<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.5 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-steele-spice-metadata-discovery-01" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.19.1 -->
  <front>
    <title>SPICE Metadata Discovery</title>
    <seriesInfo name="Internet-Draft" value="draft-steele-spice-metadata-discovery-01"/>
    <author fullname="Orie Steele">
      <organization>Transmute</organization>
      <address>
        <email>orie@transmute.industries</email>
      </address>
    </author>
    <date year="2024" month="January" day="22"/>
    <area>Security</area>
    <workgroup>Secure Patterns for Internet CrEdentials</workgroup>
    <keyword>credential</keyword>
    <keyword>presentation</keyword>
    <keyword>identity</keyword>
    <keyword>metadata</keyword>
    <abstract>
      <?line 66?>

<t>Entities interested in digital credentials need to express and discover preferences for working with them.</t>
      <t>Before issuance, holders need to discover what credentials are supported, and issuers need to discover if a holder's wallet is safe enough to store their credentials.</t>
      <t>Before presentation, holder's need to discovery verifier's encryption keys, and which presentation formats a verifier supports.</t>
      <t>After presentation, verifiers need to discover any new key material or status changes related to credentials.</t>
      <t>This document enables issuers, holders and verifiers to discover supported protocols and formats for keys, claims, credentials and proofs.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://OR13.github.io/draft-steele-spice-metadata-discovery/draft-steele-spice-metadata-discovery.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-steele-spice-metadata-discovery/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Secure Patterns for Internet CrEdentials Working Group mailing list (<eref target="mailto:spice@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/spice/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/spice/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/OR13/draft-steele-spice-metadata-discovery"/>.</t>
    </note>
  </front>
  <middle>
    <?line 78?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The abstractions and relationships that have evolved to support digital credentials and secure systems are challenging to comprehend and used in conflciting and contradictory ways in different organizations, and security specifications.</t>
      <t>An identity (also known an entity), is identified (distinguished) through identifiers (names), and can fulfill multiple roles, including being an Issuer, Holder, Relying Party or Verifier of digital credentials and presentations.</t>
      <t>The attributes (claims, or reputation statements), capabilities, and relations associated with an identifier are expressed as metadata regarding the identifier.</t>
      <t>Because it remains easier to rediscover the fundamentals of digital identity and credentials than it is to read or comprehend the previous work, very similar, yet unfortunately incompatible systems are continiously created, and through their adoption the digital identity ecosystem becomes increasingly difficult to comprehend or support.</t>
      <t>This document is not meant to solve all the challenges facing organizations seeking to adopt digital identity and credentialing technology.
However, this document attempts to describe an identifier and metadata architecture, that reflects the current state of the art, and addresses the challenge of fragmentation and data siloing, through a distillation of the essentials needed to support digital credentials.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="background">
      <name>Background</name>
      <t>In Open ID Connect <xref target="OpenIDConnect"/>, and <xref target="I-D.draft-ietf-oauth-sd-jwt-vc"/>, identifiers are URLs, metadata is discovered through URLs, claims are expressed in JSON, <xref target="RFC8259"/>, and content is described using content types.</t>
      <t>Request:</t>
      <sourcecode type="http-message"><![CDATA[
NOTE: '\' line wrapping per RFC 8792

GET /.well-known/openid-configuration HTTP/1.1
Host: issuer.example
Accept: \
  application/json;charset=utf-8, \
  application/json
]]></sourcecode>
      <t>Response:</t>
      <sourcecode type="http-message"><![CDATA[
NOTE: '\' line wrapping per RFC 8792

HTTP/1.1 200 Ok
Content-Type: \
  application/json

{
  "issuer": "https://issuer.example",
  "token_endpoint": "https://issuer.example/api/oauth/token",
  "jwks_uri": "https://issuer.example/.well-known/jwks.json",
  "response_types_supported": [
    "token"
  ],
  "claims_supported": [
    "aud",
    "exp",
    "iat",
    "iss",
    "sub"
  ],
  "id_token_signing_alg_values_supported": [
    "ES384"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "ES384"
  ],
  "id_token_encrypted_response_alg": [
    "ECDH-ES+A256KW
  ],
  "id_token_encrypted_response_enc": [
    "A128CBC-HS256"
  ]
  ...
}
]]></sourcecode>
      <t>In <xref target="DIDs"/> and <xref target="VCs"/> the identifiers are URLs, metadata is discovered through dereferencing URLs, claims are expressed in <xref target="JSON-LD"/>, and content is described using content types.</t>
      <t>For example:</t>
      <t>Request:</t>
      <sourcecode type="http-message"><![CDATA[
NOTE: '\' line wrapping per RFC 8792

GET /identifiers/did:example:123 HTTP/1.1
Host: resolver.example
Accept: \
  application/did+json
]]></sourcecode>
      <t>Response:</t>
      <sourcecode type="http-message"><![CDATA[
NOTE: '\' line wrapping per RFC 8792

HTTP/1.1 200 Ok
Content-Type: \
  application/json

{
  "id": "did:example:123"
}
]]></sourcecode>
      <t>In <xref target="I-D.draft-ietf-ace-key-groupcomm"/> the identifiers are URLs, metadata discovered through dereferencing URLs, attributes are expressed in CBOR, <xref target="RFC8949"/>, and content is described using content types.</t>
      <t>For example:</t>
      <t>Request:</t>
      <artwork><![CDATA[
Header: POST (Code=0.02)
Uri-Host: "kdc.example.com"
Uri-Path: "ace-group"
Uri-Path: "g1"
Content-Format: "application/ace-groupcomm+cbor"
Payload (in CBOR diagnostic notation,
         with AUTH_CRED and POP_EVIDENCE being CBOR byte strings):
  { "scope": << [ "group1", ["sender", "receiver"] ] >> ,
    "get_creds": [true, ["sender"], []], "client_cred": AUTH_CRED,
    "cnonce": h'25a8991cd700ac01', "client_cred_verify": POP_EVIDENCE }
]]></artwork>
      <t>Response:</t>
      <artwork><![CDATA[
Header: Created (Code=2.01)
Content-Format: "application/ace-groupcomm+cbor"
Location-Path: "kdc.example.com"
Location-Path: "g1"
Location-Path: "nodes"
Location-Path: "c101"
Payload (in CBOR diagnostic notation,
         with KEY being a CBOR byte strings):
  { "gkty": 13, "key": KEY, "num": 12, "exp": 1609459200,
    "creds": [ AUTH_CRED_1, AUTH_CRED_2 ],
    "peer_roles": ["sender", ["sender", "receiver"]],
    "peer_identifiers": [ ID1, ID2 ] }
]]></artwork>
      <t>These examples highlight perhaps the only common attributes of modern digital credential systems: structured identifiers (URLs and URNs) and content types.</t>
      <section anchor="the-layering-problem">
        <name>The layering problem</name>
        <t>Effective standards limit optionality, improve interoperability, and connect bounded contexts, <xref target="BoundedContexts"/> through interfaces that require trivial to acquire and well understood tooling.</t>
        <t>With respect to structured identifiers and content types, the simplest solutions select a single identifier type, and a single content type.</t>
        <t>For example, a hypothetical AcmeHyperProtocol might rely only on URLs and JSON.</t>
        <t>Support for AcmeHyperProtocol would be easy, developers would need only to have reliable libraries for working with URLs and JSON.</t>
        <t>Software does not evolve this way.</t>
        <t>It is common to see dependencies that solve several seperate problems efficiently, bundled together, such that it is impossible to take a dependency on just the part that is needed.</t>
        <t>This problem is then reflected in standards, because effective standards describe effective software systems.</t>
        <t>In OpenID Connect, we see URLs, but we also see URNs; we see <tt>application/json</tt>, but we also see <tt>application/jwt</tt> nested inside of it.</t>
        <t>In DIDs and VCs, we see URLs, but we also see DIDs (URNs); we see <tt>application/json</tt>, but we also see <tt>application/ld+json</tt> nested inside of it, even further, we see <tt>application/n-quads</tt> constraining what <tt>application/json</tt> can express through the use of <tt>application/ld+json</tt>. We see URLs contraining what DIDs can express, through reuse of the path, query and fragment. We see a desire to wrap easily understood content types such as <tt>application/jwk+json</tt> or <tt>application/jwt</tt> in less easy to understand JSON-LD content types. Where does this nesting come from?</t>
        <t><xref target="RFC9518"/> explains in Section 4.7: "standards efforts should focus on providing concrete utility to the majority of their users as published, rather than being a "framework" where interoperability is not immediately available. Internet functions should not make every aspect of their operation extensible; boundaries between modules should be designed in a way that allows evolution, while still offering meaningful functionality."</t>
        <t>In order to enable consumers leverage their prefered identifiers and content types, some specifications take a "big tent" approach, created an open ended extensibility mechansism, and then providing a single mandatory to implement instantiation of it. In the worst cases, <xref target="DIDsFO"/>, standards insist on providing the estensiblity mechanisms, and refuse to provide mandatory to implement instances, and through doing so, ensure no interoperability is achievable without a second document, enabling a profile that is actually usable. It could be argued that OAuth has similar deficiencies, and that OpenID Connect solved this same problem through a suite of secondary documents.</t>
        <t>It might seem impossible to support extensibility and interoperability simultaneously, but as the authors on <xref target="RFC9518"/> and Martin Fowler in <xref target="BoundedContexts"/> points out, the key to succeeding is ensuring the layering is correct.</t>
      </section>
    </section>
    <section anchor="structured-identifiers">
      <name>Structured Identifiers</name>
      <t>Structured identifiers, such as URLs are helpful for naming unique identities, but can introduce security and privacy issues while attempting to reduce implementation burden or improve user experience.</t>
      <t>A common pattern is to have a single service provider, operating a domain <tt>identity.provider.example</tt>, deploy unqiue URLs for each identity under its domain, for example <tt>https://identity.provider.example/handle</tt>.</t>
      <t>Traffic analysis of <tt>https://identity.provider.example</tt> can reveal a distribution of interest in an identity by region and over time.</t>
      <t>Additionally, the service provider might serve unique key material for this identifier based on the timing and regional information.</t>
      <t><xref target="RFC9458"/> can address some of these privacy concerns, see <xref target="I-D.draft-steele-spice-oblivious-credential-state"/> for more details.</t>
      <t>Another solution can be to rely on decentralized and distributed systems such as DHTs or Blockchains, so that the latest keys and metadata regarding and identifier can be resolved without the interest in that specific identifer to a specific service provider.</t>
      <t>Both of these appraoches bring with them signifcant deployment challenges, which may have already been committed to, depending on the identity layer used in a protocol.</t>
      <section anchor="compound-identifiers">
        <name>Compound Identifiers</name>
        <t>Compound identifiers are commonly used to address the challend of expressing relations between distinct identifiers.</t>
        <t>In URLS for http resources, depending on the content type, the compount identifier <tt>https://issuer.example/capabilities#f81d4fae-7dec-11d0-a765-00a0c91e6bf6</tt> might express that "f81d4fae-7dec-11d0-a765-00a0c91e6bf6" is a sub resource of "https://issuer.example/capabilities" which is a sub resource of "https://issuer.example".</t>
        <t>When constructing compoind identifiers, it is important to consider how negotiation is impacted by leveraging different parts of a structured identifier.</t>
        <t>For example, a server can assist with negotiation for response types for <tt>https://issuer.example/capabilities</tt>, but sub resources identified by a fragment have their response type controlled by their parent resource.</t>
      </section>
      <section anchor="global-uniqueness">
        <name>Global Uniqueness</name>
        <t>Global uniqueness is a deseriable property of structed identifiers.</t>
        <t>Ensuring global uniquess often tends towards centralization or federation, because some system or entity must ensure that distinct identities are not able to contest, or claim a single unique identifier.</t>
        <t>One way to achieve global uniqueness is to produce a compound identifier where the authority or structure of the identifier establishes the uniquenss through relation to itself.</t>
        <t>For example <tt>https://issuer.example/f81d4fae-7dec-11d0-a765-00a0c91e6bf6</tt> relies on the authority <tt>https://issuer.example</tt> to maintain the linkage between resource identifier and resource representations.</t>
        <t>Another example <tt>https://issuer.example/urn:uuid:f81d4fae-7dec-11d0-a765-00a0c91e6bf6</tt> uses a URN namespace to establish a globally unique identifier <tt>urn:uuid:f81d4fae-7dec-11d0-a765-00a0c91e6bf6</tt> and then uses <tt>https://issuer.example</tt> to establish a compound identifier which is globally unique.</t>
      </section>
      <section anchor="sharing-structured-identifiers">
        <name>Sharing Structured Identifiers</name>
        <t>Some systems might wish to share structured identifiers, while maintaining authority for representations.</t>
        <t>For example <tt>https://issuer.example/urn:uuid:f81d4fae-7dec-11d0-a765-00a0c91e6bf6</tt> and <tt>https://verifier.example/urn:uuid:f81d4fae-7dec-11d0-a765-00a0c91e6bf6</tt> might both use <tt>urn:uuid:f81d4fae-7dec-11d0-a765-00a0c91e6bf6</tt> to express a globally unique identifier for an attribute key or attribute value.</t>
        <t>When independent entities share globally unique identifiers, they are responsible for ensuring that the identifier is used consistently.</t>
        <t>For example:</t>
        <t><tt>https://resolver1.example/identifiers/did:example:123</tt> could serve completely different JSON-LD for <tt>did:example:123</tt> than <tt>https://resolver2.example/identifiers/did:example:123</tt>.</t>
        <t>Because unlike URLs, URNs are not resolvable by themselves, trust in resources represented with URNs comes from the system you are communicating with, and unlike URLs, there is no commonly understood scheme for communiation, such as http encoded in the identifier.</t>
      </section>
    </section>
    <section anchor="content-types">
      <name>Content Types</name>
      <t>Type systems such as the Hindley–Milner type system, can provide much stronger security properties than well defined content types, but both serve a similar purpose, which is to express the intended processing and capabilies of data structures.</t>
      <section anchor="structured-suffixes">
        <name>Structured Suffixes</name>
        <t><xref target="RFC7071"/> defined a JSON based media type for expressing reputation, <tt>application/reputon+json</tt>.</t>
        <t>The <tt>+json</tt> part is a structured suffix as described in <xref target="RFC6839"/>.</t>
        <t>Defining a new media type with a structured suffix, allows for systems that support content type negotiation to respond with more precise content types.</t>
        <t>This property of responding with less ambigious content types is part of secure system design, and <xref target="RFC8725"/> notes that using more specific types can help protect against certain attacks.</t>
        <t>Using a more specific content type comes at the cost of being "generally understood", for example <tt>application/json</tt> is often expected or hard coded in software, and returning <tt>application/reputon+json</tt> could cause software to fail higher up in the application stack.</t>
      </section>
      <section anchor="allowing-additional-properties">
        <name>Allowing Additional Properties</name>
        <t>It is common for content types to rely on map or object datastructures for their top level serializations.</t>
        <t>This is because a MAP is easily extended with new key value pairs, which when not understood can be ignored, whereas a string or array, might cause processing errors if extended.</t>
        <t><tt>application/jwk-set+json</tt> builds on <tt>application/json</tt> and expresses a set of cryptographic keys represented by values, that are consistent with <tt>application/jwk+json</tt>.</t>
        <t>In cases where additional properties can be present, implementations should take advantage of this and avoid creating new media types, until the number of new properties is substantial enough to justify ensuring security and processing considerations specific to the new type cause faults.</t>
        <t>For example, consider the following URL and resource expressing "keys that are use to make attribute assertions about a subject".</t>
        <t>Request:</t>
        <sourcecode type="http-message"><![CDATA[
NOTE: '\' line wrapping per RFC 8792

GET /keys/assertion HTTP/1.1
Host: issuer.example
Accept: \
  application/jwk-set+json
]]></sourcecode>
        <t>Response:</t>
        <sourcecode type="http-message"><![CDATA[
NOTE: '\' line wrapping per RFC 8792

HTTP/1.1 200 Ok
Content-Type: \
  application/json

{
  "keys": [
    {
      "kid": "urn:ietf:params:oauth:jwk-thumbprint:sha-256:Nz2...sXs"
      "kty": "EC",
      "crv": "P-256",
      "alg": "ES256",
      "x": "MKBCTNIcKUSDii11ySs3526iDZ8AiTo7Tu6KPAqv7D4",
      "y": "4Etl6SRW2YiLUrN5vfvVHuhp7x8PxltmWWlbbM4IFyM"
    }
  ]
}
]]></sourcecode>
        <t>The <tt>keys</tt> property is part of <tt>application/jwk-set+json</tt>, and additional properties can be added at this layer, without creating a new media type, however, those properties will not be well understood in the context of <tt>application/jwk-set+json</tt>.</t>
        <t>Similarly inside each key the <tt>alg</tt> property is optional, but when present it signals the algorithm the key is restricted to be used with.</t>
        <t>Additional properties might be added to the keys themselves, however, those properties will not be well understood in the context of <tt>application/jwk+json</tt>.</t>
      </section>
    </section>
    <section anchor="spice-metadata-discovery">
      <name>SPICE Metadata Discovery</name>
      <t>Identifiers for issuer, holders and verifiers <bcp14>MUST</bcp14> be URLs.</t>
      <t>For example:</t>
      <artwork><![CDATA[
https://issuer.example
]]></artwork>
      <t>The scheme of the URL <bcp14>MUST</bcp14> support resolving content types.</t>
      <t>For example:</t>
      <t>Request:</t>
      <sourcecode type="http-message"><![CDATA[
NOTE: '\' line wrapping per RFC 8792

GET / HTTP/1.1
Host: issuer.example
Accept: \
  application/json
]]></sourcecode>
      <t>Response:</t>
      <sourcecode type="http-message"><![CDATA[
NOTE: '\' line wrapping per RFC 8792

HTTP/1.1 200 Ok
Content-Type: \
  application/json

{
  "capabilities": "https://issuer.example/capabilities",
  ...
}
]]></sourcecode>
      <t>Content type specific sub resources <bcp14>MUST</bcp14> be expressved by reference, and <bcp14>MUST NOT</bcp14> be expressed by value.</t>
      <t>For example:</t>
      <t>Request:</t>
      <sourcecode type="http-message"><![CDATA[
NOTE: '\' line wrapping per RFC 8792

GET / HTTP/1.1
Host: issuer.example
Accept: \
  application/json
]]></sourcecode>
      <t>Response:</t>
      <sourcecode type="http-message"><![CDATA[
NOTE: '\' line wrapping per RFC 8792

HTTP/1.1 200 Ok
Content-Type: \
  application/json

{
  "jwks": "https://issuer.example/keys",
  ...
}
]]></sourcecode>
      <t>It is <bcp14>RECOMMENDED</bcp14> to avoid registering new media types, except in cases where a response might be confused for an existing media type in a way that impacts security.</t>
      <t>It is <bcp14>RECOMMENDED</bcp14> to return content types that have message level integrity, to protect authenticity, and ensure transport agility is less impacted by transport specific security considerations.</t>
      <t>It is <bcp14>RECOMMENDED</bcp14> to submit content types that have messsage level encryption, to protect confidentiality, and ensure transport agility is less impacted by transport specific security considerations.</t>
      <t>It is <bcp14>RECOMMENDED</bcp14> that "purpose" be encoded in identifiers, not attributes of representations.</t>
      <t>This allows for negotiation of different content types satisfying the same purpose.</t>
      <t>Purpose is more than just "which algorithms", it is also the intended use of the algorithm.</t>
      <t>For example, a key might be used to sign assertions to create credentials, or challenges to enable authentication.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TODO Security</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.draft-ietf-ace-key-groupcomm">
          <front>
            <title>Key Provisioning for Group Communication using ACE</title>
            <author fullname="Francesca Palombini" initials="F." surname="Palombini">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Marco Tiloca" initials="M." surname="Tiloca">
              <organization>RISE AB</organization>
            </author>
            <date day="16" month="January" year="2024"/>
            <abstract>
              <t>   This document defines how to use the Authentication and Authorization
   for Constrained Environments (ACE) framework to distribute keying
   material and configuration parameters for secure group communication.
   Candidate group members acting as Clients and authorized to join a
   group can do so by interacting with a Key Distribution Center (KDC)
   acting as Resource Server, from which they obtain the keying material
   to communicate with other group members.  While defining general
   message formats as well as the interface and operations available at
   the KDC, this document supports different approaches and protocols
   for secure group communication.  Therefore, details are delegated to
   separate application profiles of this document, as specialized
   instances that target a particular group communication approach and
   define how communications in the group are protected.  Compliance
   requirements for such application profiles are also specified.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ace-key-groupcomm-18"/>
        </reference>
        <reference anchor="I-D.draft-ietf-oauth-sd-jwt-vc">
          <front>
            <title>SD-JWT-based Verifiable Credentials (SD-JWT VC)</title>
            <author fullname="Oliver Terbu" initials="O." surname="Terbu">
              <organization>Spruce Systems, Inc.</organization>
            </author>
            <author fullname="Daniel Fett" initials="D." surname="Fett">
              <organization>Authlete Inc.</organization>
            </author>
            <date day="23" month="October" year="2023"/>
            <abstract>
              <t>   This specification describes data formats as well as validation and
   processing rules to express Verifiable Credentials with JSON payloads
   with and without selective disclosure based on the SD-JWT
   [I-D.ietf-oauth-selective-disclosure-jwt] format.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-oauth-sd-jwt-vc-01"/>
        </reference>
        <reference anchor="I-D.draft-steele-spice-oblivious-credential-state">
          <front>
            <title>Oblivious Credential State</title>
            <author fullname="Orie Steele" initials="O." surname="Steele">
              <organization>Transmute</organization>
            </author>
            <date day="13" month="January" year="2024"/>
            <abstract>
              <t>   Issuers of Digital Credentials enable dynamic state or status checks
   through the use of dereferenceable identifiers, that resolve to
   resources providing herd privacy.  Privacy in such systems is
   determined not just from the size of the herd, and the cryptographic
   structure encoding it, but also from the observability of access to
   shared state.  This document describes a privacy preserving state
   management system for digital credentials based on Oblivious HTTP
   that addresses both data model and protocol risks associated with
   digital credentials with dynamic state.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-steele-spice-oblivious-credential-state-00"/>
        </reference>
        <reference anchor="BoundedContexts" target="https://martinfowler.com/bliki/BoundedContext.html">
          <front>
            <title>Bounded Context</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RFC8949">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="94"/>
          <seriesInfo name="RFC" value="8949"/>
          <seriesInfo name="DOI" value="10.17487/RFC8949"/>
        </reference>
        <reference anchor="RFC8259">
          <front>
            <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format. It was derived from the ECMAScript Programming Language Standard. JSON defines a small set of formatting rules for the portable representation of structured data.</t>
              <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="90"/>
          <seriesInfo name="RFC" value="8259"/>
          <seriesInfo name="DOI" value="10.17487/RFC8259"/>
        </reference>
        <reference anchor="RFC9458">
          <front>
            <title>Oblivious HTTP</title>
            <author fullname="M. Thomson" initials="M." surname="Thomson"/>
            <author fullname="C. A. Wood" initials="C. A." surname="Wood"/>
            <date month="January" year="2024"/>
            <abstract>
              <t>This document describes Oblivious HTTP, a protocol for forwarding encrypted HTTP messages. Oblivious HTTP allows a client to make multiple requests to an origin server without that server being able to link those requests to the client or to identify the requests as having come from the same client, while placing only limited trust in the nodes used to forward the messages.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9458"/>
          <seriesInfo name="DOI" value="10.17487/RFC9458"/>
        </reference>
        <reference anchor="RFC9518">
          <front>
            <title>Centralization, Decentralization, and Internet Standards</title>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
            <date month="December" year="2023"/>
            <abstract>
              <t>This document discusses aspects of centralization that relate to Internet standards efforts. It argues that, while standards bodies have a limited ability to prevent many forms of centralization, they can still make contributions that assist in the decentralization of the Internet.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9518"/>
          <seriesInfo name="DOI" value="10.17487/RFC9518"/>
        </reference>
        <reference anchor="RFC7071">
          <front>
            <title>A Media Type for Reputation Interchange</title>
            <author fullname="N. Borenstein" initials="N." surname="Borenstein"/>
            <author fullname="M. Kucherawy" initials="M." surname="Kucherawy"/>
            <date month="November" year="2013"/>
            <abstract>
              <t>This document defines the format of reputation response data ("reputons"), the media type for packaging it, and definition of a registry for the names of reputation applications and response sets.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7071"/>
          <seriesInfo name="DOI" value="10.17487/RFC7071"/>
        </reference>
        <reference anchor="RFC6839">
          <front>
            <title>Additional Media Type Structured Syntax Suffixes</title>
            <author fullname="T. Hansen" initials="T." surname="Hansen"/>
            <author fullname="A. Melnikov" initials="A." surname="Melnikov"/>
            <date month="January" year="2013"/>
            <abstract>
              <t>A content media type name sometimes includes partitioned meta- information distinguished by a structured syntax to permit noting an attribute of the media as a suffix to the name. This document defines several structured syntax suffixes for use with media type registrations. In particular, it defines and registers the "+json", "+ber", "+der", "+fastinfoset", "+wbxml" and "+zip" structured syntax suffixes, and provides a media type structured syntax suffix registration form for the "+xml" structured syntax suffix. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6839"/>
          <seriesInfo name="DOI" value="10.17487/RFC6839"/>
        </reference>
        <reference anchor="RFC8725">
          <front>
            <title>JSON Web Token Best Current Practices</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="D. Hardt" initials="D." surname="Hardt"/>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>JSON Web Tokens, also known as JWTs, are URL-safe JSON-based security tokens that contain a set of claims that can be signed and/or encrypted. JWTs are being widely used and deployed as a simple security token format in numerous protocols and applications, both in the area of digital identity and in other application areas. This Best Current Practices document updates RFC 7519 to provide actionable guidance leading to secure implementation and deployment of JWTs.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="225"/>
          <seriesInfo name="RFC" value="8725"/>
          <seriesInfo name="DOI" value="10.17487/RFC8725"/>
        </reference>
        <reference anchor="JSON-LD" target="https://www.w3.org/TR/json-ld11/">
          <front>
            <title>A JSON-based Serialization for Linked Data</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="DIDs" target="https://www.w3.org/TR/did-core/">
          <front>
            <title>Decentralized Identifiers (DIDs) v1.0</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="DIDsFO" target="https://www.w3.org/2022/03/did-fo-report.html">
          <front>
            <title>DID 1.0 Formal Objections Report</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="VCs" target="https://www.w3.org/TR/vc-jose-cose/">
          <front>
            <title>Securing Verifiable Credentials using JOSE and COSE</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="OpenIDConnect" target="https://openid.net/specs/openid-connect-core-1_0.html">
          <front>
            <title>Open ID Connect</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
    <?line 483?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
