2023.06.14 NA/EU IGRTF Meeting Notes
Recording
Attendees
Neil Thomson, Phil Feairheller, Sankarshan, Judith Fleenor
Main Goal of this Meeting
- Authentic Trust - how are Trust Registries and Issuers Trusted and traceable to a "root of trust"
- And how does this related to Issuer Requirements
Agenda Items and Notes (including all relevant links)
Time | Agenda Item | Lead | Notes |
5 min |
| Chairs |
|
20 mins | Roots of Trust | All | Call to review the "Issuer Requirements Notes and Outline (link) How do Issuers and Trust Registries fit into an ecosystem, and what is/are the definitions of roots-of-trust? The ETSI Trust List (link), a type of Trust Service Provider that was originally created in the EU in the mid-2000s, is the basis for the current concept of a Trust Registry. This was a stand-alone list which not only operated the machinery of the list but qualified the entities/objects that were included in the list. Effectively this was a "white list" of approved entities/objects. A Trust List is managed by an EU jurisdiction that sanctions a list as a root of trust for the scope of the entities/objects within the list. The governance authority for the ecosystem is the Jurisdiction - essentially the ecosystem's Administrative root-of-trust. So how does this model compare & contrast with the GLEIF KERI/ACDC model, which has explicitly signed chains of credentials signed by organizational roles, which are themselves credentialed back to cryptographic and organizational roots of trust that can be verified at run-time (via the ACDC credential-role-signature chains)? Comment: GLEIF has a tightly bound use of cryptographic linkage (using ACDC chains) to provide a tight relationship between GLEIF as an organization (and its internal roles (of personnel)) and the relationship between GLEIF's own LEI/vLEI and that of its LEI and vLEI issuing organizations (and their customers - legal organizations) and the vLEIs of the human roles within those chains. This is backed by Governance Documentation (themselves signed by organizational vLEI roles), including authoritative documents delegating authority (e.g., to a vLEI issuer to issue vLEIs to their customers). However, that is not yet a widely used model. A more common model is a combination of crypto-signatures for components of the system with authoritative documents (including governance) which authorize a component (e.g., an Issuer of a type of VC (workplace safety certificate)). Goals include having trust chains verifiable (e.g., Verifier being able to validate that an Issuer has the authority to issue a given VC), which may be done via being contained in a Trust Registry of Issuers or via traceability (GLEIF approach) to a certificate issued by a higher authority (e.g., an ecosystem Issuer qualification authority). Note: both VCs and entities put into a Trust Registry need to be validated/verified to meet the qualification rules defined:
Based on earlier discussions, Issuers and Registries must fit within the application/ecosystem use cases for which there is most likely a top-level governing authority/jurisdiction which will define the requirements of the components and processes (automated and human). Conclusion - Issuers and Trust Registries are key "points of trust" within the "Trust Fabric" of a solution space, ecosystem or application, which needs a top-level authority as the administrative root of trust and potentially a fully crypto-graphic chain based verifiable root of trust. |
Screenshots/Diagrams (numbered for reference in notes above)
For Universal Credential Adapters and Use of Intermediaries Discussion
Decisions
- Sample Decision Item
Action Items
- Sample Action Item