Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Do capabilities support key rotation? #39

Open
OR13 opened this issue Dec 14, 2020 · 3 comments
Open

Do capabilities support key rotation? #39

OR13 opened this issue Dec 14, 2020 · 3 comments
Labels
ready for PR Ready for Pull Request

Comments

@OR13
Copy link
Contributor

OR13 commented Dec 14, 2020

Should invoker be limited to DIDs or DID_URLS ?

See https://github.com/decentralized-identity/confidential-storage/pull/142/files#r541971789

@llorllale
Copy link

llorllale commented Dec 15, 2020

I favor specifying the invoker to be a DID. I agree we should limit ourselves to one or the other in order to simplify implementations (DID resolver vs DID URL de-referencer).

The semantics around DID verification relationships are well-established.

It allows key rotation.

Allows use cases requiring deactivation (such as a user ending their relationship with a service provider). Edit: although this is still enabled by DID URLs.

There's always did:key for use cases that want to constrain access to a single key.

@dmitrizagidulin dmitrizagidulin transferred this issue from decentralized-identity/confidential-storage May 25, 2021
@DRK3
Copy link

DRK3 commented Jul 22, 2021

Discussed on July 22, 2021 WG call:

  • Action item: change the example so the question doesn't come up.
  • Use the term "controller" instead of "invoker"
  • The value of the controller property should just be a DID.
  • Should it be a did:key did? -> Use did:example
  • Concerns about using rotating keys from OCAP community

Proposal: leave the ability to do key rotation (by specifying DIDs), until concerns are raised from OCAP community

  • Clarify that we're only using DIDs here for the key rotation ability.
  • Raise the possible concerns against key rotation in the ZCAP spec.

@dmitrizagidulin dmitrizagidulin added the ready for PR Ready for Pull Request label Sep 2, 2021
@dmitrizagidulin
Copy link
Contributor

Addressed by PR #75 (invoker changed to controller, using a DID for controller)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
ready for PR Ready for Pull Request
Projects
None yet
Development

No branches or pull requests

4 participants