-
Notifications
You must be signed in to change notification settings - Fork 198
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Credential registry authentication #521
Credential registry authentication #521
Conversation
Signed-off-by: F-Node-Karlsruhe <[email protected]>
Signed-off-by: F-Node-Karlsruhe <[email protected]>
OID4VP DraftUsing the For the registry authorization the flow starts at step 2 (2.0 in figure) where wallet of the requesting wallet can query the Request Object containing the presentation definition and nonce/challenge (2.5). The first stop can be skipped, as we define the endpoint where the Requst Object can be fetched under Till here we strictly followed the OID4VP cross device flow. The only difference comes after the official flow finished. Instead of ending the flow with a 200 response after the presentation was sent to the |
Co-authored-by: Ted Thibodeau Jr <[email protected]>
This PR has been a draft for over a year. We don't want to keep PRs open for this long on the repository, which is undergoing some fairly significant restructuring at this point. Please confirm that you still want to pursue this PR @F-Node-Karlsruhe, and if not, please close the PR. |
@F-Node-Karlsruhe second ping to provide feedback on this PR. If we don't get any feedback from you within the next 14 days, we will close this PR. |
This is far from ready and the funding project terminated last month, so i will close it here myself. Thanks for pinging me :) |
First draft
Authenticated registry requests shall be performed doing a POST request carrying the authentication. As a first option we chose verifiable presentations (VPs) as the mean authentication. VPs already take over the authentication of the requesting identity by design and are a proven building block of the DID ecosystem. Further they can contain verifiable credentials which may be needed for authentication as well, e.g. GS1LicenceCredentials.
Open questions
Replay attacks
Option 1
Obtain challenge for the VP via an additional endpoint
registry/{id}/challenge
Option 2
Add an expirationDate with a short delay to the VP (not intended (?) in the data model but possible with the LinkedDataSignature)
Protocol options
Allow OpenID4VP from the registry side?
-> Out of scope of OID4VC/little bit of misuse of the protocol
-> privacy issue: the necessary authentication requirements are partially revealed with the presentation request
Preview | Diff