Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[The Infrastructure of Trust - Federation API endpoints] - Trust Evaluation #418

Draft
wants to merge 4 commits into
base: versione-corrente
Choose a base branch
from
Draft
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
12 changes: 12 additions & 0 deletions docs/en/trust.rst
Original file line number Diff line number Diff line change
Expand Up @@ -632,6 +632,18 @@ Below is a non-normative example of a Trust Chain in its original format (JSON A

The entire Trust Chain is verifiable by only possessing the Trust Anchor's public keys.

There are events where keys are unavailable to verify the entire trust chain:

- **Key Change by Credential Issuer**: If the credential issuer updates its keys, the previous keys MUST be valid for their originally designated validity period. This MUST be managed using the Federation Historical Keys Endpoint.

- **Change in Credential Types**: If the credential issuer changes the credential **types** issued, for example deciding not to issue one or more credential types, the related keys MUST be available for the originally designated validity period.

- **Credential Issuers Merge**: If a credential issuer merges with another, the **previously** available federation configuration MUST be available throught both Federation Historical Keys Endpoint and Federation Historical Entity Endpoint.

- **Credential Issuer Becomes Inactive**: If a credential issuer becomes inactive for any reason, a **related** Federation Historical Entity Endpoint MUST be available, managed by a higher authority. This situation may not only apply to the credential issuer (leaf) but could also occur at an intermediate or root entity level. In such cases the root or trust anchor may be the entity responsible for managing the Federation Historical Entity Endpoint.

In the latter scenarios, the root authority, or an entity authorized by the root authority, MUST retain the keys and trust chain end points for a period established by law.


Offline Trust Attestation Mechanisms
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Expand Down
Loading