Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Secure Area Interface: add OpenID4VCI KeyAttestation format option #852

Open
paulbastian opened this issue Jan 27, 2025 · 1 comment
Open

Comments

@paulbastian
Copy link

Secure Area Interface already defines a key attestation in X509 format. OpenID4VCI defined a key attestation in JWT format. Could we add this as a possible return option?

@davidz25
Copy link
Contributor

davidz25 commented Feb 3, 2025

I'm not fundamentally opposed to it but in my mind there's a separation of responsibilities here that this would violate. In my view we have the following actors

  • W: The wallet provider who provides native wallet apps (Android, iOS, etc) along with a proprietary backend service.
  • I: The issuer, who issues identity credentials to W.
  • C: The Cloud Secure Area operator who provides Cloud HSM services to wallets

In some cases C and I are the same entity (perhaps with some level of barrier to prevent collusion), in other cases it's W and C, and in some cases they are completely separate.

I guess I'm trying to say that the logical actor to provide these key attestations would be the Wallet Backend. Thoughts?

That said, I'm not opposed to adding it as an option to the KeyAttestation class. The question here is how we would represent the attestation? We designed KeyAttestation so it's easily serializable so it would have to be something relatively lightweight that we can serialize into CBOR. Cc @sorotokin

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants