-
Notifications
You must be signed in to change notification settings - Fork 45
Leverage existing RFC7517 to specify cryptographic key #37
Comments
We should talk about general usage of JOSE, JWS, and JWK in the DID specs at RWoT6. We do use JWS for signatures and leave the option open to use JWK for key descriptions (although, know of no implementations that do this in practice). |
We discussed this with the only implementer that is currently using JWK and they plan to move away from using JWK. This leaves zero implementers that are using JWK to describe keys (preferirng to use base58 encoding or standard PEM encoding over JWK). The spec doesn't forbid the use of JWK and all that is needed is for an implementer to come along and write up a spec for doing so in the DID spec. To resolve this issue, we will submit a PR for the spec stating this as the current state of affairs and the reasons that developers decided to not use JWK for their implementations. |
Update on this. A few of us got together at IIW26 and the uPort developers might use JWK to describe their keys. They will need to push a few specs/registrations through IETF, but once they get those through, I think they're going to try to express Ethereum keys using JWK. At present, I don't know of any other implementation that plans to do that. |
@talltree to assign @christianlundkvist to this issue. |
Hey guys, this would really help us out - can we use the existing JW_ related stuff wherever possible? |
We are already using JWS for the signatures where we can. uPort took an action item to get the IETF stuff done for secp256k1 (which I think is going to be painful, but Mike Jones seems to think that it won't be)... which will allow them to use JWK for key description formats. They're also going to be experimenting w/ using JWTs... there are serious technical issues wrt. a variety of the Verifiable Credential use cases that we've identified over the years, but we've let them know and it's up to them to figure out if there is a way around those.
Can you elaborate in what way it would help you out? |
Closing as we have adopted this issue in the new DIDWG repo. |
Why not use RFC7517 in the DID spec when cryptographic keys are described as authorizationCapability?
So instead of
The text was updated successfully, but these errors were encountered: