Closed PhilippGackstatter closed 1 year ago
This is what I tend to use:
I recommend NOT using any key representation that is not trivial to convert to a JWKS.
@selfissued @mprorock we should have a controller document to the appending that answers this.
The document contains some examples, but in general the 2 concepts are seperate.
Hello,
we are implementing VC-JWT and were wondering what the
type
of a verification method should be when signing a credential according toVC-JWT
. It seems the spec does not place any restrictions on that, but are there recommendations to maximize interoperability?Thanks!