-
Notifications
You must be signed in to change notification settings - Fork 19
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[OpenID4VP] Relying Party verifiable_attestation without requiring a specific typ #32
Comments
Imported from AB/Connect bitbucket - Original Commenter: alen_horvatIf the Verifier Attestation is issued as a W3C VC, should additional type be registered? |
Imported from AB/Connect bitbucket - Original Commenter: peppelinuxI’d make it more simple, the I assume that even if a verifier attestation is issued with the media type X or Y or Z, then the trust evaluator has to establish the trust with the issuer of the verifier attestation. Well, this can be accomplished in many ways, since different types of verifier attestation gives different discovery processes, as it is oidc federation for the trust marks when these are used for attesting something, for example |
Imported from AB/Connect bitbucket - Original Commenter: alen_horvatYes, I agree. Every attestation type issued within a given framework will define the validation rules. Questions are: a) Can federation support 3rd party attestations b) How to express the information? e.g., federation supports trust frameworks A, B, and C (note that the information can be conveyed within the attestation itself) |
It seems to me that according to the current text this issue seems to be ready to be closed, since it's out of the scope of openid4vp specs define how the verifier attestation could be obtained, according to which trust framework at the same time, the current text offers many options about possible and well known trust frameworks to be used and configured through the client_scheme_id I don't see any reason to keep this issue open |
Imported from AB/Connect bitbucket: https://bitbucket.org/openid/connect/issues/1992
Original Reporter: peppelinux
Following the definition of the
verifiable_attestation
achieved in the PR 524, we read the normative text belowIn the context of this specification, such a JWT MUST set the `typ` JOSE header to `verifier-attestation+jwt`.
OpenID4VP doesn’t explain how the the
verifiable_attestation
should or may be provisioned.There are some cases where the
verifiable_attestation
is issued as an OIDC Federation 1.0 Trust Mark.In these cases the
typ
value is set totrust-mark+jwt
, for this reason I think that the previous text should be changed to not exclude this scenario, and then it may be improved in the following way:”””
In the context of this specification it is not defined how the verifiable_attestation can be provisioned.
In case this is issued in the form of a trust mark according to OpenID Connect Federation, the JWT JOSE header
typ
MUST be set totrust-mark+jwt
, for all other cases where the JWT does not have a specifictyp
identifier, the verifiable_attestation JWT JOSE headertyp
MUST be configured with the valueverifier-attestation+jwt
.”””
The text was updated successfully, but these errors were encountered: