You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Authorize client requests with signed queries and commits against a ledger to a ledger server using claims in a verifiable credential included in the request.
The text was updated successfully, but these errors were encountered:
This is independent, by design, of #231. #231 today expect just two things and will eventually be 3 things
The verified did/identity of the request
The role(s) the user is to be placed in, if any. This could happen via an intermediary step where a query happened, or might automatically get set based on the credential
(not yet in there) a map/flakes of authorized claims on the credential if the credential wasn't self-signed - e.g. if an identity provider signed the credential it could make claims about the user that in turn could get utilized inside smartfunctions.
Queries and transactions can come wrapped in a verifiable credential. We would use the signature on the credential as an auth input to the constraint enforcer, where one constraint could be: "transactions must be signed by the holder of the private key for this public key", or perhaps nested verifiable credentials.
We need to add logic to the query and stage functions to support checking those constraints.
This one is about receiving auth claims alongside of the request, verifying that they are authoritative, and then incorporating the claims into the query/transaction pipeline.
Authorize client requests with signed queries and commits against a ledger to a ledger server using claims in a verifiable credential included in the request.
The text was updated successfully, but these errors were encountered: