You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
there might be cases where the Credential Verifier uses ephemeral metadata parameters, such as jwks for encryption, within the client_metadata parameter used in the request. For this reason the client_metadata parameter has sense to be kept and therefore must be handled safely
The text was updated successfully, but these errors were encountered:
Authoritative data the Wallet is able to obtain about the Client from other sources, for example those from an OpenID Federation Entity Statement, take precedence over the values passed in client_metadata.
I think further clarification is needed somewhere about behaviour here. But my assumption is that the verifier would not publish an encryption key in its jwks published via Federation, and hence it would be compliant with the above spec to take an encryption key from client_metadata instead (as the Verifier wouldn't have an authoritative encryption key).
Discussion in OpenID4VP here: https://github.com/openid/OpenID4VP/pull/233/files#r1744565264
there might be cases where the Credential Verifier uses ephemeral metadata parameters, such as jwks for encryption, within the client_metadata parameter used in the request. For this reason the client_metadata parameter has sense to be kept and therefore must be handled safely
The text was updated successfully, but these errors were encountered: