Open Vishwas1 opened 2 years ago
entropy
from a source of randomness that is as close to actually random as possible.entropy
.did:example:123
, did:example:123/path
and did:example:123?args=1
each identify a unique resource. did:example:123/ephemeral/77d66171-b290-489c-abf1-95ae10725201#primary
did:example:123?versionId=77d66171-b290-489c-abf1-95ae10725201#primary
did:example:123#primary
authentication
verification relationship is used to specify how the DID subject is expected to be authenticated, for purposes such as logging into a website or engaging in any sort of challenge-response protocol.
"authentication": [
// referenced
"did:example:123456789abcdefghi#keys-1",
// embeded
{
"id": "did:example:123456789abcdefghi#keys-2",
"type": "Ed25519VerificationKey2020",
"controller": "did:example:123456789abcdefghi",
"publicKeyMultibase": "zH3C2AVvLMv6gmMNam3uVAjZpfkcJCwDwnZn6z3wXmqPV"
}
],
If authentication is established, it is up to the DID method or other application to decide what to do with that information.
A particular DID method could decide that authenticating as a DID controller is sufficient to, for example, update or delete the DID document.
Another DID method could require different keys, or a different verification method entirely, to be presented in order to update or delete the DID document than that used to authenticate.
The assertionMethod
verification relationship is used to specify how the DID subject is expected to express claims, such as for the purposes of issuing a Verifiable Credential
The keyAgreement
verification relationship is used to specify how an entity can generate encryption material in order to transmit confidential information intended for the DID subject, such as for the purposes of esta blishing a secure communication channel with the recipient.
An example of when this property is useful is when encrypting a message intended for the DID subject. In this case, the counterparty uses the cryptographic public key information in the verification method to wrap a decryption key for the recipient.
The capabilityInvocation verification relationship is used to specify a verification method that might be used by the DID subject to invoke a cryptographic capability, such as the authorization to update the DID Document.
I could not understand it completely : https://www.w3.org/TR/did-core/#capability-invocation
https://www.w3.org/TR/did-core/#capability-delegation
These are values to be used for the type
field in a verification method object.
https://w3c-ccg.github.io/security-vocab/#classes
https://w3c.github.io/did-spec-registries/#service
Review any applicable local law when considering developing or operating a decentralized identifier method.
https://w3c.github.io/did-imp-guide/#compliance
DID implementers guide
Understand this: A DID developer's guide to understanding and implementing Decentralized Identifiers
https://w3c.github.io/did-imp-guide/