- Authors: Sam Curren, Daniel Bluhm, Adam Burdett
- Status: ADOPTED
- Since: 2024-05-01
- Status Note: Discussed and implemented and part of AIP 2.0.
- Start Date: 2019-09-03
- Tags: feature, protocol, test-anomaly
A protocol to coordinate mediation configuration between a mediating agent and the recipient.
This protocol is needed when using an edge agent and a mediator agent from different vendors. Edge agents and mediator agents from the same vendor may use whatever protocol they wish without sacrificing interoperability.
Use of the forward message in the Routing Protocol requires an exchange of information. The Recipient must know which endpoint and routing key(s) to share, and the Mediator needs to know which keys should be routed via this relationship.
Name: coordinate-mediation
Version: 1.0
Base URI: https://didcomm.org/coordinate-mediation/1.0/
mediator - The agent that will be receiving forward
messages on behalf of the recipient.
recipient - The agent for whom the forward
message payload is intended.
A recipient may discover an agent capable of routing using the Feature Discovery Protocol. If protocol is supported with the mediator role, a recipient may send a mediate-request
to initiate a routing relationship.
First, the recipient sends a mediate-request
message to the mediator. If the mediator is willing to route messages, it will respond with a mediate-grant
message. The recipient will share the routing information in the grant message with other contacts.
When a new key is used by the recipient, it must be registered with the mediator to enable route identification. This is done with a keylist-update
message.
The keylist-update
and keylist-query
methods are used over time to identify and remove keys that are no longer in use by the recipient.
Note on terms: Early versions of this protocol included the concept of terms for mediation. This concept has been removed from this version due to a need for further discussion on representing terms in DIDComm in general and lack of use of these terms in current implementations.
This message serves as a request from the recipient to the mediator, asking for the permission (and routing information) to publish the endpoint as a mediator.
{
"@id": "123456781",
"@type": "<baseuri>/mediate-request",
}
This message serves as notification of the mediator denying the recipient's request for mediation.
{
"@id": "123456781",
"@type": "<baseuri>/mediate-deny",
}
A route grant message is a signal from the mediator to the recipient that permission is given to distribute the included information as an inbound route.
{
"@id": "123456781",
"@type": "<baseuri>/mediate-grant",
"endpoint": "http://mediators-r-us.com",
"routing_keys": ["did:key:z6Mkfriq1MqLBoPWecGoDLjguo1sB9brj6wT3qZ5BxkKpuP6"]
}
endpoint
: The endpoint reported to mediation client connections.
routing_keys
: List of keys in intended routing order. Key used as recipient of forward messages.
Used to notify the mediator of keys in use by the recipient.
{
"@id": "123456781",
"@type": "<baseuri>/keylist-update",
"updates":[
{
"recipient_key": "did:key:z6MkpTHR8VNsBxYAAWHut2Geadd9jSwuBV8xRoAnwWsdvktH",
"action": "add"
}
]
}
recipient_key
: Key subject of the update.
action
: One of add
or remove
.
Confirmation of requested keylist updates.
{
"@id": "123456781",
"@type": "<baseuri>/keylist-update-response",
"updated": [
{
"recipient_key": "did:key:z6MkpTHR8VNsBxYAAWHut2Geadd9jSwuBV8xRoAnwWsdvktH",
"action": "" // "add" or "remove"
"result": "" // [client_error | server_error | no_change | success]
}
]
}
recipient_key
: Key subject of the update.
action
: One of add
or remove
.
result
: One of client_error
, server_error
, no_change
, success
; describes the resulting state of the keylist update.
Query mediator for a list of keys registered for this connection.
{
"@id": "123456781",
"@type": "<baseuri>/keylist-query",
"paginate": {
"limit": 30,
"offset": 0
}
}
paginate
is optional.
Response to key list query, containing retrieved keys.
{
"@id": "123456781",
"@type": "<baseuri>/keylist",
"keys": [
{
"recipient_key": "did:key:z6MkpTHR8VNsBxYAAWHut2Geadd9jSwuBV8xRoAnwWsdvktH"
}
],
"pagination": {
"count": 30,
"offset": 30,
"remaining": 100
}
}
pagination
is optional.
All keys are encoded using the did:key
method as per
RFC0360.
There was an Indy HIPE that never made it past the PR process that described a similar approach. That HIPE led to a partial implementation of this inside the Aries Cloud Agent Python
- Should we allow listing keys by date? You could query keys in use by date?
- We are missing a way to check a single key (or a few keys) without doing a full list.
- Mediation grant supports only one endpoint. What can be done to support multiple endpoint options i.e. http, ws, etc.
- Requiring proof of key ownership (with a signature) would prevent an edge case where a malicious party registers a key for another party at the same mediator, and before the other party.
- How do we express terms and conditions for mediation?
- None
The following lists the implementations (if any) of this RFC. Please do a pull request to add your implementation. If the implementation is open source, include a link to the repo or to the implementation within the repo. Please be consistent in the "Name" field so that a mechanical processing of the RFCs can generate a list of all RFCs supported by an Aries implementation.
Name / Link | Implementation Notes |
---|---|
Aries Cloud Agent - Python | Added in ACA-Py 0.6.0 MISSING test results**** |
DIDComm mediator | Open source cloud-based mediator. |