- From: Oliver Terbu <oliver.terbu@spruceid.com>
- Date: Mon, 20 Feb 2023 18:15:07 +0100
- To: George Lund <george.lund@digital.cabinet-office.gov.uk>
- Cc: Taylor Kendal <taylor@learningeconomy.io>, Manu Sporny <msporny@digitalbazaar.com>, W3C Credentials CG <public-credentials@w3.org>
- Message-ID: <CAP7TzjBt0=ybebeuBQaisAoutUMhKB9LO4bg2bx6HeLPVjrnfA@mail.gmail.com>
Thanks George, that makes sense. I also agree that evidence should not contain all the info from a passport in case a passport was checked to make certain claims. +1 for aggregating that information as much as possible. On Mon, Feb 20, 2023 at 5:47 PM George Lund < george.lund@digital.cabinet-office.gov.uk> wrote: > Yes, I think you're right. We don't have any current plans to represent > authentication level in the presentation layer, because our model relies > for authentication on a single OpenID Connect provider. This is a > complication we definitely don't need right now! > > In fact, even for identity confidence, our presentation layer summarizes > the evidence into a Vector of Trust for identity confidence, because for > data protection reasons, the detail of exactly how an identity was proven > (in the original verifiable credentials) is simply too much information to > share. > > (The technical way we're doing that is to encode a "vot" claim into our VC > JWTs; if we were not using JWTs, then I'd imagine having that as a property > under "evidence" - this mapping isn't supported by any specification I know > of except our own, but feels a practical response to the constraints we're > operating with.) > > George > > > On Mon, 20 Feb 2023 at 15:56, Oliver Terbu <oliver.terbu@spruceid.com> > wrote: > >> Thanks George for that perspective, I have some questions below... >> >> On Mon, Feb 20, 2023 at 4:47 PM George Lund < >> george.lund@digital.cabinet-office.gov.uk> wrote: >> >>> For even more nuance (and I don't yet have much reference material to >>> send you on this, but I hope to at some point), folks might be interested >>> in the GOV.UK One Login perspective. >>> >>> For GOV.UK One Login, we interpret "evidence" as being evidence of the >>> checks that contributes to identity confidence per our Good Practice Guide >>> 45 (corresponding to IAL). But this *includes* recording the verification >>> process, which might have been biometric, that tied the identity to the >>> person in the chair when it was originally confirmed. >>> >> >> This makes sense. >> >> >>> >>> >> >>> Authentication - corresponding to AAL, but in our world defined by Good >>> Practice Guide 44 - is never (at present) baked into a verifiable >>> credential. It might one day be expressed at the presentation level, but >>> right now we're solely using Vectors of Trust >>> <https://www.rfc-editor.org/rfc/rfc8485.html>, as that maps well with >>> our authentication systems, which use OpenID Connect. >>> >> >> If you use a federated identity model, then there is no need to >> necessarily have the authentication (confirmation method) baked in. I >> agree. I believe in your case you trust the GOV.UK One Login provider to >> authenticate the user before the VCs (not a VP) are sent to the relying >> party. If you change to a model where you have the authentication at the >> presentation level, then the issuer will need to associate the confirmation >> method in the VC. For example, the verifier could then verify the signature >> of the VP (e.g. data integrity proof) to verify the confirmation method >> that was declared in the VC by the issuer. >> >> >>> >>> George >>> >>> >>> >>> >>> >>> On Mon, 20 Feb 2023 at 13:34, Oliver Terbu <oliver.terbu@spruceid.com> >>> wrote: >>> >>>> I forgot to mention that AAL is about the presenter and to protect >>>> against identity theft, fraud, forgery, cloning, replay attacks and so on >>>> etc. whereas IAL is about the identification process and the >>>> trustworthiness of the claims. >>>> >>>> On Mon, Feb 20, 2023 at 2:30 PM Oliver Terbu <oliver.terbu@spruceid.com> >>>> wrote: >>>> >>>>> Hey all, >>>>> >>>>> First of all, thank you Manu for the summary. >>>>> >>>>> Nevertheless, Paul Bastian (Bundesdruckerei, Federal Printing House of >>>>> Germany, co-author of RWOT Holder Binding paper and invited to the F2F >>>>> session online) and I (led the Holder Binding session and presented the >>>>> slides) wanted to give our interpretation of what was agreed during the >>>>> session, what holder binding is, what it not is and what are the next >>>>> steps. >>>>> >>>>> Please see our comments below... >>>>> >>>>> *From:* Manu Sporny <msporny@digitalbazaar.com> >>>>>> *Sent:* Saturday, February 18, 2023 8:57 AM >>>>>> *To:* W3C Credentials CG <public-credentials@w3.org> >>>>>> *Subject:* Outcome of 2023 Miami Verifiable Credentials WG Meeting >>>>>> >>>>>> Holder Binding >>>>>> -------------------- >>>>>> >>>>>> * There was consensus that "Holder Binding" was the wrong terminology >>>>>> and the group does not want to use it going forward. There seemed to >>>>>> be consensus forming around the term "assurance" plus another word >>>>>> like "identity assurance" or "assurance method"... further >>>>>> bikeshedding will be done on this terminology. >>>>>> >>>>> >>>>> [Paul/Oliver] While there was consensus that the group does not want >>>>> to adopt the term “Holder Binding”, the group was mostly against using the >>>>> term “Identity Assurance”. While the term assurance was being discussed the >>>>> group felt most comfortable with the term “confirmation method” but this >>>>> term is up for bikeshedding once we have a concrete PR that introduces that >>>>> feature. The RWOT paper used the term “Identifier Binding” which would be >>>>> another option. Also the term “subjectEvidence” was brought up. >>>>> >>>>> >>>>>> >>>>>> * For use cases where the issuer would like to convey the mechanism >>>>>> that it used to perform identity proofing, the `evidence` field could >>>>>> be used. Expressing statements like: "I checked a passport that had >>>>>> these fields and a photo against the individual standing in front of >>>>>> me, in person, before I issued this credential" seemed like a bad fit >>>>>> for`credentialSubject`, but a good fit for `evidence`. >>>>>> >>>>> >>>>> >>>>> [Paul/Oliver] The “evidence” in our opinion describes how the issuer >>>>> got the data or checked the identity of the holder/subject which >>>>> corresponds more to the NIST IAL (Identification Assurance Level). However, >>>>> the mechanisms how the issuer got/checked the data, might not be available >>>>> for the verifier or the issuer offers a simpler mechanism (so verifier >>>>> doesn’t have to check all the evidence themselves, e.g., a utility bill). >>>>> In the confirmation method the issuer describes one or more mechanisms how >>>>> a verifier can confirm/authenticate a subject/holder. This corresponds to >>>>> NIST AAL (Authentication Assurance Level). Therefore, the confirmation >>>>> method can be independent from issuer evidence. The following are some >>>>> examples for evidence and confirmation methods. Note, that both don't have >>>>> to be always the same. It might be even fine to have a confirmation method >>>>> property without a corresponding evidence and vice versa. >>>>> >>>>> Evidence: >>>>> >>>>> - >>>>> >>>>> Utility bill >>>>> - >>>>> >>>>> Passport >>>>> - >>>>> >>>>> Internal Government registry >>>>> - >>>>> >>>>> DID Auth / Public Key >>>>> >>>>> >>>>> Confirmation method: >>>>> >>>>> - >>>>> >>>>> DID Auth / Public Key >>>>> - >>>>> >>>>> Portrait picture >>>>> - >>>>> >>>>> Passport reference >>>>> >>>>> >>>>> >>>>> By including a confirmation method claim in the `credentialSubject`, >>>>> the issuer of the VC declares that the presenter controls a particular >>>>> confirmation method and that the verifier can confirm that the presenter >>>>> has control of that confirmation method. The issuer binds the claims about >>>>> the subject to the confirmation method. The confirmation method can have >>>>> different types and each type can refer to different claims and properties >>>>> in VCs such as the `evidence`, `credentialSubject.id` (in case of DID >>>>> Auth), or something else. >>>>> >>>>> Confirmation Methods are more than just DIDs and Keys. They should >>>>> offer mechanisms for different scenarios (on-site vs remote, attended vs >>>>> unattended) for the same credential. Moreover they better describe what >>>>> people today see as “obvious” and implicit by making the current approach >>>>> with DID/credentialSubject.id more explicit and offer additional means to >>>>> authenticate the subject/holder. >>>>> >>>>> Example (not normative): >>>>> >>>>> ... >>>>> >>>>> "confirmationMethods": [ { >>>>> >>>>> //refers to credentialSubject.id and can be defined >>>>> //as verify the VP and that the VP is signed with linked DID >>>>> >>>>> "type": [ "SubjectDidAuthenticationConfirmation2023" ] >>>>> >>>>> }, { >>>>> >>>>> "type": [ "PassportConfirmation2023" ] , >>>>> >>>>> "nationality": "NL", >>>>> >>>>> "passportNumber": 012345678, >>>>> >>>>> "contentHash": "3338be69 ... 2398f392" >>>>> >>>>> }, { >>>>> >>>>> "type": [ "BiometricTemplateConfirmation2023" ] , >>>>> >>>>> "portrait": >>>>> "data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAA8sAAAJl..." >>>>> >>>>> }, { >>>>> >>>>> "type": [ "BiometricTemplateConfirmation2023" ] , >>>>> >>>>> "linkedPortrait": "credentialSubject.userPicture" //refers to >>>>> existing claim >>>>> >>>>> }] >>>>> >>>>> … >>>>> >>>>> ConfirmationMethods can also be used with a potential issuee/holder >>>>> property if required. >>>>> >>>>> >>>>> >>>>>> >>>>>> * For use cases where the issuer would like to shift liability or >>>>>> constrain what the verifier does, such as "If you don't check the >>>>>> individual's passport before you accept this VC, then you accept all >>>>>> liability" were identified as problematic to support as we'd need a >>>>>> lot of input from legal counsel and there were doubts that the sort of >>>>>> liability shifting some were expecting was possible. >>>>>> >>>>> >>>>> [Paul/Oliver] The verifier does not need to trust information issued >>>>> by the issuer, if they choose to ignore expirationDate, that’s fine and the >>>>> same holds true for confirmation methods. So the confirmation method gives >>>>> guidance to the verifier, because the issuer knows best how to interpret >>>>> the VC data. >>>>> >>>>> >>>>>> * There will be a concrete pull request offered based on the >>>>>> discussions at the F2F. >>>>>> >>>>> >>>>> [Paul/Oliver] For the PR, we said, we will add the base properties >>>>> for the confirmation methods to VCDM (type, potentially realm) and then we >>>>> will define 1-2 concrete types, e.g., DID Auth, Biometric Template. For the >>>>> use cases document, we also agreed it makes sense to add language that >>>>> describes the importance of strong authentication, e.g., MFA. >>>>> >>>>> Thanks, >>>>> Oliver & Paul >>>>> >>>> >>> >>> -- >>> George Lund >>> Technical Architect >>> GOV.UK One Login >>> Government Digital Service >>> >>> >>> > > -- > George Lund > Technical Architect > GOV.UK One Login > Government Digital Service > > >
Received on Monday, 20 February 2023 17:15:32 UTC