-
Notifications
You must be signed in to change notification settings - Fork 20
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Security considerations #444
Security considerations #444
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
we have creates some brand new issues and also provides additional editorial suggestions
|
||
.. note:: | ||
|
||
The focus of the analysis is the compliance of the design choices in the IT Wallet specification w.r.t the OpenID4VC protocols. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
please don't use acronyms like w.r.t., explode it for better readability
In the IT Wallet specification, the **redirect_uri** is registered and validated beforehand during the Verifier onboarding using OpenID Federation. During the presentation | ||
phase, the Wallet is able to validate this value by verifying the OpenID Federation Trust Chain related to the Verifier. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
We need ref to the section describing how openid federation is used, therefore using the refs to the section about the trust infrastructure and removing all these explicit mentions to openid federation.
in the trust infrastructure section we use openid federation and we'll introduce all the required harmonization with x.509 during the milestone 0.9.0
for clarity, we can use example "such as using openid federation ... as defined ..."
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
See #447
Co-authored-by: Giuseppe De Marco <[email protected]>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
please consider with attention my change suggestions
Co-authored-by: Giuseppe De Marco <[email protected]>
Co-authored-by: Giuseppe De Marco <[email protected]> Co-authored-by: m-basili <[email protected]>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
This PR closes #125
It consists of a new section "Security and Privacy Considerations" that provides an informal security analysis of the IT Wallet specification by analyzing the compliance with the security and privacy requirements identified in "Security and Trust in OpenID for Verifiable Credentials Ecosystems" specification.
For each requirement, we report its description and specifies whether the IT Wallet specification satisfies the requirement
(fully satisfied, partially satisfied, and not satisfied) and how/why. In case of partially or not satisfied, we provide also some tips on how to be compliant.
Editorial Note: Currently, we provide each requirement as a subsection in order to better navigate the analysis. However, this causes a long index. We should evaluate this aspect together.