-
Notifications
You must be signed in to change notification settings - Fork 4
Description
In my understanding, siopv2 enables to create federations of self-issued OpenID providers to federate wallets with a base OAuth client. This assumption come from the the idea behind "login with" buttons where the federated server has to be registered to the authorization server through an OAuth client. An id_token can act as a client_id forming the same idea of federation. It helps to have a known public client at each step for the oid4vc flows.
Metadata policies from OpenID federation help to have restrictions on the issued tokens given a trust chain that can be verified against those policies. Using siopv2 to have a known client_id help forming similar provider chains which can also be verified given the client_ids and their provider policies.
It would act as access delegation compared to a verification of the the proof / vp_token against the siopv2 given client_id that would be performed to ensure it matches the credential owner or the verifiable presentation.
This require the addition of a metadata_policy (or so) parameter to siopv2 responses along the given id_token. This help to have both the key and its later use restrictions. Do you think it can be a valuable addition to the specification?
