16 September 2024

Attendees

  • Andy Rosen, Sequence Key

  • Christian Paquin, Microsoft

  • Cullen Miller, Spawning AI

  • Daniel Zellmer, Noosphere Technologies

  • Drummond Reed, Gen Digital

  • Eli Mallon, Aquareum

  • Eric Scouten, Adobe

  • Gavin Peacock, Adobe

  • Jesse Carter, CIRA

  • Karen Kilroy, FileBaby

  • Konrad Bleyer-Simon, Global Media Registry

  • Liviu Gheorghe, Adobe

  • Loren Hart, Noosphere Technologies

  • Michael Becker, Identity Praxis

  • Nigel Earnshaw, BBC

  • Peleus Uhley, Adobe

  • Pia Blumenthal, Adobe

  • Richard W. Kroon, EIDR

  • Scott Perry, Digital Governance Institute

  • Slava Asipenko, Proof

  • Tim Cappalli, Okta

Notes

Upcoming schedule changes

The following meetings will deviate from the usual Monday schedule:

  • 27 January 2025 rescheduled for APAC time

    • 1800 US Pacific (Monday)

    • 0200 UTC (Tuesday 28 Jan)

    • 0730 India (Tuesday)

    • 1300 Sydney, Australia (Tuesday)

New members introduction

No new members this week.

Review previous action items

πŸŽ₯ 1'20": Review action items from previous meeting:

  • ACTION: Eric to revise PR 162 to include some consideration of localization and possibly a definition of user-visible string. NOT DONE, CARRY OVER but new information that Eric can work with.

  • ACTION: Liviu and Eric to do further coding / research work to describe what the proof data structure should look like in this case. NOT DONE β†’ WON’T DO based on subsequent decision of group.

  • ACTION: Pam to discuss CBOR signing proposal with Microsoft engineering team and report back next week. UPDATE: Christian conveyed no objection on behalf of Microsoft.

  • ACTION: Eric to explore whether we can reuse the COSE protected header mechanism for RFC 3161 timestamping in the VC approach. NO UPDATE, CARRY OVER

  • ACTION: Eli to submit a PR adding support for K-256 signatures in CAWG. Group to discuss once available. NOT DONE

  • ACTION (βœ…): Eli to submit a GitHub issue for the group to consider EIP-712 credentials as an autonomous signing mechanism. (See Issue #176: Consider implications of autonomous signing mechanisms, to be discussed later.)

  • ACTION: Jacques to submit a GitHub issue for the group to consider using domain-name based DIDs as an autonomous signing mechanism. NO UPDATE, CARRY OVER

Review PR #167: Define VC proofing mechanism

πŸŽ₯ 5'33": Discussed PR #167: Define VC proofing mechanism.

  • We contemplated and decided not to include did:key as an acceptable DID method for identity claims aggregators.

ACTION (βœ…): Eric to remove reference to did:jwk and merge.

Review PR #180: Rewrite verifiable presentation example

Key points:

  • Eric updated the workflow for verifiable presentations, detailing the process from presentation requests to the generation of asset-specific verifiable credentials by the identity claims aggregator.

  • Eric and Drummond emphasized the critical role of the identity claims aggregator in the ecosystem, responsible for verifying and replaying identity claims on asset-specific credentials.

  • Concerns were raised about the potential security risks associated with rogue identity claims aggregators, stressing the need for a trust list to distinguish trustworthy entities.

ACTION (βœ…): Eric to merge.

Brainstorming discussion, looking for protocols to consider or other proposals. Some highlights:

  • Review Mastodon and AT protocol (Bluesky) for proving control over a domain for social media purposes (Documentation for AT protocol technique)

  • Token in meta tag or DNS record

  • CA / Browser Forum guidelines for issuance and management of Extended Validation Certificates Β§3.2.2 covers assurance that a web site is controlled by the specific legal entity described in the cert

  • I believe the OpenID community long ago did a spec for "site claiming" so that a blog owner could prove control of a blog to an OpenID provider.

  • did:web may provide a mechanism for this, too

Separately, we may also want to consider documenting content created specifically as part of a site-generation process.

ACTION: Eric to create a PR incorporating above feedback.

Review issue #179: Describe how ICA should request a Verifiable Presentation and how to describe that in VC

Key points:

  • Significant questions about what trust ecosystems an identity claims aggregator will participate in when collecting credentials. (Probable answer: That’s implementation dependent and not to be specified here.)

  • Separately, there is the question of what trust ecosystem the asset-specific credentials issued bhy the identity claims aggregator should participate in. (Diverse opinions along the spectrum from CAWG should organize a identity claims aggregator-specific trust list to let the market of verifiers decide.)

  • Look into OpenID Connect for Identity Assurance spec as a possible vocabulary for expressing what has been learned about named actor through presentation requests.

  • A reminder that not all information contained in the VP should be replayed by the identity claims aggregator into the subsequent asset-specific credential.

ACTION: Eric to create a PR incorporating above feedback.

Review issue #181: Remove affiliation from identity claims aggregation?

Is β€œaffiliation” meaningfully different from what will be expressed via verifiable presentation?

No strong request for such.

ACTION: Eric to create a PR removing affiliation from spec.

Review issue #176: Consider implications of autonomous signing mechanisms

Eli showcased a demo on autonomous signing mechanisms using crypto wallets, advocating for the inclusion of such technologies in the CAWG spec to accommodate evolving user signing flows and identity assertion methods. (Watch the demo starting at 1h13'52".)

The discussion suggested that as user signing flows evolve, incorporating autonomous signing mechanisms could become increasingly relevant for identity assertion in the CAWG ecosystem.

CAWG open to considering autonomous signing mechanisms after focusing on identity claims aggregation.