decentralized-id.github.io/_posts/identosphere-dump/open-standards/protocols.md
⧉ infominer 761b3a88be mdc
2022-11-26 00:33:06 -05:00

15 KiB
Raw Blame History

published
false

Protocols

“This approval is further evidence that Hyperledger Aries is a breakout success for the Hyperledger community,” said Brian Behlendorf, General Manager for Blockchain, Healthcare and Identity at the Linux Foundation. “Convergence on common libraries for the exchange of credentials will help speed the development of urgently-needed solutions and systems, ranging from education to finance to the fight against the pandemic. Aries is key to that convergence.”

OpenID Connect

Currently, instances of the Universal Resolver is hosted by DIF, IBM, and other companies. Danube Tech has been maintaining the project.

The project has some guidelines for contributing new DID method drivers:https://github.com/decentralized-identity/universal-resolver/blob/master/docs/driver-development.md

We have some ongoing questions on policies for Universal Resolver drivers.

Proposal: We should require contact data for maintainers of drivers (could be email address or any other type of contact data).

Another challenge is that there may be multiple projects claiming the same DID method name. How to decide which DID method driver to include in the Universal Resolver?

Proposal: Driver implementers must get their DID method registered first in the W3C DID method registry, then they can contribute a Universal Resolver driver (this avoids ambiguities)

DID test suite: https://github.com/w3c/did-test-suite

DID test suite is not for runtime, but the Universal Resolver could do a few simple checks on a driver's responses. But there's also a philosophical question: Should the Universal Resolver be "allowed" to check and potentially transform driver responses, or should it just "pass through" everything that comes from a driver?

This issue now has a funding of 3004.5068 USD (3000.0 USD @ $1.0/USD) attached to it.

Summary: Picos are a programming model for building decentralized applications that provide significant benefits in the form of abstractions that reduce programmer effort. Here are ten eleven reasons you should use picos for your next decentralized application. Temperature Sensor Network Built from Picos I didn't start out to write a programming language that naturally supports

  • Implement Client Credentials with Kong Konnect and Okta

    The OIDC plugin enables Kong, as the API gateway, to communicate with Okta via the OAuth/OIDC flows.

  • ION We Have Liftoff!

    We are excited to share that v1 of ION is complete and has been launched on Bitcoin mainnet. We have deployed an ION node to our production infrastructure and are working together with other companies and organizations to do so as well. ION does not rely on centralized entities, trusted validators, or special protocol tokens ION answers to no one but you, the community. Because ION is an open, permissionless system, anyone can run an ION node, in fact the more nodes in operation, the stronger the network becomes. Development of ION, and the Sidetree standard ION is based on, takes place in the Decentralized Identity Foundation (DIF). Read on to learn how you can integrate ION, DIDs, and Verifiable Credentials in your applications and services.

  • Identity, Unlocked... SIOP with Kristina Yasuda

    As a discovery mechanism to invoke a Self-Issued OP, the discussion on the podcast covered the usage of a custom schema 'openid://'. Alternative mechanisms to address the limitations of custom schemas are being actively explored in the WG.

The conversation meanders through deeper details, from how the current SIOP specification draft under the OpenID Foundation picks up the mission from a former attempt under DIF to encoding approaches for verifiable presentations (embedding in JWTs, LD proofs, how to represent attributes

  • Sidetree Protocol reaches V1 DIF

    This week, the DIF Steering Committee officially approved the first major release of the Sidetree Protocol specification, "v1" so to speak. This protocol has already been implemented, and four of its implementers have been collaborating intensively for over a year on expanding and extending this specification together.

  • PROPOSAL: Confidential Storage Specification Refactoring 0.2 March 24, 2021

    Based on the March 11 Zoom discussion where we worked hard to discern the differences between Agents, Hubs, and EDVs (and I believe were largely successful IMO), Ive like to propose to the SDS/CS WG that we refactor the current Confidential Storage specification into 3 separable parts/specifications.

Identity Not SSI

Aaron Parecki - Mr. OAuth has a new course out on Udemy

3.5 hours of video content, quizzes, as well as interactive exercises with a guided learning tool to get you quickly up to speed on OAuth, OpenID Connect, PKCE, best practices, and tips for protecting APIs with OAuth.

Universal Resolver supports ION DID Method

Grant Negotiation and Authorization Protocol (GNAP)

  • GNAP Editors' Use of GitHub Issues

    The editors met yesterday to discuss the issues that were pulled out of the previous draft text and document a process for how to resolve these and future issues. We would like to explain how we plan on using labels on GitHub issues to keep track of discussions and keep things moving.

  • Genesis of the GNAP working group with Dick Hardt of SignIn.org. Auth0 Podcast Identity Unlocked Vittorio Bertocci

    The decision was made to create a new group apart from OAuth, and Dick clarifies that the GNAP working group does not feel constrained by existing technology; GNAP does not need to be backward-compatible, but Dick still hopes that the transition to GNAP will be smooth for those who use it.

  • Filling in the GNAP

    Justin Richer identity protocol writer and implementer extraordinaire has a very excellent post explaining the new GNAP and all the things that lead to it, including OAuth, OpenID, TxAuth, OAuth3, and OAuth.XYZ. This protocol is a big deal and will be important. Its just beginning the journey through IETF (Internet Engineering Task Force) the main standards body of the internet.

  • ION reaches 1.0

    ION makes it possible to anchor tens of thousands of DID/DPKI operations on a target chain (in ION's case, Bitcoin) using a single on-chain transaction. The transactions are encoded with a hash that ION nodes use to fetch, store, and replicate the hash-associated DID operation batches via IPFS.

  • A Universal Resolver for self-sovereign identifiers

  • On any blockchain or other decentralized system (Markus Sabadello)

    This is a first step in fulfilling DIFs mission to help individuals and organizations to control their digital identity, without being dependent on any intermediary party.

    This tool fulfills a similar purpose as Bind does in the DNS system: resolution of identifiers. However, instead of working with domain names, we work with self-sovereign identifiers that can be created and registered directly by the entities they refer to.

  • Persistence, Programming, and Picos -

    Picos show that image-based development can be done in a manner consistent with the best practices we use today without losing the important benefits it brings.

The project name, PICOS, is an abbreviation of “Privacy and Identity Management for Community Services”. The objective of the project is to advance the state of the art in technologies that provide privacy-enhanced identity and trust management features within complex community-supporting services that are built on Next Generation Networks and delivered by multiple communication service providers. The approach taken by the project is to research, develop, build trial and evaluate an open, privacy-respecting, trust-enabling identity management platform that supports the provision of community services by mobile communication service providers.

Learn more about the motivation, the objectivestasks and achievements of PICOS, and get to know the PICOS exemplary communities.

I'm excited to announce a new, stable, production-ready pico engine. The latest release of the Pico Engine (1.X) provides a more modular design that better supports future enhancements and allows picos to be less dependent on a specific engine for operation.

Established Tech

OpenID

Available on the Open Universitys OpenLearn Create platform and is licensed under CC BY-NC-SA 4.0. Upon completion of the course, learners earn a free statement of participation.

Gain a solid foundation on self-sovereign identity (SSI) with a 360 degree overview of its evolutionary journey, key concepts, standards, technological building blocks, use cases, real-world examples and implementation considerations.