You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: draft-ietf-oauth-selective-disclosure-jwt.md
+5-3
Original file line number
Diff line number
Diff line change
@@ -746,7 +746,7 @@ times in an SD-JWT, and likewise, there MAY be multiple arrays within the
746
746
hierarchy with each having selectively disclosable elements. Digests of
747
747
selectively disclosable claims MAY even appear within other Disclosures.
748
748
749
-
The following examples illustrate some of the options an Issuer has. It is up to the Issuer to decide which structure to use, depending on, for example, the expected use cases for the SD-JWT, requirements for privacy, size considerations, or ecosystem requirements. For more examples with nested structures, see (#example-simple_structured) and (#example-complex-structured-sd-jwt).
749
+
The following examples illustrate some of the options an Issuer has. It is up to the Issuer to decide which structure to use, depending on, for example, the expected use cases for the SD-JWT, requirements for privacy, size considerations, or operating environment requirements. For more examples with nested structures, see (#example-simple_structured) and (#example-complex-structured-sd-jwt).
750
750
751
751
The following input JWT Claims Set is used as an example throughout this section:
752
752
@@ -1133,7 +1133,7 @@ validation of the SD-JWT. This is implemented in the last
1133
1133
step of the verification defined in (#sd_jwt_verification).
1134
1134
1135
1135
The precise set of required validity claims will typically be defined by
1136
-
ecosystem rules, application-specific profile, or the credential format and MAY include claims other than
1136
+
operating environment rules, application-specific profile, or the credential format and MAY include claims other than
1137
1137
those listed herein.
1138
1138
1139
1139
## Distribution and Rotation of Issuer Signature Verification Key {#issuer_signature_key_distribution}
@@ -1262,7 +1262,7 @@ between Issuers and Verifiers. This dynamic can compel an otherwise honest Verif
1262
1262
For example, a governmental Issuer might have the authority to mandate that a Verifier report back information
1263
1263
about the credentials presented to it. Legal requirements could further enforce this, explicitly undermining
1264
1264
Issuer/Verifier unlinkability. Similarly, a large service provider issuing credentials might implicitly pressure
1265
-
Verifiers into collusion by incentivizing participation in their larger ecosystem.
1265
+
Verifiers into collusion by incentivizing participation in their larger operating environment.
1266
1266
Deployers of SD-JWT must be aware of these potential power dynamics,
1267
1267
mitigate them as much as possible, and/or make the risks transparent to the user.
1268
1268
@@ -1416,6 +1416,7 @@ Richard Barnes,
1416
1416
Rohan Mahy,
1417
1417
Ryosuke Abe,
1418
1418
Sami Rosendahl,
1419
+
Shawn Emery,
1419
1420
Shawn Butterfield,
1420
1421
Simon Schulz,
1421
1422
Tobias Looker,
@@ -1980,6 +1981,7 @@ data. The original JSON data is then used by the application. See
1980
1981
-18
1981
1982
1982
1983
* Update PID example to align with the latest ARF and update the ARF reference
0 commit comments