Skip to content
New issue

Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? # to your account

2.2.1 Issue Signed Statement. #24

Open
roywill opened this issue Jul 25, 2024 · 3 comments
Open

2.2.1 Issue Signed Statement. #24

roywill opened this issue Jul 25, 2024 · 3 comments
Assignees

Comments

@roywill
Copy link

roywill commented Jul 25, 2024

Are we asserting that the authentication identity to the end point is the identity to sign the content with? I think we need to clarify that this can be completely different. I do question why we need to specify a validFrom date?

@JAG-UK
Copy link
Contributor

JAG-UK commented Jul 26, 2024

Are we asserting that the authentication identity to the end point is the identity to sign the content with?

This should be clarified/specified indeed.

Given the context of this endpoint being environments that can't sign their own Statements, the credential can't be 1:1 equivalent to an Issuer at a deep technical/cryptographic level. Therefore some logic has to be applied in the endpoint to convert the authenticated API client into a SCITT Issuer.

Given that, it seems reasonable to leave it fairly open, for example by adding:

"

  • The Transparency Service SHOULD use a different Issuer identity for each different API client
  • The Transparency Service SHOULD use the same Issuer identity for every call made by the same API client
    "

This language is slightly sloppy but YKWIM.

@JAG-UK JAG-UK self-assigned this Aug 6, 2024
@SteveLasker
Copy link
Collaborator

The example in https://ietf-wg-scitt.github.io/draft-ietf-scitt-scrapi/draft-ietf-scitt-scrapi.html#section-2.2.1 should be updated to not be a W3C credential

@achamayou
Copy link
Contributor

I have proposed in #53 that we drop this endpoint altogether, and stay focused on interoperability of the Transparency Service itself, which can be composed with any number of signing mechanisms, local or remote.

# for free to join this conversation on GitHub. Already have an account? # to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

4 participants