While not new, the subject of how an issuer signs an SD-JWT VC and how a
verifier properly finds the public key and checks the signature has come
more into focus recently. Slides 7 and 8 of the SD-JWT VC presentation at
the Friday WG session
<https://datatracker.ietf.org/meeting/122/materials/slides-122-oauth-sessb-sd-jwt-vc-00>
of the last IETF were about PRs/issues/ideas in the area. During the
session I'd indicated intent to work towards generally what was presented
there. However, after the session some of the pesky details of life came up
and I'd not gotten to acting on that intent. In the meantime, Oliver
proposed some thoughts on the same topic in this google doc
<https://docs.google.com/document/d/1rROkQ8V0azVpXrab7M2CmVkh5EKZxrm4rwYSlNbI2MY/edit?usp=sharing>
that could pretty much obviate what I was otherwise planning on doing.
While I did add a metric junkload of comments to that document, I do think
it's conceptually the right direction and am now planning on working from
the content and discussion therein as the basis for upcoming changes.

-- 
_CONFIDENTIALITY NOTICE: This email may contain confidential and privileged 
material for the sole use of the intended recipient(s). Any review, use, 
distribution or disclosure by others is strictly prohibited.  If you have 
received this communication in error, please notify the sender immediately 
by e-mail and delete the message and any file attachments from your 
computer. Thank you._
_______________________________________________
OAuth mailing list -- oauth@ietf.org
To unsubscribe send an email to oauth-le...@ietf.org

Reply via email to