[OpenID-Specs-eKYC-IDA] Aggregated verified claims

Achim Schlosser achim.schlosser at enid.eu
Fri Mar 13 00:03:42 UTC 2020


Hi Torsten,


Ok that makes sense.

Aggregated claims look really appealing in a eKYC scenario, given the possibility to have sign/encrypted JWTs from the different claim providers depending on which one was used. 


Best


Achim Schlosser

Sent from my IPhone


> Am 12.03.2020 um 19:57 schrieb Achim Schlosser <achim.schlosser at enid.eu>:
> 
> Hi,
> 
> 
> I’ve been reading through v09 and came across the aggregated claims examples (which I'm specifically interested in also in terms of implementation) and wanted to align on this. The example is he following: 
> 
> {
>   "iss": "https://server.example.com",
>   "sub": "248289761001",
>   "email": "mailto:janedoe at example.com",
>   "email_verified": true,
>   "_claim_names": {
>     "verified_claims": "src1"
>   },
>   "_claim_sources": {
>     "src1": {
>       "JWT": "......"
>     }
>   }
> }
> 
> This notation means that all verified_claims that are available / the user is willing to share are available in SRC1s JWT.
> 
> I would assume that the following is also possible, which basically uses the verified_claims object in details here:
> 
> {
>   "iss": "https://server.example.com",
>   "sub": "248289761001",
>   "email": "mailto:janedoe at example.com",
>   "email_verified": true,
>   "_claim_names": {
>     "verified_claims": {
>       "claims": {
>         "given_name": "src1",
>         "family_name": "src1",
>         "birthdate": "src1"
>       }
>     }
>   },
>   "_claim_sources": {
>     "src1": {
>       "JWT": "......"
>     }
>   }
> }
> 
> This would allow for explicitly listing the claims present as it is done for classical claims in line with the core specification. This would also support multiple aggregated claim sources with verified claims. 
> 
> Best
> 
> Achim
> 
> 


More information about the Openid-specs-ekyc-ida mailing list