-
Notifications
You must be signed in to change notification settings - Fork 14
vc-jws #12
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
To be clear, your dream is to decouple the VC body from the way that it's secured? A consequence of this is that we wouldn't be using standard JWT claims such as "iss", "iat", and "exp" to express these values, but other claim names with sometimes different syntax. I know that @nadalin has views on that, per his comments at TPAC and #14. |
I'm a strong -1 to must of his comments on #14. My dream is to allow developers to use JOSE to protect the VCDM core data model which is JSON-LD, and can therefore be trivially secured with JOSE. I believe the JWT mapping is complexity that many developers have already failed to implement consistently, and which is not necessary. I think we should be allowed to secure JSON-LD in the following ways:
There are lots of use cases where I don't care about JWT, and I just want to use a simple JWS for a large VC, and JWE to encrypt its presentation. To be clear, I don't think folks should be prevented from securing VCDM with JWT, I think it should not be the only legal way to secure the VCDM with JOSE. |
per JWS/JWE specs, what is signed/encrypted as JWS/JWE does not have to be a JWT.
I don't have a strong preference, but if we can agree on the usage of JWT claims, Option 2 would be more consistent and less complicated. |
I was reading this section yesterday: https://www.rfc-editor.org/rfc/rfc7519#section-5.2 There are proposals that have gone to the list and which have not been discussed yet by the WG, they are mentioned here: My proposed solution would be: Add a section to VC-JWT, that describes how to secure The only place that normative extensions would apply would be the treatment of the header... and it should be clear how that token is different than a "vc-jwt" under 1.1. |
Maybe I have an idea. Will try to finish it next week. |
This issue should be closed, this is what V2 does now. |
Marked pending close over 1 week ago, closing. |
I have a dream:
That one day verifiable credentials are flexible enough to be used with any popular signing, encryption, or proving system.
The text was updated successfully, but these errors were encountered: