Skip to content

Commit ef709d1

Browse files
Merge pull request #400 from emlun/typos-etc
Fix some typos, formatting etc.
2 parents e3aa0cd + 3a2e14a commit ef709d1

File tree

4 files changed

+30
-32
lines changed

4 files changed

+30
-32
lines changed

docs/annexes/annex-2/annex-2-high-level-requirements.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -175,7 +175,7 @@ B. User approval
175175

176176
| **Index** | **Requirement specification** |
177177
|-----------|--------------|
178-
| RPA_07 | A Wallet Unit SHALL ensure the User approved the release of any attribute(s) in the Wallet Unit to a Relying Party, prior to releasing these attribute. A Wallet Unit SHALL always allow the User to refuse releasing an attribute requested by the Relying Party. |
178+
| RPA_07 | A Wallet Unit SHALL ensure the User approved the release of any attribute(s) in the Wallet Unit to a Relying Party, prior to releasing these attributes. A Wallet Unit SHALL always allow the User to refuse releasing an attribute requested by the Relying Party. |
179179
| RPA_08 | A Wallet Unit SHALL ensure that (one of) its WSCA(s) has authenticated the User before allowing the User to give or refuse approval for releasing any attributes. *Note: See [[Topic 09](#a239-topic-9---wallet-unit-attestation)] for information about the WSCA.* |
180180
| RPA_09 | A Relying Party SHOULD communicate in the request which attributes are needed for which purpose (use case, service), if this is supported by the protocol used for communication with the Wallet Unit. *Notes: - This could be done, for instance, by grouping the attributes and describing the use case, service, or purpose of each group. - The purpose of this recommendation is that a Relying Party makes clear to the User what the intended use, the service being accessed, or the specific purpose is of each requested attribute. For example, a service may legally require attributes for age verification (e.g., birthdate), but the Relying Party may additionally want a User address (e.g., street, location, PObox, country) in order to offer added-value services. Age verification attributes and address attributes should be grouped separately, and the purposes should be clearly distinguished. This allows the User to be better informed about the request, and also allows them to approve one purpose but deny the other; see RPA_10.* |
181181
| RPA_10 | If a Wallet Unit receives a request indicating one or more purposes (use cases, services) for requesting attributes, the Wallet Instance SHOULD show these to the User when asking for User approval. Moreover, the Wallet Unit SHOULD ensure that for each purpose, the User gives approval either to release all attributes requested for that purpose, or none of them. *Note: This means that a User should either approve the release of all attributes in a given group or to deny the entire group. The Wallet Unit should not allow partial approval within a group. Partial approval would mean that the Relying Party cannot deliver the service, but nevertheless receives some User attributes. This would be a violation of the User's privacy.* |
@@ -192,7 +192,7 @@ Note: This Topic does not pertain to access certificates for Relying Parties, PI
192192

193193
| **Index** | **Requirement specification** |
194194
|-----------|--------------|
195-
| VCR_01 | A PID Provider, QEAA Provider, PuB-EAA Provider, or Wallet Provider SHALL use one of the following methods for revocation of a PID, QEAA, PuB-EAA, or WUA: - Only issue short-lived attestations having a validity period of 24 hours or less, such that revocation will never be necessary,Use an Attestation Status List mechanism specified per VCR_11, or - Use an Attestation Revocation List mechanism specified per VCR_11. *Note: The 24-hour period originates from ETSI EN 319 411-1 V1.4.1, requirement REV-6.2.4-03A. This requires that the process of revocation must take at most 24 hours. Consequently, revocation may make no sense if the attestation is valid for less than 24 hours, because it may reach the end of its validity period before it is revoked.* |
195+
| VCR_01 | A PID Provider, QEAA Provider, PuB-EAA Provider, or Wallet Provider SHALL use one of the following methods for revocation of a PID, QEAA, PuB-EAA, or WUA: - Only issue short-lived attestations having a validity period of 24 hours or less, such that revocation will never be necessary, Use an Attestation Status List mechanism specified per VCR_11, or - Use an Attestation Revocation List mechanism specified per VCR_11. *Note: The 24-hour period originates from ETSI EN 319 411-1 V1.4.1, requirement REV-6.2.4-03A. This requires that the process of revocation must take at most 24 hours. Consequently, revocation may make no sense if the attestation is valid for less than 24 hours, because it may reach the end of its validity period before it is revoked.* |
196196
| VCR_02 | For non-qualified EAAs, the relevant Rulebook SHALL specify whether that type of EAA must be revocable. If a non-qualified EAA type must be revocable, the relevant Rulebook SHALL determine which of the methods mentioned in VCR_01 must be implemented by the relevant EAA Providers for the revocation of such an EAA. |
197197
| VCR_03 | If a PID or attestation is revocable, the PID Provider of a given PID, or the Attestation Provider of a given attestation, SHALL be the only party in the EUDI Wallet ecosystem responsible for executing the revocation of that PID or attestation. Similarly, if a WUA is revocable, the Wallet Provider of a given WUA SHALL be the only party in the EUDI Wallet ecosystem responsible for executing the revocation of that WUA. *Note: A PID Provider, Attestation Provider or Wallet Provider MAY outsource the operation of the revocation process to a third party.* |
198198
| VCR_04 | A PID Provider, Attestation Provider or Wallet Provider that revoked a PID or attestation SHALL NOT reverse the revocation. |

docs/architecture-and-reference-framework-main.md

Lines changed: 10 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -2189,7 +2189,7 @@ Provider's requirements and therefore is fit to receive a PID or an attestation
21892189
from the Provider.
21902190
- Moreover, the WUA contains a WUA public key. During the issuance of a PID or
21912191
an attestation (see [Section
2192-
6.6.2.3](#6623-pid-provider-or-attestation-provider-validates-the-wallet-unit),
2192+
6.6.2.3](#6623-pid-provider-or-attestation-provider-validates-the-wallet-unit)),
21932193
a PID Provider or Attestation Provider can use this public key to verify that
21942194
the Wallet Unit is in possession of the corresponding private key. Moreover, at
21952195
that time, the Wallet Unit will send another public key to the PID Provider or
@@ -2685,12 +2685,12 @@ will be further discussed with Member States for ARF 2.0.
26852685
##### 6.6.3.5 Wallet Unit obtains User approval for presenting selected attributes
26862686

26872687
**Note: In this document the term 'User approval' exclusively refers to a User's
2688-
*decision to present an attribute to a Relying Party. Under no circumstances
2689-
*should User approval to present data from their Wallet Unit be construed as
2690-
*lawful grounds for the processing of personal data by the Relying Party or any
2691-
*other entity. A Relying Party requesting or processing personal data from a
2692-
*Wallet Unit must ensure that it has grounds for lawful processing of that data,
2693-
*according to Article 6 of the GDPR.**
2688+
decision to present an attribute to a Relying Party. Under no circumstances
2689+
User approval to present data from their Wallet Unit should be construed as
2690+
lawful grounds for the processing of personal data by the Relying Party or any
2691+
other entity. A Relying Party requesting or processing personal data from a
2692+
Wallet Unit must ensure that it has grounds for lawful processing of that data,
2693+
according to Article 6 of the GDPR.**
26942694

26952695
Before presenting any attribute to a Relying Party, the Wallet Unit requests the
26962696
User for their approval. This is critical for ensuring that the User remains in
@@ -2717,7 +2717,7 @@ regarding User approval can be found in [Topic 6].
27172717

27182718
Another prerequisite for effective User approval is that the Wallet Unit allows
27192719
the selective disclosure of attributes. Selective disclosure implies mainly two
2720-
thing. First, it enables a Relying Party to specify which of the attributes in
2720+
things. First, it enables a Relying Party to specify which of the attributes in
27212721
an attestation it wishes to receive (and which ones not). A Relying Party may
27222722
have different purposes for the requested attributes. For example, an online
27232723
liquor shop may need an age attestation to comply with its legal obligations,
@@ -3407,7 +3407,7 @@ policy enforcement can be found in [Section 6.6.3.4](#6634-wallet-unit-evaluates
34073407

34083408
User privacy is a key aspect in the design and implementation of the EUDI Wallet
34093409
ecosystem. Attributes are presented as electronic attestations using formats
3410-
based on salted and hashed attributed. These attestations contain unique, fixed elements
3410+
based on salted and hashed attributes. These attestations contain unique, fixed elements
34113411
such as hash values, public keys, and signatures. Malicious Relying Parties could
34123412
exploit these values to track Users by storing and comparing them across
34133413
multiple transactions, identifying recurring patterns. This privacy threat,
@@ -3438,7 +3438,7 @@ relying on salted-attribute hashes. However, the integration of ZKPs in the EUDI
34383438
Wallet ecosystem is still under discussion and development due to the complexity
34393439
of implementing ZKP solutions in secure hardware and the lack of support in
34403440
currently available secure hardware (WSCDs). This topic will be further explored
3441-
in the context of of the next major release od the ARF. As with Relying Party
3441+
in the context of the next major release of the ARF. As with Relying Party
34423442
linkability, organizational and enforcement measures can help deter Attestation
34433443
Providers from colluding and tracking Users. Additionally, many Attestation
34443444
Providers are subject to regular audits, making it easier to detect collusion
@@ -3527,8 +3527,6 @@ approaches to address the issue positively.
35273527
- Approach discussions with a **mindset of collaboration and problem-solving**.
35283528
- Be **open to different perspectives**, as contributors may have different
35293529
viewpoints, experiences, and expertise levels.
3530-
- Be **open to different perspectives**, as contributors may have different
3531-
viewpoints, experiences, and expertise levels.
35323530
- Contribute to a **positive and welcoming community atmosphere**.
35333531

35343532
#### 8.2.2 Managing Issues and Pull Requests

docs/discussion-topics/c-wallet-unit-attestation.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -647,7 +647,7 @@ See chapter 4 above. In addition, discussions of the WUA in the main part of the
647647

648648
| Reference | Description |
649649
|-----------------|--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
650-
| [WebAuthN] | Web Authentication: An API for accessing Public Key Credentials Level 2 W3C Recommendation, 8 April 2021, https://www.w3.org/TR/webauthn-2/ |
650+
| [WebAuthn] | Web Authentication: An API for accessing Public Key Credentials Level 2 W3C Recommendation, 8 April 2021, https://www.w3.org/TR/webauthn-2/ |
651651
| [ARF_DevPlan] | Architecture and Reference Framework Development plan 2025, European Commission, v1.0. |
652652
| [Topic A] | Topic A - Privacy Risks and Mitigations |
653653
| [RiskRegister] | Annex 1 to the Commission Implementing Regulation laying down rules for the application of Regulation (EU) No 910/2014 of the European Parliament and of the Council as regards the certification of the European Digital Identity Wallets, European Commission, October 2024, draft |

0 commit comments

Comments
 (0)