-
Notifications
You must be signed in to change notification settings - Fork 16
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
OAuth2 Presentation Exchange 4 Server-to-Server #2399
Comments
part of #2330 |
Well, actually this is not OpenID4VP, but rather using a DIF Presentation Exchange as grant type in an OAuth2 flow. |
Until there is an actual standard for the service-to-service flow this seems like the best solution. Where should we send the
The |
I suppose that is true. Defining a new flow/grant_type inspired by the OpenID4VP spec. |
Let's try to put it on the generic public /token endpoint. This would generate some security considerations:
A very efficient /token endpoint would help a lot. |
Thread on W3C credentials mailing list regarding standardization: https://lists.w3.org/Archives/Public/public-credentials/2023Aug/0007.html |
Implementation iisue: nuts-foundation/nuts-specification#265 Closing this one. |
The regular OpenID4VP, for acquiring an access token given a VP from a wallet, doesn't lend itself for server to server communication. Reasons:
A solution is to use the EBSI service-to-service flow (https://api-conformance.ebsi.eu/docs/ct/verifiable-presentation-exchange-guidelines-v3#service-to-service-token-flow), which is actually very, very much like our current OAuth2 JWT Bearer Token Grant flow to acquire an access token. Main difference is the preliminary GET request to retrieve the presentation definition and the grant type being
vp_token
instead ofjwt-bearer
.The text was updated successfully, but these errors were encountered: