Topic F: Digital Credentials API (former known as browser API) #361
Replies: 13 comments 22 replies
-
Very important also for Payment within the EUIDW! |
Beta Was this translation helpful? Give feedback.
-
Backed by the EU LSP NOBID and EWC we integrate full payment or just SCA into the EUDIWs by leveraging OIDVP. |
Beta Was this translation helpful? Give feedback.
-
From § 2.2:
The current position of Mozilla towards this standard is negative:
Do we know more about the privacy and exclusion risks? Since the current URI scheme approach also works with Firefox and alternative browsers, would adoption of the Digital Credentials API mean forcing EUDIW users to switch to Chrome and other compliant browsers? |
Beta Was this translation helpful? Give feedback.
-
From § 3 – Privacy preservation:
The Digital Credentials API seems to pass the Some browser vendors are also in the business of user tracking and profiling. Legally, the GDPR limits their ability to reuse any data obtained for the purpose of providing access to web resources. This also seems to be the current practice, at least for third-party web resources. Are additional technical controls required to prevent browser vendors from using Digital Credentials API data for other purposes than those listed in the spec? |
Beta Was this translation helpful? Give feedback.
-
From § 3 – Technological Neutrality and Cross-Platform Interoperability:
To whom does this requirement apply / who SHALL only consider this API? In general, are legal controls in place to manage the “overexcited gatekeeper” risk? Just like with Web PKI, browser/OS vendors will need to have their own governance on top of the public EUDI framework, for example to:
For QWAC, this seems to require highly specific regulation. Is the expectation that this is less needed for EUDIW? |
Beta Was this translation helpful? Give feedback.
-
On behalf of the Spanish Data Protection Authority (AEPD) The attached document contains our comments on this topic. Thank you very much for this opportunity to contribute to this important discussion. |
Beta Was this translation helpful? Give feedback.
-
[We are replying today on behalf of Google Ireland Limited, provider of the products and services Google offers to its users in the EEA and Switzerland.] Several stakeholders within the Chrome and Android teams have reviewed this and we believe it aligns with our product plans and goals. We especially agree with the callouts for openness and neutrality in protocols and formats, and with the sentiment of the browser having a role in protecting user safety on the web without intersecting the role of government certification programs. There are two areas where we suggest improvements in the language which may be helpful in reducing the potential for confusion:
Thank you, |
Beta Was this translation helpful? Give feedback.
-
I am speaking on behalf of Talao (Wallet Provider). Furthermore let's not lie to ourselves, Chrome + the Google wallet on a Pixel 9 will always be much more user-friendly than any other combination and this is also a problem we cannot ignore here. There are many essential conditions imposed on the APIs in this documentation but despite everything, integrating the browser into the protocol as mandatory remains, from our point of view, a global threat and we regret that this question is not in the discussion. |
Beta Was this translation helpful? Give feedback.
-
I completely agree with some of the comments above regarding the usability and user experience when using these APIs in a browser, which will undoubtedly enhance the experience for citizens across Europe. |
Beta Was this translation helpful? Give feedback.
-
@phin10 It seems that many have expressed their opposition to the recommendation of using DC APIS manadatory. Will this be taken into account? |
Beta Was this translation helpful? Give feedback.
-
Many commenters here are worried about the privacy implications of using a browser as an intermediary for receiving a credential request from a relying party and for sending a credential response to the relying party. The credential request and the credential response passed via the Digital Credentials API can be encrypted so that only the wallet and the relying party can see their contents. Regarding the credential response the discussion paper has (at the moment) the following requirement in it which requires the credential response to be encrypted:
Encryption of the response can be achieved by using JWT Secured Authorization Response Mode for OAuth 2.0 (JARM). What is currently lacking in terms of requirements is the encryption of the credential request. Encryption of the request can be, in turn, achieved by using JWT-Secured Authorization Request (JAR). Encrypting a JAR requires key exchange between the relying party and the wallet. How the key exchange is done needs to be specified. |
Beta Was this translation helpful? Give feedback.
-
@paolo-de-rosa Thank you for your response and sorry for the delay. Yes, the implementation of DC APIs in the ARF is problematic to us. The subject is not new, it was addressed and debated passionately several months ago within the framework of the working group on protocols but we did not think that these APIs would one day be integrated into the ARF and there is today objectively a fairly shared opposition to their introduction. There is no doubt that the added value of DC APIs and the correctness of the technical augmentation, but the disadvantages of their use for EUDIW in particular in today's context seem too important to us. At the architectural level: Whatever the implementation precautions, the transfer of the transport layer of two of the most important functions of a wallet (collecting and presenting attestations) to the underlying platform amounts to sharing the trust and the user mediation with the browser and the OS.
At the level of the approach: Certainly, the concept and a model of the DC API was presented at the initiative of US Big Techs but immediately since then the cooperation between the teams working on the protocols and the development teams of US Big Techs has been intense. The use cases of some have transformed into specifications for others. US Big Techs have seized this opportunity that has been given to them to make themselves indispensable and we ultimately « subcontracted » to US Big Techs the implementation of these APIs for better efficiency of our wallet. Without EUDIW DC APIS would even not exist, today we could rename them the EUDIW APIs to be fairer. Of course, this is more efficient, faster, more secure, and could be perceived as enriching for all parties but what becomes of the sovereignty of EUDIW in all this? The main problem is indeed the dependence that we built on some companies which will have harmful consequences:
And then there is the context which has changed recently, US Big Techs are no longer partners today and we are entering a phase of confrontation for compliance with our regulations with companies that have displayed their hostility to these rules. Of course, we can always put that aside and say that this is beyond us, architects and developers, but concretely, here and today with the introduction of DC APIs in the ARF we are setting up a new dependency that we could avoid. We have noted all the precautions that you indicate in your response to temper the implementation of these APIs by emphasizing the “non-normative” aspect of the document but given the very explicit recommendations are already given in the specifications of the protocols themselves, the fact of introducing them into the ARF is a signal given for their implementation in the prototypes of the EUDIW. And then what is the point of integrating them today if it is not to implement them? A reasonable solution now would be to:
This summarizes in a few points our comments and suggestions on this subject. |
Beta Was this translation helpful? Give feedback.
-
What you say is absolutely clear. The position I propose is not against a future use of DC APIs. The position is to take time to let this new standard becoming a reality and get a bit of track records and then reassess the balance between risks and advantages.
Le mardi, mars 4, 2025, 1:08 AM, Rick Byers ***@***.***> a écrit :
Speaking again in an entirely personal capacity I just want to point out that reliance on custom schemes is also a dependency on an API controlled by browsers and operating systems (even though it's not as clear in that case). Indeed, if Chrome does decide that in some contexts we need to warn users about potentially abusive use of their ID, we would expect to do so equally whether the transport is the DC API, custom schemes or anything else. We even already have a history of having Chrome intervene against custom-scheme navigations when we see they are used in the wild to attack other vulnerable browsers on the device (eg. a Chrome user clicking on a malicious advertisement getting redirected into a different browser app supporting a certain custom scheme, which then loads a web page exploiting a security vulnerability in that second browser). So just because there is no specification (and only limited documentation) for how browsers/OSes interact with custom schemes, please do not make the mistake of assuming that that means it is not an "API" subject to potential intervention and manipulation from the platform.
There are parallels in this debate with the one at the W3C about Brave's formal objection to the Digital Credential API. There the W3C council concluded that there are indeed risks to this API, but that going through a W3C-goverened standards process reduces those risks relative to the alternative of the ecosystem developing via a non-standards-based transport mechanism like custom schemes which has none of the equivalent governance or transparency and inclusion in it's design process.
So, here I think the legitimate concern to be debated is not:
Are there risks to relying on the Digital Credentials API whose implementation is controlled by browsers and mobile OSes?
But instead:
Given that mobile wallets accessed from the web must rely on some OS/browser-controlled transport mechanism, to what extent are the risks increased or decreased by relying on the W3C standards-track Digital Credentials transport (where it exists in a form meeting our requirements) vs. only the non-standard custom scheme transport?
I leave it to you all to debate that (I am not taking a position here since clearly I am biased). But I hope this additional evidence is helpful in your analysis.
—
Reply to this email directly, view it on GitHub, or unsubscribe.
You are receiving this because you were mentioned.Message ID: ***@***.***>
|
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Welcome to the discussion on the Digital Credentials API, part of the ongoing development of the Architecture and Reference Framework (ARF) for the European Digital Identity (EUDI) Wallet.
This discussion is based on Topic F: Digital Credentials API discussion paper.
The seamless integration of Wallet Units with web browsers and mobile apps is crucial for implementing secure and efficient attestation presentation interfaces. Without such integration, it will be difficult to ensure the security of remote transaction flows, in which the Relying Party accesses the Wallet Instance over the internet. In addition, involving the browser in such transactions also will improve user experience, in particular in cases where multiple Wallet Instances are present on the User's device. A number of challenges are to be discussed, such as:
It is needed to define high-level requirements for the interface between the wallet and browsers and/or the operating
system for incorporation in the ARF. These requirements are currently under discussion and being standardized through the Digital Credential API at W3C. The protocols to be used with this API, including message structures and contents, are being standardized by ISO and the OpenID Foundation.
This discussion is part of a structured process to refine and complete the ARF, with your input playing a vital role. We invite you to share your comments, insights, and suggestions here. Your contributions will be carefully reviewed and considered as we work towards the next version of the ARF, which will incorporate updates on this topic.
Thank you for participating in this important conversation.
Beta Was this translation helpful? Give feedback.
All reactions