Hi Guiseppe, Francesco, Orie,

 

@Orie: Thanks for sharing the draft.

 

As a quick reaction: It would be good to invent a new term for “attestation” in 
draft-demarco-status-attestations.html because this term is already widely used 
in a different context (see RFC 9334).

 

@Guiseppe and Francesco: It would be great if you could submit your draft to 
OAuth or SPICE for discussion.

 

Ciao

Hannes

 

 

From: OAuth <oauth-boun...@ietf.org> On Behalf Of Orie Steele
Sent: Mittwoch, 17. Jänner 2024 19:07
To: sp...@ietf.org
Cc: oauth <oauth@ietf.org>
Subject: [OAUTH-WG] OAuth Digital Credential Status Attestations

 

Hello Digital Credential Enthusiasts,

See: 
https://peppelinux.github.io/draft-demarco-status-attestations/draft-demarco-status-attestations.html

Note the use of the term digital credential, and the alignment to CWT based 
credentials and CWT based credential status lists.

As a quick summary of the editors draft above:

It is basically a refresh-token-like approach to dynamic state, where the 
holder retrieves updated state from the issuer at regular intervals, and can 
then present that dynamic state directly to the verifier.

This eliminates the herd privacy and phone home issues associated with W3C 
Bitstring Status Lists.

And it informs the holder of dynamic state, so the digital wallet can provide a 
better user experience.

However, an issuer (government or ngo) could use the interval of requesting 
dynamic state, to track the holder... so the guidance from 
https://datatracker.ietf.org/doc/draft-steele-spice-oblivious-credential-state/

Is also relevant to this draft.

I also learned that https://datatracker.ietf.org/doc/draft-ietf-oauth-sd-jwt-vc/

Has defined a new property for expressing "Verifiable Credential" "type" `vct`, 
which is different from how W3C defines credential types.

W3C uses the expanded IRI for the graph node type, based on the JSON-LD 
context. 

For example with:

{
  "@context": [
    "https://www.w3.org/ns/credentials/v2";,
    "https://www.w3.org/ns/credentials/examples/v2";
  ],
  "id": "http://university.example/credentials/1872";,
  "type": ["VerifiableCredential", "ExampleAlumniCredential"],
  ...
}

The credential type in RDF becomes 
"https://www.w3.org/ns/credentials/examples#ExampleAlumniCredential";

Which is different from "ExampleAlumniCredential" in JSON... More evidence that 
RDF leads to developer confusion regarding safe typing.

The OAuth solution does not have this confusing issue, they set the type 
explicitly:

{
 "vct": "https://credentials.example.com/identity_credential";,
 "given_name": "John",
 "family_name": "Doe",
 "email": "john...@example.com <mailto:john...@example.com> ",
 "phone_number": "+1-202-555-0101",
 "address": {
   "street_address": "123 Main St",
   "locality": "Anytown",
   "region": "Anystate",
   "country": "US"
 },
 "birthdate": "1940-01-01",
 "is_over_18": true,
 "is_over_21": true,
 "is_over_65": true,
 "status": {
    "status_attestation": {
        "credential_hash_alg": "S256",
    }
 }
}

Regards,

OS

-- 

 

ORIE STEELE
Chief Technology Officer
www.transmute.industries <http://www.transmute.industries> 

 <https://transmute.industries/> 

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to