Skip to content

Commit 745f861

Browse files
committed
Merge master into releases
2 parents f5f7e2f + 81c9661 commit 745f861

File tree

4 files changed

+161
-2
lines changed

4 files changed

+161
-2
lines changed

README.md

Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -323,6 +323,19 @@ The following is a list of Generic Enablers under incubation within the area of
323323
[SCIM v1.1](https://developer.okta.com/docs/reference/scim/scim-11/) standard
324324
- [Keystone SPASSWORD](https://github.com/telefonicaid/fiware-keystone-spassword) is an OpenStack Keystone extension
325325
that enables extra security checks over user passwords
326+
- [Trusted Issuers List Service](https://github.com/FIWARE/trusted-issuers-list) provides an EBSI Trusted Issuers Registry
327+
implementation to act as the Trusted-List-Service in the DSBA Trust and IAM Framework.
328+
- [DSBA PDP](https://github.com/FIWARE/dsba-pdp) is a Policy-Desicion Point, evaluating Json-Web-Tokens
329+
containing VerifiableCredentials in an DSBA-compliant way. It also supports the evaluation in the context of i4Trust.
330+
- [VC-Verifier](https://github.com/FIWARE/VCVerifier) provides the necessary endpoints to offer SIOP-2/OIDC4VP
331+
compliant authentication flows. It exchanges VerfiableCredentials for JWT, that can be used for authorization and authentication
332+
- [Keycloak VC-Issuer](https://github.com/FIWARE/keycloak-vc-issuer) is a plugin for Keycloak to support SIOP-2/ OIDC4VP
333+
clients and issue VerifiableCredentials through the OIDC4VCI-Protocol to compliant wallets.
334+
- [Credentials Config Service](https://github.com/FIWARE/credentials-config-service) manages and provides information about
335+
services and the credentials they are using. It returns the scope to be requested from the wallet per service and the credentials
336+
and issuers that are considered to be trusted for a certain service.
337+
- [Trusted Issuers Registry](https://github.com/FIWARE/trusted-issuers-registry) provides both an EBSI Trusted Issuers
338+
Registry implementation and an iShare implementation.
326339

327340
Further information can be found on dedicated pages linked to [Context Data/API Management](./api-management/README.md),
328341
[Publication and Monetization](./data-publication/README.md) and [Security](./security/README.md)

security/README.md

Lines changed: 146 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -261,3 +261,149 @@ account became temporarily blocked, a recover procedure password, a second facto
261261

262262
Additional security checks and features improve the security and usability of a system, SPASSWORD helps to reduce
263263
development time by avoiding the need to implement and test bespoke secure system functions.
264+
265+
<a name="trusted-issuers-list-service"/>
266+
267+
## :seedling: Trusted Issuers List Service (Incubated)
268+
269+
[![](https://nexus.lab.fiware.org/repository/raw/public/badges/chapters/security.svg)](./README.md)
270+
![License](https://img.shields.io/github/license/FIWARE/trusted-issuers-list.svg)
271+
![](https://img.shields.io/github/last-commit/FIWARE/trusted-issuers-list)
272+
![](https://img.shields.io/github/tag/FIWARE/trusted-issuers-list.svg)
273+
274+
| :octocat: [Git Repository](https://github.com/FIWARE/trusted-issuers-list) | <img style="height:1em" src="https://quay.io/static/img/quay_favicon.png"/> [quay.io](https://quay.io/repository/fiware/trusted-issuers-registry) | :books: [Documentation](https://github.com/FIWARE/trusted-issuers-list/blob/main/README.md) |
275+
| --- | --- | --- |
276+
277+
### What is the Trusted Issuers List Service ?
278+
279+
The Trusted-Issuers-List Service provides an EBSI Trusted Issuers Registry implementation to act as the Trusted-List-Service in the DSBA Trust and IAM Framework. In addition, a Trusted Issuers List API to manage the issuers is provided.
280+
281+
### Why used the Trusted Issuers List Service ?
282+
283+
In an DSBA-compliant framework, the Verifier has to check for incoming [Verifiable Credentials](https://www.w3.org/TR/vc-data-model/) that the corresponding issuer is allowed to issue:
284+
285+
- the given type of credential
286+
- with the given claims
287+
- and at the current time
288+
289+
To do so, it requires a service that provides this information
290+
291+
<a name="dbsa-pdp"/>
292+
293+
## :seedling: DSBA PDP (Incubated)
294+
295+
[![](https://nexus.lab.fiware.org/repository/raw/public/badges/chapters/security.svg)](./README.md)
296+
![License](https://img.shields.io/github/license/FIWARE/dsba-pdp.svg)
297+
![](https://img.shields.io/github/last-commit/FIWARE/dsba-pdp)
298+
![](https://img.shields.io/github/tag/FIWARE/dsba-pdp.svg)
299+
300+
| :octocat: [Git Repository](https://github.com/FIWARE/dsba-pdp) | <img style="height:1em" src="https://quay.io/static/img/quay_favicon.png"/> [quay.io](https://quay.io/repository/fiware/dsba-pdp) | :books: [Documentation](https://github.com/FIWARE/dsba-pdp/blob/main/README.md) |
301+
| --- | --- | --- |
302+
303+
### What is the DSBA PDP ?
304+
305+
Implementation of a Policy-Desicion Point, evaluating Json-Web-Tokens containing [Verifiable Credentials](https://www.w3.org/TR/vc-data-model/) s in an DSBA-compliant way. It also supports the evaluation in the context of i4Trust.
306+
307+
### Why use the DSBA PDP ?
308+
309+
A Policy Decision Point (PDP) is a mechanism that restricts access to resources by comparing them to a security policy. The
310+
permit/deny mechanism ensure than only authorised users are able to access a given resource. This PDP for data spaces uses
311+
well-defined policy structures found within JWTs, where the policy structure follows the reccommendations made by the Data
312+
Spaces Business Alliance ((DSBA)[https://data-spaces-business-alliance.eu/]) and therefore ensuring that multiple organisations
313+
are able to create policies in common across a data space.
314+
315+
<a name="vc-verifier"/>
316+
317+
## :seedling: VC-Verifier (Incubated)
318+
319+
[![](https://nexus.lab.fiware.org/repository/raw/public/badges/chapters/security.svg)](./README.md)
320+
![License](https://img.shields.io/github/license/FIWARE/VCVerifier.svg)
321+
![](https://img.shields.io/github/last-commit/FIWARE/VCVerifier)
322+
![](https://img.shields.io/github/tag/FIWARE/VCVerifier.svg)
323+
324+
| :octocat: [Git Repository](https://github.com/FIWARE/VCVerifier) | <img style="height:1em" src="https://quay.io/static/img/quay_favicon.png"/> [quay.io](https://quay.io/repository/fiware/vcverifier) | :books: [Documentation](https://github.com/FIWARE/VCVerifier/blob/main/README.md) |
325+
| --- | --- | --- |
326+
327+
### What is VCVerifier ?
328+
329+
VCVerifier provides the necessary endpoints(see API) to offer SIOP-2/OIDC4VP compliant authentication flows.
330+
It exchanges [Verifiable Credentials](https://www.w3.org/TR/vc-data-model/) for a JSON Web Token ([JWT](https://jwt.io/)),
331+
that can be used for authorization and authentication in down-stream components.
332+
333+
### Why use VCVerifier ?
334+
335+
The JWT used for a Verifiable Credential is not the same JWT that can be used for authorization and authentication.
336+
The component reads in a Verifiable Credential and replaces it with an authorisation policy which can be used to permit
337+
access to services.
338+
339+
<a name="keycloak-vc-issuer"/>
340+
341+
## :seedling: Keycloak VC-Issuer (Incubated)
342+
343+
[![](https://nexus.lab.fiware.org/repository/raw/public/badges/chapters/security.svg)](./README.md)
344+
![License](https://img.shields.io/github/license/FIWARE/keycloak-vc-issuer.svg)
345+
![](https://img.shields.io/github/last-commit/FIWARE/keycloak-vc-issuer)
346+
![](https://img.shields.io/github/tag/FIWARE/keycloak-vc-issuer.svg)
347+
348+
| :octocat: [Git Repository](https://github.com/FIWARE/keycloak-vc-issuer) | <img style="height:1em" src="https://quay.io/static/img/quay_favicon.png"/> [quay.io](https://quay.io/repository/fiware/keycloak-vc-issuer) | :books: [Documentation](https://github.com/FIWARE/keycloak-vc-issuer/blob/main/README.md) |
349+
| --- | --- | --- |
350+
351+
### What is the Keycloak VC-Issuer ?
352+
353+
The Keycloak-VC-Issuer is plugin for [Keycloak](https://www.keycloak.org/) to support SIOP-2/ OIDC4VP clients and
354+
issue [Verifiable Credentials](https://www.w3.org/TR/vc-data-model/) through the OIDC4VCI-Protocol to compliant wallets.
355+
356+
### Why use the Keycloak VC-Issuer ?
357+
358+
Issuance of Verified credentials is an essential step in creating a common data space. Effectively creating a digital club
359+
card allowing a user to access various services. This plugin extends the existing Keycloak service so that Keycloak itself
360+
is able to issue a credential.
361+
362+
<a name="credentials-config-service"/>
363+
364+
## :seedling: Credentials Config Service (Incubated)
365+
366+
[![](https://nexus.lab.fiware.org/repository/raw/public/badges/chapters/security.svg)](./README.md)
367+
![License](https://img.shields.io/github/license/FIWARE/credentials-config-service.svg)
368+
![](https://img.shields.io/github/last-commit/FIWARE/credentials-config-service)
369+
![](https://img.shields.io/github/tag/FIWARE/credentials-config-service.svg)
370+
371+
| :octocat: [Git Repository](https://github.com/FIWARE/credentials-config-service) | <img style="height:1em" src="https://quay.io/static/img/quay_favicon.png"/> [quay.io](https://quay.io/repository/fiware/credentials-config-service) | :books: [Documentation](https://github.com/FIWARE/credentials-config-service/blob/main/README.md) |
372+
| --- | --- | --- |
373+
374+
### What is the Credentials Config Service ?
375+
376+
The Credentials Config Service manages and provides information about services and the credentials they are using. It returns
377+
the scope to be requested from the wallet per service and the credentials and issuers that are considered to be trusted for a
378+
certain service.
379+
380+
### Why use the Credentials Config Service ?
381+
382+
In an DSBA-compliant framework, a Verifier is responsible to communicate with wallets and verify the credentials they provide.
383+
To get this done, it needs information about:
384+
385+
- the credentials to be requested from a wallet
386+
- the credentials and claims an issuer is allowed to issue
387+
388+
To do so, it requires a service that provides such information
389+
390+
<a name="trusted-issuers-registry"/>
391+
392+
## :seedling: Trusted Issuers Registry (Incubated)
393+
394+
[![](https://nexus.lab.fiware.org/repository/raw/public/badges/chapters/security.svg)](./README.md)
395+
![License](https://img.shields.io/github/license/FIWARE/trusted-issuers-registry.svg)
396+
![](https://img.shields.io/github/last-commit/FIWARE/trusted-issuers-registry)
397+
![](https://img.shields.io/github/tag/FIWARE/trusted-issuers-registry.svg)
398+
399+
| :octocat: [Git Repository](https://github.com/FIWARE/trusted-issuers-registry) | <img style="height:1em" src="https://quay.io/static/img/quay_favicon.png"/> [quay.io](https://quay.io/repository/fiware/trusted-issuers-registry) | :books: [Documentation](https://github.com/FIWARE/trusted-issuers-registry/blob/main/README.md) |
400+
| --- | --- | --- |
401+
402+
### What is the Trusted Issuers Registry ?
403+
404+
The Trusted Issuers Registry provides both an EBSI Trusted Issuers Registry implementation and an iShare implementation.
405+
The service provides data from an NGSI-LD compliant backend and configuration files.
406+
407+
### Why use the Trusted Issuers Registry ?
408+
409+
A Trusted Issuers Registry (TIR) is a decentralised registry for storing information about trusted issuers, such as public information and accreditations. The TIR stores all information within a smart contract in the form of Verifiable Accreditations, which are issued by Trust Chain participants or self-issued. Issuers can then designate proxies for credential verification that can be used to assess the validity of the credential or check whether it has been revoked.

0 commit comments

Comments
 (0)