Jump to conversation
Unresolved conversations (0)
Nice work!

Nice work!

All of your conversations have been resolved.

Resolved conversations (3)
@Sakurann Sakurann Apr 11, 2025
```suggestion * `authorization_encrypted_response_enc`: OPTIONAL. As defined in [@!JARM]. The JWE [@!RFC7516] `enc` algorithm is used to convey the requested content encryption algorithm for encrypting the authorization response. When a `response_mode` requiring encryption of the Authorization Response (such as `dc_api.jwt` or `direct_post.jwt`) is specified this MUST be present for anything other than the default value of `A128GCM`. Otherwise this SHOULD be absent. Note that because the response can be encrypted (see (#response_encryption)) but not signed, most of the general mechanisms of JARM do not apply. However, the `authorization_encrypted_response_enc` metadata parameter from JARM is reused to avoid redefining it. ```
Outdated
openid-4-verifiable-presentations-1_0.md
@GarethCOliver GarethCOliver Apr 11, 2025
super nit: suggestion from other PR was to add 'for example' to the reason, which seemed reasonable ```suggestion This section defines how an Authorization Response containing a VP Token (such as when the Response Type value is `vp_token` or `vp_token id_token`) can be encrypted at the application level using [@!RFC7518] where the payload of the JWE is a JSON object containing the Authorization Response parameters. Encrypting the Authorization Response can, for example, prevent personal data in the Authorization Response from leaking, when the Authorization Response is returned through the front channel (e.g., the browser). ```
Outdated
openid-4-verifiable-presentations-1_0.md
@GarethCOliver GarethCOliver Apr 11, 2025
missing {#encrypting_unsigned_response}? ```suggestion ## Encrypting an Unsigned Response {#encrypting_unsigned_response} ```
Outdated
openid-4-verifiable-presentations-1_0.md