[Openid-specs-ab] SIOP Special Call Notes 15-Jun-21

Mike Jones Michael.Jones at microsoft.com
Tue Jun 15 23:28:17 UTC 2021

SIOP Special Call Notes 15-Jun-21

Kristina Yasuda
Mike Jones
John Bradley
Tony Nadalin
Jeremie Miller
David Waite (DW)
Adam Lemmon
Edmund Jay
Pamela Dingle
Nat Sakimura

External Organizations
              Identiverse (next week)
                           Panel: Where we are with SIOP and DIDs

Open SIOP Issues
              #1242: Specify how multiple claims should be included in a Verifiable Presentation
                           The draft specifies an array
                           Closed during the call since the array format in the specification already enables this
              #1230: Adopt Presentation Exchange as an officially supported mechanism within SIOP
                           Closed during the call, since PR #20 accomplishes this
              #1218: Verifiable Presentations do not work outside of their own protocol
                           Closed during the call, since PR #21 addressed this issue
                           There was an ensuing discussion about presentation requests and formats for them

Terminology HackMD Document
              This arose from issue #1239: We should stop using "SIOP" as an umbrella term and instead talk about individual features.
              Mike disagreed with including the "Collective" term, as the instances are not cooperating with one another
              There was a discussion on the definition of "Trust Framework"
                           Tony pointed out that OIX has a definition - in The Open Identity Trust Framework (OITF) Model
              There was a discussion on the use of the issuer self-issued.me as a protocol switch
                           We agreed that it was OK to say this non-normatively in the SIOP V2 draft
                           DW said that using universal links might require using a different authorization endpoint
                                         Mike suggested that we write down a proposal for how to use universal links
              We agreed to the "Cryptographically Proven Subject Authority" remarks
              We discussed the "No Cryptographically-stated Subject Userinfo" point
                           Mike said that even for the UserInfo Endpoint, there's still a cryptographic chain assuring the integrity of the claims
                           DW said that with 3rd party issuers, they're asserting the claims, rather than the SIOP
                           Nat said that the Claims Aggregation draft is partly dealing with that
                           Mike said that, per Tom Jones' earlier issue #1232, the signature on claims merely provides integrity protection for the claims
                                         It doesn't mean that they're verified, in general
                           We said that eKYC, VCs, and/or Claims Aggregation can fill this gap for particular use cases
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openid.net/pipermail/openid-specs-ab/attachments/20210615/f371cd76/attachment-0001.html>

More information about the Openid-specs-ab mailing list