SlideShare a Scribd company logo
1 of 34
Download to read offline
OpenID for SSI
Kristina Yasuda, Microsoft
Dr. Torsten Lodderstedt, yes.com
OpenID for SSI
• Aims at specifying a set of protocols based on OpenID
Connect and OAuth2.0 to enable SSI applications
• Initiative conducted at OpenID Foundation in liaison with the
Decentralized Identity Foundation (DIF)
• One of the specifications is built up on DID-SIOP in DIDAuth
WG in DIF and SIOPv1 chapter 7 in OIDC Core
- Self-Issued OP (SIOP) already provides good starting point
- Leveraging the simplicity and security of OpenID Connect and
OAuth2.0 for SSI applications
- Existing libraries, only HTTPS communication, developer familiarity
- Great for mobile applications, no firewall hassles
- Security of OpenID Connect has been tested and formally analysed
- Allow existing OpenID Connect RPs to access SSI credentials and
existing OpenID Connect OPs to issue credentials
Why use OpenID Connect/OAuth2.0 as basis?
③ OpenID Connect for Verifiable Credential Issuance
(Issuance of Verifiable Credentials)
OpenID Connect for SSI Components
Issuer
(Website)
Verifier
(Website)
Holder
(Digital Wallet)
Issue
Credentials
Present
Credentials
① Self-Issued OP v2
(key exchange and authentication)
② OpenID Connect for Verifiable Presentations
(Presentation of Verifiable Credentials)
Can be hosted locally on the
user’s device, have cloud
components, or be entirely
hosted in the cloud
Using OIDC4SSI as an authentication protocol to present and issue credentials allows implementers to
choose a combination of DID methods, credential formats and other components of the SSI tech stack.
OIDC4SSI allows variety of choices in the SSI tech stack
SSI Tech Stack component Implementer’s choices when using OIDC4SSI as a protocol
Identifiers Any DID method
- user’s identifier can also be a JWK Thumbprint (`sub` in the ID Token)
- verifier’s identifier can also be a unique string (`client_id` in the request)
Credential Format Any credential format (AnonCreds, LDP-VC, JWT-VC, ISO mDL, etc.)
Revocation Any mechanism (Status List 2021, etc.)
additional trust
mechanisms
Any mechanism (.well-known DID configuration, etc.)
Cryptography Any cryptosuite (EdDSA, ES256K, etc.)
some use-cases…
SIOPv2
Standard OpenID Connect vs SIOP v2
Self-Issued OP model
⓪ User tries to get
access to a resource
Website (RP)
User
Agent
OP
Trust in cryptographically
verifiable identifier
② OP on the user
device issues
subject-signed ID Token
Alice
User-controlled OpenID Connect OP is able to self-sign ID
Tokens and authenticate using the user-controlled key
material (raw public keys or Decentralized identifiers (DIDs))
① RP requests ID Token
OpenID Connect standard model
⓪ User tries to log in
Website (RP)
User
Agent
OP
(3P OpenID Provider)
Trust in 3rd party
Alice ② 3rd Party OP
issues an ID Token
① RP requests ID
Token
OpenID Connect for Verifiable Presentations
Credential
Issuer
③ Verify Credential from
Trusted Credential Issuer
(obtain Issuer’s public key and optionally
check revocation list)
SIOP v2 + OpenID Connect 4 Verifiable Presentations
Presenting Credentials
Website or App
(RP)
User
Agent
OP
Alice
Trust in cryptographically
authenticated identifier
⓪ User tries to get
access to a resource
Stored Verifiable Credentials
Trust in Credential Issuer(s)
② SIOP issues ID Token &
Verifiable Presentation(s)
① RP requests ID Token
and Credential(s)
Status list
(revocation)
Issuer’s
Public Key
- Protocol is credential/presentation format agnostic
- Examples for AnonCreds and mDL in OIDC4VP spec
- passing `presentation_definition` PE object by value or by reference
- Support for Trust Schemes
- for example, request credentials issued by an issuer that is part of a Trust Framework
- Dynamic SIOP discovery and invocation via HTTPS URLs
- enables use of app/universal links and web wallets
- Leverages all OpenID Connect Flows
- SIOP can be entirely locally hosted, have cloud components, be entirely cloud-based
- Cross Device Flow enabled
- Leverages OpenID Connect Metadata for verifiers and wallet management
- Clarify that the key feature of SIOP is ability to sign ID Token using a subject-controlled key material
(iss==sub in ID Token)
- Ongoing: wallet & key attestation
Credentials Presentation (Key & New Features)
- First Implementer’s Drafts of OpenID Connect SIOPV2 and OIDC4VP approved.
Targeting Second Implementer’s Draft by the end of 2022
- Latest Editor’s drafts can be published at:
- https://openid.net/specs/openid-connect-self-issued-v2-1_0.html
- https://openid.net/specs/openid-connect-4-verifiable-presentations-1_0.html
- Existing & ongoing Implementations:
- The European Blockchain Services Infrastructure (EBSI)
- Microsoft
- Workday
- Ping Identity
- Convergence.Tech
- IDunion
- walt.id (eSSIF-Lab)*
- Sphereon
- Gimly
*Some ESSIF projects already utilizes SIOP (based on DID-SIOP & OpenID Connect 4 Identity Assurance)
Credential Presentation (Status)
Demo
Credential Presentation
IDunion Prototype
•Implemented within IDunion project
•Team: Sebastian Bickerle, Paul Wenzel,
Fabian Hauck, & Dr. Daniel Fett
•Use Case: Login to NextCloud using
Verifiable Credentials
•Based on
• Existing NextCloud OpenID Connect Plugin
• Lissi Wallet
• Hyperledger Indy & Indy SDK & AnonCreds
European Banking Identity Prototype
•eSSIF-Lab founded project
•Team: yes.com & walt.id
• Presentation & Issuance via OIDC4SSI
•Based on
• walt.id Wallet (Web Wallet)
• JSON LD based credentials
• did:key (did:ebsi)
eSSIF-Lab is funded by the European Commission, as
part of the Horizon 2020 Research and Innovation
Programme, under Grant Agreement Nº 871932 and it's
framed under Next Generation Internet Initiative.
Architecture
Verifier
Ledger
Frontend Wallet
redirects (HTTPS GET)
(3) “response”
(HTTPS POST)
Backend
polling
on device
cross device
ledger access
(1) QR Code
e.g. DID resolution, revocation info, schema and credential definition
(2) Request payload
(GET request_uri)
Request Example ESSIF Lab (W3C VC)
{
"response_type"
:"id_token",
"client_id":"https://example.com/callback"
,
"scope":"openid",
"redirect_uri"
:"https://example.com/callback"
,
"nonce":"67473895393019470130"
,
...
"claims":{
"vp_token":{
"presentation_definition"
:{
"id":"1",
"input_descriptors"
:[
{
"id":"1",
"schema":{
"uri":"https://raw.githubusercontent.com/…/EuropeanBankIdentity.json"
}
}
]
}
}
}
}
Response Example ESSIF Lab (W3C VC)
{
"iss": "https://self-issued.me/v2",
"aud": "https://example.com/callback",
"sub": "did:key:z6MkqUDiu3MHxAm...mscLT8E9R5CKdbtr7gwR8",
"exp": 1645469476,
"iat": 1645465876,
"nonce": "cdb97870-a3be-49b4-aa55-8c7c7122178a",
"_vp_token": {
"presentation_submission": {
"descriptor_map": [
{
"path": "$",
"format": "ldp_vp",
"path_nested": {
"path": "$.verifiableCredential[0]",
"format": "ldp_vc"
}
],
"definition_id": "1",
"id": "1"
}
}
}
{
"@context" :[
"https://www.w3.org/2018/credentials/v1"
],
"holder" :"did:key:z6MkqUDiu3MHxAmuMQ8jjkLiUu1mscLT8E9R5CKdbtr7gwR8" ,
"id":"urn:uuid:04816f2a-85f1-45d7-a66d-51764d39a569" ,
"proof":{
"domain" :"https://example.com/callback" ,
"jws" :"...",
"nonce":"cdb97870-a3be-49b4-aa55-8c7c7122178a" ,
"proofPurpose" :"authentication" ,
"type":"Ed25519Signature2018" ,
"verificationMethod" :"did:key:z6MkqUDiu3 ..."
},
"type":[
"VerifiablePresentation"
],
"verifiableCredential" :[
{
…
"type":[
"VerifiableCredential" ,
"EuropeanBankIdentity"
],
"credentialSubject" :{
"id":"did:key:z6MkqUDiu3MHxAmuMQ8jjkLiUu1mscLT8E9R5CKdbtr7gwR8" ,
"familyName" :"Family001" ,
"givenName" :"Given001" ,
"birthDate" :"1950-01-01" ,
"placeOfBirth" :{
"country" :"DE",
"locality" :"Berlin"
}
},
ID Token VP Token
Request Example IDunion (AnonCred)
{
"response_type" :"id_token" ,
"client_id" :"https://example.com/callback" ,
"scope":"openid" ,
"redirect_uri" :"https://example.com/callback ",
"nonce":"67473895393019470130" ,
...
"claims" :{
"vp_token" :{
"presentation_definition" :{
"id":"NextcloudLogin" ,
"input_descriptors" :[
{
"id":"ref2",
"name":"NextcloudCredential" ,
"format" : {
"ac_vc": {
"proof_type" : ["CLSignature2019" ]
}
},
"constraints" :{
"limit_disclosure" :"required" ,
"fields":[{
"path": [
"$.schema_id"
],
"filter": {
"type": "string" ,
"pattern": "did:indy:idu:test:3QowxFtwciWceMFr7WbwnM:2:BasicScheme:0.1"
}
},
{"path":[ "$.values.email" ]},
{ "path":["$.values.first_name" ]},
{ "path":["$.values.last_name" ]}]
}
}
Response Example IDunion (AnonCred)
{
"aud": "https://example.com/callback ",
"sub": "9wgU5CR6PdgGmvBfgz_CqAtBxJ33ckMEwvij-gC6Bcw" ,
"auth_time" : 1638483344 ,
"iss": "https://self-issued.me/v2" ,
"sub_jwk" : {
"x": "cQ5fu5VmG…dA_5lTMGcoyQE78RrqQ6" ,
"kty": "EC",
"y": "XHpi27YMA…rnF_-f_ASULPTmUmTS" ,
"crv": "P-384"
},
"exp": 1638483944 ,
"iat": 1638483344 ,
"nonce": "67473895393019470130 ",
"_vp_token" : {
"presentation_submission" : {
"descriptor_map" : [
{
"id": "ref2",
"path": "$",
"format" : "ac_vp",
"path_nested" : {
"path":
"$.requested_proof.revealed_attr_groups.ref2",
"format" : "ac_vc"
}
}
],
"definition_id" : "NextcloudLogin" ,
"id": "NexcloudCredentialPresentationSubmission"
}
}
}
{
"proof": {...},
"requested_proof": {
"revealed_attrs" : {},
"revealed_attr_groups": {
"ref2": {
"sub_proof_index" : 0,
"values" : {
"email": {
"raw": "alice@example.com" ,
"encoded" : "115589951…83915671017846"
},
"last_name" : {
"raw": "Wonderland" ,
"encoded" : "167908493…94017654562035"
},
"first_name" : {
"raw": "Alice",
"encoded" : "270346400…99344178781507"
}
}
}
},
…
},
"identifiers" : [
{
"schema_id" : "3QowxFtwciWceMFr7WbwnM:2:BasicScheme:0.1" ,
"cred_def_id" : "CsiDLAiFkQb9N4NDJKUagd:3:CL:4687:awesome_cred" ,
"rev_reg_id" : null,
"timestamp" : null
}
]
}
ID Token VP Token
OpenID for Credential Issuance
Credential
Issuer
③ Verify Credential from
Trusted Credential Issuer
(obtain Issuer’s public key and optionally
check revocation)
OpenID Connect 4 Verifiable Credentials Issuance
Issuing Credentials
Website or App
(RP)
User
Agent
OP
Alice
Trust in cryptographically
authenticated identifier
⓪ User tries to log in RP
Stored Verifiable Credentials
Trust in Credential Issuer(s)
② SIOP issues ID Token &
Verifiable Presentation(s)
① RP requests ID Token
and Credential(s)
⓪ User requests
Credential
① Credential Issuer
issues credential
- Issuance via OAuth-protected Credential Endpoint
- Currently two authorization flows:
- Code flow (others possible)
■ invoked by Wallet requesting authorization for one or more credentials at
the Authorization Endpoint (may trigger by presentation request during
the issuance)
■ Issuer takes screen control and can authenticate/identify user with
means at Issuer’s discretion
- Pre-authorized code flow (new grant type)
■ Wallet is invoked after completion of process with the Issuer (QR Code
or redirect)
Design Principles
- Protocol is credential format agnostic
- W3C Verifiable Credentials, ISO mobile Driving Licence/electronic ID, SMART Health Cards
- Can be customized to use different methods for proofs of possession of key material
- for example, `jwt` proof type that includes a signature by a key material tied to a DID
- Allows Credential Issuance during Presentation Request (inline issuance)
- Requested credential not found in the wallet
- Allows just-in-time and batch credential issuance as well as credential refresh
- Allows Presentation Request during Credential Issuance
- Issuer is requesting to present a VC as a way to identify a user during Issuance
- Can be built on top of existing OAuth/OpenID implementations
- Leverages OpenID Connect Metadata for wallet & issuer management
- Ongoing: wallet & key attestation to build Issuer’s trust in the wallet
Credential Issuance (Key Features)
- Specification adopted by the working group. Targeting First Implementer’s draft
by the end of 2022.
- https://openid.net/specs/openid-connect-4-verifiable-credential-issuance-1_0.html
- Planned and ongoing implementations:
- The European Blockchain Services Infrastructure (EBSI)
- Microsoft
- Mattr
- IDunion
- walt.id & yes.com & BCDiploma (eSSIF-Lab)
- Sphereon
- Talao.io
- Convergence.Tech
Credential Issuance (Status)
Demo
Credential Issuance
European Banking Identity Prototype
•eSSIF-Lab founded project
•Team: yes.com & walt.id
• Presentation & Issuance via OIDC4SSI
•Based on
• walt.id Wallet (Web Wallet)
• JSON LD based credentials
• did:key (did:ebsi)
eSSIF-Lab is funded by the European Commission, as
part of the Horizon 2020 Research and Innovation
Programme, under Grant Agreement Nº 871932 and it's
framed under Next Generation Internet Initiative.
Authorization Request
HTTP/1.1 302 Found
Location: https://server.example.com/authorize?
response_type=code
&client_id=s6BhdRkqt3
&code_challenge=E9Melhoa2OwvFrEMTJguCHaoeK1t8URWbuGJSstw-cM
&code_challenge_method=S256
&scope=openid_credential:ttps://…/EuropeanBankIdentity.json
&redirect_uri=https://client.example.org/cb
Credential Issuance (W3C VC)
HTTP/1.1 200 OK
Content-Type: application/json
Cache-Control: no-store
Pragma: no-cache
{
"format": "ldp_vc",
"credential" : "eyJjcmVkZW50a...d0MifQ=="
}
POST /credential HTTP/1.1
Host: server.example.com
Content-Type: application/x-www-form-urlencoded
Authorization: BEARER czZCaGRSa3F0MzpnWDFmQmF0M2JW
type=https://…/EuropeanBankIdentity.json
format=ldp_vc
did=did:key:z6MkqUDiu3MHxAmuMQ8jjkLiUu1mscLT8E9R5CKdbtr7gwR8
proof=%7B%22type%22:%22jwt%22…0aW9EkL1nOzM%22%7D
Request Response
Issued Credential
{
...
"issuer": "did:key:z6MkgF2pvVNEFXCksupWKrdPhL6ubecis3AWbWVsr9bNAbwC",
"type": [
"VerifiableCredential",
"EuropeanBankIdentity"
],
"credentialSchema": {
"id": "https://raw.githubusercontent.com/…/EuropeanBankIdentity.json",
},
"credentialSubject": {
"placeOfBirth": {
"country": "DE",
"locality": "Berlin"
},
"familyName": "Family001",
"givenName": "Given001",
"id": "did:key:z6MkmY9NFeyqNTS6nYN1tSeuxg6Sbxi7ntt2wR4Upy9HHSDS",
"birthDate": "1950-01-01"
}
...
}
- Interoperability profile relying on SIOP v2 and OIDC4VP
- Microsoft
- Workday
- Ping Identity
- (Mattr)
- (IBM)
Demo 2
Using OIDC4SSI as an authentication protocol to present and issue credentials allows implementers to
choose a combination of DID methods, credential formats and other components of the SSI tech stack.
OIDC4SSI allows variety of choices in the SSI tech stack
SSI Tech Stack component Implementer’s choices when using OIDC4SSI as a protocol
Identifiers Any DID method
- user’s identifier can also be a JWK Thumbprint (`sub` in the ID Token)
- verifier’s identifier can also be a unique string (`client_id` in the request)
Credential Format Any credential format (AnonCreds, LDP-VC, JWT-VC, ISO mDL, etc.)
Revocation Any mechanism (Status List 2021, etc.)
additional trust
mechanisms
Any mechanism (.well-known DID configuration, etc.)
Cryptography Any cryptosuite (EdDSA, ES256K, etc.)
Announcements
- OIDF Slack channel #wg-connect
Q&A

More Related Content

What's hot

What's hot (20)

OpenID for Verifiable Credentials
OpenID for Verifiable CredentialsOpenID for Verifiable Credentials
OpenID for Verifiable Credentials
 
The European Union goes Decentralized
The European Union goes DecentralizedThe European Union goes Decentralized
The European Union goes Decentralized
 
OpenID for Verifiable Credentials (IIW 35)
OpenID for Verifiable Credentials (IIW 35)OpenID for Verifiable Credentials (IIW 35)
OpenID for Verifiable Credentials (IIW 35)
 
IDA,VC,DID関連仕様 最新情報 - OpenID BizDay #15
IDA,VC,DID関連仕様 最新情報 - OpenID BizDay #15IDA,VC,DID関連仕様 最新情報 - OpenID BizDay #15
IDA,VC,DID関連仕様 最新情報 - OpenID BizDay #15
 
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...
 
What are Decentralized Identifiers (DIDs)?
What are Decentralized Identifiers (DIDs)?What are Decentralized Identifiers (DIDs)?
What are Decentralized Identifiers (DIDs)?
 
Hyperledger Aries 101
Hyperledger Aries 101Hyperledger Aries 101
Hyperledger Aries 101
 
OpenID Connect 4 SSI (at EIC 2021)
OpenID Connect 4 SSI (at EIC 2021)OpenID Connect 4 SSI (at EIC 2021)
OpenID Connect 4 SSI (at EIC 2021)
 
Hyperledger Aries: Open Source Interoperable Identity Solution – Nathan George
Hyperledger Aries: Open Source Interoperable Identity Solution – Nathan GeorgeHyperledger Aries: Open Source Interoperable Identity Solution – Nathan George
Hyperledger Aries: Open Source Interoperable Identity Solution – Nathan George
 
Introduction to Self Sovereign Identity
Introduction to Self Sovereign IdentityIntroduction to Self Sovereign Identity
Introduction to Self Sovereign Identity
 
Decentralized Identifier (DIDs) fundamentals deep dive
Decentralized Identifier (DIDs) fundamentals deep diveDecentralized Identifier (DIDs) fundamentals deep dive
Decentralized Identifier (DIDs) fundamentals deep dive
 
OpenID Connect for W3C Verifiable Credential Objects
OpenID Connect for W3C Verifiable Credential ObjectsOpenID Connect for W3C Verifiable Credential Objects
OpenID Connect for W3C Verifiable Credential Objects
 
次世代 KYC に関する検討状況 - OpenID BizDay #15
次世代 KYC に関する検討状況 - OpenID BizDay #15次世代 KYC に関する検討状況 - OpenID BizDay #15
次世代 KYC に関する検討状況 - OpenID BizDay #15
 
OSCON 2018 Getting Started with Hyperledger Indy
OSCON 2018 Getting Started with Hyperledger IndyOSCON 2018 Getting Started with Hyperledger Indy
OSCON 2018 Getting Started with Hyperledger Indy
 
Cordacon 2018 - Cordentity - Hyperledger Indy + Corda
Cordacon 2018 -   Cordentity - Hyperledger Indy + CordaCordacon 2018 -   Cordentity - Hyperledger Indy + Corda
Cordacon 2018 - Cordentity - Hyperledger Indy + Corda
 
Introduction to Self Sovereign Identity - IIW October 2019
Introduction to Self Sovereign Identity - IIW October 2019Introduction to Self Sovereign Identity - IIW October 2019
Introduction to Self Sovereign Identity - IIW October 2019
 
Verifiable Credentials in Self-Sovereign Identity (SSI)
Verifiable Credentials in Self-Sovereign Identity (SSI)Verifiable Credentials in Self-Sovereign Identity (SSI)
Verifiable Credentials in Self-Sovereign Identity (SSI)
 
FAPI (Financial-grade API) and CIBA (Client Initiated Backchannel Authenticat...
FAPI (Financial-grade API) and CIBA (Client Initiated Backchannel Authenticat...FAPI (Financial-grade API) and CIBA (Client Initiated Backchannel Authenticat...
FAPI (Financial-grade API) and CIBA (Client Initiated Backchannel Authenticat...
 
Verifiable Credentials, Self Sovereign Identity and DLTs
Verifiable Credentials, Self Sovereign Identity and DLTs Verifiable Credentials, Self Sovereign Identity and DLTs
Verifiable Credentials, Self Sovereign Identity and DLTs
 
What is self-sovereign identity (SSI)?
What is self-sovereign identity (SSI)?What is self-sovereign identity (SSI)?
What is self-sovereign identity (SSI)?
 

Similar to OpenID for SSI

FIWARE Training: API Umbrella
FIWARE Training: API UmbrellaFIWARE Training: API Umbrella
FIWARE Training: API Umbrella
FIWARE
 

Similar to OpenID for SSI (20)

How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
 
OpenID Connect Explained
OpenID Connect ExplainedOpenID Connect Explained
OpenID Connect Explained
 
AllTheTalks.Online 2020: "Basics of OAuth 2.0 and OpenID Connect"
AllTheTalks.Online 2020: "Basics of OAuth 2.0 and OpenID Connect"AllTheTalks.Online 2020: "Basics of OAuth 2.0 and OpenID Connect"
AllTheTalks.Online 2020: "Basics of OAuth 2.0 and OpenID Connect"
 
OpenID Connect "101" Introduction -- October 23, 2018
OpenID Connect "101" Introduction -- October 23, 2018OpenID Connect "101" Introduction -- October 23, 2018
OpenID Connect "101" Introduction -- October 23, 2018
 
FIWARE IoT Proposal & Community
FIWARE IoT Proposal & CommunityFIWARE IoT Proposal & Community
FIWARE IoT Proposal & Community
 
apidays LIVE India 2022_Standardizing Biometric Device Integration for Identi...
apidays LIVE India 2022_Standardizing Biometric Device Integration for Identi...apidays LIVE India 2022_Standardizing Biometric Device Integration for Identi...
apidays LIVE India 2022_Standardizing Biometric Device Integration for Identi...
 
Decentralized Identifiers
Decentralized IdentifiersDecentralized Identifiers
Decentralized Identifiers
 
Bye bye Identity Server
Bye bye Identity ServerBye bye Identity Server
Bye bye Identity Server
 
Fiware io t_ul20_cpbr8
Fiware io t_ul20_cpbr8Fiware io t_ul20_cpbr8
Fiware io t_ul20_cpbr8
 
Java EE Application Security With PicketLink
Java EE Application Security With PicketLinkJava EE Application Security With PicketLink
Java EE Application Security With PicketLink
 
Hyperledger Indy tutorial
Hyperledger Indy tutorialHyperledger Indy tutorial
Hyperledger Indy tutorial
 
WSO2 Identity Server - Product Overview
WSO2 Identity Server - Product OverviewWSO2 Identity Server - Product Overview
WSO2 Identity Server - Product Overview
 
Self-issued OpenID Provider_OpenID Foundation Virtual Workshop
Self-issued OpenID Provider_OpenID Foundation Virtual Workshop Self-issued OpenID Provider_OpenID Foundation Virtual Workshop
Self-issued OpenID Provider_OpenID Foundation Virtual Workshop
 
Authorization and Authentication using IdentityServer4
Authorization and Authentication using IdentityServer4Authorization and Authentication using IdentityServer4
Authorization and Authentication using IdentityServer4
 
Microservices Security landscape
Microservices Security landscapeMicroservices Security landscape
Microservices Security landscape
 
Building IAM for OpenStack
Building IAM for OpenStackBuilding IAM for OpenStack
Building IAM for OpenStack
 
FIWARE Training: API Umbrella
FIWARE Training: API UmbrellaFIWARE Training: API Umbrella
FIWARE Training: API Umbrella
 
OpenID Connect - An Emperor or Just New Cloths?
OpenID Connect - An Emperor or Just New Cloths?OpenID Connect - An Emperor or Just New Cloths?
OpenID Connect - An Emperor or Just New Cloths?
 
#5 WSO2 Masterclassitalia - WSO2 Identity Server, un approccio OAUTH2
#5 WSO2 Masterclassitalia - WSO2 Identity Server, un approccio OAUTH2#5 WSO2 Masterclassitalia - WSO2 Identity Server, un approccio OAUTH2
#5 WSO2 Masterclassitalia - WSO2 Identity Server, un approccio OAUTH2
 
2016 pycontw web api authentication
2016 pycontw web api authentication 2016 pycontw web api authentication
2016 pycontw web api authentication
 

More from Torsten Lodderstedt

More from Torsten Lodderstedt (14)

GAIN Presentation.pptx
GAIN Presentation.pptxGAIN Presentation.pptx
GAIN Presentation.pptx
 
Comprehensive overview FAPI 1 and FAPI 2
Comprehensive overview FAPI 1 and FAPI 2Comprehensive overview FAPI 1 and FAPI 2
Comprehensive overview FAPI 1 and FAPI 2
 
Comprehensive overview FAPI 1 and 2
Comprehensive overview FAPI 1 and 2Comprehensive overview FAPI 1 and 2
Comprehensive overview FAPI 1 and 2
 
OpenID Connect 4 Identity Assurance at IIW #32
OpenID Connect 4 Identity Assurance at IIW #32OpenID Connect 4 Identity Assurance at IIW #32
OpenID Connect 4 Identity Assurance at IIW #32
 
Identity Assurance with OpenID Connect
Identity Assurance with OpenID ConnectIdentity Assurance with OpenID Connect
Identity Assurance with OpenID Connect
 
NextGenPSD2 OAuth SCA Mode Security Recommendations
NextGenPSD2 OAuth SCA Mode Security RecommendationsNextGenPSD2 OAuth SCA Mode Security Recommendations
NextGenPSD2 OAuth SCA Mode Security Recommendations
 
Rich Authorization Requests
Rich Authorization RequestsRich Authorization Requests
Rich Authorization Requests
 
Pushed Authorization Requests
Pushed Authorization RequestsPushed Authorization Requests
Pushed Authorization Requests
 
OpenID Connect for Identity Assurance
OpenID Connect for Identity AssuranceOpenID Connect for Identity Assurance
OpenID Connect for Identity Assurance
 
NextGenPSD2 OAuth SCA Mode Security Recommendations
NextGenPSD2 OAuth SCA Mode Security Recommendations NextGenPSD2 OAuth SCA Mode Security Recommendations
NextGenPSD2 OAuth SCA Mode Security Recommendations
 
Identiverse: PSD2, Open Banking, and Technical Interoperability
Identiverse: PSD2, Open Banking, and Technical InteroperabilityIdentiverse: PSD2, Open Banking, and Technical Interoperability
Identiverse: PSD2, Open Banking, and Technical Interoperability
 
OAuth 2.0 Security Reinforced
OAuth 2.0 Security ReinforcedOAuth 2.0 Security Reinforced
OAuth 2.0 Security Reinforced
 
OAuth Security 4 Dummies iiw#27
OAuth Security 4 Dummies iiw#27OAuth Security 4 Dummies iiw#27
OAuth Security 4 Dummies iiw#27
 
Identity Proofing with OpenID Connect
Identity Proofing with OpenID ConnectIdentity Proofing with OpenID Connect
Identity Proofing with OpenID Connect
 

Recently uploaded

一比一原版布兰迪斯大学毕业证如何办理
一比一原版布兰迪斯大学毕业证如何办理一比一原版布兰迪斯大学毕业证如何办理
一比一原版布兰迪斯大学毕业证如何办理
A
 
原版定制(Management毕业证书)新加坡管理大学毕业证原件一模一样
原版定制(Management毕业证书)新加坡管理大学毕业证原件一模一样原版定制(Management毕业证书)新加坡管理大学毕业证原件一模一样
原版定制(Management毕业证书)新加坡管理大学毕业证原件一模一样
asdafd
 
一比一定制美国罗格斯大学毕业证学位证书
一比一定制美国罗格斯大学毕业证学位证书一比一定制美国罗格斯大学毕业证学位证书
一比一定制美国罗格斯大学毕业证学位证书
A
 
一比一原版(毕业证书)新加坡南洋理工学院毕业证原件一模一样
一比一原版(毕业证书)新加坡南洋理工学院毕业证原件一模一样一比一原版(毕业证书)新加坡南洋理工学院毕业证原件一模一样
一比一原版(毕业证书)新加坡南洋理工学院毕业证原件一模一样
AS
 
一比一原版英国格林多大学毕业证如何办理
一比一原版英国格林多大学毕业证如何办理一比一原版英国格林多大学毕业证如何办理
一比一原版英国格林多大学毕业证如何办理
AS
 
一比一原版(Soton毕业证书)南安普顿大学毕业证原件一模一样
一比一原版(Soton毕业证书)南安普顿大学毕业证原件一模一样一比一原版(Soton毕业证书)南安普顿大学毕业证原件一模一样
一比一原版(Soton毕业证书)南安普顿大学毕业证原件一模一样
Fi
 
一比一原版澳大利亚迪肯大学毕业证如何办理
一比一原版澳大利亚迪肯大学毕业证如何办理一比一原版澳大利亚迪肯大学毕业证如何办理
一比一原版澳大利亚迪肯大学毕业证如何办理
SS
 
一比一原版(Polytechnic毕业证书)新加坡理工学院毕业证原件一模一样
一比一原版(Polytechnic毕业证书)新加坡理工学院毕业证原件一模一样一比一原版(Polytechnic毕业证书)新加坡理工学院毕业证原件一模一样
一比一原版(Polytechnic毕业证书)新加坡理工学院毕业证原件一模一样
AS
 
Abortion Clinic in Kwa thema +27791653574 Kwa thema WhatsApp Abortion Clinic ...
Abortion Clinic in Kwa thema +27791653574 Kwa thema WhatsApp Abortion Clinic ...Abortion Clinic in Kwa thema +27791653574 Kwa thema WhatsApp Abortion Clinic ...
Abortion Clinic in Kwa thema +27791653574 Kwa thema WhatsApp Abortion Clinic ...
mikehavy0
 
一比一定制(Temasek毕业证书)新加坡淡马锡理工学院毕业证学位证书
一比一定制(Temasek毕业证书)新加坡淡马锡理工学院毕业证学位证书一比一定制(Temasek毕业证书)新加坡淡马锡理工学院毕业证学位证书
一比一定制(Temasek毕业证书)新加坡淡马锡理工学院毕业证学位证书
B
 
一比一定制(USC毕业证书)美国南加州大学毕业证学位证书
一比一定制(USC毕业证书)美国南加州大学毕业证学位证书一比一定制(USC毕业证书)美国南加州大学毕业证学位证书
一比一定制(USC毕业证书)美国南加州大学毕业证学位证书
Fir
 

Recently uploaded (20)

一比一原版布兰迪斯大学毕业证如何办理
一比一原版布兰迪斯大学毕业证如何办理一比一原版布兰迪斯大学毕业证如何办理
一比一原版布兰迪斯大学毕业证如何办理
 
iThome_CYBERSEC2024_Drive_Into_the_DarkWeb
iThome_CYBERSEC2024_Drive_Into_the_DarkWebiThome_CYBERSEC2024_Drive_Into_the_DarkWeb
iThome_CYBERSEC2024_Drive_Into_the_DarkWeb
 
Dan Quinn Commanders Feather Dad Hat Hoodie
Dan Quinn Commanders Feather Dad Hat HoodieDan Quinn Commanders Feather Dad Hat Hoodie
Dan Quinn Commanders Feather Dad Hat Hoodie
 
原版定制(Management毕业证书)新加坡管理大学毕业证原件一模一样
原版定制(Management毕业证书)新加坡管理大学毕业证原件一模一样原版定制(Management毕业证书)新加坡管理大学毕业证原件一模一样
原版定制(Management毕业证书)新加坡管理大学毕业证原件一模一样
 
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
 
GOOGLE Io 2024 At takes center stage.pdf
GOOGLE Io 2024 At takes center stage.pdfGOOGLE Io 2024 At takes center stage.pdf
GOOGLE Io 2024 At takes center stage.pdf
 
The Rise of Subscription-Based Digital Services.pdf
The Rise of Subscription-Based Digital Services.pdfThe Rise of Subscription-Based Digital Services.pdf
The Rise of Subscription-Based Digital Services.pdf
 
一比一定制美国罗格斯大学毕业证学位证书
一比一定制美国罗格斯大学毕业证学位证书一比一定制美国罗格斯大学毕业证学位证书
一比一定制美国罗格斯大学毕业证学位证书
 
Lowongan Kerja LC Yogyakarta Terbaru 085746015303
Lowongan Kerja LC Yogyakarta Terbaru 085746015303Lowongan Kerja LC Yogyakarta Terbaru 085746015303
Lowongan Kerja LC Yogyakarta Terbaru 085746015303
 
一比一原版(毕业证书)新加坡南洋理工学院毕业证原件一模一样
一比一原版(毕业证书)新加坡南洋理工学院毕业证原件一模一样一比一原版(毕业证书)新加坡南洋理工学院毕业证原件一模一样
一比一原版(毕业证书)新加坡南洋理工学院毕业证原件一模一样
 
Discovering OfficialUSA.com Your Go-To Resource.pdf
Discovering OfficialUSA.com Your Go-To Resource.pdfDiscovering OfficialUSA.com Your Go-To Resource.pdf
Discovering OfficialUSA.com Your Go-To Resource.pdf
 
一比一原版英国格林多大学毕业证如何办理
一比一原版英国格林多大学毕业证如何办理一比一原版英国格林多大学毕业证如何办理
一比一原版英国格林多大学毕业证如何办理
 
TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.
TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.
TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.
 
HUMANIZE YOUR BRAND - FREE E-WORKBOOK Download Now
HUMANIZE YOUR BRAND - FREE E-WORKBOOK Download NowHUMANIZE YOUR BRAND - FREE E-WORKBOOK Download Now
HUMANIZE YOUR BRAND - FREE E-WORKBOOK Download Now
 
一比一原版(Soton毕业证书)南安普顿大学毕业证原件一模一样
一比一原版(Soton毕业证书)南安普顿大学毕业证原件一模一样一比一原版(Soton毕业证书)南安普顿大学毕业证原件一模一样
一比一原版(Soton毕业证书)南安普顿大学毕业证原件一模一样
 
一比一原版澳大利亚迪肯大学毕业证如何办理
一比一原版澳大利亚迪肯大学毕业证如何办理一比一原版澳大利亚迪肯大学毕业证如何办理
一比一原版澳大利亚迪肯大学毕业证如何办理
 
一比一原版(Polytechnic毕业证书)新加坡理工学院毕业证原件一模一样
一比一原版(Polytechnic毕业证书)新加坡理工学院毕业证原件一模一样一比一原版(Polytechnic毕业证书)新加坡理工学院毕业证原件一模一样
一比一原版(Polytechnic毕业证书)新加坡理工学院毕业证原件一模一样
 
Abortion Clinic in Kwa thema +27791653574 Kwa thema WhatsApp Abortion Clinic ...
Abortion Clinic in Kwa thema +27791653574 Kwa thema WhatsApp Abortion Clinic ...Abortion Clinic in Kwa thema +27791653574 Kwa thema WhatsApp Abortion Clinic ...
Abortion Clinic in Kwa thema +27791653574 Kwa thema WhatsApp Abortion Clinic ...
 
一比一定制(Temasek毕业证书)新加坡淡马锡理工学院毕业证学位证书
一比一定制(Temasek毕业证书)新加坡淡马锡理工学院毕业证学位证书一比一定制(Temasek毕业证书)新加坡淡马锡理工学院毕业证学位证书
一比一定制(Temasek毕业证书)新加坡淡马锡理工学院毕业证学位证书
 
一比一定制(USC毕业证书)美国南加州大学毕业证学位证书
一比一定制(USC毕业证书)美国南加州大学毕业证学位证书一比一定制(USC毕业证书)美国南加州大学毕业证学位证书
一比一定制(USC毕业证书)美国南加州大学毕业证学位证书
 

OpenID for SSI

  • 1. OpenID for SSI Kristina Yasuda, Microsoft Dr. Torsten Lodderstedt, yes.com
  • 2. OpenID for SSI • Aims at specifying a set of protocols based on OpenID Connect and OAuth2.0 to enable SSI applications • Initiative conducted at OpenID Foundation in liaison with the Decentralized Identity Foundation (DIF) • One of the specifications is built up on DID-SIOP in DIDAuth WG in DIF and SIOPv1 chapter 7 in OIDC Core
  • 3. - Self-Issued OP (SIOP) already provides good starting point - Leveraging the simplicity and security of OpenID Connect and OAuth2.0 for SSI applications - Existing libraries, only HTTPS communication, developer familiarity - Great for mobile applications, no firewall hassles - Security of OpenID Connect has been tested and formally analysed - Allow existing OpenID Connect RPs to access SSI credentials and existing OpenID Connect OPs to issue credentials Why use OpenID Connect/OAuth2.0 as basis?
  • 4. ③ OpenID Connect for Verifiable Credential Issuance (Issuance of Verifiable Credentials) OpenID Connect for SSI Components Issuer (Website) Verifier (Website) Holder (Digital Wallet) Issue Credentials Present Credentials ① Self-Issued OP v2 (key exchange and authentication) ② OpenID Connect for Verifiable Presentations (Presentation of Verifiable Credentials) Can be hosted locally on the user’s device, have cloud components, or be entirely hosted in the cloud
  • 5. Using OIDC4SSI as an authentication protocol to present and issue credentials allows implementers to choose a combination of DID methods, credential formats and other components of the SSI tech stack. OIDC4SSI allows variety of choices in the SSI tech stack SSI Tech Stack component Implementer’s choices when using OIDC4SSI as a protocol Identifiers Any DID method - user’s identifier can also be a JWK Thumbprint (`sub` in the ID Token) - verifier’s identifier can also be a unique string (`client_id` in the request) Credential Format Any credential format (AnonCreds, LDP-VC, JWT-VC, ISO mDL, etc.) Revocation Any mechanism (Status List 2021, etc.) additional trust mechanisms Any mechanism (.well-known DID configuration, etc.) Cryptography Any cryptosuite (EdDSA, ES256K, etc.)
  • 8. Standard OpenID Connect vs SIOP v2 Self-Issued OP model ⓪ User tries to get access to a resource Website (RP) User Agent OP Trust in cryptographically verifiable identifier ② OP on the user device issues subject-signed ID Token Alice User-controlled OpenID Connect OP is able to self-sign ID Tokens and authenticate using the user-controlled key material (raw public keys or Decentralized identifiers (DIDs)) ① RP requests ID Token OpenID Connect standard model ⓪ User tries to log in Website (RP) User Agent OP (3P OpenID Provider) Trust in 3rd party Alice ② 3rd Party OP issues an ID Token ① RP requests ID Token
  • 9. OpenID Connect for Verifiable Presentations
  • 10. Credential Issuer ③ Verify Credential from Trusted Credential Issuer (obtain Issuer’s public key and optionally check revocation list) SIOP v2 + OpenID Connect 4 Verifiable Presentations Presenting Credentials Website or App (RP) User Agent OP Alice Trust in cryptographically authenticated identifier ⓪ User tries to get access to a resource Stored Verifiable Credentials Trust in Credential Issuer(s) ② SIOP issues ID Token & Verifiable Presentation(s) ① RP requests ID Token and Credential(s) Status list (revocation) Issuer’s Public Key
  • 11. - Protocol is credential/presentation format agnostic - Examples for AnonCreds and mDL in OIDC4VP spec - passing `presentation_definition` PE object by value or by reference - Support for Trust Schemes - for example, request credentials issued by an issuer that is part of a Trust Framework - Dynamic SIOP discovery and invocation via HTTPS URLs - enables use of app/universal links and web wallets - Leverages all OpenID Connect Flows - SIOP can be entirely locally hosted, have cloud components, be entirely cloud-based - Cross Device Flow enabled - Leverages OpenID Connect Metadata for verifiers and wallet management - Clarify that the key feature of SIOP is ability to sign ID Token using a subject-controlled key material (iss==sub in ID Token) - Ongoing: wallet & key attestation Credentials Presentation (Key & New Features)
  • 12. - First Implementer’s Drafts of OpenID Connect SIOPV2 and OIDC4VP approved. Targeting Second Implementer’s Draft by the end of 2022 - Latest Editor’s drafts can be published at: - https://openid.net/specs/openid-connect-self-issued-v2-1_0.html - https://openid.net/specs/openid-connect-4-verifiable-presentations-1_0.html - Existing & ongoing Implementations: - The European Blockchain Services Infrastructure (EBSI) - Microsoft - Workday - Ping Identity - Convergence.Tech - IDunion - walt.id (eSSIF-Lab)* - Sphereon - Gimly *Some ESSIF projects already utilizes SIOP (based on DID-SIOP & OpenID Connect 4 Identity Assurance) Credential Presentation (Status)
  • 14. IDunion Prototype •Implemented within IDunion project •Team: Sebastian Bickerle, Paul Wenzel, Fabian Hauck, & Dr. Daniel Fett •Use Case: Login to NextCloud using Verifiable Credentials •Based on • Existing NextCloud OpenID Connect Plugin • Lissi Wallet • Hyperledger Indy & Indy SDK & AnonCreds
  • 15. European Banking Identity Prototype •eSSIF-Lab founded project •Team: yes.com & walt.id • Presentation & Issuance via OIDC4SSI •Based on • walt.id Wallet (Web Wallet) • JSON LD based credentials • did:key (did:ebsi) eSSIF-Lab is funded by the European Commission, as part of the Horizon 2020 Research and Innovation Programme, under Grant Agreement Nº 871932 and it's framed under Next Generation Internet Initiative.
  • 16. Architecture Verifier Ledger Frontend Wallet redirects (HTTPS GET) (3) “response” (HTTPS POST) Backend polling on device cross device ledger access (1) QR Code e.g. DID resolution, revocation info, schema and credential definition (2) Request payload (GET request_uri)
  • 17. Request Example ESSIF Lab (W3C VC) { "response_type" :"id_token", "client_id":"https://example.com/callback" , "scope":"openid", "redirect_uri" :"https://example.com/callback" , "nonce":"67473895393019470130" , ... "claims":{ "vp_token":{ "presentation_definition" :{ "id":"1", "input_descriptors" :[ { "id":"1", "schema":{ "uri":"https://raw.githubusercontent.com/…/EuropeanBankIdentity.json" } } ] } } } }
  • 18. Response Example ESSIF Lab (W3C VC) { "iss": "https://self-issued.me/v2", "aud": "https://example.com/callback", "sub": "did:key:z6MkqUDiu3MHxAm...mscLT8E9R5CKdbtr7gwR8", "exp": 1645469476, "iat": 1645465876, "nonce": "cdb97870-a3be-49b4-aa55-8c7c7122178a", "_vp_token": { "presentation_submission": { "descriptor_map": [ { "path": "$", "format": "ldp_vp", "path_nested": { "path": "$.verifiableCredential[0]", "format": "ldp_vc" } ], "definition_id": "1", "id": "1" } } } { "@context" :[ "https://www.w3.org/2018/credentials/v1" ], "holder" :"did:key:z6MkqUDiu3MHxAmuMQ8jjkLiUu1mscLT8E9R5CKdbtr7gwR8" , "id":"urn:uuid:04816f2a-85f1-45d7-a66d-51764d39a569" , "proof":{ "domain" :"https://example.com/callback" , "jws" :"...", "nonce":"cdb97870-a3be-49b4-aa55-8c7c7122178a" , "proofPurpose" :"authentication" , "type":"Ed25519Signature2018" , "verificationMethod" :"did:key:z6MkqUDiu3 ..." }, "type":[ "VerifiablePresentation" ], "verifiableCredential" :[ { … "type":[ "VerifiableCredential" , "EuropeanBankIdentity" ], "credentialSubject" :{ "id":"did:key:z6MkqUDiu3MHxAmuMQ8jjkLiUu1mscLT8E9R5CKdbtr7gwR8" , "familyName" :"Family001" , "givenName" :"Given001" , "birthDate" :"1950-01-01" , "placeOfBirth" :{ "country" :"DE", "locality" :"Berlin" } }, ID Token VP Token
  • 19. Request Example IDunion (AnonCred) { "response_type" :"id_token" , "client_id" :"https://example.com/callback" , "scope":"openid" , "redirect_uri" :"https://example.com/callback ", "nonce":"67473895393019470130" , ... "claims" :{ "vp_token" :{ "presentation_definition" :{ "id":"NextcloudLogin" , "input_descriptors" :[ { "id":"ref2", "name":"NextcloudCredential" , "format" : { "ac_vc": { "proof_type" : ["CLSignature2019" ] } }, "constraints" :{ "limit_disclosure" :"required" , "fields":[{ "path": [ "$.schema_id" ], "filter": { "type": "string" , "pattern": "did:indy:idu:test:3QowxFtwciWceMFr7WbwnM:2:BasicScheme:0.1" } }, {"path":[ "$.values.email" ]}, { "path":["$.values.first_name" ]}, { "path":["$.values.last_name" ]}] } }
  • 20. Response Example IDunion (AnonCred) { "aud": "https://example.com/callback ", "sub": "9wgU5CR6PdgGmvBfgz_CqAtBxJ33ckMEwvij-gC6Bcw" , "auth_time" : 1638483344 , "iss": "https://self-issued.me/v2" , "sub_jwk" : { "x": "cQ5fu5VmG…dA_5lTMGcoyQE78RrqQ6" , "kty": "EC", "y": "XHpi27YMA…rnF_-f_ASULPTmUmTS" , "crv": "P-384" }, "exp": 1638483944 , "iat": 1638483344 , "nonce": "67473895393019470130 ", "_vp_token" : { "presentation_submission" : { "descriptor_map" : [ { "id": "ref2", "path": "$", "format" : "ac_vp", "path_nested" : { "path": "$.requested_proof.revealed_attr_groups.ref2", "format" : "ac_vc" } } ], "definition_id" : "NextcloudLogin" , "id": "NexcloudCredentialPresentationSubmission" } } } { "proof": {...}, "requested_proof": { "revealed_attrs" : {}, "revealed_attr_groups": { "ref2": { "sub_proof_index" : 0, "values" : { "email": { "raw": "alice@example.com" , "encoded" : "115589951…83915671017846" }, "last_name" : { "raw": "Wonderland" , "encoded" : "167908493…94017654562035" }, "first_name" : { "raw": "Alice", "encoded" : "270346400…99344178781507" } } } }, … }, "identifiers" : [ { "schema_id" : "3QowxFtwciWceMFr7WbwnM:2:BasicScheme:0.1" , "cred_def_id" : "CsiDLAiFkQb9N4NDJKUagd:3:CL:4687:awesome_cred" , "rev_reg_id" : null, "timestamp" : null } ] } ID Token VP Token
  • 22. Credential Issuer ③ Verify Credential from Trusted Credential Issuer (obtain Issuer’s public key and optionally check revocation) OpenID Connect 4 Verifiable Credentials Issuance Issuing Credentials Website or App (RP) User Agent OP Alice Trust in cryptographically authenticated identifier ⓪ User tries to log in RP Stored Verifiable Credentials Trust in Credential Issuer(s) ② SIOP issues ID Token & Verifiable Presentation(s) ① RP requests ID Token and Credential(s) ⓪ User requests Credential ① Credential Issuer issues credential
  • 23. - Issuance via OAuth-protected Credential Endpoint - Currently two authorization flows: - Code flow (others possible) ■ invoked by Wallet requesting authorization for one or more credentials at the Authorization Endpoint (may trigger by presentation request during the issuance) ■ Issuer takes screen control and can authenticate/identify user with means at Issuer’s discretion - Pre-authorized code flow (new grant type) ■ Wallet is invoked after completion of process with the Issuer (QR Code or redirect) Design Principles
  • 24. - Protocol is credential format agnostic - W3C Verifiable Credentials, ISO mobile Driving Licence/electronic ID, SMART Health Cards - Can be customized to use different methods for proofs of possession of key material - for example, `jwt` proof type that includes a signature by a key material tied to a DID - Allows Credential Issuance during Presentation Request (inline issuance) - Requested credential not found in the wallet - Allows just-in-time and batch credential issuance as well as credential refresh - Allows Presentation Request during Credential Issuance - Issuer is requesting to present a VC as a way to identify a user during Issuance - Can be built on top of existing OAuth/OpenID implementations - Leverages OpenID Connect Metadata for wallet & issuer management - Ongoing: wallet & key attestation to build Issuer’s trust in the wallet Credential Issuance (Key Features)
  • 25. - Specification adopted by the working group. Targeting First Implementer’s draft by the end of 2022. - https://openid.net/specs/openid-connect-4-verifiable-credential-issuance-1_0.html - Planned and ongoing implementations: - The European Blockchain Services Infrastructure (EBSI) - Microsoft - Mattr - IDunion - walt.id & yes.com & BCDiploma (eSSIF-Lab) - Sphereon - Talao.io - Convergence.Tech Credential Issuance (Status)
  • 27. European Banking Identity Prototype •eSSIF-Lab founded project •Team: yes.com & walt.id • Presentation & Issuance via OIDC4SSI •Based on • walt.id Wallet (Web Wallet) • JSON LD based credentials • did:key (did:ebsi) eSSIF-Lab is funded by the European Commission, as part of the Horizon 2020 Research and Innovation Programme, under Grant Agreement Nº 871932 and it's framed under Next Generation Internet Initiative.
  • 28. Authorization Request HTTP/1.1 302 Found Location: https://server.example.com/authorize? response_type=code &client_id=s6BhdRkqt3 &code_challenge=E9Melhoa2OwvFrEMTJguCHaoeK1t8URWbuGJSstw-cM &code_challenge_method=S256 &scope=openid_credential:ttps://…/EuropeanBankIdentity.json &redirect_uri=https://client.example.org/cb
  • 29. Credential Issuance (W3C VC) HTTP/1.1 200 OK Content-Type: application/json Cache-Control: no-store Pragma: no-cache { "format": "ldp_vc", "credential" : "eyJjcmVkZW50a...d0MifQ==" } POST /credential HTTP/1.1 Host: server.example.com Content-Type: application/x-www-form-urlencoded Authorization: BEARER czZCaGRSa3F0MzpnWDFmQmF0M2JW type=https://…/EuropeanBankIdentity.json format=ldp_vc did=did:key:z6MkqUDiu3MHxAmuMQ8jjkLiUu1mscLT8E9R5CKdbtr7gwR8 proof=%7B%22type%22:%22jwt%22…0aW9EkL1nOzM%22%7D Request Response
  • 30. Issued Credential { ... "issuer": "did:key:z6MkgF2pvVNEFXCksupWKrdPhL6ubecis3AWbWVsr9bNAbwC", "type": [ "VerifiableCredential", "EuropeanBankIdentity" ], "credentialSchema": { "id": "https://raw.githubusercontent.com/…/EuropeanBankIdentity.json", }, "credentialSubject": { "placeOfBirth": { "country": "DE", "locality": "Berlin" }, "familyName": "Family001", "givenName": "Given001", "id": "did:key:z6MkmY9NFeyqNTS6nYN1tSeuxg6Sbxi7ntt2wR4Upy9HHSDS", "birthDate": "1950-01-01" } ... }
  • 31. - Interoperability profile relying on SIOP v2 and OIDC4VP - Microsoft - Workday - Ping Identity - (Mattr) - (IBM) Demo 2
  • 32. Using OIDC4SSI as an authentication protocol to present and issue credentials allows implementers to choose a combination of DID methods, credential formats and other components of the SSI tech stack. OIDC4SSI allows variety of choices in the SSI tech stack SSI Tech Stack component Implementer’s choices when using OIDC4SSI as a protocol Identifiers Any DID method - user’s identifier can also be a JWK Thumbprint (`sub` in the ID Token) - verifier’s identifier can also be a unique string (`client_id` in the request) Credential Format Any credential format (AnonCreds, LDP-VC, JWT-VC, ISO mDL, etc.) Revocation Any mechanism (Status List 2021, etc.) additional trust mechanisms Any mechanism (.well-known DID configuration, etc.) Cryptography Any cryptosuite (EdDSA, ES256K, etc.)
  • 33. Announcements - OIDF Slack channel #wg-connect
  • 34. Q&A