[Openid-specs-digital-credentials-protocols] OIDF DCP WG meeting notes for 2024-07-25
Giuseppe De Marco
demarcog83 at gmail.com
Mon Jul 29 13:40:57 UTC 2024
Hi,
than kyou for the notes. Regarding the removal of client_id_scheme
OID4VP/Issue 124: client_id_scheme security considerations
...
Torsten highlights the change is needed to OpenID Federation wrt the
entity identifier. That change is either an extra param (client_id_scheme)
or namespaced entity identifier
John: should be discussed with people who already use Federation (e.g.
Italian Wallet)
Torsten: Agrees
Daniel: This is a problem for every server that uses client_ids from
multiple sources, so more universal than OpenID Federation
I agree with Daniel, it is more universal than OpenID Federation.
Regarding the removal of client_id_scheme, I don't see any problem with the
current OpenID federation wallet implementation, therefore client_id_Scheme
can be removed without compromising current implementations (that uses
client_id in the form of https url).
Regarding the use of namespaces: This was not considered before, so at this
stage, it needs to be addressed and defined within the specifications.
Technically, handling namespaces is feasible. However, I want to emphasize
that using namespaces seems to address a problem in an unconventional way
by inflating the client ID value.
A client ID is meant to be a client identifier, while the purpose of a
namespace is to provide guidance on how to resolve the client identifier.
These are two different concepts. Using unique client identifiers can scale
across multiple trust evaluation mechanisms, whereas embedding a trust
resolution method within a unique client ID forces an entity to not join
multiple infrastructures of trust. This approach does not scale well.
I would prefer to leave client_id as it is, without namespaces. I will
follow the discussion to share further feedback.
I hope this helps, thank you for sharing
thx!
Il giorno lun 29 lug 2024 alle ore 14:35 Jan Vereecken via
Openid-specs-digital-credentials-protocols <
openid-specs-digital-credentials-protocols at lists.openid.net> ha scritto:
> Hello All,
>
> Please find the notes below of the DCP WG call of July 25th.
>
> Rgs,
> Jan
>
> - Participants
> - Torsten Loddersted
> - Joseph Heenan
> - Marijn Haring
> - Kristina Yusuda
> - Andreea Prian
> - Lukasz Jaromin
> - Steve Venema
> - Paul Bastian
> - Andy Lim
> - Juba Saadi
> - Oliver Terbu
> - Andreea Prian
> - Brian Campbell
> - Hicham Lozi
> - Ryan Galluzzo
> - John Bradley
> - Rajvardhan Deshmukh
> - Bjorn Helm
> - Gareth Oliver
> - Jian Liu
> - Agenda
> - Wallet Attestations / Key Attestations
> - Removal CWT proof type
> - OID4VCI/PR 220: Introduce Query Language
> - Client id scheme security
> - Adding transaction data
> - External Events
> - Some events around IIW, see mailing list for more details
> - OID4VCI/Issue 355: Wallet Attestations / Key Attestations
> - Kristina: Recap of what was discussed in previous call. Details
> in the issue
> - Torsten: Has two questions. First one: highlights comment from
> Andrea regarding issuer metadata needed for wallet to understand which
> attestation is needed for a key
> - Andrea highlights here last comment in the ticket talking about
> PoP and context that can be useful for the issuer as well as its importance
> for authentication (e.g. PID provider might have more strict requirements).
> - Torsten: party sending the requests is who decides what is
> allowed. Suggests to extend the metadata to convey the requirements
> regarding keys
> - Andrea: Issuer cannot always specify what means of authn is
> supports as it can also depend on the WSCD supported by the device the user
> has. Shou
> - Torsten: Of the opinion that issuer should provide as much
> information to wallet as possible
> - Paul: Agrees with Torsten. Avoid that after providing key
> attestation the issuer says that it can't continue.
> - Agree to wait for Paul's PR to discuss this further
> - Torsten: goes to second question brings up the topic of wallet
> authentication
> - Andrea highlight that each member state has a different
> interpretation of LoA high for example.
> - Torsten agrees
> - John: Wallet to decide which trust mark to provide based on the
> information the issuer provides. Potentially also useful for "Wallet
> Selector" to lead the user to a wallet that is likely to support it.
> - Agree to wait for Paul's PR
> - OID4VCI/Issue 320: Remove CWT proof type
> - Kristina introduces the issue. Email to mailing list asking for
> objections to remove it. Asks the working group. No objections.
> - Brian will create a PR to remove it.
> - OID4VP/Issue 124: client_id_scheme security considerations
> - Daniel introduces the issue. The summary is that client_id_scheme
> must be present whenever client_id scheme is present as the client_id
> - Kristina asks WG if anyone is opposed to prefixing the client_id
> with the client_id_scheme
> - Oliver is opposed to namespacing, but has no concrete counter
> proposal
> - Torsten and Kristina bring up that it is waiting for Tobias to
> make a suggestion and the ticket is already open for more than 3 months
> - Oliver wants to circle back and suggest a proposal on Aug 6th
> - Torsten highlights the change is needed to OpenID Federation wrt
> the entity identifier. That change is either an extra param
> (client_id_scheme) or namespaced entity identifier
> - John: should be discussed with people who already use Federation
> (e.g. Italian Wallet)
> - Torsten: Agrees
> - Daniel: This is a problem for every server that uses client_ids
> from multiple sources, so more universal than OpenID Federation
> - Joseph: If it only applies to wallets, this should be stated
> clearly
> - Kristina: This is more universal problem
> - Lukasz: How can we avoid conflicts with other potential
> interpretations of client_id
> - John: We can't. Difficult to understand
> - Kristina: Asks for remarks raised during the meeting to be
> documented in the issue
> - OID4VP/PR220: Introduce new query language
> - Daniel introduces the PR. Ready for reviews.
> - OID4VP/PR197: Add transaction_data
> - Kristina introduces the PR. Ready for reviews.
> - LSPs in EU are actively asking for this as they rely on this
> mechanism.
> - Actions
> - Oliver will propose alternative solution than the one proposed
> currently in OID4VP/Issue 124 by Aug 6th
>
>
> --
> Openid-specs-digital-credentials-protocols mailing list
> Openid-specs-digital-credentials-protocols at lists.openid.net
>
> https://lists.openid.net/mailman/listinfo/openid-specs-digital-credentials-protocols
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openid.net/pipermail/openid-specs-digital-credentials-protocols/attachments/20240729/383c5fa6/attachment.html>
More information about the Openid-specs-digital-credentials-protocols
mailing list