Skip to content

Commit

Permalink
Trust anchor clarity in registration policies
Browse files Browse the repository at this point in the history
Signed-off-by: steve lasker <[email protected]>
  • Loading branch information
SteveLasker committed Oct 1, 2024
1 parent 7615e71 commit 6bb7789
Showing 1 changed file with 1 addition and 3 deletions.
4 changes: 1 addition & 3 deletions draft-ietf-scitt-architecture.md
Original file line number Diff line number Diff line change
Expand Up @@ -397,9 +397,7 @@ Multi-tenant support can be enabled through the use of identifiers in the `iss`

Registration Policies refer to additional checks over and above the Mandatory Registration Checks that are performed before a Signed Statement is accepted to be registered to the Append-only Log.

Transparency Services MUST maintain Registration Policies.

Transparency Services MUST also maintain a list of trust anchors, which SHOULD be used by Relying Parties to authenticate Issuers, and which MAY be included in a Registration Policy statement.
Transparency Services MUST maintain Registration Policies and a list of trust anchors to authenticate Issuers upon Registration.
For instance, a trust anchor could be an X.509 root certificate, a pointer to an OpenID Connect identity provider, or any other COSE-compatible trust anchor.

Registration Policies and trust anchors MUST be made transparent and available to all Relying Parties of the Transparency Service by registering them as Signed Statements on the Append-only Log, and distributing the associated Receipts.
Expand Down

0 comments on commit 6bb7789

Please sign in to comment.