Skip to content

Commit a613767

Browse files
authored
Editorial nits from secdir last call review (#565)
* Editorial nits from secdir last call review * Also ack Shawn and add to doc history
1 parent c9e4144 commit a613767

File tree

1 file changed

+5
-3
lines changed

1 file changed

+5
-3
lines changed

draft-ietf-oauth-selective-disclosure-jwt.md

+5-3
Original file line numberDiff line numberDiff line change
@@ -746,7 +746,7 @@ times in an SD-JWT, and likewise, there MAY be multiple arrays within the
746746
hierarchy with each having selectively disclosable elements. Digests of
747747
selectively disclosable claims MAY even appear within other Disclosures.
748748

749-
The following examples illustrate some of the options an Issuer has. It is up to the Issuer to decide which structure to use, depending on, for example, the expected use cases for the SD-JWT, requirements for privacy, size considerations, or ecosystem requirements. For more examples with nested structures, see (#example-simple_structured) and (#example-complex-structured-sd-jwt).
749+
The following examples illustrate some of the options an Issuer has. It is up to the Issuer to decide which structure to use, depending on, for example, the expected use cases for the SD-JWT, requirements for privacy, size considerations, or operating environment requirements. For more examples with nested structures, see (#example-simple_structured) and (#example-complex-structured-sd-jwt).
750750

751751
The following input JWT Claims Set is used as an example throughout this section:
752752

@@ -1133,7 +1133,7 @@ validation of the SD-JWT. This is implemented in the last
11331133
step of the verification defined in (#sd_jwt_verification).
11341134

11351135
The precise set of required validity claims will typically be defined by
1136-
ecosystem rules, application-specific profile, or the credential format and MAY include claims other than
1136+
operating environment rules, application-specific profile, or the credential format and MAY include claims other than
11371137
those listed herein.
11381138

11391139
## Distribution and Rotation of Issuer Signature Verification Key {#issuer_signature_key_distribution}
@@ -1262,7 +1262,7 @@ between Issuers and Verifiers. This dynamic can compel an otherwise honest Verif
12621262
For example, a governmental Issuer might have the authority to mandate that a Verifier report back information
12631263
about the credentials presented to it. Legal requirements could further enforce this, explicitly undermining
12641264
Issuer/Verifier unlinkability. Similarly, a large service provider issuing credentials might implicitly pressure
1265-
Verifiers into collusion by incentivizing participation in their larger ecosystem.
1265+
Verifiers into collusion by incentivizing participation in their larger operating environment.
12661266
Deployers of SD-JWT must be aware of these potential power dynamics,
12671267
mitigate them as much as possible, and/or make the risks transparent to the user.
12681268

@@ -1416,6 +1416,7 @@ Richard Barnes,
14161416
Rohan Mahy,
14171417
Ryosuke Abe,
14181418
Sami Rosendahl,
1419+
Shawn Emery,
14191420
Shawn Butterfield,
14201421
Simon Schulz,
14211422
Tobias Looker,
@@ -1980,6 +1981,7 @@ data. The original JSON data is then used by the application. See
19801981
-18
19811982

19821983
* Update PID example to align with the latest ARF and update the ARF reference
1984+
* Editorial updates from SECDIR IETF LC review
19831985

19841986
-17
19851987

0 commit comments

Comments
 (0)