- From: <meetings@w3c-ccg.org>
- Date: Tue, 24 Mar 2026 19:07:52 -0500
- To: public-credentials@w3.org
- Message-ID: <CA+ChqYfQUqGbvr_KDX8vt7q26nrZtBntAAihECXuNgfVJTnG8A@mail.gmail.com>
This meeting of the Verifiable Credentials for Recognition working group focused on addressing privacy and security considerations within the specification, as well as discussing the final publication process. Key discussions revolved around potential privacy harms from surveillance and association, the use of unique identifiers, and the implications of issuer impersonation. The group also debated appropriate validity periods for recognition credentials and the nuances of managing this information, particularly in relation to historical data and organizational changes. The IPR commitment process for the newly published specification was also a significant point of discussion, with efforts made to ensure all key contributors fulfill their obligations. Topics Covered: - *IPR Commitment:* The final community group specification has been published, and a critical step is for all primary editors and authors, including Isaac Henderson and David Chadwick, to make their Intellectual Property Rights (IPR) commitments. This is a prerequisite for moving the specification to the working group, and Isaac Henderson will ensure his organization completes the necessary steps. - *Privacy and Security Considerations (PR #61):* The team reviewed several AI-generated privacy and security considerations for the specification, including surveillance of individuals, issuer recognition as a tracking vector, and the use of metadata as unique identifiers. Discussions highlighted the need to consider selective disclosure as a mitigation for surveillance and the potential for harms by association through issuer lists. - *Publication of Sensitive Information:* The group discussed the risk of publishing sensitive information, particularly in the context of private groups, and how this can be mitigated. The conversation also touched upon the potential for verifiers to infer information about users based on the issuers of their credentials. - *Issuer Impersonation:* The security consideration of issuer impersonation was discussed, emphasizing the risk of verifier administrators being tricked into adding malicious or untrusted recognition lists. The need for appropriate bindings to protocols and user interactions to prevent such attacks was noted. - *Selecting Appropriate Validity Periods:* The meeting addressed the challenge of determining appropriate validity periods for verifiable recognition credentials, considering industry use cases and the need for both timely updates and efficient infrastructure. The importance of managing historical data and organizational changes, such as acquisitions or name changes, was also highlighted. Action Items: - Isaac Henderson to ensure his organization completes the IPR commitment for the specification. - Manu Sporny to incorporate feedback on selective disclosure and harms by association into the privacy considerations section. - Manu Sporny to update section 4.2 (Issuer Impersonation) to include discussions on protocol bindings and user interactions. - Manu Sporny to raise an issue regarding the mechanism for stating when a recognized entity is valid between two dates. - The group will continue discussing privacy and security considerations starting from section 4.4 in the next meeting. Text: https://meet.w3c-ccg.org/archives/w3c-ccg-ccg-vcs-for-recognition-2026-03-24.md Video: https://meet.w3c-ccg.org/archives/w3c-ccg-ccg-vcs-for-recognition-2026-03-24.mp4 *VCs for Recognition - 2026/03/24 10:59 EDT - Transcript* *Attendees* Benjamin Young, Dave Longley, Dmitri Zagidulin, Elaine Wooton, Isaac Henderson, Manu Sporny, Parth Bhatt *Transcript* Benjamin Young: Good morning. Parth Bhatt: Hey Benjamin, good morning. Benjamin Young: Hang on. Manu Sporny: Hey, Benjamin. Benjamin Young: I'll give you just a couple more minutes. Benjamin Young: Okay, I think this is thanks for coming everybody. This is the verifiable credentials for recognition, previously known as verifiable issuers and verifiers. I see there's a couple PRs that just landed and it looks like we've also got a few issues that got some attention in the last week that we can get to. I was hoping Ted would make it because one of them was his issue and most recently commented on by him. but we'll take the poll requests first, I believe, and then maybe Ted will show up. Benjamin Young: That sound all Okay. let's start with the one that is slightly older. issue 61. Would you like me to screen share or just browse along and I'll resize the window a bit? 00:05:00 Manu Sporny: All So, let's see. This one is our spec. let me go back. Benjamin Young: Yeah,… Manu Sporny: I forgot They just announced the IPR forum. So, maybe we should make sure that everyone on this call kind of knows about that. Let me get a link there that's for recognition. Benjamin Young: that'd be good. Manu Sporny: Let's see here's the link to make the commitment. Dish Bazaar has already made the commitment, but we need to get David Chadwick, Isaac Henderson, and anybody else, that was in that original rebooting group, but that was 8 years ago to make that commitment. just in case they're going to I don't think anyone's going to claim intellectual property over this, but that link will help people sign up for it. Manu Sporny: we just need to make sure that especially David and Isaac, on behalf of Frownh Hoffer and on behalf of True Trust, end up making the commitment and University of Kent make that commitment. So, that was topic one was just the final publication has been done. Thank you very much, Benjamin, for getting all that together. the final link is here. and that's the static copy that everybody makes the patent commitments on. and then I think we can start the process in the past. transferring the repository over has happened in parallel to getting the commitments. Manu Sporny: I think that's fine. Meaning we get whatever commitments we get. Benjamin Young: and Isaac just joined. Manu Sporny: And then we have to warn the group if we're not getting a commitment from one of the main editors or authors. so we need to definitely stay after them. And that's largely David and they have to sign this thing because they authored it a lot. great. I don't know if you can see in the,… Manu Sporny: let me rehat. Isaac Henderson: Hi everyone. Isaac Henderson: Sorry for delay. I was just Okay. Manu Sporny: Hey, no problem. the final community group specification was just published because you were one of the primary editors during that time there's a IPR commitment that needs to be made and… Isaac Henderson: Okay. Manu Sporny: I just put the link into the chat channel about that. So if you click on that hopefully you can make the commitment. Manu Sporny: It's very important that you and… Manu Sporny: David make the commitment before we can move it into the working group. Isaac Henderson: … Isaac Henderson: I'm just trying to figure it out. Benjamin Young: It should look more or… Benjamin Young: less like this, but you'll see a form instead of the text that I … Isaac Henderson: commitments are only available to individual organizations participated in the credentials community group. It says that maybe I can share my screen. Manu Sporny: Yeah. Do you see a little check box at the bottom? Benjamin Young: that'd be fine. I was about to say the same. Isaac Henderson: Can you see my screen? Manu Sporny: You are not a CCG member, are you logged in? I guess the other thing we can try is let's see… Manu Sporny: if you go to this link that I'm about to put into chat. Yeah, in that case,… Isaac Henderson: Okay, I think our organization is part of W3C… Isaac Henderson: but they're not part of this credential community group So that's why I'm also trying to figure out so what's the way in around to get there but yeah okay all Mhm. Manu Sporny: you have to get your organization to join the credentials community group. and then once they're joined, you have to get your advisory committee representative to agree to the IPR release. and… 00:10:00 Isaac Henderson: Mhm. Yeah. Manu Sporny: that's typically the process. Manu Sporny: So that'll take you longer than we have time on the call to kind of do… Manu Sporny: but please make sure to do that because if we don't get that clearance from you or your organization then no I mean mean the IPR commitments it's frownher right I mean more than likely they'll give the Okay. Isaac Henderson: Or is it any other way that I can just give an okay or… Isaac Henderson: is it not okay? Yeah. Yeah. Yeah. Yeah,… Manu Sporny: It's just going to take a little bit more time, especially since they're already a W3C member. They've done this for other things. Isaac Henderson: that's true. Manu Sporny: Okay. Isaac Henderson: Mhm. Manu Sporny: So it'll just, take you a while. And if you need help connecting with your advisory committee representative, I can probably find out who that is. Do you know who your AC rep is? Isaac Henderson: Yeah, I know internally who's that one? Manu Sporny: Okay. Okay, great. Isaac Henderson: Yeah. Yeah. Manu Sporny: So you just ask them that you need to make an IPR commitment for this specification that you contributed to and… Isaac Henderson: Okay,… Manu Sporny: and then that's it. okay thank you Isaac. Isaac Henderson: perfect. then I will take care of that and… Manu Sporny: Okay I appreciate that. Isaac Henderson: I will keep you updated in the coming weeks. Yeah. Yeah. Manu Sporny: Okay so I think that's that Benjamin. and we can kind of go back to processing PRs. Benjamin Young: Yeah, thank you for that. Benjamin Young: And Isaac, thanks for showing up today. It's timely. Here we go. Yeah. Manu Sporny: All so this item, has kind of multiple things going on. this adds a number of privacy and security considerations to the specification. So if we look at the preview and go to the privacy consideration section three should probably be an appendix we will see there's a title and then the kind of a description of the privacy risk that we should be discussing. heads up this is all AI generated but I did take a look through every single sentence and made adjustments and whatnot. though it did a pretty good job At low level it's kind of like there's some stuff we should probably discuss in here. Manu Sporny: but this PR just establishes the sections these are the things we want to talk about not any of the details on how we mitigate just identifying here's some risks do we want to generalize do we not do these prompt any other ideas of risks that we want to highlight so I thought we might spend the majority of the call today going through all of these things and then the security consideration section is the same if we start at section 4.2 issuer impersonation. it's covered too. So we can go through each one of these. So what I'd like to do on the call today is just talk about each one and see what adjustments we want to make. Manu Sporny: so I can, make those adjustments and then get this into the spec just in its current form as like, hey, there's just issue markers. We're going to elaborate on each one and then other PRs will convert those issue markers over into the actual text. this is also somewhat intertwined with the W3C security and privacy group wanting us to do a threat model. so I have sent an email to them. Let me get a link to that. Manu Sporny: here in the chat channel I've sent this email out to both the security and privacy group asking them basically hey do you want us to do a privacy and security consideration section or should we just do a threat modeling section? and there's kind of a general plea there don't make us do all of them because they're duplicative of one another and what exactly is the plan moving forward and we haven't done an FPWD yet and if we just do a threat model will that be acceptable to both the privacy and security group that sort of thing. 00:15:00 Manu Sporny: So that's the other reason I didn't start typing, out a bunch of stuff in security and privacy consideration section because we might end up deleting this and converting it into a threat model. which is a more involved process, and then there's a big question about does the threat model go in the spec itself or is it go in a separate document? that sort of thing. Let me stop there. if there are any questions on the private security threat models conversation. All right. If not, then let's go back, I guess, to the PR and go through these one by one. starting with the 31. Manu Sporny: the surveillance of individuals okay so section 31 surveillance of individuals as recognized entities the privacy issue here is that if for public entities it's not that big of a deal like if you are a state government and you're publishing information about the agencies within your state, you do that publicly, that's not really an issue. however, if you've got a private social network of people that are in vulnerable populations or like you just your family, like internal family, chat, whatever. Manu Sporny: and you have, recognition credentials for everyone in the family or everyone in the vulnerable community. if you take that information and you publish it publicly, that is a pretty big privacy violation. and we could potentially see people, there being, signal closed chats which then end up publishing the information so that is an example of a privacy harm that could be created for small groups and we should probably provide guidance. I think the financial stuff is later on healthcare and finances later on but this is ba that's basically this item. So should we change this? Manu Sporny: Should we not include it? Does this trigger a different issue of concern? Isaac Henderson: I think it's a good point but I think if it depends upon the scope and also how many use cases which deals with private people right or for example people so I think it depends upon it comes to that point so I think we good to consider depending on the use cases to have those parameters or so then if you provide some way that by selective disclosure or what not other means just disclose only those attributes or claims that are publicly recognizable by which we could eliminate the surveillance or… Isaac Henderson: any thoughts on Manu Sporny: Yeah, that's a good point. Manu Sporny: Yeah, I so selective disclosure as a mitigation you publish part of the list if not all of the list. yeah, that's a good point. We should or I'm going to take some notes here for section 3.1. suggest that selective disclosure could provide some protection. Isaac Henderson: Mhm. Yeah. That's Manu Sporny: I think the thing I'm mostly concerned about here is people are outed in a community or somebody, one person. So, selective disclosure requires all the actors to be honest. whereas I think the privacy harm kind of comes in when you have a dishonest actor within the community that then publishes community information. Manu Sporny: Go ahead, D. Dave Longley: Yeah, I don't know that selective disclosure is a solution to this particular problem… Dave Longley: because what's being highlighted at least in my read is there's reuse of something that was published for a different use. So whatever you had disclosed would have the same problem. So I think this risk is really more about whenever you share a credential, someone could take the information in that credential and share it elsewhere. And if your method of sharing the credential is not targeted with some kind of constraints around it and terms of use, you're just publishing it somewhere. It doesn't really matter whether you selectively disclose X publish the whole thing. 00:20:00 Dave Longley: any information in that situation because you haven't done anything to mitigate additional sharing of it in some way is subject to these risks even if you had an agreement with some private group. it's the same thing like it seems like this is a more general concern around if you present your credential to some party they can turn around and share that information and it's only becoming a greater risk because of the idea of not having a target with whom you're presenting the credential having it I mean And I get that we said that there's a private group that you're going to share it with,… Manu Sporny: Yeah. Dave Longley: but it's really just about this concept of publication. Isaac Henderson: Or I think the others ways to restrict just the public information is just going to go into this credential,… Isaac Henderson: because if it is planned to be stored publicly and accessible via public web or whatn not. So think then we might need to restrict. Okay, these are the information related to an entity so thereby we avoid this PI information. Manu Sporny: All right, I think that's enough for me to kind of at least start writing something around here. real quick, a side note, Dimmitri, the spec was just published as a final and we need you to do an IPR commitment, at the link there,… Manu Sporny: because of the education use case you kind of brought to the group. Dmitri Zagidulin: Sure. Dmitri Zagidulin: Doing so right now. Manu Sporny: Thank you very much, sir. Thank you. Dmitri Zagidulin: There. Submitted. Manu Sporny: All right. So, let's go back to Okay, so let's do section 32. There's a lot of these to get through, so we're just gonna spend a little bit of time on each one of them. let's see. Issuer recognition as a tracking vector. I was a bit unsure about this one. Manu Sporny: when you share, let me start off with if the verifier knows who issued a credential to you, they can already kind of determine what community you're a part of, and that can be dangerous in certain areas for the verifier to know that. and in those instances, maybe what you should be using is like a BBS. I'm a part of this, greater community. maximize the herd privacy when you do a presentation. that's kind of what this has to do with. so basically if you use a verifiable recognition credential and you present it to a verifier, then the verifier knows what community you're a part of. Again, if you exposing the issuer is the same kind of thing. Manu Sporny: So if the issuer doesn't have, a certain amount of herd privacy, same kind of thing can happen. I don't know if we should include this because it's kind of in the same vein. but meaning if the verifier knows the issuer of a credential then it pretty much knows and that issuer doesn't have privacy among issuers in that ecosystem then the verifier kind of knows you're part of a community. meaning if that issuer only operates in specific country or a very specific state then the verifier has a pretty strong signal that you're associated with that state in a way that reduces your privacy. Manu Sporny: So options here is we could just not include this or maybe there's a take on this that's different than just knowing the issuer. 00:25:00 Dave Longley: With respect to group privacy here, I think what's being learned is potentially that the issuer is part of something like this is more like if you had a hierarchy Harchy and there was some intermediate credential that the verifier had not seen about the issuer and when you reveal who the issuer is, the verifier learns about that intermediate certificate and then learn and then they know that they're the intermediate certificate or credential links them up to the root recognition credential. Dave Longley: None of that reveals in my view anything new about the holder that isn't already revealed when the holder says here's my credential from this issuer. That's the relationship the holder is with the new piece of information hold is that the issuer is in some way related to this recognition credential hierarchy. that seems like that is what's new. And when you're doing this presentation, the verifier has already said if you want to present anything I'm willing to accept, you must present from an issuer that it will be recognized in this hierarchy. So none of that feels really new. Dave Longley: the piece of information that if we had some more zero knowledge proof style things around issuer identifiers and so on that could be elided here would be who this specific issuer was but that's not for this spec and that's a different technology consideration so I don't know that much new information is really happening There you go. Manu Sporny: Yeah, I'm leaning towards just deleting it. it's not so different that it's special to this spec, I don't Dave Longley: Yeah, I think if we tried to crystallize this, the verifier might learn that a particular issuer is as an example like an accredited university and they didn't know that before and that's only because there's a hierarchy of recognition credentials. but all that being said,… Manu Sporny: Doesn't feel worth it to me. Okay. Dave Longley: I don't know if I did skim these earlier, but I'm trying. There was oblivious HTTP comes up. never mind. That's issue four. He'll bring it there. Manu Sporny: All right. Moving to section 3.3. this is basically saying that some of the metadata in the recognition credential can be used as a unique identifier to track you. So for example, if somebody uses a recognized by URL with a fragment identifier in it or output validation that has a very specific identifier that only you have anything else like that, right? Manu Sporny: any kind of external URL can be turned into a unique tracking identifier and that is what this is about. you have to be aware that bad issuers may try to do this to you especially for recognition credentials that are kind of more focused to that issuer and into you. So if you as a holder are like, "Hey, give me a recognition credential." And the issuer is like, "I'm going to give you one that's very specific to you and that's going to track you." It'll work, but it's highly specific to you. that could be an attack vector. Manu Sporny: and then the mitigation is like a wallet should make sure that they're not dealing with credentials that have those kinds of tracking things in there and you can detect it by seeing how often the URL is reused and whatnot. go ahead Dave. 00:30:00 Dave Longley: When we write the text for this section, I think it should more or less start with any other verifiable credential, an issuer can put uniquely identifying information into the credential. And so you need to be aware that that can happen and so on. there are specific fields for expressing specific information in any credential and that's true here and in any one of those places an issuer that's not respecting individual privacy could do something like that. So it's not special to this spec… Manu Sporny: Yeah. Dave Longley: but we should highlight that can happen. Dave Longley: And here you should be aware this is true for any kind of credential. So be aware of that threat that an issuer could do that to you. Manu Sporny: And I mean this kind of falls back into we already talk about this in the base VC data model spec and the question is is there anything new here? Dave Longley: If we can link to it and that would be great. It would just be, Manu Sporny: Not really because we warn about unique identifiers in the VC data model and we tell people that they should use oblivious HTTP to fetch these things. And so is there anything special to recognition credentials here? Manu Sporny: I don't think so. Dave Longley: I don't think so. Dave Longley: I know that these things are linked, but do we have a specific sentence that calls out all of the security and… Dave Longley: privacy considerations in the VC data model apply to this spec? Okay. Manu Sporny: Yeah. Yeah. Manu Sporny: If you scroll up Benjamin to the top of the right there, readers urged to familiarize themselves with the general privacy advice provided in. Dave Longley: Yeah, it would be good for that text to save as those things apply to this specification as well. Something like that. And then I think that covers this issue. Manu Sporny: Add to top of privacy and security. Let's send this back to see data model. note that warning that there shouldn't be applied and be heated as its Manu Sporny: this specification. all right. So that's section 34 is next and this is publication of sensitive EOS. Dave Longley: Hold on. that covered the first issue there. Dave Longley: There were two issues. Manu Sporny: Yeah, we can. Manu Sporny: Yeah, the second one is just like you can use a remote URL to check, revocation, freshness, whatever tells you if it's being actively used. It's the same kind of thing. if it's a unique URL. I guess even if it's not a unique URL, you get some kind Dave Longley: That is true. I don't know that we talk about so I'd like us in this specification to make a distinction between an architecture where the holder brings with them what is needed to meet the recognition requirements of the verifier versus the holder just gives the tail the leaf credential in a hierarchy over to the verifier and the verifier Dave Longley: look and looks everything up about them in so doing leaking information about that particular request that's going on at that time and I thought issue 4 sort of could be related to that it's talking about verifiers who were fetching updated recognition credentials but it would also be verifiers who are trying to fill the gap between I was given this now for example what they're doing with the federated identity stuff I think is less privacy preserving. And so if they're going to go out and talk to the federation and say, "Hey, you people help me connect this to that." I think it would be better for the holder to do that because they're not leaking to who the verifier is that they're presenting to. you're not creating that connection if it happens in the other direction. Manu Sporny: So maybe we should have a cy let's see new section to how holder provided recognition credentials are more privacy preserving than ones fetched by the credential issuer. Okay, and I think we have a separate issue that's tracking that one as well, but that's fine. 00:35:00 Dave Longley: Yeah, you just said fetched by the recognition credential issuer. Did you mean verifier? Manu Sporny: Sorry. Fetched from the recognition credential issuer by the verifier. Dave Longley: Yeah, having the verifier in there is the key piece. Manu Sporny: Yep. Okay. Dave Longley: I come. Manu Sporny: That's good. all right. 3.4. I think this is close to the same thing as 31. it's not necessarily about the individual finding out that the individual is a part of a community. I guess this is where you're like this person again is a part of a vulnerable community because of all the other entities in this list of recognized issuers these are all immigrant population organizations that provide digital credentials to immigrant pro populations right Manu Sporny: versus these are organizations that provide credentials to citizens. and I don't again it's kind of like if the issuer you kind of know that and so that's not really different here. So it feels like Dave Longley: This seems like it's all about issuers, which is fine. but is it about revealing associations that people might not have otherwise known about or creating associative reputational harm because you happen to be on the same list as some other party or… Dave Longley: group and someone frowns upon that worse Manu Sporny: I mean all those things. Manu Sporny: But again, it's kind of like I don't know if this technology really Dave Longley: I think there's probably something worth mentioning in this spec since the functionality of this spec is to highlight which issuers are recognized by certain entities so that verifiers that can use that information to make decisions. And that doesn't if you're just thinking about it in a vacuum like that, you're not going to necessarily be thinking about how if you build certain groups and lists of things that you might create associations that have these additional effects. Dave Longley: So that might be worth mentioning in some way that people will look at the lists on their own and look at the relationships and… Manu Sporny: Mhm. Dave Longley: things that are put together in these lists to possibly guess or learn information both about the types of entities people decide to recognize. So you could look at this as a mass media sort of thing. some mass media party puts out a recognition credential and they only recognize some particular slanted news providers or whatever it is. And so that creates some impression of that and some impression of them that maybe they didn't mean to imply or there's additional information and things that are learned by that just by creating that grouping. Dave Longley: And that's so we should probably mention that additional information or impressions or it could be true or false information could be gained from just the kinds of lists and… Dave Longley: groups and associations people put together. 00:40:00 Manu Sporny: Yeah, I guess I'll say harms by association or… Manu Sporny: harms by issuer association. okay, I'll update that. All moving on to security considerations. 4.1 was already there. 4.2 is the new one. so for 4.2 to issuer impersonation. This has to do since these are decentralized anyone managing verifier software can choose to include any one of these lists in the software. So you don't have to pick one. You don't have to defer authority to someone else. you can go in and you can say, when I will take credentials from one of these verifiable recognition lists." Manu Sporny: and then you start adding a bunch because there's a human in the loop there, the human might not vet the links or credential properly and might, experience something akin to a fishing attack where you're like, I know who this issue is. I trust them." But if you actually look at the URL or the did or something like that, it's totally not who you think it is, right? it's just some other entity and they have put out a recognition credential to trick verifiers into using their list versus somebody else's and then all of a sudden you're just letting anyone through your verifier because you've got a bad issue in there. Go ahead. Dave Longley: Yeah, I wonder if this should also talk about appropriate bindings to protocols and user interactions. So I could imagine that the users receiving a request from some origin. it would be good if they have in their wallet somehow something that says yeah, I have a recognition credential for an issuer at this origin or this issuer. Dave Longley: if there's a check that's made that binds the request is indeed coming from that origin when TLS was used to fetch the information and so on. And then that's compared against the origin that's expressed in the verifiable recognition credential or something along those lines. it would be good for this section to talk about how protocols can do things like bind those kinds of information together so that software can help users make better decisions. Manu Sporny: typing it down. Goods for section talk about how protocols can information be together to help the rules not all scam I can make that update. And this feels, and part of it is I'm kind of like, I couldn't imagine that there's a class of couldn't imagine, but I doubt there's going to be a class of fishing attack where you're trying to trick administrators into adding the wrong recognition list in. These things are probably going to be fairly well known in their ecosystems. but maybe not. Manu Sporny: Okay, 43. moving on to the next one. Selecting appropriate validity periods. This is just like what should the validity period for your verifiable recognition credential be? 10 minutes is probably too little, but we probably can't suggest it should be exactly one week because use cases vary from industry to industry. so this is just saying, hey, make sure you pick an appropriate validity period for your ecosystem. If you pick something that's too long, then you might remove an issuer, and that issuer is going to continue to be recognized for a long time, and and at the same time, you don't want it to be so short that your infrastructure hit on a very regular basis. go ahead, Dimmitri. Dmitri Zagidulin: Yeah, this is always a tough topic, I agree with everything that you said and it intersects with the organizational end of life question… 00:45:00 Manu Sporny: Mhm. Dmitri Zagidulin: and personal I suppose because the issuer can easily close their doors. We don't want to say this diploma the recognition credential is your entire lifetime. We want so the presenter brings everything has to interact with our other modes which is you ask a directory of whe whether this issue is currently or was at some point in history valid. So ju just wanted for everyone to keep that in mind. the organizational end of life questions that intersect with bring your own recognition credential. We need both. Manu Sporny: Yes, that's an excellent point. Manu Sporny: Go ahead, Dave. Dave Longley: I think one way to make the decision on… Dave Longley: how long the validity period ought to be also has to do with how large and diverse the list is. it becomes if you want a shorter validity period for a larger and more diverse list that you might even want it to be 24 or 48 hours, you up this on a regular basis and the entities that use this list you make sure that they know that they can go fetch, the latest one. Dave Longley: and that allows for different recognized parties in there to be removed as needed on a regular basis which you're not going to be able to do if you make your validity period a long time. And then there's other ways to sort of deal with the list changing problem. I guess I should mention you also want to be able to add entities to that list. So I would expect you to want to have a fair for a large and diverse list a fairly short period 24 48 hours. and I think we could probably make a recommendation like that. if you're also looking to manage lists that are changing in size and so on or make them more decentralized, we could talk about how it would be good to have lists that have aggregators. Dave Longley: your list just has aggregators, accreditation bodies and so on it. Those are much more likely to be stable. So, you could have longer validity periods, though we should maybe discuss what the benefit of even having a really long validity period would be. and then you issue individual credentials that the accreditation credentials to other parties and those can be more easily revoked or have shorter periods. but we really should probably talk about what is the utility of having a much longer period so that people could understand why you would even want to go more than 24 or 48 hours. Manu Sporny: Also very good points. two thoughts. One of them is I don't think we have a mechanism to say this issuer was valid between these two time frames. I think we could potentially do it via a reg x in the JSON schema on the date. but I don't think that works. Manu Sporny: Does JSON schema have a date range thingy? Jason Yeah. Dmitri Zagidulin: I have a Benjamin Young: Not sure about a range,… Benjamin Young: but it does have a format… Manu Sporny: I mean the problem with format is that it's like I don't maybe there Can you reg x ranges? Manu Sporny: It feels like you can Benjamin Young: if you're defining it as ISO 8601 that's got a range format in it which you could write reg x against which I think is what the injent schema is defined as is 8601 but demetri you had Dmitri Zagidulin: No. Yeah. Dmitri Zagidulin: So we can do some basic reg x though that gets wild with leap years and leap months and stuff. so it basically treats dates as string only with everything that comes with it. they sort of assume that basically date ranges are business logic not schema logic. I know there's been some discussion on the spec itself about ranges but it didn't really go anywhere. 00:50:00 Dave Longley: So I did not check the JSON schema spec but one of the more popular libraries A AJV has examples using format minimum and maximum both with inclusive and exclusive options for dates. Dave Longley: So I think you can do exactly this. Benjamin Young: And it also looks like they have a discrete duration type for encoding the ISO8601 duration format… Benjamin Young: which uses a slash between two dates. Manu Sporny: I am So heard on the AG AJV thing, but we can't point to a spec, right? It's not in the spec. And then Benjamin, I'm trying to figure out what the JSON schema for that duration thing would look like because does it support the slash stuff… Benjamin Young: All right. Yeah. Manu Sporny: because I know the P3 those durations but they're not anchored in anything, it's like the JSON schema that we have in the spec today just checks against the credential and the credential has it's XML datetime not ISO8601 but I think they're close enough for it to work. I don't know… Manu Sporny: I don't know if does it have slash support, I guess, is the question. Draft 2019. Benjamin Young: Yeah, we'd have to check the drafts. Manu Sporny: Yeah. Yeah. Benjamin Young: They only reference in the documentation I just linked to, they only reference the P format. Manu Sporny: And the P format wouldn't work then. Yeah. So, it looks like the AJV thing is the thing that we would probably need to define. Unless we were to say from valid until for that very specific entity. But we can't make those types of statements with the mechanism we have right now. I don't think okay something let me raise an issue on this because I don't think we need an answer for this. Manu Sporny: So how do you state recognized entity is valid between two dates. Benjamin Young: All right, dude. Manu Sporny: A historical action. Dave Longley: Yeah, I don't think saying that the entity itself is valid between two dates is even necessarily what is wanted. it depends on issuing and verifying, for issuing, I think you would want it on the action and would be bound to the particular credential that's being issued. Dave Longley: and not every credential that's issued necessarily even has validity periods on it. and then there's a different consideration for I don't think you would need this for the directory case where you'd say this information is only valid from period to this time period. is I peed? Manu Sporny: I'm thinking of the diploma use case. Dmitri Zagidulin: Why is that? You do need because remember we need to capture a key history right like that key got rotated and we want to say that it was valid during this time. 00:55:00 Dave Longley: Yeah, but we're not talking about keys there. Dave Longley: We're just talking about I don't know, it's probably hard to find in screen share the directory example right now, but the directory just these are properties about this identifier. And so it would have to be the case that these properties only applied to this identifier. it's like somebody sold or abandoned their did or something like that would be the use case. Dmitri Zagidulin: Yeah. or… Dmitri Zagidulin: or the company got acquired or renamed, right? I think the validity period is super important for this stuff. Manu Sporny: Yep. … Manu Sporny: I raised an issue. Dave Longley: … Dave Longley: we should raise the issue, but in my head, I'm thinking so the use case for this would have to be that you're putting out a recognition credential where for the directory case, you're putting out a directory you're making just directory claims about something and the validity period for your recognition credential would have to be different for what you're expressing in the directory information. And so it's like you're putting out a recognition credential for historical information for a certain period. Is that right? Dmitri Zagidulin: Yes. Dave Longley: And I'm wondering how weird that'll get if you're issuing a recognition credential that is valid, let's say, this year, but ory information says you're talking about a party the directory information is valid for 1970. Manu Sporny: All right. Dave Longley: So I think we have a lot to tease out in these scenarios. Manu Sporny: I raised issue 63 and then Benjamin, back over to you because we're out of time for today. Benjamin Young: Yes, we are. Benjamin Young: Do we want to pick up from here at 4.4 or we have the is Okay. Manu Sporny: Yeah, we got to keep going. Benjamin Young: So, we'll pick up from 4.4 next week. Probably do these three and then back to PRs and issues if that sounds all right. Okay, thanks everybody and see you in a week. Isaac Henderson: Thank you. Meeting ended after 01:00:45 👋 *This editable transcript was computer generated and might contain errors. People can also change the text after it was created.*
Received on Wednesday, 25 March 2026 00:08:01 UTC