Skip to content

Conversation

@sakimura
Copy link
Member

@sakimura sakimura commented Apr 7, 2025

Restructured the privacy consideration section according to ISO/IEC 29100 privacy principles and added a bunch of text.

Added ISO/IEC 29100 in the reference.

resolves #24
resolves #594

[June 8th] @Sakurann took over editing the PR - please review from https://github.com/openid/OpenID4VP/pull/509/files#diff-3118c9756a1d7b361bb53af8bd9d65666476a27cfeeced56c47a5dccc38eac55R1903 (Kristina apologizes for some editorial nits to this PR....)

Restructured the privacy consideration section according to ISO/IEC 29100 privacy principles and added a bunch of text. 

Added ISO/IEC 29100 in the reference.
@Sakurann Sakurann changed the title Update openid-4-verifiable-presentations-1_0.md to improve privacy considerations Add privacy considerations Apr 11, 2025
@Sakurann
Copy link
Collaborator

WG discussion:

  • the current requirements are too strict, we want to paraphrase them in a more considerations/guidance way
  • it includes things that might be out of scope to be mentioned in this specification, we also want to fix that
    (@martijnharing @leecam to lead the review/suggestions)

@Sakurann Sakurann added this to the Final 1.0 milestone Apr 16, 2025
Comment on lines 1983 to 1989
### Establishing Trust in the Request URI {#request_uri_and_trust_relationships}

Requests from the Wallet to the Verifier SHOULD be sent with the minimal amount of information possible, and in particular, without any HTTP headers identifying the software used for the request (e.g., HTTP libraries or their versions). The Wallet MUST NOT send PII or any other data that could be used for fingerprinting to the Request URI in order to prevent End-User tracking.
Wallets operating within a trust framework SHOULD validate that the Request URI is properly associated with the Client Identifier and authorized for the request.

## Authorization Error Response with the `wallet_unavailable` error code
Untrusted or unrecognized Request URI endpoints SHOULD be rejected or require End-User confirmation before proceeding.

In the event that another component is invoked instead of the Wallet, the End-User MUST be informed and give consent before the invoked component returns the `wallet_unavailable` Authorization Error Response to the Verifier.
### Authorization Requests with Request URI {#authorization_requests_with_request_uri}
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Are these two sections not talking about the same request_uri??
Also does this mean, a Wallet outside a trust framework should require user confirmation before fetching it?

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Does the same apply to response_uri endpoint?

Sakurann and others added 3 commits June 9, 2025 20:29
Co-authored-by: Paul Bastian <paul.bastian@posteo.de>
Co-authored-by: Paul Bastian <paul.bastian@posteo.de>
Co-authored-by: Tobias Looker <tplooker@gmail.com>
Co-authored-by: Tobias Looker <tplooker@gmail.com>
Copy link
Member

@selfissued selfissued left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Approved with change suggestions.

Copy link
Contributor

@tplooker tplooker left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Approved on the basis that the suggestions I made are incorporated.

Copy link
Contributor

@danielfett danielfett left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The various suggested changes should be applied, but generally looks good to me!

Copy link
Contributor

@awoie awoie left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

approving but supporting all comments that were made

Sakurann and others added 2 commits June 10, 2025 19:53
Co-authored-by: Paul Bastian <paul.bastian@posteo.de>
Co-authored-by: Michael B. Jones <michael_b_jones@hotmail.com>
Co-authored-by: Tobias Looker <tplooker@gmail.com>
Co-authored-by: Daniel Fett <mail@danielfett.de>
Co-authored-by: Joseph Heenan <joseph@authlete.com>
Co-authored-by: Oliver Terbu <o.terbu@gmail.com>
Co-authored-by: Joseph Heenan <joseph@authlete.com>
@Sakurann Sakurann merged commit c7c6561 into main Jun 10, 2025
2 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Privacy considerations should mention that user consent is normally required Add/fill in privacy considerations sections in OID4VC specs