-
Notifications
You must be signed in to change notification settings - Fork 56
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Decision Proposal 026 - Customer Payloads #26
Comments
It is great too see Customer Identity Information being included in the standards, Customer Identity Information is often regarded as the missing link or holy grail of API ecosystems yet I note that there is nothing in this payload that provides information that would allow a consumer to utilise the information to "onboard" or convert a customer. i.e Information on when Identity Claims about an invidual or an organisation have been verified or vetted nor what form of primary document was provided to confirm these claims. Additionally, Identity Information and the surity off is not just a data problem but also a credentials management issue. Can the consumer be assured that the individual that owns the identity resources is in fact the individual that was using the credentials? How can a relying party be sure that it is "the customer that has authorised the session"? How the session was authenticated and therefor the level of trust that a relying party can have that it's customer, is in fact the bank's customer, is very important and currently not included in the payload. As this information pertains to the session and not the resources themselves, it's may be difficult for a bank to provide this information via a resource endpoint or service that's not designged for this service. The title of the API Specifications, "Obtain basic information on the customer that has authorised the current session" implies to a relying party that it is always the owner of the resources that is in charge of the credentials, with serializable credentials still the norm this isn't a statement that can be reliable made. In reality, it will be the whomever holds the credentials at the time the authorization was given but it may not necessarily be the customer. Has consideration been given for multi authorization steps or when multiple individuals are named on the account? i.e joint accounts. The proposed payload does not appear to be an array of persons. These are common identity problems / challenges that have been tackled by the identity community firstly by the introduction of OpenID Connect to add the "Identity Layer" to the internet. An Identity Claimset would work very well should FAPI R or FAPI RW be adopted as the security solution. Torsten Lodderstedt has proposed an identities claims set that tackles a lot of the issues that i've raised here which Open Banking UK will be looking shortly. The upcoming Vectors of Trust Framework https://tools.ietf.org/html/draft-richer-vectors-of-trust-15 should be considered as well as it provides a standard means of conveying not just the level of assurance that a provider has in the identity being provided but also the means that the identity was asserted i.e the credentials. A vectors of trust claim could be used as part of the "session information" provided during the authentication experience. If there is no intention to "back door" identity services into Banks then this should be made clear that TPP's should not utilise this information for identity / AML / KYC purposes in which case the information significantly reduces in value for relying parties. If the intention is for Banks to provided identity services by surfacing this information then it would make sense to ensure that the appropriate internet identity standards and technologies are utilised. Ralph Bragg |
Question on addresses, sometimes there is the concept of physical address, mailing address and registered address. The specification as proposed forces there to only be two addresses, would it not be better to follow the pattern as proposed for Phone Numbers or Email Addresses? |
@RalphBragg, thanks for your detailed comments. The ACCC have indicated that KYC information will not be included for MVP and we addressed the potential for a limited form of assurance in a previous decision. This will likely be an issue that gets addressed in the future. |
No worries @JamesMBligh this specification is very similiar to the OBIE UK Party Endpoint https://openbanking.atlassian.net/wiki/spaces/DZ/pages/645203403/Party+v3.0 GET /accounts/{AccountId}/party This means that the resource returned, potentially for the same account / resource endpoint, will be different depending on the session that is authenticated. Given the desire to essentially provide identity claims about the logged in user, providing this information via OpenID Connect's userinfo endpoint (https://openid.net/specs/openid-connect-core-1_0.html#UserInfo) would be more standards compliant. It would also provide a means of providing information about the session (credential type used). The use of standard OIDC identity claims functionality provides out of the box support that would allow individuals greater control over what exactly they share when it comes to personal information via a mechanism that is well understood by TPPs, ASPSPs and Consumers. It also unlocks / futureproofs a lot of capability for all participants. Of course this is dependent on an OIDC backed security profile selected. Cheers, |
Under Section 8 - Consent of the ACCC Consumer Data Right Rules Framework, there is provision for where consumers, with a joint account, have individual authority to take action. The customer model above will work for this, but not if dual authorisation is required. The model used today by the major accounting solution providers (TPPs) to get data when dual authorisation is required currently supports dual authentication. For example, I am the Owner of a small business employing 15 people. I have an in-house bookkeeper who is authorised to setup things like payments, transfer money, or to fill out the form (or configure within the banking portal) the authorisation of data to go to a TPP. However, the book-keeper is not able to solely approve the authorisation (or may not be able to approve at all). I have a GM and a personal assistant (PA) who, along with myself (the owner), are authorised to approve things the book-keeper does. Any approval requires two of the authorisers to approve. I have specifically requested this to be set up. In the case of filling out the form to get data, the book-keeper then takes it to any two of the authorisers to get them to sign the form. The form goes off to the ASPSP, and if the signatures are correct, the connection is authorised - until cancelled. If the approval is via internet banking, then two of the approvers have to sign in to authorise the connection, again until cancelled. Under CDR, using the model where the account-request is submitted, when a user signs into the ASPSP to approve, then the normal rules of the ASPSP could be applied. In the case of the example above, the book-keeper would then get two of the authorisers to approve, and request would be completed. If the customer payload presented allowed for Person to be multiple, and allowed for the role of the person in the process to be included, then it could show the book-keeper - as requestor, and then two approvers as authorisers. The one issue that remains, which most likely makes it necessary to create a special exception for CDR for more than one authorisers, is to do with the time bound reauthorisation. In the above example, after 90 days is up, is the book-keeper would have to trigger the reauthorise process, and have two of the approvers authorise again to allow data to continue to flow to the TPP. A couple of extra questions:
|
The ABA Open Banking Technical WG has a few initial observations/questions, posted here in the hope they'll be useful in producing the revised version:
|
Westpac has the following preliminary feedback in relation to the proposal. We are likely to provide additional feedback and address the questions posed by Data61 after the revised proposal is published. Points:
|
CBA's position on the customer payload proposal is that it is not in line with the position in the ACCC rules framework that KYC data should be excluded. As a principle, we believe it is necessary to minimise the personal identifiable information on customers to safeguard privacy and security. In our view, the proposed customer payload fields include unnecessary personally identifiable data for both business & personal accounts (e.g. full address, ABN). |
Wow. Thanks everyone, this is an awesome set of feedback. It's taken me a while to process it. Here are comments on the specific feedback: Use of OIDC UserInfo Additional Parties Authorisation vs Customer Mandatory vs Optional SIC Codes Business Record
lastUpdated date Names
Addresses
Phone Numbers
Email Addresses
Invalid Addresses Date Of Birth We shouldn't include the customer record in scope There's a lot in here so I'll add the update later tonight. -JB- |
Please find attached version 2 of the proposal with feedback incorporated: -JB- |
@JamesMBligh - could you clarify for the uninitiated - is the intention in this resource to serve information regarding the 'customer who has authorised the current session' or in relation to information that sits on the account product? There could be a potential conflict where an a customer has access to a range of accounts with different telephone numbers, addresses and the like. My sense is that there is a range of data in the proposal that doesn't apply uniquely to a customer identity, and whilst they might be connected to it, for the purposes of providing information on a customer, practically adds very little. It would help if there was a stated intention behind the resource - the challenge a data consumer faces is linking the user they incept to ownership of a particular account. Unless the customer information is tied to an account this makes things difficult.... |
Hi @jh-a, yes these payloads and associated end points relate to the customer authorising (or more exactly the customer associated with the credential giving authorisation), not a specific account. Account level contact and address information would be included in the detailed account payloads yet to be published. Account ownership would also be determined via the account end points, not this one. -JB- |
state occupationCode industryCode organisationType We could define some mapping rules like Without a clear use case, this field should either be:
purpose
Email is a different form of communication to phone, in that an email address is unattended, but a phone is not. The concept of the most convenient time (business hours, or non business hours) does not apply to email communications. We recommend that phoneNumbers.fullNumber We recommend that the format of |
@JamesMBligh - thanks for the update. Given the the authenticated user resource is treated separately from the account resource, how are data consumers able to link an account resource payload to an authenticated user? |
The case I have seen is that there are times in the Accounting Solution Provider (ASP) world, where an account may be attached to two Companies within an ASP's product. There are many reasons the consumer may do this (and they are not always logical to others). My question is based on the fact that the ultimate arbitrator of if the authorisation is the data provider. There are possible risks if the data consumer has to handle the authorisation internally, when using the data provider to redo the authorisation would be the cleanest approach. If the authorisation loop is gone through again, it will in theory, create a new authorisation on the data provider side. To keep things tidy, if the authorisation succeeds, the data consumer would update the authorisation on their side, and notify the data provider that the old authorisation is no longer valid. The data provider could then revoke the old authorisation Another possible area where this case may appear, is where several data consumers are using a data aggregator to collect data on their behalf. This could result in a consumer or business authorising for one data consumer and then authorising for another one. Depending on how this is done, the data aggregator could have two valid authorisations. |
Feedback from the Australian Retail Credit Association (ARCA) |
We support the proposal to the extent that we are able to comply. Data quality issues are common with customer information. For example, customers might accidentally transpose or misspell names. We suggest that the descriptions of person and organisation reflect this nature of how data has been collected. This would facilitate interpretation of the proposed Consumer Data Right Privacy Safeguard 11 in this context. Additionally:
|
The ABA Open Banking Technical Working Group had a few, relatively minor, observations about the revised DP026:
|
NAB would like to stress the importance of taking a cautious risk-based approach to the development of the Open Banking/CDR data standards in Australia, especially with respect to the sharing of personally identifiable information (PII). We believe we need to find the right balance between:
We strongly believe that personally identifiable information that is currently used for the purposes of identity verification, password recovery or multi-factor authentication should not be shared with data recipients under any condition at this stage. It is worth noting that this point was highlighted in Farrell's 'Review into Open Banking' and supported by the ACCC's 'Rules Framework'; that any obligation to share customer data should not apply to information supporting an identity verification assessment and that data holders should only be obliged to share that information with the customer directly, and NOT with a data recipient. Therefore, we believe that data such as Date of Birth (DOB) and mobile numbers are exceptional data fields that present a foreseeable risk to the consumer, especially in an unknown, unproven and untested data movement eco-system; Additionally once shared the data will cease to have protection under the Australian Privacy Principles framework (as CDR data is being carved out of APP protection, and moved under the CDR safeguards). Once sufficient security protocols are in place and the accreditation process is proven, higher risk data (such as DOB and mobile numbers) can then be brought into consideration once again. We would also like to highlight that our customers' DOB is not currently displayed to our customers in their existing channels and that their mobile numbers are masked when presented; Including these fields in the payloads also diverges from the principle covered in Decision Proposal 005 where:
From a consumer perspective the loss of this information has ramifications outside of the controls that are enforceable from any single data provider; ramifications that could impact customers in unexpected ways. For example, DOB and Mobile Numbers are currently used across many industries as a means of identity verification; if this information were to be compromised it could lead to a situation where identity theft could take place in other industries which are not yet directly quantifiable. In addition to the security & privacy concerns expressed above, below are specific feedback comments on individual elements of the customer payloads. In relation to the Person object: Date of Birth (DOB) As a pragmatic compromise we would like to offer an alternative suggestion, i.e. to use flag(s) such as “isOver18” or “isUnder16” to enable the data holder to give a valid response to the data recipient if the customer is under the statutory age and the data holder is not required / permitted to disclose the information (depending on the rules regarding minors and consent of data sharing). This could also be used for other purposes such as age verification, which further increases the utility of the regime without creating unnecessary exposure for those early adopters of the scheme who we should in fact be looking to protect the most. Mobile/Phone Numbers Email Addresses Gender Occupation Code In relation to the Organisation object: General feedback around the processes surrounding Complex Authorisations Registered address organisationType ABN isPreferred isACNCRegistered establishmentDate industryCode Postal Addresses Address validation is a complicated and arduous process; mandating that data providers present all of their customer's data which has been collected for many years into one simple structure will not be an easy task. We strongly believe we should be pragmatic on this decision, higher order standardisation is a legitimate function that third party data consumers could enrich upon in an open data eco-system in more efficient ways once the data is exposed. That said we should aim to be consistent where it is simpler to do so e.g. a standard set of abbreviations for enumerations like street type or state etc. should be proposed in the standard. Links General Comments: What exactly does mandatory, optional & conditional mean? Is mandatory only mandatory if this is captured and held by the data holder? Is it possible to never provide optional fields even if they are held by the data holder? |
I am leaving this proposal open until COB Monday at the request of a number of stakeholders -JB- |
Macquarie recommends the following modifications to the Customer payload: The data model should allow for multiple organisations to be returned, rather than just one. A person can have roles in many organisations (these can be closely related organisations such as parent/subsidiary companies). We believe this would result in a more flexible data model, with virtually no additional complexity. |
Since I have not fully grasped the use-case and request/response security characteristics yet, here is only a little bit of feedback. Once I get the details of use-case and request/response characteristics, I may provide more comments.
|
Adding some comments on the customer payload from discussions with a couple of consumer groups, and which have started to be raised internally at Data61 in the context of the user experience work stream. Posting here for the broader debate already underway. There's some confusion about what the use cases would be for the inclusion of certain categories of information (e.g. gender, occupationCode) in the payload, that we need to be able to articulate clearly if they are in version 1. Including sensitive characteristics like gender as a mandatory field in v1 has been raised as a concern, as consumers may wish to pick and choose services they provide information about gender to. There's concerns occupationCode as provided at the time data was originally collected could be out of date when included in the payload for consumers sharing data under the CDR regime. It's important that we map our payloads back to use cases and test what is and isn't included with end consumers. EB: this is what the user experience work stream is rapidly getting stuck into, with Meena Tharmarajah and Michael Palmyre joining Data61 to drive it forward. There's a UX mailing list through which workshops and outputs are being organised and shared. We're discussing how to use the GitHub repo for UX discussions, and what we need to be collating in a broader web presence (coming soon). You can sign up here for updates on UX here in the interim: http://eepurl.com/dCNaTf. The comments made about aligning payload proposals with use cases echo some of what needs to happen through that work stream. |
Thanks for all the feedback. I’m closing feedback while a final recommendation is formulated. -JB- |
Having now had a chance to fully review the feedback here are comments indicating how the final decision will be posed. Note that this decision is for the draft version only. There will be additional time to provide feedback on the whole standard after the draft is released so nothing is set in concrete. Address Specific Customer Fields
Specific Org Fields
Phone Numbers Email Purpose Agents Of Organisation Linking To Accounts Definition Of Optional -JB- |
The finalised decision for this topic has been endorsed. Please refer to the attached document. -JB- |
This decision proposal outlines a recommendation for payloads of the Customer end points.
Feedback is now open for this proposal. Feedback is planned to be closed on the 19th October. Due to the complexity of the data payloads, a revised version will be published around the 13th October incorporating feedback received to that date.
Decision Proposal 026 - Customer Payloads.pdf
The text was updated successfully, but these errors were encountered: