-
Notifications
You must be signed in to change notification settings - Fork 21
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Clarification on use of 'format' claim in authorization_details #275
Comments
@vafeini Your comment assumes that a verifiable credential requested by If the DCP WG thinks that a verifiable credential requested by When I saw the |
@TakahikoKawasaki Indeed this might be the reason, though in this case how would a wallet know about the issuer'a capability to issue such a credential? |
@vafeini If the OID4VCI specification allows wallets to request an ad hoc verifiable credential that is not listed in Those who believe "all the verifiable credentials the credential issuer can issue should be listed in Personally, I don't recommend introducing the |
I don't think that the intention of VCI is to allow a wallet to place requests for credential that are not advertised via issuer's meta-data. It's not only the format vs Frankly, I believe that with draft 13:
With these changes, all the important entities of the protocol will be expressed in terms of
This offers a clear path for wallet's when processing a credential offer and issuer's when handling the relevant issuance process. |
@babisRoutis It seems that you have noticed the issue reported by Issue #175 ("Wallet can't always identity whether key proof is required") and the feature of enforcing a key proof cannot be implemented. 😅 Yes, the |
With regards to #175 I think there is a problem for the issuer, as well. In particular when should they provide the pair of Personally, I made the simplification to always return those attributes and let the meta-data convey the requirement of using proofs or not. |
The format option was only recently re-added - see #217 and the related PR #219 for the background. The intention is that RAR can be used to request non-advertised credentials, as was possible in older drafts. |
As I stated here I strongly support the idea of removing format again and this discussion is very valuable, pointing in the same direction. |
@paulbastian let me assure you, I didn't copy your comment 😄. @jogu Thanks for the insight.
For the out-band knowledge, I think wallet can grab issuer's meta-data and then, rather easily, locate the Given that draft 13 introduces, anyway, several breaking changes (totally justified IMO), it sounds somehow strange to keep a redundant feature just because this was the case in some older draft. It seems to me like unnecessary complexity for both |
The point was that the issuer's metadata won't contain a relevant credential_configuration_id as in some cases the issuer's want to be able to not publicly disclose (in their public metadata) the types of credentials they issue. |
Could never have imagined that! Even in this case, why assume that wallet is aware of a format plus one of doctype/vct/types and not just a credential_configuration_id (which - for whatever reason - issuer doesn't disclose)? |
labelling pending-close and closing in a week, unless objections, because we discussed this extensively especially in the context of this PR #392, and I beleive the outcome was consensus to keep both format and crededential_configuration_ids in authorization_details. I could imagine, It would be up to HAIP to mandate one over the other, if ever. |
It seems to me that there is a clear majority in this issue that thinks otherwise? |
Draft 13 specifies that authorization_details, among other claims, it must contain either
or
I was wondering if both flavors are needed.
In my understanding when
format + profile_specific_extra_attribute
is used it can only point to a credential configuration supported from issuer and thius advertized in its metadata. It cannot be used to request arbitrary credentials outsidecredential_configurations_supported
. If this is the case only using thecredential_configuration_id
flavor of authorization_details is enough to identify specific credential supported by issuer.Most probably I am missing something :D , can you provide your view on that?
The text was updated successfully, but these errors were encountered: