-
Notifications
You must be signed in to change notification settings - Fork 10
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Implementation of Onboarding Process and DCP Issuance Flow for BYOW #1160
Comments
As a future enhancement we should discuss this suggestion to store the signed "Legal Participant Credential" of the Clearing House: But its for Jupiter Release 25.09 or later |
@hkny could you please provide the diagrams we worked on the ssi expert group in the description? cc: @marcelruland |
@evegufy the issuance and re-issuance flows from https://github.com/catenax-eV/cx-ex-ssi/blob/docs/flows/docs/Issuance/issuance.md are added. Should we also include additional flows, like key Rotation and Revocation? In that case, we might want to increase the scope of this ticket from DCP Issuance flow to more set of capabilties required for the issuance service. |
Relevant committers/contributors: @borisrizov-zf, @rafaelmag110, @bmg13, @leandro-cavalcante |
@hkny yes, I think the additional flows should also be covered by this issue. From our previous discussions, I thought we were aligned on that this issues should cover all |
@marcelruland #1169 does cover multiple wallet provider (solution 1 in our ssi expert group lingo) and this one will cover solution 2. |
was presented in open planning 25.06 |
Overview
As a part of Bring Your Own Wallet (BYOW) efforts within the Catena-X to decentralize the wallet ecosystem in the network, it is necessary for some of the Tractus-X components (i.e. Portal Backend) to foster this movement and some of the components (i.e., ssi-credential-issuer) to be decommissioned and substituted by new components (tractusx-issuer-service)
Currently the ssi-credential-issuer requires clientID and secret for the individual wallet tenants within the SAP DIV Wallet, which is offered as a Core Service B from the operating company. This approach has several issues
The solution is to implement a secure credential exchange protocol to make sure that components and services running in different domains / organizations can issue / store credential in a secure manner.
To address this issue, the Decentralized Claims Protocol (DCP) issuance flow is proposed to be the Catena-X Standard for issuing Verifiable Credentials (VC).
The ssi-credential-issuer is to be replaced by the new issuer service, that already brings the capabilities of the DCP Issuance Flow.
Onboarding Process
The decentralization of the wallet and different offerings, such as wallet-as-a-service of self-hosted wallets, it is required to implement different flows for the onboarding process. It will be necessary to make the necessary changes in the portal backend and frontend components.
Explain the topic in 2 sentences
Current issuance flow within Catena-X has flaws due to security reasons mentioned in Overview.
It is to be replaced by the DCP issuance flow
Replacement is to be done by replacing the ssi-credential-issuer with the issuer service
Onboarding Processes must be adapted for portal backend and frontend
What's the benefit?
Security
Enabling the decentralization of the wallets within the Catena-X network
What are the Risks/Dependencies ?
Interface Partners are the Portal backend and the Wallet (SAP DIV Wallet, Identity Hub, Wallet-stub)
Potential API changes that comes with the issuer service for Portal to visualize the active / archived / revoked Credentials
Potential API changes that comes from on-boarding, issuance, re-issuance, key rotation, off-boarding features to portal backend
Detailed explanation
To be refined
Current implementation
The onboarding / issuance flow:
Proposed improvements
DCP issuance flow:
Besides the DCP Issuance Flow as a secure exchange protocol, the improvement adds the key features like key rotation and off-boarding, which was missing in the Catena-X / Tractus-X as capabilities
Feature Team
Contributor
Committer
User Stories
see sub-issues
To be refined
Acceptance Criteria
Test Cases
To be refined
Test Case 1
Steps
Expected Result
Architectural Relevance
The following items are ensured (answer: yes) after this issue is implemented.
In the context of the standards 126 and 127, typically only one is applicable, depending on the specific use case. Please cross out one of the two standards that does not apply.
Justification: (Fill this out, if at least one of the checkboxes above cannot be ticked. Contact the Architecture Management Committee to get an approval for the justification)
Additional information
To be created sub-issues
The text was updated successfully, but these errors were encountered: