- From: steve capell <steve.capell@gmail.com>
- Date: Mon, 23 Aug 2021 09:08:09 +1000
- To: Manu Sporny <msporny@digitalbazaar.com>
- Cc: W3C Credentials CG <public-credentials@w3.org>
- Message-ID: <CAEMprt+F1=hL_0tR5LA11PgwczPL6iSXmLdz5wZuLR2NxFPaLQ@mail.gmail.com>
thank you manu, That table is helpful and does clarify the scope. There is one common use case (for us) that I'm not sure is represented - or whether it needs to be. - Some certifying authority (eg chamber of commerce) that is accredited by a national authority (eg customs) issues a bearer token style VC about a *thing* (eg "we attest that *consignment xyz* meets origin criteria abc"). The certificate is given to the exporter, who passes it to the freight forwarder, who sends it to the importer, who gives it to the customs broker, who presents it to the importing country customs. Meanwhile the importer (buyer) also passed the same certificate to their bank as part of a letter of credit application. - There are LOTS of parties along this chain, each of which may need to verify the certificate. Some will have their own verifier service (eg the importing customs authority) but many will not. Therefore the exporting regulator (who is motivated to facilitate exports from their economy) hosts a free and anonymous verifier service. Anyone can give it a VC without any authentication or authorisation and the service will verify it. The service might be limited to certain credential type and protocols but will verify those credentials irrespective of who is the issuer and who is the verifier. One day maybe everyone will have a verifier service built into their system, but until then there is a bootstrapping problem where the issuing economy cant go digital because somebody along that supply chain might need to verify the certificate and, without some readily available verifier service, might demand paper originals. So, would this free / anonymous verifier service contradict the verifier->verifier service row in your spreadsheet that says authorisation is mandatory? On Mon, 23 Aug 2021 at 00:13, Manu Sporny <msporny@digitalbazaar.com> wrote: > On 8/21/21 7:26 PM, steve capell wrote: > > * I'm unclear about which VC-API interactions should require > authorisation > > and which should not. > > There is clarity on most, but not all, of the endpoints we have defined so > far > wrt. authorization. There is a column here marked "Authorization > Required?": > > > https://docs.google.com/spreadsheets/d/1hlevKRxCXsJBWvJTkL30nZVp8cpF26aY3PJqzuHtIZE/edit#gid=0 > > To be clear, we're talking exclusively about authorization (not > authentication, e.g., DIDAuth -- that's out of scope). > > > * I can imagine that an issuer will certainly want to authorise a > subject > > that is requesting a VC. "yes, that's the john smith we know, here's > your > > digital drivers license" > > The term I believe you meant to use was "authenticate", because > "authorization" is subtly orthogonal. So, let's make sure we're talking > about > the same thing first: > > https://stackoverflow.com/a/6556548 > > "yes, that's the john smith we know" is authentication > > "and given that it's the john smith we know, he is authorized to receive a > digital driver's license" is authorization. > > "here's your digital drivers license" presumes some sort of authorization > took > place. Providing the digital drivers license happens AFTER authorization > was > successful. > > > * But I cant imagine why or how a verifier will want to authorise John > > when he presents his license as proof of age in a bottle shop because > > there's very unlikely to have been any a-priori registration of either > john > > or his chosen system to the bottle shop system. Instead I'd expect an > > anonymous access "yes, that's a valid drivers license and, yes, the photo > > on it looks like you sir, here's your vodka". > > Again, "yes, that's a valid drivers license and, yes, the photo on it looks > like you sir" is authentication. > > "and given that you're above the age of ??, you are allowed to purchase > alcohol" is authorization. > > "here's your vodka" presumes some sort of authorization took place. > > You're not far off, but we do need to make sure we're very clear about what > we're talking about "authorization", and what's not necessarily the focus > of > the current discussion "authentication". > > > would it be possible to see a diagram of VC-API interactions with some > > indication of which require auth and which dont? > > Column G here: > > > https://docs.google.com/spreadsheets/d/1hlevKRxCXsJBWvJTkL30nZVp8cpF26aY3PJqzuHtIZE/edit#gid=0 > > The Use Cases team is working on some more detailed data flow diagrams to > elaborate upon the matter further. I expect we're several weeks of from > those > being done. > > Did that help, Steve? > > -- manu > > -- > Manu Sporny - https://www.linkedin.com/in/manusporny/ > Founder/CEO - Digital Bazaar, Inc. > News: Digital Bazaar Announces New Case Studies (2021) > https://www.digitalbazaar.com/ > > > -- Steve Capell
Received on Sunday, 22 August 2021 23:08:34 UTC