Skip to content

Commit 60d8739

Browse files
skounisdavid-bakkernikosftpaolo-de-rosaphin10
authored
Topic/f/update public (#365)
* Update f-digital-credential-api.md Textual changes to comply with established terminology in the ARF: Wallet Solution -> Wallet Unit credential ->attestation shall -> SHALL Also fixing some typos. * NI-Scy internal review * update in section 2.2 * fix typo in section 2.2 * Added problem statement and minor fixes on formating * raw requirements to be discussed internally * blank lines removed * updated based on our internal review * minor modification in privacy preservation section * fix quotes * fix quotes * img tag used to improve readability --------- Co-authored-by: David Bakker <75264147+david-bakker@users.noreply.github.com> Co-authored-by: Nikos Fotiou <nikosft@gmail.com> Co-authored-by: Paolo De Rosa <paolo.de-rosa@ec.europa.eu> Co-authored-by: Paolo De Rosa <paolo.de.rosa@linux.com> Co-authored-by: Paul Hin <phin@scytales.com>
1 parent 4513fd0 commit 60d8739

File tree

1 file changed

+11
-7
lines changed

1 file changed

+11
-7
lines changed

docs/discussion-topics/f-digital-credential-api.md

Lines changed: 11 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -198,11 +198,12 @@ The same-device flow is currently implemented using the following steps:
198198

199199
1. The User visits the website of the Relying Party and indicates that they want to present some attributes from their Wallet Unit
200200
1. The browser asks consent from the User to allow Digital Credentials API invocation from this particular website.
201-
![Website authorization](img/same-auth.png)
202-
1. The Relying Party website indicates to the browser which attributes they want to request by creating a `presentation request`.
201+
<img src="img/same-auth.png" alt="Website authorization" width="400">
202+
1. The Relying Party indicates to the browser which attributes they want to request by creating a `presentation request`.
203203
1. The operating system searches for attestations that satisfy the requested attributes.
204204
1. The browser presents to the User a selector that includes a list of potentially suitable attestations.
205-
![Website authorization](img/same-select.png)
205+
<img src="img/same-select.png" alt="Attestation selection" width="400">
206+
206207
1. The User selects an attestation. The operating system invokes the Wallet Unit providing as input the selected attestation and the request data
207208
1. The Wallet Unit processes the request according to the relevant specification (e.g., OpenID4VP) and returns the requested attributes through the browser, provided that the Wallet Unit contains the attributes, all required verifications pass and the User consents
208209

@@ -212,16 +213,19 @@ The cross-device flow is implemented using the following steps:
212213

213214
1. The User visits the website of the Relying Party and indicates that they want to present some attributes from their Wallet Unit
214215
1. The browser asks consent from the User to allow Digital Credentials API invocation from this particular website.
215-
![Website authorization](img/cross-auth.png)
216-
1. The Relying Party website indicates to the browser which attributes they want to request by creating a `presentation request`.
216+
<img src="img/cross-auth.png" alt="Website authorization" width="400">
217+
1. The Relying Party indicates to the browser which attributes they want to request by creating a `presentation request`.
217218
1. The browser uses CTAP 2.2 hybrid flow (section 11.5 of \[Ctap\]) to establish a tunnel between the browser and the device where the Wallet Unit is installed (this is the same flow used by Passkey). From a high level this is implemented as follows:
218219
- The browser presents a QR code which includes information about the tunnel endpoint and keys that can be used for establishing a secure session
219220
- The device where the Wallet Unit is installed emits a BLE advertisement which is received by the browser. The advertisement includes in an encrypted form information required for establishing the secure tunnel. This advertisement is used as a proximity check.
220221
- The user scans the QR code using the device camera and a tunnel is established
221-
![QR-code](img/cross-qr.png)
222+
223+
<img src="img/cross-qr.png" alt="QR Code display" width="400">
224+
222225
1. The presentation request is transferred through the tunnel to the device operating system
223226
1. The device operating system presents to the User a selector that includes a list of potentially suitable Wallet Units.
224-
![Attestation selection](img/cross-select.png)
227+
<img src="img/cross-select.png" alt="Attestation selection" width="400">
228+
225229
1. The User selects an attestation. The operating system invokes the Wallet Unit providing as input the selected attestation and the request data
226230
1. The Wallet Unit sends through the tunnel to the browser a suitable presentation
227231

0 commit comments

Comments
 (0)