Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Profile scope not aligned with CX standards #404

Closed
TacheI opened this issue Aug 30, 2021 · 6 comments
Closed

Profile scope not aligned with CX standards #404

TacheI opened this issue Aug 30, 2021 · 6 comments
Labels
Consumer experience Issues related to Consumer experience Standards. Security Change or question related to the information security profile

Comments

@TacheI
Copy link

TacheI commented Aug 30, 2021

Description

Currently the data recipient can add to an authorisation the profile scope and can request for customer information such as name, surname, email address, address. This is not aligned with the CX standards that only allows for the customer to authorise the customer:basic and customer:detail scopes. This leads to the possibility of the data recipient asking for customer data and receiving it without customer consent.

Area Affected

Security Profile, CX standards

Change Proposed

Allow for the data holders to not send customer data if only the profile scope is authorised until the standards are aligned
Align the OIDC profile requirements with the CX standards either by excluding customer data from the profile scope or updating the CX standards to allow the customer to consent to sharing customer data if the profile scope included in the authorisation
Clarify which claims in the profile scope can be requested by the data recipient. Must email and address be supported by data holders or it's an optional implementation?
Clarify in the standards that the data points not included in the CDR, such as date of birth cannot be requested by the data recipient.

@nils-work
Copy link
Member

@TacheI
Copy link
Author

TacheI commented Sep 3, 2021

Further on a related topic the CX standards have to be updated on how the Data Holders will present the authorisation to customers when the only scope requested by the ADR is OpenID. A per this support portal article, a authorisation request with only the OpenID scope is valid. https://cdr-support.zendesk.com/hc/en-us/articles/900002116163?input_string=allowed+scope+combinations+for+the+request+object%27s+scope+attribute+passed+in+the+authorization+request

@CDR-API-Stream CDR-API-Stream added Consumer experience Issues related to Consumer experience Standards. Security Change or question related to the information security profile labels Sep 7, 2021
@TacheI
Copy link
Author

TacheI commented Sep 8, 2021

Related support article -
https://cdr-support.zendesk.com/hc/en-us/articles/900003906386-User-visibility-of-the-profile-scope

The response provided to ticket 913, Answer 2 seems to contradict this article. Based on these 2 articles it is not clear what DHs should do while the scopes and CX standards are not aligned. https://github.com/ConsumerDataStandardsAustralia/standards/wiki/ACCC-&-DSB-%7C-CDR-Implementation-Call-Agenda-&-Meeting-Notes-(15th-of-July-2021)

@commbankoss
Copy link

commbankoss commented Oct 5, 2021

CBA is of the view that if this change is implemented, participants should be provided with a minimum of six months between the finalisation of updated CX Standards and compliance dates to ensure adequate time for participants to implement the change.

@CDR-CX-Stream
Copy link
Member

This issue is being consulted on in DP216: ConsumerDataStandardsAustralia/standards#216

@CDR-API-Stream
Copy link
Collaborator

CDR-API-Stream commented Dec 24, 2021

This change was incorporated into release v1.15.0. Refer to Decision 212 for further details.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Consumer experience Issues related to Consumer experience Standards. Security Change or question related to the information security profile
Projects
Archived in project
Development

No branches or pull requests

5 participants