-
Hi everyone,
Recently re-read the security requirements part of the spec which currently has this text:
> Security Requirement Objects that contain multiple schemes require that all schemes MUST…
-
-
I propose to map the security requirements defined in https://github.com/openid/OpenID4VC_SecTrust within the sections of this documentation, giving guidance about how the security #code defined in oi…
-
We are aiming to use the internal Gitea instance to mirror external git repositories in a read only manner.
We need to investigate how to do this in a secure way that,
- Does not allow data egre…
-
Hi, if I install the player I can't use Google Wallet to pay contactless anymore because "Phone doesn't meet security requirements":
https://support.google.com/wallet/answer/12200245
When I have it …
-
Capability-implied Requirements contains dependency requirements between commands and capabilities, but for Authorization Server Configuration nothing is described.
Open points:
- Shall device sup…
-
Milestone 1 Requirements
- Introduction
- Product Scope
- Related Background Literature
- References and Acknowledgments
- Overall Descriptions
- Product Overall Functionality
- Assumpti…
-
V.H.1: Product hardening
The product can be easily hardened into a secure configuration. Documentation exists to help customers perform this hardening process.Alerts are created should the device be …
-
As a developer, I want my application's data and user information to remain safe for our users' trust in our platform.
Confirmation: Employ best security practices such as data encryption, regular au…
-
- Use respec links for sections as in discovery
- Use separate security and privacy requirements sections.
- W3C generally treats them separately, but there are many requirements that overlap.
…