Skip to content

Introduce a configuration option to enforce the use of key_attestation #508

@babisRoutis

Description

@babisRoutis

According to HAIP v1 and ETSI TS 119 472-3, proofs of type jwt cannot be used, unless they include a key_attestation and signed with the first of the attested keys (found in the key_attestation).

This means that the wallet for device-bound attestations must use either:

  • Proof of type attestation
  • Proof of type jwt + key_attestation

That is, Proof of type jwt (without key_attestation) is not allowed

In addition, HAIP v1 allows issuance of non-device-bound attestations, where Proofs are not used, but to my knowledge this is not included in the ETSI TS 119 472-3.

The above rules are not being taken into account by the present library when processing a credential offer.
Library should reject a credential configurations that require Proof of type jwt without key_attestation

For this reason we should

  • Introduce a new option to allow caller define its policy with regards to device-bound attestations.This could be a data class describing the algorithms supported for signing the KA and/or the Proof of type JWT+KA.

  • Depending on the option, library should validate the credential configuration.

Metadata

Metadata

Assignees

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions