Skip to content

Commit 6bae678

Browse files
authored
few more updates for Roman's comments (#579)
1 parent 30de562 commit 6bae678

File tree

1 file changed

+9
-5
lines changed

1 file changed

+9
-5
lines changed

draft-ietf-oauth-selective-disclosure-jwt.md

Lines changed: 9 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -864,7 +864,7 @@ When receiving an SD-JWT, the Holder MUST do the following:
864864

865865
For presentation to a Verifier, the Holder MUST perform the following (or equivalent) steps (in addition to the checks described in (#sd_jwt_verification) performed after receiving the SD-JWT):
866866

867-
1. Decide which Disclosures to release to the Verifier, obtaining consent if necessary.
867+
1. Decide which Disclosures to release to the Verifier, obtaining consent if necessary (note that if and how consent is attained is out of scope for this document).
868868
2. Verify that each selected Disclosure satisfies one of the two following conditions:
869869
1. The hash of the Disclosure is contained in the Issuer-signed JWT claims
870870
2. The hash of the Disclosure is contained in the claim value of another selected Disclosure
@@ -988,7 +988,7 @@ Additionally, as described in (#key_binding_security), the application of Key Bi
988988

989989
## Mandatory Signing of the Issuer-signed JWT {#sec-is-jwt}
990990

991-
The JWT MUST be signed by the Issuer to protect integrity of the issued
991+
The JWT MUST be signed by the Issuer to protect the integrity of the issued
992992
claims. An attacker can modify or add claims if this JWT is not signed (e.g.,
993993
change the "email" attribute to take over the victim's account or add an
994994
attribute indicating a fake academic qualification).
@@ -997,9 +997,9 @@ The Verifier MUST always check the signature of the Issuer-signed JWT to ensure
997997
has not been tampered with since the issuance. The Issuer-signed JWT MUST be rejected if the signature cannot be verified.
998998

999999
The security of the Issuer-signed JWT depends on the security of the signature algorithm.
1000-
Any of the JWS asymmetric digital signature algorithms registered in [@IANA.JWS.Algorithms]
1001-
that meet the requirements described in the last paragraph of Section 5.2 of [@RFC7515]
1002-
can be used, including post-quantum algorithms, when they are ready.
1000+
Per the last paragraph of Section 5.2 of [@RFC7515], it is an
1001+
application-specific decision to choose the appropriate JWS
1002+
algorithm from [@IANA.JWS.Algorithms], including post-quantum algorithms, when they are ready.
10031003

10041004
## Manipulation of Disclosures {#sec-disclosures}
10051005

@@ -1986,6 +1986,10 @@ data. The original JSON data is then used by the application. See
19861986

19871987
[[ To be removed from the final specification ]]
19881988

1989+
-21
1990+
1991+
* A few more minor IESG balloting updates
1992+
19891993
-20
19901994

19911995
* IESG balloting updates

0 commit comments

Comments
 (0)