Verifiable Credential Endorsement PoC inspired by SCITT.
For demonstration purposes only.
Learn more by visiting ietf-scitt.
🚧 This repo contains a tiny PoC.
This PoC does not reflect current of future SCITT architecture, it is meant to explore the actors and models associated with transparency registries.
In particular, this repository focuses on issuers that rely on DIDs and Payloads / Artifacts that are Verifiable Credentials.
These choices were made to leverage some existing visualization tooling, and libraries, but a similar setup can be achieved with x509 and COSE.
This repository uses a GitHub Repository as a "Transparent Registry" and provides "Full Transparency", meaning both claims and endorsements are public.
While this makes it easier to explore the concepts it does not reflect a realistic security architecture.
🚧 This repository is for experimenting / and not reflective of anything approaching the proposed SCITT architecture.
Entities such as people, organizations or devices that make statements about an artifact or subject.
🧸 In this PoC I have chosen to represent issuers using W3C Decentralized Identifiers.
A set of statements about a subject protected by a signature from an issuer.
🧸 In this PoC I have chosen to represent claims using W3C Verifiable Credentials.
Security documents describing the rules for validating a claim for consideration in the registry.
🧸 In this PoC I have chosen to represent policy documents using JSON Schema.
🧸 In this PoC I have chosent to automate the claim review process by leveraging GitHub Worflows,
such that a review of claims for conformance is automatically created after a pull request against the main
branch is opened.
See https://github.com/OR13/endor/actions/workflows/Review.yml.
Entities such as people, organizations or devices that have some trust relationship with an issuer, and can provide some assurance to the issuer's identifiers and authenticity.
A notary keeps a ledger or registry of their endorsements.
🧸 In this PoC I have chosen to represent the transparent registry using a GitHub repository.
A counter signature for a claim from a notary, representing that the issuer has been authenticated under some assurance level, but not representing any evaluation of the payload or claims made by the issuer about a subject.
🧸 In this PoC I have chosen to represent endorsements using W3C Verifiable Credentials.
🧸 In this PoC I have chosen to automate the process of creating endorsements by leveraging GitHub Worflows,
such that endorsements are automatically created after a pull request to the main
branch has been merged.
See https://github.com/OR13/endor/actions/workflows/Endorse.yml.
Fork the repo, and use this tool to create a /docs/inbox/claim.json
file.
In the tool, make sure to select the following signing settings:
Then paste this:
{
"@context": [
"https://www.w3.org/2018/credentials/v1",
{ "@vocab": "https://or13.github.io/endor#" }
],
"id": "urn:uuid:a86f8c83-fe00-4aff-83b7-f6e55c4ebf20",
"type": ["VerifiableCredential"],
"issuer": "did:key:zQ3shrnCZq3R7vLvDeWQFnxz5HMKqP9JoiMonzYJB4TGYnftL",
"issuanceDate": "2010-01-01T19:23:24Z",
"credentialSubject": {
"id": "did:example:123",
"cool-hash": "2cf24dba5fb0a30e26e83b2ac5b9e29e1b161e5c1fa7425e73043362938b9824"
}
}
You can experiment with using other issuer identifiers by changing the mnemonic and/or path values.
Just beware that the @context
needs to match teh above example or you may fail to issue verifiable credentials.
You will need to click the pencil to issue the credential as a JWT.
You will need to use that JWT to create the claim.json
file, and it should look like the example.json
file, next to it.
Once you have the /docs/inbox/claim.json
file in a branch, open a pull request against this repository.
You should have only this file in the change set.
A reviewer (@OR13b) will have to approve and run CI to validate your claim.
If the review passes:
- I will merge your pull request
- The registry will automatically update
- A link for your endorsed claim will appear here
If you want to test out the process see the npm commands under usage below.
npm run claim:prepare
This command will create a ./docs/inbox/claim.json
from ./docs/inbox/example.json
.
You can also generate your own unique claim using this tool:
After configuring the credential, click the "pencil" to issue it.
You will end on a URL that looks like this: https://api.did.actor/v/eyJhbGc...
Everything after https://api.did.actor/v/
is a JWT.
You can use this as your claim.json
npm run claim:review
npm run claim:endorse
npm run registry:test
npm run registry:update
npm run registry:drop
This repository contains private keys for demonstration purposes.
This repository uses did:key
which has no revocation or expiration mechanism... for demonstration purposes only.
This PoC is a hypothetical example.
This PoC is not safe, I made it to explore ideas.