-
Notifications
You must be signed in to change notification settings - Fork 12
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Constraints on using JWT VC Isser metadata and x5c #232
Comments
This is from HAIP:
By following the HAIP text, I don't understand how an issuer can support both options in an SD-JWT VC? Can you give an example? Furthermore, DNS name is not a URI and strictly speaking is this not allowed as per SD-JWT VC where I'm not saying SD-JWT VC should not be changed in that regards because I do see some potential for improvement and I think as well that an issuer might want to support both and that needs to be addressed. We should discuss ways how this can be achieved. But I don't think Furthermore, I believe your specific use cases is already supported by:
|
I don't think using (we can discuss whether |
@awoie at least for using kid with openid federation is resonable, because that kid is resolved within a federation trust chain |
I think there is nothing wrong with:
In that case, using the @peppelinux Can you explain how OpenID federation resolves the |
To be clear, the above is valid.
To be clear, the above just means that using |
@awoie sure, thank you for asking imagine the federation trust chain like an object, related to a subject (giuseppe, a trustable entity) linked to a trust anchor (a trusted party over all the others), wwhere in the middle we may have zero, one or more intermediaries between the subject (leaf) and trust anchor. the leaf's metadata can be overloaded by the statements within the chain, along the trust anchor. Therefore the jwks the leafs claims to use, and any other protocol specific metadata, can be dynamically overloaded within the trust chain, by applying the metadata policies. once the policies are applied, the resulting metadata is called final metadata and contains all the jwks related to an entity, for each protocol (since a federation entity configuration may have more than a single metadata creafted for a speicifc role, such as VCI, RP, OP and so on). using the final metadata, the kid is needed in the form of lookup parameter within the JWKs provided within the final metadata |
the resolution of the kid is interesting we may have a discovery, using well known endpoints |
@paulbastian To be even more clear, they might not host a SD-JWT VC Issuer Metadata well-known endpoint but they might host an OpenID Federation well-known endpoint. |
Thank you for this elaboration! It means that in this case, you won't need SD-JWT VC Issuer Metadata well-known, right? |
using federation the metadata must be signed and evaluated within the trust chain, therefore, yes, there are no direct dependencies with the SD-JWT VC Issuer Metadata well-known endpoint, even if these two can cohexist within the same entity. |
I'm supportive of changing
|
to chage the the point of |
I support this, see my reasoning here: |
@awoie and I chatted briefly and are leaning towards keeping the requirement on iss to be a URI while using an https scheme for both key resolution mechanisms. |
@Sakurann, I'm going to work on this tomorrow (hopefully) so if you have anything that might help in that effort, please comment or post it or whatever works. |
The text currently says:
It must by the Issuer's choice to support either x5c, jwt-vc metadata or both, this is also how HAIP defines it. Extending this thought, the Verifier has no means of understanding what the issuer supports, given that
iss
may be an HTTPS URI but no support is avaiblable for jwt-vc metadata. This is becausekid
is the best indicator but in Section 5 only described as RECOMMENDED.Proposal is that the Issuer may chose this and that the presence of
kid
in SD-JWT VC indicates jwt-vc metadata.The text was updated successfully, but these errors were encountered: