Hi Carsten,

Just like JWTs and CWTs, the CWT Claims Set in the header parameter is a data 
structure.  It's the applications using them that profile them to use 
particular claims and assign them specific semantics in their context.  An 
OpenID Connect ID Token defines semantics for a particular kind of JWT, just 
like STIR defines semantics for other kinds of JWTs.  SCITT is assigning 
semantics to a particular use of the CWT Claims header parameter.

The draft-ietf-cose-cwt-claims-in-headers creates a syntax to which 
applications will assign semantics.

                                -- Mike

-----Original Message-----
From: Carsten Bormann <[email protected]> 
Sent: Friday, October 27, 2023 3:42 AM
To: Francesca Palombini <[email protected]>
Cc: Michael Jones <[email protected]>; 
[email protected]; [email protected]; [email protected]
Subject: Re: [IANA #1284212] expert review for 
draft-ietf-cose-cwt-claims-in-headers (cose)

The part that I don’t understand is the semantics.

LAKE/edhoc kccs/kcwt is clear: This is the identity, and here (cnf) is the key 
for that.

For claims-in-headers we know that the syntax is one of CCS/CWT, but I don’t 
think there is any text that indicates what links this information with the 
COSE data item.

It might be dangerous to leave the semantics of including the claim set/CWT to 
the context.
It might be OK, and JWT might lead us into experience that this is so.
It might be OK, if we explicitly say “there is no semantics” (e.g., presenting 
a key does NOT mean this is the key that applies here).
I haven’t done the digging yet to find out.

Grüße, Carsten

_______________________________________________
COSE mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/cose

Reply via email to