You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
When looking for the Credential Issuer at the /.well-known/jwt-vc-issuer endpoint, we look for the endpoint built by putting the well known component between the host and the path of the Credential Issuer.
For example, if the issuer is http://organization.example/path-element, we look at the http://organization.example/.well-known/jwt-vc-issuer/path-element endpoint.
While this is the correct behaviour according to the SD-JWT for VC specs, we observed that in practice some Credential Issuer might not comply with that requirement due to technical challenges and, instead, they might publish their keys by appending the well known endpoint at the end of their URL, so in the example above they might publish at the endpoint http://organization.example/path-element/.well-known/jwt-vc-issuer.
To simplify the job of the Credential Issuers, we can consider and evaluate a key lookup strategy that searches for the keys in both endpoints.
The text was updated successfully, but these errors were encountered:
When looking for the Credential Issuer at the
/.well-known/jwt-vc-issuer
endpoint, we look for the endpoint built by putting the well known component between the host and the path of the Credential Issuer.For example, if the issuer is
http://organization.example/path-element
, we look at thehttp://organization.example/.well-known/jwt-vc-issuer/path-element
endpoint.While this is the correct behaviour according to the SD-JWT for VC specs, we observed that in practice some Credential Issuer might not comply with that requirement due to technical challenges and, instead, they might publish their keys by appending the well known endpoint at the end of their URL, so in the example above they might publish at the endpoint
http://organization.example/path-element/.well-known/jwt-vc-issuer
.To simplify the job of the Credential Issuers, we can consider and evaluate a key lookup strategy that searches for the keys in both endpoints.
The text was updated successfully, but these errors were encountered: