Skip to content

Commit b586579

Browse files
committed
Changes for publishing 'final' revision of HAIP
1. Remove document history 2. Update title to remove 'draft' 3. Update spec version as we'd not done that since publishing -06 4. Add a section explaining why the final spec is available at two different links "Status: Final" also needs to be added into the document header but this has to be done manually in the html. Mirrors what was done in openid/OpenID4VP#654
1 parent db568ac commit b586579

File tree

1 file changed

+6
-124
lines changed

1 file changed

+6
-124
lines changed

openid4vc-high-assurance-interoperability-profile-1_0.md

Lines changed: 6 additions & 124 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
%%%
2-
title = "OpenID4VC High Assurance Interoperability Profile 1.0 - Editor's draft"
2+
title = "OpenID4VC High Assurance Interoperability Profile 1.0"
33
abbrev = "openid4vc-high-assurance-interoperability-profile"
44
ipr = "none"
55
workgroup = "Digital Credentials Protocols"
66
keyword = ["security", "openid4vc", "sd-jwt", "sd-jwt-vc", "mdoc"]
77

88
[seriesInfo]
99
name = "Internet-Draft"
10-
value = "openid4vc-high-assurance-interoperability-profile-1_0-06"
10+
value = "openid4vc-high-assurance-interoperability-profile-1_0-07"
1111
status = "standard"
1212

1313
[[author]]
@@ -73,6 +73,10 @@ A full list of the open standards used in this specification can be found in (#s
7373

7474
The target audience of this specification is implementers who require a high level of security and privacy for their solutions. A non-exhaustive list of the interested parties includes anyone implementing [eIDAS 2.0](https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=OJ:L_202401183), [California Department of Motor Vehicles](https://www.dmv.ca.gov/portal/), [Open Wallet Foundation (OWF)](https://openwallet.foundation/), [IDunion](https://idunion.org/?lang=en), [GAIN](https://gainforum.org/), and [the Trusted Web project of the Japanese government](https://trustedweb.go.jp/en), but is expected to grow to include other jurisdictions and private sector companies.
7575

76+
## Errata Revisions
77+
78+
The latest revision of this specification, incorporating any errata updates, is published at [openid4vc-high-assurance-interoperability-profile-1_0](https://openid.net/specs/openid4vc-high-assurance-interoperability-profile-1_0.html). The text of the final specification as approved will always be available at [openid4vc-high-assurance-interoperability-profile-1_0-final](https://openid.net/specs/openid4vc-high-assurance-interoperability-profile-1_0-final.html). When referring to this specification from other documents, it is recommended to reference [openid4vc-high-assurance-interoperability-profile-1_0](https://openid.net/specs/openid4vc-high-assurance-interoperability-profile-1_0.html).
79+
7680
## Requirements Notation and Conventions
7781

7882
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 [@!RFC2119] [@!RFC8174] when, and only when, they appear in all capitals, as shown here.
@@ -722,125 +726,3 @@ Copyright (c) 2025 The OpenID Foundation.
722726
The OpenID Foundation (OIDF) grants to any Contributor, developer, implementer, or other interested party a non-exclusive, royalty free, worldwide copyright license to reproduce, prepare derivative works from, distribute, perform and display, this Implementers Draft, Final Specification, or Final Specification Incorporating Errata Corrections solely for the purposes of (i) developing specifications, and (ii) implementing Implementers Drafts, Final Specifications, and Final Specification Incorporating Errata Corrections based on such documents, provided that attribution be made to the OIDF as the source of the material, but that such attribution does not indicate an endorsement by the OIDF.
723727

724728
The technology described in this specification was made available from contributions from various sources, including members of the OpenID Foundation and others. Although the OpenID Foundation has taken steps to help ensure that the technology is available for distribution, it takes no position regarding the validity or scope of any intellectual property or other rights that might be claimed to pertain to the implementation or use of the technology described in this specification or the extent to which any license under such rights might or might not be available; neither does it represent that it has made any independent effort to identify any such rights. The OpenID Foundation and the contributors to this specification make no (and hereby expressly disclaim any) warranties (express, implied, or otherwise), including implied warranties of merchantability, non-infringement, fitness for a particular purpose, or title, related to this specification, and the entire risk as to implementing this specification is assumed by the implementer. The OpenID Intellectual Property Rights policy (found at openid.net) requires contributors to offer a patent promise not to assert certain patent claims against other contributors and against implementers. OpenID invites any interested party to bring to its attention any copyrights, patents, patent applications, or other proprietary rights that may cover technology that may be required to practice this specification.
725-
726-
# Document History
727-
728-
[[ To be removed from the final specification ]]
729-
730-
-07
731-
732-
* add pre-final draft note
733-
* update references to sd-jwt, ekyc-ida, dc api
734-
735-
-06
736-
737-
* updates to assumptions
738-
* add the multi-signed option to the DC API variants
739-
* add cose alg identifer -9 (fully specified)
740-
* clarify that DCQL applies in HAIP as defined in OpenID4VP and all REQUIRED and OPTIONAL requirements remain the same
741-
* add reference to ECCG Agreed Cryptographic Mechanisms 2.0
742-
* require x5c header in the OID4VCI Appendix D key attestation
743-
* require A256GCM and A128GCM for verifiers
744-
* add "Non-normative Examples of Ecosystem-specific Extensions of this Specification" section
745-
* remove EU ARF bullet from scenario section as that's already better explained in scope section
746-
* add additional acknowledgements
747-
* add reference to VP & VCI privacy considerations
748-
* improve wording about ephemeral encryption keys
749-
* clarify how combined issuance of SD-JWT and mdoc is supported
750-
* rename 'Cryto Suites' section to 'Requirements for Digital Signatures'
751-
* consistently use 'this specification' rather than 'document' or 'profile'
752-
* include links to the relevant sections in the ecosystems considerations section
753-
* clarify which requirements apply to wallet or verifier in W3C Digital Credentials API section
754-
* make 'Ecosystem' a defined term
755-
* clarify requirements for issuer-initiated / wallet-initiated issuance support
756-
* clarify that digital sig section applies to jwt proof type too
757-
* replace 'Annex' with 'Appendix' when referring to VCI/VP
758-
759-
-05
760-
761-
* mandate support for same device flow for redirect-based OpenID4VP
762-
* add Ecosystem guidance section
763-
* change wallet attestation format from mandatory to recommended
764-
* update crypto suites to require at least ECDSA w/ P-256 and SHA-256 for verifying signed artificats; and made Ecosystem-specific exceptions for crypto suites and hash algorithms if certain criteria is not met
765-
* removed intent_to_retain mandatory
766-
* add small note about signed requests
767-
* clarify batch issuance requirements
768-
* remove text about `iat` and `exp` in JWT claims
769-
* resolve contradictory text about key attestation support requirements
770-
* add "Requirements Notation and Conventions" section
771-
* remove requirement that SD-JWT `iss` is a https url
772-
* add section about the OIDF conformance tests
773-
* add implementation considers around browser/OS limitations
774-
* combine text about Ecosystem profiling of X.509 certifications
775-
* add guidance around key sizes
776-
* require wallets (that render images from credential metadata) to support png and svg, and data: and https: urls
777-
* clarity text around flows that are defined in this specification
778-
* add requirement on status list index uniqueness
779-
* add recommendation that SD-JWT VC validity period is limited then it must use `exp` or a token status list
780-
* explain intent of 'high assurance' in document title
781-
* require compliance with (most of) FAPI2 Security Profile for VCI
782-
* add requirement that, if implementing mdoc revocation, one of methods defined in 2nd edition draft of ISO 18013-5 must be used
783-
* update editors/contributors
784-
785-
-04
786-
787-
* update etsi tl and DC API references
788-
* update VP & VCI references to be to 1.0 Final
789-
* add separate custom url schemes for issuance and presentation to replace the haip:// scheme
790-
* support for haip-vp:// and haip-vci:// custom url schemes is now an Ecosystem decision
791-
* allow Ecosystems the option to use key attestations other than those defined in Appendix D of [@!OIDF.OID4VCI] in some cases
792-
* clarify nonce endpoint must be present when cryptographic_binding_methods_supported is
793-
* remove various requirements around claims present in SD-JWT VC as upstream spec covers them
794-
* require ephemeral encryption keys in VP
795-
* add note that lower assurance credentials can also be conveyed using this specification
796-
* add note on verifier certificate profiling
797-
* added support for credentials without cryptographic holder binding
798-
* mandate support for aki trusted_authorities method
799-
* remove presentation exchange reference since it was removed in openid4vp
800-
* Authorization Server and Credential Issuer must support metadata
801-
* x509_san_dns & verifier_attestations client id prefixes are no longer permitted, x509_hash must be used
802-
* x.509 certificates are now the mandatory mechanism for SD-JWT VC issuer key resolution
803-
* `x5c` header in Status List Token must be present
804-
* clarify that Wallet Attestations must not contain linkable information.
805-
* add signed Issuer Metadata
806-
* require key attestation for OpenID4VCI
807-
* clarify text regarding mdoc specific parameters
808-
* add small note that establishing trust in and retrieving root certs is out scope
809-
* update wording from Client Identifier Scheme to Client Identifier Prefix #182
810-
* fix reference to ARF #177
811-
* remove old link in section 8 & clarify a note on claim based binding in OpenID4VP in HAIP #183
812-
* Clarify clause 4.1 statement #169
813-
* add a list of all specifications being profiled #145
814-
* say something about DPoP nonces
815-
* refactor to separate generic and SD-JWT clauses
816-
* add support for ISO mdoc isssuance
817-
* add support for ISO mdoc when using redirect-based OID4VP
818-
* remove requirement to support batch endpoint (it was removed from OID4VP)
819-
* remove SIOPv2 (webauthn is now the recommended way to handle pseudonymous login)
820-
* prohibit self-signed certificates for signing with `x509_hash`
821-
* trust anchor certificates must not be included in `x5c` headers
822-
823-
-03
824-
825-
* Add initial security considerations section
826-
* Update notices section to match latest OIDF process document
827-
828-
-02
829-
830-
* Mandate DCQL instead of presentation exchange
831-
* Refactor HAIP and add details for mdoc profile over DC API
832-
* Add specific requirements for response encryption
833-
* Add SessionTranscript requirements
834-
* Update OID4VP reference to draft 24
835-
836-
-01
837-
838-
* Remove the Wallet Attestation Schema and point to OpenID4VCI instead
839-
* Rename specification to enable non-SD-JWT credential formats to be included
840-
* Require encrypted responses
841-
* Remove reference to `client_id_scheme` parameter that no longer exists in OpenID4VP
842-
* Refresh tokens are now optional
843-
844-
-00
845-
846-
* initial revision

0 commit comments

Comments
 (0)