[Openid-specs-digital-credentials-protocols] [minutes] APAC-friendly DCP WG + SIOP call (PST midday)
Kristina Yasuda
yasudakristina at gmail.com
Tue Mar 5 21:04:27 UTC 2024
Hi all, here are the minutes:
Joseph Heenan
Daniel Fett
Kristina Yasuda
Christian Bormann
Tobias Looker
Jin Wen
Torsten Lodderstedt
Dima Postnikov
Brian Campbell
Mike Jones
Sebastien Bahloul
Orie Steele
George Fletcher
Daylight saving related time zone changes are coming. We will try keep
calendars in sync, but noon PST is the source of truth, if you are in doubt.
Please register to post-IIW hybrid DCP WG in
https://www.eventbrite.com/e/openid-foundation-dcp-working-group-hybrid-meeting-tickets-841453930357
.
Oauth Security Workshop submissions deadline is coming up:
https://oauth.secworkshop.events/osw2024.
1. Request_uri extension
- https://github.com/openid/OpenID4VP/pull/59
- Suggestion is the following:
- drop the ability to sign the initial request
- the verifier is expected to send its capabilities (esp. signature
algorithms) in the client_metadata parameter with the initial request
- the Wallet should send the POST request to the request URI with a
data set, which does not allow user tracking, i.e. subset of client
metadata + nonce for request object signing + ephm. key for
request object
encryption
- the very first request from the verifier looks like …?
request_uri=...&client_metadata=...
- Please review this PR, if we can get WG agreement in this direction,
changes will be made to the PR.
1. OpenID4VP and Browser API
- Browser API open to support multiple protocols, one of those protocols
should be OpenID4VP. Torsen did a presentation that he worked on with
Joseph and Kristina on how that should look like
- Intro about browser api: https://github.com/WICG/digital-identities.
- Requirements:
- Wallet needs to authenticate the verifiers using trust
infrastructure independent from the web trust infrastructure
(important for
eIDAS 2.0)
- Proposed solution is use signed request object
- Tobias: there might be cases where web origin is sufficient, in
which case signing is not required
- Prevent replay of authenticated requests.
- Proposed solution is encrypt the response to the verifier's
ephemeral public key
- Easy migration to the browser api for the existing openid4vp
implementations
- What is not in the request object: redirect_uri, state, response_uri.
- Discussion
- Tobias: need to separate authenticating who you are sending the
request to and integrity to protect the request.
- Kristina: need to differentiate what is parsed by the wallet and
what is needs to be understood by the browser
- In the android model, the (sandboxed) matcher is provided by the
wallet. And it is that matcher that parses the request, not the mobile OS
itself.
- Sebastian/Orie: question seems to be how much the browser needs to
understand about the incoming request? How opaque is it for the platform.
- Document to review is here:
https://docs.google.com/document/d/1A10PZ_DviMJeyy2mDFt2QLcXUbT4O2dc_BizNXAD2PQ/edit
- Please review the document, comment and indicate if you believe DCP
WG should work on this and if yes, should this be a new WG item
in DCP WG.
1. Query syntax
- https://github.com/openid/OpenID4VP/issues/112
- The issue describes feedback that has been received on PE.
- Sticking to the process outlined here:
https://github.com/openid/OpenID4VP/issues/112#issuecomment-1960037463
- There is no clear agreement on the suggested way forward out of few
options presented in the issue-comment
- Tobias did a presentation for one concrete solution how a new query
language specific to credential format could look like (close to option 4
in the issue-comment)
-
https://docs.google.com/document/d/10JT--pXWsfwC4QVu3XJpXGwcO08M6tnpkZ4PKdtCEWo/edit#heading=h.7igj7m3na8ru
- Discussion
- Orie asked about intentToRetain feature
- Kristina asked about why presentation_submission kind of feature
was missing -> was not deemed useful by the proposers of this document
- Please review this proposal and make comments on issue #112 about your
desired next step
On Tue, Mar 5, 2024 at 10:25 AM Joseph Heenan via
Openid-specs-digital-credentials-protocols <
openid-specs-digital-credentials-protocols at lists.openid.net> wrote:
> Hi All,
>
> Below is the suggested agenda for the today's DCP WG + SIOP call at 12:00
> midday PT.
>
> - IPR reminder/ Note-taking
> - Introductions/re-introductions
> - Agenda bashing/adoption
> - DST changes means the call time will move for many people sometime over
> the next month; check the calendar
> - Events/External orgs
> - PRs
> - Please review VP SD-JWT profile:
> https://github.com/openid/OpenID4VP/pull/115
> - Please review VP Editorial:
> https://github.com/openid/OpenID4VP/pull/119
> https://github.com/openid/OpenID4VP/pull/121
> https://github.com/openid/OpenID4VP/pull/114
> - Request URI extension: https://github.com/openid/OpenID4VP/pull/59
> - Issues:
> - OpenID 4 VP profile of the Browser API -
> https://github.com/openid/OpenID4VP/issues/90
> - Query language - https://github.com/openid/OpenID4VP/issues/112
> - Other PRs
> - VCI
> https://github.com/openid/OpenID4VCI/pulls?q=is%3Aopen+is%3Apr+milestone%3AID-1
> - VP https://github.com/openid/OpenID4VP/pull/59
> - HAIP
> https://github.com/openid/oid4vc-haip-sd-jwt-vc/pulls?q=is%3Apr+is%3Aopen+sort%3Aupdated-desc
> - Issues (in the most recently updated order)
> - VCI
> https://github.com/openid/OpenID4VCI/issues?q=is%3Aissue+is%3Aopen+sort%3Aupdated-desc
> - VP
> https://github.com/openid/OpenID4VP/issues?q=is%3Aissue+is%3Aopen+sort%3Aupdated-desc
> - HAIP
> https://github.com/openid/oid4vc-haip-sd-jwt-vc/issues?q=is%3Aissue+is%3Aopen+sort%3Aupdated-desc
>
>
> Thanks
>
> Joseph
>
> --
> Openid-specs-digital-credentials-protocols mailing list
> Openid-specs-digital-credentials-protocols at lists.openid.net
>
> https://lists.openid.net/mailman/listinfo/openid-specs-digital-credentials-protocols
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openid.net/pipermail/openid-specs-digital-credentials-protocols/attachments/20240305/041d8ecc/attachment-0001.html>
More information about the Openid-specs-digital-credentials-protocols
mailing list