Skip to content

Commit

Permalink
Script updating gh-pages from bca3651. [ci skip]
Browse files Browse the repository at this point in the history
  • Loading branch information
ID Bot committed Nov 21, 2023
1 parent 8f70973 commit 6586c65
Show file tree
Hide file tree
Showing 2 changed files with 11 additions and 6 deletions.
3 changes: 2 additions & 1 deletion draft-vesco-vcauthtls.html
Original file line number Diff line number Diff line change
Expand Up @@ -1397,7 +1397,8 @@ <h3 id="name-server-authentication-with-">
<h3 id="name-mutual-authentication-with-">
<a href="#section-6.2" class="section-number selfRef">6.2. </a><a href="#name-mutual-authentication-with-" class="section-name selfRef">Mutual authentication with Verifiable Credentials</a>
</h3>
<p id="section-6.2-1">This section shows an example where the TLS client as well as the TLS server use VCs for authentication. In fact the server selects VC for both client_cert_types and server_cert_types extensions and in the CertificateRequest message sends the did_methods extension with a set of DID methods both endpoints have in common.<a href="#section-6.2-1" class="pilcrow"></a></p>
<p id="section-6.2-1">This example shows a TLS 1.3 handshake with mutual authenitcation. Both client and server select their Verifiable Credential for authentication.
The client sends the did_methods extension along with the server_certificate_type extension set to VC as the first option. The server sends the server_certificate_type set to VC, the client_cert_type set to VC and the CertificateRequest message together with the did_methods extension with a set of DID Methods both endpoints have in common. Both client and server send their Verifiable Credential into their respective Certificate message.<a href="#section-6.2-1" class="pilcrow"></a></p>
</section>
</div>
<div id="mutual-authentication-with-client-using-verifiable-credential-and-server-using-x509-certificate">
Expand Down
14 changes: 9 additions & 5 deletions draft-vesco-vcauthtls.txt
Original file line number Diff line number Diff line change
Expand Up @@ -349,11 +349,15 @@ Table of Contents

6.2. Mutual authentication with Verifiable Credentials

This section shows an example where the TLS client as well as the TLS
server use VCs for authentication. In fact the server selects VC for
both client_cert_types and server_cert_types extensions and in the
CertificateRequest message sends the did_methods extension with a set
of DID methods both endpoints have in common.
This example shows a TLS 1.3 handshake with mutual authenitcation.
Both client and server select their Verifiable Credential for
authentication. The client sends the did_methods extension along
with the server_certificate_type extension set to VC as the first
option. The server sends the server_certificate_type set to VC, the
client_cert_type set to VC and the CertificateRequest message
together with the did_methods extension with a set of DID Methods
both endpoints have in common. Both client and server send their
Verifiable Credential into their respective Certificate message.

6.3. Mutual authentication with Client using Verifiable Credential and
Server using X.509 Certificate
Expand Down

0 comments on commit 6586c65

Please sign in to comment.