-
Notifications
You must be signed in to change notification settings - Fork 20
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[SD-JWT] High Assurance Profile of OpenID4VC with SD-JWT-VC #3
Comments
Regarding the differences between the IT Wallet profile for PID issuance and the OIDC4VC-HAIP, we provide the following summary based on our knowledge.
|
re 1: Can you please elaborate on (1)? Also, do you support credential offer with authz code? |
1 - in the current stage, we didn’t consider the pre-authorized code flow as it opens the door to phishing attacks and it still demands further security analysis to be sure that it doesn’t open doors to other security problems. Using the PIN could mitigate the replay attack (under a strong trust model assumption), but it still could be not enough for some social engineering attack scenarios (PIN phishing). The mitigation for this could be providing a mechanism to take confirmation from the user (Holder) - by showing the user the endpoint of the credential issuer - and, if the user confirms the endpoint, it will forward the PIN. Our concern is that the user is not always aware of what they click and may not pay too much attention to the final endpoint. 3 - we already mentioned to you how our solution can avoid the replay here (#33 (comment)). It is possible to use the private_key_jwt at the token endpoint because at token request the AS/OP is already aware of the wallet instance client_id and the relevant public key (communicated in PAR request). |
HAIP mandates the implementation of auth code flow, while the pre-authz code flow is out of scope for us we look forward for an implementation of the credential offer flow using the auth code flow |
@peppelinux why do you prefer authz code over pre auth code? |
pre-authz code flow,
auth code flow,
|
Moved here |
Issuance and presentation should be designed according to the drafts below:
https://github.com/vcstuff/high-assurance-profile
https://github.com/vcstuff/draft-terbu-sd-jwt-vc
The text was updated successfully, but these errors were encountered: