Identity Statement: Difference between revisions

From IDESG Wiki
Jump to navigation Jump to search
Line 5: Line 5:
There are a variety of existing statements about a [[NSTIC Strategy|Trusted Identity in Cyberspace]] that can be used to guide the development of a common understanding about what a [[Identity Statement]] should contain. Some of those are listed together with the relevant parts of each to this topic.
There are a variety of existing statements about a [[NSTIC Strategy|Trusted Identity in Cyberspace]] that can be used to guide the development of a common understanding about what a [[Identity Statement]] should contain. Some of those are listed together with the relevant parts of each to this topic.
===DID Document===
===DID Document===
[https://w3c-ccg.github.io/did-spec/ The Decentralized Identity document] is under development by the W3C Credential Community.
[https://w3c-ccg.github.io/did-spec/ The Decentralized Identity document] is under development by the W3C Credential Community. "The entities are identified by decentralized identifiers (DIDs). They may authenticate via proofs (e.g., digital signatures, privacy-preserving biometric protocols, etc.). DIDs point to DID Documents. A DID Document contains a set of service endpoints for interacting with the entity"


Security  
Security  

Revision as of 20:32, 13 December 2018

Full Title

An Identity Statement will return the metadata that backs a canonical Identifier on the web.

Context

There are a variety of existing statements about a Trusted Identity in Cyberspace that can be used to guide the development of a common understanding about what a Identity Statement should contain. Some of those are listed together with the relevant parts of each to this topic.

DID Document

The Decentralized Identity document is under development by the W3C Credential Community. "The entities are identified by decentralized identifiers (DIDs). They may authenticate via proofs (e.g., digital signatures, privacy-preserving biometric protocols, etc.). DIDs point to DID Documents. A DID Document contains a set of service endpoints for interacting with the entity"

Security

 DID architecture should enable sufficient security for relying parties to depend on DID Documents for their required level of assurance. 

Proof-based

 DID architecture should enable an entity to provide cryptographic proof of authentication and proof of authorization rights. 

Discoverability

 DID architecture should make it possible for entities to discover DIDs for other entities to learn more about or interact with those entities. 

Interoperability

 DID architecture should use interoperable standards so DID infrastructure can make use of existing tools and software libraries designed for interoperability

Software Statement

Goals

Implementation

References