Skip to content

Commit 621d96a

Browse files
committed
fix: removed redudant history entry; fixed SD-JWT VC IAE binding section; applied Tim's suggestion
1 parent abe5965 commit 621d96a

File tree

1 file changed

+2
-3
lines changed

1 file changed

+2
-3
lines changed

1.1/openid-4-verifiable-credential-issuance-1_1.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1007,7 +1007,7 @@ This may lead to the malicious Authorization Server gaining access to Credential
10071007

10081008
Custom extensions ((#iae-custom-extensions)) MUST ensure that this attack is prevented by ensuring one or both of the following:
10091009

1010-
1. The Wallet is able to detect that a request is not presented by the party that initiated the Interactive Authorization Request. In the case of the (#iae-require-presentation) interaction with a signed Presentation request, this is achieved by the Wallet verifying the `expected_origins` parameter in the request, which contains the derived Origin of the Interactive Authorization Endpoint that initiated the request.
1010+
1. The Wallet is able to detect that a request is not presented by the party that initiated the Interactive Authorization Request. In the case of the (#iae-require-presentation) interaction with a signed Presentation request, this is achieved by the Wallet verifying the `expected_url` parameter in the request, which contains the Interactive Authorization Endpoint that initiated the request.
10111011
2. The Authorization Server is able to detect that the request was forwarded to a different endpoint. In the case of the (#iae-require-presentation) interaction, this is achieved for both signed and unsigned requests by the binding the Interactive Authorization Endpoint to the Verifiable Presentation (see "Interactive Authorization Endpoint Binding" sections under (#format-profiles)), which is then verified by the Authorization Server.
10121012

10131013
### Authorization Code Response {#iae-authorization-code-response}
@@ -2852,7 +2852,7 @@ The following is a non-normative example of a Credential Response containing a C
28522852

28532853
### Interactive Authorization Endpoint Binding {#iae-binding-sd-jwt-vc}
28542854

2855-
To bind the Interactive Authorization Endpoint to a Verifiable Presentation using the Credential Format defined in this section, the `aud` claim in the Key Binding JWT MUST be set to the derived Origin (as defined in (#iae-require-presentation)) of the Interactive Authorization Endpoint, prefixed with `iae:` (e.g., `iae:https://example.com`).
2855+
To bind the Interactive Authorization Endpoint to a Verifiable Presentation using the Credential Format defined in this section, the `aud` claim in the Key Binding JWT MUST be set to the Interactive Authorization Endpoint, prefixed with `iae:` (e.g., `iae:https://example.com`).
28562856

28572857
# Claims Description
28582858

@@ -3629,7 +3629,6 @@ The technology described in this specification was made available from contribut
36293629
* move IAE binding to dedicated format-specific sections
36303630
* rename `iar:` prefix in `iae:` in IAE flow
36313631
* rename `iar-post` response mode in `iae_post` in IAE flow
3632-
* use derived origin for `expected_origins` in IAE flow
36333632
* add require_interactive_authorization_request to AS metadata
36343633
* add interactive_authorization_endpoint to AS metadata section
36353634
* use `expected_url` instead of `expected_origins` for IAE flow

0 commit comments

Comments
 (0)