-
Notifications
You must be signed in to change notification settings - Fork 22
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
RFC-010: Review #127
base: main
Are you sure you want to change the base?
RFC-010: Review #127
Conversation
…ddition of references.
README: Added RFC-010 link.
The document explains how to obtain the signing certificate information and how to authorize the creation of a signature, but the wallet is not used for the purposes mentioned above, i.e. authenticating to the QTSP remote signing service and/or authorizing the creation of a signature towards the QTSP remote signing service. Therefore, I do not understand the content of the summary and motivation clauses where it is mentioned that the EUDI Wallet is used as a means of user authentication and for enabling remote digital document signing using long-term certificates. |
@kerk12 in the diagram at line 108 it feels like that is a part missing. After the PID presentation towards the RSS how can the next step be the Credential authz towards the RQES without any interim step? Am I missing something or are the provided information incomplete. |
In Section 4.1: the sentence "Checks should be performed in order to make sure the presented document is valid and current (out of scope)." should be reformulated or even removed (since its anyway out of scope). Further, it says: "The Signing Service should then use these attributes, along with data from the authentication context of the user to issue a QES Auth Credential (QESAC), including in its token claim a unique identifier or token, binding the user's profile to this VC.". Does this mean that the QESAC contains besides the token also other attributes? If yes, we should include an example otherwise we need to reformulate the text. The meaning of the paragraph VCT of QESAC is not clear to me and also shows that there are more parameters in the QESAC, therefore, a full QESAC example would be helpful. |
In section 4.2.2 it says "The token inside the QESAC is valid and not recalled.". What does recalled mean in this context? |
Section 4.4.1: Maybe we can simplify the heading to Signature Confirmation |
In Section 4.4.2 it says: "The Signing Service will need to parse the |
In Section 4.4.2 the RFC defines the two options for auth.modes. According to the description, all providers will have to support both. Should we consider making one option mandatory and the other one optional? This could help implementers to reduce implementation effort. |
@andreasabr You are right on this. The diagram needs updating (I may have forgotten to update it after the addition of the QESAC). |
I'll be removing it since it's, as you say, out of scope.
No, I'm just saying (incorrectly worded) that the
As I said above, there aren't any parameters on the QESAC other than the |
We can make one mandatory and the other optional. The simplest one to implement would be |
Say that a QESAC is compromised for some reason, the signing service can mark the QESAC as recalled and the signing request would be rejected. |
No description provided.