Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Attendees

...

TimeItemWho
2 min

Anti-Trust Policy and Recording reminder given

Chair
5 min

Introductions: (New participants (if any) only 

Chair
15 min

Key questions document: Contributors to share thoughts 

All

20 min Key requirements: Agree 3 key requirements, and 30/60/180 day milestones for eachAll
15 minRecommended solutions: Agree 3 actionable recommendations, and 30/60/180 day milestones for each Chair 
3Wrap UpChair

Presentations -

...

  1. What are GHP compliant ecosystems?  From an identity binding standpoint there will be different levels, we cannot dictate across the ecosystem.  
  2. What would be compliant in various different scenarios?
  3. What are the standards of data reported in the credential?
  4. If there is no identity binding data in the credential, should the recommendation be that the verifier treats it at the lowest level? (Self-Asserted)
  5. Should we provide a mapping across recognised recognized schemes?  NIST, PCTF, TDIF, eIDAS, UK GPG, ISO/IEC 24760


  • Next steps

Everyone should contribute to the documents:       

Action Items

  1. Action: Ensure we identify the interaction with the credential definition WG - the level of assurance should be included with the credential.

  2. Action: Discuss with rules engine WG how different LoAs can be translated by the Verifier

...

2. Topic A

3. Topic B  

4. Topic C 

5. Wrap up 

  • Next steps

       

Action Items

  1. TBC