The OpenID Connect Provider from BankID (hereafter referred to as the OIDC Provider) consists of an industry-standard interface to various identity-related services. See the product litterature for further information on the user-experience, features and functions of such services and how to get started. See the technical documentation on provisioning for access and how to integrate with such services via the REST API or the JS Connector.
A distinction is made between Identity Provider (IDP) Services and Value-Added Service (VAS). Identity Providers offer authentication of end-users whereas a Value-Added Services offer subsequent access to data linked to an authenticated end-user. Subsequent access to Value-Added services happen via associated Resource Servers.
A major benefit of the OIDC Provider is to simplify integration of the BankID service compared to the legacy integration option with BankID Server. The xID service, being a companion to BankID, offers zero- and one-click user experiences for applications that do not require the high security level offered by BankID. The Vipps service offers 2-factor login and signup. The Fraud Data service offers risk scoring for the authenticated user. The TINFO service provides additional information on the end-user, given that the end-user has consented. The AML service offers a dataset enabling merchants to fulfill anti-money laundering requirements. The PSD2 service supports various AISP and PISP use-cases under PSD2, including support for end-user consent and dynamic linking. In contrast to the Fraud Data and TINFO services, note that the PSD2 service does not implement any associated Resource Server. PSD2 resources are made availble to AISP/PISPs over an API decided by each ASPSP.
The term OIDC Client is used for any application that integrates with the OIDC Provider, corresponding to the following terms in related vocabularies:
- OAuth2 clients in OAuth vocabulary
- Relying Party in OIDC vocabulary
- Merchant in BankID vocabulary
- ASPSPs or TPPs in PSD2 vocabulary.
OIDC Clients use Scopes and Claims to request access to services. Identity Providers return ID Tokens containing assertions about the end-user and (optionally) Access Tokens to gain subsequent access to Value-Added Services. Consent handling is a key feature of the OIDC Provider that puts the end-user in control of delegating rights to an OIDC Client to access any Value-Added Service on behalf of the end-user.