...
Identity Escrow. The IdP/AP is taken out of the interaction with the RP, using cryptographic technologies like in Idemix and uProve. This provides an assertion to the RP without the IdP knowing to whom to provewhich RP they are asserting an identity for.
Pro: Technical control that satisfies the unobservability requirement
...