Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

2.2.1 Issue Signed Statement. #24

Open
roywill opened this issue Jul 25, 2024 · 3 comments
Open

2.2.1 Issue Signed Statement. #24

roywill opened this issue Jul 25, 2024 · 3 comments
Assignees

Comments

@roywill
Copy link

roywill commented Jul 25, 2024

Are we asserting that the authentication identity to the end point is the identity to sign the content with? I think we need to clarify that this can be completely different. I do question why we need to specify a validFrom date?

@JAG-UK
Copy link
Contributor

JAG-UK commented Jul 26, 2024

Are we asserting that the authentication identity to the end point is the identity to sign the content with?

This should be clarified/specified indeed.

Given the context of this endpoint being environments that can't sign their own Statements, the credential can't be 1:1 equivalent to an Issuer at a deep technical/cryptographic level. Therefore some logic has to be applied in the endpoint to convert the authenticated API client into a SCITT Issuer.

Given that, it seems reasonable to leave it fairly open, for example by adding:

"

  • The Transparency Service SHOULD use a different Issuer identity for each different API client
  • The Transparency Service SHOULD use the same Issuer identity for every call made by the same API client
    "

This language is slightly sloppy but YKWIM.

@JAG-UK JAG-UK self-assigned this Aug 6, 2024
@SteveLasker
Copy link
Collaborator

The example in https://ietf-wg-scitt.github.io/draft-ietf-scitt-scrapi/draft-ietf-scitt-scrapi.html#section-2.2.1 should be updated to not be a W3C credential

@achamayou
Copy link
Contributor

I have proposed in #53 that we drop this endpoint altogether, and stay focused on interoperability of the Transparency Service itself, which can be composed with any number of signing mechanisms, local or remote.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

4 participants