Skip to content

Conversation

@ticapix
Copy link

@ticapix ticapix commented Jun 5, 2025

in the context of #8:

update the EDC section to fix principal inconsistencies:

  • DID stands for identifiers, not identities: only the identifiers can be technically or from a governance PoV decentralised.
    An identity is not decentralised.

  • A DID is not verified, it's resolved. A DID document is not signed and the content can't be verified using cryptographic material.
    The "trust" from a DID comes from the governance of the DID method and the associated issuance rules.

  • A DID resolution depends of the DID method and has nothing to do with the VDR
    However a DID can be accepted or not by a recipient by using the VDR.

  • Unless a quote of the Eclipse DSP spec is provided, DSP is message exchange protocol agnostic.

Also, it seems to me that the DCP workflow being described here is breaking the W3C VC trust model by introducing the STS component, instead of using the VDR for what it's for.
I leave the original authors of this document to appreciate the irony of promoting decentralisation and introducing contradicting evidence from their proposed protocol

@mspiekermann
Copy link
Contributor

There is no EDC section so I changed PR's title

@mspiekermann mspiekermann changed the title update EDC section update DCP section Jun 12, 2025
@jimmarino
Copy link

jimmarino commented Jun 12, 2025

Also, it seems to me that the DCP workflow being described here is breaking the W3C VC trust model by introducing the STS component, instead of using the VDR for what it's for. I leave the original authors of this document to appreciate the irony of promoting decentralisation and introducing contradicting evidence from their proposed protocol

You are misunderstanding what the STS is. The STS is simply a logical representation of a token generator that is purely internal to a participant acting in a consumer role. I would recommend reviewing the DCP specification before erroneously claiming that the concept of the STS violates the "W3C VC trust model."

Also, I don't understand what this has to do with the EDC.

The verifier also operates a Participant Agent that engages with the holder agent. When it receives a request, it will resolve the holder’s DID document and through this resolve the endpoint for the holder’s Credential Service. It will then send a request for a Verifiable Presentation to the Credential Service, which includes the access token received from the holder’s agent. The participant agent will then match the credentials returned in the Verifiable Presentation against the policy constraints associated the original dataspace request.

This enables the establishment of consent for the release and access to a protected resource. Since the Dataspace Protocol is built on machine-to-machine message exchange patterns for Software Agents (Dataspace Connectors), end-user consent is not applicable.
This enables the establishment of consent for the release and access to a protected resource. Since the Dataspace Protocol is agnostic of the message exchange protocol, machine-to-machine message exchange patterns is supported with Software Agents (Dataspace Connectors), end-user consent is not needed.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

this 'agnostic of the message exchange protocol' is unclear, can you please explain.

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

From those lines:

I understand that DSP specifies the Messages and the sequence of those Messages with state-machines.

How are those messages exchanged, how are proofs and proofs presentations done are out of scope and HTTP bindings are an example, right ?
To my understanding, one could implement DSP over GRPC or SMTP, no ?

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Please take a closer look at the DSP specification. The HTTP bindings are marked as normative and also verified by the TCK. Someone could define a binding to another protocol, but HTTP is mandatory for interoperability.

This process enables the issuer entity to issue a verifiable credential to the credential store of the organization.

During the negotiation of a data sharing contract the participant offering the contract will ask the organization which requests the data sharing contract to provide verifiable credentials that contain proof that the policy is being met. Those claims need to be verified with a verifier to know whether they are to be trusted.
During the negotiation of a data sharing contract the participant offering the contract will ask the organization which requests the data sharing contract to provide verifiable credentials that contain proof that the policy is being met. Those claims and evidence need to be verified with a verifier to know whether they are to be trusted.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Still unclear about this evidence. Please explain and justify. It is not related to this document.

Copy link
Member

@ssteinbuss ssteinbuss left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

see inline comments

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants