[Openid-dcp] DCP WG APAC 17th July 2025 Meeting Notes

Stefan Charsley charsleysa at gmail.com
Thu Jul 17 08:15:35 UTC 2025


DCP WG APAC 17th July 2025
Attendees:

Christian Bormann

Martijn Haring

Daniel Fett

Craig Lambie

Kenichi Nakamura

Andres Olave

Joseph Heenan

Stefan Charsley

Updates:

   -

   Interop for VCI draft 16, good results, mailing list has been sent a
   preliminary report, no major issues identified with specs
   -

   Conformance tests have been updated, draft 16 for VCI, 1.0 final for VP


Discussing OpenID4VCI:

Presentation During Issuance #509
<https://github.com/openid/OpenID4VCI/pull/509>

   -

   Please review


Application Encryption Security Considerations #569
<https://github.com/openid/OpenID4VCI/pull/569>

   -

   Please review


Add "non-empty" to a few arrays added since the last pass #574
<https://github.com/openid/OpenID4VCI/pull/574>

   -

   Needs 1 more approval for merging
   -

   Approved by Stefan


bad indentation in credential metadata section #573
<https://github.com/openid/OpenID4VCI/issues/573>

   -

   Editorial, christian to take a look at it


Clarify what absence of scope from credential_configurations_supported
means #572 <https://github.com/openid/OpenID4VCI/issues/572>

   -

   Christian: 3.3.4 needs further clarification


add example for batch_credential_issuance #563
<https://github.com/openid/OpenID4VCI/issues/563>

   -

   Christian: also missing an example for signed metadata



Discussing HAIP:

remove any mandatory requirements for key attestations #188
<https://github.com/openid/oid4vc-haip/issues/188>

   -

   Martijn: shouldn’t mandate attestation format
   -

   Christian: would like to differentiate between different attestation
   types, agrees with Martijn when referring to key attestations, disagrees
   for client attestations
   -

   Martijn: would be great if there was a standardized format, but we
   shouldn’t be the group to create the standardized format, prefer to make
   recommendations. Existing formats should be supported, reissuing
   attestations for a certain mandated format introduces possible security or
   cost issues
   -

   Christian: the mental model for wallet attestation is the wallet
   provider backend is always attetesting, in EU its usually wallet provider
   responsibility from legal perspective
   -

   Martijn: agrees with almost everything, except there are scenarios where
   wallet provider backend doesn’t exist. If wallet provider backend is
   required, it should be made explicit in HAIP.
   -

   Christian: wallet attestations are used as a client authentication
   method. To allow other formats, you would need some sort of extension point
   for the client to use other formats. What about mandating wallet
   attestation, letting ecosystems choose what formats?
   -

   Martijn: what is the attestation attesting? What is the subject? Its not
   defined
   -

   Joseph: separate out wallet attestation and key attestation, rename
   issue to be specific about key attestation, create new issue #211 regarding
   wallet attestation. Sounds like consensus on having a recommended format
   but allowing other formats
   -

   Martijn: what does the recommendation mean? If you have no format use
   this one? If you have an existing format, there shouldn’t be a
   recommendation to switch/rewrap
   -

   Agreement of allowing existing attestations as is
   -

   Christian: vci metadata needs method for describing supported
   attestation formats


allow use of other wallet attestations formats? #211
<https://github.com/openid/oid4vc-haip/issues/211>

   -

   Martijn: downsides of mandating a wallet attestation format, subject
   that you are attesting is undefined, is it the wallet application itself?
   Is it the wallet provider? What if you don’t have a wallet provider backend?
   -

   Christian: problem with native attestations is how do you establish
   trust while maintaining privacy
   -

   Martijn: if this is mandatory in HAIP 1.0, you couldn’t change it
   without making a HAIP 2.0 as it wouldn’t be backwards compatible
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openid.net/pipermail/openid-specs-digital-credentials-protocols/attachments/20250717/6e5ebe65/attachment-0001.htm>


More information about the Openid-specs-digital-credentials-protocols mailing list