From 2daeec34d43fb7d46289c229b66179aab1664dc6 Mon Sep 17 00:00:00 2001
From: rhiaro
-Since Authorization and Delegation are typically implemented by the -ledger, each DID Method specification is expected to detail how -authorization and delegation are performed for the ledger. +Each DID Method MUST define how authorization and delegation are +implemented, including any necessary cryptographic operations.
From 3ab68500030c0e27d05aad259e6081cdef82412b Mon Sep 17 00:00:00 2001
From: rhiaro
-The emergence of distributed ledger technology (DLT), sometimes -referred to as blockchain technology, provides the opportunity for -fully decentralized identity management. In a decentralized -identity system, entities (in the sense of discrete identifiable units -such as—but not limited to—people and organisations) are free to use any -shared root of trust. -Globally distributed ledgers, decentralized P2P networks, or other systems -with similar capabilities, provide the means for managing a root of -trust with neither centralized authority nor a single point of -failure. In combination, DLTs and decentralized identity systems -enable any entity to create and manage their own identifiers on any -number of distributed, independent roots of trust. +Globally distributed ledgers, decentralized P2P networks, and other systems +with similar capabilities, provide an opportunity for fully decentralized +identity management. In a decentralized identity system, entities +(in the sense of discrete identifiable units such as—but not limited to—people +and organisations) are free to use any shared root of trust, with neither +centralized authority nor a single point of failure. +Combining decentralized identity systems enables any entity to create and +manage their own identifiers on any number of distributed, independent roots of +trust, an architecture referred to as + +DPKI (decentralized PKI).
@@ -234,20 +233,11 @@
-DID methods are the mechanism by which a DID and its associated DID -Document are created, read, updated, and deactivated on a specific -distributed ledger or network. DID methods are defined using separate -DID method specifications. -
- --This design eliminates dependence on centralized registries for -identifiers as well as centralized certificate authorities for key -management—the standard pattern in hierarchical PKI (public -key infrastructure). Because DIDs reside on a distributed ledger, -each entity may serve as its own root authority—an architecture -referred to as -DPKI (decentralized PKI). +DID methods are the mechanism by which a DID (the character string +identifier) and its associated DID Document are created, read, +updated, and deactivated in a Decentralized Identifier Registry. +DID methods are defined using separate DID method specifications for +specific systems.
@@ -335,12 +325,12 @@
The first purpose of this specification is to define the generic DID scheme and a generic set of operations on DID documents that can be -implemented for any distributed ledger or network capable of -supporting DIDs. The second purpose of this specification is to +implemented for any Decentralized Identifier Registry. The second +purpose of this specification is to define the conformance requirements for a DID method specification—a separate specification that defines a specific DID scheme and specific set of DID document operations for a specific -distributed ledger or network. +Decentralized Identifier Registry.
@@ -855,10 +845,10 @@
Ideally a DID would be a completely abstract decentralized identifier (like a UUID) that could be bound -to multiple underlying distributed ledgers or networks over time, -thus maintaining its persistence independent of any particular ledger -or network. However registering the same identifier on multiple -ledgers or networks introduces extremely hard entityship and +to multiple underlying Decentralized Identifier Registries over time, +thus maintaining its persistence independent of any particular system. +However registering the same identifier on multiple +Decentralized Identifier Registries introduces extremely hard entityship and start-of-authority (SOA) problems. It also greatly increases implementation complexity for developers. @@ -867,7 +857,7 @@
To avoid these issues, it is RECOMMENDED that DID method specifications only produce DIDs and DID methods bound to strong, -stable ledgers or networks capable of making the highest level of +stable Decentralized Identifier Registries capable of making the highest level of commitment to persistence of the DID and DID method over time.
@@ -875,8 +865,8 @@guardian
-pattern by reusing the same proof purpose pattern used by the
- authentication
property, or more preferably
+A Decentralized Identifier Registry could implement a coarse
+grained guardian
pattern by reusing the same proof purpose
+pattern used by the authentication
property, or more preferably
did:example:contexts:987654321
. At this point, extending
the first example in this section is a simple matter of including the
context above and adding the new property to the DID Document.
@@ -1938,8 +1928,8 @@ Since the method name is part of the DID, it SHOULD be as short as practical. A method name of five characters or less is RECOMMENDED. -The method name MAY reflect the name of the distributed ledger or -network to which the DID method specification applies. +The method name MAY reflect the name of the Decentralized Identifier +Registry to which the DID method specification applies.
@@ -1966,7 +1956,7 @@
To enable the full functionality of DIDs and DID Documents on a -particular distributed ledger or network (called the target system), a +particular Decentralized Identifier Registry, a DID method specification MUST specify how each of the following CRUD operations is performed by a client. Each operation MUST be @@ -2043,8 +2033,8 @@
Although a core feature of distributed ledgers is immutability, the DID method specification MUST specify how a client can deactivate a DID -on the target system, including all cryptographic operations -necessary to establish proof of deactivation. +on the Decentralized Identifier Registry, including all cryptographic +operations necessary to establish proof of deactivation.
@@ -2362,7 +2352,7 @@-If a DID method specification is written for a public ledger or -network where all DIDs and DID Documents will be publicly available, +If a DID method specification is written for a public Decentralized +Identifier Registry where all DIDs and DID Documents will be publicly available, it is STRONGLY RECOMMENDED that DID Documents contain no PII. All PII -should be kept off-ledger behind service endpoints under the control +should be kept behind service endpoints under the control of the subject. With this privacy architecture, PII may be exchanged on a private, peer-to-peer basis using communications channels identified and secured by key descriptions in DID documents. This also @@ -2581,8 +2571,10 @@
The DID method specification MUST specify how a client creates a DID -and its associated DID Document on the target system, including all +and its associated DID Document on the Decentralized Identifier Registry, including all cryptographic operations necessary to establish proof of control.
The DID method specification MUST specify how a client uses a DID to -request a DID Document from the target system, including how the +request a DID Document from the Decentralized Identifier Registry, including how the client can verify the authenticity of the response.
@@ -2020,7 +2020,7 @@The DID method specification MUST specify how a client can update a -DID Document on the target system, including all cryptographic +DID Document on the Decentralized Identifier Registry, including all cryptographic operations necessary to establish proof of control.
From 75be78566bae82f8a7a304c44625734d037d8765 Mon Sep 17 00:00:00 2001 From: rhiaro-Globally distributed ledgers, decentralized P2P networks, and other systems -with similar capabilities, provide an opportunity for fully decentralized -identity management. In a decentralized identity system, entities -(in the sense of discrete identifiable units such as—but not limited to—people -and organisations) are free to use any shared root of trust, with neither -centralized authority nor a single point of failure. -Combining decentralized identity systems enables any entity to create and -manage their own identifiers on any number of distributed, independent roots of -trust, an architecture referred to as - -DPKI (decentralized PKI). +The emergence of distributed ledger technology (DLT), sometimes +referred to as blockchain technology, provides the opportunity for +fully decentralized identity management. In a decentralized +identity system, entities (in the sense of discrete identifiable units +such as—but not limited to—people and organisations) are free to use any +shared root of trust. +Globally distributed ledgers, decentralized P2P networks, or other systems +with similar capabilities, provide the means for managing a root of +trust with neither centralized authority nor a single point of +failure. In combination, DLTs and decentralized identity systems +enable any entity to create and manage their own identifiers on any +number of distributed, independent roots of trust.
@@ -233,19 +234,20 @@
-DID methods are the mechanism by which a DID (the character string -identifier) and its associated DID Document are created, read, -updated, and deactivated in a Decentralized Identifier Registry. -DID methods are defined using separate DID method specifications for -specific systems. +DID methods are the mechanism by which a DID and its associated DID +Document are created, read, updated, and deactivated on a specific +distributed ledger or network. DID methods are defined using separate +DID method specifications.
-Note that DID methods may also be developed for identifiers -registered in federated or centralized identity management systems. -For their part, all types of identifier systems may add support for -DIDs. This creates an interoperability bridge between the worlds of -centralized, federated, and decentralized identifiers. +This design eliminates dependence on centralized registries for +identifiers as well as centralized certificate authorities for key +management—the standard pattern in hierarchical PKI (public +key infrastructure). Because DIDs reside on a distributed ledger, +each entity may serve as its own root authority—an architecture +referred to as +DPKI (decentralized PKI).
+Note that DID methods may also be developed for identifiers +registered in federated or centralized identity management systems. +For their part, all types of identifier systems may add support for +DIDs. This creates an interoperability bridge between the worlds of +centralized, federated, and decentralized identifiers. +
+