Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[The Infrastructure of Trust - Federation API endpoints] - Trust Evaluation #418

Draft
wants to merge 4 commits into
base: versione-corrente
Choose a base branch
from
Draft
Changes from 2 commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
11 changes: 11 additions & 0 deletions docs/en/trust.rst
Original file line number Diff line number Diff line change
Expand Up @@ -631,6 +631,17 @@ Below is a non-normative example of a Trust Chain in its original format (JSON A
.. note::

The entire Trust Chain is verifiable by only possessing the Trust Anchor's public keys.
There are events where keys are unavailable to verify the entire trust chain. These cases can arise as follows:
peppelinux marked this conversation as resolved.
Show resolved Hide resolved

- **Key Change by Credential Issuer**: When the credential issuer updates its keys (the previous keys MUST be valid for their designated validity period). This can be managed using the Federation Historical Keys Endpoint.

- **Change in Credential Types**: The credential issuer changes the types of credentials issued (removing one or more is the critical case); this eveny MUST be triggered at intermediate/root level, thus MAY be forced by an upper authority. Previously issued credentials within previous MUST be valid for their validity period.

- **Credential Issuers Merge**: When a credential issuer merges with another, both a Federation Historical Keys Endpoint and a Federation Historical Entity Endpoint are necessary.

- **Credential Issuer Becomes Inactive**: If a credential issuer becomes inactive for any reason, a Federation Historical Entity Endpoint would be required, likely managed by a higher authority, as in the previous scenario. This situation may not only apply to the credential issuer (leaf) but could also occur at an intermediate or root entity level. In such cases, the root or trust anchor may be the entity responsible for managing the Federation Historical Entity Endpoint.

In the last scenarios, the root authority, or an entity authorized by the root authority, MUST retain the keys and trust chain information. In case of any issue involving any actor in the trust chain, the root authority is responsible for maintaining the historical record of the trust chain for a period established by law.


Offline Trust Attestation Mechanisms
Expand Down
Loading