XACML v3.0 Privacy Policy Profile Version 1.0

Committee Draft 01

16 April 2009

Specification URIs:

This Version:


http://docs.oasis-open.org/xacml/3.0/xacml-3.0-privacy-v1-spec-cd-1-en.doc (Authoritative)


Previous Version:


Latest Version:


http://docs.oasis-open.org/xacml/3.0/xacml-3.0-privacy-v1-spec-en.doc (Authoritative)


Latest Approved Version:

Technical Committee:

OASIS eXtensible Access Control Markup Language (XACML) TC


Bill Parducci, <bill@parducci.net>

Hal Lockhart, BEA <hlockhar@bea.com>


Erik Rissanen, Axiomatics AB, <erik@axiomatics.com>

Related work:

This specification replaces or supercedes:

·         Privacy policy profile of XACML v2.0

This specification is related to:

·         eXtensible Access Control Markup Language (XACML) Version 3.0, wd 11

Declared XML Namespace(s):



This OASIS Standard describes a profile of XACML for expressing privacy policies.


This document was last revised or approved by the OASIS eXtensible Access Control Markup Language (XACML) TC on the above date. The level of approval is also listed above. Check the “Latest Version” or “Latest Approved Version” location noted above for possible later revisions of this document.

Technical Committee members should send comments on this specification to the Technical Committee’s email list. Others should send comments to the Technical Committee by using the “Send A Comment” button on the Technical Committee’s web page at http://www.oasis-open.org/committees/xacml/.

For information on whether any patents have been disclosed that may be essential to implementing this specification, and any offers of patent licensing terms, please refer to the Intellectual Property Rights section of the Technical Committee web page (http://www.oasis-open.org/committees/xacml/ipr.php).

The non-normative errata page for this specification is located at http://www.oasis-open.org/committees/xacml/.


Copyright © OASIS® 2009. All Rights Reserved.

All capitalized terms in the following text have the meanings assigned to them in the OASIS Intellectual Property Rights Policy (the "OASIS IPR Policy"). The full Policy may be found at the OASIS website.

This document and translations of it may be copied and furnished to others, and derivative works that comment on or otherwise explain it or assist in its implementation may be prepared, copied, published, and distributed, in whole or in part, without restriction of any kind, provided that the above copyright notice and this section are included on all such copies and derivative works. However, this document itself may not be modified in any way, including by removing the copyright notice or references to OASIS, except as needed for the purpose of developing any document or deliverable produced by an OASIS Technical Committee (in which case the rules applicable to copyrights, as set forth in the OASIS IPR Policy, must be followed) or as required to translate it into languages other than English.

The limited permissions granted above are perpetual and will not be revoked by OASIS or its successors or assigns.


OASIS requests that any OASIS Party or any other party that believes it has patent claims that would necessarily be infringed by implementations of this OASIS Committee Specification or OASIS Standard, to notify OASIS TC Administrator and provide an indication of its willingness to grant patent licenses to such patent claims in a manner consistent with the IPR Mode of the OASIS Technical Committee that produced this specification.

OASIS invites any party to contact the OASIS TC Administrator if it is aware of a claim of ownership of any patent claims that would necessarily be infringed by implementations of this specification by a patent holder that is not willing to provide a license to such patent claims in a manner consistent with the IPR Mode of the OASIS Technical Committee that produced this specification. OASIS may include such claims on its website, but disclaims any obligation to do so.

OASIS takes no position regarding the validity or scope of any intellectual property or other rights that might be claimed to pertain to the implementation or use of the technology described in this document or the extent to which any license under such rights might or might not be available; neither does it represent that it has made any effort to identify any such rights. Information on OASIS' procedures with respect to rights in any document or deliverable produced by an OASIS Technical Committee can be found on the OASIS website. Copies of claims of rights made available for publication and any assurances of licenses to be made available, or the result of an attempt made to obtain a general license or permission for the use of such proprietary rights by implementers or users of this OASIS Committee Specification or OASIS Standard, can be obtained from the OASIS TC Administrator. OASIS makes no representation that any information or list of intellectual property rights will at any time be complete, or that any claims in such list are, in fact, Essential Claims.

The names "OASIS" and “XACML” are trademarks of OASIS, the owner and developer of this specification, and should be used only to refer to the organization and its official outputs. OASIS welcomes reference to, and implementation and use of, specifications, while reserving the right to enforce its marks against misleading uses. Please see http://www.oasis-open.org/who/trademark.php for above guidance.


Table of Contents

1        Introduction. 5

1.1 Terminology. 5

1.2 Glossary. 5

1.3 Normative References. 5

1.4 Non-Normative References. 5

2        Privacy Guidelines - Organization of Economic Cooperation and Development, 1980 (Non-normative) 6

3        Standard attributes. 7

4        Standard rules. 8

4.1 Matching purpose. 8

5        Conformance. 9

5.1 As XACML request producer 9

5.2 As XACML policy processor 9

A.      Acknowledgements. 10

B.      Revision History. 11



1      Introduction

1.1 Terminology

The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL NOT”, “SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “MAY”, and “OPTIONAL” in this document are to be interpreted as described in [RFC2119].

1.2 Glossary


The entity to which personally-identifiable information is entrusted.


The subject of personally-identifiable information.

1.3 Normative References

[Hier]                      E. Rissanen, Hal Lockhart and Rich Levinson eds., XACML v3.0 Hierarchical Resource Profile Version 1.0, Working draft 7, 5 April 2009, FIXME URL

[OECD]                   Guidelines on the Protection of Privacy and Transborder Flows of Personal Data, OECD, 1980.

[RFC2119]               S. Bradner, Key words for use in RFCs to Indicate Requirement Levels, http://www.ietf.org/rfc/rfc2119.txt, IETF RFC 2119, March 1997.

1.4 Non-Normative References


2      Privacy Guidelines - Organization of Economic Cooperation and Development, 1980 (Non-normative)

The following extract from [OECD] describes the obligations on the custodian.

  1. Openness. There should be limits to the collection of personal data and any such data should be obtained by lawful and fair means and, where appropriate, with the knowledge or consent of the data subject.
  2. Data quality principle. Personal data should be relevant to the purposes for which they are to be used and, to the extent necessary for those purposes, should be accurate, complete and kept up-to-date.
  3. Purpose specification. The purposes for which personal data are collected should be specified not later than at the time of data collection and the subsequent use limited to the fulfillment of those purposes or such others as are not incompatible with those purposes and as are specified on each occasion of change of purpose.
  4. Use limitation principle. Personal data should not be disclosed, made available or otherwise used for purposes other than those specified in accordance with Paragraph 9 except:
    1. with the consent of the data subject; or
    2. by the authority of law.
  5. Security safeguards principle. Personal data should be protected by reasonable security safeguards against such risks as loss or unauthorized access, destruction, use, modification or disclosure of data.
  6. Openness principle. There should be a general policy of openness about developments, practices and policies with respect to personal data. Means should be readily available of establishing the existence and nature of personal data, and the main purposes of their use, as well as the identity about usual residence of the data controller.
  7. Individual participation principle. An individual should have the right:
    1. to obtain from a data controller, or otherwise, confirmation of whether or not the data controller has data relating to him;
    2. to have communicated to him, data relating to him

                                          i.    within a reasonable time;

                                         ii.    at a charge, if any, that is not excessive;

                                        iii.    in a reasonable manner; and

                                        iv.    in a form that is readily intelligible to him;

    1. to be given reasons if a request made under subparagraphs (a) and (b) is denied, and to be able to challenge such denial; and
    2. to challenge data relating to him and, if the challenge is successful, to have the data erased; rectified, completed or amended.
  1. Accountability principle. A data controller should be accountable for complying with measures which give effect to the principles stated above.

This profile provides standard attributes and a standard <Rule> element for enforcing the 3rd and 4th principles, related to the purpose for which personally identifiable information is collected and used.

3      Standard attributes

This profile defines two attributes.


This attribute, of type “http://www.w3.org/2001/XMLSchema#string”, indicates the purpose for which the data resource was collected.  The owner of the resource SHOULD be informed and consent to the use of the resource for this purpose.  The attribute value MAY be a regular expression.  The custodian's privacy policy SHOULD define the semantics of all available values.


This attribute, of type “http://www.w3.org/2001/XMLSchema#string”, indicates the purpose for which access to the data resource is requested.  Action purposes MAY be organized hierarchically, in which case the value MUST represent a node in the hierarchy.  See [Hier].

4      Standard rules

4.1 Matching purpose

This rule MUST be used with the “urn:oasis:names:tc:xacml:2.0:rule-combining-algorithm:deny-overrides” rule-combining algorithm.  It stipulates that access SHALL be denied unless the purpose for which access is requested matches, by regular-expression match, the purpose for which the data resource was collected.


<?xml version="1.0" encoding="UTF-8"?>

<Rule xmlns="urn:oasis:names:tc:xacml:3.0:core:schema:wd-06"















5      Conformance

An implementation may conform to this specification as any of the following.

5.1 As XACML request producer

An implementation conforms to this specification as an XACML request producer if it produces XACML requests with the attributes defined in section 3.

5.2 As XACML policy processor

An implementation conforms to this specification as an XACML policy processor if it makes use of the XACML rule defined in section 4.


A.  Acknowledgements

The following individuals have participated in the creation of this specification and are gratefully acknowledged:


Anthony Nadalin

Bill Parducci

Erik Rissanen

Hal Lockhart

Michiharu Kudo

Michael McIntosh

Ron Jacobson

Seth Proctor

Steve Anderson

Tim Moses

B.  Revision History





Changes Made

WD 1


Erik Rissanen

Initial update to XACML 3.0.

WD 2

28 Dec 2007

Erik Rissanen

Update to the current OASIS template.

WD 3

4 Nov 2008

Erik Rissanen

Fix typo in example

WD 4

5 Apr 2009

Erik Rissanen

Editorial cleanups.

Write conformance section.