<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-demarco-oauth-status-assertions-03" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.25.0 -->
  <front>
    <title abbrev="OAuth Status Assertions">OAuth Status Assertions</title>
    <seriesInfo name="Internet-Draft" value="draft-demarco-oauth-status-assertions-03"/>
    <author fullname="Giuseppe De Marco">
      <organization>Dipartimento per la trasformazione digitale</organization>
      <address>
        <email>gi.demarco@innovazione.gov.it</email>
      </address>
    </author>
    <author fullname="Orie Steele">
      <organization>Transmute</organization>
      <address>
        <email>orie@transmute.industries</email>
      </address>
    </author>
    <author fullname="Francesco Marino">
      <organization>Istituto Poligrafico e Zecca dello Stato</organization>
      <address>
        <email>fa.marino@ipzs.it</email>
      </address>
    </author>
    <author fullname="Marina Adomeit">
      <organization>SUNET</organization>
      <address>
        <email>marina@sunet.se</email>
      </address>
    </author>
    <date year="2024" month="December" day="20"/>
    <keyword>digital credentials</keyword>
    <keyword>revocation</keyword>
    <abstract>
      <?line 108?>

<t>Status Assertion is a signed object that demonstrates the validity status of a
Digital Credential.
These assertions are periodically provided
to Holders, who can present these to Credential Verifier along
with the corresponding Digital Credentials.
The approach outlined in this document
makes the Credential Verifier able to check the status,
such as the non-revocation, of a Digital Credential
without requiring to query any third-party entities.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://peppelinux.github.io/draft-demarco-oauth-status-assertions/draft-demarco-oauth-status-assertions.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-demarco-oauth-status-assertions/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/peppelinux/draft-demarco-oauth-status-assertions"/>.</t>
    </note>
  </front>
  <middle>
    <?line 120?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Status Assertions show the status of Digital
Credentials, whether in JSON Web Tokens (JWT) or CBOR Web Tokens (CWT)
format. Status Assertions function
similarly to OCSP Stapling (<xref target="RFC6066"/>), allowing Holders
to present to the Relying Parties
time-stamped assertions provided by the Issuer.
The approach outlined in this specification enables the
verification of Digital Credentials against revocation without
direct queries to third-party systems,
enhancing privacy, reducing latency, and
faciliting offline verification.</t>
      <t>The figure below illustrates the process by which a Holder,
such as a wallet instance,
requests and obtains a Status Assertion from the Issuer.</t>
      <artwork type="ascii-art"><![CDATA[
+----------------+                              +------------------+
|                | Requests Status Assertions   |                  |
|                |----------------------------->|                  |
|     Holder     |                              |      Issuer      |
|                | Status Assertions            |                  |
|                |<-----------------------------|                  |
+----------------+                              +------------------+
]]></artwork>
      <t><strong>Figure 1</strong>: Status Assertion Issuance Flow.</t>
      <t>The figure below illustrates the process by which a Holder
presents the Status Assertion along with the corresponding Digital Credential.</t>
      <artwork type="ascii-art"><![CDATA[
+----------------+                             +------------------+
|                | Presents Digital Credential |                  |
|     Holder     | and Status Assertion        |     Verifier     |
|                |---------------------------->|                  |
+----------------+                             +------------------+
]]></artwork>
      <t><strong>Figure 2</strong>: Status Assertion Presentation Flow.</t>
      <t>In summary, the Issuer provides the Holder with a
Status Assertion, which is linked to a Digital Credential. This enables
the Holder to present both the Digital Credential and its
Status Assertion to a Credential Verifier as proof of the Digital Credential's
validity status.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>This specification uses the terms "End-User", "Entity" as defined by
OpenID Connect Core <xref target="OpenID.Core"/>, the term "JSON Web Token (JWT)"
defined by JSON Web Token (JWT) <xref target="RFC7519"/>,
the term "CBOR Web Token (CWT)" defined in <xref target="RFC8392"/>, "Client" as
defined <xref target="RFC6749"/>, "Holder", "Verifiable Presentation"
defined in <xref target="OpenID4VP"/>.</t>
      <dl>
        <dt>Digital Credential:</dt>
        <dd>
          <t>A set of one or more claims about a subject issued by an Issuer.
Alternative names are "Verifiable Credential" or "Credential".</t>
        </dd>
        <dt>Issuer:</dt>
        <dd>
          <t>Entity that is responsible for the issuance of the Digital Credentials.
The Issuer is responsible for the lifecycle of their issued
Digital Credentials and their validity status and responsible for issuance
of related Status Assertions. Alternative name is "Credential Issuer".</t>
        </dd>
        <dt>Verifier:</dt>
        <dd>
          <t>Entity that relies on the validity of the Digital Credentials presented to it.
This Entity, verifies the authenticity and
validity of the Digital Credentials, including their revocation status,
before accepting them. Alternative names are
"Relying Party" and "Credential Verifier".</t>
        </dd>
        <dt>Wallet Instance:</dt>
        <dd>
          <t>The digital Wallet in control of a User, also known as Wallet.
It securely stores the User's Digital Credentials. It can present
Digital Credentials to Verifiers
and request Status Assertions from Issuers under the control of the User.
For the purposes of this specification, the Wallet Instance is
considered as a Client.</t>
        </dd>
      </dl>
    </section>
    <section anchor="rationale">
      <name>Rationale</name>
      <t>There are cases where the Verifier only needs
to check the revocation status of a Digital Credential at the time of
presentation, and therefore it should not be allowed to
check the status of a Digital Credential over time due to some
privacy constraints, in compliance with national privacy regulations.</t>
      <t>For instance, consider a scenario where a Verifier's repeated access to a
status list, such as the one defined in
<xref target="draft-ietf-oauth-status-list"/>
to check the revocation status of a Digital Credential could
be deemed as excessive monitoring of the End-User's activities.</t>
      <t>This could potentially infringe upon the End-User's right to privacy,
as outlined in
<xref target="ECHR-ART8"/> and
in the the European Union's General Data Protection Regulation
<xref target="GDPR"/>,
by creating a detailed profile of the End-User's
Digital Credential status without explicit consent for
such continuous surveillance.</t>
    </section>
    <section anchor="requirements">
      <name>Requirements</name>
      <t>The general requirements for the implementation of Status Assertion are
listed in this section. The Status Assertion:</t>
      <ul spacing="normal">
        <li>
          <t>notifies the Holder about the status of their Digital Credential,
because the Holder <bcp14>MUST</bcp14> be informed by the Issuers of any changes
in the status of their Digital Credentials.</t>
        </li>
        <li>
          <t><bcp14>SHOULD</bcp14> be presented in conjunction with the Digital Credential.</t>
        </li>
        <li>
          <t><bcp14>MUST</bcp14> include information that links it to the
referenced Digital Credential.</t>
        </li>
        <li>
          <t><bcp14>MUST</bcp14> be timestamped with its issuance datetime,
using a timestamp which is at or after the time of
Digital Credential issuance which it refers.</t>
        </li>
        <li>
          <t><bcp14>MUST</bcp14> contain the expiration datetime after which
the Status Assertion <bcp14>MUST NOT</bcp14> be considered valid anymore,
and the Digital Credential referred to <bcp14>SHOULD NOT</bcp14>
be considered as having a valid status, unless there exists some specific Verifier policy that provides stronger guidance.
The expiration datetime <bcp14>MUST</bcp14> be
superior to the Status Assertion issuance datetime and it <bcp14>MUST</bcp14> end before
the expiration datetime of the Digital Credential.</t>
        </li>
        <li>
          <t><bcp14>MAY</bcp14> contain the <em>not before time</em> parameter, specifying the time
from which the Status Assertion <bcp14>MUST</bcp14> be considered valid and evaluable.</t>
        </li>
        <li>
          <t><bcp14>MUST</bcp14> enable the offline use cases by employing validation using
a cryptographic signature and the cryptographic public key of the
Issuer.</t>
        </li>
        <li>
          <t><bcp14>SHOULD NOT</bcp14> contain personal information about the User, that isn't already made available to the Verifier, who owns
the Digital Credential to which the Status Assertion refers.</t>
        </li>
        <li>
          <t><bcp14>MUST NOT</bcp14> contain any information regarding the Verifier to whom it may
be presented, such as disclose the Verifier identifier to specify the intended audience.</t>
        </li>
      </ul>
    </section>
    <section anchor="proof-of-possession-of-a-digital-credential">
      <name>Proof of Possession of a Digital Credential</name>
      <t>The concept of Proof of Possession (PoP) of a Digital Credential within the
framework of the Status Assertion specification encompasses a broader
perspective than merely possessing the digital bytes of the Digital Credential.</t>
      <t>It involves demonstrating rightful control or ownership over the
Digital Credential, which can manifest in various forms depending on the
technology employed and the nature of the Digital Credential itself.
For instance, a Digital Credential could be presented visually (de-visu)
with a personal portrait serving as a binding element.</t>
      <t>While this specification does not prescribe any additional methods
for the proof of possession of the Digital Credential, it aims to offer
guidance for concrete implementations utilizing common proof of
possession mechanisms. This includes, but is not limited to:</t>
      <ol spacing="normal" type="1"><li>
          <t>Having the digital representation of the Digital Credential (the bytes).</t>
        </li>
        <li>
          <t>Controlling the confirmation method of the Digital Credential,
using the Digital Credential's <tt>cnf</tt> claim.</t>
        </li>
      </ol>
      <t>The essence of requiring proof of possession over the Digital Credential
through the confirmation method, such has proving the control of the
cryptographic material related to a Digital Credential, is
to ensure that the entity in possession of the Digital Credential can execute
actions exclusively reserved to the legitimate Holder.
The dual-layered approach of requiring both possession of the
Digital Credential and control over it, reinforces the security and integrity
of the Status Assertion process.
This ensures that the Holder requesting a Status Assertion is indeed
the same Holder to which the Digital Credential was originally issued,
affirming the authenticity and rightful possession of the Digital Credential.</t>
    </section>
    <section anchor="status-assertion-request">
      <name>Status Assertion Request</name>
      <t>The following diagram shows the Wallet Instance requesting a
Status Assertion to an Issuer,
related to a specific Digital Credential issued by the same Issuer.</t>
      <artwork type="ascii-art"><![CDATA[
+-------------------+                                  +-------------------+
|  Wallet Instance  |                                  |      Issuer       |
+--------+----------+                                  +----------+--------+
         |                                                        |
         | HTTP POST /status-assertion-endpoint                                      |
         |  status_assertion_requests = [$StatusAssertionRequest] |
         +-------------------------------------------------------->
         |                                                        |
         |  Status Assertion Responses [...]                      |
         <--------------------------------------------------------+
         |                                                        |
+--------+----------+                                  +----------+--------+
|  Wallet Instance  |                                  |       Issuer      |
+-------------------+                                  +-------------------+
]]></artwork>
      <t>The Wallet Instance sends the Status Assertion request to the
Issuer, where:</t>
      <ul spacing="normal">
        <li>
          <t>The request <bcp14>MUST</bcp14> contain the base64url encoded hash value of the Digital Credential's
Issuer signed part, such as the Issuer Signed JWT using <xref target="SD-JWT.VC"/>,
or the Mobile Security Object using <xref target="ISO.mdoc"/>,
for which the Status Assertion is requested, and enveloped in a signed
Status Assertion Request object.</t>
        </li>
        <li>
          <t>The Status Assertion Request object <bcp14>MUST</bcp14> be signed with the private key corresponding
to the confirmation claim assigned by the Issuer and contained within
the Digital Credential.</t>
        </li>
      </ul>
      <t>The Status Assertion Request object <bcp14>MUST</bcp14> contain the parameters and claims defined
in the following table.</t>
      <table>
        <thead>
          <tr>
            <th align="left">Header</th>
            <th align="left">Description</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">
              <strong>typ</strong></td>
            <td align="left">It <bcp14>MUST</bcp14> be set to <tt>status-assertion-request+jwt</tt> when JWT format is used. It <bcp14>MUST</bcp14> be set to <tt>status-assertion-request+cwt</tt> when CWT format is used.</td>
            <td align="left">
              <xref target="RFC7516"/> Section 4.1.1, <xref target="RFC9596"/></td>
          </tr>
          <tr>
            <td align="left">
              <strong>alg</strong></td>
            <td align="left">A digital signature algorithm identifier such as per IANA "JSON Web Signature and Encryption Algorithms" registry. It <bcp14>MUST NOT</bcp14> be set to <tt>none</tt> or any symmetric algorithm (MAC) identifier.</td>
            <td align="left">
              <xref target="RFC7516"/> Section 4.1.1</td>
          </tr>
        </tbody>
      </table>
      <table>
        <thead>
          <tr>
            <th align="left">Payload</th>
            <th align="left">Description</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">
              <strong>iss</strong></td>
            <td align="left">Status Assertion Request Issuer identifier. The value is supposed to be used for identifying the Wallet that has issued the request. It is out of scope for this document defining how this value should be set.</td>
            <td align="left">
              <xref target="RFC9126"/>, <xref target="RFC7519"/></td>
          </tr>
          <tr>
            <td align="left">
              <strong>aud</strong></td>
            <td align="left">It <bcp14>MUST</bcp14> be set with the Issuer Status Assertion endpoint URL as value that identify the intended audience.</td>
            <td align="left">
              <xref target="RFC9126"/>, <xref target="RFC7519"/></td>
          </tr>
          <tr>
            <td align="left">
              <strong>exp</strong></td>
            <td align="left">UNIX Timestamp with the expiration time of the JWT. It <bcp14>MUST</bcp14> be superior to the value set for <tt>iat</tt> .</td>
            <td align="left">
              <xref target="RFC9126"/>, <xref target="RFC7519"/>, <xref target="RFC7515"/></td>
          </tr>
          <tr>
            <td align="left">
              <strong>iat</strong></td>
            <td align="left">UNIX Timestamp with the time of JWT/CWT issuance.</td>
            <td align="left">
              <xref target="RFC9126"/>, <xref target="RFC7519"/></td>
          </tr>
          <tr>
            <td align="left">
              <strong>jti</strong></td>
            <td align="left">Unique identifier when the Status Assertion Request is in JWT format, using the <tt>typ</tt> parameter set to <tt>status-assertion-request+jwt</tt>.</td>
            <td align="left">
              <xref target="RFC7519"/> Section 4.1.7</td>
          </tr>
          <tr>
            <td align="left">
              <strong>cti</strong></td>
            <td align="left">Unique identifier when the Status Assertion Request is in CWT format, using the <tt>typ</tt> parameter set to <tt>status-assertion-request+cwt</tt>.</td>
            <td align="left">
              <xref target="RFC7519"/> Section 4.1.7</td>
          </tr>
          <tr>
            <td align="left">
              <strong>credential_hash</strong></td>
            <td align="left">Hash value of the Digital Credential's Issuer signed part the Status Assertion is bound to.</td>
            <td align="left">this specification</td>
          </tr>
          <tr>
            <td align="left">
              <strong>credential_hash_alg</strong></td>
            <td align="left">The hash algorithm <bcp14>MUST</bcp14> match the one specified in the <tt>status.status_assertion.credential_hash_alg</tt> claim of the Digital Credential for which the Status Assertion is requested.</td>
            <td align="left">this specification</td>
          </tr>
        </tbody>
      </table>
      <t>Below is a non-normative example of a Status Assertion Request with
the JWT headers and payload represented without applying signature and
encoding:</t>
      <artwork><![CDATA[
{
    "alg": "ES256",
    "typ": "status-assertion-request+jwt"
}
.
{
    "iss": "0b434530-e151-4c40-98b7-74c75a5ef760",
    "aud": "https://issuer.example.org/status-assertion-endpoint",
    "iat": 1698744039,
    "exp": 1698830439,
    "jti": "6f204f7e-e453-4dfd-814e-9d155319408c",
    "credential_hash": $hash-about-Issuer-Signed-JWT
    "credential_hash_alg": "sha-256"
}
]]></artwork>
      <t>Below is a non-normative example of a Status Assertion Request object in CWT format
represented in CBOR diagnostic notation format <xref target="RFC8152"/>, where the CWT headers
and payload are presented without applying signature and encoding for better readability:</t>
      <artwork><![CDATA[
   [
       / protected / << {
       / alg / 1: -7 / ES256 /
       / typ / 16: -7 / status-assertion-request+cwt /
     } >>,
     / unprotected / {
     },
     / payload / << {
       / iss    / 1: 0b434530-e151-4c40-98b7-74c75a5ef760 /,
       / aud    / 3: https://issuer.example.org/status-assertion-endpoint /,
       / iat    / 6: 1698744039 /,
       / exp    / 4: 1698830439 /,
       / cti    / 7: 6f204f7e-e453-4dfd-814e-9d155319408c /,
       / credential_hash / 8: $hash-about-MobileSecurityObject /,
       / credential_hash_alg / 9: sha-256 /
     } >>,
   ]
]]></artwork>
      <t>Below a non-normative example representing a Status Assertion Request array with a
single Status Assertion Request object in JWT format.</t>
      <artwork><![CDATA[
POST /status-assertion-endpoint HTTP/1.1
Host: issuer.example.org
Content-Type: application/json

{
    "status_assertion_requests" : [
      $status_assertion_request,
      $status_assertion_request, ...
    ]
}
]]></artwork>
      <t>The Status Assertion HTTP request can be sent to a single Issuer
regarding multiple Digital Credentials, and <bcp14>MUST</bcp14> contain a JSON object with
the member <tt>status_assertion_requests</tt>.</t>
      <t>The <tt>status_assertion_requests</tt> <bcp14>MUST</bcp14> be set with an array of strings, where
each string within the array represents a Digital Credential
Status Assertion Request object.</t>
      <t>The Issuer that receives the Status Assertion Request object
<bcp14>MUST</bcp14> validate that the Wallet Instance making the request is
authorized to request Status Assertions.
Therefore the following requirements <bcp14>MUST</bcp14> be satisfied:</t>
      <ul spacing="normal">
        <li>
          <t>The Issuer <bcp14>MUST</bcp14> verify the compliance of all elements in the <tt>status_assertion_requests</tt> object
using the confirmation method contained within the Digital Credential where the Status Assertion Request
object is referred to;</t>
        </li>
        <li>
          <t>The Issuer <bcp14>MUST</bcp14> verify that it is the legitimate Issuer of the Digital Credential
to which each Status Assertion Request object refers.</t>
        </li>
      </ul>
    </section>
    <section anchor="status-assertion-response">
      <name>Status Assertion Response</name>
      <t>The response <bcp14>MUST</bcp14> include a JSON object with a member
named <tt>status_assertion_responses</tt>, which contains the
Status Assertions and or the Status Assertion Errors
related to the request made by the
Wallet Instance. In the non-normative example below is
represented an HTTP Response with the
<tt>status_assertion_responses</tt> JSON member:</t>
      <artwork><![CDATA[
HTTP/1.1 200 OK
Content-Type: application/json

{
    "status_assertion_responses": [
      $status_assertion_response,
      $status_assertion_response, ...
    ]
}
]]></artwork>
      <t>The member <tt>status_assertion_responses</tt> <bcp14>MUST</bcp14> be an array of strings,
where each of them represent a Status Assertion Response object,
as defined in
<xref target="status-assertion">the section Status Assertion</xref> or a Status Assertion Error object,
as defined in <xref target="status-assertion-error">the section Status Error</xref>.</t>
      <t>For each entry in the <tt>status_assertion_responses</tt> array, the following requirements are met:</t>
      <ul spacing="normal">
        <li>
          <t>Each element in the array <bcp14>MUST</bcp14> match the corresponding element in the request array at
the same position index to which it is related, eg: <em>[requestAboutA, requestAboutB]</em> may produce <em>[responseAboutA, responseErrorAboutB]</em>.</t>
        </li>
        <li>
          <t>Each element <bcp14>MUST</bcp14> contain the error or the status of the assertion, using the <tt>typ</tt> member
set to "status-assertion+{jwt,cwt}" or "status-assertion-error+{jwt,cwt}", depending by the object type.</t>
        </li>
        <li>
          <t>The corresponding entry in the response <bcp14>MUST</bcp14> be of the same data format as requested. For example,
if the entry in the request is "jwt", then the entry at the same position in the response <bcp14>MUST</bcp14> also be "jwt".</t>
        </li>
        <li>
          <t>The corresponding entry in the response <bcp14>MUST NOT</bcp14> contain any
information regarding the Verifier to whom it may be presented,
such as the Verifier identifier as the intended audience.</t>
        </li>
      </ul>
    </section>
    <section anchor="status-assertion-error">
      <name>Status Assertion Error</name>
      <t>The Status Assertion Error <bcp14>MUST NOT</bcp14> be presented or provided to a Verifier,
the only audience of the Status Assertion Error is the Holder of the Digital Credential
that has requested the Status Assertion. Therefore,
it is not necessary that the Status Assertion Error
contains the claim <tt>aud</tt>; if present, it <bcp14>MUST</bcp14> be set to the same
value as the <tt>iss</tt> claim used by the Wallet in the corresponding
Status Assertion Request object.</t>
      <t>Below a non-normative example of a Status Assertion Error object in JWT format,
with the headers and payload represented in JSON and without applying the signature.</t>
      <artwork><![CDATA[
{
    "alg": "ES256",
    "typ": "status-assertion-error+jwt",
    "kid": "Issuer-JWK-KID"
}
.
{
    "iss": "https://issuer.example.org",
    "jti": "6f204f7e-e453-4dfd-814e-9d155319408c"
    "credential_hash": $hash-about-Issuer-Signed-JWT,
    "credential_hash_alg": "sha-256",
    "error": "invalid_request_signature",
    "error_description": "The verification of the request signature has failed."
    }
}
]]></artwork>
      <t>The Status Assertion Error object <bcp14>MUST</bcp14> contain the parameters and claims described in the
table below:</t>
      <table>
        <thead>
          <tr>
            <th align="left">Header</th>
            <th align="left">Description</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">
              <strong>typ</strong></td>
            <td align="left">
              <bcp14>REQUIRED</bcp14>. Depending on the related Status Assertion Request object format, it <bcp14>MUST</bcp14> be set to <tt>status-assertion-error+jwt</tt> or <tt>status-assertion-error+cwt</tt>.</td>
            <td align="left">
              <xref target="RFC7516"/> Section 4.1.1</td>
          </tr>
          <tr>
            <td align="left">
              <strong>alg</strong></td>
            <td align="left">
              <bcp14>REQUIRED</bcp14>. Algorithm used to verify the cryptographic signature of the Status Assertion Error. Status Assertion Error that do not need to be signed <bcp14>SHOULD</bcp14> set the <tt>alg</tt> value to <tt>none</tt>. For further clarification about the requirement of signing the Status Assertion Errors, see Section <xref target="rationale-about-the-unsigned-status-assertion-errors">Rationale About The Unsigned Status Assertion Errors</xref>.</td>
            <td align="left">
              <xref target="RFC7516"/> Section 4.1.1</td>
          </tr>
        </tbody>
      </table>
      <table>
        <thead>
          <tr>
            <th align="left">Payload</th>
            <th align="left">Description</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">
              <strong>iss</strong></td>
            <td align="left">
              <bcp14>REQUIRED</bcp14>. It <bcp14>MUST</bcp14> be set to the identifier of the Issuer.</td>
            <td align="left">
              <xref target="RFC9126"/>, <xref target="RFC7519"/></td>
          </tr>
          <tr>
            <td align="left">
              <strong>jti</strong></td>
            <td align="left">
              <bcp14>REQUIRED</bcp14>. Unique identifier for the JWT.</td>
            <td align="left">
              <xref target="RFC7519"/> Section 4.1.7</td>
          </tr>
          <tr>
            <td align="left">
              <strong>credential_hash</strong></td>
            <td align="left">
              <bcp14>REQUIRED</bcp14>. The hash value <bcp14>MUST</bcp14> match the one contained in the Status Assertion Request to which the Status Assertion Error is related.</td>
            <td align="left">this specification</td>
          </tr>
          <tr>
            <td align="left">
              <strong>credential_hash_alg</strong></td>
            <td align="left">
              <bcp14>REQUIRED</bcp14>. The hash algorithm <bcp14>MUST</bcp14> match the one contained in the Status Assertion Request to which the Status Assertion Error is related.</td>
            <td align="left">this specification</td>
          </tr>
          <tr>
            <td align="left">
              <strong>error</strong></td>
            <td align="left">
              <bcp14>REQUIRED</bcp14>. The value <bcp14>SHOULD</bcp14> be assigned with one of the error types defined in <xref target="RFC6749"/><eref target="https://tools.ietf.org/html/rfc6749#section-5.2">Section 5.2</eref> or defined in the Section <eref target="status-assertion-error-values">Status Assertion Error Values</eref>.</td>
            <td align="left">
              <xref target="RFC7519"/> Section 4.1.7</td>
          </tr>
          <tr>
            <td align="left">
              <strong>error_description</strong></td>
            <td align="left">
              <bcp14>OPTIONAL</bcp14>. Text that clarifies the nature of the error in relation to the <tt>error</tt> value.</td>
            <td align="left">
              <xref target="RFC7519"/> Section 4.1.7</td>
          </tr>
        </tbody>
      </table>
      <section anchor="rationale-about-the-unsigned-status-assertion-errors">
        <name>Rationale about the Unsigned Status Assertion Errors</name>
        <t>To mitigate potential resource exhaustion attacks where an adversary could issue hundreds of fake Status Assertion Requests to force an Issuer to sign numerous Status Assertion Errors, it is advisable to set the header parameter <tt>alg</tt> value to <tt>none</tt> for Status Assertion Errors that do not require signatures. This approach conserves computational resources and prevents abuse, especially in scenarios where the Issuer's implementation could be vulnerable to resource exhaustion attacks. However, even if it is out of the scopes of this specification determine in which the Status Error Assertion signatures are necessary, when the Issuer signs the Status Assertion Errors the Holder that received them <bcp14>MUST</bcp14> validate the signature.</t>
      </section>
      <section anchor="status-assertion-error-values">
        <name>Status Assertion Error Values</name>
        <t>The <tt>error</tt> claim for the Status Assertion Error object <bcp14>MUST</bcp14> be set with one of the values defined in the table below, in addition to the values specified in <xref target="RFC6749"/>:</t>
        <table>
          <thead>
            <tr>
              <th align="left">Error Value</th>
              <th align="left">Description</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">
                <strong>invalid_request_signature</strong></td>
              <td align="left">The Status Assertion Request signature validation has failed. This error type is used when the proof of possession of the Digital Credential is found not valid within the Status Assertion Request.</td>
              <td align="left">this specification</td>
            </tr>
            <tr>
              <td align="left">
                <strong>credential_not_found</strong></td>
              <td align="left">The <tt>credential_hash</tt> value provided in the Status Assertion Request doesn't match with any active Digital Credential.</td>
              <td align="left">this specification</td>
            </tr>
            <tr>
              <td align="left">
                <strong>unsupported_hash_alg</strong></td>
              <td align="left">The hash algorithm set in <tt>credential_hash_alg</tt> is not supported.</td>
              <td align="left">this specification</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
    <section anchor="status-assertion">
      <name>Status Assertion</name>
      <t>When a Status Assertion is requested to an Issuer, the
Issuer checks the status of the Digital Credential and creates a
Status Assertion bound to it.</t>
      <t>A non-normative example is given below
where the format is JWT.</t>
      <artwork><![CDATA[
{
    "alg": "ES256",
    "typ": "status-assertion+jwt",
    "kid": $ISSUER-JWKID
}
.
{
    "iss": "https://issuer.example.org",
    "iat": 1504699136,
    "exp": 1504785536,
    "credential_hash": $hash-about-Issuer-Signed-JWT,
    "credential_hash_alg": "sha-256",
    "credential_status_validity": 0,
    "cnf": {
        "jwk": {...}
    }
}
]]></artwork>
      <t>The Status Assertion <bcp14>MUST</bcp14> contain the parameters and claims defined below.</t>
      <table>
        <thead>
          <tr>
            <th align="left">Header Parameter Name</th>
            <th align="left">Description</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">
              <strong>alg</strong></td>
            <td align="left">A digital signature algorithm identifier such as per IANA "JSON Web Signature and Encryption Algorithms" registry. It <bcp14>MUST NOT</bcp14> be set to <tt>none</tt> or to a symmetric algorithm (MAC) identifier.</td>
            <td align="left">
              <xref target="RFC7515"/>, <xref target="RFC7517"/></td>
          </tr>
          <tr>
            <td align="left">
              <strong>typ</strong></td>
            <td align="left">It <bcp14>MUST</bcp14> be set to <tt>status-assertion+jwt</tt> when JWT format is used. It <bcp14>MUST</bcp14> be set to <tt>status-assertion+cwt</tt> when CWT format is used.</td>
            <td align="left">
              <xref target="RFC7515"/>, <xref target="RFC7517"/> and this specification</td>
          </tr>
          <tr>
            <td align="left">
              <strong>kid</strong></td>
            <td align="left">Unique identifier of the Issuer JWK. It is required when <tt>x5c</tt> or other cryptographic public key resolution identifiers are not used.</td>
            <td align="left">
              <xref target="RFC7515"/></td>
          </tr>
          <tr>
            <td align="left">
              <strong>x5c</strong></td>
            <td align="left">X.509 certificate chain about the Issuer. It is required when <tt>kid</tt> or other parameter are not used.</td>
            <td align="left">
              <xref target="RFC7515"/></td>
          </tr>
        </tbody>
      </table>
      <table>
        <thead>
          <tr>
            <th align="left">Payload Claim Name</th>
            <th align="left">Description</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">
              <strong>iss</strong></td>
            <td align="left">It <bcp14>MUST</bcp14> be set to the identifier of the Issuer.</td>
            <td align="left">
              <xref target="RFC9126"/>, <xref target="RFC7519"/></td>
          </tr>
          <tr>
            <td align="left">
              <strong>iat</strong></td>
            <td align="left">UNIX Timestamp with the time of the Status Assertion issuance.</td>
            <td align="left">
              <xref target="RFC9126"/>, <xref target="RFC7519"/></td>
          </tr>
          <tr>
            <td align="left">
              <strong>exp</strong></td>
            <td align="left">UNIX Timestamp with the expiration time of the JWT. It <bcp14>MUST</bcp14> be greater than the value set for <tt>iat</tt>.</td>
            <td align="left">
              <xref target="RFC9126"/>, <xref target="RFC7519"/>, <xref target="RFC7515"/></td>
          </tr>
          <tr>
            <td align="left">
              <strong>credential_hash</strong></td>
            <td align="left">Hash value of the Digital Credential's Issuer signed part the Status Assertion is bound to.</td>
            <td align="left">this specification</td>
          </tr>
          <tr>
            <td align="left">
              <strong>credential_hash_alg</strong></td>
            <td align="left">The hash algorithm <bcp14>MUST</bcp14> match the one contained in the Status Assertion Request to which the Status Assertion is related.</td>
            <td align="left">this specification</td>
          </tr>
          <tr>
            <td align="left">
              <strong>credential_status_validity</strong></td>
            <td align="left">Numerical value indicating the validity of the Digital Credential linked to the Status Assertion, describing its state, mode, condition or stage. The value <bcp14>MUST</bcp14> be from the IANA registry (as described in Section 7.1 of draft-ietf-oauth-status-list). Status validity parameter is <bcp14>REQUIRED</bcp14>, and the Verifier <bcp14>MUST</bcp14> verify its presence and value to assess the Digital Credential's validity.</td>
            <td align="left">this specification</td>
          </tr>
          <tr>
            <td align="left">
              <strong>cnf</strong></td>
            <td align="left">JSON object containing confirmation methods. The sub-member contained within <tt>cnf</tt> member, such as <tt>jwk</tt> for JWT and <tt>Cose_Key</tt> for CWT, <bcp14>MUST</bcp14> match with the one provided within the related Digital Credential. Other confirmation methods can be utilized when the referenced Digital Credential supports them, in accordance with the relevant standards.</td>
            <td align="left">
              <xref target="RFC7800"/> Section 3.1, <xref target="RFC8747"/> Section 3.1</td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="interoperability-of-issuers-supporting-status-assertions">
      <name>Interoperability of Issuers Supporting Status Assertions</name>
      <t>This section outlines how Issuers support Status Assertions,
detailing the necessary metadata and practices to integrate into their systems.</t>
      <section anchor="issuer-metadata">
        <name>Issuer Metadata</name>
        <t>Issuers using Status Assertions <bcp14>MUST</bcp14> include in their
metadata the following values:</t>
        <ul spacing="normal">
          <li>
            <t><tt>status_assertion_endpoint</tt>. <bcp14>REQUIRED</bcp14>. It <bcp14>MUST</bcp14> be an HTTPs URL indicating
the endpoint where the Wallet Instances can request Status Assertions.</t>
          </li>
          <li>
            <t><tt>credential_hash_alg_supported</tt>. <bcp14>REQUIRED</bcp14>. The supported algorithm used by
the Wallet Instance to hash the Digital Credential's Issuer signed part for which the
Status Assertion is requested,  using one of the hash algorithms listed
in the <xref target="IANA-HASH-REG"/>.</t>
          </li>
          <li>
            <t><tt>credential_status_detail_supported</tt>. <bcp14>OPTIONAL</bcp14>. JSON array that outlines the details of each Digital Credential's validity status supported by the Credential Issuer. This metadata <bcp14>MAY</bcp14> be used to extend the values defined in Section <xref target="status-assertion">Status Assertion</xref>. Each entry <bcp14>MUST</bcp14> contain the following values:  </t>
            <ul spacing="normal">
              <li>
                <t><tt>credential_status_validity</tt>. Numerical value indicating the validity of the Digital Credential.</t>
              </li>
              <li>
                <t><tt>state</tt>. String value of a Digital Credential status supported.</t>
              </li>
              <li>
                <t><tt>description</tt>. String containing the human-readable description of the status related to this object.</t>
              </li>
            </ul>
          </li>
        </ul>
      </section>
      <section anchor="issued-digital-credentials">
        <name>Issued Digital Credentials</name>
        <t>The Issuers that uses the Status Assertions <bcp14>SHOULD</bcp14> include in the
issued Digital Credentials the object <tt>status</tt> with the
JSON member <tt>status_assertion</tt> set to a JSON Object containing the following
member:</t>
        <ul spacing="normal">
          <li>
            <t><tt>credential_hash_alg</tt>. <bcp14>REQUIRED</bcp14>. The algorithm used of hashing the
Digital Credential's Issuer signed part to which the Status Assertion is bound, using one of the
hash algorithms listed in the <xref target="IANA-HASH-REG"/>.
Among the hash algorithms, <tt>sha-256</tt> is recommended and
<bcp14>SHOULD</bcp14> be implemented by all systems.</t>
          </li>
        </ul>
        <t>The non-normative example of an unsecured payload of
an <xref target="SD-JWT.VC"/> is shown below.</t>
        <artwork><![CDATA[
{
 "vct": "https://credentials.example.com/identity_credential",
 "given_name": "John",
 "family_name": "Doe",
 "email": "johndoe@example.com",
 "phone_number": "+1-202-555-0101",
 "address": {
   "street_address": "123 Main St",
   "locality": "Anytown",
   "region": "Anystate",
   "country": "US"
 },
 "birthdate": "1940-01-01",
 "is_over_18": true,
 "is_over_21": true,
 "is_over_65": true,
 "status": {
    "status_assertion": {
        "credential_hash_alg": "sha-256",
    }
 }
}
]]></artwork>
        <section anchor="issuer-implementation-considerations">
          <name>Issuer Implementation Considerations</name>
          <t>When the Digital Credential is issued, the Issuer should
calculate the hash value of the Digital Credential's Issuer signed part using the algorithm specified in
<tt>status.status_assertion.credential_hash_alg</tt> and store this information
in its database. This practice enhances efficiency by allowing the
Issuer to quickly compare the requested
<tt>credential_hash</tt> with the pre-calculated one, when processing
Status Assertion requests made by Holders.</t>
        </section>
      </section>
    </section>
    <section anchor="presenting-status-assertions">
      <name>Presenting Status Assertions</name>
      <t>The Wallet Instance that provides the Status Assertions using <xref target="OpenID4VP"/>, <bcp14>SHOULD</bcp14> include in the
<tt>vp_token</tt> JSON array, as defined in <xref target="OpenID4VP"/>, the Status Assertion along with the
related Digital Credential.</t>
      <t>The Verifier that receives a Digital Credential supporting the Status Assertion,
<bcp14>SHOULD</bcp14>:</t>
      <ul spacing="normal">
        <li>
          <t>Decode and validate the Digital Credential;</t>
        </li>
        <li>
          <t>Check the presence of <tt>status.status_assertion</tt> in the
Digital Credential. If true, the Verifier <bcp14>SHOULD</bcp14>:
          </t>
          <ul spacing="normal">
            <li>
              <t>produce the hash of the Digital Credential's Issuer signed part using the
hashing algorithm configured in <tt>status.status_assertion.credential_hash_alg</tt>;</t>
            </li>
            <li>
              <t>decode all the Status Assertions provided in the presentation,
by matching the JWS Header parameter <tt>typ</tt> set to <tt>status-assertion+jwt</tt>
and looking for the <tt>credential_hash</tt> value that matches with the
hash produced at the previous point;</t>
            </li>
            <li>
              <t>evaluate the validity of the Status Assertion within the <tt>vp_token</tt> parameter, by checking the following items:
              </t>
              <ul spacing="normal">
                <li>
                  <t>the Issuer claim value <bcp14>MUST</bcp14> match the one in the Digital Credential;</t>
                </li>
                <li>
                  <t>the Issued at time claim value <bcp14>MUST</bcp14> be equal to or later than the Issued at time claim value in the Digital Credential;</t>
                </li>
                <li>
                  <t>the Expiration time claim value <bcp14>MUST</bcp14> be later than the current time;</t>
                </li>
                <li>
                  <t>the Not before time claim value, if present, <bcp14>MUST</bcp14> be less than or equal to the current time;</t>
                </li>
                <li>
                  <t>the confirmation method <bcp14>MUST</bcp14> be used for the validation (eg: if it uses cryptographic material, this material must be used for the signature validation);</t>
                </li>
                <li>
                  <t>the hash of the Digital Credential <bcp14>MUST</bcp14> be produced as described in <xref target="status-assertion-request">Section 7</xref> and <bcp14>MUST</bcp14> match the hash contained in the Status Assertion.</t>
                </li>
              </ul>
            </li>
          </ul>
        </li>
      </ul>
    </section>
    <section anchor="considerations-on-revocation-verification">
      <name>Considerations on Revocation Verification</name>
      <t>The recommendation for Verifiers to check the revocation status
of Digital Credentials as a '<bcp14>SHOULD</bcp14>' instead of a '<bcp14>MUST</bcp14>' acknowledges
that the decision to verify revocation is not absolute and may be
influenced by various factors. Consider as an example the case of age-over x;
even if it has expired, it may still perform its intended purpose.
As a result, the expiration status alone does not render it invalid.
The adaptability recognizes that the need to verify revocation status
may not always coincide with the actual usability of a Digital Credential,
allowing Verifiers to examine and make educated conclusions based on a
variety of scenarios.</t>
    </section>
    <section anchor="detailed-status-assertions">
      <name>Detailed Status Assertions</name>
      <t>Status Assertions can introduce a more accurate level of detail about the Digital Credential status.
This enables Verifier policies to be conditioned on the presence of authorative information.
This section proposes syntax to support detailed assertions.
The <tt>credential_status_validity</tt> claim <bcp14>MUST</bcp14> be present.
The <tt>credential_status_detail</tt> claim <bcp14>MAY</bcp14> be present and if present <bcp14>MUST</bcp14> be an object.
The semantics of the claims within the <tt>credential_status_detail</tt> object are determined by the Issuer.</t>
      <t>An example of an enumeration detail status is:</t>
      <artwork><![CDATA[
{
    "alg": "ES256",
    "typ": "status-assertion+jwt",
    "kid": "w8ZOZRcx21Zpry7H-0VLBsH7Wf7WXb6TeK3qVMCpY44"
}
.
{
    "iss": "https://issuer.example.org",
    "iat": 1504699136,
    "exp": 1504785536,
    "credential_hash": "xnlAq6Ma8fgu1z4hdGphJnKLulaVHpLCFeZFUGpQ2dA",
    "credential_hash_alg": "sha-256",
    "credential_status_validity": 3,
    "credential_status_detail": {
      ...
    },
    "cnf": {
      "jwk": {
        "alg": "ES256",
        "kty": "EC",
        "crv": "P-256",
        "x": "_2ySUmWFjwmraNlo15r6dIBXerVdy_NpJuwAKJMFdoc",
        "y": "MV3C88MhhEMba6oyMBWuGeB3dKHP4YADJmGyJwwILsk"
      }
    }
}
]]></artwork>
      <t>An example of dynamic status using a small matrix for detail status:</t>
      <artwork><![CDATA[
{
    "alg": "ES256",
    "typ": "status-assertion+jwt",
    "kid": "w8ZOZRcx21Zpry7H-0VLBsH7Wf7WXb6TeK3qVMCpY44"
}
.
{
    "iss": "https://issuer.example.org",
    "iat": 1504699136,
    "exp": 1504785536,
    "credential_hash": "xnlAq6Ma8fgu1z4hdGphJnKLulaVHpLCFeZFUGpQ2dA",
    "credential_hash_alg": "sha-256",
    "credential_status_validity": 0,
    "credential_status_detail": {
      "preferences": [[1, 0.25, 0.76 ...] ...]
    },
    "cnf": {
      "jwk": {
        "alg": "ES256",
        "kty": "EC",
        "crv": "P-256",
        "x": "_2ySUmWFjwmraNlo15r6dIBXerVdy_NpJuwAKJMFdoc",
        "y": "MV3C88MhhEMba6oyMBWuGeB3dKHP4YADJmGyJwwILsk"
      }
    }
}
]]></artwork>
      <t>An example of multiple assertions:</t>
      <artwork><![CDATA[
HTTP/1.1 200 Created
Content-Type: application/json

{
    "status_assertion_responses": [
      $JWT_1, // valid, boolean assertion
      $JWT_2, // alg = none, suspended indicator
      $JWT_3, // Preferences matrix assertion
    ]
}
]]></artwork>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TODO Security</t>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>In the design and implementation of Status Assertions, particular
attention has been paid to privacy considerations to ensure that the
system is respectful of user privacy and compliant with relevant
regulations.</t>
      <section anchor="privacy-consideration-status-assertion-request-opacity">
        <name>Privacy Consideration: Status Assertion Request Opacity</name>
        <t>The request for a Status Assertion does not transmit the Digital Credential
for which the status is being attested. Instead, it includes a proof of
possession (PoP) of the Digital Credential that is only interpretable by the
Issuer who issued the Digital Credential for which the
Status Assertion is requested. This PoP can be achieved through a
cryptographic signature using the public key contained within the
Digital Credential over the request. This method is essential for
preventing the potential for fraudulent requests intended to mislead or
disclose sensitive information to unintended parties. By separating the
Digital Credential from the Status Assertion Request, the system ensures
that the request does not inadvertently disclose any information about
the Digital Credential or its Holder. This strategy significantly
enhances the privacy and security of the system by preventing the
assertion process from being used to collect information about
Digital Credentials or their Holders through deceptive requests.</t>
      </section>
      <section anchor="privacy-consideration-opacity-of-status-assertion-content">
        <name>Privacy Consideration: Opacity of Status Assertion Content</name>
        <t>An important privacy consideration is how the Status Assertion is
structured to ensure it does not reveal any information about the User or
the Holder of the Digital Credential. The Status Assertion is crafted
to prove only the vital information needed to verify the current state
of a Digital Credential, moving beyond simple revocation or
suspension checks. This is done by focusing the assertion content on the
Digital Credential's present condition and the method for its
verification, rather than on the identity of the Digital Credential's
Holder. This approach is key in keeping the User's anonymity intact,
making sure that the Status Assertion can be applied in various
verification situations without risking the privacy of the people involved.</t>
      </section>
      <section anchor="unlinkability-and-reusability-of-status-assertions">
        <name>Unlinkability and Reusability of Status Assertions</name>
        <t>Status Assertions are designed to uphold privacy by allowing Verifiers
to operate independently, without the need for interaction or information
disclosure to third-party entities or other Verifiers. This design is
pivotal in ensuring unlinkability between Verifiers, where actions
taken by one Verifier cannot be correlated or linked to actions
taken by another. Verifiers can directly validate the status of a
Digital Credential through the Status Assertion, eliminating the need
for external communication. This mechanism is key in protecting the
privacy of individuals whose Digital Credentials are being verified, as
it significantly reduces the risk of tracking or profiling based on
verification activities across various services.</t>
        <t>While Status Assertions facilitate unlinkability, they are not inherently
"single use." The specification accommodates the batch issuance of multiple
Status Assertions, which can be single-use. However, particularly for
offline interactions, a Single Assertion may be utilized by numerous
Verifiers. This flexibility ensures that Status Assertions can support
a wide range of verification scenarios, from one-time validations to
repeated checks by different entities, without compromising the privacy
or security of the Digital Credential Holder.</t>
      </section>
      <section anchor="untrackability-by-digital-credential-issuers-and-the-phone-home-problem">
        <name>Untrackability by Digital Credential Issuers and the "Phone Home" Problem</name>
        <t>A fundamental aspect of the privacy-preserving attributes of
Status Assertions is their ability to address the "phone home" problem,
which is the prevention of tracking by Digital Credential Issuers.
Traditional models often require Verifiers to query a central status
list or contact the Issuer directly, a process that can inadvertently
allow Issuers to track when and where a Digital Credential
is verified. Status Assertions, however, encapsulate all necessary
verification information within the assertion itself. This design choice
ensures that Issuers are unable to monitor the verification
activities of their issued Digital Credentials, thereby significantly
enhancing the privacy of the Holder. By removing the need for real-time
communication with the Issuer for status checks, Status Assertions
effectively prevent the Issuer from tracking verification activities,
further reinforcing the system's dedication to protecting User privacy.</t>
      </section>
      <section anchor="minimization-of-data-exposure">
        <name>Minimization of Data Exposure</name>
        <t>The Status Assertions are designed around the data minimization principle.
Data minimization ensures that only the necessary information required
for the scope of attesting the non revocation status of the Digital
Credential. This minimizes the exposure of potentially sensitive data.</t>
      </section>
      <section anchor="resistance-to-enumeration-attacks">
        <name>Resistance to Enumeration Attacks</name>
        <t>The design of Status Assertions incorporates measures to resist
enumeration attacks, where an adversary attempts to gather information
by systematically verifying different combinations of data.
By implementing robust cryptographic techniques and limiting the
information contained in Status Assertions, the system reduces the
feasibility of such attacks. This consideration is vital for safeguarding
the privacy of the Holders and for ensuring the integrity of
the verification process.</t>
        <t>Status Assertions are based on a privacy-by-design approach, reflecting
a deliberate effort to balance security and privacy needs in the
Digital Credential ecosystem.</t>
      </section>
      <section anchor="validity-reasons">
        <name>Validity Reasons</name>
        <t>Depending by the scopes of how the detailed Status Assertions are implemented, these may disclose details about the Holder or subject that were not initially committed to during the original Digital Credential issuance. This can potentially expose additional information that was not part of the original credentialing process.
Providing a reason that a Digital Credential is no longer valid can be essential to certain use cases, and unacceptable for others.
For example, in a healthcare setting, a patient should not have medical reasons for a suspended Digital Credential disclosed in assertions of suspension.
However, in a supply chain context, a product suspension might benefit from additional information, such as batch or lot information.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="json-web-token-claims-registration">
        <name>JSON Web Token Claims Registration</name>
        <t>This specification requests registration of the following Claims in the
IANA "JSON Web Token Claims" registry <xref target="IANA.JWT"/> established by <xref target="RFC7519"/>.</t>
        <ul spacing="normal">
          <li>
            <t>Claim Name: <tt>credential_hash</tt></t>
          </li>
          <li>
            <t>Claim Description: Hash value of the Digital Credential's Issuer signed part the Status Assertion is bound to.</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
          <li>
            <t>Specification Document(s): <xref target="status-assertion">this specification</xref></t>
          </li>
        </ul>
        <t><br/></t>
        <ul spacing="normal">
          <li>
            <t>Claim Name: <tt>credential_hash_alg</tt></t>
          </li>
          <li>
            <t>Claim Description: The Algorithm used of hashing the Digital Credential's Issuer signed part to which the Status Assertion is bound.</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
          <li>
            <t>Specification Document(s): <xref target="status-assertion">this specification</xref></t>
          </li>
        </ul>
        <t><br/></t>
        <ul spacing="normal">
          <li>
            <t>Claim Name: <tt>credential_status_detail</tt></t>
          </li>
          <li>
            <t>Claim Description: New status information provided by the Issuer.</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
          <li>
            <t>Specification Document(s): <xref target="status-assertion">this specification</xref></t>
          </li>
        </ul>
      </section>
      <section anchor="media-type-registration">
        <name>Media Type Registration</name>
        <t>This section requests registration of the following media types <xref target="RFC2046"/> in
the "Media Types" registry <xref target="IANA.MediaTypes"/> in the manner described
in <xref target="RFC6838"/>.</t>
        <t>To indicate that the content is a JWT-based Status Assertion:</t>
        <ul spacing="normal">
          <li>
            <t>Type name: application</t>
          </li>
          <li>
            <t>Subtype name: status-assertion-request+jwt</t>
          </li>
          <li>
            <t>Required parameters: n/a</t>
          </li>
          <li>
            <t>Optional parameters: n/a</t>
          </li>
          <li>
            <t>Encoding considerations: binary; A JWT-based Status Assertion Request object is a JWT; JWT values are encoded as a series of base64url-encoded values (some of which may be the empty string) separated by period ('.') characters.</t>
          </li>
          <li>
            <t>Security considerations: See (#Security) of <xref target="security-considerations">this specification</xref></t>
          </li>
          <li>
            <t>Interoperability considerations: n/a</t>
          </li>
          <li>
            <t>Published specification: this specification</t>
          </li>
          <li>
            <t>Applications that use this media type: Applications using this specification for requesting Status Assertions.</t>
          </li>
          <li>
            <t>Fragment identifier considerations: n/a</t>
          </li>
          <li>
            <t>Additional information:
            </t>
            <ul spacing="normal">
              <li>
                <t>File extension(s): n/a</t>
              </li>
              <li>
                <t>Macintosh file type code(s): n/a</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Person &amp; email address to contact for further information: Giuseppe De Marco, gi.demarco@innovazione.gov.it</t>
          </li>
          <li>
            <t>Intended usage: COMMON</t>
          </li>
          <li>
            <t>Restrictions on usage: none</t>
          </li>
          <li>
            <t>Author: Giuseppe De Marco, gi.demarco@innovazione.gov.it</t>
          </li>
          <li>
            <t>Change controller: IETF</t>
          </li>
          <li>
            <t>Provisional registration? No</t>
          </li>
        </ul>
        <t>To indicate that the content is a CWT-based Status Assertion Request:</t>
        <ul spacing="normal">
          <li>
            <t>Type name: application</t>
          </li>
          <li>
            <t>Subtype name: status-assertion-request+cwt</t>
          </li>
          <li>
            <t>Required parameters: n/a</t>
          </li>
          <li>
            <t>Optional parameters: n/a</t>
          </li>
          <li>
            <t>Encoding considerations: binary</t>
          </li>
          <li>
            <t>Security considerations: See (#Security) of <xref target="security-considerations">this specification</xref></t>
          </li>
          <li>
            <t>Interoperability considerations: n/a</t>
          </li>
          <li>
            <t>Published specification: this specification</t>
          </li>
          <li>
            <t>Applications that use this media type: Applications using this specification for requesting Status Assertions.</t>
          </li>
          <li>
            <t>Fragment identifier considerations: n/a</t>
          </li>
          <li>
            <t>Additional information:
            </t>
            <ul spacing="normal">
              <li>
                <t>File extension(s): n/a</t>
              </li>
              <li>
                <t>Macintosh file type code(s): n/a</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Person &amp; email address to contact for further information: Giuseppe De Marco, gi.demarco@innovazione.gov.it</t>
          </li>
          <li>
            <t>Intended usage: COMMON</t>
          </li>
          <li>
            <t>Restrictions on usage: none</t>
          </li>
          <li>
            <t>Author: Giuseppe De Marco, gi.demarco@innovazione.gov.it</t>
          </li>
          <li>
            <t>Change controller: IETF</t>
          </li>
          <li>
            <t>Provisional registration? No</t>
          </li>
        </ul>
        <t>To indicate that the content is a JWT-based Status Assertion:</t>
        <ul spacing="normal">
          <li>
            <t>Type name: application</t>
          </li>
          <li>
            <t>Subtype name: status-assertion+jwt</t>
          </li>
          <li>
            <t>Required parameters: n/a</t>
          </li>
          <li>
            <t>Optional parameters: n/a</t>
          </li>
          <li>
            <t>Encoding considerations: binary</t>
          </li>
          <li>
            <t>Security considerations: See (#Security) of <xref target="security-considerations">this specification</xref></t>
          </li>
          <li>
            <t>Interoperability considerations: n/a</t>
          </li>
          <li>
            <t>Published specification: this specification</t>
          </li>
          <li>
            <t>Applications that use this media type: Applications using this specification for issuing or presenting Status Assertions.</t>
          </li>
          <li>
            <t>Fragment identifier considerations: n/a</t>
          </li>
          <li>
            <t>Additional information:
            </t>
            <ul spacing="normal">
              <li>
                <t>File extension(s): n/a</t>
              </li>
              <li>
                <t>Macintosh file type code(s): n/a</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Person &amp; email address to contact for further information: Giuseppe De Marco, gi.demarco@innovazione.gov.it</t>
          </li>
          <li>
            <t>Intended usage: COMMON</t>
          </li>
          <li>
            <t>Restrictions on usage: none</t>
          </li>
          <li>
            <t>Author: Giuseppe De Marco, gi.demarco@innovazione.gov.it</t>
          </li>
          <li>
            <t>Change controller: IETF</t>
          </li>
          <li>
            <t>Provisional registration? No</t>
          </li>
        </ul>
        <t>To indicate that the content is a CWT-based Status Assertion:</t>
        <ul spacing="normal">
          <li>
            <t>Type name: application</t>
          </li>
          <li>
            <t>Subtype name: status-assertion+cwt</t>
          </li>
          <li>
            <t>Required parameters: n/a</t>
          </li>
          <li>
            <t>Optional parameters: n/a</t>
          </li>
          <li>
            <t>Encoding considerations: binary</t>
          </li>
          <li>
            <t>Security considerations: See (#Security) of <xref target="security-considerations">this specification</xref></t>
          </li>
          <li>
            <t>Interoperability considerations: n/a</t>
          </li>
          <li>
            <t>Published specification: this specification</t>
          </li>
          <li>
            <t>Applications that use this media type: Applications using this specification for issuing or presenting Status Assertions.</t>
          </li>
          <li>
            <t>Fragment identifier considerations: n/a</t>
          </li>
          <li>
            <t>Additional information:
            </t>
            <ul spacing="normal">
              <li>
                <t>File extension(s): n/a</t>
              </li>
              <li>
                <t>Macintosh file type code(s): n/a</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Person &amp; email address to contact for further information: Giuseppe De Marco, gi.demarco@innovazione.gov.it</t>
          </li>
          <li>
            <t>Intended usage: COMMON</t>
          </li>
          <li>
            <t>Restrictions on usage: none</t>
          </li>
          <li>
            <t>Author: Giuseppe De Marco, gi.demarco@innovazione.gov.it</t>
          </li>
          <li>
            <t>Change controller: IETF</t>
          </li>
          <li>
            <t>Provisional registration? No</t>
          </li>
        </ul>
        <t>To indicate that the content is a JWT-based Status Assertion Error:</t>
        <ul spacing="normal">
          <li>
            <t>Type name: application</t>
          </li>
          <li>
            <t>Subtype name: status-assertion-error+jwt</t>
          </li>
          <li>
            <t>Required parameters: n/a</t>
          </li>
          <li>
            <t>Optional parameters: n/a</t>
          </li>
          <li>
            <t>Encoding considerations: binary</t>
          </li>
          <li>
            <t>Security considerations: See (#Security) of <xref target="security-considerations">this specification</xref></t>
          </li>
          <li>
            <t>Interoperability considerations: n/a</t>
          </li>
          <li>
            <t>Published specification: this specification</t>
          </li>
          <li>
            <t>Applications that use this media type: Applications using this specification for issuing Status Assertions Request Errors.</t>
          </li>
          <li>
            <t>Fragment identifier considerations: n/a</t>
          </li>
          <li>
            <t>Additional information:
            </t>
            <ul spacing="normal">
              <li>
                <t>File extension(s): n/a</t>
              </li>
              <li>
                <t>Macintosh file type code(s): n/a</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Person &amp; email address to contact for further information: Giuseppe De Marco, gi.demarco@innovazione.gov.it</t>
          </li>
          <li>
            <t>Intended usage: COMMON</t>
          </li>
          <li>
            <t>Restrictions on usage: none</t>
          </li>
          <li>
            <t>Author: Giuseppe De Marco, gi.demarco@innovazione.gov.it</t>
          </li>
          <li>
            <t>Change controller: IETF</t>
          </li>
          <li>
            <t>Provisional registration? No</t>
          </li>
        </ul>
        <t>To indicate that the content is a CWT-based Status Assertion Error:</t>
        <ul spacing="normal">
          <li>
            <t>Type name: application</t>
          </li>
          <li>
            <t>Subtype name: status-assertion-error+cwt</t>
          </li>
          <li>
            <t>Required parameters: n/a</t>
          </li>
          <li>
            <t>Optional parameters: n/a</t>
          </li>
          <li>
            <t>Encoding considerations: binary</t>
          </li>
          <li>
            <t>Security considerations: See (#Security) of <xref target="security-considerations">this specification</xref></t>
          </li>
          <li>
            <t>Interoperability considerations: n/a</t>
          </li>
          <li>
            <t>Published specification: this specification</t>
          </li>
          <li>
            <t>Applications that use this media type: Applications using this specification for issuing Status Assertions Request Errors.</t>
          </li>
          <li>
            <t>Fragment identifier considerations: n/a</t>
          </li>
          <li>
            <t>Additional information:
            </t>
            <ul spacing="normal">
              <li>
                <t>File extension(s): n/a</t>
              </li>
              <li>
                <t>Macintosh file type code(s): n/a</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Person &amp; email address to contact for further information: Giuseppe De Marco, gi.demarco@innovazione.gov.it</t>
          </li>
          <li>
            <t>Intended usage: COMMON</t>
          </li>
          <li>
            <t>Restrictions on usage: none</t>
          </li>
          <li>
            <t>Author: Giuseppe De Marco, gi.demarco@innovazione.gov.it</t>
          </li>
          <li>
            <t>Change controller: IETF</t>
          </li>
          <li>
            <t>Provisional registration? No</t>
          </li>
        </ul>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2046">
          <front>
            <title>Multipurpose Internet Mail Extensions (MIME) Part Two: Media Types</title>
            <author fullname="N. Freed" initials="N." surname="Freed"/>
            <author fullname="N. Borenstein" initials="N." surname="Borenstein"/>
            <date month="November" year="1996"/>
            <abstract>
              <t>This second document defines the general structure of the MIME media typing system and defines an initial set of media types. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2046"/>
          <seriesInfo name="DOI" value="10.17487/RFC2046"/>
        </reference>
        <reference anchor="RFC6749">
          <front>
            <title>The OAuth 2.0 Authorization Framework</title>
            <author fullname="D. Hardt" initials="D." role="editor" surname="Hardt"/>
            <date month="October" year="2012"/>
            <abstract>
              <t>The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf. This specification replaces and obsoletes the OAuth 1.0 protocol described in RFC 5849. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6749"/>
          <seriesInfo name="DOI" value="10.17487/RFC6749"/>
        </reference>
        <reference anchor="RFC6838">
          <front>
            <title>Media Type Specifications and Registration Procedures</title>
            <author fullname="N. Freed" initials="N." surname="Freed"/>
            <author fullname="J. Klensin" initials="J." surname="Klensin"/>
            <author fullname="T. Hansen" initials="T." surname="Hansen"/>
            <date month="January" year="2013"/>
            <abstract>
              <t>This document defines procedures for the specification and registration of media types for use in HTTP, MIME, and other Internet protocols. This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="13"/>
          <seriesInfo name="RFC" value="6838"/>
          <seriesInfo name="DOI" value="10.17487/RFC6838"/>
        </reference>
        <reference anchor="RFC7515">
          <front>
            <title>JSON Web Signature (JWS)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Signature (JWS) represents content secured with digital signatures or Message Authentication Codes (MACs) using JSON-based data structures. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and an IANA registry defined by that specification. Related encryption capabilities are described in the separate JSON Web Encryption (JWE) specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7515"/>
          <seriesInfo name="DOI" value="10.17487/RFC7515"/>
        </reference>
        <reference anchor="RFC7516">
          <front>
            <title>JSON Web Encryption (JWE)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Hildebrand" initials="J." surname="Hildebrand"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Encryption (JWE) represents encrypted content using JSON-based data structures. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and IANA registries defined by that specification. Related digital signature and Message Authentication Code (MAC) capabilities are described in the separate JSON Web Signature (JWS) specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7516"/>
          <seriesInfo name="DOI" value="10.17487/RFC7516"/>
        </reference>
        <reference anchor="RFC7517">
          <front>
            <title>JSON Web Key (JWK)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>A JSON Web Key (JWK) is a JavaScript Object Notation (JSON) data structure that represents a cryptographic key. This specification also defines a JWK Set JSON data structure that represents a set of JWKs. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and IANA registries established by that specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7517"/>
          <seriesInfo name="DOI" value="10.17487/RFC7517"/>
        </reference>
        <reference anchor="RFC7519">
          <front>
            <title>JSON Web Token (JWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties. The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7519"/>
          <seriesInfo name="DOI" value="10.17487/RFC7519"/>
        </reference>
        <reference anchor="RFC7800">
          <front>
            <title>Proof-of-Possession Key Semantics for JSON Web Tokens (JWTs)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="April" year="2016"/>
            <abstract>
              <t>This specification describes how to declare in a JSON Web Token (JWT) that the presenter of the JWT possesses a particular proof-of- possession key and how the recipient can cryptographically confirm proof of possession of the key by the presenter. Being able to prove possession of a key is also sometimes described as the presenter being a holder-of-key.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7800"/>
          <seriesInfo name="DOI" value="10.17487/RFC7800"/>
        </reference>
        <reference anchor="RFC8152">
          <front>
            <title>CBOR Object Signing and Encryption (COSE)</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="July" year="2017"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need for the ability to have basic security services defined for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8152"/>
          <seriesInfo name="DOI" value="10.17487/RFC8152"/>
        </reference>
        <reference anchor="RFC8392">
          <front>
            <title>CBOR Web Token (CWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties. The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection. A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value. CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8392"/>
          <seriesInfo name="DOI" value="10.17487/RFC8392"/>
        </reference>
        <reference anchor="RFC8747">
          <front>
            <title>Proof-of-Possession Key Semantics for CBOR Web Tokens (CWTs)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="L. Seitz" initials="L." surname="Seitz"/>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="March" year="2020"/>
            <abstract>
              <t>This specification describes how to declare in a CBOR Web Token (CWT) (which is defined by RFC 8392) that the presenter of the CWT possesses a particular proof-of-possession key. Being able to prove possession of a key is also sometimes described as being the holder-of-key. This specification provides equivalent functionality to "Proof-of-Possession Key Semantics for JSON Web Tokens (JWTs)" (RFC 7800) but using Concise Binary Object Representation (CBOR) and CWTs rather than JavaScript Object Notation (JSON) and JSON Web Tokens (JWTs).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8747"/>
          <seriesInfo name="DOI" value="10.17487/RFC8747"/>
        </reference>
        <reference anchor="RFC9126">
          <front>
            <title>OAuth 2.0 Pushed Authorization Requests</title>
            <author fullname="T. Lodderstedt" initials="T." surname="Lodderstedt"/>
            <author fullname="B. Campbell" initials="B." surname="Campbell"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <author fullname="D. Tonge" initials="D." surname="Tonge"/>
            <author fullname="F. Skokan" initials="F." surname="Skokan"/>
            <date month="September" year="2021"/>
            <abstract>
              <t>This document defines the pushed authorization request (PAR) endpoint, which allows clients to push the payload of an OAuth 2.0 authorization request to the authorization server via a direct request and provides them with a request URI that is used as reference to the data in a subsequent call to the authorization endpoint.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9126"/>
          <seriesInfo name="DOI" value="10.17487/RFC9126"/>
        </reference>
        <reference anchor="OpenID.Core" target="https://www.iana.org/assignments/media-types/media-types.xhtml">
          <front>
            <title>Media Types</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="IANA.MediaTypes" target="https://www.iana.org/assignments/media-types/media-types.xhtml">
          <front>
            <title>Media Types</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="IANA.JOSE" target="https://www.iana.org/assignments/jose/jose.xhtml">
          <front>
            <title>JSON Object Signing and Encryption (JOSE)</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="IANA.JWT" target="https://www.iana.org/assignments/jwt/jwt.xhtml">
          <front>
            <title>JSON Web Token Claims</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="IANA.CWT" target="https://www.iana.org/assignments/cwt/cwt.xhtml">
          <front>
            <title>CBOR Web Token (CWT) Claims</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RFC9596">
          <front>
            <title>CBOR Object Signing and Encryption (COSE) "typ" (type) Header Parameter</title>
            <author fullname="M.B. Jones" initials="M.B." surname="Jones"/>
            <author fullname="O. Steele" initials="O." surname="Steele"/>
            <date month="June" year="2024"/>
            <abstract>
              <t>This specification adds the equivalent of the JSON Object Signing and Encryption (JOSE) "typ" (type) header parameter to CBOR Object Signing and Encryption (COSE). This enables the benefits of explicit typing (as defined in RFC 8725, "JSON Web Token Best Current Practices") to be brought to COSE objects. The syntax of the COSE type header parameter value is the same as the existing COSE content type header parameter.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9596"/>
          <seriesInfo name="DOI" value="10.17487/RFC9596"/>
        </reference>
        <reference anchor="IANA-HASH-REG" target="https://www.iana.org/assignments/named-information/named-information.xhtml#hash-alg">
          <front>
            <title>IANA - Named Information Hash Algorithm Registry</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="draft-ietf-oauth-status-list" target="https://datatracker.ietf.org/doc/draft-ietf-oauth-status-list">
          <front>
            <title>draft-ietf-oauth-status-list</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="ECHR-ART8" target="https://www.echr.coe.int/documents/convention_eng.pdf">
          <front>
            <title>Article 8 of the European Convention on Human Rights</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="GDPR" target="https://gdpr-info.eu/">
          <front>
            <title>GDPR</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="SD-JWT.VC" target="https://www.ietf.org/archive/id/draft-ietf-oauth-sd-jwt-vc-05.html">
          <front>
            <title>SD-JWT-based Verifiable Credentials (SD-JWT VC)</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="ISO.mdoc">
          <front>
            <title>ISO/IEC 18013-5:2021 ISO-compliant driving licence</title>
            <author>
              <organization>ISO/IEC JTC 1/SC 17</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="OpenID4VP" target="https://openid.net/specs/openid-4-verifiable-presentations-1_0.html">
          <front>
            <title>OpenID for Verifiable Credential Presentation</title>
            <author>
              <organization>OpenID Foundation</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RFC6066" target="https://datatracker.ietf.org/doc/html/rfc6066">
          <front>
            <title>Transport Layer Security (TLS) Extensions: Extension Definitions</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
    <?line 1077?>

<section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>We would like to thank:</t>
      <ul spacing="normal">
        <li>
          <t>Paul Bastien</t>
        </li>
        <li>
          <t>Sara Casanova</t>
        </li>
        <li>
          <t>Emanuele De Cupis</t>
        </li>
        <li>
          <t>Riccardo Iaconelli</t>
        </li>
        <li>
          <t>Marina Adomeit</t>
        </li>
        <li>
          <t>Victor Näslund</t>
        </li>
        <li>
          <t>Giada Sciarretta</t>
        </li>
        <li>
          <t>Amir Sharif</t>
        </li>
        <li>
          <t>Oliver Terbu</t>
        </li>
      </ul>
    </section>
    <section anchor="document-history">
      <name>Document History</name>
      <t>-03</t>
      <ul spacing="normal">
        <li>
          <t>Terminology aligned with IETF Token Status Lists</t>
        </li>
        <li>
          <t>Marina Adomeit added as co-author</t>
        </li>
        <li>
          <t>Added informative references about national and international regulations</t>
        </li>
        <li>
          <t>Abandoned boolean values for Integers values</t>
        </li>
        <li>
          <t>Status values aligned with IETF Token Status Lists</t>
        </li>
        <li>
          <t>Added the requirement about not specificing audiences in the Status Assertions</t>
        </li>
      </ul>
      <t>-02</t>
      <ul spacing="normal">
        <li>
          <t>Removed several comparisons with OAuth Status List</t>
        </li>
        <li>
          <t>Status Assertion Request and Response is now a json array with multiple entries.</t>
        </li>
        <li>
          <t>Better generalization about the confirmation methods.</t>
        </li>
        <li>
          <t>Removed any informative comparison with OAuth Status List.</t>
        </li>
        <li>
          <t>JWT and CWT typ.</t>
        </li>
        <li>
          <t>Name of the draft changed from <tt>OAuth Status Attestations</tt> to <tt>OAuth Status Assertions</tt>.</t>
        </li>
        <li>
          <t>Extended Status Assertion errors table added in <xref target="status-assertion-error">the section Status Error</xref>.</t>
        </li>
      </ul>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
