Introduction

The concept of account linking has been around since at least the origins of federation, but despite its age, the understanding of account linking, the ramifications and technical requirements, is poor. So what is account linking? It is the act of associating one account, generally an existing local account, with a different account, such as a federated identity. Account linking happens regularly in an increasingly federated world and is usually the first action when an existing site tiptoes into federation. At a basic level, dealing with account linking means applications may need to deal with multiple identifiers for a single user. This may be a user-initiated action or it may be a programmatic action within a domain.  Sites may also have to start dealing with the reconciliation of multiple identities in to a single account. As sites look at account linking and the policies and technologies required, a variety of questions need to be answered: is account linking done in the most efficient manner? How will the issues of privacy and assurance be handled? What about scenarios where it is a question of more than two accounts being linked? What site is authoritative when conflicting information exists in a linked account?

Account mapping, related to account linking, is on a technical level the mapping of an identifier from account A to account B when requirements go beyond beyond just the one identifier being used across multiple identities. This implies the additional problem space of dealing with conflicting information from the various sources of account information.  The issues around account linking impact a variety of areas in identity and access management, including attribute aggregation, permission management, user experience, and more.  The questions of where the work must be done - within an IdM system or within each individual application - are still under discussion. There are no common set of best practices.

A common identifier used to link accounts is email address. That is known to be a very weak and unreliable method for linking accounts, although it is widely used. Who "owns" a particular address, and what is it used for? Who is authoritative to assert an account identifier for a user? E.g. should a university be able to assert that a social identifier is a valid identifier for user john.doe@foo.edu?

This document looks to gather the use cases around account linking and provide guidance on how to cope with the complexities in this space.

Use Case Library

Account linking and Groups - SURFConext

Account linking and Learning Management Systems

Account linking across transitions in one's relationships within an institution

Account linking for the purpose of IdP choice

Account linking so that a 3rd party can serve permissions to a service provider

Account linking in response to an invitation

Account linking and workflow

Account linking of multiple federated identities

Account linking between social identities and institutional identities

Account linking and LOA

See the LIGO use case

Account linking and licensing

Examples of services where account linking is happening now

Issues still to explore

Community thoughts