SlideShare a Scribd company logo
How to Build Interoperable
Decentralized Identity Systems
with OpenID for Verifiable
Credentials
Kristina Yasuda, Microsoft
Dr. Torsten Lodderstedt, yes
Kristina
Identity Standards Architect
Yasuda
Microsoft
Dr. Torsten
Managing Director
Lodderstedt
yes IDP GmbH
Issuer
(Website)
Verifier
(Website)
Wallet
(user’s device,
cloud or hybrid)
Credential
Issuance
Credential
Presentation
User Interactions
● The User presenting the Identity data directly to the Verifier from the Wallet
○ <> In the federated model where Identity data is sent directly from the IdP to the Verifier
● Usually expressed with the flow below:
What is Decentralized Identity?
Verifiable Credentials: Benefits
● End-Users gain more privacy, and portability over their identity
information.
● Cheaper, faster, and more secure identity verification, when transforming
physical credentials into digital ones.
● Universal approach to handle identification, authentication, and
authorization in digital and physical space.
Issuer
(Website)
Issuer
(Website)
Issuer
(Website)
Why Protocol Layer Interoperability is Crucial.
Credential
Issuance
Credential
Presentation
One entity needs to talk to the large the number of entities, to increase the value of “Decentralized
Identity”.
Issuer
(Website)
Issuer
(Website)
Issuer
(Website)
Issuer
(Website)
Issuer
(Website)
Issuer
(Website)
Issuer
(Website)
Issuer
(Website)
Issuer
(Website)
User Interactions
Issuer
(Website)
Issuer
(Website)
Issuer
(Website)
Issuer
(Website)
Issuer
(Website)
Issuer
(Website)
Issuer
(Website)
Issuer
(Website)
Issuer
(Website)
Issuer
(Website)
Issuer
(Website)
Issuer
(Website)
Wallet
(user’s device,
cloud or
hybrid)
Verifier
(Website)
Issuer
(Website)
Problems we identified & how we solved them
Problem Solution
A lot of entirely new Protocols. (Hard to get
security right, steep learning curve)
⇒
Building upon currently widely used protocols:
OAuth 2.0 and OpenID Connect. (Secure,
already understood)
No clear winner among Credential Formats ⇒ Designing a Credential Format agnostic protocol
Reluctance to use only DIDs.
No clear winner among DID methods
⇒ Designing a protocol agnostic to the Key
Resolution mechanism. (No need to use DIDs)
Participating entities cannot typically
establish trust upfront, using traditional
mechanisms.
⇒ Flexibility in Trust Management. Third Party
Trust.
OpenID for Verifiable
Credential Issuance
Issuer
(Website)
Verifier
(Website)
Wallet
(user’s device,
cloud or hybrid)
Credential
Issuance
Credential
Presentation
User Interactions
OpenID for Verifiable
Presentations
Self-Issued OP v2
...so here comes OpenID for Verifiable Credentials!
Adoption (selected use-cases)
The European Digital
Identity Wallet Architecture
and Reference Framework[1]
(eIDAS ARF/EUDIW) requires
OID4VCI, OID4VP and
SIOPv2 for online use-cases
NIST National
Cybersecurity Center of
Excellence[2] plans to
implement reference
implementation for OID4VP to
present mdocs/mDL
DIF JWT VC Presentation
Profile[3] uses OID4VP for
request and presentation of
W3C JWT VCs and SIOPv2
for user authentication.
Implementers: Ping Identity,
Microsoft, IBM, Spruce,
Auth0, Gen Digital
[1] https://cloudsignatureconsortium.org/new-eu-eidas-regulation-a-quantum-leap-for-electronic-identity/
[2] https://www.nccoe.nist.gov/projects/digital-identities-mdl
[3] https://identity.foundation/jwt-vc-presentation-profile/#workplace-credential
Open Source libraries
● Walt.id
○ https://github.com/walt-id/waltid-ssikit (Kotlin)
● Sphereon
○ https://github.com/Sphereon-Opensource/SIOP-OpenID4VP (Typescript)
○ https://github.com/Sphereon-Opensource/OpenID4VCI-client (Typescript)
○ https://github.com/Sphereon-Opensource/ssi-sdk (Typescript)
● Microsoft
○ https://github.com/microsoft/VerifiableCredential-SDK-Android (Kotlin)
○ https://github.com/microsoft/VerifiableCredential-SDK-iOS (Swift)
● Spruce
○ https://github.com/spruceid/oidc4vci-rs (Rust)
○ https://github.com/spruceid/oidc4vci-issuer (Rust)
● EBSI
○ https://api-pilot.ebsi.eu/docs/libraries (Javascript)
● Impierce Technologies
○ https://github.com/impierce/openid4vc (Rust)
Let us tell you more about the
protocol
OpenID for Verifiable Credential Issuance
(Highlights)
- It’s an OAuth-protected API (Credential Endpoint at the Resource Server)
- Supports various Security levels (including high security with hardware bound
keys)
- Various business requirements supported (ex. remote and in-person
provisioning)
- Different user-experiences can be achieved (multiple ways to initiate the flow)
- Issuer can check Wallet’s capabilities & Wallet can discover Issuer metadata
Wallet
⓪ Wallet requests & User authorizes
credential issuance
③ Credential is issued
① access token(, refresh token)
② Wallet requests credential issuance
Protocol Flow
Alice
Credential
Issuer
Authorization Code Flow
Pre-Authorized Code Flow
OpenID for Verifiable Presentations (Highlights)
- Designed for high degree of privacy
- Supports various Security levels (e.g. mutual authentication among the
parties)
- Different user-experience can be achieved (same-device and
cross-device)
- Presentation of multiple Credentials supported
- Various Wallet deployment models supported
- All local to a native app
- Cloud Wallet with a backend
- Browser wallet
Same Device Presentation
Cross Device Presentation
Features of OpenID for Verifiable Credentials
1) It is NOT only about W3C Verifiable Credentials.
2) Does not require the usage of DLT (or Blockchain).
3) We are an open standardization community. Implementer’s feedback is
incorporated in an agile and transparent manner.
4) It is modular and flexible to cater for the needs of different legislations and
use-cases.
5) Complemented by active work on profiles to help the developers interoperate.
User Interactions
New additions to the family coming!
OpenID for Verifiable Credential Issuance
Self-Issued OP v2
OpenID for Verifiable Presentations
OpenID for Verifiable Presentations over BLE
Security and Trust in OpenID for Verifiable Credentials
Core specs
additional specs
Certification Suite
High-Assurance Profile
Issuer
(Website)
Verifier
(Website)
Wallet
(user’s device,
cloud or hybrid)
Issue Credentials Present Credentials
High Assurance Profile of
OpenID4VC
with SD-JWT-VC
Profiling OpenID4VC
- OpenID4VC is a framework
- Interoperability requires “profiling”
- Profile defines:
- mandatory to implement elements of the protocols, (e.g., grant types, etc.)
- wallet invocation mechanism (i.e., custom URL scheme)
- authentication requirements for Verifiers and Wallets
- Credential Format(s) with
■ issuer identification and key resolution
■ holder key binding
- Crypto algorithms
High Assurance Profile of OpenID4VC with
SD-JWT-VC
- Interoperability across parties while being privacy preserving and able to
fulfill security and regulatory requirements
- Intended audience
- eIDAS ARF (through OIDF/EC liaison)
- CA DMV wallet
- Basis for OWF project(s)
- Basis for Userinfo Interoperability profile
- IDunion Tech Stack
- GAIN PoC
- Japanese government (Trusted Web project)
- other jurisdictions
- private companies / infrastructure companies
OID4VC High Assurance Interoperability Profile with SD-JWT VC
SIOPv2 OID4VP OID4VCI
custom scheme
crypto suites
custom scheme
credential profile
client id scheme
custom scheme
credential profile
wallet attestation
scheme
Protocols
- Custom Scheme: haip://
- issuer key resolution:
web-based, x509
- Crypto Suites:
P-256(ecp256r1), SHA256
Basic Choices
Attestation
based Client
Authentication
crypto suites
issuer key resolution
Wallet Attestation Scheme
Credential profile: VC-SD-JWT
VC-SD-JWT
JWT/CWT
Statuslist
crypto suites
issuer key resolution
crypto suites
issuer key resolution
Profiles need to:
● fill the extension points
● define mandatory to implement features
OpenID for Verifiable Credential Issuance
- Pre-authorization code flow and authorization code flow are both required.
- Sender-constrained Tokens using DPoP required
- Credential Offer
- for both pre-authorization code flow and authorization code
- custom scheme “haip://” for wallet invocation
- Authorization at Issuer with Pushed Authorization Requests (PAR)
- Wallet Authentication with sender-constrained JWTs
- "scope” parameter to requesting authorization for credential issuance
- Only required endpoint is Credential Endpoint
- Batch Credential Endpoint is required for dual issuance of SD-JWT-VC and mdocs
OpenID for Verifiable Presentations
- custom scheme “haip://” for wallet invocation.
- Response type: “vp_token”.
- Response mode: “direct_post” with redirect_uri.
- Using “request_uri” to send Authorization Request is required.
- Presentation Definition is sent using “presentation_definition” parameter
- Subset of the Presentation Exchange Syntax in order to simplify implementation and
prevent security issues
- Verifier Authentication with
- x.509 Certificates or
- Sender-constrained JWTs
SIOP v2
- custom URL scheme “haip://” for wallet invocation
- subject_syntax_types_supported value MUST be
urn:ietf:params:oauth:jwk-thumbprint
- Verifier Authentication with
- x.509 Certificates or
- Sender-constrained JWTs
Credential Format
- SD-JWT VC with JSON payload (“typ”: “vc+sd-jwt”)
- both compact and JSON serialization
- Definition of mapping to VCDM base media type
- Issuer identification and key resolution
1. Web PKI based: iss=issuer URL used to obtain jwks_uri + key id in the `kid`
JWS header
2. x.509: iss=SAN in x.509 cert + x.509 cert chain in the `x5c` JWS header
- Holder binding:
- `cnf` JWT claim with jwk
- Credential Revocation: Bitmap type style Status list using JWTs
SD-JWT VC
with web PKI based Issuer key resolution
{
"alg": "ES256",
"typ": "vc+sd-jwt",
"kid":"4"
}
{
"iss": "https://credential-issuer.example.com",
"iat": 1516239022,
"exp": 1516247022,
"type": "Identity",
"_sd": [
"UiuRGkTW7e_5UQauGeQRQdF8u3WYevS4Fs0IuB_DgYM",
"tmPlXq0MID-oRXbUNHyoVZrc9Qkm8cwJTohVyOVlUgQ",
"vTz0JI103v4k4pKIloT83Yzi33L1SdZlWBPmsfJBefk"
],
"_sd_alg": "sha-256",
"cnf": {
"jwk": {
"kty": "EC",
"crv": "P-256",
"x":
"TCAER19Zvu3OHF4j4W4vfSVoHIP1ILilDls7vCeGemc",
"y":
"ZxjiWWbZMQGHVWKVQ4hbSIirsVfuecCE6t4jT9F2HZQ"
}
}
}
Crypto
- For signing and signature validation:
- ES256 algorithm and ECDSA keys using the P-256 (secp256k1)
- As hash algorithm to generate and validate the digests in the SD-JWT VC:
- SHA256
Call to Action:
Implement, Implement, Implement
The information can be found at https://openid.net/openid4vc/
THANK YOU!

More Related Content

What's hot (20)

PDF
OpenID for SSI
Torsten Lodderstedt
 
PDF
OIDC4VP for AB/C WG
Torsten Lodderstedt
 
PDF
OpenID for Verifiable Credentials (IIW 35)
Torsten Lodderstedt
 
PDF
IDA,VC,DID関連仕様 最新情報 - OpenID BizDay #15
OpenID Foundation Japan
 
PDF
OpenID Connect 4 SSI (DIFCon F2F)
Torsten Lodderstedt
 
PDF
OpenID Connect 4 SSI
Torsten Lodderstedt
 
PDF
エンタープライズITでのOpenID Connect利用ガイドライン
Tatsuo Kudo
 
PDF
SSIとDIDで何を解決したいのか?(β版)
Naohiro Fujie
 
PDF
OpenID Connect 4 SSI (at EIC 2021)
Torsten Lodderstedt
 
PDF
なぜOpenID Connectが必要となったのか、その歴史的背景
Tatsuo Kudo
 
PDF
SAML / OpenID Connect / OAuth / SCIM 技術解説 - ID&IT 2014 #idit2014
Nov Matake
 
PDF
OpenID Connect 入門 〜コンシューマーにおけるID連携のトレンド〜
Masaru Kurahayashi
 
PDF
Hyperledger Aries 101
LFDT Tokyo Meetup
 
PDF
認証の課題とID連携の実装 〜ハンズオン〜
Masaru Kurahayashi
 
PDF
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
Torsten Lodderstedt
 
PDF
Verifiable credentials explained by CCI
Kaliya "Identity Woman" Young
 
PDF
MicrosoftのDID/VC実装概要
Naohiro Fujie
 
PDF
自己主権型IDと分散型ID
Naohiro Fujie
 
PPT
OAuth 2.0 and OpenId Connect
Saran Doraiswamy
 
PDF
分散型IDと検証可能なアイデンティティ技術概要
Naohiro Fujie
 
OpenID for SSI
Torsten Lodderstedt
 
OIDC4VP for AB/C WG
Torsten Lodderstedt
 
OpenID for Verifiable Credentials (IIW 35)
Torsten Lodderstedt
 
IDA,VC,DID関連仕様 最新情報 - OpenID BizDay #15
OpenID Foundation Japan
 
OpenID Connect 4 SSI (DIFCon F2F)
Torsten Lodderstedt
 
OpenID Connect 4 SSI
Torsten Lodderstedt
 
エンタープライズITでのOpenID Connect利用ガイドライン
Tatsuo Kudo
 
SSIとDIDで何を解決したいのか?(β版)
Naohiro Fujie
 
OpenID Connect 4 SSI (at EIC 2021)
Torsten Lodderstedt
 
なぜOpenID Connectが必要となったのか、その歴史的背景
Tatsuo Kudo
 
SAML / OpenID Connect / OAuth / SCIM 技術解説 - ID&IT 2014 #idit2014
Nov Matake
 
OpenID Connect 入門 〜コンシューマーにおけるID連携のトレンド〜
Masaru Kurahayashi
 
Hyperledger Aries 101
LFDT Tokyo Meetup
 
認証の課題とID連携の実装 〜ハンズオン〜
Masaru Kurahayashi
 
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
Torsten Lodderstedt
 
Verifiable credentials explained by CCI
Kaliya "Identity Woman" Young
 
MicrosoftのDID/VC実装概要
Naohiro Fujie
 
自己主権型IDと分散型ID
Naohiro Fujie
 
OAuth 2.0 and OpenId Connect
Saran Doraiswamy
 
分散型IDと検証可能なアイデンティティ技術概要
Naohiro Fujie
 

Similar to How to Build Interoperable Decentralized Identity Systems with OpenID for Verifiable Credentials (20)

PPTX
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
Torsten Lodderstedt
 
PDF
Exploring Advanced Authentication Methods in Novell Access Manager
Novell
 
PPTX
Microservices security - jpmc tech fest 2018
MOnCloud
 
PDF
OpenID Connect Explained
Vladimir Dzhuvinov
 
PDF
Value proposition of SSI tech providers - Self-Sovereign Identity
SSIMeetup
 
PPTX
Microservices Security landscape
Sagara Gunathunga
 
PDF
Cloud Identity Webinar
WSO2
 
PPT
Cartes Asia Dem 2010 V2
Donald Malloy
 
PDF
Seamless OAuth2.0 and OpenID Connect in VAST
ESUG
 
PPTX
Configuring Single Sign-On (SSO) via Identity Management | MuleSoft Mysore Me...
MysoreMuleSoftMeetup
 
PPTX
DEVNET-1010 Using Cisco pxGrid for Security Platform Integration
Cisco DevNet
 
PDF
apidays LIVE India 2022_Standardizing Biometric Device Integration for Identi...
apidays
 
DOC
Authentication Models
Raj Chanchal
 
PPTX
Webinar: Extend The Power of The ForgeRock Identity Platform Through Scripting
ForgeRock
 
PDF
Application Security in ASP.NET Core
NETUserGroupBern
 
PDF
OSCON 2018 Getting Started with Hyperledger Indy
Tracy Kuhrt
 
PDF
Using Cisco pxGrid for Security Platform Integration: a deep dive
Cisco DevNet
 
PDF
2019 - Tech Talk DC - Token-based security for web applications using OAuth2 ...
Vladimir Bychkov
 
PDF
2019 - Nova Code Camp - AuthZ fundamentals with ASP.NET Core
Vladimir Bychkov
 
PDF
AllTheTalks.Online 2020: "Basics of OAuth 2.0 and OpenID Connect"
Andreas Falk
 
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
Torsten Lodderstedt
 
Exploring Advanced Authentication Methods in Novell Access Manager
Novell
 
Microservices security - jpmc tech fest 2018
MOnCloud
 
OpenID Connect Explained
Vladimir Dzhuvinov
 
Value proposition of SSI tech providers - Self-Sovereign Identity
SSIMeetup
 
Microservices Security landscape
Sagara Gunathunga
 
Cloud Identity Webinar
WSO2
 
Cartes Asia Dem 2010 V2
Donald Malloy
 
Seamless OAuth2.0 and OpenID Connect in VAST
ESUG
 
Configuring Single Sign-On (SSO) via Identity Management | MuleSoft Mysore Me...
MysoreMuleSoftMeetup
 
DEVNET-1010 Using Cisco pxGrid for Security Platform Integration
Cisco DevNet
 
apidays LIVE India 2022_Standardizing Biometric Device Integration for Identi...
apidays
 
Authentication Models
Raj Chanchal
 
Webinar: Extend The Power of The ForgeRock Identity Platform Through Scripting
ForgeRock
 
Application Security in ASP.NET Core
NETUserGroupBern
 
OSCON 2018 Getting Started with Hyperledger Indy
Tracy Kuhrt
 
Using Cisco pxGrid for Security Platform Integration: a deep dive
Cisco DevNet
 
2019 - Tech Talk DC - Token-based security for web applications using OAuth2 ...
Vladimir Bychkov
 
2019 - Nova Code Camp - AuthZ fundamentals with ASP.NET Core
Vladimir Bychkov
 
AllTheTalks.Online 2020: "Basics of OAuth 2.0 and OpenID Connect"
Andreas Falk
 
Ad

More from Torsten Lodderstedt (15)

PPTX
GAIN Presentation.pptx
Torsten Lodderstedt
 
PPTX
Comprehensive overview FAPI 1 and FAPI 2
Torsten Lodderstedt
 
PDF
Comprehensive overview FAPI 1 and 2
Torsten Lodderstedt
 
PDF
OpenID Connect 4 Identity Assurance at IIW #32
Torsten Lodderstedt
 
PPTX
OpenID Connect for W3C Verifiable Credential Objects
Torsten Lodderstedt
 
PPTX
Identity Assurance with OpenID Connect
Torsten Lodderstedt
 
PPTX
NextGenPSD2 OAuth SCA Mode Security Recommendations
Torsten Lodderstedt
 
PDF
Rich Authorization Requests
Torsten Lodderstedt
 
PDF
Pushed Authorization Requests
Torsten Lodderstedt
 
PDF
OpenID Connect for Identity Assurance
Torsten Lodderstedt
 
PPTX
NextGenPSD2 OAuth SCA Mode Security Recommendations
Torsten Lodderstedt
 
PPTX
Identiverse: PSD2, Open Banking, and Technical Interoperability
Torsten Lodderstedt
 
PDF
OAuth 2.0 Security Reinforced
Torsten Lodderstedt
 
PDF
OAuth Security 4 Dummies iiw#27
Torsten Lodderstedt
 
PDF
Identity Proofing with OpenID Connect
Torsten Lodderstedt
 
GAIN Presentation.pptx
Torsten Lodderstedt
 
Comprehensive overview FAPI 1 and FAPI 2
Torsten Lodderstedt
 
Comprehensive overview FAPI 1 and 2
Torsten Lodderstedt
 
OpenID Connect 4 Identity Assurance at IIW #32
Torsten Lodderstedt
 
OpenID Connect for W3C Verifiable Credential Objects
Torsten Lodderstedt
 
Identity Assurance with OpenID Connect
Torsten Lodderstedt
 
NextGenPSD2 OAuth SCA Mode Security Recommendations
Torsten Lodderstedt
 
Rich Authorization Requests
Torsten Lodderstedt
 
Pushed Authorization Requests
Torsten Lodderstedt
 
OpenID Connect for Identity Assurance
Torsten Lodderstedt
 
NextGenPSD2 OAuth SCA Mode Security Recommendations
Torsten Lodderstedt
 
Identiverse: PSD2, Open Banking, and Technical Interoperability
Torsten Lodderstedt
 
OAuth 2.0 Security Reinforced
Torsten Lodderstedt
 
OAuth Security 4 Dummies iiw#27
Torsten Lodderstedt
 
Identity Proofing with OpenID Connect
Torsten Lodderstedt
 
Ad

Recently uploaded (20)

PPTX
The Monk and the Sadhurr and the story of how
BeshoyGirgis2
 
PPTX
Artificial-Intelligence-in-Daily-Life (2).pptx
nidhigoswami335
 
PPTX
The Internet of Things (IoT) refers to a vast network of interconnected devic...
chethana8182
 
PPT
1965 INDO PAK WAR which Pak will never forget.ppt
sanjaychief112
 
PPTX
Blue and Dark Blue Modern Technology Presentation.pptx
ap177979
 
PPTX
原版北不列颠哥伦比亚大学毕业证文凭UNBC成绩单2025年新版在线制作学位证书
e7nw4o4
 
PPTX
How tech helps people in the modern era.
upadhyayaryan154
 
PDF
Latest Scam Shocking the USA in 2025.pdf
onlinescamreport4
 
PDF
How Much GB RAM Do You Need for Coding? 5 Powerful Reasons 8GB Is More Than E...
freeshopbudget
 
PDF
The Internet of Things (IoT) refers to a vast network of interconnected devic...
chethana8182
 
PDF
Cybersecurity Awareness Presentation ppt.
banodhaharshita
 
PDF
LB# 820-1889_051-7370_C000.schematic.pdf
matheusalbuquerqueco3
 
PDF
LOGENVIDAD DANNYFGRETRRTTRRRTRRRRRRRRR.pdf
juan456ytpro
 
PPT
Introduction to dns domain name syst.ppt
MUHAMMADKAVISHSHABAN
 
PPTX
Google SGE SEO: 5 Critical Changes That Could Wreck Your Rankings in 2025
Reversed Out Creative
 
PPTX
Perkembangan Perangkat jaringan komputer dan telekomunikasi 3.pptx
Prayudha3
 
PPTX
B2B_Ecommerce_Internship_Simranpreet.pptx
LipakshiJindal
 
PDF
UI/UX Developer Guide: Tools, Trends, and Tips for 2025
Penguin peak
 
PPTX
dns domain name system history work.pptx
MUHAMMADKAVISHSHABAN
 
PPTX
Different Generation Of Computers .pptx
divcoder9507
 
The Monk and the Sadhurr and the story of how
BeshoyGirgis2
 
Artificial-Intelligence-in-Daily-Life (2).pptx
nidhigoswami335
 
The Internet of Things (IoT) refers to a vast network of interconnected devic...
chethana8182
 
1965 INDO PAK WAR which Pak will never forget.ppt
sanjaychief112
 
Blue and Dark Blue Modern Technology Presentation.pptx
ap177979
 
原版北不列颠哥伦比亚大学毕业证文凭UNBC成绩单2025年新版在线制作学位证书
e7nw4o4
 
How tech helps people in the modern era.
upadhyayaryan154
 
Latest Scam Shocking the USA in 2025.pdf
onlinescamreport4
 
How Much GB RAM Do You Need for Coding? 5 Powerful Reasons 8GB Is More Than E...
freeshopbudget
 
The Internet of Things (IoT) refers to a vast network of interconnected devic...
chethana8182
 
Cybersecurity Awareness Presentation ppt.
banodhaharshita
 
LB# 820-1889_051-7370_C000.schematic.pdf
matheusalbuquerqueco3
 
LOGENVIDAD DANNYFGRETRRTTRRRTRRRRRRRRR.pdf
juan456ytpro
 
Introduction to dns domain name syst.ppt
MUHAMMADKAVISHSHABAN
 
Google SGE SEO: 5 Critical Changes That Could Wreck Your Rankings in 2025
Reversed Out Creative
 
Perkembangan Perangkat jaringan komputer dan telekomunikasi 3.pptx
Prayudha3
 
B2B_Ecommerce_Internship_Simranpreet.pptx
LipakshiJindal
 
UI/UX Developer Guide: Tools, Trends, and Tips for 2025
Penguin peak
 
dns domain name system history work.pptx
MUHAMMADKAVISHSHABAN
 
Different Generation Of Computers .pptx
divcoder9507
 

How to Build Interoperable Decentralized Identity Systems with OpenID for Verifiable Credentials

  • 1. How to Build Interoperable Decentralized Identity Systems with OpenID for Verifiable Credentials Kristina Yasuda, Microsoft Dr. Torsten Lodderstedt, yes
  • 2. Kristina Identity Standards Architect Yasuda Microsoft Dr. Torsten Managing Director Lodderstedt yes IDP GmbH
  • 3. Issuer (Website) Verifier (Website) Wallet (user’s device, cloud or hybrid) Credential Issuance Credential Presentation User Interactions ● The User presenting the Identity data directly to the Verifier from the Wallet ○ <> In the federated model where Identity data is sent directly from the IdP to the Verifier ● Usually expressed with the flow below: What is Decentralized Identity?
  • 4. Verifiable Credentials: Benefits ● End-Users gain more privacy, and portability over their identity information. ● Cheaper, faster, and more secure identity verification, when transforming physical credentials into digital ones. ● Universal approach to handle identification, authentication, and authorization in digital and physical space.
  • 5. Issuer (Website) Issuer (Website) Issuer (Website) Why Protocol Layer Interoperability is Crucial. Credential Issuance Credential Presentation One entity needs to talk to the large the number of entities, to increase the value of “Decentralized Identity”. Issuer (Website) Issuer (Website) Issuer (Website) Issuer (Website) Issuer (Website) Issuer (Website) Issuer (Website) Issuer (Website) Issuer (Website) User Interactions Issuer (Website) Issuer (Website) Issuer (Website) Issuer (Website) Issuer (Website) Issuer (Website) Issuer (Website) Issuer (Website) Issuer (Website) Issuer (Website) Issuer (Website) Issuer (Website) Wallet (user’s device, cloud or hybrid) Verifier (Website) Issuer (Website)
  • 6. Problems we identified & how we solved them Problem Solution A lot of entirely new Protocols. (Hard to get security right, steep learning curve) ⇒ Building upon currently widely used protocols: OAuth 2.0 and OpenID Connect. (Secure, already understood) No clear winner among Credential Formats ⇒ Designing a Credential Format agnostic protocol Reluctance to use only DIDs. No clear winner among DID methods ⇒ Designing a protocol agnostic to the Key Resolution mechanism. (No need to use DIDs) Participating entities cannot typically establish trust upfront, using traditional mechanisms. ⇒ Flexibility in Trust Management. Third Party Trust.
  • 7. OpenID for Verifiable Credential Issuance Issuer (Website) Verifier (Website) Wallet (user’s device, cloud or hybrid) Credential Issuance Credential Presentation User Interactions OpenID for Verifiable Presentations Self-Issued OP v2 ...so here comes OpenID for Verifiable Credentials!
  • 8. Adoption (selected use-cases) The European Digital Identity Wallet Architecture and Reference Framework[1] (eIDAS ARF/EUDIW) requires OID4VCI, OID4VP and SIOPv2 for online use-cases NIST National Cybersecurity Center of Excellence[2] plans to implement reference implementation for OID4VP to present mdocs/mDL DIF JWT VC Presentation Profile[3] uses OID4VP for request and presentation of W3C JWT VCs and SIOPv2 for user authentication. Implementers: Ping Identity, Microsoft, IBM, Spruce, Auth0, Gen Digital [1] https://cloudsignatureconsortium.org/new-eu-eidas-regulation-a-quantum-leap-for-electronic-identity/ [2] https://www.nccoe.nist.gov/projects/digital-identities-mdl [3] https://identity.foundation/jwt-vc-presentation-profile/#workplace-credential
  • 9. Open Source libraries ● Walt.id ○ https://github.com/walt-id/waltid-ssikit (Kotlin) ● Sphereon ○ https://github.com/Sphereon-Opensource/SIOP-OpenID4VP (Typescript) ○ https://github.com/Sphereon-Opensource/OpenID4VCI-client (Typescript) ○ https://github.com/Sphereon-Opensource/ssi-sdk (Typescript) ● Microsoft ○ https://github.com/microsoft/VerifiableCredential-SDK-Android (Kotlin) ○ https://github.com/microsoft/VerifiableCredential-SDK-iOS (Swift) ● Spruce ○ https://github.com/spruceid/oidc4vci-rs (Rust) ○ https://github.com/spruceid/oidc4vci-issuer (Rust) ● EBSI ○ https://api-pilot.ebsi.eu/docs/libraries (Javascript) ● Impierce Technologies ○ https://github.com/impierce/openid4vc (Rust)
  • 10. Let us tell you more about the protocol
  • 11. OpenID for Verifiable Credential Issuance (Highlights) - It’s an OAuth-protected API (Credential Endpoint at the Resource Server) - Supports various Security levels (including high security with hardware bound keys) - Various business requirements supported (ex. remote and in-person provisioning) - Different user-experiences can be achieved (multiple ways to initiate the flow) - Issuer can check Wallet’s capabilities & Wallet can discover Issuer metadata
  • 12. Wallet ⓪ Wallet requests & User authorizes credential issuance ③ Credential is issued ① access token(, refresh token) ② Wallet requests credential issuance Protocol Flow Alice Credential Issuer
  • 15. OpenID for Verifiable Presentations (Highlights) - Designed for high degree of privacy - Supports various Security levels (e.g. mutual authentication among the parties) - Different user-experience can be achieved (same-device and cross-device) - Presentation of multiple Credentials supported - Various Wallet deployment models supported - All local to a native app - Cloud Wallet with a backend - Browser wallet
  • 18. Features of OpenID for Verifiable Credentials 1) It is NOT only about W3C Verifiable Credentials. 2) Does not require the usage of DLT (or Blockchain). 3) We are an open standardization community. Implementer’s feedback is incorporated in an agile and transparent manner. 4) It is modular and flexible to cater for the needs of different legislations and use-cases. 5) Complemented by active work on profiles to help the developers interoperate.
  • 19. User Interactions New additions to the family coming! OpenID for Verifiable Credential Issuance Self-Issued OP v2 OpenID for Verifiable Presentations OpenID for Verifiable Presentations over BLE Security and Trust in OpenID for Verifiable Credentials Core specs additional specs Certification Suite High-Assurance Profile Issuer (Website) Verifier (Website) Wallet (user’s device, cloud or hybrid) Issue Credentials Present Credentials
  • 20. High Assurance Profile of OpenID4VC with SD-JWT-VC
  • 21. Profiling OpenID4VC - OpenID4VC is a framework - Interoperability requires “profiling” - Profile defines: - mandatory to implement elements of the protocols, (e.g., grant types, etc.) - wallet invocation mechanism (i.e., custom URL scheme) - authentication requirements for Verifiers and Wallets - Credential Format(s) with ■ issuer identification and key resolution ■ holder key binding - Crypto algorithms
  • 22. High Assurance Profile of OpenID4VC with SD-JWT-VC - Interoperability across parties while being privacy preserving and able to fulfill security and regulatory requirements - Intended audience - eIDAS ARF (through OIDF/EC liaison) - CA DMV wallet - Basis for OWF project(s) - Basis for Userinfo Interoperability profile - IDunion Tech Stack - GAIN PoC - Japanese government (Trusted Web project) - other jurisdictions - private companies / infrastructure companies
  • 23. OID4VC High Assurance Interoperability Profile with SD-JWT VC SIOPv2 OID4VP OID4VCI custom scheme crypto suites custom scheme credential profile client id scheme custom scheme credential profile wallet attestation scheme Protocols - Custom Scheme: haip:// - issuer key resolution: web-based, x509 - Crypto Suites: P-256(ecp256r1), SHA256 Basic Choices Attestation based Client Authentication crypto suites issuer key resolution Wallet Attestation Scheme Credential profile: VC-SD-JWT VC-SD-JWT JWT/CWT Statuslist crypto suites issuer key resolution crypto suites issuer key resolution Profiles need to: ● fill the extension points ● define mandatory to implement features
  • 24. OpenID for Verifiable Credential Issuance - Pre-authorization code flow and authorization code flow are both required. - Sender-constrained Tokens using DPoP required - Credential Offer - for both pre-authorization code flow and authorization code - custom scheme “haip://” for wallet invocation - Authorization at Issuer with Pushed Authorization Requests (PAR) - Wallet Authentication with sender-constrained JWTs - "scope” parameter to requesting authorization for credential issuance - Only required endpoint is Credential Endpoint - Batch Credential Endpoint is required for dual issuance of SD-JWT-VC and mdocs
  • 25. OpenID for Verifiable Presentations - custom scheme “haip://” for wallet invocation. - Response type: “vp_token”. - Response mode: “direct_post” with redirect_uri. - Using “request_uri” to send Authorization Request is required. - Presentation Definition is sent using “presentation_definition” parameter - Subset of the Presentation Exchange Syntax in order to simplify implementation and prevent security issues - Verifier Authentication with - x.509 Certificates or - Sender-constrained JWTs
  • 26. SIOP v2 - custom URL scheme “haip://” for wallet invocation - subject_syntax_types_supported value MUST be urn:ietf:params:oauth:jwk-thumbprint - Verifier Authentication with - x.509 Certificates or - Sender-constrained JWTs
  • 27. Credential Format - SD-JWT VC with JSON payload (“typ”: “vc+sd-jwt”) - both compact and JSON serialization - Definition of mapping to VCDM base media type - Issuer identification and key resolution 1. Web PKI based: iss=issuer URL used to obtain jwks_uri + key id in the `kid` JWS header 2. x.509: iss=SAN in x.509 cert + x.509 cert chain in the `x5c` JWS header - Holder binding: - `cnf` JWT claim with jwk - Credential Revocation: Bitmap type style Status list using JWTs
  • 28. SD-JWT VC with web PKI based Issuer key resolution { "alg": "ES256", "typ": "vc+sd-jwt", "kid":"4" } { "iss": "https://credential-issuer.example.com", "iat": 1516239022, "exp": 1516247022, "type": "Identity", "_sd": [ "UiuRGkTW7e_5UQauGeQRQdF8u3WYevS4Fs0IuB_DgYM", "tmPlXq0MID-oRXbUNHyoVZrc9Qkm8cwJTohVyOVlUgQ", "vTz0JI103v4k4pKIloT83Yzi33L1SdZlWBPmsfJBefk" ], "_sd_alg": "sha-256", "cnf": { "jwk": { "kty": "EC", "crv": "P-256", "x": "TCAER19Zvu3OHF4j4W4vfSVoHIP1ILilDls7vCeGemc", "y": "ZxjiWWbZMQGHVWKVQ4hbSIirsVfuecCE6t4jT9F2HZQ" } } }
  • 29. Crypto - For signing and signature validation: - ES256 algorithm and ECDSA keys using the P-256 (secp256k1) - As hash algorithm to generate and validate the digests in the SD-JWT VC: - SHA256
  • 30. Call to Action: Implement, Implement, Implement The information can be found at https://openid.net/openid4vc/