NIST Digital Identity Guideline 800-63-4 and OpenIDF Shared Signal Framework Discussion on Trust Agreement requirement for SSF
By Tom Sato
Nov 10th, 2025
The NIST Digital Identity Guideline 800-63-4 provides a comprehensive set of standards for the US Government suppliers whose software or services involve users' digital identities. The final version was released in August 2025. Around that time, the OpenIDF Shared Signal working group finalized their Shared Signal Framework (SSF) specifications. NIST 800-63-4 encourages the implementation of shared signals, and with the official SSF specification now available, the industry is focusing on building production-ready systems and conducting conformance and interoperability testing. SSF plays a critical role in safeguarding user accounts from credential compromise and breaches, which is why NIST strongly advocates its adoption.
NIST SP 800‑63C‑4 (“Federation & Assertions”) requires a Trust Agreement between Credential Service Providers (CSPs) and Relying Parties (RPs). This legal agreement defines how parties operate within federated identity transactions and sets limits on digital identity usage. As systems become more complex, such agreements should be multilateral, enabling industry-wide collaboration. Implementing SSF requires careful adherence to trust agreement terms, as SSF’s primary purpose is to protect digital identities and user accounts securely and dynamically.
NIST serves as a standards authority and provides recommendations regarding the contents of a Trust agreement; however, this document should not be considered a template or draft agreement for industry adoption. If NIST were to produce a legal document, it would likely require submission to Congress. Furthermore, this guideline is intended as a general overview and does not address the detailed technical specifications found in standards such as SSF. Nor does it prescribe operational practices for businesses, which must adhere to their own requirements. Its primary focus is establishing standards for business practices that safeguard end user privacy and offer protection against account takeover and data breaches.
Industry players often struggle to reach consensus on trust agreements, especially when companies like Microsoft, Apple, and Google each have their own technologies and interests. Similar efforts have failed before.
A neutral third party drafting a legal document for the industry could help create a standard draft that is agreeable by industry adopters. However, the OpenID Foundation focuses on technology, not legal standards, and I have not encountered any lawyers or related discussions in their working groups.
However, I anticipate that this trust agreement may present challenges for many organizations implementing SSF and adhering to NIST standards for government contracts.
Putting together a draft of this trust agreement will be a complex task.
Let’s see, the steps.
1. Map out trust agreement requirements according to industry technical standards.
2. Analyze typical business and operational requirements to comply with the Guidelines.
3. Research existing corporate EULA and other IAM related agreements.
4. Put together draft legal document
5. Review by corporations and edit according to industry requirements.
6. Publish final draft legal document with operational policy recommendations.
The NIST 800 63-4 covers variety of technical standards and by no means SSF is only technical standards adopters needs to cover. Verifiable Credentials and Open Wallet Specifications needs to address this guideline and well as existing identity federation specs.
As I have a reasonable understanding of SSF, I have written the second part of this document describing how NIST 800-63-4 covers SSF.
This document is by no means definitive guide and may contain mistakes and miss representation of these standards and guidelines. I welcome input, comments, recommendations and I shall be happy to correct and edit as appropriate.
Part 2 Creating NIST 800 63-4 compliant trust agreement for Shared Signal Framework
What is a Trust Agreement?
A Trust Agreement defines the terms by which parties in a federated identity transaction—such as an account provider, Identity Provider (IdP), and Relying Party (RP)—set their rights, responsibilities, and expectations for working together within the federation.
In the document it states:
“All federation transactions SHALL be defined by one or more trust agreements … The trust agreement SHALL establish a trust relationship between the RP and … the CSP, or the IdP, or both.”
Also: “Trust agreements establish the terms for federation transactions between the parties … including things like the allowed xALs and the intended purposes of identity attributes exchanged in the federation transaction.”
In other words: before or during federation, the parties agree “we will trust each other to behave in these ways, for these users, doing these kinds of identity/assertion exchanges”.
Key Elements/Requirements of a Trust Agreement
According to SP 800-63C-4, a Trust Agreement should cover a number of items. Some of the mandatory (“SHALL”) or strongly expected (“SHOULD”) items include:
Types of Trust Agreements
The document distinguishes at least two major types of trust agreements:
1. Bilateral Trust Agreement
2. Multilateral Trust Agreement
Subscriber-Driven Trust Agreement
Where in the Assurance Levels Does It Matter?
The trust agreement requirement is tied to the Federation Assurance Level (FAL). For example:
So the higher the assurance required for the federation transaction, the stronger the requirement for a formal, pre-established trust agreement.
Practical Implications and Tips
Here are some things to watch out for from an implementation or organizational perspective:
A trust agreement under SP 800-63C-4 is the foundational contract that governs how an IdP (and possibly a CSP) and an RP will work together in a federated identity scenario. It sets out what is trusted, how the trust is achieved, what attributes and assurances are acceptable, how users will experience the system, how data is handled, and how failures will be managed. The higher the assurance you need, the more rigorous the trust agreement must be.
PART 3 What is “Shared Signaling”?
In a federated identity setup (for example, an identity provider (IdP) and a relying party (RP) working together), “shared signaling” refers to the exchange of state change messages or notifications outside of the standard assertion or authentication flow. In other words, beyond “IdP issues assertion → RP consumes it,” there may be signals like “subscriber account terminated,” “session compromised,” “authenticator bound,” etc., that one party informs the other about.
Explanation of OpenIDF SSF (Shared Signals Framework)
Shared Signals Framework is a three set of protocols, SSF which defines the communication framework to send messages securely using security event token format. The challenge is that many systems base decisions purely at login time; SSF enables continuous ongoing/real-time event sharing. CAEP (Continuous Access Evaluation Profile) defines event types specifically related to session/device lifecycle and continuous access decisions. RISC (Risk Incident Sharing & Coordination) focus on account lifecycle and security incidents (e.g., credential compromise, account disable/enable, identifier changed) and is used for sharing risk/incident signals across systems.
PART 4 How the Trust Agreement Must Address Shared Signaling
If your federation relationship includes shared signaling (outside the standard assertion path) then your trust agreement must clearly define what triggers a signal, what the signal contains, who sends/receives it and how the recipient will respond — and you must assess the privacy implications of sending such signals.
NIST 800-63C-4 treats “shared signaling” as a governance/policy commitment inside the trust agreement, and the OpenID specs (SSF, CAEP, RISC, CAEP Interop) are the technical rails that implement those commitments. Below is a practical, developer-and-counsel friendly breakdown.
1) What 63C-4 requires the trust agreement to say about shared signaling
NIST is explicit that if you use shared signaling, your trust agreement must cover:
2) How the OpenID specs implement what NIST asks for
OpenID’s Shared Signals Framework 1.0 (SSF) is the general “bus”; CAEP 1.0 and RISC 1.0 are event profiles that ride on it, and the CAEP Interoperability Profile 1.0 nails down practical interop. In short:
3) Trust-agreement clauses you need (and how the OpenID specs satisfy them)
4) CAEP + RISC + SSF event-to-NIST-trust-agreement matrix
5) Policy Domains (how each applies to trust agreement)
Trust-Agreement Requirement (NIST 63C-4)
Applied to Signals
Purpose Limitation
Each signal must have an explicit purpose stated in the agreement (“used only for security and session integrity, not for profiling”).
Data Handling Policy
Define per-signal data elements allowed, retention time (e.g., ≤ 90 days), storage controls, and deletion process.
Redress Mechanism
Subscriber must have a means to appeal a false signal (e.g., “contact support within X days to reopen account”).
Usability & Equity
Ensure signals don’t unfairly lock out users or require steps beyond reasonable burden; provide clear messages.
Privacy Protection
Shared signals must carry only event metadata and minimal IDs (“no payload of behavioral data or PII”).
Receiver Behavior
For each event, agreement must specify expected action within defined SLA (e.g., “RP shall terminate session within 60 seconds of session-revoked signal”).
Audit & Review
Regular review to ensure events are used consistently with policy and signals are effective.
6) Checklist for agreement draft
7) Some Additional Points & Good Practices
8) Implementation notes & pitfalls
9) Example End-to-End Scenarios
END
NOTE
Written by Tom Sato Nov 10th 2025 With some help from OpenAI ChatGPT