Skip to content

Commit

Permalink
Merge pull request #102 from jimmarino/feat/cip-update
Browse files Browse the repository at this point in the history
feat: Update CIP to align terminology and formatting
  • Loading branch information
jimmarino authored Nov 18, 2024
2 parents 826f468 + e7760e5 commit c0472d9
Show file tree
Hide file tree
Showing 7 changed files with 244 additions and 346 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -5,9 +5,9 @@
"https://www.w3.org/2018/credentials/examples/v1"
],
"type": "CredentialRequestMessage",
"format": "ldp_vd",
"format": "jwt_vc_json",
"credentialType": [
"VerifiableCredential",
"AlumniCredential"
"OrganizationCredential"
]
}
4 changes: 2 additions & 2 deletions specifications/base.protocol.md
Original file line number Diff line number Diff line change
Expand Up @@ -106,6 +106,6 @@ version and the following context URI: `https://w3id.org/dspace-dcp/v0.8`.

# The Base URL

All endpoint URLs in this specification are relative. The base URL is implementation-specific and may include
additional context information such as a sub-path that disambiguates a holder.
All endpoint URLs in this specification are relative. The base URL MUST use the HTTPS scheme. The base URL is
implementation-specific and may include additional context information such as a sub-path that disambiguates a holder.

557 changes: 229 additions & 328 deletions specifications/credential.issuance.protocol.md

Large diffs are not rendered by default.

2 changes: 1 addition & 1 deletion specifications/dataspace.ecosystem.md
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@ adheres to the model defined by the Dataspace Protocol [[dsp-base]]:

- The <dfn>Dataspace Authority</dfn> is responsible for operational management of the dataspace, including participant
registration and designation of trust credential issuers.
- A </dfn>Participant</dfn> is a member of the dataspace. Members may take on different roles, which are attested to by
- A <dfn>Participant</dfn> is a member of the dataspace. Members may take on different roles, which are attested to by
verifiable credentials.
- A <dfn>Participant Agent</dfn> performs tasks such as publishing a catalog or engaging in data transfer. Note that a
participant agent is a logical construct and does not necessarily correspond to a single runtime process.
Expand Down
Binary file modified specifications/issuance.flow.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
21 changes: 9 additions & 12 deletions specifications/issuance.flow.puml
Original file line number Diff line number Diff line change
Expand Up @@ -7,26 +7,23 @@ autonumber

box "Client Entity"
participant "Client" as C
participant "Credential Service" as CS
participant "Secure Token Service" as STS
participant "DID Service" as DS
participant "Credential Service" as CS
end box

box "Issuer Entity"
participant "Issuer Service(s)" as IS #FFF4B3
participant "Issuer Service" as IS
end box

group #F3F7FF Base Identity Protocol
C -> STS: Self-Issued ID token request
STS -> C: Token response w/ access token
end

'#E6F8E9
group #FFF4B3 Issuance Protocol
C -> IS: Request Credential using Self-Issued ID token
group #E6F8E9 Verifiable Presentation Protocol
IS -> CS: (async) )Write Membership Credential
end
end
C -> IS: Request credential(s) using Self-Issued ID token
DS <- IS: Resolve DID
DS -> IS: DID document response
C <- IS: Ack
CS <- IS: (async) Write credential(s)\n w/ access token
CS -> CS: Validate token and\n store credentials


@enduml
2 changes: 1 addition & 1 deletion specifications/verifiable.presentation.protocol.md
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,7 @@ The following sequence diagram depicts a non-normative flow where a client inter
client wants the Verifier to have access to. This set of scopes is determined out of band and may be derived from
metadata the verifier has previously made available to the client.
2. The [=Secure Token Service=] responds with the Self-Signed ID token containing a `token` claim with the value set to
an access token. The access token can be used by the verifier to request Verifiable Credentials from the client's
an access token. The access token can be used by the verifier to request [=Verifiable Credentials=] from the client's
Credential Service.
3. The client makes a request to the [=Verifier=] for a protected resource and includes the [=Self-Issued ID Token=].
4. The [=Verifier=] resolves the client [=DID=] based on the value of the [=Self-Issued ID Token=] `sub` claim.
Expand Down

0 comments on commit c0472d9

Please sign in to comment.