diff --git a/docs/en/pid-eaa-issuance.rst b/docs/en/pid-eaa-issuance.rst index 683e32cbe..2b76c8f47 100644 --- a/docs/en/pid-eaa-issuance.rst +++ b/docs/en/pid-eaa-issuance.rst @@ -124,7 +124,7 @@ Below a non-normative example of the PAR. &client_assertion_type=urn:ietf:params:oauth:client-assertion-type:jwt-client-attestation &client_assertion=$WalletInstanceAttestation$ -The JWS header of request object is represented below: +The JWS header of Request Object is represented below: .. code-block:: JSON @@ -134,7 +134,7 @@ The JWS header of request object is represented below: } -The JWS payload of the request object is represented below: +The JWS payload of the Request Object is represented below: .. code-block:: JSON @@ -388,7 +388,7 @@ The requests to the PID/(Q)EAA authorization endpoint MUST be HTTP with method P - A method that was used to derive **code challenge**. It MUST be set to ``S256``. - :rfc:`7636#section-4.3`. * - **request** - - It MUST be a signed JWT. The private key corresponding to the public one in the ``cnf`` parameter inside the Wallet Instance Attestation MUST be used for signing the request object. + - It MUST be a signed JWT. The private key corresponding to the public one in the ``cnf`` parameter inside the Wallet Instance Attestation MUST be used for signing the Request Object. - `OpenID Connect Core. Section 6 `_ * - **client_assertion_type** - It MUST be set to ``urn:ietf:params:oauth:client-assertion-type:jwt-client-attestation``. @@ -543,7 +543,7 @@ If the authentication is successful the PID/(Q)EAA Issuer redirects the User by - Unique *Authorization Code* that the Wallet Instance submits to the Token Endpoint. - [:rfc:`6749#section-4.1.2`], `Assertion Framework for OAuth 2.0 Client Authentication and Authorization Grants `_ * - **state** - - The Wallet Instance MUST check the correspondence with the ``state`` parameter value in the request object. It is defined as in the :ref:`Table of the JWT Request parameters `. + - The Wallet Instance MUST check the correspondence with the ``state`` parameter value in the Request Object. It is defined as in the :ref:`Table of the JWT Request parameters `. - [:rfc:`6749#section-4.1.2`]. * - **iss** - Unique identifier of the PID/(Q)EAA Issuer who created the Authentication Response. The Wallet Instance MUST validate this parameter. @@ -583,7 +583,7 @@ All the parameters listed below are REQUIRED: - Authorization code returned in the Authentication Response. - `Assertion Framework for OAuth 2.0 Client Authentication and Authorization Grants `_. * - **redirect_uri** - - It MUST be set as in the request object :ref:`Table of the JWT Request parameters `. + - It MUST be set as in the Request Object :ref:`Table of the JWT Request parameters `. - `Assertion Framework for OAuth 2.0 Client Authentication and Authorization Grants `_. * - **code_verifier** - Verification code of the **code_challenge**. diff --git a/docs/en/relying-party-solution.rst b/docs/en/relying-party-solution.rst index 3d5d8802f..630ffefd5 100644 --- a/docs/en/relying-party-solution.rst +++ b/docs/en/relying-party-solution.rst @@ -27,7 +27,7 @@ In the **Same Device** and **Cross Device** Flows described in this chapter, the Remote Protocol Flow -------------------- -In this scenario the Relying Party MUST provide the URL where the signed presentation request object is available for download. +In this scenario the Relying Party MUST provide the URL where the signed presentation Request Object is available for download. Depending on whether the Relying Party client is on a mobile device or a workstation, the Relying Party MUST activate one of the supported remote flows: @@ -64,7 +64,7 @@ The details of each step shown in the previous picture are described in the tabl * - **11** - The Relying Party attests the trust to the Wallet Instance using the Wallet Instance Attestation and evaluates the Wallet Instance capabilities. * - **12** - - The Relying Party issues a signed Request Object, returning it as response. The ``exp`` value of the signed request object MUST be no more than 180 seconds. + - The Relying Party issues a signed Request Object, returning it as response. The ``exp`` value of the signed Request Object MUST be no more than 240 seconds. * - **13**, **14**, **15**, **16** - The Wallet Instance verifies the Request Object JWS. The Wallet Instance attests the trust to the Relying Party by verifying the Trust Chain. The Wallet Instance verifies the signature of the request and processes the Relying Party metadata to attest its capabilities and allowed scopes, attesting which Verifiable Credentials and personal attributes the Relying Party is granted to request. * - **17**, **18** @@ -82,7 +82,7 @@ The details of each step shown in the previous picture are described in the tabl Authorization Request Details ----------------------------- -The Relying Party MUST create a request object in the format of signed JWT, then provide it to the Wallet Instance through an HTTP URL (request URI). The HTTP URL points to the web resource where the signed request object is available for download. The URL parameters contained in the Relying Party response, containing the request URI, are described in the Table below. +The Relying Party MUST create a Request Object in the format of signed JWT, then provide it to the Wallet Instance through an HTTP URL (request URI). The HTTP URL points to the web resource where the signed request object is available for download. The URL parameters contained in the Relying Party response, containing the request URI, are described in the Table below. .. list-table:: :widths: 25 50 @@ -93,7 +93,7 @@ The Relying Party MUST create a request object in the format of signed JWT, then * - **client_id** - Unique identifier of the Relying Party. * - **request_uri** - - The HTTP URL used by the Wallet Instance to retrieve the signed request object from the Relying Party. The URL is intentionally extended with a random value that uniquely identifies the transaction. + - The HTTP URL used by the Wallet Instance to retrieve the signed Request Object from the Relying Party. The URL is intentionally extended with a random value that uniquely identifies the transaction. Below a non-normative example of the response containing the required parameters previously described. @@ -147,8 +147,8 @@ Since the QRcode page and the status endpoint are implemented by the Relying Par The Relying Party MUST bind the request of the user-agent, with a Secure and HttpOnly session cookie, with the issued request. The request url SHOULD include a parameter with a random value. The HTTP response returned by this specialized endpoint MAY contain the HTTP status codes listed below: -* **201 Created**. The signed request object was issued by the Relying Party that waits to be downloaded by the Wallet Instance at the **request_uri** endpoint. -* **202 Accepted**. This response is given when the signed request object was obtained by the Wallet Instance. +* **201 Created**. The signed Request Object was issued by the Relying Party that waits to be downloaded by the Wallet Instance at the **request_uri** endpoint. +* **202 Accepted**. This response is given when the signed Request Object was obtained by the Wallet Instance. * **200 OK**. The Wallet Instance has provided the presentation to the Relying Party's **redirect_uri** endpoint and the User authentication is successful. The Relying Party updates the session cookie allowing the user-agent to access to the protected resource. An URL is provided carrying the location where the user-agent is intended to navigate. * **401 Unauthorized**. The Wallet Instance or its User have rejected the request, or the request is expired. The QRCode page SHOULD be updated with an error message. @@ -169,10 +169,10 @@ The following actions are made by the Wallet Instance: - extract from the payload the ``request_uri`` parameter; - invoke the retrieved URI; - provide in the request its Wallet Instance Attestation, using :rfc:`9449` to proof the legitimate possession of it; -- obtain the signed request object from the Relying Party. +- obtain the signed Request Object from the Relying Party. - evaluate the trust with the Relying Party, by evaluating the Trust Chain related to it. -Below a non-normative example of HTTP request made by the Wallet Instance to the Relying Party to provide the Wallet Instance Attestion and retrieve the signed request object: +Below a non-normative example of HTTP request made by the Wallet Instance to the Relying Party to provide the Wallet Instance Attestion and retrieve the signed Request Object: .. code-block:: javascript @@ -272,7 +272,7 @@ Therein a non-normative example of the DPoP decoded content: Request URI response -------------------- -The Relying Party issues the signed request object, where a non-normative example in the form of decoded header and payload is shown below: +The Relying Party issues the signed Request Object, where a non-normative example in the form of decoded header and payload is shown below: .. code-block:: text