[Openid-specs-digital-credentials-protocols] DCP Call Notes 29-Aug-24
Michael Jones
michael_b_jones at hotmail.com
Thu Aug 29 17:51:19 UTC 2024
DCP Call Notes 29-Aug-24
Joseph Heenan
Kristina Yasuda
Mike Jones
Giuseppe De Marco
George Fletcher
Steve Venema
Jin Wen
Brian Campbell
Paul Bastian
Christian Bormann
Daniel Fett
Jan Vereecken
David Chadwick
Ben Piercey
Martin Auer
Andreea Prian
Rajvardhan Deshmukh
Judith Kahrer
Bjorn Hjelm
Oliver Terbu
Hicham Lozi
Nemanja Patronogic
Martijn Haring
Torsten Lodderstedt
Sebastien Bahloul
Giuseppe presented about the Federation Wallet Architecture draft
https://peppelinux.github.io/federation-wallet/main.html
Call for adoption in progress in OpenID Connect working group
Defines Entity Types for wallet entities
Credential Issuer, Wallet, Credential Verifier
Depends on OpenID Federation, OpenID4VP, OpenID4VCI
Four Party Model (Three from OpenID4VC + Trusted Third Party)
Described possible work to do with DCP working group
Define jwks (JWK Set) metadata parameter
Define request_uris, response_uris_supported parameters
Joseph had commented on endpoint randomization using fragments
Constrain Verifiers from over-asking
presentation_definitions_supported to start discussion
Define OpenID Wallet Provider role
Issues attestations about Wallet instances
Giuseppe reminded the WG of the issue to incorporate Federation support in HAIP
https://github.com/openid/oid4vc-haip-sd-jwt-vc/issues/88
Torsten asked about the Token Endpoint being used to issue wallet instance attestations
Giuseppe agreed that it's up to the working group
Torsten wants more implementation experience
Torsten wants us to keep differentiation between a reference design and specification we write to ensure interoperability
The interface between the wallet provider and wallet instance is internal
Oliver presented about the PR to address client_id_scheme problems
https://github.com/openid/OpenID4VP/pull/237
Mike, Brian, and Joseph agreed to review the PR
Joseph talked about PR to address issue 17 about client_metadata contents
https://github.com/openid/OpenID4VP/pull/233
Oliver pointed out that any jwks in the request must not be used to verify the signature
Oliver to supply text
Martijn requested clarifications on parameters that MUST NOT be used
And where they may and may not be defined
We discussed the jwks element
Brian suggested that we use the definition from RFC 7591 (OAuth Client Metadata)
Brian said that multiple encryption keys could make sense but probably only one signing key
Mike will review the language on extensibility
Kristina talked about the transaction data PR
https://github.com/openid/OpenID4VP/pull/197
Paul said that a cleaner separation would be a different credential format only used for transaction authorization
Joseph asked: How does Paul's suggestion work - do you present a payment credential, then another credential alongside it that is linked to the payment credential and has the transactions details it, or we present the payment credential type and a transaction data like thing?
Paul said that payment providers first validate the person, then issue a payment authorization token
The token is only shared between the issuer and the recipient
Torsten said that we could create a new response type and credential format
That would be really clean
What we have isn't as clean but Torsten is in favor of it
Christian wants to clarify how to convey that the credential can be used for transaction authorization
Daniel agreed with that
Torsten discussed clarifications about what can be signed and what can be used for payment authorization
There was a lot of discussion about credential formats, including who can decide what formats to use and how they can be used
There was a discussion of a two-party versus three-party model
The issuer and verifier could be the same party
There was a discussion of how to include transaction data in the response in the issue
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openid.net/pipermail/openid-specs-digital-credentials-protocols/attachments/20240829/7a62745e/attachment-0001.html>
More information about the Openid-specs-digital-credentials-protocols
mailing list