diff --git a/index.html b/index.html
index 3b2ff25..1ab0874 100644
--- a/index.html
+++ b/index.html
@@ -565,11 +565,50 @@
Authorization
require conforming VC API clients to utilize secure authorization
technologies when performing certain types of requests. Each HTTP endpoint
defined in this document specifies whether or not authorization is required
-when performing a request.
+when performing a request. With the exception of the class of forbidden
+authorization protocols discussed later in this section, the VC API is agnostic
+regarding authorization mechanism.
-This section details the authorization technologies that have been contemplated
-for use by conforming implementations. Other equivalent authorization
+The VC API is meant to be generic and useful in many scenarios that require
+the issuance, possession, presentation, and/or verification of Verifiable
+Credentials. To this end, implementers are advised to consider the following
+classifications of use cases:
+
+
+ -
+Public. A Public API is one that can be called with no authorization.
+Examples include an open witness or timestamp service (a trusted service that
+can digitally sign a message with a timestamp for an audit trail purpose), or
+an open retail coupon endpoint ("buy one, get one free"). Public verifiers
+might also exist as well, to act as an agnostic third party in a trust scenario.
+
+ -
+Permissioned. Permissioned authorization requires the entity making
+the API call to, for example, have an access control token or a capability
+URL, or to invoke a capability from a mutually trusted
+source. These permissions grant access to the API, but make no assumptions
+about credential subjects, previous interactions, or the like. Permissioned
+access is particularly useful in service-to-service based workflows, where
+credential subjects are not directly involved.
+
+ -
+Bound. Bound authorization involves scenarios where the API calls are
+tightly coupled, linked, or bound to another process, often out-of-band, that has
+authenticated the holder/subject of the API interaction. These use cases include,
+but are not limited to, issuance of subject-specific identity claims directly to
+the subject in question, or verification of credentials to qualify the holder for
+service at the verifier, for example. Examples of methods to bind activity on one
+channel to a VC API call include CHAPI (the
+Credential Handler API), OIDC (OpenID Connect),
+and GNAP (the Grant Negotiation and Authorization Protocol). Developers implementing
+bound authorization will need to take steps to ensure the appropriate level of
+assurance is achieved in the flow to properly protect the binding.
+
+
+
+The rest of this section gives examples of the authorization technologies that have
+been contemplated for use by conforming implementations. Other equivalent authorization
technologies can be used. Implementers are cautioned against using non-standard
or legacy authorization technologies.