You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: openid4vc-high-assurance-interoperability-profile-1_0.md
+10-8Lines changed: 10 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -326,13 +326,15 @@ Wallet implementations using the key attestation format specified in Annex D of
326
326
327
327
This document intentionally leaves certain extensions for ecosystems to define, in order to enable broad compatibility across differing or even conflicting requirements. These include:
328
328
329
-
- Which Credential format to support across issuance and presentation.
330
-
- Whether to use Signed Issuer Metadata or not.
331
-
- How to send Credential Offer.
332
-
- Key attestation formats.
333
-
- X509 certificate profiles.
334
-
- Whether to use DC API, Redirects with custom URL schemes and/or Redirects with claimed "https" scheme URIs for presentation.
335
-
- Support or restriction of additional cryptographic suites and hash algorithms.
329
+
- Whether to adopt the Presentation profile, Issuance profile, or both
330
+
- Which Credential format to support across issuance and presentation
331
+
- Whether to use Signed Issuer Metadata or not
332
+
- How to send Credential Offer
333
+
- Which Key attestation format to use
334
+
- Which Wallet attestation format to use
335
+
- X509 certificate profiles
336
+
- Whether to use DC API, Redirects with custom URL schemes and/or Redirects with claimed `https` scheme URIs for presentation
337
+
- Support or restriction of additional cryptographic suites and hash algorithms
336
338
337
339
Below are two non-normative examples illustrating how an ecosystem may define the above elements to achieve its specific goals and preferences.
338
340
@@ -349,7 +351,7 @@ Making these choices maximizes interoperability between the parties in the ecosy
349
351
350
352
### Existing Curve Requirements
351
353
352
-
This ecosystem places importance on maintaining backward compatibility with already issued cryptographic curves. To achieve this, the ecosystem could define the following:
354
+
This ecosystem places importance on maintaining compatibility with already issued cryptographic curves. To achieve this, the ecosystem could define the following:
353
355
354
356
- Verifiers MUST support all curves from Cipher Suite 1 as listed in table 22 of (@!ISO.18013-5).
355
357
- Verifiers MUST support all hash algorithms in table 21 of (@!ISO.18013-5).
0 commit comments