Chairs: Robert Ott, Niels van Dijk, Gert De Braekeleer
Supported by: Licia Florio, Michelle Williams
Monday 19th September 2022, 14:00-16:00 CET
https://events.geant.org/event/1130/
AGENDA | ||
14:00-14:05 | Welcome Follow up to June's meeting | Notes: |
14:05-14:35 | Klaas provided an update on the latest round of EC calls on EU ID wallets and the likes. EBSI is still growing and needs to keep growing; eIDAS uptake is growing but it is very much driven by the member states. The diploma use-case has been on the agenda for some time and the Erasmus+ has provided an additional dimension to that (i.e. microdentials, etc). For this specific use-case there has been significant effort in the past 20 years that produced a production infrastructure. There were five calls were open, two of which interesting for the NRENs, one about the EBSI and the other one about eIDAS and wallets; GEANT participate in the EBSI proposal as an associated partner and in the wallet call (Digital Credentials for Europe, DI4EU) has a beneficiary. The proposals were submitted in July; the evaluation results are expected in November. Paco noted that tension between the eGov driven and the education driven IDs is less big than in the past; the biggest challenge now is about the aggregation of personal information (the expectation was that eIDAS would solve but that is not the case), so particularly for the diploma’s case the universities will play a bigger role possibly. | |
14:35-15:00 | Niels provided an overview on Microsoft Entra, the new capability that recently entered into production as part of Azure. ENTRA Is a verifiable credential Expert Issuance Issuance and Verifier sample. It is worth noting that in this solution the wallet does not communicate directly with the ledger but all the communication goes via Azure - this bears the question if this can still be considered an SSI solution. It’s not clear if one can independently validate transactions against the ION ledger. Niels pointed out that two features that would assert studentness. It is important to note also that in this implementation there is no selective release of credentials by users - the only way would be to create a new card with less information which is not very desirable. There are no schema in this ecosystem, how the verify know what to request from the issuer? Microsoft built a service where for any given issuer, the verifier can see what credentials they support. The issuer cannot bind a set of credentials to a verifier. Lastly both the issuers and the verifier must have an azure instance. | |
Future meetings: |
AGENDA TBC | Not enough people in the room to validate the proposed date. |
Post event survey: https://events.geant.org/event/1130/manage/surveys/ |
Meeting recording:
Attending: