You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/manifest/reading/legacy.md
+18-1Lines changed: 18 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,9 +9,26 @@ As much as possible, an application should **write** manifest data that conforms
9
9
For READING old claims (only) … v1 actions and ingredients
10
10
</div>
11
11
12
+
## Legacy ingredients
13
+
14
+
Existing manifests may contain any of these three kinds of ingredients:
15
+
- V1, with label `c2pa.ingredient` (deprecated).
16
+
- V2, with label `c2pa.ingredient.v2` (deprecated).
17
+
- V3, with label `c2pa.ingredient.v3`, which addresses the issue of validating ingredients after redaction.
18
+
19
+
## Legacy actions
20
+
21
+
Existing manifests may contain two versions of actions: original v1 actions, with label `c2pa.actions`, and revised v2 actions, with label `c2pa.actions.v2`. While a v1 action is fully specified in its actions array, a v2 action may either be fully specified in an element of the actions array or it may be derived from an element in the templates array with the same action name.
22
+
12
23
## Legacy metadata assertions
13
24
14
-
Older versions of the SDK had individual assertions for each metadata standard, as detailed below.
25
+
Existing manifests may contain individual assertions for each metadata standard:
The [Creator Assertions Working Group (CAWG)](https://cawg.io/) identity assertion enables a credential holder to prove control over a digital identity and to use that identity to document a content creator’s role(s) in a C2PA asset’s lifecycle.
7
7
8
-
There are two different ways to provide identity assertions:
9
-
10
-
- Using an [X.509 certificate](https://cawg.io/identity/1.1/#_x_509_certificates_and_cose_signatures) to sign the identity claims. Enterprises or large organizations can use this approach to assert their identity in a particular trust ecosystem; for example, a news organization or publisher. The SDK can validate and sign these claims.
11
-
- Using an [identity claim aggregator](https://cawg.io/identity/1.1/#_identity_claims_aggregation). Individuals can use this approach to document their role in creating an asset by using identity signals collected and verified by a third-party aggregator. Adobe applications (for example) use this method to provide identity claims.
8
+
The SDK can write and sign claims for CAWG identity assertions provided using an [X.509 certificate](https://cawg.io/identity/1.1/#_x_509_certificates_and_cose_signatures) to sign the identity claims. Enterprises or large organizations can use this approach to assert their identity in a particular trust ecosystem; for example, a news organization or publisher. The SDK can validate and sign these claims.
12
9
13
10
:::note
14
-
The SDK can validate claims for both kinds of identity assertions, but can only sign claims for identity assertions using an X.509 certificate.
11
+
CAWG identity assertions can also be created using an [identity claim aggregator](https://cawg.io/identity/1.1/#_identity_claims_aggregation), but the SDK only read and validate claims for these kinds of assertions. It cannot write them.
15
12
:::
16
13
17
14
## Using an X.509 certificate
18
15
19
16
When providing an identity assertion by using an X.509 certificate, the value of `signer_payload.sig_type` must be `cawg.x509.cose`. The signature value must be a COSE signature as described in the [CAWG Identity Assertion technical specification](https://cawg.io/identity/1.1/#_x_509_certificates_and_cose_signatures).
20
17
21
-
## Using an identity claim aggregator
22
-
23
-
As defined in the [CAWG Identity Assertion technical specification](https://cawg.io/identity/1.1/#_identity_claims_aggregation), content creators may wish to document their role in creating an asset using identity signals such as:
24
-
- Verified web sites
25
-
- Social media accounts
26
-
- Official ID documentation
27
-
- Professional accreditations
28
-
- Organizational affiliations
29
-
30
-
To facilitate the use of such identity signals, the content creator may use the services of a trusted third-party intermediary known as a _identity claims aggregator_ to gather these signals and to restate them on their behalf.
31
-
32
-
The identity claims aggregator:
33
-
34
-
- Collects and verifies identity attestation claims from various identity providers such as social media sites and ID verification vendors.
35
-
- Creates a unique asset-specific credential that binds the identity attestation claims to a specific asset.
36
-
37
18
## Identity assertion
38
19
39
20
An identity assertion using an identity claims aggregator has this general form in JSON:
0 commit comments