Skip to content

Conversation

@tlodderstedt
Copy link
Contributor

@tlodderstedt tlodderstedt commented Jul 16, 2025

resolves #105

@tlodderstedt tlodderstedt changed the title Added support for credentials without cryptographic key binding Added support for credentials without cryptographic holder binding Jul 16, 2025
### Cryptographic Holder Binding between VC and VP

* For Cryptographic Holder Binding, a KB-JWT, as defined in [@!I-D.ietf-oauth-sd-jwt-vc], MUST always be present when presenting an SD-JWT VC.
* If the credential has cryptographic holder binding, a KB-JWT, as defined in [@!I-D.ietf-oauth-sd-jwt-vc], MUST always be present when presenting an SD-JWT VC.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
* If the credential has cryptographic holder binding, a KB-JWT, as defined in [@!I-D.ietf-oauth-sd-jwt-vc], MUST always be present when presenting an SD-JWT VC.
* If the credential has cryptographic key binding, a KB-JWT, as defined in [@!I-D.ietf-oauth-sd-jwt-vc], MUST always be present when presenting an SD-JWT VC.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

this needs to be cryptographic key binding

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

HAIP uses VCI terminology, which is "holder binding" - applied this terminology consistently for this PR

Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

to be be compliant to the rest of the text and assuming this VCI PR gets merged, holder binding is correct (to my personal disagreement)

Copy link
Collaborator

@awoie awoie left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

If @jogu 's suggestions were applied, then LGTM

tlodderstedt and others added 3 commits August 1, 2025 18:12
Co-authored-by: Joseph Heenan <joseph@authlete.com>
Co-authored-by: Joseph Heenan <joseph@authlete.com>
Co-authored-by: Joseph Heenan <joseph@authlete.com>
@jogu
Copy link
Contributor

jogu commented Aug 5, 2025

If @jogu 's suggestions were applied, then LGTM

Torsten & I discussed this - VCI & VP are unfortunately inconsistent in the terms they use, and 'Crytographic holder binding' is currently the most used term in HAIP, so I withdrew my suggestions.

### Key Attestation {#key-attestation}

Wallets MUST support key attestations as defined in Annex D of [@!OIDF.OID4VCI]. If batch issuance is used, all public keys used in Credential Request SHOULD be attested within a single key attestation.
Wallets MUST support key attestations as defined in Annex D of [@!OIDF.OID4VCI]. If batch issuance is used and the Credential Issuer has indicated (via `cryptographic_binding_methods_supported ` in it's metadata) that cryptographic binding is required, all public keys used in Credential Request SHOULD be attested within a single key attestation.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
Wallets MUST support key attestations as defined in Annex D of [@!OIDF.OID4VCI]. If batch issuance is used and the Credential Issuer has indicated (via `cryptographic_binding_methods_supported ` in it's metadata) that cryptographic binding is required, all public keys used in Credential Request SHOULD be attested within a single key attestation.
Wallets MUST support key attestations as defined in Annex D of [@!OIDF.OID4VCI]. If batch issuance is used and the Credential Issuer has indicated (via `cryptographic_binding_methods_supported ` metadata parameter) that cryptographic key binding is required, all public keys used in Credential Request SHOULD be attested within a single key attestation.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

partially adopted the proposal (holder instead of key)

### Cryptographic Holder Binding between VC and VP

* For Cryptographic Holder Binding, a KB-JWT, as defined in [@!I-D.ietf-oauth-sd-jwt-vc], MUST always be present when presenting an SD-JWT VC.
* If the credential has cryptographic holder binding, a KB-JWT, as defined in [@!I-D.ietf-oauth-sd-jwt-vc], MUST always be present when presenting an SD-JWT VC.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

this needs to be cryptographic key binding

@Sakurann Sakurann added this to the 1.0 Final milestone Aug 12, 2025
@jogu jogu requested review from Sakurann and paulbastian August 14, 2025 16:38
@Sakurann Sakurann requested a review from awoie August 19, 2025 18:26
Copy link
Collaborator

@paulbastian paulbastian left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Under the condition that HAIP#165 and VCI#621 gets merged, this looks good to me.

| iat | MUST |[@!RFC7519], Section 4.1.6 |
| exp | SHOULD (at the discretion of the Issuer) | [@!RFC7519], Section 4.1.4 |
| cnf | MUST | [@!RFC7800]|
| cnf | MUST if the corresponding Credential Configuration requires cryptographic holder binding | [@!RFC7800]|
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I believe we remove the table with #165 , so this change becomes obsolete

### Cryptographic Holder Binding between VC and VP

* For Cryptographic Holder Binding, a KB-JWT, as defined in [@!I-D.ietf-oauth-sd-jwt-vc], MUST always be present when presenting an SD-JWT VC.
* If the credential has cryptographic holder binding, a KB-JWT, as defined in [@!I-D.ietf-oauth-sd-jwt-vc], MUST always be present when presenting an SD-JWT VC.
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

to be be compliant to the rest of the text and assuming this VCI PR gets merged, holder binding is correct (to my personal disagreement)

@Sakurann Sakurann merged commit e8b6c97 into main Aug 26, 2025
2 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Clarify support for claims-based bound credentials

6 participants