You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: 1.1/openid-4-verifiable-credential-issuance-1_1.md
+2-3Lines changed: 2 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1007,7 +1007,7 @@ This may lead to the malicious Authorization Server gaining access to Credential
1007
1007
1008
1008
Custom extensions ((#iae-custom-extensions)) MUST ensure that this attack is prevented by ensuring one or both of the following:
1009
1009
1010
-
1. The Wallet is able to detect that a request is not presented by the party that initiated the Interactive Authorization Request. In the case of the (#iae-require-presentation) interaction with a signed Presentation request, this is achieved by the Wallet verifying the `expected_origins` parameter in the request, which contains the derived Origin of the Interactive Authorization Endpoint that initiated the request.
1010
+
1. The Wallet is able to detect that a request is not presented by the party that initiated the Interactive Authorization Request. In the case of the (#iae-require-presentation) interaction with a signed Presentation request, this is achieved by the Wallet verifying the `expected_url` parameter in the request, which contains the Interactive Authorization Endpoint that initiated the request.
1011
1011
2. The Authorization Server is able to detect that the request was forwarded to a different endpoint. In the case of the (#iae-require-presentation) interaction, this is achieved for both signed and unsigned requests by the binding the Interactive Authorization Endpoint to the Verifiable Presentation (see "Interactive Authorization Endpoint Binding" sections under (#format-profiles)), which is then verified by the Authorization Server.
To bind the Interactive Authorization Endpoint to a Verifiable Presentation using the Credential Format defined in this section, the `aud` claim in the Key Binding JWT MUST be set to the derived Origin (as defined in (#iae-require-presentation)) of the Interactive Authorization Endpoint, prefixed with `iae:` (e.g., `iae:https://example.com`).
2855
+
To bind the Interactive Authorization Endpoint to a Verifiable Presentation using the Credential Format defined in this section, the `aud` claim in the Key Binding JWT MUST be set to the Interactive Authorization Endpoint, prefixed with `iae:` (e.g., `iae:https://example.com`).
2856
2856
2857
2857
# Claims Description
2858
2858
@@ -3629,7 +3629,6 @@ The technology described in this specification was made available from contribut
3629
3629
* move IAE binding to dedicated format-specific sections
3630
3630
* rename `iar:` prefix in `iae:` in IAE flow
3631
3631
* rename `iar-post` response mode in `iae_post` in IAE flow
3632
-
* use derived origin for `expected_origins` in IAE flow
3633
3632
* add require_interactive_authorization_request to AS metadata
3634
3633
* add interactive_authorization_endpoint to AS metadata section
3635
3634
* use `expected_url` instead of `expected_origins` for IAE flow
0 commit comments