Skip to content

Review: Universal EUDIW Bank API #386

@cyberphone

Description

@cyberphone

At the time of writing, the interfacing of EUDIW based services to banks remain unresolved.

To cope with this major obstacle, a joint proposal by one of the LSPs and the Berlin Group is currently in an evaluation phase. The proposal is said to be based on messages secured by SD-JWT. Although I haven't seen the actual proposal, my experiences with "universal" solutions in an ever-changing world makes me believe that this may not be what we are looking for. The following is a kind of high-level peer review of the proposal on a conceptual level.

  • Digitally signed messages, regardless of format etc. do not come with built-in semantics. That is, the verifier (in this case the Bank), must know in advance what the purpose of a message is in order to process it correctly.
  • If we consider TPP-based payment initiations, TPP-signatures are unlikely to be based on SD-JWT. In EMV-like scenarios, such messages would rather hold an embedded EUDIW-based user authorization object which could be in SD-JWT format.
  • Although user authentication and payment authorization could [maybe] use the same format, the actions performed are entirely different.
  • Why would payment authorizations use selective disclosure (as provided by SD-JWT)? This is probably the result of mixing user-related data like "over 18" attestations with payment authorization data. However, it should be possible to in a UX-friendly way deal with non-payment data before the actual payment authorization. Loyalty cards more or less require this separation, because loyalty may affect the price of purchased items as well. Mixing non-payment data and payment authorizations also impacts the design of the EUDI wallet. Separation of duties reduce complexity and provide a consistent UX, albeit maybe at the expense of an additional "click" or two. Actually, a slightly smarter wallet could when asked for a loyalty card remember the user's choice to make this operation transparent for future purchases. This (of course) requires that loyalty cards are bound to domains like ikea.com in similarity to FIDO keys.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions