[Openid-specs-ab] Defining JWT Claims to represent W3C Verifiable Credentials objects

Kristina Yasuda Kristina.Yasuda at microsoft.com
Thu Apr 8 01:52:30 UTC 2021


VC specification defined `vp`, `vc` claims, but they are defined only to include "tthose parts of the standard verifiable credentials and verifiable presentations where no explicit encoding rules for JWT exist". Hence `vp`, `vc` claims are only a part of the the entire VP, VC.

There is a need a define a standard way to return VPs using OpenID Connect, and the proposal is to use `vp_jwt`, `vp_ldp` claims that would include entire VP inside the ID token. (VP in a JWT format inside `vp_jwt` would include `vp` claim)
Example can be found here: Examples for the vp_jwt, vp_ldp proposal - HackMD<https://hackmd.io/grbDXDHqTE6lhu6fvVFIuA>

Note that this proposal is intended to work not only with SIOP V2, but also if VPs are to be returned from the user_info endpoint for example.

Best,
Kristina
________________________________
²î³öÈË: Openid-specs-ab <openid-specs-ab-bounces at lists.openid.net> ¤¬ ANTHONY NADALIN via Openid-specs-ab <openid-specs-ab at lists.openid.net> ¤Î´úÀí¤ÇËÍÐÅ
ËÍÐÅÈÕ•r: 2021Äê4ÔÂ8ÈÕ 10:09
ÍðÏÈ: Artifact Binding/Connect Working Group <openid-specs-ab at lists.openid.net>
CC: Anthony Nadalin <nadalin at prodigy.net>; oliver.terbu at mesh.xyz <oliver.terbu at mesh.xyz>
¼þÃû: Re: [Openid-specs-ab] Defining JWT Claims to represent W3C Verifiable Credentials objects

I  don't quite understand this proposal as if you read the verifiable credential specification you will see a section called JWT encoding and JWT decoding based upon what Mike is written I don't understand how you could abide by a fully compliant verifiable credential specification without encoding and decoding JWT's into verifiable credentials.

Get Outlook for Android<https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Faka.ms%2FAAb9ysg&data=04%7C01%7CKristina.Yasuda%40microsoft.com%7C692e57f56b6a438a91ab08d8fa2d9bad%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637534421379557988%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=FnWyXWRCNoPtQ%2FoIYYiXJKqx%2BPdJwGjmPDNEm%2BgyZ3I%3D&reserved=0>

________________________________
From: Openid-specs-ab <openid-specs-ab-bounces at lists.openid.net> on behalf of Tom Jones via Openid-specs-ab <openid-specs-ab at lists.openid.net>
Sent: Wednesday, April 7, 2021 6:00:29 PM
To: Artifact Binding/Connect Working Group <openid-specs-ab at lists.openid.net>
Cc: Tom Jones <thomasclinganjones at gmail.com>; oliver.terbu at mesh.xyz <oliver.terbu at mesh.xyz>
Subject: Re: [Openid-specs-ab] Defining JWT Claims to represent W3C Verifiable Credentials objects

I have an alternate proposal. In my system the claim should have a name that represents what it is. For example the existing claims acr and amr should be enabled to carry a vc or vp as its value. In this system the encoding of the value would carry the syntax of the claim, beit vc-sjon, vc-ld or whatever. The one proposal I did make was to use jose encoding. If we wanted to use this the jose header could contain the syntax of the contained element as Mike has indicated in his proposal.

I think it is not helpful for the name of the claim to be just the syntax of the element.

Be the change you want to see in the world ..tom


On Wed, Apr 7, 2021 at 5:25 PM Mike Jones via Openid-specs-ab <openid-specs-ab at lists.openid.net<mailto:openid-specs-ab at lists.openid.net>> wrote:

In our discussions over the past few months, it¡¯s become clear that there are multiple use cases where different forms of W3C Verifiable Credential objects will be communicated as JWT claims (or as UserInfo Endpoint claims).  I had a useful conversation with Oliver Terbu and Kristina Yasuda this week during which we agreed that it would be useful to write a short, focused specification defining and registering JWT claims enabling standard representations for this purpose.  These claims could be used both by SIOP use cases and other use cases.



Bear in mind that the W3C Verifiable Credentials specification defines two representations of the objects that it defines ¨C JWT and JSON-LD and it also orthogonally defines two kinds of objects ¨C Verifiable Credentials and Verifiable Presentations.  Thus, there are actually four different data types that these use cases might want to utilize.



I would therefore propose the following four claim definitions for these purposes:



  *   vc_jwt:  A claim whose value is a W3C Verifiable Credential object using the JWT representation, which is a JSON string.  The claim¡¯s value may also be an array of W3C Verifiable Credential objects using the JWT representation if the use case calls for multiple JWT VCs.
  *   vp_jwt:  A claim whose value is a W3C Verifiable Presentation object using the JWT representation, which is a JSON string.  The claim¡¯s value may also be an array of W3C Verifiable Presentation objects using the JWT representation if the use case calls for multiple JWT VPs.
  *   vc_ld:  A claim whose value is a W3C Verifiable Credential object using the JSON-LD representation, which is a JSON object.  The claim¡¯s value may also be an array of W3C Verifiable Credential objects using the JSON-LD representation if the use case calls for multiple JSON-LD VCs.
  *   vp_ld:  A claim whose value is a W3C Verifiable Presentation object using the JSON-LD representation, which is a JSON object.  The claim¡¯s value may also be an array of W3C Verifiable Presentation objects using the JSON-LD representation if the use case calls for multiple JSON-LD VPs.



Let¡¯s discuss this proposal during the European-friendly Connect call ~13.5 hours from now.



                                                       -- Mike



_______________________________________________
Openid-specs-ab mailing list
Openid-specs-ab at lists.openid.net<mailto:Openid-specs-ab at lists.openid.net>
http://lists.openid.net/mailman/listinfo/openid-specs-ab<https://nam06.safelinks.protection.outlook.com/?url=http%3A%2F%2Flists.openid.net%2Fmailman%2Flistinfo%2Fopenid-specs-ab&data=04%7C01%7CKristina.Yasuda%40microsoft.com%7C692e57f56b6a438a91ab08d8fa2d9bad%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637534421379557988%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=t%2Bg7TOqpJ6MugoogevZ2ga8oCZuxQCVPf5e2GajhTAA%3D&reserved=0>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openid.net/pipermail/openid-specs-ab/attachments/20210408/b70a0c2e/attachment-0001.html>


More information about the Openid-specs-ab mailing list