “faculty\@cam.ac.uk”

        -
      • -
      • -

        Note: based on the eduPerson specification, it is possible that -institutions use a different definition for the meaning of “faculty” -ranging from “someone who does research”, to “someone who teaches”, -to “someone in education that works with students”.

        -
      • -
      -
    • -
    • -

      A custom role that includes a namespace prefix followed by a dot (“.”) -where implementers introducing a new custom role MUST coordinate -with GA4GH (or a body it elects) to align custom role use cases in order -to maximize interoperability and avoid fragmentation across -implementations.

      - -
        -
      • -

        Non-normative example: “ega.researcher\@med.stanford.edu” where “ega” -is the namespace and “researcher” is the custom role within that -namespace.

        -
      • -
      • -

        Custom roles and their prefixes MUST be limited to characters: a-z, -dash (“-“), underscore (“_”), digits (0-9). Custom roles and prefixes -MUST start with characters a-z.

        -
      • -
      -
    • -
    -
  • -
  • -

    If there is no affiliated institution associated with a given assertion, the -affiliation portion of AffliationAndRole MUST be set to “no.organization”.

    - -
      -
    • Example: “public.citizen-scientist\@no.organization”
    • -
    -
  • -
  • -

    AffiliationAndRole can be safely partitioned into a {role, affiliation} pair -by splitting the value string at the first “@” sign.

    -
  • -
- -

AcceptedTermsAndPolicies

- -
    -
  • -

    The Visa Identity or the - “source” organization has acknowledged the specific terms, - policies, and conditions (or meet particular criteria) as indicated by the - value claim.

    -
  • -
  • -

    The value claim value conforms to URL Claim format.

    -
  • -
  • -

    The URL SHOULD resolve to a public-facing, human readable web page that - describe the terms and policies.

    -
  • -
  • -

    Example value: "https://doi.org/10.1038/s41431-018-0219-y" - acknowledges ethics compliance for a particular version of Registered - Access. Note that more - Visas are needed to meet the requirements for Registered - Access status.

    -
  • -
  • -

    MUST include the “by” claim.

    -
  • -
- -

ResearcherStatus

- -
    -
  • -

    The person has been acknowledged to be a researcher of a particular type or -standard.

    -
  • -
  • -

    The value claim conforms to URL Claim format, and it -indicates the minimum standard and/or type of researcher that describes -the person represented by the given Visa Identity.

    -
  • -
  • -

    The URL SHOULD resolve to a human readable web page that describes the -process that has been followed and the qualifications this person has met.

    -
  • -
  • -

    Example value: "https://doi.org/10.1038/s41431-018-0219-y" -acknowledges a particular version of the registration process as needed -for Registered Access Bona Fide researcher -status. Note that more Visas are needed to meet -the requirements for Registered Access status.

    -
  • -
- -

ControlledAccessGrants

- -
    -
  • -

    A dataset or other object for which controlled access has been granted to -this Visa Identity.

    -
  • -
  • -

    The value claim conforms to URL Claim format.

    -
  • -
  • -

    The source claim contains the access grantee organization.

    -
  • -
  • -

    MUST include the “by” claim.

    -
  • -
- -

LinkedIdentities

- -
    -
  • -

    The identity as indicated by the {“sub”, “iss”} pair (aka -Visa Identity) of the -Visa is the same as the identity or identities listed -in the “value” claim.

    -
  • -
  • -

    The “value” claim format is a semicolon-delimited list of -“<uri-encoded-sub>,<uri-encoded-iss>” entries with no added whitespace -between entries.

    - -
      -
    • -

      The “sub” and “iss” that are used to encode the “value” claim do -not need to conform to URL Claim -requirements since they must match the corresponding Visa -“sub” and “iss” claims that may be issued.

      -
    • -
    • -

      By URI encoding (RFC 3986) the -“iss”, special characters (such as “,” and “;”) are encoded within the URL -without causing parsing conflicts.

      -
    • -
    • -

      Example: -“123456,https%3A%2F%2Fexample.org%2Fa%7Cb%2Cc;7890,https%3A%2F%2Fexample2.org”.

      -
    • -
    -
  • -
  • -

    The “source” claim refers to the Visa Assertion -Source that is making the assertion. This is -typically the same organization as the Visa -Issuer (iss) that signs the Visa, but the -source MAY also refer to another Visa Assertion Source depending -on which organization collected the information.

    -
  • -
  • -

    As a non-normative example, if a policy needs 3 Visas and -there are three Visas that meet the criteria on one Passport -but they use 3 different sub values (“1234”, “567”, “890123”), then -any of the following, if from a trusted issuers and sources, may -allow these Visas to be combined (shown with JSON payload only -and without the REQUIRED URI-encoding in order to improve readability of -the example).

    - -
      -
    1. -

      One Visa that links 3 Visa Identities together.

      - -
      -
      {
      -  "iss": "https://example1.org/oidc",
      -  "sub": "1234",
      -  "ga4gh_visa_v1": {
      -    "type": "LinkedIdentities",
      -    "value": "567,https://example2.org/oidc;890123,https://example3.org/oidc",
      -    "source": "https://example1.org/oidc"
      -    ...
      -  }
      -}
      -
      - -

      or

      -
    2. -
    3. -

      One Visa that links a superset of Visa -Identities together.

      - -
      -
      {
      -  "iss": "https://example0.org/oidc",
      -  "sub": "00001",
      -  "ga4gh_visa_v1": {
      -    "type": "LinkedIdentities",
      -    "value":
      -      "1234,http://example1.org/oidc;567,http://example2.org/oidc;890123,http://example3.org/oidc;sub4,http://example4.org/oidc"
      -    "source": "https://example0.org/oidc"
      -    ...
      -  }
      -}
      -
      - -

      or

      -
    4. -
    5. -

      Multiple Visas that chain together a set or superset -of Visa Identities.

      - -
      -
      {
      -  "iss": "https://example1.org/oidc",
      -  "sub": "1234",
      -  "ga4gh_visa_v1": {
      -    "type": "LinkedIdentities",
      -    "value": "567,https://example2.org/oidc",
      -    "source": "https://example1.org/oidc"
      -    ...
      -  }
      -},
      -{
      -  "iss": "https://example2.org/oidc",
      -  "sub": "567",
      -  "ga4gh_visa_v1": {
      -    "type": "LinkedIdentities",
      -    "value": "890123,https://example3.org/oidc",
      -    "source": "https://example2.org/oidc"
      -    ...
      -  }
      -}
      -
      -
    6. -
    -
  • -
- -

Custom Visa Types

- -
    -
  • -

    In addition to the -GA4GH Standard Visa Type Definitions, -Visas MAY be added using custom type names so long as the -encoding of these Visas will abide by the requirements described -elsewhere in this specification.

    -
  • -
  • -

    Custom Visa Types MUST limit personally identifiable information -to only that which is necessary to provide authorization.

    -
  • -
  • -

    The custom type name MUST follow the format prescribed in the -URL Claims section of the specification.

    -
  • -
  • -

    Implementers introducing a new custom type name MUST coordinate with the -GA4GH (or a body it elects) to align custom type use cases to maximize -interoperability and avoid unnecessary fragmentation across implementations.

    - -
      -
    • -

      To review the custom visa registry, including any visa descriptions, -examples and links that have been provided through proposals using this -process, visit the Custom Visa Type Registry -page.

      -
    • -
    • -

      Documentation on encoding and interpreting the claims SHOULD -be provided as part of the proposal and for inclusion in a public custom -visa type registry maintained by GA4GH. This documentation SHOULD also include -examples and links to relevant documentation and/or open source software -that MAY be available.

      -
    • -
    -
  • -
  • -

    Passport Clearinghouses MUST ignore all Visas containing a custom -type name that they do not support.

    -
  • -
  • -

    Non-normative example custom type name:
    -type: "https://example.org/passportVisaTypes/researcherStudies".

    -
  • -
- -

Encoding Use Cases

- -

Use cases include, but are not limited to the following:

- -

Registered Access

- -
    -
  • -

    To meet the requirements of Registered Access to data as defined by -publication https://doi.org/10.1038/s41431-018-0219-y as a specific -version of Registered Access, a user needs to have all of the following -Visas:

    - -
      -
    1. -

      Meeting the ethics requirements is represented by:

      - -
        -
      • -

        type: "AcceptedTermsAndPolicies"; and

        -
      • -
      • -

        value: "https://doi.org/10.1038/s41431-018-0219-y"

        -
      • -
      -
    2. -
    3. -

      Meeting the bona fide status is represented by:

      - -
        -
      • -

        type: "ResearcherStatus"; and

        -
      • -
      • -

        value: "https://doi.org/10.1038/s41431-018-0219-y"

        -
      • -
      -
    4. -
    -
  • -
  • -

    If other versions of Registered Access are introduced, then the value -claims for AcceptedTermsAndPolicies as well as ResearcherStatus MAY -refer to the document or publication or sections thereof to act as the -permanent identifiers for such versions of Registered Access.

    -
  • -
  • -

    The Passport Clearinghouse (e.g. to -authorize a registered access beacon) needs to evaluate the -multiple Visas listed above to ensure their values match -before granting access.

    - - -
  • -
- -

Controlled Access

- -
    -
  • -

    Controlled Access to data utilizes the following Visa Types:

    - -
      -
    • -

      MUST utilize one or more -ControlledAccessGrants and/or custom -controlled access visa type(s) for permissions associated with specific -data or datasets. There MAY be more standard visa types introduced for -encoding controlled access in future revisions of the Passport -specification.

      -
    • -
    • -

      MAY utilize the conditions claim on -“ControlledAccessGrants” to cause such a grant to require -a Visa from a trusted Visa Assertion Source to -assert that the identity has a role within a specific organization. -This can be achieved by using the -AffiliationAndRole Visa Type on -the conditions.

      -
    • -
    • -

      MAY utilize any other valid Visa Type or conditions claim -that may be required to meet controlled access policies.

      -
    • -
    -
  • -
- -

Visa Expiry

- -

In addition to any other policy restrictions that a Passport Clearinghouse -may enforce, Passport Clearinghouses that provide access for a given -duration provided by the user (excluding any revocation policies) MUST -enforce one of the following algorithm options to ensure that Visa -expiry is accounted for:

- -

Option A: use the following algorithm to determine if the Visa -is valid for the entire duration of the requested duration:

- -
now()+requestedTTL < min(token.exp, token.ga4gh_visa_v1.asserted+maxAuthzTTL)
-
- -

Where:

- -
    -
  • -

    requestedTTL represents the duration for which access is being requested. -Alternatively a solution may choose to have a stronger revocation policy -instead of requiring such a duration.

    -
  • -
  • -

    maxAuthzTTL represents any additional expiry policy that the Passport -Clearinghouse may choose to enforce. If this is not needed, it can -effectively ignored by using a large number of years or otherwise have -token.ga4gh_visa_v1.asserted+maxAuthzTTL removed and simplify the right -hand side expression accordingly.

    -
  • -
- -

Option B: if tokens are sufficiently short lived and/or the authorization -system has an advanced revocation scheme that does not need to specify a -maxAuthzTTL as per Option A, then the check can be simplified:

- -
now()+accessTokenTTL < token.exp
-
- -

Where:

- -
    -
  • -

    accessTokenTTL represents the duration for which an access token will be -accepted and is bounded by the next refresh token cycle or Access Token -Polling -cycle or any larger propagation delay before access is revoked, which -needs to be assessed based on the revocation model.

    - -
      -
    • For example, accessTokenTTL may be set to one hour, after which time -more access tokens may be minted using a corresponding refresh token if -it has not yet been revoked.
    • -
    -
  • -
- -

Expiry when using multiple Visas: if multiple Visas are -required as part of an access policy evaluation, then the expiry to be used MUST -be the minimum expiry timestamp, as calculated by the appropriate option above, -across all Visas (token set) that were accepted as part of evaluating -the access policy.

- -

Token Revocation

- -

As per the GA4GH AAI Specification on Token -Revocation, -the following mechanisms are available within Visa:

- -
    -
  1. -

    Visa Objects have an “asserted” claim to allow -downstream policies to limit the life, if needed, of how long assertions -will be accepted for use with access and refresh tokens.

    -
  2. -
  3. -

    Visas have an “exp” claim to allow Brokers and -Passport Clearinghouses to limit the duration of access.

    -
  4. -
- -

At a minimum, these Visa Claims MUST be checked by all Passport -Clearinghouses and systems MUST be in place to begin to take action to remove access -by the expiry timestamp or shortly thereafter. Propagation of these permission -changes may also require some reasonable delay.

- -

Systems employing Visas MUST provide mechanisms to -limit the life of access, and specifically MUST conform to the GA4GH AAI -Specification requirements in this regard. Systems utilizing Visas MAY also -employ other mechanisms outlined in the GA4GH AAI Specification, such as Access -Token Polling -if the Visa is encoded as a Visa Access Token.

- -

Example Passport Claim

- -

This non-normative example illustrates a Passport Claim -that has Visas representing Registered Access bona fide researcher -status along with other Visas for access to specific Controlled Access -data. The Visa Types for this example are:

- -
    -
  • -

    AffiliationAndRole: The person is a member of faculty at Stanford -University as asserted by a Signing Official at Stanford.

    -
  • -
  • -

    ControlledAccessGrants: The person has approved access by the DAC at the -Example Institute for datasets 710 and approval for dataset 432 for a dataset -from EGA.

    - -
      -
    • -

      In this example, assume dataset 710 does not have any -“conditions” based on the -AffiliationAndRole because the system that is asserting the assertion has an -out of band process to check the researcher’s affiliation and role and -withdraw the dataset 710 claim automatically, hence it does not need the -conditions claim to accomplish this.

      -
    • -
    • -

      In this example, assume that dataset 432 does not use an out of band -mechanism to check affiliation and role, so it makes use of the -“conditions” claim mechanism to -enforce the affiliation and role. The dataset 432 assertion is only valid if -accompanied with a valid AffiliationAndRole claim for -“faculty\@med.stanford.edu”.

      -
    • -
    -
  • -
  • -

    AcceptedTermsAndPolicies: The person has accepted the Ethics terms and -conditions as defined by Registered Access. They took this action -themselves.

    -
  • -
  • -

    ResearcherStatus: A Signing Official at Stanford Medicine has asserted -that this person is a bona fide researcher as defined by the Registered -Access model.

    -
  • -
  • -

    LinkedIdentities: A Broker at example3.org has provided -software functionality to allow a user to link their own accounts together. -After the user has successfully logged into the two accounts and passed all -auth challenges, the Broker added the -LinkedIdentities Visa for those two accounts: -(1) “10001” from example1.org, and (2) “abcd” from example2.org. -Since the Broker is signing the “LinkedIdentities” -Visa, it is acting as the Visa Issuer.

    -
  • -
- -

Normally a Passport like this would include Visa -Format entries as JWS Compact Serialization strings, -however this example shows the result after the Visas have been -unencoded into JSON (and reduced to include only the payload) to be more -reader-friendly.

- -
"ga4gh_passport_v1": [
-    {
-        "iat": 1580000000,
-        "exp": 1581208000,
-        ...
-        "ga4gh_visa_v1": {
-            "type": "AffiliationAndRole",
-            "asserted": 1549680000,
-            "value": "faculty@med.stanford.edu",
-            "source": "https://grid.ac/institutes/grid.240952.8",
-            "by": "so"
-        }
-    },
-    {
-        "iat": 1580000100,
-        "exp": 1581168872,
-        ...
-        "ga4gh_visa_v1": {
-            "type": "ControlledAccessGrants",
-            "asserted": 1549632872,
-            "value": "https://example-institute.org/datasets/710",
-            "source": "https://grid.ac/institutes/grid.0000.0a",
-            "by": "dac"
-        }
-    },
-    {
-        "iat": 1580000200,
-        "exp": 1581168000,
-        ...
-        "ga4gh_visa_v1": {
-            "type": "ControlledAccessGrants",
-            "asserted": 1549640000,
-            "value": "https://ega-archive.org/datasets/EGAD00000000432",
-            "source": "https://ega-archive.org/dacs/EGAC00001000205",
-            "by": "dac"
-            "conditions": [
-                [
-                    {
-                        "type": "AffiliationAndRole",
-                        "value": "const:faculty@med.stanford.edu",
-                        "source": "const:https://grid.ac/institutes/grid.240952.8",
-                        "by": "const:so"
-                    }
-                ],
-                [
-                    {
-                        "type": "AffiliationAndRole",
-                        "value": "const:faculty@med.stanford.edu",
-                        "source": "const:https://grid.ac/institutes/grid.240952.8",
-                        "by": "const:system"
-                    }
-                ]
-            ],
-        }
-    },
-    {
-        "iss": "https://issuer.example1.org/oidc",
-        "sub": "10001",
-        "iat": 1580000300,
-        "exp": 1581208000,
-        ...
-        "ga4gh_visa_v1": {
-            "type": "AcceptedTermsAndPolicies",
-            "asserted": 1549680000,
-            "value": "https://doi.org/10.1038/s41431-018-0219-y",
-            "source": "https://grid.ac/institutes/grid.240952.8",
-            "by": "self"
-        }
-    },
-    {
-        "iss": "https://other.example2.org/oidc",
-        "sub": "abcd",
-        "iat": 1580000400,
-        "exp": 1581208000,
-        ...
-        "ga4gh_visa_v1": {
-            "type": "ResearcherStatus",
-            "asserted": 1549680000,
-            "value": "https://doi.org/10.1038/s41431-018-0219-y",
-            "source": "https://grid.ac/institutes/grid.240952.8",
-            "by": "so"
-        }
-    },
-    {
-        "iss": "https://broker.example3.org/oidc",
-        "sub": "999999",
-        "iat": 1580000500,
-        "exp": 1581208000,
-        ...
-        "ga4gh_visa_v1": {
-            "type": "LinkedIdentities",
-            "asserted": 1549680000,
-            "value": "10001,https:%2F%2Fissuer.example1.org%2Foidc;abcd,https:%2F%2Fother.example2.org%2Foidc",
-            "source": "https://broker.example3.org/oidc",
-            "by": "system"
-        }
-    }
-]
-
- -
- -
- -
-
- - - diff --git a/draft-diagrams/index.html b/draft-diagrams/index.html deleted file mode 100644 index 2bcf0b2..0000000 --- a/draft-diagrams/index.html +++ /dev/null @@ -1,89 +0,0 @@ - - - - - - - - -GA4GH Data Security | AAI - - - - - - - - - - - - - - - - - - -
-
-
-

Authentication and Authorization Infrastructure (AAI)

- - -
- -
-
- - - diff --git a/draft-diagrams/install-and-serve b/draft-diagrams/install-and-serve deleted file mode 100755 index 3cc18d1..0000000 --- a/draft-diagrams/install-and-serve +++ /dev/null @@ -1,3 +0,0 @@ -#!/bin/ash -bundle install -bundle exec jekyll serve --host "0.0.0.0" \ No newline at end of file diff --git a/draft-diagrams/versions.html b/draft-diagrams/versions.html deleted file mode 100644 index 58e16ee..0000000 --- a/draft-diagrams/versions.html +++ /dev/null @@ -1,113 +0,0 @@ - - - - - - - - -Version History | GA4GH Data Security - - - - - - - - - - - - - - - - - - -
-
- - -
-
- - - diff --git a/driver-project-usage/AAI/AbstractAAI.drawio.svg b/driver-project-usage/AAI/AbstractAAI.drawio.svg deleted file mode 100644 index 67b2770..0000000 --- a/driver-project-usage/AAI/AbstractAAI.drawio.svg +++ /dev/null @@ -1,4 +0,0 @@ - - - -
Broker
Broker
Clearinghouse
Clearinghouse
Text is not SVG - cannot display
\ No newline at end of file diff --git a/driver-project-usage/AAI/GA4GH_JWT-only_flow.png b/driver-project-usage/AAI/GA4GH_JWT-only_flow.png deleted file mode 100644 index b1c50b3..0000000 Binary files a/driver-project-usage/AAI/GA4GH_JWT-only_flow.png and /dev/null differ diff --git a/driver-project-usage/AAI/LifeScienceAAI.drawio.svg b/driver-project-usage/AAI/LifeScienceAAI.drawio.svg deleted file mode 100644 index efcd988..0000000 --- a/driver-project-usage/AAI/LifeScienceAAI.drawio.svg +++ /dev/null @@ -1,4 +0,0 @@ - - - -
eduGAIN IdP
eduGAIN IdP
eduGAIN IdP
eduGAIN IdP

Google
Google

ORCID
ORCID
LS username
+
 password
LS username...
REMS Finland
(Resource Entitlement Management System, )
visa issuer
REMS Finland...
...
...
...
...
ControlledAccessGrants
visas
ControlledAccessGrants...
ControlledAccessGrants
visas
ControlledAccessGrants...
ControlledAccessGrants
visas
ControlledAccessGrants...
proxy SP
proxy SP
internal visa issuer 
for
AffiliationAndRole
AcceptedTermsAndPolicies
ResearcherStatus
LinkedIdentities
visas
internal visa issuer...
Passport issuer /
OIDC Provider /
OAuth 2 AS
Passport issuer /...
visas
visas
LifeScience AAI
(ELIXIR, GDI, EJP RD, BBMRI)
LifeScience AAI...
Passport clearinghouse /
 OIDC Relying Party /
OAuth 2 client
Passport clearinghouse /...
Passport
Passport
user 
attributes
management system
user...
user
attributes
user...
user identity
user identity
user affiliation
user affiliation
Identity Providers
Identity Providers
authentication
authentication
REMS Estonia
REMS Estonia
EGA
(European Genom-phenom Archive)
visa issuer
EGA...
REMS Sweden
REMS Sweden
REMS Luxembourg
REMS Luxembourg
REMS Belgium
REMS Belgium
REMS France
REMS France
ControlledAccessGrants
visas
ControlledAccessGrants...
ControlledAccessGrants
visas
ControlledAccessGrants...
...
...
Visa
Issuers
Visa...
Text is not SVG - cannot display
\ No newline at end of file diff --git a/driver-project-usage/AAI/README.md b/driver-project-usage/AAI/README.md deleted file mode 100644 index 3881caa..0000000 --- a/driver-project-usage/AAI/README.md +++ /dev/null @@ -1,81 +0,0 @@ -# Authentication and Authorization Infrastructure - -## [Link to Specification](https://ga4gh.github.io/data-security/) - -## Introduction - -The Authentication and Authorizations Infrastructure (AAI) specification -leverages OpenID Connect (OIDC) to authenticate researchers -desiring to access clinical and genomic resources from data -holders adhering to GA4GH standards. Beyond standard OIDC authentication, AAI enables -data holders to obtain security-related attributes and authorizations of those -researchers. In parallel, the Data Use and Researcher Identity (DURI) Work Stream has developed a standard -representation for researcher authorizations and attributes known as Researcher-ID. -At its core, the AAI specification defines cryptographically secure tokens for exchanging -these researcher attributes called Visas and how various -participants can interact to authenticate researchers, and obtain and validate Visas. - -This specification also provides for federated multilateral authorization infrastructure for greater -interoperability between biomedical institutions sharing restricted datasets. - -### What is OpenID Connect? - -OpenID Connect is a simple identity layer, on top of the OAuth 2.0 protocol, that supports identity verification and the ability to -obtain basic profile information about end users. The AAI specification extends this to define tokens, -endpoints, and flows that enable an OIDC provider (called a Broker) to -provide Passports and Visas to downstream consumers called Passport Clearinghouses. Passports can then be used for -authorization purposes by downstream systems. - -## Passports specification -The AAI and Passports specifications rely on each other for full functionality and will likely be merged in a future version. The Passports specification from the Data Use and Researcher Identities Work Stream can be found [here](https://ga4gh-duri.github.io/researcher_ids/ga4gh_passport_v1.html). - -## Version history - -[Changelog](https://ga4gh.github.io/data-security/changes-1_2) for v1.2 - -Full version history available [here](https://ga4gh.github.io/data-security/aai-openid-connect-profile#specification-revision-history) - - -## Contributors - -GA4GH is an open community and contribution is not limited to those named below. -Names listed alphabetically by surname. Repository maintainers listed [here](./MAINTAINER.md). - -### Core Developers for v1.2 - -- Max Barkley - DNAstack -- Tom Conner - Broad Institute -- Martin Kuba - ELIXIR Czech Republic -- Andrew Patterson - The University of Melbourne Centre for Cancer Research -- Kurt Rodarmer - National Center for Biotechnology Information - NIH - -### Reviewers for v1.2 - -- Francis Jeanson - Peter Munk Cardiac Centre and Ted Rogers Centre for Heart Research -- David Glazer - Verily Life Sciences -- Timothy Slade - RTI International -- Dylan Spalding - ELIXIR Finland - -### Technical Programme Manager - -- Fabio Liberante - Global Alliance for Genomics and Health - -## Work Stream Leadership - -### Data Security - -- David Bernick - Broad Institute -- Lucila Ohno-Machado - Yale University School of Medicine -- Previously - Jean-Pierre Hubaux - Swiss Federal Institute of Technology Lausanne - -### Data Use and Researcher Identities - -- Jaime Guidry-Auvil - National Cancer Institute - NIH -- Tommi Nyrönen - ELIXIR Finland - - -## Demonstration Implementation - -[Life Science RI](https://lifescience-ri.eu/) have implemented this v1.2 specification from the finalised draft for use across the Life Science RI platforms. -Information on creating an account is available [here](https://lifescience-ri.eu/ls-login/users/how-to-get-and-use-life-science-id.html). -With an account, the test service [here](https://echo.aai.elixir-czech.org/) will return a technical view of the various tokens created and shared in an example flow using Passport/AAI 1.2. \ No newline at end of file diff --git a/driver-project-usage/AAI/aai background fig 1.JPG b/driver-project-usage/AAI/aai background fig 1.JPG deleted file mode 100644 index f1da29f..0000000 Binary files a/driver-project-usage/AAI/aai background fig 1.JPG and /dev/null differ diff --git a/driver-project-usage/AAI/aai background fig 2.png b/driver-project-usage/AAI/aai background fig 2.png deleted file mode 100644 index b90fe23..0000000 Binary files a/driver-project-usage/AAI/aai background fig 2.png and /dev/null differ diff --git a/driver-project-usage/AAI/claim_flow_of_data_basic.svg b/driver-project-usage/AAI/claim_flow_of_data_basic.svg deleted file mode 100644 index 73b5c2b..0000000 --- a/driver-project-usage/AAI/claim_flow_of_data_basic.svg +++ /dev/null @@ -1 +0,0 @@ - \ No newline at end of file diff --git a/driver-project-usage/AAI/embedded_Claims_flow.png b/driver-project-usage/AAI/embedded_Claims_flow.png deleted file mode 100644 index 407aaa4..0000000 Binary files a/driver-project-usage/AAI/embedded_Claims_flow.png and /dev/null differ diff --git a/driver-project-usage/AAI/flow.png b/driver-project-usage/AAI/flow.png deleted file mode 100644 index 904f685..0000000 Binary files a/driver-project-usage/AAI/flow.png and /dev/null differ diff --git a/driver-project-usage/AAI/implementations.md b/driver-project-usage/AAI/implementations.md deleted file mode 100644 index 93d07d7..0000000 --- a/driver-project-usage/AAI/implementations.md +++ /dev/null @@ -1,35 +0,0 @@ -# Implementations - -## What would a 300,000 foot view of AAI look like? - -![this](AbstractAAI.drawio.svg) - -## How bout ELIXIR / Life Sciences AAI? - -![this](LifeScienceAAI.drawio.svg) - -## Which GA4GH driver projects implement AAI and Passports? - -As of November 2023, the following driver projects implement AAI / Passports: - -- Biomedical Research Hub -- EJP RD -- ELIXIR -- Human Cell Atlas - -These driver projects are planning or developing an implementation of AAI / Passports: - -- All of Us -- Australian Genomics -- Autism Sharing Initiative -- GDI -- Genomics England -- H3Africa -- ICGC ARGO -- IPCHiP -- Monarch Initiative -- NCI CRDC -- NCPI -- NHLBI BioData Catalyst - -[Source](https://docs.google.com/spreadsheets/d/11pPTKVW3j3_WHigWw4UOvlkQbPkM_z-ICgksE5L1vEY) diff --git a/driver-project-usage/aai-faq.html b/driver-project-usage/aai-faq.html deleted file mode 100644 index 8930786..0000000 --- a/driver-project-usage/aai-faq.html +++ /dev/null @@ -1,607 +0,0 @@ - - - - - - - - -AAI FAQ | GA4GH Data Security - - - - - - - - - - - - - - - - - - -
-
-
- -
-

AAI FAQ

-
- -
-

A collection of questions (and hopefully useful answers).

- -
- -

Background

- -

Why Brokers?

- -

We have found that there are widely used Identity Providers (IdP). -These authentication mechanisms provide no authorization -information (custom claims or scopes) but are ubiquitous for authentication at the institution level. -The use of a Broker and Clearinghouse -enables attaching information to the usual OIDC flow so that IdPs -can be used with customized claims and scopes.

- -

Here is a diagram of a single broker. This is one possible way to use this spec.

- -

- -

In this diagram, the Broker relies on a separate service for fetching visas, which -stores assertions from multiple sources. The visa assertions are obtained by the -Clearinghouse after a successful login, and used to determine a researcher’s -access in the Clearinghouse system.

- -

The Broker, Clearinghouse, and Visa Issuer may be separate services (as shown -in this diagram), but in other configurations they may be run as parts of a single -service, or as separate services run by single organization. Data holders and data -controllers should explore their options to decide what best fits their needs.

- -

Flows

- -

The following sequence diagrams are included to help explain the intended flows -documented in the accompanying specification.

- -

What is the complete end to end flow using token exchange?

- -

(last updated June 2022)

- -

This flow is the preferred flow for v1.2+ of the specification.

- -

The exchange flow does not ever distribute the initial Passport-Scoped Access Token beyond -the client application. A token exchange operation is executed by the client, in -exchange for a Passport JWT that may be used downstream to access resources. In this example flow, the -Passport is included as authorization in the POST to a DRS server. The token -exchange has also specified known resources that will limit the audience -of the Passport.

- - - - - - Researcher - - AAI - - Data Controller - - Data Holder - - - - - - - - - User Agent - - - - Client - - Broker - - - IdP - - - Visa Issuer(s) - - Clearing House - - Data - - - - - OIDC - - - ref - OIDC flow results in the client holding a *Passport-Scoped Access Token*. - - - - - Exchange - - - Token exchange - - - (note: for clarity these form values have not actually been URL encoded) - Content-Type: application/x-www-form-urlencoded -   - grant_type=urn:ietf:params:oauth:grant-type:token-exchange - &requested_token_type=urn:ga4gh:params:oauth:token-type:passport - &subject_token_type=urn:ietf:params:oauth:token-type:access_token - &subject_token=<Passport-Scoped Access Token> - &resource=https://drs.example.com/dataset1 - &resource=https://drs.example.com/dataset2 - - - Informative Only (not defined in the specification) - - - Fetch signed visa(s) for user - - - Return signed visa(s) for user - - - [ - "<visa1>", - "<visa2>" - ] - - - Token exchange return - - - { - "access_token": "<Passport>", - "issued_token_type": "urn:ga4gh:params:oauth:token-type:passport", - "token_type": "Bearer" - } -   - ▼ Passport content as example (decoded from the base64 of the JWT Passport) ▼ -   - { - "typ": "vnd.ga4gh.passport+jwt", - "alg": "<algorithm-identifier>", - "kid": "<key-identifier>" - } . - { - "iss": "https://<issuer-website>", - "sub": "<subject-identifier>", - "aud": [ - "https://drs.example.com" - ], - "iat": <seconds-since-epoch>, - "exp": <seconds-since-epoch>, - "jti": "<token-identifier>", - "ga4gh_passport_v1": [ - "<visa1>", - "<visa2>", - ... - ] - } . <signature> - - - - - Use - - - Client requests data - - - POST /ga4gh/drs/v1/objects/dataset1/access/s3 HTTP/1.1 - Host: drs.example.com - Content-Type: application/json -   - { - "passports": [ - "<Passport>" - ] - } - - - Decision is made to release data using information contained in the - passport token - and this decision is coordinated with the data system to - facilitate that actual data release. - - - Client is given data - - - - -
- -

What is the complete end to end flow using /userinfo?

- -

(last updated June 2022)

- -

This flow is the flow for v1.0 implementations of the specification.

- -

The flow as used by Elixir uses the initial Passport-Scoped Access Token as -a token handed to downstream resource servers. These servers can use this token, in conjunction -with a callback to the broker’s Userinfo Endpoint, to obtain the Passport content in -JSON format.

- - - - - - Researcher - - AAI - - Data Controller - - Data Holder - - - - - - - - - User Agent - - - - Client - - Broker - - - IdP - - - Visa Issuer(s) - - Clearing House - - Data - - - - - OIDC - - - ref - OIDC flow results in the client holding a *Passport-Scoped Access Token*. - - - - - Use - - - Client requests data - - - { - Authorization: Bearer <Passport-Scoped Access Token> - } - - - Clearing house asks for list of signed visa(s) - - - { - Authorization: Bearer <Passport-Scoped Access Token> - } - - - Informative Only (not defined in the specification) - - - Fetch signed visa(s) for user - - - Return signed visa(s) for user - - - [ - "<visa1>", - "<visa2>" - ] - - - UserInfo endpoint returns list of signed visa(s) - - - { - "iss": "https://<issuer-website>/", - "sub": "<subject-identifier>", - "ga4gh_passport_v1": [ - "<visa1>", - "<visa2>", - ... - ] - } - - - Decision is made to release data using information contained in the - passport - and this decision is coordinated with the data system to - facilitate that actual data release. - - - Client is given data - - - - -
- -

Trust

- -

What’s with all the signed passports and visas etc? Why so complex?

- -

(last updated July 2022)

- -

The practical operation of a loosely coupled -federated ecosystem like GA4GH Passports requires establishing trust -relationships between the participating entities (see -OpenID Connect Federation -for an interesting discussion of the properties of multilateral federations).

- -

Any entity that is asked to make a decision about sharing data needs to have a priori -made the decision “which other entities do I trust?”. In genomics, a single decision -to allow data sharing might involve simultaneous trusting of -multiple entities - human genomics is complex!

- -

When presented with a -Passport and Visas from entities that they trust - they can rely on the information (claims) provided -to make data sharing decisions. If presented with information from entities that are -untrusted - the content of the message is irrelevant as there is no basis on which to believe -the content.

- -

So we can see that trust is a crucial element of a working federation. How do we establish -these trust relationships?

- -

GA4GH Passports and Visas leverage the mechanisms -present in JWT as used -by the OIDC standards -to cryptographically “sign” tokens containing claims. Signed tokens can be -“verified” using public/private keys.

- -

Why are the Visa claims formatted as JWTs inside the Passport?

- -

(last updated August 2022)

- -

If visas were not signed separately from a Passport, then Clearinghouses would require a high degree of confidence that -the signing Passport Issuer or Broker was accurately representing the contents of Visas from the original Visa Issuer; -there would be no mechanisms to prevent a malicious or defective Passport Issuer from misrepresenting Visa contents. -By signing Visas separately from Passports, we prevent intermediate parties from tampering with Visa contents, -allowing Clearinghouses to safely rely on Visa contents based on their trust relationship with the Visa Issuer.

- -

What are the ways that key management is done in practice?

- -

(last updated July 2022)

- -

There are a variety of approaches that can be used for key -management for Passports and Visas. We will first detail those that can be used for Passports -and then discuss some extra wrinkles for Visas.

- -

For this discussion we assume there is a concrete JWT from issuer https://issuer.example.org -(possibly a Broker or a Visa Issuer).

- -

My clearinghouse service ‘trusts’ the above issuer to help make data -access decisions - and that trust is stated probably through some sort of explicit -configuration. For our example, let’s imagine it has a hypothetical YAML configuration file

- -
trusted_brokers:
-  - https://issuer.example.org
-  - https://login.broker.com
-
-trusted_visa_issuers:
-  - https://dac.gov.world
-
- -

The service now wants to verify a Passport or Visa -JWT purporting to be from that issuer.

- -
- -

Use jku in the header of the JWT

- -

The JKU is the URL of a JSON file containing the issuers’ public keys.

- -
{
-  "iss": "https://issuer.example.org",
-  "jku": "https://issuer.example.org/public-keys.json",
-  "kid": "key-october-1"
-}
-
- -

For our concrete example we say that it is a JSON file residing -at https://issuer.example.org/public-keys.json (see -RFC 7517 “JSON Web Key”).

- -

IMPORTANTLY, for the secure use of this key management technique - the JKU -MUST also be allow-listed as part of the configuration of OUR service. -For example:

- -
trusted_brokers:
-  - issuer: https://issuer.example.org
-    jku: https://issuer.example.org/public-keys.json
-
-  - issuer: https://login.broker.com
-    jku: https://keys.broker.com/set
-
- -

It is NEVER valid to even attempt to access a JKU from a JWT header - unless the URL -is already known to belong to the given issuer. See -“JWT Forgery via unvalidated jku parameter”.

- -

To verify a JWT, the content of the JKU file is loaded and the kid is -looked up in key set. The signature is validated using the public key found.

- -

Although this configuration requires explicit registration of JKUs, the content -of the key sets can allow the best practice of key rotation.

- -

The content of the JKU file is designed to be cached aggressively, but as long as -the file is fetched every few days/weeks, the set of keys -can evolve/rotate.

- -
- -

Use the kid in the header of the JWT along with OIDC Discovery

- -

The OpenID Connect Discovery -protocol allows the use of the JWT issuer URL - in conjunction with a fetch -of a /.well-known/openid-configuration - to look up the location of the public key set file. See -OpenID Provider Metadata specification -and the jwks_uri entry.

- -

As with JKU - it is important that OIDC discovery is limited only to JWT issuer URLs that are -in some way allow-listed. It is NEVER valid to perform discovery on an arbitrary issuer -encountered in a JWT. Luckily, the concept of allow-listing issuers is already in some way -inherent to the way trust relationships are established, and hence this allow list should -already be present in the system.

- -

Also as with JKU, the content of the discovery protocol and key sets can be cached -aggressively. This means that the double step of the discovery protocol is not -required on every JWT verification.

- -
- -

Exchange public keys beforehand with each trusted entity

- -

This is an approach used by the NIH - and is appropriate if the number -of trusted entities is small - such that the public keys of each trusted entity can be exchanged -out of band (and their rotation/updating can also be managed out of band).

- -

Configuration may be

- -
trusted_brokers:
-  - issuer: https://issuer.example.org
-    keys:
-      key-october-1: "ABCDTRTFDSFSDFSF...."
-
-  - issuer: https://login.broker.com
-    keys:
-      kid123456: "ABCDTRTFDSFSDFSF...."
-
- -

For any kid -encountered in a JWT, the corresponding public key is already available for signature validation.

- -

An even safer version of this approach is to perform -the key verification across every public key you hold before even decoding the JWT JSON -and then confirm the kid. This avoids ever even needing to JSON decode -data from untrusted entities.

- -
- -

Requirement for JKU in Visas

- -

When it comes to Visas, there is an extra wrinkle - unlike Brokers, Visa Issuers do not -need to have been part of an OIDC flow. It is possible that the visa issuer URI is not -even a locatable reference -(e.g. urn:example.com:dac-world-visa-issuer).

- -

Therefore the OIDC Discovery technique is not appropriate and hence the requirements -of the AAI standard regarding the presence of JKUs.

- -
- -

Client Software

- -

Use of GA4GH passport/visas in Single Page Apps (SPAs)

- -

It is currently recommended that single page apps (SPA) such as a React/VueJS websites -are NOT used for scenarios where the single page app code is solely responsible for the handling of -genomic passports and tokens.

- -

A SPA contains all the source of the application in public - and hence cannot -possess a ‘client secret’ in an OIDC flow (the ‘client secret’ is used to prove the identity of the -client software and is an important risk mitigation that prevents unconstrained -use of an accidentally leaked/stolen token).

- -

Techniques such as PKCE can be used to allow a SPA to participate in an OIDC flow - and this is not -forbidden by the specification - but there -are still unresolved questions about how SPAs can prove client identity in things like the token -exchange that retrieves passports or other tokens.

- -

Therefore if writing SPA websites for genomic data handling, it is recommended to use -a backend set of services to execute OIDC flows and token exchanges (even if the rest of the SPA -can operate purely on the front end). These -backend service can hold secrets and hence can prove client identity - and the backend -service can then securely participate in token exchange and retain tokens/passports.

- -

There is an emerging standard DPoP that may remove some of these limitations - -(OAuth 2.0 Demonstrating Proof-of-Possession at the Application Layer)

-
    -
  • and it will be considered for future versions of the AAI specification.
  • -
- -
- - -
- -
- -
-
- - - diff --git a/driver-project-usage/aai-implementations.html b/driver-project-usage/aai-implementations.html deleted file mode 100644 index 11284bf..0000000 --- a/driver-project-usage/aai-implementations.html +++ /dev/null @@ -1,127 +0,0 @@ - - - - - - - - -AAI Implementations | GA4GH Data Security - - - - - - - - - - - - - - - - - - -
-
-
- -
-

AAI Implementations

-
- -
-

What would a 300,000 foot view of AAI look like?

- -

this

- -

How bout ELIXIR / Life Sciences AAI?

- -

this

- -

Which GA4GH driver projects implement AAI and Passports?

- -

As of November 2023, the following driver projects implement AAI / Passports:

- -
    -
  • Biomedical Research Hub
  • -
  • EJP RD (using LifeScience AAI)
  • -
  • ELIXIR (using LifeScience AAI)
  • -
  • GDI (using LifeScience AAI)
  • -
  • Human Cell Atlas
  • -
- -

These driver projects are planning or developing an implementation of AAI / Passports:

- -
    -
  • All of Us
  • -
  • Australian Genomics
  • -
  • Autism Sharing Initiative
  • -
  • Genomics England
  • -
  • H3Africa
  • -
  • ICGC ARGO
  • -
  • IPCHiP
  • -
  • Monarch Initiative
  • -
  • NCI CRDC
  • -
  • NCPI
  • -
  • NHLBI BioData Catalyst
  • -
- -

Source

- -
- -
- -
-
- - - diff --git a/driver-project-usage/aai-openid-connect-profile.html b/driver-project-usage/aai-openid-connect-profile.html deleted file mode 100644 index 374c9fb..0000000 --- a/driver-project-usage/aai-openid-connect-profile.html +++ /dev/null @@ -1,1335 +0,0 @@ - - - - - - - - -AAI OIDC Profile | GA4GH Data Security - - - - - - - - - - - - - - - - - - -
-
-
- -
-

AAI OIDC Profile

-
- -
-

Abstract

- -

This specification defines a profile for using the OpenID Connect protocol -[OIDC-Core] to provide federated multilateral authorization infrastructure for greater -interoperability between biomedical institutions sharing restricted datasets. (OpenID Connect is a simple -identity layer, on top of the OAuth 2.0 protocol, that supports identity verification and the ability to -obtain basic profile information about end users.) In particular, this specification defines tokens, -endpoints, and flows that enable an OIDC provider (called a Broker) to -provide Passports and Visas to downstream consumers called -Passport Clearinghouses. Passports can then be used for -authorization purposes by downstream systems.

- -

Table of Contents

- - - -
- -

Introduction

- -

This specification -leverages OpenID Connect (OIDC) to authenticate researchers -desiring to access clinical and genomic resources from data -holders -adhering to GA4GH standards. Beyond standard OIDC authentication, AAI enables -data holders to obtain security-related attributes and authorizations of those -researchers. The Data Use and Researcher Identity (DURI) Work Stream has developed a standard -representation for researcher authorizations and attributes [Researcher-ID].

- -

Technical Summary

- -

At its core, the AAI specification defines cryptographically secure tokens for exchanging -researcher attributes called Visas, and how various -participants can interact to authenticate researchers, and obtain and validate Visas.

- -

The main components identified in the specification are:

-
    -
  • -Visa Issuers, that cryptographically sign researcher attributes in the -form of Visas.
  • -
  • -Brokers, that authenticate researchers and provide Visas.
  • -
  • -Clients, that perform actions that may require data access on behalf of researchers, -relying on tokens issued by Brokers and Visa Issuers.
  • -
  • -Passport Clearinghouses, that accept tokens containing or -otherwise availing researcher visas for the purposes of enforcing access control.
  • -
- -

Visa Tokens

- -

Visas are used -for securely transmitting authorizations or attributes of a researcher. -Visas are tokens [JWT] signed by Visa Issuers and -validated by Passport Clearinghouses.

- -

Separation of Data Holders and Data Access Committees

- -

It is a fairly common situation that, for a single dataset, the Data Access Committee (DAC) (the authority managing -who has access to a dataset) is not the same party as the -Data Holder (the organization -that hosts the data, while respecting the DAC’s access policies).

- -

For these situations, AAI is a standard mechanism for data holders to obtain -and validate existing authorizations from DACs, by specifying the interactions -between Visa Issuers, Brokers, and -Passport Clearinghouses.

- -

The AAI standard enables Data Holders and Visa Issuers to recognize -and accept identities from multiple Brokers — allowing for a more federated -approach. An organization can still use this specification with a single -Broker and Visa Issuer, -though they may find in that case that there are few benefits beyond standard OIDC.

- -
- -

Notation and Conventions

- -

Terms defined in Terminology appear as capitalized -links, e.g. Passport.

- -

References to Relevant Specifications appear -as bracket-enclosed links, e.g. [OIDC-Core].

- -

The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL NOT”, “SHOULD”, -“SHOULD NOT”, “RECOMMENDED”, “MAY”, and “OPTIONAL” in this specification are to -be interpreted as described in [RFC2119].

- -
- -

Terminology

- -

This specification inherits terminology from the OpenID -Connect [OIDC-Core] -and OAuth 2.0 Authorization Framework [RFC6749] specifications.

- -

Broker – An OIDC Provider service that -authenticates a user (potentially by relying on an Identity Provider), -collects user’s Visas from internal and/or external Visa Issuers, -and provides them to Passport Clearinghouses.

- -

Claim – as defined -by the JWT specification [RFC7519] – A piece of information asserted about a subject, -represented as a name/value pair consisting of -a claim name (a string) and a claim value (any JSON value).

- -

Client – as discussed in the OAuth 2.0 Authorization Framework [RFC6749] specification

- -

Data Holder – An organization that -holds a specific set of data (or its copy) and respects -and enforces the Data Access Committee’s (DAC’s) decisions on who can access it.

- -

-GA4GH Claim – A Claim as defined by a GA4GH -documented technical standard that is making use of this AAI specification. Typically -this is the ga4gh_passport_v1 or ga4gh_visa_v1 Claim for Passports v1.x. -A GA4GH Claim is asserted by the entity that signed the token in which it is contained (not by GA4GH).

- -

Identity Provider (IdP) – A -service that provides to users an identity, authenticates it, and provides -assertions to a Broker using standard protocols, such as OpenID Connect, SAML or -other federation protocols. Examples: eduGAIN, Facebook, NIH -eRA Commons. IdPs MAY be Visa Assertion Sources.

- -

JWT – JSON Web Token as defined in [RFC7519]. -A JWT contains a set of Claims.

- -

Passport Clearinghouse – -A service that consumes Visas and uses them to make an -authorization decision based on inspecting them and -allows access to a specific set of underlying resources in the target -environment or platform. This abstraction allows for a variety of models for -how systems consume these Visas in order to provide access to resources. -Access can be granted by either issuing new access tokens for downstream -services (i.e. the Passport Clearinghouse may act like an authorization server) -or by providing access to the underlying resources directly (i.e. the Passport -Clearinghouse may act like a resource server). Some Passport Clearinghouses may -issue Passports that contain a new set or subset of Visas for downstream consumption.

- -

Passport-Scoped Access Token – -An OIDC access token with scope -including the identifier ga4gh_passport_v1.

- -

The access token MUST be a JWS-encoded JWT token containing openid and ga4gh_passport_v1 -entries in the value of its scope Claim. -It is RECOMMENDED that Passport-Scoped Access Tokens follow the JWT Profile for OAuth 2.0 Access Tokens specification [RFC9068].

- -

Passport – A signed and verifiable JWT that contains Visas.

- -

Passport Issuer – -A service that creates and signs Passports.

- -

Token Endpoint – a Broker’s implementation of the [OIDC-Core] Token Endpoint.

- -

Token Exchange – -The protocol defined in [RFC 8693] as an extension of OAuth 2.0 -for exchanging access tokens for other tokens. A token exchange is performed by calling the Token Endpoint.

- -

UserInfo Endpoint – a Broker’s implementation of the [OIDC-Core] UserInfo Endpoint.

- -

-Visa – A -Visa encodes a Visa Assertion in compact and digitally signed -format that can be passed as a URL-safe string value.

- -

A Visa MUST be signed by a Visa Issuer. A Visa MAY be passed -through various Brokers as needed while retaining the -signature of the original Visa Issuer.

- -

-Visa Assertion – a piece of information about a user that is asserted by a Visa Assertion Source. It is then encoded by a Visa Issuer into a Visa.

- -

Visa Assertion Source – the source organization of -a Visa Assertion, which SHOULD include the organization associated with making the assertion, although it MAY optionally identify a sub-organization or a -specific assignment within the organization that made the assertion.

- -
    -
  • This is NOT necessarily the organization that signs the Visa; it is the -organization that has the authority to make the assertion on behalf of the -user and is responsible for making and maintaining the assertion.
  • -
- -

-Visa Issuer – A service that signs Visas. This service:

- - -
- -

Relevant Specifications

- -

-[IANA-JWT] – Standard JWT Claim name assignments, -Internet Assigned Numbers Authority

- -

-[OIDC-Core] – OpenID Connect Core 1.0 (OIDC) – - Authorization Code Flow - will generate id_tokens and access_tokens from the Broker.

- -

-[OIDC-Client] – OpenID Connect Basic Client Implementer’s Guide 1.0

- -

-[OIDC-Discovery] – OpenID Connect Discovery 1.0

- -

-[Passport] – GA4GH Passport Specification, Data Use and Researcher Identity (DURI) Work Stream – Defines Passport and Visa formats.

- -

-[Researcher-ID] – GA4GH Passport Specification, Data Use and Researcher Identity (DURI) Work Stream – Defines researcher identities for GA4GH Passports and Visas.

- -

-[RFC2119] - Key words for use in RFCs to Indicate Requirement Levels

- -

-[RFC5246] - Transport Layer Security (TLS). - Information passed among clients, applications, resource servers, - Brokers, and Passport Clearinghouses - MUST be protected using TLS.

- -

-[RFC6749] – The OAuth 2.0 Authorization Framework

- -

-[RFC6819] - - Lodderstedt, T, McGloin, M., and P. Hunt, - “OAuth 2.0 Threat Model and Security Considerations”, - RFC 6819, January 2013.

- -

-[RFC7515] – JSON Web Signature (JWS) is the - specific JWT to use for this spec.

- -

-[RFC7519] – JSON Web Token (JWT) – Specific implementations MAY extend - this structure with their own service-specific JWT Claim names as top-level - members of this JSON object. The JWTs specified here follow the JWS - specification [RFC7515].

- -

-[RFC7636] – Proof Key for Code Exchange by OAuth Public Clients (PKCE)

- -

-[RFC7662] – J. Richer, Ed., “OAuth 2.0 Token Introspection”, October 2015

- -

-[RFC8693] - Jones, M., Nadalin, A., Campbell, B., Ed., Bradley, J., - and C. Mortimore, “OAuth 2.0 Token Exchange”, RFC 8693, - DOI 10.17487/RFC8693, January 2020.

- -

-[RFC8725] - Sheffer, Y., Hardt, D., and M. Jones, “JSON Web Token Best - Current Practices”, BCP 225, RFC 8725, - DOI 10.17487/RFC8725, February 2020.

- -

-[RFC9068] – JWT Profile for OAuth 2.0 Access Tokens

- -
- -

Overview of Interactions

- -

Full Login and Token Exchange Interaction

- -

In the full token exchange flow recommended in this document, the client does not ever distribute the initial -Passport-Scoped Access Token to other services. A token exchange operation is executed by the client, in -exchange for a Passport JWT that may be used downstream to access resources. In this example flow, the -Passport is included as authorization in the POST to a Clearinghouse that holds data.

- - - - - - Researcher - - AAI - - Data Access Committee - - Data Holder - - - - - - User Agent - - - - Client - - Broker and Passport Issuer - - Visa Issuer - - Passport Clearinghouse - - - - - OIDC - - - Initiates login - - - Send redirect to Broker - - - Follow redirects - - - ref - Broker authenticates user (potentially with external IdP) - - - Send redirect to client with authorization code - - - Follow redirect with code - - - Request Passport-Scoped Access Token with code and client credentials - - - Respond with Passport-Scoped Access Token - - - - - Exchange - - - Request to exchange Passport-Scoped Access Token for Passport - - - - Exchange of visas, if needed (protocol unspecified) - - - Response with Passport - - - - - Use - - - User initiates action requiring data - - - Client requests data with Passport - - - Request public keys - - - Respond with public keys - - - Clearinghouse responds with data - - - - -

Notable differences between this diagram and interaction specified in AAI/Passport v1.0:

-
    -
  • The Passport Clearinghouse is no longer required to be a Client of the Broker
  • -
  • The Passport-Scoped Access Token is only ever shared between the Client and the Broker
  • -
  • An additional Token Exchange request is used to exchange the Passport-Scoped Access Token for a Passport Token, -which can be sent to a Passport Clearinghouse. The Passport Token carries only the authorization in a user’s -Visas, whereas the Passport-Scoped Access Token contains authorizations above and beyond the Visas.
  • -
- -

Flow of Assertions

- -

- -

The above diagram shows how Visa Assertions flow from a Visa Assertion Source -to a Passport Clearinghouse that uses them.

- -

Implementations may introduce clients, services, and protocols -to provide the mechanisms to move the data between the -Visa Assertion Sources and the Broker. These mechanisms are unspecified by the scope of this specification except that -they MUST adhere to security and privacy best practices, such as those outlined -in this specification, in their handling of protocols, claims, tokens and -related data. The flow between these components -MAY be indirect or conversely services shown as being separate MAY be -combined into one service. For example, some implementations MAY deploy one -service that handles the responsibilities of both the Visa Issuer and -the Broker.

- -

Here are two non-normative examples illustrating two of many possible mechanisms:

- -

- -

- -
- -

Profile Requirements

- -

Conformance for Clients/Applications

- -

Clients are applications which want to access data on behalf of users, and are responsible for using the standard described here to do so securely.

- -
    -
  1. OAuth defines two client types in section 2.1 of [RFC6749]. -
      -
    1. -

      Confidential clients (which are able to keep the client secret secure, typically server-side web-applications) - MUST implement OAuth2 Authorization Code - Flow (see OIDC Basic Client Implementer’s Guide 1.0 [OIDC-Client]).

      -
    2. -
    3. -

      Public clients (single pages apps or mobile apps) SHOULD implement Authorization Code Flow - with [PKCE].

      -
    4. -
    -
  2. -
  3. -

    Protection of Confidential Information

    - -
      -
    1. -

      Sensitive information (e.g., including client secrets, -authorization codes, id_tokens, access_tokens) MUST be passed over -encrypted channels as per [OIDC-Client].

      -
    2. -
    3. -

      All responses that contain tokens, secrets, or other sensitive -information MUST include the following HTTP response header fields and -values as per [OIDC-Client].

      - -
        -
      1. -

        Cache-Control: no-cache, no-store

        -
      2. -
      3. -

        Pragma: no-cache

        -
      4. -
      -
    4. -
    -
  4. -
  5. Clients MUST provide protection against client attacks as outlined in -[RFC6819].
  6. -
- -
- -

Conformance for Brokers

-

Brokers operate downstream from IdPs or provide their own IdP service. They issue id_tokens -and access_tokens (and potentially refresh tokens) for consumption within the GA4GH compliant environment.

- -
    -
  1. -

    Broker MUST be an OpenID Provider

    - -
      -
    1. -

      Broker MUST conform to the OIDC Core specification [OIDC-Core].

      -
    2. -
    3. -

      Broker MUST support the OIDC Discovery specification [OIDC-Discovery] -and provide proper metadata -(i.e. must have a jwks_uri as required that’s reachable by a Passport Clearinghouse)

      -
    4. -
    5. -

      A Broker MUST issue Passport-Scoped Access Tokens -(access_tokens).

      - -
        -
      1. This document makes no specifications beyond those in [OIDC-Core].
      2. -
      -
    6. -
    7. -

      Access tokens MUST be in JWS format

      - -
        -
      1. -

        Access tokens for GA4GH use MUST be a GA4GH JWT using -Passport-Scoped Access Token format.

        -
      2. -
      3. -

        Access tokens MUST NOT contain GA4GH Claims directly in the access token.

        -
      4. -
      5. -

        Access tokens MAY contain additional non-GA4GH Claims directly in the access token.

        -
      6. -
      -
    8. -
    -
  2. -
  3. -

    Broker MUST support a Token Endpoint and UserInfo Endpoint.

    - -
      -
    1. -

      Token Exchange at the Token Endpoint SHOULD be used for Visas in -preference to the UserInfo Endpoint.

      -
    2. -
    3. -

      When presented with a valid Passport-scoped Access Token, -the UserInfo endpoint MUST provide Visas as described in the section -Visas provided by a Broker via UserInfo Endpoint.

      -
    4. -
    -
  4. -
  5. -

    Brokers operate downstream from IdPs or provide their own IdP service. They -issue id_tokens and access_tokens (and potentially refresh tokens) for -consumption within the GA4GH compliant environment.

    -
  6. -
  7. -

    Broker MAY support Token Exchange. If implemented, it MUST behave as described -for passport issuance in Conformance For Passport Issuers.

    -
  8. -
  9. -

    Broker MUST provide protection against attacks as outlined in -[RFC6819].

    -
  10. -
  11. -

    The user represented by the identity of the access token MUST have agreed to -release claims related to the requested scopes as part of generating tokens. -Brokers MUST adhere to -section 3.1.2.4 -of [OIDC-Core].

    - -
      -
    1. -

      The user represented by a researcher identity MUST approve the release -of these claims to relying parties with sufficient granularity to -allow for responsible disclosure of information best practices as well -as to meet privacy regulations that may be applicable within or between -jurisdictions where the user’s identity will be used (e.g. GDPR for -a European Union user).

      -
    2. -
    3. -

      If the user’s release agreement has been remembered as part of a user’s -settings such that the user no longer needs to be prompted, then the -user MUST have the ability to remove this setting (i.e. be prompted -again in the future). If a feature is to bypass prompts by remembering -settings is available, it MUST only be used as an opt-in feature with -explicit controls available to the user.

      -
    4. -
    5. -

      A user’s withdrawal of this agreement does not need to apply to -previously generated access tokens.

      -
    6. -
    -
  12. -
  13. -

    When a Broker acts as a Visa Issuer then it MUST adhere to the Conformance -for Visa Issuers section of this -specification.

    - -

    When a Broker provides Visas from other Visa Issuers, it is providing -them “as is” (i.e. it provides no additional assurance as to the quality, -authenticity, or trustworthiness of the Claims from such tokens and any such -assurances are made by the issuer of the Visa, i.e. the Visa Issuer).

    -
  14. -
- -
- -

-

Conformance for Visa Issuers

- -

Visa Issuers issue signed JWTs (Visas) asserting facts about researchers, which may be used by Passport Clearinghouses -to justify granting access to data. This specification defines the format of the Visas and endpoints Visa Issuers -should have in order for Passport Clearinghouses to validate those Visas. This document does not specify how a Broker -obtains Visas contained in a Passport or returned from the Userinfo Endpoint.

- -
    -
  1. -

    A Visa Issuer MUST provide one or more of the following - types of Visas:

    - -
      -
    1. -

      - - - -Visa Document Token – The Visa Issuer does not need to -be an OIDC provider, and MAY provide tokens of this type without any -revocation process.

      - -
        -
      1. The token MUST conform with JWS format [RFC7515] requirements
      2. -
      3. The token MUST be signed by a Visa Issuer.
      4. -
      5. The JWS header MUST contain jku as specified by section -4.1.2 of [RFC7515], and -MUST provide the corresponding endpoint to fetch -the public key used to sign the Visa Document Token.
      6. -
      7. The token is not treated as an access token, but validity -checks outlined elsewhere in this specification still apply.
      8. -
      9. -Visas MUST be signed with a conformant signing algorithm.
      10. -
      11. The scope Claim, if included, MUST NOT contain “openid” as -a space-delimited substring of the scope JWT Claim.
      12. -
      13. Payload Claims are specified in -Visa Format in [Passport].
      14. -
      -
    2. -
    3. -

      -Visa Access Token – The Visa Issuer is providing an OIDC provider -service and issues OIDC-compliant access tokens in a specific format that can -be used as a Visa. Details are specified in the AAI Profile 1.0 specification.

      -
    4. -
    - -

    The Visa Access Token is proposed for removal in a future - version of the specification. Current and future specifications emphasize use of Visas embedded in a Passport, which are not access tokens. New implementations should issue Visas - as Visa Document Tokens.

    -
  2. -
  3. -

    By signing a Visa, a Visa Issuer asserts that - the Visa Assertions made available by the Visa were legitimately derived - from their Visa Assertion Sources, and the content is - presented and/or transformed without misrepresenting the original intent.

    -
  4. -
- -
- -

Conformance for Passport Issuers

- -

Passport Issuers are used to package Visas into signed Passports. Passports are signed JWTs -that use this format to contain Visas.

- -
    -
  1. -

    Passport Issuers MUST be Brokers.

    -
  2. -
  3. -

    Passports MUST be signed with a conformant signing algorithm.

    -
  4. -
  5. -

    Passports MAY be issued from a Token Endpoint using Token Exchange, with the following clarifications:

    - -
      -
    1. -

      The Token Endpoint MAY also support other OAuth2 grant types.

      -
    2. -
    3. -

      Client authentication is REQUIRED (using OAuth2 client authentication in [RFC6749] is RECOMMENDED).

      -
    4. -
    5. -

      The requested_token_type parameter MUST be present with the value urn:ga4gh:params:oauth:token-type:passport.

      -
    6. -
    7. -

      The subject_token parameter value MUST be a valid Passport-Scoped Access Token.

      -
    8. -
    9. -

      The subject_token_type parameter value MUST be urn:ietf:params:oauth:token-type:access_token.

      -
    10. -
    11. -

      The Token Endpoint MAY accept or require any other optional parameters defined in [RFC8693].

      -
    12. -
    -
  6. -
- -


-Passport Issuing via Token Exchange (non-normative example)

- - - - - - Researcher - - AAI - - Data Access Committee (1) - - Data Access Committee (2) - - - - - - User Agent - - - - Client - - Broker and Passport Issuer - - Visa Issuer (1) - - Visa Issuer (2) - - - - - OIDC - - - Initiates login - - - Send redirect to Broker - - - Follow redirects - - - ref - Broker authenticates user - (potentially with external IdP) - - - Send redirect to client with authorization code - - - Follow redirect with code - - - Request Passport-Scoped Access Token - - - Respond with Passport-Scoped Access Token - - - - - Token Exchange - - - Request to exchange Passport-Scoped - Access Token for Passport - - - ref - Signed visas can be sourced from multiple visa issuers - either on demand or via batch transfer/cached - - - - Obtain Visa A - - - - Obtain Visa B - - - - Obtain Visa C - - - Response with Passport containing Visas A, B, C - - - - -
- -

Conformance for Passport Clearinghouses

- -

Passport Clearinghouses consume Passports containing Visas in order to grant access to data.

- -
    -
  1. -

    Passport Clearinghouses MUST trust at least one Broker.

    - -
      -
    1. -

      Passport Clearinghouses MAY trust more than one Broker

      -
    2. -
    3. -

      The Passport Clearinghouse is responsible for assessing the risk in choosing to trust a token from a Broker.

      -
    4. -
    -
  2. -
  3. -

    Passport Clearinghouses MUST process access tokens to access a Broker’s Token or UserInfo Endpoint to get access to Visas OR MUST process Passports directly.

    - -
      -
    1. -

      For access token flows, Passport Clearinghouses MUST either check the validity of the access token or treat the access -token as opaque.

      -
    2. -
    3. -

      For Passport flows, Passport Clearinghouses MUST check the validity of the Passport.

      -
    4. -
    -
  4. -
  5. -

    A Passport Clearinghouse service can be a Broker itself and would follow the -Conformance For Brokers.

    -
  6. -
  7. -

    Passport Clearinghouses MUST provide protection against attacks as outlined in -[RFC6819].

    - -
      -
    1. -Section 5.1.6 of [RFC6819] states Ensure that client applications do not share tokens with 3rd parties. This profile provides a mechanism for Clearinghouses to consume access tokens from multiple brokers in a manner that does not involve 3rd parties. Client applications SHOULD take care to not spread the tokens to any other services that would be considered 3rd parties.
    2. -
    -
  8. -
  9. -

    If making use of Visas:

    - -
      -
    1. -

      The Passport Clearinghouse MUST validate that all JWT checks pass (such as -the JWT hasn’t expired) as described elsewhere in this specification and -the underlying OIDC specifications.

      -
    2. -
    3. -

      If making use of Visa Access Tokens:

      - -
        -
      1. -

        Token checks MUST be performed to ensure it complies with the access -token specification.

        -
      2. -
      3. -

        In addition to other validation checks, a Visa is considered -invalid if it is more than 1 hour old (as per the iat Claim) AND -Access Token Polling does not confirm that the token is still -valid (e.g. provide a success status code).

        -
      4. -
      -
    4. -
    5. -

      If making use of Visa Document Tokens:

      - -
        -
      1. -

        Fetching the public keys using the jku is not required if a Passport -Clearinghouse has received the keys for the given iss via a trusted, -out-of-band process.

        -
      2. -
      3. -

        If a Passport Clearinghouse is to use the jku URL to fetch the public -keys to verify the signature, then it MUST verify that the jku is -trusted for the given iss as part of the Passport Clearinghouse’s -trusted issuer configuration. This check MUST be performed before -calling the jku endpoint.

        -
      4. -
      -
    6. -
    -
  10. -
  11. -

    Access Token Polling: Clients MAY use access tokens, -including Visas, to occasionally check which Visas are still valid -at the associated Token or UserInfo Endpoint in order to establish -whether the user still meets the access requirements.

    - -

    This MUST NOT be done more than once per hour (excluding any optional retries) -per Passport Clearinghouse. Any request retries MUST include exponential backoff -delays based on best practices (e.g. include appropriate jitter). At a -minimum, the client MUST stop checking once any of the following occurs:

    - -
      -
    1. -

      The system can reasonably determine that authorization related to these -Claims is no longer needed by the user. For example, all downstream cloud -tasks have terminated and the related systems will no longer be using the -access token nor any downstream tokens that were authorized by evaluating -access requirements against Claims in the token.

      -
    2. -
    3. -

      The JWT access token has expired as per the exp field.

      -
    4. -
    5. -

      The client has detected that the user owning the identity or a system -administrator has revoked the access token or a refresh token related to -minting the access token.

      -
    6. -
    7. -

      The endpoint returns an HTTP status that is not retryable, e.g. HTTP status 400.

      -
    8. -
    9. -

      If the endpoint returns an updated set of Visas (this is -an OPTIONAL feature of a Visa Issuer), then the Passport -Clearinghouse MUST use the updated Visas and ignore the original -GA4GH Claim values in the Visa Access Token. If the Passport -Clearinghouse is unable to adjust for the updated Visas, then -it MUST act as though the token was revoked.

      -
    10. -
    -
  12. -
- -
- -

-

GA4GH JWT Formats

- -

This specification builds on the JWT format defined in [RFC7519]. -A well-formed JWS-Encoded JSON Web Token (JWT) consists of three concatenated -Base64url-encoded strings, separated by dots (.) The three sections are: header, -payload and signature. These JWTs follow JWS [RFC7515] -and utilize a number of standard JWT Claim names [IANA-JWT] -as per the registration process. -This profile is agnostic to the format of the id_token.

- -
- -

-

-

Passport-Scoped Access Token

- -

This is the format for the token that is issued by Brokers, extending the definition of -the [OIDC-Core] access token.

- -

Header

- -
{
- "typ": "<jwt-type-identifier>",
- "alg": "<algorithm-identifier>",
- "kid": "<key-identifier>"
-}
-
- - -

Payload

- -
{
- "iss": "https://<issuer-website>/",
- "sub": "<subject-identifier>",
- "idp": "<short-idp-identifier>",
- "aud": [
-  "<client-id1>",
-  "<client-id2>" ...
- ],
- "iat": <seconds-since-epoch>,
- "exp": <seconds-since-epoch>,
- "jti": <token-identifier>,
- "scope": "openid ga4gh_passport_v1 <additional-scopes>",
- <additional claims>
-}
-
-
    -
  • -

    iss: REQUIRED. MUST be able to be appended with -.well-known/openid-configuration to get spec of Broker.

    -
  • -
  • -

    sub: REQUIRED. Authenticated user unique identifier.

    -
  • -
  • -

    idp: OPTIONAL. SHOULD contain the IDP the user used to auth with. -This does not have to be unique and -can be used just to help inform if that is what a Visa Issuer -or Data Holder needs.

    -
  • -
  • -

    aud: OPTIONAL. If provided, it MUST contain the OAuth Client ID of the -relying party.

    -
  • -
  • -

    iat: REQUIRED. Time issued.

    -
  • -
  • -

    exp: REQUIRED. Time expired.

    -
  • -
  • -

    jti: RECOMMENDED. a unique identifier for the token as per -section 4.1.7 of [RFC7519]

    -
  • -
  • -

    scope: REQUIRED. Includes verified scopes. MUST include openid and ga4gh_passport_v1. -The scope Claim is defined by section 4.2 -of [RFC8693].

    -
  • -
  • -

    GA4GH Claims (ga4gh_passport_v1 or ga4gh_visa_v1): MUST NOT be included.

    -
  • -
  • -

    additional Claims: OPTIONAL. Any other additional non-GA4GH Claims are allowed. This specification does not dictate the format of other Claims.

    -
  • -
- -
- -

Visas provided by a Broker via UserInfo Endpoint

- -

The UserInfo Endpoint MAY use application/json -or application/jwt response content type. It is RECOMMENDED that if desiring to return a JWT, a Token Endpoint supporting -Token Exchange exists to do that and that the UserInfo Endpoint returns an application/json response. -Only the GA4GH claims must be as prescribed here. Refer to [OIDC-Core] for more information.

- -

The UserInfo response MUST include a ga4gh_passport_v1 Claim with a list of Visas -if a Passport-Scoped Access Token was used for accessing it.

- -
- -

Passport Format

- -

Passport Issuers MUST issue a Passport conforming to the requirements in this section when a Token Exchange -with the requested_token_type=urn:ga4gh:params:oauth:token-type:passport is successfully performed -(as described in the Conformance for Passport Issuers section).

- -

Passports are defined as signed JWTs. The JWT specification [RFC7519] -states that JWTs can be either signed and encoded using JWS Compact Serialization, -or encrypted and encoded using JWE Compact Serialization. -Passports are signed JWTs, which implies that they must be encoded using JWS Compact Serialization [RFC7515].

- -

Header

- -

This spec prescribes the following JWS headers for Passports -in addition to the guidelines established in [RFC7515]:

- -
    -
  • -typ: REQUIRED where the value must be vnd.ga4gh.passport+jwt for Passports.
  • -
- -

Payload

- -

Only the GA4GH claims must be as prescribed here. See the -JWT specification [RFC7519] for more details.

- -
{
- "iss": "https://<issuer-website>/",
- "sub": "<subject-identifier>",
- "aud": [
-  "<client-id1>",
-  "<client-id2>" ...
- ],
- "iat": <seconds-since-epoch>,
- "exp": <seconds-since-epoch>,
- "ga4gh_passport_v1": [
-    <Passport Visa>,
-    <Passport Visa (if more than one)>,
-    ...
- ]
-}
-
- -
    -
  • -

    iss: REQUIRED.

    -
  • -
  • -

    sub: REQUIRED. Please note that [OIDC-Core] in its section - Subject Identifier Types - allows the use of PPIDs (Pairwise Pseudonymous Identifiers) providing different sub value to each client - to preclude correlation of user’s activities at different clients. Even if a public identifier is used (same for all clients), - the value of the sub claim of a Passports may be different from the values of sub claims of its Visas, - and the values may need to be linked using LinkedIdentities - visas.

    -
  • -
  • -

    aud: OPTIONAL.

    -
  • -
  • -

    iat: REQUIRED.

    -
  • -
  • -

    exp: REQUIRED.

    -
  • -
  • -

    jti: RECOMMENDED.

    -
  • -
  • -

    ga4gh_passport_v1: REQUIRED. An array of GA4GH Visas. May be empty if a - user has no visas. See the [Passport] specification - for more details on types of visas.

    -
  • -
- -
- -

Signing Algorithms

- -

JWTs MUST be issued with signatures using the ES256 or RS256 algorithm.

- -
- -

Security Considerations

- -

The confidentiality and integrity of tokens must be secured, taking -JSON Web Token Best Current Practices in [RFC8725] -into consideration. Of special concern are:

-
    -
  • Revoking access tokens and Visa Assertions
  • -
  • Limiting damage of leaked tokens
  • -
- -
- -

Specification Revision History

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
VersionDateEditorNotes
1.2.02023-01Andrew Patterson, Martin Kuba, Kurt Rodarmer, Tom Conner, Max BarkleyIntroduce token exchange and Passport format, incorporate Visas, update diagrams
1.1.02021-07Craig Voisin -abandoned version now reserved, new concepts moved to v1.2
1.0.42021-07Craig VoisinImprove existing terminology and define Passport and Visa JWTs
1.0.32021-06Craig VoisinLinks for “scope” claim
1.0.22020-02David BernickClarify risk scenarios
1.0.12019-10David BernickClarify that non-GA4GH claims are allowed in tokens
1.0.02019-10Approved by GA4GH Steering Committee 
0.9.92019-10David Bernick, Craig Voisin, Mikael LindenApproved standard
0.9.52019-09Craig VoisinUpdate claim flow diagram and definitions
0.9.42019-08Craig VoisinEmbedded tokens for signed RI Claim Objects
0.9.32019-08Craig VoisinSupport for RI’s embedded tokens
0.9.22019-07David BernickMade changes based on feedback from review
0.9.12019-06Craig VoisinAdded terminology links
0.9.02017-Mikael Linden, Craig Voisin, David BernickInitial working version
- -
- -
- -
-
- - - diff --git a/driver-project-usage/assets/main.css b/driver-project-usage/assets/main.css deleted file mode 100644 index fbb59e6..0000000 --- a/driver-project-usage/assets/main.css +++ /dev/null @@ -1,701 +0,0 @@ -/** - * Reset some basic elements - */ -body, h1, h2, h3, h4, h5, h6, -p, blockquote, pre, hr, -dl, dd, ol, ul, figure { - margin: 0; - padding: 0; -} - -/** - * Basic styling - */ -body { - font: 400 16px/1.5 -apple-system, BlinkMacSystemFont, "Segoe UI", Roboto, Helvetica, Arial, sans-serif, "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Symbol"; - color: #111; - background-color: #fdfdfd; - -webkit-text-size-adjust: 100%; - -webkit-font-feature-settings: "kern" 1; - -moz-font-feature-settings: "kern" 1; - -o-font-feature-settings: "kern" 1; - font-feature-settings: "kern" 1; - font-kerning: normal; - display: flex; - min-height: 100vh; - flex-direction: column; -} - -/** - * Set `margin-bottom` to maintain vertical rhythm - */ -h1, h2, h3, h4, h5, h6, -p, blockquote, pre, -ul, ol, dl, figure, -.highlight { - margin-bottom: 15px; -} - -/** - * `main` element - */ -main { - display: block; /* Default value of `display` of `main` element is 'inline' in IE 11. */ -} - -/** - * Images - */ -img { - max-width: 100%; - vertical-align: middle; -} - -/** - * Figures - */ -figure > img { - display: block; -} - -figcaption { - font-size: 14px; -} - -/** - * Lists - */ -ul, ol { - margin-left: 30px; -} - -li > ul, -li > ol { - margin-bottom: 0; -} - -/** - * Headings - */ -h1, h2, h3, h4, h5, h6 { - font-weight: 400; -} - -/** - * Links - */ -a { - color: #2a7ae2; - text-decoration: none; -} -a:visited { - color: #1756a9; -} -a:hover { - color: #111; - text-decoration: underline; -} -.social-media-list a:hover { - text-decoration: none; -} -.social-media-list a:hover .username { - text-decoration: underline; -} - -/** - * Blockquotes - */ -blockquote { - color: #828282; - border-left: 4px solid #e8e8e8; - padding-left: 15px; - font-size: 18px; - letter-spacing: -1px; - font-style: italic; -} -blockquote > :last-child { - margin-bottom: 0; -} - -/** - * Code formatting - */ -pre, -code { - font-size: 15px; - border: 1px solid #e8e8e8; - border-radius: 3px; - background-color: #eef; -} - -code { - padding: 1px 5px; -} - -pre { - padding: 8px 12px; - overflow-x: auto; -} -pre > code { - border: 0; - padding-right: 0; - padding-left: 0; -} - -/** - * Wrapper - */ -.wrapper { - max-width: -webkit-calc(1200px - (30px * 2)); - max-width: calc(1200px - (30px * 2)); - margin-right: auto; - margin-left: auto; - padding-right: 30px; - padding-left: 30px; -} -@media screen and (max-width: 800px) { - .wrapper { - max-width: -webkit-calc(1200px - (30px)); - max-width: calc(1200px - (30px)); - padding-right: 15px; - padding-left: 15px; - } -} - -/** - * Clearfix - */ -.footer-col-wrapper:after, .wrapper:after { - content: ""; - display: table; - clear: both; -} - -/** - * Icons - */ -.svg-icon { - width: 16px; - height: 16px; - display: inline-block; - fill: #828282; - padding-right: 5px; - vertical-align: text-top; -} - -.social-media-list li + li { - padding-top: 5px; -} - -/** - * Tables - */ -table { - margin-bottom: 30px; - width: 100%; - text-align: left; - color: #3f3f3f; - border-collapse: collapse; - border: 1px solid #e8e8e8; -} -table tr:nth-child(even) { - background-color: #f7f7f7; -} -table th, table td { - padding: 10px 15px; -} -table th { - background-color: #f0f0f0; - border: 1px solid #dedede; - border-bottom-color: #c9c9c9; -} -table td { - border: 1px solid #e8e8e8; -} - -/** - * Site header - */ -.site-header { - border-top: 5px solid #424242; - border-bottom: 1px solid #e8e8e8; - min-height: 55.95px; - position: relative; -} - -.site-title { - font-size: 26px; - font-weight: 300; - line-height: 54px; - letter-spacing: -1px; - margin-bottom: 0; - float: left; -} -.site-title, .site-title:visited { - color: #424242; -} - -.site-nav { - float: right; - line-height: 54px; -} -.site-nav .nav-trigger { - display: none; -} -.site-nav .menu-icon { - display: none; -} -.site-nav .page-link { - color: #111; - line-height: 1.5; -} -.site-nav .page-link:not(:last-child) { - margin-right: 20px; -} -@media screen and (max-width: 600px) { - .site-nav { - position: absolute; - top: 9px; - right: 15px; - background-color: #fdfdfd; - border: 1px solid #e8e8e8; - border-radius: 5px; - text-align: right; - } - .site-nav label[for=nav-trigger] { - display: block; - float: right; - width: 36px; - height: 36px; - z-index: 2; - cursor: pointer; - } - .site-nav .menu-icon { - display: block; - float: right; - width: 36px; - height: 26px; - line-height: 0; - padding-top: 10px; - text-align: center; - } - .site-nav .menu-icon > svg { - fill: #424242; - } - .site-nav input ~ .trigger { - clear: both; - display: none; - } - .site-nav input:checked ~ .trigger { - display: block; - padding-bottom: 5px; - } - .site-nav .page-link { - display: block; - padding: 5px 10px; - margin-left: 20px; - } - .site-nav .page-link:not(:last-child) { - margin-right: 0; - } -} - -/** - * Site footer - */ -.site-footer { - border-top: 1px solid #e8e8e8; - padding: 30px 0; -} - -.footer-heading { - font-size: 18px; - margin-bottom: 15px; -} - -.contact-list, -.social-media-list { - list-style: none; - margin-left: 0; -} - -.footer-col-wrapper { - font-size: 15px; - color: #828282; - margin-left: -15px; -} - -.footer-col { - float: left; - margin-bottom: 15px; - padding-left: 15px; -} - -.footer-col-1 { - width: -webkit-calc(35% - (30px / 2)); - width: calc(35% - (30px / 2)); -} - -.footer-col-2 { - width: -webkit-calc(20% - (30px / 2)); - width: calc(20% - (30px / 2)); -} - -.footer-col-3 { - width: -webkit-calc(45% - (30px / 2)); - width: calc(45% - (30px / 2)); -} - -@media screen and (max-width: 800px) { - .footer-col-1, - .footer-col-2 { - width: -webkit-calc(50% - (30px / 2)); - width: calc(50% - (30px / 2)); - } - .footer-col-3 { - width: -webkit-calc(100% - (30px / 2)); - width: calc(100% - (30px / 2)); - } -} -@media screen and (max-width: 600px) { - .footer-col { - float: none; - width: -webkit-calc(100% - (30px / 2)); - width: calc(100% - (30px / 2)); - } -} -/** - * Page content - */ -.page-content { - padding: 30px 0; - flex: 1; -} - -.page-heading { - font-size: 32px; -} - -.post-list-heading { - font-size: 28px; -} - -.post-list { - margin-left: 0; - list-style: none; -} -.post-list > li { - margin-bottom: 30px; -} - -.post-meta { - font-size: 14px; - color: #828282; -} - -.post-link { - display: block; - font-size: 24px; -} - -/** - * Posts - */ -.post-header { - margin-bottom: 30px; -} - -.post-title { - font-size: 42px; - letter-spacing: -1px; - line-height: 1; -} -@media screen and (max-width: 800px) { - .post-title { - font-size: 36px; - } -} - -.post-content { - margin-bottom: 30px; -} -.post-content h2 { - font-size: 32px; -} -@media screen and (max-width: 800px) { - .post-content h2 { - font-size: 28px; - } -} -.post-content h3 { - font-size: 26px; -} -@media screen and (max-width: 800px) { - .post-content h3 { - font-size: 22px; - } -} -.post-content h4 { - font-size: 20px; -} -@media screen and (max-width: 800px) { - .post-content h4 { - font-size: 18px; - } -} - -/** - * Syntax highlighting styles - */ -.highlight { - background: #fff; -} -.highlighter-rouge .highlight { - background: #eef; -} -.highlight .c { - color: #998; - font-style: italic; -} -.highlight .err { - color: #a61717; - background-color: #e3d2d2; -} -.highlight .k { - font-weight: bold; -} -.highlight .o { - font-weight: bold; -} -.highlight .cm { - color: #998; - font-style: italic; -} -.highlight .cp { - color: #999; - font-weight: bold; -} -.highlight .c1 { - color: #998; - font-style: italic; -} -.highlight .cs { - color: #999; - font-weight: bold; - font-style: italic; -} -.highlight .gd { - color: #000; - background-color: #fdd; -} -.highlight .gd .x { - color: #000; - background-color: #faa; -} -.highlight .ge { - font-style: italic; -} -.highlight .gr { - color: #a00; -} -.highlight .gh { - color: #999; -} -.highlight .gi { - color: #000; - background-color: #dfd; -} -.highlight .gi .x { - color: #000; - background-color: #afa; -} -.highlight .go { - color: #888; -} -.highlight .gp { - color: #555; -} -.highlight .gs { - font-weight: bold; -} -.highlight .gu { - color: #aaa; -} -.highlight .gt { - color: #a00; -} -.highlight .kc { - font-weight: bold; -} -.highlight .kd { - font-weight: bold; -} -.highlight .kp { - font-weight: bold; -} -.highlight .kr { - font-weight: bold; -} -.highlight .kt { - color: #458; - font-weight: bold; -} -.highlight .m { - color: #099; -} -.highlight .s { - color: #d14; -} -.highlight .na { - color: #008080; -} -.highlight .nb { - color: #0086B3; -} -.highlight .nc { - color: #458; - font-weight: bold; -} -.highlight .no { - color: #008080; -} -.highlight .ni { - color: #800080; -} -.highlight .ne { - color: #900; - font-weight: bold; -} -.highlight .nf { - color: #900; - font-weight: bold; -} -.highlight .nn { - color: #555; -} -.highlight .nt { - color: #000080; -} -.highlight .nv { - color: #008080; -} -.highlight .ow { - font-weight: bold; -} -.highlight .w { - color: #bbb; -} -.highlight .mf { - color: #099; -} -.highlight .mh { - color: #099; -} -.highlight .mi { - color: #099; -} -.highlight .mo { - color: #099; -} -.highlight .sb { - color: #d14; -} -.highlight .sc { - color: #d14; -} -.highlight .sd { - color: #d14; -} -.highlight .s2 { - color: #d14; -} -.highlight .se { - color: #d14; -} -.highlight .sh { - color: #d14; -} -.highlight .si { - color: #d14; -} -.highlight .sx { - color: #d14; -} -.highlight .sr { - color: #009926; -} -.highlight .s1 { - color: #d14; -} -.highlight .ss { - color: #990073; -} -.highlight .bp { - color: #999; -} -.highlight .vc { - color: #008080; -} -.highlight .vg { - color: #008080; -} -.highlight .vi { - color: #008080; -} -.highlight .il { - color: #099; -} - -ol ol { - list-style-type: lower-alpha; -} - -ol ol ol { - list-style-type: lower-roman; -} - -ol ol ol ol { - list-style-type: circle; -} - -ol ol ol ol ol { - list-style-type: disc; -} - -li:only-child { - margin-bottom: 1em; -} - -.rationale { - background: rgba(170, 170, 170, 0.2); - border-left: 5px solid #008; - border-radius: 5px; - box-shadow: 0 1px 2px rgba(0, 0, 0, 0.12), 0 3px 10px rgba(0, 0, 0, 0.08); - padding: 0.8rem; -} -.rationale::before { - color: #008; - content: "RATIONALE"; - display: block; - font-weight: bold; - font-size: 0.75em; - padding-bottom: 0.125rem; -} - -.deprecation { - background: rgba(221, 221, 221, 0.2); - border-left: 5px solid #FFA500; - border-radius: 5px; - box-shadow: 0 1px 2px rgba(0, 0, 0, 0.12), 0 3px 10px rgba(0, 0, 0, 0.08); - padding: 0.8rem; -} -.deprecation::before { - color: #FFA500; - content: "DEPRECATION WARNING"; - display: block; - font-weight: bold; - font-size: 0.75em; - padding-bottom: 0.125rem; -} - -/*# sourceMappingURL=main.css.map */ \ No newline at end of file diff --git a/driver-project-usage/assets/main.css.map b/driver-project-usage/assets/main.css.map deleted file mode 100644 index 8f17265..0000000 --- a/driver-project-usage/assets/main.css.map +++ /dev/null @@ -1 +0,0 @@ -{"version":3,"sourceRoot":"","sources":["../vendor/bundle/ruby/2.7.0/gems/minima-2.5.1/_sass/minima/_base.scss","../_sass/minima.scss","../vendor/bundle/ruby/2.7.0/gems/minima-2.5.1/_sass/minima/_layout.scss","../vendor/bundle/ruby/2.7.0/gems/minima-2.5.1/_sass/minima/_syntax-highlighting.scss"],"names":[],"mappings":"AAAA;AAAA;AAAA;AAGA;AAAA;AAAA;EAGE;EACA;;;AAKF;AAAA;AAAA;AAGA;EACE;EACA,OCLiB;EDMjB,kBCLiB;EDMjB;EACA;EACG;EACE;EACG;EACR;EACA;EACA;EACA;;;AAKF;AAAA;AAAA;AAGA;AAAA;AAAA;AAAA;EAIE;;;AAKF;AAAA;AAAA;AAGA;EACE;;;AAKF;AAAA;AAAA;AAGA;EACE;EACA;;;AAKF;AAAA;AAAA;AAGA;EACE;;;AAGF;EACE,WChEiB;;;ADqEnB;AAAA;AAAA;AAGA;EACE,aCtEiB;;;AD0EjB;AAAA;EAEE;;;AAMJ;AAAA;AAAA;AAGA;EACE,aC1FiB;;;AD+FnB;AAAA;AAAA;AAGA;EACE,OC3FiB;ED4FjB;;AAEA;EACE;;AAGF;EACE,OCrGe;EDsGf;;AAGF;EACE;;AAEA;EACE;;;AAMN;AAAA;AAAA;AAGA;EACE,OCnHiB;EDoHjB;EACA;EC1FA;ED4FA;EACA;;AAEA;EACE;;;AAMJ;AAAA;AAAA;AAGA;AAAA;ECzGE;ED4GA;EACA;EACA;;;AAGF;EACE;;;AAGF;EACE;EACA;;AAEA;EACE;EACA;EACA;;;AAMJ;AAAA;AAAA;AAGA;EACE;EACA;EACA;EACA;EACA,eC3KiB;ED4KjB,cC5KiB;;AA2BjB;ED2IF;IAUI;IACA;IACA;IACA;;;;AAMJ;AAAA;AAAA;AAGA;EACE;EACA;EACA;;;AAKF;AAAA;AAAA;AAIA;EACI;EACA;EACA;EACA;EACA;EACA;;;AAIF;EACE;;;AAMJ;AAAA;AAAA;AAGA;EACE,eC7NiB;ED8NjB;EACA,YCrNiB;EDsNjB;EACA;EACA;;AAEE;EACE;;AAGJ;EACE;;AAEF;EACE;EACA;EACA;;AAEF;EACE;;;AE3PJ;AAAA;AAAA;AAGA;EACE;EACA;EACA;EAGA;;;AAGF;ED+BE;EC7BA;EACA;EACA;EACA;EACA;;AAEA;EAEE,ODJe;;;ACQnB;EACE;EACA;;AAEA;EACI;;AAGJ;EACE;;AAGF;EACE,OD3Be;EC4Bf,aDhCe;;ACmCf;EACE;;ADPJ;ECXF;IAuBI;IACA;IACA;IACA,kBDvCe;ICwCf;IACA;IACA;;EAEA;IACE;IACA;IACA;IACA;IACA;IACA;;EAGF;IACE;IACA;IACA;IACA;IACA;IACA;IACA;;EAEA;IACE,MD1DW;;EC8Df;IACE;IACA;;EAGF;IACE;IACA;;EAGF;IACE;IACA;IAKA;;EAHA;IACE;;;;AASR;AAAA;AAAA;AAGA;EACE;EACA;;;AAGF;EDrEE;ECuEA;;;AAGF;AAAA;EAEE;EACA;;;AAGF;EDhFE;ECkFA,OD7GiB;EC8GjB;;;AAIF;EACE;EACA;EACA;;;AAGF;EACE;EACA;;;AAGF;EACE;EACA;;;AAGF;EACE;EACA;;;AD/GA;ECmHA;AAAA;IAEE;IACA;;EAGF;IACE;IACA;;;AD3HF;ECgIA;IACE;IACA;IACA;;;AAMJ;AAAA;AAAA;AAGA;EACE;EACA;;;AAGF;ED3IE;;;AC+IF;ED/IE;;;ACmJF;EACE;EACA;;AAEA;EACE,eDzLe;;;AC6LnB;EACE,WDjMiB;ECkMjB,ODzLiB;;;AC4LnB;EACE;EDlKA;;;ACwKF;AAAA;AAAA;AAGA;EACE,eD7MiB;;;ACgNnB;ED/KE;ECiLA;EACA;;ADxLA;ECqLF;ID/KE;;;;ACyLF;EACE,eD3NiB;;AC6NjB;ED5LA;;AANA;ECkMA;ID5LA;;;ACoMA;EDpMA;;AANA;EC0MA;IDpMA;;;AC4MA;ED5MA;;AANA;ECkNA;ID5MA;;;;AE3CF;AAAA;AAAA;AAGA;EACE;;AAGA;EACE;;AAGF;EAAS;EAAa;;AACtB;EAAS;EAAgB;;AACzB;EAAS;;AACT;EAAS;;AACT;EAAS;EAAa;;AACtB;EAAS;EAAa;;AACtB;EAAS;EAAa;;AACtB;EAAS;EAAa;EAAmB;;AACzC;EAAS;EAAa;;AACtB;EAAS;EAAa;;AACtB;EAAS;;AACT;EAAS;;AACT;EAAS;;AACT;EAAS;EAAa;;AACtB;EAAS;EAAa;;AACtB;EAAS;;AACT;EAAS;;AACT;EAAS;;AACT;EAAS;;AACT;EAAS;;AACT;EAAS;;AACT;EAAS;;AACT;EAAS;;AACT;EAAS;;AACT;EAAS;EAAa;;AACtB;EAAS;;AACT;EAAS;;AACT;EAAS;;AACT;EAAS;;AACT;EAAS;EAAa;;AACtB;EAAS;;AACT;EAAS;;AACT;EAAS;EAAa;;AACtB;EAAS;EAAa;;AACtB;EAAS;;AACT;EAAS;;AACT;EAAS;;AACT;EAAS;;AACT;EAAS;;AACT;EAAS;;AACT;EAAS;;AACT;EAAS;;AACT;EAAS;;AACT;EAAS;;AACT;EAAS;;AACT;EAAS;;AACT;EAAS;;AACT;EAAS;;AACT;EAAS;;AACT;EAAS;;AACT;EAAS;;AACT;EAAS;;AACT;EAAS;;AACT;EAAS;;AACT;EAAS;;AACT;EAAS;;AACT;EAAS;;AACT;EAAS;;AACT;EAAS;;;AFdX;EAAQ;;;AACR;EAAW;;;AACX;EAAc;;;AACd;EAAiB;;;AAIjB;EACE;;;AAeA;EACE;EACA;EACA,eAbY;EAcZ;EACA;;AAEA;EACE;EACA;EACA;EACA;EACA;EACA;;;AAbJ;EACE;EACA;EACA,eAbY;EAcZ;EACA;;AAEA;EACE;EACA;EACA;EACA;EACA;EACA","sourcesContent":["/**\n * Reset some basic elements\n */\nbody, h1, h2, h3, h4, h5, h6,\np, blockquote, pre, hr,\ndl, dd, ol, ul, figure {\n margin: 0;\n padding: 0;\n}\n\n\n\n/**\n * Basic styling\n */\nbody {\n font: $base-font-weight #{$base-font-size}/#{$base-line-height} $base-font-family;\n color: $text-color;\n background-color: $background-color;\n -webkit-text-size-adjust: 100%;\n -webkit-font-feature-settings: \"kern\" 1;\n -moz-font-feature-settings: \"kern\" 1;\n -o-font-feature-settings: \"kern\" 1;\n font-feature-settings: \"kern\" 1;\n font-kerning: normal;\n display: flex;\n min-height: 100vh;\n flex-direction: column;\n}\n\n\n\n/**\n * Set `margin-bottom` to maintain vertical rhythm\n */\nh1, h2, h3, h4, h5, h6,\np, blockquote, pre,\nul, ol, dl, figure,\n%vertical-rhythm {\n margin-bottom: $spacing-unit / 2;\n}\n\n\n\n/**\n * `main` element\n */\nmain {\n display: block; /* Default value of `display` of `main` element is 'inline' in IE 11. */\n}\n\n\n\n/**\n * Images\n */\nimg {\n max-width: 100%;\n vertical-align: middle;\n}\n\n\n\n/**\n * Figures\n */\nfigure > img {\n display: block;\n}\n\nfigcaption {\n font-size: $small-font-size;\n}\n\n\n\n/**\n * Lists\n */\nul, ol {\n margin-left: $spacing-unit;\n}\n\nli {\n > ul,\n > ol {\n margin-bottom: 0;\n }\n}\n\n\n\n/**\n * Headings\n */\nh1, h2, h3, h4, h5, h6 {\n font-weight: $base-font-weight;\n}\n\n\n\n/**\n * Links\n */\na {\n color: $brand-color;\n text-decoration: none;\n\n &:visited {\n color: darken($brand-color, 15%);\n }\n\n &:hover {\n color: $text-color;\n text-decoration: underline;\n }\n\n .social-media-list &:hover {\n text-decoration: none;\n\n .username {\n text-decoration: underline;\n }\n }\n}\n\n\n/**\n * Blockquotes\n */\nblockquote {\n color: $grey-color;\n border-left: 4px solid $grey-color-light;\n padding-left: $spacing-unit / 2;\n @include relative-font-size(1.125);\n letter-spacing: -1px;\n font-style: italic;\n\n > :last-child {\n margin-bottom: 0;\n }\n}\n\n\n\n/**\n * Code formatting\n */\npre,\ncode {\n @include relative-font-size(0.9375);\n border: 1px solid $grey-color-light;\n border-radius: 3px;\n background-color: #eef;\n}\n\ncode {\n padding: 1px 5px;\n}\n\npre {\n padding: 8px 12px;\n overflow-x: auto;\n\n > code {\n border: 0;\n padding-right: 0;\n padding-left: 0;\n }\n}\n\n\n\n/**\n * Wrapper\n */\n.wrapper {\n max-width: -webkit-calc(#{$content-width} - (#{$spacing-unit} * 2));\n max-width: calc(#{$content-width} - (#{$spacing-unit} * 2));\n margin-right: auto;\n margin-left: auto;\n padding-right: $spacing-unit;\n padding-left: $spacing-unit;\n @extend %clearfix;\n\n @include media-query($on-laptop) {\n max-width: -webkit-calc(#{$content-width} - (#{$spacing-unit}));\n max-width: calc(#{$content-width} - (#{$spacing-unit}));\n padding-right: $spacing-unit / 2;\n padding-left: $spacing-unit / 2;\n }\n}\n\n\n\n/**\n * Clearfix\n */\n%clearfix:after {\n content: \"\";\n display: table;\n clear: both;\n}\n\n\n\n/**\n * Icons\n */\n\n.svg-icon {\n width: 16px;\n height: 16px;\n display: inline-block;\n fill: #{$grey-color};\n padding-right: 5px;\n vertical-align: text-top;\n}\n\n.social-media-list {\n li + li {\n padding-top: 5px;\n }\n}\n\n\n\n/**\n * Tables\n */\ntable {\n margin-bottom: $spacing-unit;\n width: 100%;\n text-align: $table-text-align;\n color: lighten($text-color, 18%);\n border-collapse: collapse;\n border: 1px solid $grey-color-light;\n tr {\n &:nth-child(even) {\n background-color: lighten($grey-color-light, 6%);\n }\n }\n th, td {\n padding: ($spacing-unit / 3) ($spacing-unit / 2);\n }\n th {\n background-color: lighten($grey-color-light, 3%);\n border: 1px solid darken($grey-color-light, 4%);\n border-bottom-color: darken($grey-color-light, 12%);\n }\n td {\n border: 1px solid $grey-color-light;\n }\n}\n","@charset \"utf-8\";\n\n// Define defaults for each variable.\n\n$base-font-family: -apple-system, BlinkMacSystemFont, \"Segoe UI\", Roboto, Helvetica, Arial, sans-serif, \"Apple Color Emoji\", \"Segoe UI Emoji\", \"Segoe UI Symbol\" !default;\n$base-font-size: 16px !default;\n$base-font-weight: 400 !default;\n$small-font-size: $base-font-size * 0.875 !default;\n$base-line-height: 1.5 !default;\n\n$spacing-unit: 30px !default;\n\n$text-color: #111 !default;\n$background-color: #fdfdfd !default;\n$brand-color: #2a7ae2 !default;\n\n$grey-color: #828282 !default;\n$grey-color-light: lighten($grey-color, 40%) !default;\n$grey-color-dark: darken($grey-color, 25%) !default;\n\n$table-text-align: left !default;\n\n// Width of the content area\n// changed from minima default (GA4GH)\n$content-width: 1200px !default;\n\n$on-palm: 600px !default;\n$on-laptop: 800px !default;\n\n// Use media queries like this:\n// @include media-query($on-palm) {\n// .wrapper {\n// padding-right: $spacing-unit / 2;\n// padding-left: $spacing-unit / 2;\n// }\n// }\n@mixin media-query($device) {\n @media screen and (max-width: $device) {\n @content;\n }\n}\n\n@mixin relative-font-size($ratio) {\n font-size: $base-font-size * $ratio;\n}\n\n// Import partials.\n@import\n\"minima/base\",\n\"minima/layout\",\n\"minima/syntax-highlighting\"\n;\n\n// due to estensive nested lists we set styling (GA4GH added)\n\nol ol { list-style-type: lower-alpha; }\nol ol ol { list-style-type: lower-roman; }\nol ol ol ol { list-style-type: circle; }\nol ol ol ol ol { list-style-type: disc; }\n\n// a fix for Kramdowns markup/css that doesn't leave enough space at the end of single item lists (GA4GH added)\n\nli:only-child {\n margin-bottom: 1em;\n}\n\n// custom CSS for callouts (GA4GH added)\n\n$border-radius: 5px;\n\n$callouts: (\n // rationale example callout\n rationale: (#008, rgba(#aaa, .2), 'RATIONALE'),\n // deprecation warning callout\n deprecation: (#FFA500, rgba(#ddd, .2), 'DEPRECATION WARNING'),\n);\n\n@each $class, $props in $callouts {\n .#{$class} {\n background: nth($props, 2);\n border-left: $border-radius solid nth($props, 1);\n border-radius: $border-radius;\n box-shadow: 0 1px 2px rgba(0, 0, 0, 0.12), 0 3px 10px rgba(0, 0, 0, 0.08);\n padding: .8rem;\n\n &::before {\n color: nth($props, 1);\n content: nth($props, 3);\n display: block;\n font-weight: bold;\n font-size: .75em;\n padding-bottom: .125rem;\n }\n }\n}\n","/**\n * Site header\n */\n.site-header {\n border-top: 5px solid $grey-color-dark;\n border-bottom: 1px solid $grey-color-light;\n min-height: $spacing-unit * 1.865;\n\n // Positioning context for the mobile navigation icon\n position: relative;\n}\n\n.site-title {\n @include relative-font-size(1.625);\n font-weight: 300;\n line-height: $base-line-height * $base-font-size * 2.25;\n letter-spacing: -1px;\n margin-bottom: 0;\n float: left;\n\n &,\n &:visited {\n color: $grey-color-dark;\n }\n}\n\n.site-nav {\n float: right;\n line-height: $base-line-height * $base-font-size * 2.25;\n\n .nav-trigger {\n display: none;\n }\n\n .menu-icon {\n display: none;\n }\n\n .page-link {\n color: $text-color;\n line-height: $base-line-height;\n\n // Gaps between nav items, but not on the last one\n &:not(:last-child) {\n margin-right: 20px;\n }\n }\n\n @include media-query($on-palm) {\n position: absolute;\n top: 9px;\n right: $spacing-unit / 2;\n background-color: $background-color;\n border: 1px solid $grey-color-light;\n border-radius: 5px;\n text-align: right;\n\n label[for=\"nav-trigger\"] {\n display: block;\n float: right;\n width: 36px;\n height: 36px;\n z-index: 2;\n cursor: pointer;\n }\n\n .menu-icon {\n display: block;\n float: right;\n width: 36px;\n height: 26px;\n line-height: 0;\n padding-top: 10px;\n text-align: center;\n\n > svg {\n fill: $grey-color-dark;\n }\n }\n\n input ~ .trigger {\n clear: both;\n display: none;\n }\n\n input:checked ~ .trigger {\n display: block;\n padding-bottom: 5px;\n }\n\n .page-link {\n display: block;\n padding: 5px 10px;\n\n &:not(:last-child) {\n margin-right: 0;\n }\n margin-left: 20px;\n }\n }\n}\n\n\n\n/**\n * Site footer\n */\n.site-footer {\n border-top: 1px solid $grey-color-light;\n padding: $spacing-unit 0;\n}\n\n.footer-heading {\n @include relative-font-size(1.125);\n margin-bottom: $spacing-unit / 2;\n}\n\n.contact-list,\n.social-media-list {\n list-style: none;\n margin-left: 0;\n}\n\n.footer-col-wrapper {\n @include relative-font-size(0.9375);\n color: $grey-color;\n margin-left: -$spacing-unit / 2;\n @extend %clearfix;\n}\n\n.footer-col {\n float: left;\n margin-bottom: $spacing-unit / 2;\n padding-left: $spacing-unit / 2;\n}\n\n.footer-col-1 {\n width: -webkit-calc(35% - (#{$spacing-unit} / 2));\n width: calc(35% - (#{$spacing-unit} / 2));\n}\n\n.footer-col-2 {\n width: -webkit-calc(20% - (#{$spacing-unit} / 2));\n width: calc(20% - (#{$spacing-unit} / 2));\n}\n\n.footer-col-3 {\n width: -webkit-calc(45% - (#{$spacing-unit} / 2));\n width: calc(45% - (#{$spacing-unit} / 2));\n}\n\n@include media-query($on-laptop) {\n .footer-col-1,\n .footer-col-2 {\n width: -webkit-calc(50% - (#{$spacing-unit} / 2));\n width: calc(50% - (#{$spacing-unit} / 2));\n }\n\n .footer-col-3 {\n width: -webkit-calc(100% - (#{$spacing-unit} / 2));\n width: calc(100% - (#{$spacing-unit} / 2));\n }\n}\n\n@include media-query($on-palm) {\n .footer-col {\n float: none;\n width: -webkit-calc(100% - (#{$spacing-unit} / 2));\n width: calc(100% - (#{$spacing-unit} / 2));\n }\n}\n\n\n\n/**\n * Page content\n */\n.page-content {\n padding: $spacing-unit 0;\n flex: 1;\n}\n\n.page-heading {\n @include relative-font-size(2);\n}\n\n.post-list-heading {\n @include relative-font-size(1.75);\n}\n\n.post-list {\n margin-left: 0;\n list-style: none;\n\n > li {\n margin-bottom: $spacing-unit;\n }\n}\n\n.post-meta {\n font-size: $small-font-size;\n color: $grey-color;\n}\n\n.post-link {\n display: block;\n @include relative-font-size(1.5);\n}\n\n\n\n/**\n * Posts\n */\n.post-header {\n margin-bottom: $spacing-unit;\n}\n\n.post-title {\n @include relative-font-size(2.625);\n letter-spacing: -1px;\n line-height: 1;\n\n @include media-query($on-laptop) {\n @include relative-font-size(2.25);\n }\n}\n\n.post-content {\n margin-bottom: $spacing-unit;\n\n h2 {\n @include relative-font-size(2);\n\n @include media-query($on-laptop) {\n @include relative-font-size(1.75);\n }\n }\n\n h3 {\n @include relative-font-size(1.625);\n\n @include media-query($on-laptop) {\n @include relative-font-size(1.375);\n }\n }\n\n h4 {\n @include relative-font-size(1.25);\n\n @include media-query($on-laptop) {\n @include relative-font-size(1.125);\n }\n }\n}\n","/**\n * Syntax highlighting styles\n */\n.highlight {\n background: #fff;\n @extend %vertical-rhythm;\n\n .highlighter-rouge & {\n background: #eef;\n }\n\n .c { color: #998; font-style: italic } // Comment\n .err { color: #a61717; background-color: #e3d2d2 } // Error\n .k { font-weight: bold } // Keyword\n .o { font-weight: bold } // Operator\n .cm { color: #998; font-style: italic } // Comment.Multiline\n .cp { color: #999; font-weight: bold } // Comment.Preproc\n .c1 { color: #998; font-style: italic } // Comment.Single\n .cs { color: #999; font-weight: bold; font-style: italic } // Comment.Special\n .gd { color: #000; background-color: #fdd } // Generic.Deleted\n .gd .x { color: #000; background-color: #faa } // Generic.Deleted.Specific\n .ge { font-style: italic } // Generic.Emph\n .gr { color: #a00 } // Generic.Error\n .gh { color: #999 } // Generic.Heading\n .gi { color: #000; background-color: #dfd } // Generic.Inserted\n .gi .x { color: #000; background-color: #afa } // Generic.Inserted.Specific\n .go { color: #888 } // Generic.Output\n .gp { color: #555 } // Generic.Prompt\n .gs { font-weight: bold } // Generic.Strong\n .gu { color: #aaa } // Generic.Subheading\n .gt { color: #a00 } // Generic.Traceback\n .kc { font-weight: bold } // Keyword.Constant\n .kd { font-weight: bold } // Keyword.Declaration\n .kp { font-weight: bold } // Keyword.Pseudo\n .kr { font-weight: bold } // Keyword.Reserved\n .kt { color: #458; font-weight: bold } // Keyword.Type\n .m { color: #099 } // Literal.Number\n .s { color: #d14 } // Literal.String\n .na { color: #008080 } // Name.Attribute\n .nb { color: #0086B3 } // Name.Builtin\n .nc { color: #458; font-weight: bold } // Name.Class\n .no { color: #008080 } // Name.Constant\n .ni { color: #800080 } // Name.Entity\n .ne { color: #900; font-weight: bold } // Name.Exception\n .nf { color: #900; font-weight: bold } // Name.Function\n .nn { color: #555 } // Name.Namespace\n .nt { color: #000080 } // Name.Tag\n .nv { color: #008080 } // Name.Variable\n .ow { font-weight: bold } // Operator.Word\n .w { color: #bbb } // Text.Whitespace\n .mf { color: #099 } // Literal.Number.Float\n .mh { color: #099 } // Literal.Number.Hex\n .mi { color: #099 } // Literal.Number.Integer\n .mo { color: #099 } // Literal.Number.Oct\n .sb { color: #d14 } // Literal.String.Backtick\n .sc { color: #d14 } // Literal.String.Char\n .sd { color: #d14 } // Literal.String.Doc\n .s2 { color: #d14 } // Literal.String.Double\n .se { color: #d14 } // Literal.String.Escape\n .sh { color: #d14 } // Literal.String.Heredoc\n .si { color: #d14 } // Literal.String.Interpol\n .sx { color: #d14 } // Literal.String.Other\n .sr { color: #009926 } // Literal.String.Regex\n .s1 { color: #d14 } // Literal.String.Single\n .ss { color: #990073 } // Literal.String.Symbol\n .bp { color: #999 } // Name.Builtin.Pseudo\n .vc { color: #008080 } // Name.Variable.Class\n .vg { color: #008080 } // Name.Variable.Global\n .vi { color: #008080 } // Name.Variable.Instance\n .il { color: #099 } // Literal.Number.Integer.Long\n}\n"],"file":"main.css"} \ No newline at end of file diff --git a/driver-project-usage/assets/minima-social-icons.svg b/driver-project-usage/assets/minima-social-icons.svg deleted file mode 100644 index fa7399f..0000000 --- a/driver-project-usage/assets/minima-social-icons.svg +++ /dev/null @@ -1,33 +0,0 @@ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - diff --git a/driver-project-usage/changes-1_2.html b/driver-project-usage/changes-1_2.html deleted file mode 100644 index aee7cbf..0000000 --- a/driver-project-usage/changes-1_2.html +++ /dev/null @@ -1,239 +0,0 @@ - - - - - - - - -Changes Between Versions 1.0 and 1.2 | GA4GH Data Security - - - - - - - - - - - - - - - - - - -
-
-
- -
-

Changes Between Versions 1.0 and 1.2

-
- -
-

This document lists changes between

-
    -
  • GA4GH AAI OIDC Profile 1.0.0 and 1.2 -
  • -
  • GA4GH Passport 1.0.0 and 1.2
  • -
- -

Table of Contents

- - - -

Terminology changes

- -
    -
  • Removed double definitions of same concepts like “Claim Source” in AAI and “Passport Visa Assertion Source” in Passport.
  • -
  • Made distinction between claim as an abstract assertion and a JWT/OIDC claim as a pair of a string key and a JSON value.
  • -
  • Renamed “Data Owner” to “Data Controller” to be compatible with European GDPR
  • -
- -

Changed terms

- -
    -
  • -Claim Management System removed, the term was not used
  • -
  • claim → Visa Assertion -
  • -
  • -Claim RepositoryVisa Assertion Repository -
  • -
  • -Claim SourceVisa Assertion Source -
  • -
  • -Claim ClearinghousePassport Clearinghouse -
  • -
  • -Embedded TokenVisa -
  • -
  • -Embedded Token IssuerVisa Issuer -
  • -
  • -Embedded Access TokenVisa Access Token -
  • -
  • -Embedded Document TokenVisa Document Token -
  • -
  • -Flow of ClaimsFlow of Assertions -
  • -
  • -Passport Bearer TokenPassport-Scoped Access Token -
  • -
  • -Data OwnerData Controller -
  • -
- -

New terms

- -
    -
  • -Passport - A signed and verifiable JWT container for holding Visas.
  • -
  • -Passport Issuer - a service that creates and signs Passports.
  • -
  • -Token Endpoint – as defined by OIDC
  • -
  • -UserInfo Endpoint - as defined by OIDC
  • -
- -

Introduced Token Exchange mechanism

- -

The standardized mechanism for exchanging access tokens for other tokens defined in RFC 8693 OAuth 2.0 Token Exchange -was added and used for releasing Passports.

- -

Redefined Passport as a JWT containing Visas

- -

In version 1.0, Passport was defined as ”GA4GH-compatible access token along with the Passport Claim that is returned from Passport Broker service endpoints using such an access token“, -thus as a tuple of an access token and a list of Visas that can be obtained from UserInfo endpoint using the access token.

- -

In version 1.2, Passport is defined as “a signed and verifiable JWT container for holding Visas“, thus as a token that can be passed among systems.

- -

For backward compatibility with version 1.0, list of Visas is still provided as a claim value from UserInfo endpoint.

- -

Defined Passport Issuer

- -

A Passport Issuer is a service that creates and signs Passports. -A Broker is an OIDC Provider service that collects Visas from Visa Issuers and provides them to Passport Clearinghouses.

- -

Broker may optionally become a Passport Issuer by supporting Token Exchange for issuance of Passports.

- -

Brokers conforming to version 1.0 are still compatible with version 1.2, because Token Exchange support is optional.

- -

Added more signing algorithms

- -

The version 1.0 allowed only RS256 algorithm for JWT signing. -It is RSA-based algorithm using keys of size 2048 bits or larger and SHA-256 hash function.

- -

The AAI specification version 1.2 allows also the ES256 algorithm which is -ECDSA-based using P-256 elliptic curve and SHA-256 hash function.

- -

Elliptic Curve Cryptography allows much shorter keys and signatures than RSA. -A short Elliptic Curve key of around 256 bits provides the same security as a 3072 bit RSA key.

- -

For a detailed discussion of signing algorithms, see the article -JWTs: Which Signing Algorithm Should I Use?

- -

Media types for JWTs

- -

In version 1.0, all the mentioned JWTs (access tokens, visas) used in their typ (media type) header parameter -the generic value JWT that marks a generic JWT.

- -

In version 1.2, the typ header parameter is used to distinguish the various types of JWTs:

- -
    -
  • access tokens conforming to RFC9038 -use the value at+jwt -
  • -
  • Passports use the value vnd.ga4gh.passport+jwt -
  • -
  • Visas are recommended to use the value vnd.ga4gh.visa+jwt but allowed to use JWT -for backward compatibility with version 1.0
  • -
- -

Proposed Deprecations

- -

Visa Access Tokens (also referred to as Embedded Access Tokens)

- -

It is proposed that the 1.x versions of this specification will be the last to support -Visa Access Tokens. New implementations should issue Visas -as Visa Document Tokens.

- -
- -
- -
-
- - - diff --git a/driver-project-usage/changes-1_2_1.html b/driver-project-usage/changes-1_2_1.html deleted file mode 100644 index 11148bf..0000000 --- a/driver-project-usage/changes-1_2_1.html +++ /dev/null @@ -1,97 +0,0 @@ - - - - - - - - -Changes in v1.2.1 | GA4GH Data Security - - - - - - - - - - - - - - - - - - -
-
-
- -
-

Changes in v1.2.1

-
- -
-

This document lists changes between 1.2 and 1.2.1

- -
    -
  • Added DURI Passport specs to AAI repository
  • -
  • Added table of versions
  • -
- - -
- -
- -
-
- - - diff --git a/driver-project-usage/check-links.py b/driver-project-usage/check-links.py deleted file mode 100644 index 502aea8..0000000 --- a/driver-project-usage/check-links.py +++ /dev/null @@ -1,92 +0,0 @@ -from bs4 import BeautifulSoup -import os -from pprint import pprint -import re - -anchors = set() -local_hrefs = set() -external_hrefs = set() - -for root, dirs, files in os.walk('build'): - for relpath in files: - if 'htm' in relpath: - with open(os.path.join(root, relpath)) as fh: - content = fh.read() - - if relpath == 'index.html': - base = '' - - base = relpath.replace('.html','') - - soup = BeautifulSoup(content, 'html.parser') - for link in soup.find_all('a'): - href = link.get('href') - name = link.get('name') - if href is None: - anchors.add(f"{base}#{name}") - #print("No href: "+str(link)) - else: - if href in ['/local/', - '/local/aai-openid-connect-profile', - '/local/aai-faq', - '/local/changes-1_2']: - pass - elif href.startswith('#'): - local_hrefs.add(f"{base}{href}") - else: - external_hrefs.add(href) - - for heading in ['h1','h2','h3', 'strong']: - for link in soup.find_all(heading): - id = link.get('id') - if id is not None: - anchors.add(f"{base}#{id}") - #print("No href: "+str(link)) - - - -line_links_from_duri_passport = """ -[GA4GH AAI OIDC Profile](https://github.com/ga4gh/data-security/blob/master/AAI/AAIConnectProfile.md#terminology) -* **[Passport](https://github.com/ga4gh/data-security/blob/master/AAI/AAIConnectProfile.md#term-passport)** -* **[Passport-Scoped Access Token](https://github.com/ga4gh/data-security/blob/master/AAI/AAIConnectProfile.md#term-passport-scoped-access-token)** -* **[Passport Clearinghouse](https://github.com/ga4gh/data-security/blob/master/AAI/AAIConnectProfile.md#term-passport-clearinghouse)** -* **[Visa Assertion](https://github.com/ga4gh/data-security/blob/master/AAI/AAIConnectProfile.md#term-visa-assertion)** -* **[Visa Assertion Source](https://github.com/ga4gh/data-security/blob/master/AAI/AAIConnectProfile.md#term-visa-assertion-source)** -* **[Visa Issuer](https://github.com/ga4gh/data-security/blob/master/AAI/AAIConnectProfile.md#term-visa-issuer)** -* **[Visa](https://github.com/ga4gh/data-security/blob/master/AAI/AAIConnectProfile.md#term-visa)** -* **[JWT](https://github.com/ga4gh/data-security/blob/master/AAI/AAIConnectProfile.md#term-jwt)** -* **[GA4GH Claim](https://github.com/ga4gh/data-security/blob/master/AAI/AAIConnectProfile.md#term-ga4gh-claim)** -* **[Broker](https://github.com/ga4gh/data-security/blob/master/AAI/AAIConnectProfile.md#term-broker)** -Please see the [Flow of Assertions](https://github.com/ga4gh/data-security/blob/master/AAI/AAIConnectProfile.md#flow-of-assertions) - [GA4GH AAI Specification Visa formats](https://github.com/ga4gh/data-security/blob/master/AAI/AAIConnectProfile.md#visa-issued-by-visa-issuer) - [GA4GH AAI Specification](https://github.com/ga4gh/data-security/blob/master/AAI/AAIConnectProfile.md) -[Conformance for Visa Issuers](https://github.com/ga4gh/data-security/blob/master/AAI/AAIConnectProfile.md#conformance-for-visa-issuers) - for [Visa Document Token Format](https://github.com/ga4gh/data-security/blob/master/AAI/AAIConnectProfile.md#visa-document-token-format) -- For [Visa Access Token Format](https://github.com/ga4gh/data-security/blob/master/AAI/AAIConnectProfile.md#visa-access-token-format) -- REQUIRED.The section [Signing Algorithms](https://github.com/ga4gh/data-security/blob/master/AAI/AAIConnectProfile.md#signing-algorithms) -if the Visa is encoded as a [Visa Access Token](https://github.com/ga4gh/data-security/blob/master/AAI/AAIConnectProfile.md#term-visa-access-token-format). -""" - -print ("\n\nChecking anchors to which DURI passport links\n") -for line_from_duri in line_links_from_duri_passport.split('\n'): - #print(line_from_duri) - m = re.search(r'AAIConnectProfile.md#([^)]*)', line_from_duri) - if m: - target = f"aai-openid-connect-profile#{m.group(1)}" - if target in anchors: - print (f"valid {target}") - else: - print (f"INVALID ------ {target}") - -#pprint(anchors) - -print ("\n\nChecking links within AAI\n") -for local_href in local_hrefs: - if local_href in anchors: - print(f"valid {local_href}") - else: - print(f"INVALID ---- {local_href}") - -print ("\n\nListing links from AAI to external hrefs\n") -pprint(external_hrefs) - diff --git a/driver-project-usage/feed.xml b/driver-project-usage/feed.xml deleted file mode 100644 index 75cbedf..0000000 --- a/driver-project-usage/feed.xml +++ /dev/null @@ -1 +0,0 @@ -Jekyll2023-11-20T13:13:22+00:00/data-security/driver-project-usage/feed.xmlGA4GH Data SecurityAAI \ No newline at end of file diff --git a/driver-project-usage/ga4gh-custom-visas.html b/driver-project-usage/ga4gh-custom-visas.html deleted file mode 100644 index f3a092e..0000000 --- a/driver-project-usage/ga4gh-custom-visas.html +++ /dev/null @@ -1,126 +0,0 @@ - - - - - - - - -GA4GH Passport Custom Visa Registry | GA4GH Data Security - - - - - - - - - - - - - - - - - - -
-
-
- -
-

GA4GH Passport Custom Visa Registry

-
- -
-

GA4GH Passport Custom Visa Registry

- -

Introduction

- -

This document captures Passport Custom Visa -Types that have gone -through the GA4GH Passport custom visa proposal -process.

- -

For more information about this process, please refer to the Passport -Custom Visa Types -section of the Passport specification or reach out to maintainers -on the Update Procedure page.

- -

Custom Visa Registry

- - - - - - - - - - - - - - - - - - - - -
DateVisa NameVisa Type StringShort DescriptionDocumentation Links
2020-06-30NIH RAS Controlled Accesshttps://ras.nih.gov/visas/v1.1Multiple controlled access authorizations encoded into a single visa with a more detailed list of attributes per authorization. Currently encodes a detailed list of attribrutes that come from NIH’s dbGaP visa source repository.RAS Service Offerings
- -
- -
- -
-
- - - diff --git a/driver-project-usage/ga4gh-passport.html b/driver-project-usage/ga4gh-passport.html deleted file mode 100644 index ab2ebe8..0000000 --- a/driver-project-usage/ga4gh-passport.html +++ /dev/null @@ -1,1669 +0,0 @@ - - - - - - - - -GA4GH Passport | GA4GH Data Security - - - - - - - - - - - - - - - - - - -
-
-
- -
-

GA4GH Passport

-
- -
-

GA4GH Passport

- -

Version: 1.2.1

- -

Work Stream Name: Data Use and Researcher Identity (DURI)

- -

Product Name: GA4GH Passport

- -

Product Description: This document provides the GA4GH technical -specification for a GA4GH Passport to be -consumed by Passport Clearinghouses in a -standardized approach to determine whether or not data access should be -granted. Additionally, the specification provides guidance on encoding -specific use cases, including -Visas for Registered Access as -described in the “Registered access: authorizing data -access” publication. -Refer to the Overview for an introduction to how data -objects and services defined in this specification fit together.

- -

Table of Contents

- -
    -
  • toc
  • -
- -

Terminology

- -

Inherited Definitions

- -

The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL NOT”, “SHOULD”, -“SHOULD NOT”, “RECOMMENDED”, “MAY”, and “OPTIONAL” in this document are to be -interpreted as described in RFC 2119.

- -

This specification inherits terminology from the -GA4GH AAI OIDC Profile -specification, namely these terms:

- - - -

Term Definitions

- -

Passport Claim

- -
    -
  • -

    The ga4gh_passport_v1 claim. It is a GA4GH Claim -with a claim value being a list of Visas.

    -
  • -
  • -

    Visas from multiple Visa Issuers can be bundled together in the -same ga4gh_passport_v1 claim.

    -
  • -
  • -

    For example, the following structure encodes a Passport Claim:

    - -
    -
    "ga4gh_passport_v1" : [
    -    <Visa>,
    -    <Visa (if more than one)>,
    -    ...
    -]
    -
    -

    Visa Claim

    -
  • -
  • -

    The ga4gh_visa_v1 claim. It is a GA4GH Claim -with a claim value being a Visa Object.

    -
  • -
  • -

    For example, the following structure encodes a Visa Claim:

    - -
    -
    "ga4gh_visa_v1" : {
    -    "type": "<visa-type>",
    -    "asserted": <seconds-since-epoch>,
    -    "value": "<value-string>",
    -    "source": "<source-URL>",
    -}
    -
    -
  • -
- -

Visa Identity

- -
    -
  • The {sub, iss} pair of JWT standard claims (RFC7519 section -4.1.1) that are -included within a Visa that represents a -given user (sub for subject) within the issuer’s (iss) system.
  • -
- -

Visa Object

- -
    -
  • -

    A claim value for - the ga4gh_visa_v1 claim name. The claim value is a JSON object - that provides claims that describe Visa’s - properties that cannot be described by the standard JWT claims like sub or exp.

    -
  • -
  • -

    The ga4gh_visa_v1 claim is required to define a GA4GH v1 visa and - contains controlled vocabulary as defined in this document. This object - is not the entire visa, and there are other important claims within - Visa JWTs that MAY be specific to its visa type as well as other - JWT claims that are required as per this specification and the GA4GH - AAI OIDC specification.

    -
  • -
  • -

    For claim definitions, refer to the Visa Object Claims section of this specification.

    -
  • -
- -

Visa Type

- -
    -
  • -

    The “type” claim value of a Visa Object -that represents the semantics of the assertion and informs all parties -involved in the authoring or handling the assertion how to interpret -other Visa Object Claims.

    -
  • -
  • -

    For example, a Visa Type of “AffiliationAndRole” per the -Standard Visa Type Definitions -specifies the semantics of the Visa as well as the -expected encoding of the “value” claim value for this purpose.

    -
  • -
  • -

    In addition to Standard Visa Type Definitions, there -MAY also be Visas with Custom Visa Types.

    -
  • -
- -

Overview

- -

Please see the Flow of Assertions -section in the GA4GH AAI OIDC Profile specification for an overview of interaction among the specified parties.

- -

General Requirements

- -
    -
  1. -

    Each Visa may have a different expiry.

    -
  2. -
  3. -

    Visas MUST have an indication of -which organization made the Visa Assertion (i.e. the -“source” claim), but Visas do not generally indicate -individual persons involved in making the assertion (i.e. who assigned/signed -the assertion) as detailed identity information is not needed to make an -access decision.

    -
  4. -
  5. -

    Additional information about identity -that is not needed to make an access decision SHOULD not be included in the -Visas. Identity description, encoding audit details, other data -for non-access purposes are not the intent of these Visas, -and must be handled via other means beyond the scope of this specification -should they be needed for entities and systems with sufficient authority to -process such information.

    -
  6. -
  7. -

    The Passport Claim -MUST only be present in a response when Passport-Scoped Access Token is provided.

    -
  8. -
  9. -

    If the Broker is the Visa Issuer, -it MUST set the iss to itself and sign such Visas with an -appropriate private key as described in the GA4GH AAI OIDC specification.

    -
  10. -
  11. -

    Visas are designed for machine -interpretation only in order to make an access decision and is a non-goal to -support rich user interface requirements nor do these claims fully encode the -audit trail.

    -
  12. -
  13. -

    A Visa Object MAY -contain the “conditions” claim to restrict the Visa -to only be valid when the conditions are met.

    - -
      -
    • For example, an identity can have several affiliations and a -Visa with type “ControlledAccessGrants” MAY establish a -dependency on one of them being present in the Passport by using the -conditions claim.
    • -
    -
  14. -
  15. -

    Processing a Passport within a Passport Clearinghouse MUST abide by the following:

    - -
      -
    1. -

      Passport Clearinghouses MUST reject all requests that include Passports -that fail the necessary checks as described in the GA4GH AAI OIDC specification.

      -
    2. -
    3. -

      A Passport Clearinghouse MUST ignore all Visas it does not -need to process a particular request.

      -
    4. -
    5. -

      Passport Clearinghouses MUST ignore Passports and Visas -unless:

      - -
        -
      1. -

        The Passport Clearinghouse has sufficient trust relationships -with all of: the Broker, Visa Assertion Source, -Visa Issuer; or

        -
      2. -
      3. -

        The Passport Clearinghouse can rely on a trusted service that -provides sufficient trust of any of the Broker, -Visa Assertion Source and/or Visa Issuer -such that the Passport Clearinghouse can establish trust of all -three such parties.

        -
      4. -
      -
    6. -
    7. -

      When combining Visas with multiple Visa Identities for the purposes of evaluating -authorization, a Passport Clearinghouse MUST check the -LinkedIdentities Visas by trusted issuers -and ensure that trusted sources have asserted that these -Visa Identities represent the same end user.

      -
    8. -
    -
  16. -
- -

Support for User Interfaces

- -

(e.g. mapping a URI string to a human-readable description for a user -interface.)

- -

For example, a user interface mapping of -“https://doi.org/10.1038/s41431-018-0219-y” to a human readable description -such as “this person is a bona fide researcher as described by the ‘Registered -access: authorizing data access’ publication”.

- -

It is a non-goal for this specification to consider the processes and data for -the purpose of supporting user interfaces.

- -

Passport Claim Format

- -

The Passport Claim name maps to an array of Visas.

- -

Non-normative example of a set of Visas, encoded as JWS Compact Serialization strings:

- -
{
-  "ga4gh_passport_v1": [
-    "<eyJhbGciOiJI...aaa>",
-    "<eyJhbGciOiJI...bbb>"
-  ]
-}
-
- -

For a more reader-friendly example, see the Example Passport -Claim section of the specification.

- -

Visa Requirements

- -
    -
  • -

    Visas MUST conform to one of the -GA4GH AAI Specification Visa formats -as JWS Compact Serialization strings as defined by RFC7515 section -7.1.

    -
  • -
  • -

    Visa Issuers, Brokers, and Passport Clearinghouses -MUST conform to the -GA4GH AAI Specification -requirements for Visas in their use of Visas.

    -
  • -
  • -

    Validation, as outlined elsewhere in this specification and the -GA4GH AAI Specification, MUST be performed before Visas are -used for identity or authorization.

    -
  • -
- -

Visa Format

- -

Visas are signed JWTs encoded into strings using JWS Compact Serialization. -When decoded, their structure is:

- -
{
-  ["typ": "vnd.ga4gh.visa+jwt | at+jwt | JWT",]
-  "alg": "<signing-algorithm>",
-  ["jku": "<json-web-keys-set-URL>",]
-  "kid": "<signing-key-identifier>"
-}.
-{
-  "iss": "<issuer-URL>",
-  "sub": "<subject-identifier>",
-  ["scope": "openid ...",]
-  "jti": "<token-identifier>",
-  "iat": <seconds-since-epoch>,
-  "exp": <seconds-since-epoch>,
-  "ga4gh_visa_v1": {
-    "type": "<visa-type>",
-    "asserted": <seconds-since-epoch>,
-    "value": "<value-string>",
-    "source": "<source-URL>",
-    ["conditions": [...],]
-    ["by": "<by-identifier>"]
-  }
-}.<signature>
-
-

The standard JWT payload claims iss, sub, iat, exp are all REQUIRED.

- -

One of scope or jku MUST be present as described in -Conformance for Visa Issuers -within the AAI specification.

- -

Claims within the ga4gh_visa_v1 Visa Object are as described -in the Visa Object Claims section of this specification.

- -

typ

- -
    -
  • OPTIONAL. The value of the typ header claim is RECOMMENDED to be vnd.ga4gh.visa+jwt -for Visa Document Token Format -visas. The value JWT marking general JWTs MAY also be used.
  • -
  • For Visa Access Token Format -visas the value is unspecified, but it would likely be at+jwt as required by section 2.1 of RFC 9068 -for JWT access tokens.
  • -
  • The typ header claim is specified by section 5.1 of JWT RFC -to contain media type of the JWT for disambiguation. -The full recommended media type for GA4GH Visas is application/vnd.ga4gh.visa+jwt where the subtype consist of -the “vendor tree” prefix vnd, the “producer name” ga4gh, and the “product designation” visa -followed by the +jwt structured syntax suffix (specified in section 3.2 -and section 4.2.8 of RFC 6838). -Then section 4.1.9 of JWS RFC recommends to omit the prefix -application/ to keep messages compact.
  • -
- -

alg

- -
    -
  • REQUIRED.The section Signing Algorithms -in the AAI specification lists possible algorithms used in the alg header claim.
  • -
- -

exp

- -
    -
  • -

    REQUIRED. Generally, it is seconds since unix epoch of when the -Visa Assertion Source -requires such an assertion to be no longer valid. A Visa -Assertion Source MAY choose to make an assertion very long lived. -However, a Visa Issuer MAY -choose an earlier timestamp in order to limit the assertion’s duration -within downstream Passport Clearinghouses.

    -
  • -
  • -

    Access is NOT necessarily removed by the exp timestamp. Instead, -this timestamp may be viewed as a cut-off after which no new access -will be granted and action to remove any existing access may -commence anytime shortly after this cut-off period.

    -
  • -
  • -

    Its use by a Passport Clearinghouse is described in the -Visa Expiry section and -Token Revocation section.

    -
  • -
- -

Visa Object Claims

- -

Although standard claims within a Visa Object -are defined in this section, other claims MAY exist within the object -and should be ignored by any Passport Clearinghouse that is not familiar -with the use of such claims. Claim names are reserved for definition by -GA4GH (or a body it elects).

- -

type

- - - -

asserted

- -
    -
  • -

    REQUIRED. Seconds since unix epoch that represents when the - Visa Assertion Source made the claim.

    -
  • -
  • -

    Note that the standard iat JWT claim on the Visa reflects the timestamp - of when the Visa was minted whereas the asserted claim - reflects when the Visa Assertion Source made the assertion.

    -
  • -
  • -

    asserted MAY be used by a Passport Clearinghouse as described in the - Visa Expiry section.

    -
  • -
  • -

    If a Visa Assertion repository does not include enough - information to construct an asserted timestamp, a Visa Issuer MAY use a recent timestamp (for - example, the current timestamp) if the Visa Assertion repository - is kept up to date such that the Visa Issuer can ensure that - the assertion is valid at or near the time of minting the Visa. - However, generally it is RECOMMENDED to have the - Visa Assertion repository provide more accurate asserted information.

    -
  • -
- -

value

- -
    -
  • -

    REQUIRED. A string that represents any of the scope, process, identifier and - version of the assertion. The format of the string can vary by the - Visa Type.

    -
  • -
  • -

    For example, value: "https://doi.org/10.1038/s41431-018-0219-y" when type: "ResearcherStatus" - represents a version of Registered Access Bona Fide - researcher status. Note that Registered Access requires more than one - Visa as outlined in the Registered - Access section.

    -
  • -
  • -

    For the purposes of enforcing its policies for access, a Passport - Clearinghouse evaluating the value claim MUST:

    - -
      -
    • -

      Validate URL strings as per the URL Claim -requirements if the Visa Type definition indicates the value -is a URL (as indicated by the type claim).

      -
    • -
    • -

      Value strings MUST be full string case-sensitive matches -unless the Visa Type defines a safe and reliable format for -partitioning the value into substrings and matching on the various -substrings. For example, the standard -AffiliationAndRole Visa Type can be -reliably partitioned by splitting the string at the first “@” sign if such -exists, or otherwise producing an error (i.e. denying permission).

      -
    • -
    -
  • -
- -

source

- -
    -
  • -

    REQUIRED. A URL Claim that provides at a minimum the -organization that made the assertion. If there is no organization -making the assertion, the source claim value MUST be set to -“https://no.organization”.

    -
  • -
  • -

    For complex organizations that may require more specific information -regarding which part of the organization made the assertion, this claim MAY -also encode some substructure to the organization that represents the -origin of the authority of the assertion. When this approach is chosen, then:

    - -
      -
    • -

      The additional substructure MUST only encode the sub-organization or -department but no other details or variables that would make it -difficult to enumerate the full set of possible values or cause Passport -Clearinghouses confusion about which URLs to whitelist.

      -
    • -
    • -

      The additional information SHOULD be encoded into the subdomain or path -whenever possible and SHOULD generally avoid the use of query parameters -or anchors to represent the sub-organization.

      -
    • -
    • -

      Some organizations MAY wish to attribute the source to a particular -Data Access Committee (DAC), especially for -ControlledAccessGrants Visa Types. -For example:

      - -

      source: "https://www.ebi.ac.uk/ega/dacs/EGAC00000000001"

      - -

      could represent one particular logical “DAC” organization as referred -to by the EBI organization, and could be maintained by the EBI as a -permanent identifier for this DAC.

      -
    • -
    -
  • -
- -

conditions

- -
    -
  • -

    OPTIONAL. A set of conditions on a -Visa Object indicates that the Visa is -only valid if the clauses of the conditions match other Visas -elsewhere in the Passport and such content is both valid -(e.g. hasn’t expired; signature of Visa has been verified against -the public key; etc.) and if such content is accepted by the Passport -Clearinghouse (e.g. the issuer is trusted; the source claim meets any -policy criteria that has been established, etc.).

    -
  • -
  • -

    A Passport Clearinghouse MUST always check for the presence of -the conditions claim and if present it MUST only accept the -Visa if it can confirm that the conditions have been met.

    -
  • -
  • -

    Although it is RECOMMENDED to always implement full condition checking -capabilities as described in this section, if a Passport Clearinghouse will be -deployed for a more limited purpose where it is not expected to ever receive -Visas with conditions, then such a Passport Clearinghouse MAY choose to -not implement full condition checking. However, even in this case it MUST -still check for the presence of the conditions claim on Visa -Objects and reject (ignore) any Visas that contain a non-empty -conditions claim value. Likewise if not all condition matching algorithms -are implemented, it MUST reject any Visas that contain patterns -that are not supported.

    -
  • -
  • -

    Format:

    - -
    -
    "conditions": [
    -  [
    -    { // Condition clause 1
    -      "type": "<visa-type>",
    -      "<visa-object-claim-name-1>": "<match-type>:<match-value>",
    -      "<visa-object-claim-name-2>": "<match-type>:<match-value>",
    -      ...
    -    }, // AND
    -    { // Condition clause 2
    -      ...
    -    }
    -  ], // OR
    -  [
    -    { // Condition clause 3
    -      "type": "<visa-type>",
    -      "<visa-object-claim-name>": "<match-type>:<match-value>",
    -      ...
    -    }
    -  ],
    -  ...
    -]
    -
    -
  • -
  • -

    The conditions value is a two-nested-lists structure in Disjunctive -Normal Form:

    - -
      -
    • -

      The outer level list is a set of OR clauses

      -
    • -
    • -

      The inner level list is a set of AND clauses that contain “Condition -Clauses”

      -
    • -
    • -

      A Condition Clause MUST specify a “type” claim with a value as a -Visa Type plus it MUST include at least one other claim with a -name that matches a valid Visa Object claim name.

      -
    • -
    • -

      The values of Condition Clause claims MUST have a string prefix followed -by a colon and then string suffix, except for type where it MUST be -assumed to be “const” and is not specified.

      - -
        -
      • -

        If prefix is “const”, then suffix MUST use case sensitive full string -matching.

        -
      • -
      • -

        If prefix is “pattern”, then suffix MUST use full string Pattern -Matching to match input.

        -
      • -
      • -

        If prefix is “split_pattern”, then the full suffix MUST use full -string Pattern Matching on each full -substring from splitting the corresponding Visa Object -claim value that is being compared by the “;” character. If any one -full substring matches, then the Condition Clause claim has found a -match. “split_pattern” SHOULD only be used on claims where the -Visa Type has been specified in a format that makes splitting -on this character to be reliable, such as URI-encoded substrings with -semicolon separators (see LinkedIdentities as an -example).

        - -
          -
        • For example: a Condition Clause claim value of -“split_pattern:123,https:%2F%2Fexample?.org” will match a -Visa Object claim value of -“001,https::%2F%2Fexample1.org;123,https::%2F%2Fexample2.org;456,https::%2F%2Fexample3.org” -because this comparison value will be split into: -
          -
          [
          -  "001,https::%2F%2Fexample1.org",
          -  "123,https::%2F%2Fexample2.org",
          -  "456,https::%2F%2Fexample3.org"
          -]
          -
          -

          and the second entry in that list is a match using the Pattern -Matching definition with 123,https:%2F%2Fexample?.org as the -pattern to use.

          -
        • -
        -
      • -
      • -

        If prefix is unknown or unsupported, then the Condition Clause must -fail to match.

        -
      • -
      -
    • -
    -
  • -
  • -

    Condition Clause claims are restricted to only Visa Object Claims -(e.g. value, source, etc.) with string value -definitions.

    - -
      -
    • -

      It MUST NOT include conditions (i.e. a condition cannot be placed on -another condition)

      -
    • -
    • -

      It MUST NOT contain a timestamp claim such as asserted.

      -
    • -
    -
  • -
  • -

    The Passport Clearinghouse MUST verify that for each Condition Clause -present, there exists a valid single corresponding -Visa Object such that:

    - -
      -
    • -

      Checking the correctness of the Condition Clause MUST be performed first. -For example, a type claim MUST be present.

      -
    • -
    • -

      Ignore Visa Objects that have the conditions claim present. -This will avoid deep nesting of condition evaluation (i.e. avoid condition -loops, stack overflows, etc).

      -
    • -
    • -

      A Condition Clause claim matches when the <match-type> algorithm -matches a corresponding Visa Object’s claim in the Passport.

      -
    • -
    • -

      Visa Object Claims that are not specified -in the Condition Clause are not required to match (i.e. any value will be -accepted within that claim, including if the claim is not present in the -Visa Object).

      -
    • -
    • -

      All Condition Clause claims that are specified within one Condition -Clause MUST match the same Visa Object in the Passport.

      -
    • -
    -
  • -
  • -

    Non-normative example:

    - -
    -
    "conditions": [
    -  [
    -    {
    -      "type": "AffiliationAndRole",
    -      "value": "const:faculty@uni-heidelberg.de",
    -      "by": "const:so"
    -    }, // AND
    -    {
    -      "type": "ResearcherStatus",
    -      "value": "const:https://doi.org/10.1038/s41431-018-0219-y",
    -    }
    -  ], // OR
    -  [
    -    {
    -      "type": "AffiliationAndRole",
    -      "value": "pattern:faculty@*",
    -      "source": "const:https://visas.elixir.org"
    -      "by": "const:system"
    -    }
    -  ]
    -]
    -
    - -

    Would match a corresponding AffiliationAndRole assertion within the same -Visa Object that has any of the following:

    - -
      -
    • -

      On “Visa match 1”:

      - -
        -
      • -

        type = “AffilationAndRole”; AND

        -
      • -
      • -

        value = “faculty\@uni-heidelberg.de”; AND

        -
      • -
      • -

        by = “so”

        -
      • -
      - -

      AND on any other Visa as well as checking “Visa match 1”:

      - - -
    • -
    • -

      OR, alternative acceptance is matching just one Visa:

      - -
        -
      • -

        type = “AffilationAndRole”; AND

        -
      • -
      • -

        value starts with “faculty\@”; AND

        -
      • -
      • -

        source = “https://visas.elixir.org”; AND

        -
      • -
      • -

        by = “system”

        -
      • -
      -
    • -
    -
  • -
- -
Pattern Matching
- -
    -
  • -

    Pattern Matching is only for use as specified by -“conditions”.

    -
  • -
  • -

    MUST Use full string case-sensitive character pattern comparison.

    -
  • -
  • -

    MUST support special meaning characters as the specification of patterns:

    - -
      -
    • -

      ? : A <question-mark> is a pattern that SHALL match any single -character.

      -
    • -
    • -

      * : An <asterisk> is a pattern that SHALL match multiple characters:

      - -
        -
      • -

        Match any string, including the empty string and null string.

        -
      • -
      • -

        Match the greatest possible number of characters that still allows -the remainder of the pattern to match the string.

        -
      • -
      -
    • -
    -
  • -
  • -

    There is no escape character for special characters such as patterns. -? is always treated as the <question-mark> pattern and * is always -treated as the <asterisk> pattern.

    -
  • -
  • -

    A method evaluating a pattern on a string of input SHALL return a true if -the input has found one or more possible ways to match or false if it does -not.

    -
  • -
- -

by

- -
    -
  • -

    OPTIONAL. The level or type of authority within the “source” organization -of the assertion.

    -
  • -
  • -

    A Passport Clearinghouse MAY use this claim as part of an authorization -decision based on the policies that it enforces.

    -
  • -
  • -

    Fixed vocabulary values for this claim are:

    - -
      -
    • -

      self: The Visa Identity for which the assertion is being made -and the person who made the assertion is the same person.

      -
    • -
    • -

      peer: A person at the source organization has made this assertion on -behalf of the Visa Identity’s person, and the person who is making -the assertion has the same Visa Type and value in that source -organization. The source claim represents the peer’s -organization that is making the assertion, which is not necessarily -the same organization as the Visa Identity’s organization.

      -
    • -
    • -

      system: The source organization’s information system has made the -assertion based on system data or metadata that it stores.

      -
    • -
    • -

      so: The person (also known as “signing official”) making the assertion -within the source organization possesses direct authority (as part of -their formal duties) to bind the organization to their assertion that the -Visa Identity did possess such authority at the time the -assertion was made.

      -
    • -
    • -

      dac: A Data Access Committee or other authority that is responsible -as a grantee decision-maker for the given value and source claims -pair.

      -
    • -
    -
  • -
  • -

    If this claim is not provided, then none of the above values can be assumed -as the level or type of authority and the authority MUST be assumed to be -“unknown”. Any policy expecting a specific value as per the list above MUST -fail to accept an “unknown” value.

    -
  • -
- -

URL Claims

- -

A Visa Object Claim that is defined as being of URL -format (see RFC3986 section -1.1.3) with the following -limitations:

- -
    -
  1. -

    For the purposes of evaluating access, the URL MUST be treated as a simple -unique persistent string identifier.

    -
  2. -
  3. -

    The URL is a canonical identifier and as such it is important that Passport -Clearinghouses MUST match this identifier consistently using a -case-sensitive full string comparison.

    - -
      -
    • -

      If TLS is available on the resource, then its persistent identifier URL -SHOULD use the “https” scheme even if the resource will also resolve using -the “http” scheme.

      -
    • -
    • -

      When the URL is being used to represent an organization or a well defined -child organization within a “source” claim, it is RECOMMENDED -to use a URL as a persistent organizational ontology identifier, whether -managed directly or by a third-party service such as -GRID when reasonable to do so.

      -
    • -
    -
  4. -
  5. -

    The URL SHOULD also be as short as reasonably possible while avoiding -collisions, and MUST NOT exceed 255 characters.

    -
  6. -
  7. -

    The URL MUST NOT be fetched as part of policy evaluation when making an -access decision. For policy evaluation, it is considered an opaque string.

    -
  8. -
  9. -

    URLs SHOULD resolve to a human readable document for a policy maker to -reason about.

    -
  10. -
- -

GA4GH Standard Visa Type Definitions

- -

Note: in addition to these GA4GH standard Visa Types, there is also -the ability to for a Visa Issuer to encode Custom Visa Types.

- -

AffiliationAndRole

- -
    -
  • -

    The Visa Identity’s role within the identity’s affiliated institution -as specified by one of the following:

    - -
      -
    • -

      eduPersonScopedAffiliation -attributed value of: faculty, student, or member.
      -This term is defined by eduPerson by the affiliated organization -(organization after the \@-sign).

      - -
        -
      • -

        Example: “faculty\@cam.ac.uk”

        -
      • -
      • -

        Note: based on the eduPerson specification, it is possible that -institutions use a different definition for the meaning of “faculty” -ranging from “someone who does research”, to “someone who teaches”, -to “someone in education that works with students”.

        -
      • -
      -
    • -
    • -

      A custom role that includes a namespace prefix followed by a dot (“.”) -where implementers introducing a new custom role MUST coordinate -with GA4GH (or a body it elects) to align custom role use cases in order -to maximize interoperability and avoid fragmentation across -implementations.

      - -
        -
      • -

        Non-normative example: “ega.researcher\@med.stanford.edu” where “ega” -is the namespace and “researcher” is the custom role within that -namespace.

        -
      • -
      • -

        Custom roles and their prefixes MUST be limited to characters: a-z, -dash (“-“), underscore (“_”), digits (0-9). Custom roles and prefixes -MUST start with characters a-z.

        -
      • -
      -
    • -
    -
  • -
  • -

    If there is no affiliated institution associated with a given assertion, the -affiliation portion of AffliationAndRole MUST be set to “no.organization”.

    - -
      -
    • Example: “public.citizen-scientist\@no.organization”
    • -
    -
  • -
  • -

    AffiliationAndRole can be safely partitioned into a {role, affiliation} pair -by splitting the value string at the first “@” sign.

    -
  • -
- -

AcceptedTermsAndPolicies

- -
    -
  • -

    The Visa Identity or the - “source” organization has acknowledged the specific terms, - policies, and conditions (or meet particular criteria) as indicated by the - value claim.

    -
  • -
  • -

    The value claim value conforms to URL Claim format.

    -
  • -
  • -

    The URL SHOULD resolve to a public-facing, human readable web page that - describe the terms and policies.

    -
  • -
  • -

    Example value: "https://doi.org/10.1038/s41431-018-0219-y" - acknowledges ethics compliance for a particular version of Registered - Access. Note that more - Visas are needed to meet the requirements for Registered - Access status.

    -
  • -
  • -

    MUST include the “by” claim.

    -
  • -
- -

ResearcherStatus

- -
    -
  • -

    The person has been acknowledged to be a researcher of a particular type or -standard.

    -
  • -
  • -

    The value claim conforms to URL Claim format, and it -indicates the minimum standard and/or type of researcher that describes -the person represented by the given Visa Identity.

    -
  • -
  • -

    The URL SHOULD resolve to a human readable web page that describes the -process that has been followed and the qualifications this person has met.

    -
  • -
  • -

    Example value: "https://doi.org/10.1038/s41431-018-0219-y" -acknowledges a particular version of the registration process as needed -for Registered Access Bona Fide researcher -status. Note that more Visas are needed to meet -the requirements for Registered Access status.

    -
  • -
- -

ControlledAccessGrants

- -
    -
  • -

    A dataset or other object for which controlled access has been granted to -this Visa Identity.

    -
  • -
  • -

    The value claim conforms to URL Claim format.

    -
  • -
  • -

    The source claim contains the access grantee organization.

    -
  • -
  • -

    MUST include the “by” claim.

    -
  • -
- -

LinkedIdentities

- -
    -
  • -

    The identity as indicated by the {“sub”, “iss”} pair (aka -Visa Identity) of the -Visa is the same as the identity or identities listed -in the “value” claim.

    -
  • -
  • -

    The “value” claim format is a semicolon-delimited list of -“<uri-encoded-sub>,<uri-encoded-iss>” entries with no added whitespace -between entries.

    - -
      -
    • -

      The “sub” and “iss” that are used to encode the “value” claim do -not need to conform to URL Claim -requirements since they must match the corresponding Visa -“sub” and “iss” claims that may be issued.

      -
    • -
    • -

      By URI encoding (RFC 3986) the -“iss”, special characters (such as “,” and “;”) are encoded within the URL -without causing parsing conflicts.

      -
    • -
    • -

      Example: -“123456,https%3A%2F%2Fexample.org%2Fa%7Cb%2Cc;7890,https%3A%2F%2Fexample2.org”.

      -
    • -
    -
  • -
  • -

    The “source” claim refers to the Visa Assertion -Source that is making the assertion. This is -typically the same organization as the Visa -Issuer (iss) that signs the Visa, but the -source MAY also refer to another Visa Assertion Source depending -on which organization collected the information.

    -
  • -
  • -

    As a non-normative example, if a policy needs 3 Visas and -there are three Visas that meet the criteria on one Passport -but they use 3 different sub values (“1234”, “567”, “890123”), then -any of the following, if from a trusted issuers and sources, may -allow these Visas to be combined (shown with JSON payload only -and without the REQUIRED URI-encoding in order to improve readability of -the example).

    - -
      -
    1. -

      One Visa that links 3 Visa Identities together.

      - -
      -
      {
      -  "iss": "https://example1.org/oidc",
      -  "sub": "1234",
      -  "ga4gh_visa_v1": {
      -    "type": "LinkedIdentities",
      -    "value": "567,https://example2.org/oidc;890123,https://example3.org/oidc",
      -    "source": "https://example1.org/oidc"
      -    ...
      -  }
      -}
      -
      - -

      or

      -
    2. -
    3. -

      One Visa that links a superset of Visa -Identities together.

      - -
      -
      {
      -  "iss": "https://example0.org/oidc",
      -  "sub": "00001",
      -  "ga4gh_visa_v1": {
      -    "type": "LinkedIdentities",
      -    "value":
      -      "1234,http://example1.org/oidc;567,http://example2.org/oidc;890123,http://example3.org/oidc;sub4,http://example4.org/oidc"
      -    "source": "https://example0.org/oidc"
      -    ...
      -  }
      -}
      -
      - -

      or

      -
    4. -
    5. -

      Multiple Visas that chain together a set or superset -of Visa Identities.

      - -
      -
      {
      -  "iss": "https://example1.org/oidc",
      -  "sub": "1234",
      -  "ga4gh_visa_v1": {
      -    "type": "LinkedIdentities",
      -    "value": "567,https://example2.org/oidc",
      -    "source": "https://example1.org/oidc"
      -    ...
      -  }
      -},
      -{
      -  "iss": "https://example2.org/oidc",
      -  "sub": "567",
      -  "ga4gh_visa_v1": {
      -    "type": "LinkedIdentities",
      -    "value": "890123,https://example3.org/oidc",
      -    "source": "https://example2.org/oidc"
      -    ...
      -  }
      -}
      -
      -
    6. -
    -
  • -
- -

Custom Visa Types

- -
    -
  • -

    In addition to the -GA4GH Standard Visa Type Definitions, -Visas MAY be added using custom type names so long as the -encoding of these Visas will abide by the requirements described -elsewhere in this specification.

    -
  • -
  • -

    Custom Visa Types MUST limit personally identifiable information -to only that which is necessary to provide authorization.

    -
  • -
  • -

    The custom type name MUST follow the format prescribed in the -URL Claims section of the specification.

    -
  • -
  • -

    Implementers introducing a new custom type name MUST coordinate with the -GA4GH (or a body it elects) to align custom type use cases to maximize -interoperability and avoid unnecessary fragmentation across implementations.

    - -
      -
    • -

      To review the custom visa registry, including any visa descriptions, -examples and links that have been provided through proposals using this -process, visit the Custom Visa Type Registry -page.

      -
    • -
    • -

      Documentation on encoding and interpreting the claims SHOULD -be provided as part of the proposal and for inclusion in a public custom -visa type registry maintained by GA4GH. This documentation SHOULD also include -examples and links to relevant documentation and/or open source software -that MAY be available.

      -
    • -
    -
  • -
  • -

    Passport Clearinghouses MUST ignore all Visas containing a custom -type name that they do not support.

    -
  • -
  • -

    Non-normative example custom type name:
    -type: "https://example.org/passportVisaTypes/researcherStudies".

    -
  • -
- -

Encoding Use Cases

- -

Use cases include, but are not limited to the following:

- -

Registered Access

- -
    -
  • -

    To meet the requirements of Registered Access to data as defined by -publication https://doi.org/10.1038/s41431-018-0219-y as a specific -version of Registered Access, a user needs to have all of the following -Visas:

    - -
      -
    1. -

      Meeting the ethics requirements is represented by:

      - -
        -
      • -

        type: "AcceptedTermsAndPolicies"; and

        -
      • -
      • -

        value: "https://doi.org/10.1038/s41431-018-0219-y"

        -
      • -
      -
    2. -
    3. -

      Meeting the bona fide status is represented by:

      - -
        -
      • -

        type: "ResearcherStatus"; and

        -
      • -
      • -

        value: "https://doi.org/10.1038/s41431-018-0219-y"

        -
      • -
      -
    4. -
    -
  • -
  • -

    If other versions of Registered Access are introduced, then the value -claims for AcceptedTermsAndPolicies as well as ResearcherStatus MAY -refer to the document or publication or sections thereof to act as the -permanent identifiers for such versions of Registered Access.

    -
  • -
  • -

    The Passport Clearinghouse (e.g. to -authorize a registered access beacon) needs to evaluate the -multiple Visas listed above to ensure their values match -before granting access.

    - - -
  • -
- -

Controlled Access

- -
    -
  • -

    Controlled Access to data utilizes the following Visa Types:

    - -
      -
    • -

      MUST utilize one or more -ControlledAccessGrants and/or custom -controlled access visa type(s) for permissions associated with specific -data or datasets. There MAY be more standard visa types introduced for -encoding controlled access in future revisions of the Passport -specification.

      -
    • -
    • -

      MAY utilize the conditions claim on -“ControlledAccessGrants” to cause such a grant to require -a Visa from a trusted Visa Assertion Source to -assert that the identity has a role within a specific organization. -This can be achieved by using the -AffiliationAndRole Visa Type on -the conditions.

      -
    • -
    • -

      MAY utilize any other valid Visa Type or conditions claim -that may be required to meet controlled access policies.

      -
    • -
    -
  • -
- -

Visa Expiry

- -

In addition to any other policy restrictions that a Passport Clearinghouse -may enforce, Passport Clearinghouses that provide access for a given -duration provided by the user (excluding any revocation policies) MUST -enforce one of the following algorithm options to ensure that Visa -expiry is accounted for:

- -

Option A: use the following algorithm to determine if the Visa -is valid for the entire duration of the requested duration:

- -
now()+requestedTTL < min(token.exp, token.ga4gh_visa_v1.asserted+maxAuthzTTL)
-
- -

Where:

- -
    -
  • -

    requestedTTL represents the duration for which access is being requested. -Alternatively a solution may choose to have a stronger revocation policy -instead of requiring such a duration.

    -
  • -
  • -

    maxAuthzTTL represents any additional expiry policy that the Passport -Clearinghouse may choose to enforce. If this is not needed, it can -effectively ignored by using a large number of years or otherwise have -token.ga4gh_visa_v1.asserted+maxAuthzTTL removed and simplify the right -hand side expression accordingly.

    -
  • -
- -

Option B: if tokens are sufficiently short lived and/or the authorization -system has an advanced revocation scheme that does not need to specify a -maxAuthzTTL as per Option A, then the check can be simplified:

- -
now()+accessTokenTTL < token.exp
-
- -

Where:

- -
    -
  • -

    accessTokenTTL represents the duration for which an access token will be -accepted and is bounded by the next refresh token cycle or Access Token -Polling -cycle or any larger propagation delay before access is revoked, which -needs to be assessed based on the revocation model.

    - -
      -
    • For example, accessTokenTTL may be set to one hour, after which time -more access tokens may be minted using a corresponding refresh token if -it has not yet been revoked.
    • -
    -
  • -
- -

Expiry when using multiple Visas: if multiple Visas are -required as part of an access policy evaluation, then the expiry to be used MUST -be the minimum expiry timestamp, as calculated by the appropriate option above, -across all Visas (token set) that were accepted as part of evaluating -the access policy.

- -

Token Revocation

- -

As per the GA4GH AAI Specification on Token -Revocation, -the following mechanisms are available within Visa:

- -
    -
  1. -

    Visa Objects have an “asserted” claim to allow -downstream policies to limit the life, if needed, of how long assertions -will be accepted for use with access and refresh tokens.

    -
  2. -
  3. -

    Visas have an “exp” claim to allow Brokers and -Passport Clearinghouses to limit the duration of access.

    -
  4. -
- -

At a minimum, these Visa Claims MUST be checked by all Passport -Clearinghouses and systems MUST be in place to begin to take action to remove access -by the expiry timestamp or shortly thereafter. Propagation of these permission -changes may also require some reasonable delay.

- -

Systems employing Visas MUST provide mechanisms to -limit the life of access, and specifically MUST conform to the GA4GH AAI -Specification requirements in this regard. Systems utilizing Visas MAY also -employ other mechanisms outlined in the GA4GH AAI Specification, such as Access -Token Polling -if the Visa is encoded as a Visa Access Token.

- -

Example Passport Claim

- -

This non-normative example illustrates a Passport Claim -that has Visas representing Registered Access bona fide researcher -status along with other Visas for access to specific Controlled Access -data. The Visa Types for this example are:

- -
    -
  • -

    AffiliationAndRole: The person is a member of faculty at Stanford -University as asserted by a Signing Official at Stanford.

    -
  • -
  • -

    ControlledAccessGrants: The person has approved access by the DAC at the -Example Institute for datasets 710 and approval for dataset 432 for a dataset -from EGA.

    - -
      -
    • -

      In this example, assume dataset 710 does not have any -“conditions” based on the -AffiliationAndRole because the system that is asserting the assertion has an -out of band process to check the researcher’s affiliation and role and -withdraw the dataset 710 claim automatically, hence it does not need the -conditions claim to accomplish this.

      -
    • -
    • -

      In this example, assume that dataset 432 does not use an out of band -mechanism to check affiliation and role, so it makes use of the -“conditions” claim mechanism to -enforce the affiliation and role. The dataset 432 assertion is only valid if -accompanied with a valid AffiliationAndRole claim for -“faculty\@med.stanford.edu”.

      -
    • -
    -
  • -
  • -

    AcceptedTermsAndPolicies: The person has accepted the Ethics terms and -conditions as defined by Registered Access. They took this action -themselves.

    -
  • -
  • -

    ResearcherStatus: A Signing Official at Stanford Medicine has asserted -that this person is a bona fide researcher as defined by the Registered -Access model.

    -
  • -
  • -

    LinkedIdentities: A Broker at example3.org has provided -software functionality to allow a user to link their own accounts together. -After the user has successfully logged into the two accounts and passed all -auth challenges, the Broker added the -LinkedIdentities Visa for those two accounts: -(1) “10001” from example1.org, and (2) “abcd” from example2.org. -Since the Broker is signing the “LinkedIdentities” -Visa, it is acting as the Visa Issuer.

    -
  • -
- -

Normally a Passport like this would include Visa -Format entries as JWS Compact Serialization strings, -however this example shows the result after the Visas have been -unencoded into JSON (and reduced to include only the payload) to be more -reader-friendly.

- -
"ga4gh_passport_v1": [
-    {
-        "iat": 1580000000,
-        "exp": 1581208000,
-        ...
-        "ga4gh_visa_v1": {
-            "type": "AffiliationAndRole",
-            "asserted": 1549680000,
-            "value": "faculty@med.stanford.edu",
-            "source": "https://grid.ac/institutes/grid.240952.8",
-            "by": "so"
-        }
-    },
-    {
-        "iat": 1580000100,
-        "exp": 1581168872,
-        ...
-        "ga4gh_visa_v1": {
-            "type": "ControlledAccessGrants",
-            "asserted": 1549632872,
-            "value": "https://example-institute.org/datasets/710",
-            "source": "https://grid.ac/institutes/grid.0000.0a",
-            "by": "dac"
-        }
-    },
-    {
-        "iat": 1580000200,
-        "exp": 1581168000,
-        ...
-        "ga4gh_visa_v1": {
-            "type": "ControlledAccessGrants",
-            "asserted": 1549640000,
-            "value": "https://ega-archive.org/datasets/EGAD00000000432",
-            "source": "https://ega-archive.org/dacs/EGAC00001000205",
-            "by": "dac"
-            "conditions": [
-                [
-                    {
-                        "type": "AffiliationAndRole",
-                        "value": "const:faculty@med.stanford.edu",
-                        "source": "const:https://grid.ac/institutes/grid.240952.8",
-                        "by": "const:so"
-                    }
-                ],
-                [
-                    {
-                        "type": "AffiliationAndRole",
-                        "value": "const:faculty@med.stanford.edu",
-                        "source": "const:https://grid.ac/institutes/grid.240952.8",
-                        "by": "const:system"
-                    }
-                ]
-            ],
-        }
-    },
-    {
-        "iss": "https://issuer.example1.org/oidc",
-        "sub": "10001",
-        "iat": 1580000300,
-        "exp": 1581208000,
-        ...
-        "ga4gh_visa_v1": {
-            "type": "AcceptedTermsAndPolicies",
-            "asserted": 1549680000,
-            "value": "https://doi.org/10.1038/s41431-018-0219-y",
-            "source": "https://grid.ac/institutes/grid.240952.8",
-            "by": "self"
-        }
-    },
-    {
-        "iss": "https://other.example2.org/oidc",
-        "sub": "abcd",
-        "iat": 1580000400,
-        "exp": 1581208000,
-        ...
-        "ga4gh_visa_v1": {
-            "type": "ResearcherStatus",
-            "asserted": 1549680000,
-            "value": "https://doi.org/10.1038/s41431-018-0219-y",
-            "source": "https://grid.ac/institutes/grid.240952.8",
-            "by": "so"
-        }
-    },
-    {
-        "iss": "https://broker.example3.org/oidc",
-        "sub": "999999",
-        "iat": 1580000500,
-        "exp": 1581208000,
-        ...
-        "ga4gh_visa_v1": {
-            "type": "LinkedIdentities",
-            "asserted": 1549680000,
-            "value": "10001,https:%2F%2Fissuer.example1.org%2Foidc;abcd,https:%2F%2Fother.example2.org%2Foidc",
-            "source": "https://broker.example3.org/oidc",
-            "by": "system"
-        }
-    }
-]
-
- -
- -
- -
-
- - - diff --git a/driver-project-usage/index.html b/driver-project-usage/index.html deleted file mode 100644 index 46dd8fa..0000000 --- a/driver-project-usage/index.html +++ /dev/null @@ -1,89 +0,0 @@ - - - - - - - - -GA4GH Data Security | AAI - - - - - - - - - - - - - - - - - - -
-
-
-

Authentication and Authorization Infrastructure (AAI)

- - -
- -
-
- - - diff --git a/driver-project-usage/install-and-serve b/driver-project-usage/install-and-serve deleted file mode 100755 index 3cc18d1..0000000 --- a/driver-project-usage/install-and-serve +++ /dev/null @@ -1,3 +0,0 @@ -#!/bin/ash -bundle install -bundle exec jekyll serve --host "0.0.0.0" \ No newline at end of file diff --git a/driver-project-usage/versions.html b/driver-project-usage/versions.html deleted file mode 100644 index 483af3b..0000000 --- a/driver-project-usage/versions.html +++ /dev/null @@ -1,113 +0,0 @@ - - - - - - - - -Version History | GA4GH Data Security - - - - - - - - - - - - - - - - - - -
-
- - -
-
- - - diff --git a/feed.xml b/feed.xml index 37ffa8f..204c1ec 100644 --- a/feed.xml +++ b/feed.xml @@ -1 +1 @@ -Jekyll2023-07-20T18:50:00+00:00/data-security/feed.xmlGA4GH Data SecurityAAI \ No newline at end of file +Jekyll2023-12-21T14:19:18+00:00/data-security/feed.xmlGA4GH Data SecurityAAI \ No newline at end of file