You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Phase: 6 — Developer Experience & Polish Priority: P2 — Medium Estimated Effort: Medium
Problem Statement
Enterprise customers require compliance certifications before adopting an auth platform. Authorizer needs to enable (not necessarily certify — that's the deployer's responsibility) SOC 2, GDPR, and HIPAA compliance through its feature set. Additionally, official OpenID Certification would validate OIDC conformance. The features from Phases 1-5 provide most building blocks — this RFC closes the remaining gaps.
Proposed Solution
1. GDPR Compliance Features
Data Export — Right of Access (Article 15):
typeMutation {
# User can export all their dataexport_my_data: DataExport! # Admin can export any user's data_export_user_data(user_id: ID!): DataExport!
}
typeDataExport {
user: User!sessions: [Session!]!audit_logs: [AuditLog!]!api_keys: [APIKey!]!webauthn_credentials: [WebAuthnCredential!]!organization_memberships: [OrganizationMember!]!delegation_grants: [DelegationGrant!]!login_attempts: [LoginAttempt!]!export_url: String # Download link for large exports (signed URL, 1hr TTL)
}
Right to Deletion (Article 17):
typeMutation {
# User requests account deletiondelete_my_account(password: String!): Response! # Admin deletes user (already exists: _delete_user)
}
Deletion process:
Verify identity (password or active session)
Revoke all sessions and tokens
Delete all user data: sessions, API keys, WebAuthn credentials, org memberships
Anonymize audit logs (replace user identifiers with "deleted_user", keep event metadata)
RFC: Compliance & Certification (SOC 2, GDPR, HIPAA, OIDC)
Phase: 6 — Developer Experience & Polish
Priority: P2 — Medium
Estimated Effort: Medium
Problem Statement
Enterprise customers require compliance certifications before adopting an auth platform. Authorizer needs to enable (not necessarily certify — that's the deployer's responsibility) SOC 2, GDPR, and HIPAA compliance through its feature set. Additionally, official OpenID Certification would validate OIDC conformance. The features from Phases 1-5 provide most building blocks — this RFC closes the remaining gaps.
Proposed Solution
1. GDPR Compliance Features
Data Export — Right of Access (Article 15):
Right to Deletion (Article 17):
Deletion process:
"deleted_user", keep event metadata)user.data_deleted(with anonymized reference)Consent Tracking:
Data Residency: Already supported via self-hosting + database-agnostic architecture. Document deployment patterns for EU-only hosting.
2. SOC 2 Type 2 Enablement
SOC 2 requires controls around:
Additional for SOC 2:
admin.config_changedevents3. HIPAA Compliance Enablement
HIPAA (healthcare) requires:
Additional for HIPAA:
--session-idle-timeout=15m— invalidate session after inactivity4. OpenID Certification
After OIDC Provider (#514) is implemented, pursue official OpenID Certification:
Certification profiles to target:
Steps:
Test suite: OpenID Connect Conformance Suite
CLI Configuration Flags
Testing Plan
References