From 6e4a60361f86dbec437750c00997d408d3a96e9e Mon Sep 17 00:00:00 2001
From: Manu Sporny
+The use of shared secrets for [=authentication=] and [=authorization=], such as
+the use of passwords, has resulted in a variety of security failures over the
+past several decades. To address these security failures, systems can upgrade to
+the use of
+
+asymmetric cryptography, which uses digital signatures that are far more
+difficult to compromise. However, one shortcoming of digital signatures is
+the difficulty in disseminating the information, such as public cryptographic
+keys, to those that would need to verify the security of the digital signature.
+
A [=controller document=] is a set of data that specifies one or more
-relationships between a [=controller=] and a set of data, such as a set of
-public cryptographic keys. The [=controller document=] contains [=verification
-relationships=] that explicitly permit the use of certain [=verification
-methods=] for specific purposes.
+relationships between an identifier that is controlled by a [=controller=] and a
+set of data, such as a set of public cryptographic keys. The [=controller
+document=] contains [=verification relationships=] that explicitly permit the
+use of certain [=verification methods=] for specific purposes.
It is expected that other specifications, such as [[[?DID-CORE]]], will profile
the features that are defined in this specification, requiring and/or
@@ -326,6 +340,60 @@ Introduction
+
+ Introduction
others.
+The following use cases are illustrative of the need for this specification. +While many other use cases exist, the following paragraphs highlight the +main scenarios that this specification is designed to improve upon. +
+ ++Lemmy runs an enterprise portal that manages large amounts of sensitive data +submitted by people working for a variety of organizations. He would like to use +identifiers for entities in the database where control over the identifier can +be cryptographically proven in order to increase security related to who is +allowed to access and update each organizations data. +
++Stef, who operates a high security service, would like to ensure that certain +cryptographic keys used by his customers can only be used for certain purposes +to enable different levels of access and protection for each type of +cryptographic key. +
++Marge, a software developer, would like to publicly advertise ways in which +other people on the Web can reach her through various communication services she +uses based on her globally unique identifier. +
++Cory, a systems architect, would like to extend the use cases described in this +section in a way that provides new functionality while not creating conflicts +with others that are adding extensions. +
+
A conforming controller document is any concrete expression of the
From a2af418c49f41ec5964930b7685772e72e72a244 Mon Sep 17 00:00:00 2001
From: Joe Andrieu Extensibility
+The use cases outlined in the previous section result in at least the following +requirements: +
+ +
From 120dc1f400024fd576d88711609ecf0384ff96fc Mon Sep 17 00:00:00 2001
From: Manu Sporny
The following use cases are illustrative of the need for this specification.
-While many other use cases exist, the following paragraphs highlight the
-main scenarios that this specification is designed to improve upon.
+While many other related use cases exist, such as those in [[[DID-USE-CASES]]],
+the following paragraphs highlight the main scenarios that this specification is
+designed to address.
@@ -360,7 +361,7 @@ Introduction
Use Cases
Identification
Identification
@@ -371,7 +372,7 @@
@@ -381,7 +382,7 @@
@@ -397,8 +398,9 @@
-The use cases outlined in the previous section result in at least the following -requirements: +The following requirements are derived from the illustrative use cases in this +specification. Further requirements resulting in a more decentralized solution +can be found in [[[DID-USE-CASES]]].
-The use of shared secrets for [=authentication=] and [=authorization=], such as -the use of passwords, has resulted in a variety of security failures over the -past several decades. To address these security failures, systems can upgrade to -the use of - -asymmetric cryptography, which uses digital signatures that are far more -difficult to compromise. However, one shortcoming of digital signatures is -the difficulty in disseminating the information, such as public cryptographic -keys, to those that would need to verify the security of the digital signature. +Digital signatures, based on +asymmetric +cryptography, can be used in [=authentication=] and [=authorization=] +schemes to make them difficult for adversaries to compromise. However, +one shortcoming of digital signatures is the challenge in disseminating +necessary information, such as public cryptographic keys, to those who need +to verify the security of a digital signature.
From 4b02bcd176e15693174f889f7267bd3878620dfe Mon Sep 17 00:00:00 2001
From: Manu Sporny
Digital signatures, based on
asymmetric
-cryptography, can be used in [=authentication=] and [=authorization=]
-schemes to make them difficult for adversaries to compromise. However,
+cryptography, can be used to make [=authentication=] and [=authorization=]
+schemes more difficult for adversaries to compromise. However,
one shortcoming of digital signatures is the challenge in disseminating
-necessary information, such as public cryptographic keys, to those who need
+necessary information, such as public cryptographic keys and revocation information, to those who need
to verify the security of a digital signature.
-The following use cases are illustrative of the need for this specification.
+The use cases below illustrate the need for this specification.
While many other related use cases exist, such as those in [[[DID-USE-CASES]]],
-the following paragraphs highlight the main scenarios that this specification is
+those described below are the main scenarios that this specification is
designed to address.
Introduction
Introduction
Use Cases
Identification
submitted by people working for a variety of organizations. He would like to use
identifiers for entities in the database where control over the identifier can
be cryptographically proven in order to increase security related to who is
-allowed to access and update each organizations data.
+allowed to access and update each organization's data.
Stef, who operates a high security service, would like to ensure that certain -cryptographic keys used by his customers can only be used for certain purposes -to enable different levels of access and protection for each type of -cryptographic key. +cryptographic keys used by his customers can only be used for specific purposes +(such as encryption, authorization, and/or authentication) to enable different +levels of access and protection for each type of cryptographic key.
Marge, a software developer, would like to publicly advertise ways in which other people on the Web can reach her through various communication services she -uses based on her globally unique identifier. +uses based on her globally unique identifier(s).
Cory, a systems architect, would like to extend the use cases described in this -section in a way that provides new functionality while not creating conflicts -with others that are adding extensions. +section in a way that provides new functionality without creating conflicts +with extensions being added by others.
-The following requirements are derived from the illustrative use cases in this -specification. Further requirements resulting in a more decentralized solution -can be found in [[[DID-USE-CASES]]]. +The following requirements are derived from the use cases described earlier in +this specification. Additional requirements which could lead to a more +decentralized solution can be found in [[[DID-USE-CASES]]].
The use cases below illustrate the need for this specification. -While many other related use cases exist, such as those in [[[DID-USE-CASES]]], -those described below are the main scenarios that this specification is -designed to address. +While many other related use cases exist, such as those in [[[DID-USE-CASES]]] +and [[[VC-USE-CASES]]], those described below are the main scenarios that this +specification is designed to address.
+Neru would like to issue digital credentials on behalf of her company that +contain claims about their employees. The claims that are made need to use +identifiers that are cryptographically attributable back to Neru's company and +need to allow for the holder's of those credentials to be able to +cryptographically authenticate themselves when they present the credential. +
+-Lemmy runs an enterprise portal that manages large amounts of sensitive data -submitted by people working for a variety of organizations. He would like to use -identifiers for entities in the database where control over the identifier can -be cryptographically proven in order to increase security related to who is -allowed to access and update each organization's data. +Lemmy runs multiple enterprise portals that manage large amounts of sensitive +data submitted by people working for a variety of organizations. He would like +to use identifiers for entities in the databases that are provided by +his customers and do not depend on easily phishable information such as +email addresses and passwords. +
++Lemmy would like to ensure that his customers prove control over their +identifiers — for example, by using public/private key cryptography +— in order to increase security related to who is allowed to access and +update each organization's data.