Those claims are asserted by the issuer of the assertion, which could be a 
trusted third party.
Trust management happens on top of the draft. This could mean x5c, could also 
be a trust list with the issuer URLs.
In the OID4VC High Assurance Profile, which utilizes this draft, we will 
facilitate both options.
Am 21. Juli 2023, 18:25 +0200 schrieb Orie Steele <orie@transmute.industries>:
> It would be excellent to see more information on "attested_security_context" 
> and "key_type" which appear in the example 
> https://datatracker.ietf.org/doc/html/draft-looker-oauth-attestation-based-client-auth-00#name-wallet-instance-attestation
>
> I gather from searching that this is relevant: 
> https://github.com/italia/eudi-wallet-it-docs/blob/722d50be9b296d1d28218eac50f8c9c3b10d8563/docs/en/wallet-solution.rst#L135
>
> It seems a bit odd, to believe a client to make these kinds of assertions by 
> themselves... Has there been any discussion of x5c or cert chains for the cnf 
> key?
>
> OS
>
> > On Fri, Jul 21, 2023 at 12:25 AM Tobias Looker <tobias.looker@mattr.global> 
> > wrote:
> > > Thanks for the feedback. Generally any OAuth client could make use of 
> > > this authentication method if they so wish, however the types of client 
> > > this draft has initially been designed for are ones that don’t typically 
> > > have good direct authentication options available today (e.g public 
> > > clients).
> > >
> > > Thanks,
> > > <>
> > >
> > > Tobias Looker
> > > MATTR
> > > +64 273 780 461
> > > tobias.looker@mattr.global
> > > <>
> > > <>
> > > <>
> > > <>
> > >
> > > This communication, including any attachments, is confidential. If you 
> > > are not the intended recipient, you should not read it – please contact 
> > > me immediately, destroy it, and do not copy or use any part of this 
> > > communication or disclose anything about it. Thank you. Please note that 
> > > this communication does not designate an information system for the 
> > > purposes of the Electronic Transactions Act 2002.
> > >
> > > From: Orie Steele <orie@transmute.industries>
> > > Date: Friday, 21 July 2023 at 7:05 AM
> > > To: Tobias Looker <tobias.looker@mattr.global>
> > > Cc: oauth@ietf.org <oauth@ietf.org>
> > > Subject: Re: [OAUTH-WG] OAuth 2.0 Attestation-Based Client Authentication
> > > EXTERNAL EMAIL: This email originated outside of our organisation. Do not 
> > > click links or open attachments unless you recognise the sender and know 
> > > the content is safe.
> > >
> > > Really excited for this, I'm especially interested in how this might 
> > > apply to M2M flows, related to this part here: 
> > > https://datatracker.ietf.org/doc/html/rfc7521#section-4.2
> > >
> > > It seems very targeted towards mobile / desktop apps, would it work for 
> > > servers / command line tools, etc?
> > >
> > > OS
> > >
> > >
> > > On Thu, Jul 20, 2023 at 1:57 PM Tobias Looker 
> > > <tobias.looker=40mattr.glo...@dmarc.ietf.org> wrote:
> > > > Hi All,
> > > >
> > > > Paul and I would like to draw attention to a new draft we have 
> > > > submitted titled “OAuth 2.0 Attestation-Based Client Authentication” 
> > > > which will be presented at the up and coming IETF 117 meeting during 
> > > > the Friday meeting slot. This draft is related to the group of drafts 
> > > > on verifiable credentials that will be presented during this meeting 
> > > > slot. Specifically this draft is intended to address but not limited to 
> > > > eIDAS 2.0 usage of OpenID4VCI which requires wallet applications to be 
> > > > strongly authenticated via attestations.
> > > >
> > > > The current abstract of the draft is as follows:
> > > >
> > > > “This specification defines a new method of client authentication for 
> > > > OAuth 2.0 [RFC6749] by extending the approach defined in [RFC7521]. 
> > > > This new method enables client deployments that are traditionally 
> > > > viewed as public clients to be able to authenticate with the 
> > > > authorization server through an attestation based authentication 
> > > > scheme.”
> > > >
> > > > Link to the current editors copy => 
> > > > https://datatracker.ietf.org/doc/draft-looker-oauth-attestation-based-client-auth/
> > > > Link to the specification repository => 
> > > > https://github.com/vcstuff/draft-looker-oauth-attestation-based-client-auth
> > > >
> > > > Thanks,
> > > > <image001.png>
> > > >
> > > > Tobias Looker
> > > > MATTR
> > > > +64 273 780 461
> > > > tobias.looker@mattr.global
> > > >
> > > > This communication, including any attachments, is confidential. If you 
> > > > are not the intended recipient, you should not read it – please contact 
> > > > me immediately, destroy it, and do not copy or use any part of this 
> > > > communication or disclose anything about it. Thank you. Please note 
> > > > that this communication does not designate an information system for 
> > > > the purposes of the Electronic Transactions Act 2002.
> > > > _______________________________________________
> > > > OAuth mailing list
> > > > OAuth@ietf.org
> > > > https://www.ietf.org/mailman/listinfo/oauth
> > >
> > >
> > > --
> > >
> > > ORIE STEELE
> > > Chief Technology Officer
> > > www.transmute.industries
>
>
> --
>
> ORIE STEELE
> Chief Technology Officer
> www.transmute.industries
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to