- From: <meetings@w3c-ccg.org>
- Date: Tue, 3 Jun 2025 15:15:47 -0700
- To: public-credentials@w3.org
- Message-ID: <CA+ChqYdCBrG4P7DgpdV7qcWzfWFXdu7w5sAvs+c5DuNKHUN4+g@mail.gmail.com>
W3C VC API Community Group Meeting Summary - 2025/06/03 *Topics Covered:* - *Community Developments & "No Phone Home" Discussion:* The group discussed the implications of the "No Phone Home" initiative on the VC API, specifically regarding status list retrieval and OATH. Consensus was that addressing this requires a broader discussion within the VCWG, focusing on the core VC spec and potentially exploring proof of non-revocation methods as an alternative to relying on URLs for revocation checks. The group agreed that revocation checks should be rare and authorization mechanisms should restrict access to revocation status. Short-lived credentials were highlighted as a way to mitigate concerns. - *Pull Request Review and Merging:* Two pull requests were reviewed and merged. PRs focused on clarifying the description of verifiable credentials and improving the overall text flow and consistency of the specification document. - *Uncategorized Issue Triage:* The group reviewed and categorized several open issues, assigning tasks and determining effort levels. Key issues included updating AML schemas, creating a use case for complex workflows (EMT card/incident badge flow), adding YAML for interaction endpoints, and adding a ZCAP example for securing exchanges. One issue regarding challenge verification metadata was deemed mostly resolved for credential verification but needing attention for presentation verification. Another issue concerning support for additional media types beyond application/json was marked as pending closure, acknowledging that while interoperability requires application/json, the spec does not prevent other types, but adding support for other types would likely need to happen in a future version. *Key Points:* - The "No Phone Home" discussion highlighted the need for improved guidance on privacy-preserving revocation mechanisms within the broader VC ecosystem. - Several pull requests were successfully merged, improving the clarity and consistency of the VC API specification. - The group made significant progress in triaging and assigning outstanding issues, paving the way for the specification's handover to the VCWG. - The group decided to defer discussion of certain advanced features, such as ZCAP integration and additional media type support, to future iterations of the VC API specification. - The group agreed that the VC API should not explicitly mandate or prohibit the use of media types beyond application/json, leaving this to the discretion of implementations and emphasizing the importance of interoperability using application/json. Text: https://meet.w3c-ccg.org/archives/w3c-ccg-vc-api-2025-06-03.md Video: https://meet.w3c-ccg.org/archives/w3c-ccg-vc-api-2025-06-03.mp4 *VC API - 2025/06/03 14:58 EDT - Transcript* *Attendees* Benjamin Young, Dave Longley, Eric Schuh, Joe Andrieu, John's Notetaker, Kayode Ezike, Manu Sporny, Parth Bhatt, Ted Thibodeau Jr *Transcript* Manu Sporny: All right, let's go ahead and get started. our agenda, welcome everyone. This is the verifiable credentials API call. the agenda today is to go over some community developments, process some pull requests, and classify any, remaining issues that we need to classify. I think we've gone through and classified most of yeah, that's a good idea. We haven't done VP requests yet. So, we'll add that to the agenda and go through classifying any other updates or changes changes to the agenda? Anything else we should discuss today? Manu Sporny: we'll also add classifying the verifiable presentation request items. then let's go ahead and go into community developments. as folks saw, there's this new no phone home discussion that has opened on the credentials community group mailing list. the link is, no phone.com. there's some interesting stuff being discussed that may impact VC API and some guidance we want to provide in the verifiable credential API namely around status list retrieval and potentially OHTP. Manu Sporny: we might want to provide some guidance in the spec or at least point to other places where we provide guidance on how to keep your K anonymity set high if you're an issuer. and then how to combat nefarious issuers with it. statements there. I won't dwell on it too much, but lots of really big privacy organizations signed on to it as long as a number of people from the community including a number of people on this good to see so many people caring about privacy. So I don't know if we raise issues now. Manu Sporny: Actually, I guess let's have a quick discussion about this on whether or not we need to raise issues or if it's kind of not really up to the BC API. some thoughts on that what we could do is we could provide stronger guidance on TP and status list publication but I think that's largely largely most of the other stuff is kind of covered in the status list mechanisms we could talk a bit more about static resources that VC API 00:05:00 Manu Sporny: I service provides and try to ensure that it's not or pushes those out to CDNs… Manu Sporny: but again it feels like that should probably go into the core VC spec or a bit string or status list specification not necessarily VC API. Joe, go ahead. You're on the queue. Joe Andrieu: Plus one to that last note it's not clear that we need to solve this problem. Joe Andrieu: Because I think we do need to bubble up. one of the positions I'm taking is a bit counter to how you've been approaching it, Manu, which is I think proof of non-revocation is the way you deal with status checks without phone home. You have the wallet do the phone home and… Joe Andrieu: so the verifier in my opinion I would like to see them not even get the URL. I had raised that as issue in VC that you responded to and I felt we weren't going to be able to get through it in the time frame that made sense so I dropped it over there. But in light of phone home the URL that you're asking verifiers to hit is sort of very trivially rewritten so that it's a phone home mechanism. And so I think it'd be better… Manu Sporny: Mhm. Joe Andrieu: if we figured out a way to just say hey the right way to do it is for the holder perhaps in real time before the VP go and get a proof of non-revocation. And I think that cleans up the phone home thing rather well. It's not well supported yet. we know that this is a possible way to do it, but I think that's my advocacy for the next generation of VCs. Manu Sporny: Interesting. go ahead, Dave. Dave Longley: I don't know how much we want to dig into that but there are additional measures and other considerations both with that approach and what information is leaked to issuers if holders are doing that and with future… Joe Andrieu: Yep. Dave Longley: because you ended your sentence with next generation of ECS depends on which generation that one is but there's also discussion of doing ZKPS around this instead so that There might be ways to do that that sort of change the calculus as Dave Longley: Manu Sporny: So I guess so I think… Manu Sporny: what we're saying is we don't think that this group's the right place to land that discussion. almost certainly then it means that it's going to land in the VCWG and then the question is on what specification maybe it is in that the core data model needs to because it is the thing that defines the status mechanism and so maybe that's where we raised the issue. Manu Sporny: Joe, I know that you raised an issue recently. Manu Sporny: I can't recall if it was about this or something else. But we ended up closing it or something. Is that all right? Mhm. Joe Andrieu: There was one prior to candidate wreck for VCs. Joe Andrieu: You said you can do this like it it's just we still have the URL in the service endpoint for the status check. Joe Andrieu: So we didn't get rid of the URL, but you said that's not preventing the holder from doing this in practice. but we don't have a standardized way that it's understood that along with the initial VC, I'm giving a proof of non-revocation in the same VP it's technically possible to do all that. Manu Sporny: Mhm. Manu Sporny: Mhm. Joe Andrieu: We just haven't bootstrapped. Manu Sporny: Mhm. Yeah. Joe Andrieu: Hey, here's the normal standardized way that you can do it and people should expect this ability … Manu Sporny: I guess what I'm trying to ask, I think, is should we raise an issue right now about that? Joe Andrieu: I think we could. The reason I said next generation is because I think I want changes that are class 4. I do not want that URL in there and I want a way to have the URL that is communicated to the holder but not to the verifier. and… Joe Andrieu: so there are wrinkles in this layout and I think Dave probably has some other good points about other wrinkles. So, it's going to take time to work through those wrinkles. and I'm not sure we have the mandate to do it in this cycle,… Manu Sporny: Yeah. Yep. Joe Andrieu: but I'm okay with, raising the issue and saying, hey, maybe we can't address this now, but, the world is talking about this and maybe this is where we start the conversation that will flow into our next rechartering. 00:10:00 Manu Sporny: Yep. Yeah. Joe Andrieu: I mean, it'd be better if we have the arguments when it's not in the face of the charter so that when we get to the charter, we have some consensus. Manu Sporny: Yeah. I think what you're saying is start the discussion now. Joe Andrieu: Joe Andrieu: That's and knowing that we probably can't change it in this particular chartering. Manu Sporny: Yeah. Yeah. Yep. what happened? did I just Manu Sporny: There we go. not our current maintenance. Dave Longley: Yeah, another piece of this is with selective disclosure, you can just leave out that whole section already. so there might not even need to be a class 4 change and so we might just want to discuss that. Joe Andrieu: Yeah, sure. If… Joe Andrieu: if you have selective disclosure Dave Longley: Yeah, there's an additional piece of this in a number of other groups… Dave Longley: where discussion has been done where generally speaking checking revocation should be rare. It's not needed almost for most use cases. and so there's a whole discussion around that and it might just be we're having a lot of discussions around people doing revocation when maybe they just shouldn't be doing revocation in order to do revocation well. Joe Andrieu: tight. Dave Longley: With longived credentials there are a lot of updates that need to happen and that might be problematic and maybe credentials should be more short-lived in those cases. we need to have a discussion over where this matrix falls where it makes sense for a lot of revocation checks to even be happening and maybe it doesn't. It's like I feel like whenever we talk about this issue we talk about it in isolation too much for each of the individual properties. When you put it all together,… Dave Longley: I suspect you end up with a very limited set of use cases and maybe even it goes to zero where any of this actually matters because you shouldn't have been checking revocation in the first place. Joe Andrieu: Yeah, I think there's a lot of truth to that. Joe Andrieu: There's both the short-lived pattern that could get around a whole bunch of it. but also one of the shifts I'm trying to establish in our conversations at large is to move away from the expectation that revocation is a publicly accessible endpoint. when I go to the grocery store and I give them my driver's license, they do not have the right to find out if that license is revoked or not. police officers do and law enforcement and the courts do. Joe Andrieu: And so I think there is a conversation about hey revocation isn't this thing that anybody can just check. Dave Longley: Yeah. Yeah. Joe Andrieu: And so design your system so that the right parties who should have access to that potentially private information are appropriately restricted. Dave Longley: And that might not require class 4 changes either. It just me might mean more statements that say you should put authorization in front of fetching these status credentials and… Manu Sporny: Mhm. Dave Longley: only authorized parties can get them. Joe Andrieu: I agreed. Yep. But I think most people get into these debates at IW about privacy rights and whatever and it's because of this presumption that revocation isn't public. And I think we can address a lot of problems by just making it not public. Dave Longley: And I think that'll cut down on the problems, but I think some of that gap will be filled in with fears of special authorized parties doing all these extra checks. and so I think there's a number of places where we can cut down on this and it just becomes a very rare pattern. generally I think it should be a surprise to in the future. I think it should be maybe not a surprise but unexpected if most of the credentials or common credentials that you're getting come with revocation status that should probably be an uncommon thing that happens especi… Dave Longley: unless the credential is very long live longived and unless it's some kind of super high value thing again I think we need this matrix so we can understand where it even makes sense for this thing to show up. And then digital wallets can even flag things like, hey, this doesn't seem like it should have revocation on it. Joe Andrieu: And I just want to know at the same time I remember conversations and… Joe Andrieu: I think it was a Neil who was we're the federal government we will have revocation and it was hard to get him to realize that hey a short-term credential is actually more useful to you in many use cases when I'm checking in at CBP at the border I have a window in which that check-in is allowed to go from my mobile to actually my physical person going through right in that 4hour window you don't need a revocation 00:15:00 Joe Andrieu: But it was hard to get Anneil to sort of grasp that. Joe Andrieu: Yet another challenge in the conversation. Manu Sporny: Right. okay. Manu Sporny: I've raised the issue on VC data model. I think that's good enough for now and we can kind of explore that in that group and then agree that this group is probably not the right group to explore all those things. given that and thank you that was a great discussion. exactly what I was trying to figure out. next item on the agenda is processing open pull requests. we have two of them for the verifiable credential API. the first one was waiting on me to make some changes which I did earlier today. Manu Sporny: Dave, you had requested that we list the VCB potentials and you also said that we would want to say something for verification and Ted, it looks like you have made some other changes. which is fine. we can merge those in as so let me do that now. And then if folks can Okay. Dave Longley: Ed's changes just invert the order in… Ted Thibodeau Jr: Right. Dave Longley: which you talk about it. Manu Sporny: Yep. That is great as always. Manu Sporny: GitHub has a UI bug where sometimes you can zoom fix So, all of those are in. Okay. Manu Sporny: So changes made here are making sure that this object includes it verifiable credential and then Dave you wanted to make sure that we mentioned BCBs and alternate formats and Ted you fixed up the grammar and flow there which is great and I added something for verify credential here Dave Longley: I did see one change. If you scroll up with versus during. I'm trying to look over that and see if that still makes sense when we change that. Dave Longley: Yeah, that's is confusing because it's not the issuer instance that is making the call, but it implements the call. So, we might want to put that back to during Yeah,… Ted Thibodeau Jr: Maybe that's in reply, too. If we leave it open,… Dave Longley: that there could be better language than during using some kind of reply or something, but I don't know how much more we want to shut Then… Ted Thibodeau Jr: I'll get back to it in a little bit. Manu Sporny: I would like to merge this today mo mostly… Manu Sporny: because it's been hanging out there for a couple of weeks now. Dave Longley: then let's use Ted's text in reply to a single call. Manu Sporny: groups in reply to a single call. Must I don't think we usually use this language. Dave Longley: Do we want to say response not reply? What do we usually say? 00:20:00 Joe Andrieu: I like response for… Joe Andrieu: what it's worth. Manu Sporny: Yeah, I think I favor that slightly as well. Manu Sporny: Okay. then I will change Manu Sporny: All right. we have that there. And if there are no objections, I'm going to merge this. It's been out, I guess, two weeks now. I think we got everything. And if we didn't, we can always go back and do another PR. All right, that is done. All right, next PR is in Coyote. I merged yours earlier today because it was straightforward. just say Kayode Ezike: Yeah, I was gonna make a comment though. like it was prematurely merged. Kayode Ezike: It was a text that I put in there that I needed feedback on where to put it and so it was actually never included anywhere in that… Manu Sporny: No. Whoops. Manu Sporny: It was the oath 2 thing,… Kayode Ezike: but yes we might have there was an EP to address that. Manu Sporny: right? Kayode Ezike: Yes. yes up there comment … Manu Sporny: Sorry. I totally missed that. Yeah. Kayode Ezike: but even before the actual quote which is just asking what location to actually put this in because there's a few places where it could make sense but this understanding that it wouldn't necessarily be in the general authorization location because it's closer to the end point than it is to a general common authorization. Yeah. Dave Longley: Is there any reason since we're going to put it in pros as shoulds just put that into make optional properties in the schema for those two things? Dave Longley: Any reason we shouldn't just do that? Kayode Ezike: Yeah. … Kayode Ezike: so we do have the optional properties. So, you're saying just add this at that point. yeah. Dave Longley: So, in this change that just happened, did we put specifically an OOTH 2 object and a … Kayode Ezike: Configure earlier. Dave Longley: we did do that. Yeah. Okay. Kayode Ezike: Yeah. it was mostly that's just… Dave Longley: Yeah. Do we need the additional pros? Manu Sporny: I don't think we do,… Manu Sporny: but Kayode Ezike: that's the decision we came to I think when we created the issue but I don't have a strong feeling about it. Kayode Ezike: Yeah, I'm finding it out there. Manu Sporny: Yeah, I don't read this the same way,… Manu Sporny: Coyote. I think I mean, I could go either way. I don't have strong feelings about this. I mean, basically, if somebody comes back and they're I don't understand what I need to do with this. then we could, add more pros. That's typically what we do. But here it's kind of like if I were implementing some if I were implementing this and I was doing OOTH too I'd do find in the spec for OOTH and look at all the places it pops up and basically be like okay I guess this is where I put the issue config URL. Manu Sporny: I don't know if I'd need anything more than just where does it go in the object. Kayode Ezike: Fair enough. Kayode Ezike: Yeah, I think this came from the discussion about the fact that it started off nonsp specified and… Manu Sporny: Specify … 00:25:00 Kayode Ezike: then we had patient that implemented that. So we figured okay then to fit those implementation we should add this. I think that led to a discussion about okay maybe we should make it clear that we can't extend we eventually might want to expand the space of options and call that out a little bit but yeah either way I'm fine leaving it out for now though Just Yeah. Manu Sporny: I mean, you open this issue, Cody, if you feel like there's more text that would have helped you initially or at least, would have been made it much clearer, let's definitely add that. Manu Sporny: But again, I'm not hearing you say this isn't good enough. we need to do more or whatever. … Kayode Ezike: No, I think this is fine. yeah, if folks eventually want to add other types, they can I guess that'll lead to changes in spec, but for now, I think this is fine. Manu Sporny: All So we merge that and have discussion around that. And I think this one's closed. PR. All right. Manu Sporny: That one closes all right. So, that was that one. And then this one is PR483. and a couple of changes. Okay. Dave Longley: We can go with Ted's suggestion. Manu Sporny: All So, here we are. Okay, I think this achieves what we were trying to achieve in 6. any objections on merging? I think we got everything. Manu Sporny: I'm going to delete the branch. And then access. Yeah, that one's closed. All right, we have 31 issues left. So, we are making some progress on those. Manu Sporny: and in theory we can knock out 14 more issues and then the spec will be more or less ready to be handed over to the BCWG. So in those loweffort ones so hopefully that happens over the next two months. I think that's a reasonable number of PRs to address in two months. okay, let's look at uncatategorized issues and let's take some of these. update the AML schemas for verifiable credential 20. I think that's totally fine. it is ready for R and effort low. so I think we're good there. Manu Sporny: next issue is 480. Create a use case in SQL diagrams for a complex workflow. I think Joe, you said you'd take this 00:30:00 Joe Andrieu: Yeah, let me speak to Eric and I kicked around what would make a good use case. and I think the one we want to use is the first responder flow if that works with DB. in particular, we've got the stateisssued EMT card,… Joe Andrieu: which is separate from the way that we're issuing incident badges. And so that feels like the kind of dependency we were talking about where you wanted to include potentially using the same workflow server to handle both that hey I need to give you my evidence i.e. my EMT certification credential as part of an issuance flow to get my incident response badge. Manu Sporny: Yeah, that sounds Yeah,… Joe Andrieu: Yeah. And Manu Sporny: That sounds like a good use case. what do you plus What any objections to that from anyone else? Manu Sporny: We could always use a different flow but Yep. Dave Longley: No, that's totally fine. another one not to make it too complicated, would be a Present the refresh VC and then receive some other VCs in response. Joe Andrieu: Yep. Yeah. Manu Sporny: Yeah, I mean that would be kind of like you present one refresh VC and get three other VCs in return or something like that. I provide a precursor VC to get I guess that is kind of the same for refresh isn't it? Manu Sporny: It's like you're providing a precursor VC to get another VC. Manu Sporny: Okay. Joe Andrieu: That's right. Joe Andrieu: I think they're both interesting use cases in the real world that people are like, " how should I do that?" So, I'll start with the EMT one. and if that doesn't feel like it's sexy after I write it as it does now, then we'll try the VC refresh one. Manu Sporny: I'm going to say effort low even though I know it's going to be a decent chunk of work. meaning it's a fairly mechanical thing I think for you Joe. Joe Andrieu: Joe Andrieu: Yeah, I think it's just I'm on task. I need to sit down and write something up. Manu Sporny: All right. So that one. next issue is issue 479. Add YAML for interaction endpoints. we have not done this. That's true. I think we just need to do this. I think Eric you took a task for this. I think this is a loweffort thing maybe. Manu Sporny: Go ahead, I think we don't have any open PRs,… Eric Schuh: Yeah,… Eric Schuh: it should be pretty low effort. Feel free to assign it to me. I think my biggest question with this issue is if it would be better to make sure or just let all of the YAML files for all the endpoints settle and then do another pass to make sure the tables are all accurate because I know there's been a fair amount of changes to the different endpoints since I put the interaction tables together originally. Okay. Yeah,… Manu Sporny: so I think you should be good to go here. Eric Schuh: if there's nothing expected,… Manu Sporny: Yeah,… Eric Schuh: then I'll start in on this Manu Sporny: I don't think we're expecting anything. yeah, I think we're good to go for that one. Thank you, And then securing exchanges with ZCAPS. Manu Sporny: I think Joe, you would like to see an example on how this is done. Joe, could you speak more to this? I'm trying to figure out what's the level of effort here? I can think of ways that this could be effort high. Joe Andrieu: Mainly we have this notion of an exchange giving you a URL that you hand off to someone. and it seems to me a ZCAP is a reasonable way to secure that URL. And I think I've heard that that's straightforward, but we don't really talk about it. so I'm happy to talk about it in the lightest way possible. it just seems like a natural question of… Joe Andrieu: if you know about ZCAPS and you're looking at the VC API and exchanges, sort of begs the question of shouldn't these play nicely together. Manu Sporny: Dave, thoughts on I mean my concern about this is us having to potentially go and… Manu Sporny: update the ZCAP spec and then update the HTTP signatures, thing and then we can finally get around to cuz 00:35:00 Manu Sporny: because I know we've certainly implemented securing this stuff using Zcaps but I guess the question I'm loathed to put something in the specification where we're kind of like this is what the current implementation does but there's absolutely no specification to back it up. Yeah. Joe Andrieu: Right. I mean,… Joe Andrieu: my immediate reaction that had me laughing it's a feature, not a bug. I would love for you to update the Zcaps so that it has this information. So if this is how I get you to do it, I'm happy to have that motivation,… Manu Sporny: Yeah. I think it's a time issue,… Joe Andrieu: but I appreciate what you're saying about workload and we got to pick our battles, but they're ready for some more investment. Yeah. Manu Sporny: not a desire issue. so I'm going to put this as effort high because I think if we do this, we should probably do it right. Manu Sporny: And I think it's not even ready for because I think we'd want to how about this? We could say it's ready for PR and you could do the latest everything. but the second we do that, all of a sudden we're, expressing things that don't exist in other specs that only exist in exist implementations. so we might not get around to this in,… Manu Sporny: version 10 if we can't also update the Zcap spec and that sort of thing, which I think is fine. I mean, it's not the end of the world if we can't get that in there. okay. Joe Andrieu: Yeah. Yeah. Joe Andrieu: Plus one of that set of prioritizations would work. Manu Sporny: All okay. I think we've got everything except for hold on. Manu Sporny: what's this? These two more than I thought that we had not those are Response metadata for credentials verify and presentations verify to include challenge verification metadata. I thought How should the current response format for checks, warnings, errors be restructured to contain some variant of challenge verification metadata uses first verified? we talked about this a year ago. Manu Sporny: Yeah, I don't. So verified credential verification results returns verified the credential that was verified an array of problem details and a result wait and the verification results valid from whether or not it was The input value valid until Manu Sporny: Results of validating the credential schema. Results for the credential status object including the entry bit, Credential status object and the proof and whether or not it was valid and the input that was provided. Dave Longley: I think all that might be missing at this point is… Dave Longley: how the challenge is handled. But that's not a verify credential result. The challenge would be on verifying a presentation… Manu Sporny: Mhm. Okay. Dave Longley: because I know we did a bunch of work probably between now, after a year ago on updating problem details, but I imagine we still have not done something with how to report information on challenges. Manu Sporny: Go ahead. Joe Andrieu: Yeah, I was going to say one thing you could add here,… Manu Sporny: Go now,… Joe Andrieu: Manny, is that this doesn't apply to credentials It's presentation verify, which helps us a little bit. Manu Sporny: right? But I think we fixed it for I think that's… 00:40:00 Manu Sporny: because we fixed it for credentials addressed the issue for verify… Dave Longley: Yeah, it seems like we've probably addressed the first part of the issue and… Dave Longley: not the second Manu Sporny: but have not done so for presentations verify. Manu Sporny: PR should be raised to clarify what the return value is for presentations verify endpoint. It should be similar the I include result use for challenge main nons. Dave Longley: No, I don't think there's any thing to check for Non is a client side value that just gets set. Manu Sporny: Okay. Dave Longley: challenges what the verification site is tracking. Manu Sporny: All So, I'm going to say this is preferred blow ready for PR. and then I'm sure we'll discover things when the PR is raised. good. That one is Add support for advanced BBS features like pseudonyms. we need to continue to talk about that one. I don't think we can classify it. Manu Sporny: issue 433 consider to introduce a manifest describing entry point static endpoints. don't have marked pending close. We asked Philillip to document use cases and join us for a call and that has not been done. all right. So, we can't do that one. It's not ready for PR. allow generic unwrap ECVP and specific media types where appropriate. Manu Sporny: Dave Longley: So I think the resolution here was the spec says you interoperability you need to implement application/json. That doesn't say you can't do something else. I don't know that we need to say that you need to be able to do something else either. Joe Andrieu: Yeah, I would be hesitant to say that it is an optional feature that you could also have these other types,… Joe Andrieu: but we also shouldn't say you can't do it. I think the same way you are Dave. It's an interoperability nightmare waiting to happen. Manu Sporny: Mh All right. Manu Sporny: So, are there any objections to marking this as pending close? 00:45:00 Manu Sporny: Go ahead, Joe. No,… Joe Andrieu: I'm wondering do we have a way maybe we don't have a lot of optionality like this,… Joe Andrieu: but do we have a way to sort of discover what a given service does support? if someone supported a seabboard representation instead of JSON? Manu Sporny: no, we don't. we had, Mike Farley raised that kind of question fairly early on and we basically said, " we might get around to doing that." But then, probably said what Dave's going to say. Go ahead, Dave. Dave Longley: Yeah, I was going to mention most of the discoverability options when we discussed them. They didn't make sense for the use cases where you're building coordinators to talk to systems how they work and they've been some administrator set up something for you to run against. the discoverability options made more sense at the delivery layer where you're talking about like a wallet or a piece of holder software choosing a protocol to speak to receive a credential and to choose the format for the credential and all so all of those sorts of things got pushed to those layers in the delivery protocol. Joe Andrieu: Cool. Dave Longley: I don't think it made any sense and we couldn't defend it putting that stuff at the life cycle API. Manu Sporny: Any objections for marking All that is marked as pending note in appendex. yeah, I mean it's up to Patrick if he wants to say something that he can always do other things on top of the core spec as long as you don't violate the core spec. it's like a perennial discussion in working groups where we don't need to say that because that's always true. Manu Sporny: Okay. Joe Andrieu: What… Joe Andrieu: what we might be able to say, not that we need to now, but just in terms of future conversations if he comes back, is we encourage experiments in the field and if there are things that make sense and get adoption, we can add it in a future. Manu Sporny: Mhm. Okay. Yep, that sounds good. yeah. Joe Andrieu: It's kind of trying to future proof and be able to do all the things and let's just get one thing out. Manu Sporny: You're saying add that as a note in the spec. Joe Andrieu: I'm saying if Pat comes back and wants to do more,… Manu Sporny: Okay. Joe Andrieu: we can say great. And we think that's a good candidate for VC API 2.0. Manu Sporny: Mhm. Joe Andrieu: We can defer those innovations. Yep. Dave Longley: Yeah, in some sense that's the same process anything goes through. Dave Longley: You bring enough people who want to interoperate on X and then it can get in the spec. Manu Sporny: Okay, that is everything for VC API. We're going to try to do VP request spec, but we're at time more or less today. Let me see how many issues we've got. These are all ready for PR, but we don't have a level of effort marker on them. we'll come back and categorize these. We'll make another pass over the next couple of weeks. okay. I think that's it for the call today. we will not have a call next week. in fact, all of our CCG calls are cancelled next week. Manu Sporny: I will be traveling and so we will meet the week after and even that meeting that might not be true. we'll see. so definitely no meeting next week. we will have potentially meeting the following week. and in the meantime, if you can, pick off some of those loweffort, PRs, please do. and, thank you for the wonderful discussion today, and we will see you again, in about two weeks. Thanks all. My Meeting ended after 00:49:55 👋 *This editable transcript was computer generated and might contain errors. People can also change the text after it was created.*
Received on Tuesday, 3 June 2025 22:15:56 UTC