-
Notifications
You must be signed in to change notification settings - Fork 36
Open
1 / 11 of 1 issue completedOpen
1 / 11 of 1 issue completed
Copy link
Description
This issue proposes adding explicit guidance to OID4VP on how it is intended to integrate OID4VP into a system authentication and authorization.
Problem definition
Currently, OID4VP defines how a Verifier requests and receives a verifiable presentation (vp_token) from a Wallet. That is a great mechanism for End-User authentication and consent acquisition. However, the specification does not define or describe how the result of a successful VP verification should give client an access to multiple APIs or services within a larger system.
In practice, vp_token is not suitable to be used directly as authorization material:
- it is bound to a single presentation exchange;
- it may be large, privacy-sensitive, and short-lived;
- reusing or forwarding it to backend APIs conflicts with common OAuth2/OpenID Connect security and deployment patterns.
Proposal
- Add a security consideration not to use vp_token as an authorization material (access_token).
- Add an appendix (or plural) to outline a OID4VP-based authentication process:
- Post-verification token issuance
- After successful VP verification, the Verifier MAY issue an internal access token, session or OAuth2-style token representing the authenticated subject and derived authorization context.
- This option might be considered when existing authorization provider does not support OID4VP.
- Integration with OAuth 2.0 / OpenID Connect
- OID4VP MAY be used as an authentication/authorization step that precedes or replaces traditional user authentication in OAuth2/OIDC flows.
- The output of OID4VP verification can serve as input to an authorization server for access token issuance.
- Post-verification token issuance
Additional context
- The proposed implementation consideration may be defined in "Response mode direct_post" (ref) fashion.
- "End-User Authentication using Credentials" (ref) worth a reference in the proposed implementation consideration.
- Probably, OID4VCI Interactive Authorization Endpoint (ref) is sufficient for such use cases.
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
No labels