Skip to content

Commit 8019a14

Browse files
authored
Merge branch 'main' into pb/crossdevice
2 parents ce0e6d1 + 525948a commit 8019a14

File tree

1 file changed

+16
-1
lines changed

1 file changed

+16
-1
lines changed

openid4vc-high-assurance-interoperability-profile-1_0.md

Lines changed: 16 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -367,6 +367,20 @@ This specification relies on certain prerequisites, such as browser or operating
367367

368368
Wallet implementations using the key attestation format specified in Annex D of [@!OIDF.OID4VCI] might need to utilize a transformation (backend) service to create such attestations based on data as provided in other formats by the respective platform or secure key management module. The dependency on such a service might impact the availability of the wallet app as well as the performance of the issuance process. This could be mitigated by creating keys and obtaining the respective key attestations in advance.
369369

370+
## Ecosystem Implementation Considerations
371+
372+
This document intentionally leaves certain extensions for ecosystems to define, in order to enable broad compatibility across differing or even conflicting requirements. These include:
373+
374+
- Whether to adopt the Presentation profile, Issuance profile, or both
375+
- Which Credential format to support across issuance and presentation
376+
- Whether to use Signed Issuer Metadata or not
377+
- How to send Credential Offer
378+
- Which Key attestation format to use
379+
- Which Wallet attestation format to use
380+
- X509 certificate profiles
381+
- Whether to use DC API, Redirects with custom URL schemes and/or Redirects with claimed `https` scheme URIs for presentation
382+
- Support or restriction of additional cryptographic suites and hash algorithms
383+
370384
# Security Considerations {#security_considerations}
371385

372386
Note that security considerations for OpenID for Verifiable Credential Issuance are defined in Section 13 of [@!OIDF.OID4VCI] and for OpenID for Verifiable Presentations in Section 14 (for redirect based flows) or Section A.5 (for DC API) of [@!OIDF.OID4VP].
@@ -387,7 +401,7 @@ Implementers need to ensure appropriate key sizes are used. Guidance can be foun
387401

388402
# Privacy Considerations
389403

390-
## Interoperable Key Attestations
404+
## Interoperable Key Attestations {#interop-key-attestations}
391405

392406
Wallet implementations using the key attestation format specified in Annex D of [@!OIDF.OID4VCI] might need to utilize a transformation (backend) service to create such attestations based on data as provided in other formats by the respective platform or secure key management module. Such a backend service MUST be designed considering the privacy of its users. For example, the service could be stateless and just perform the transformation of the attestation data without binding the process in any way to a unique user identifier.
393407

@@ -662,6 +676,7 @@ The technology described in this specification was made available from contribut
662676
-05
663677

664678
* mandate support for same device flow for redirect-based OpenID4VP
679+
* Add ecosysetm guidance section
665680
* change wallet attesation format from mandatory to recommended
666681
* update crypto suites to require at least ECDSA w/ P-256 and SHA-256 for verifying signed artificats; and made ecosystem-specific exceptions for crypto suites and hash algorithms if certain criteria is not met
667682
* removed intent_to_retain mandatory

0 commit comments

Comments
 (0)