<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.17 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-demarco-oauth-status-assertions-02" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.21.0 -->
  <front>
    <title abbrev="OAuth Status Assertions">OAuth Status Assertions</title>
    <seriesInfo name="Internet-Draft" value="draft-demarco-oauth-status-assertions-02"/>
    <author fullname="Giuseppe De Marco">
      <organization>Dipartimento per la trasformazione digitale</organization>
      <address>
        <email>gi.demarco@innovazione.gov.it</email>
      </address>
    </author>
    <author fullname="Orie Steele">
      <organization>Transmute</organization>
      <address>
        <email>orie@transmute.industries</email>
      </address>
    </author>
    <author fullname="Francesco Marino">
      <organization>Istituto Poligrafico e Zecca dello Stato</organization>
      <address>
        <email>fa.marino@ipzs.it</email>
      </address>
    </author>
    <date year="2024" month="June" day="18"/>
    <keyword>digital credentials</keyword>
    <keyword>revocation</keyword>
    <abstract>
      <?line 106?>

<t>Status Assertion is a signed object that demonstrates the validity status of a
digital credential.
These assertions are periodically provided
to holders, who can present these to verifier along
with the corresponding digital credentials.
The approach outlined in this document
makes the verifier able to check the non-revocation of a digital credential
without requiring to query any third-party entities.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://peppelinux.github.io/draft-demarco-oauth-status-assertions/draft-demarco-oauth-status-assertions.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-demarco-oauth-status-assertions/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/peppelinux/draft-demarco-oauth-status-assertions"/>.</t>
    </note>
  </front>
  <middle>
    <?line 117?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Status Assertions ensure the non-revocation of digital
credentials, whether in JSON Web Tokens (JWT) or CBOR Web Tokens (CWT)
format. Status Assertions function
similarly to OCSP Stapling (<xref target="RFC6066"/>), allowing clients to present to the
relying parties
time-stamped assertions provided by the credential issuer.
The approach outlined in this specification enables the
verification of credentials against revocation without
direct queries to third-party systems,
enhancing privacy, reducing latency, and
faciliting offline verification.</t>
      <t>The figure below illustrates the process by which a client,
such as a wallet instance,
requests and obtains a Status Assertion from the credential issuer.</t>
      <artwork type="ascii-art"><![CDATA[
+-----------------+                              +-------------------+
|                 | Requests Status Assertions   |                   |
|                 |----------------------------->|                   |
| Client          |                              | Credential Issuer |
|                 | Status Assertions            |                   |
|                 |<-----------------------------|                   |
+-----------------+                              +-------------------+
]]></artwork>
      <t><strong>Figure 1</strong>: Status Assertion Issuance Flow.</t>
      <t>The figure below illustrates the process by which a client
presents the Status Assertion along with the corresponding digital credential.</t>
      <artwork type="ascii-art"><![CDATA[
+-- ----------------+                             +----------+
|                   | Presents Digital Credential |          |
| Client            | and Status Assertion        | Verifier |
|                   |---------------------------->|          |
+-------------------+                             +----------+
]]></artwork>
      <t><strong>Figure 2</strong>: Status Assertion Presentation Flow.</t>
      <t>In summary, the credential issuer provides the client with a
Status Assertion, which is linked to a Digital Credential. This enables
the client to present both the digital credential and its
Status Assertion to a verifier as proof of the digital credential's
validity status.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>This specification uses the terms "End-User", "Entity" as defined by
OpenID Connect Core <xref target="OpenID.Core"/>, the term "JSON Web Token (JWT)"
defined by JSON Web Token (JWT) <xref target="RFC7519"/>,
the term "CBOR Web Token (CWT)" defined in <xref target="RFC8392"/>, "Client" as
defined <xref target="RFC6749"/>, "Verifiable Presentation" defined in [@OpenID4VP].</t>
      <dl>
        <dt>Digital Credential:</dt>
        <dd>
          <t>A set of one or more claims about a subject made by a Credential Issuer.
Alternative names are "Verifiable Credential" or "Credential".</t>
        </dd>
        <dt>Holder:</dt>
        <dd>
          <t>An entity that possesses Verifiable Credentials and has
control over them to present them to the Verifiers as Verifiable Presentations.</t>
        </dd>
        <dt>Credential Issuer:</dt>
        <dd>
          <t>Entity that is responsible for the issuance of the Digital Credentials.
The Issuer is responsible for the lifecycle of their issued
Digital Credentials and their validity status.</t>
        </dd>
        <dt>Verifier:</dt>
        <dd>
          <t>Entity that relies on the validity of the Digital Credentials presented to it.
This Entity, also known as a Relying Party, verifies the authenticity and
validity of the Digital Credentials, including their revocation status,
before accepting them.</t>
        </dd>
        <dt>Wallet Instance:</dt>
        <dd>
          <t>The digital Wallet in control of a User, also known as Wallet.
It securely stores the User's Digital Credentials. It can present
Digital Credentials to Verifiers
and request Status Assertions from Issuers under the control of the User.
For the purposes of this specification, the Wallet Instance is
considered as a Client.</t>
        </dd>
      </dl>
    </section>
    <section anchor="rationale">
      <name>Rationale</name>
      <t>There are cases where the Verifier only needs
to check the revocation status of a Digital Credential at the time of
presentation, and therefore it should not be allowed to
check the status of a Digital Credential over time due to some
privacy constraints,
in compliance with national privacy regulations.</t>
      <t>For instance, consider a scenario where a Verifier's repeated access to a
status list, such as the one defined in
<xref target="draft-ietf-oauth-status-list"/>
to check the revocation status of a Digital Credential could
be deemed as excessive monitoring of the End-User's activities.</t>
      <t>This could potentially infringe upon the End-User's right to privacy,
as outlined in
<xref target="ECHR-ART8"/> and
in the the European Union's General Data Protection Regulation
<xref target="GDPR"/>,
by creating a detailed profile of the End-User's
Digital Credential status without explicit consent for
such continuous surveillance.</t>
    </section>
    <section anchor="requirements">
      <name>Requirements</name>
      <t>The general requirements for the implementation of Status Assertion are
listed in this section. The Status Assertion:</t>
      <ul spacing="normal">
        <li>
          <t><bcp14>SHOULD</bcp14> be presented in conjunction with the Digital Credential.</t>
        </li>
        <li>
          <t><bcp14>MUST</bcp14> include information that links it to the
referenced Digital Credential;</t>
        </li>
        <li>
          <t><bcp14>MUST</bcp14> be timestamped with its issuance datetime,
using a timestamp which is at or after the time of
Digital Credential issuance which it refers;</t>
        </li>
        <li>
          <t><bcp14>MUST</bcp14> contain the expiration datetime after which
the Status Assertion <bcp14>MUST NOT</bcp14> be considered valid anymore,
and the Digital Credential it refers
<bcp14>SHOULD NOT</bcp14> be considered valid anymore. The expiration datetime <bcp14>MUST</bcp14> be
superior to the Status Assertion issuance datetime and it <bcp14>MUST</bcp14> end before
the expiration datetime of the Digital Credential;</t>
        </li>
        <li>
          <t><bcp14>MUST</bcp14> enable the offline use cases by employing validation using
a cryptographic signature and the cryptographic public key of the
Credential Issuer.</t>
        </li>
        <li>
          <t><bcp14>MUST NOT</bcp14> contain personal information about the User who owns
the Digital Credential to which the Status Assertion refers.</t>
        </li>
      </ul>
    </section>
    <section anchor="proof-of-possession-of-a-credential">
      <name>Proof of Possession of a Credential</name>
      <t>The concept of Proof of Possession (PoP) of a Credential within the
framework of the Status Assertion specification encompasses a broader
perspective than merely possessing the digital bytes of the Credential.</t>
      <t>It involves demonstrating rightful control or ownership over the
Credential, which can manifest in various forms depending on the
technology employed and the nature of the Digital Credential itself.
For instance, a Digital Credential could be presented visually (de-visu)
with a personal portrait serving as a binding element.</t>
      <t>While this specification does not prescribe any additional methods
for the proof of possession of the Credential, it aims to offer
guidance for concrete implementations utilizing common proof of
possession mechanisms. This includes, but is not limited to:</t>
      <ol spacing="normal" type="1"><li>
          <t>Having the digital representation of the Digital Credential (the bytes).</t>
        </li>
        <li>
          <t>Controlling the confirmation method of the Credential, using the Credential's <tt>cnf</tt> parameter.</t>
        </li>
      </ol>
      <t>The essence of requiring proof of possession over the Credential
through the confirmation method, such has proving the control of the
cryptographic material related to a Credential, is
to ensure that the entity in possession of the Credential can execute
actions exclusively reserved to the legitimate Holder.
The dual-layered approach of requiring both possession of the
Credential and control over it, reinforces the security and integrity
of the Status Assertion process.
This ensures that the Holder requesting a Status Assertion is indeed
the same Holder to which the Credential was originally issued,
affirming the authenticity and rightful possession of the Credential.</t>
    </section>
    <section anchor="status-assertion-request">
      <name>Status Assertion Request</name>
      <t>The following diagram shows the Wallet Instance requesting a
Status Assertion to a Credential Issuer,
related to a specific Credential issued by the same Credential Issuer.</t>
      <artwork type="ascii-art"><![CDATA[
+-------------------+                                  +--------------------+
|                   |                                  |                    |
|  Wallet Instance  |                                  | Credential Issuer  |
|                   |                                  |                    |
+--------+----------+                                  +----------+---------+
         |                                                        |
         | HTTP POST /status                                      |
         |  status_assertion_requests = [$StatusAssertionRequest] |
         +-------------------------------------------------------->
         |                                                        |
         |  Status Assertion Responses [...]                      |
         <--------------------------------------------------------+
         |                                                        |
+--------+----------+                                  +----------+---------+
|                   |                                  |                    |
|  Wallet Instance  |                                  | Credential Issuer  |
|                   |                                  |                    |
+-------------------+                                  +--------------------+
]]></artwork>
      <t>The Wallet Instance sends the Status Assertion request to the
Credential Issuer, where:</t>
      <ul spacing="normal">
        <li>
          <t>The request <bcp14>MUST</bcp14> contain the base64url encoded hash value of the Digital Credential's
Issuer signed part, such as the Issuer Signed JWT using [@SD-JWT-VC],
or the Mobile Security Object using [@ISO 18013-5],
for which the Status Assertion is requested, and enveloped in a signed
Status Assertion Request object.</t>
        </li>
        <li>
          <t>The Status Assertion Request object <bcp14>MUST</bcp14> be signed with the private key corresponding
to the confirmation claim assigned by the Issuer and contained within
the Digital Credential.</t>
        </li>
      </ul>
      <t>The Status Assertion Request object <bcp14>MUST</bcp14> contain the parameters defined in the following table.</t>
      <table>
        <thead>
          <tr>
            <th align="left">Header</th>
            <th align="left">Description</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">
              <strong>typ</strong></td>
            <td align="left">It <bcp14>MUST</bcp14> be set to <tt>status-assertion-request+jwt</tt> when JWT format is used. It <bcp14>MUST</bcp14> be set to <tt>status-assertion-request+cwt</tt> when CWT format is used.</td>
            <td align="left">
              <xref target="RFC7516"/> Section 4.1.1, <xref target="RFC9596"/></td>
          </tr>
          <tr>
            <td align="left">
              <strong>alg</strong></td>
            <td align="left">A digital signature algorithm identifier such as per IANA "JSON Web Signature and Encryption Algorithms" registry. It <bcp14>MUST NOT</bcp14> be set to <tt>none</tt> or any symmetric algorithm (MAC) identifier.</td>
            <td align="left">
              <xref target="RFC7516"/> Section 4.1.1</td>
          </tr>
        </tbody>
      </table>
      <table>
        <thead>
          <tr>
            <th align="left">Payload</th>
            <th align="left">Description</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">
              <strong>iss</strong></td>
            <td align="left">Status Assertion Request Issuer identifier. The value is supposed to be used for identifying the Wallet that has issued the request. It is out of scope for this document defining how this value should be set.</td>
            <td align="left">
              <xref target="RFC9126"/>, <xref target="RFC7519"/></td>
          </tr>
          <tr>
            <td align="left">
              <strong>aud</strong></td>
            <td align="left">It <bcp14>MUST</bcp14> be set with the Credential Issuer Status Assertion endpoint URL as value that identify the intended audience.</td>
            <td align="left">
              <xref target="RFC9126"/>, <xref target="RFC7519"/></td>
          </tr>
          <tr>
            <td align="left">
              <strong>exp</strong></td>
            <td align="left">UNIX Timestamp with the expiration time of the JWT. It <bcp14>MUST</bcp14> be superior to the value set for <tt>iat</tt> .</td>
            <td align="left">
              <xref target="RFC9126"/>, <xref target="RFC7519"/>, <xref target="RFC7515"/></td>
          </tr>
          <tr>
            <td align="left">
              <strong>iat</strong></td>
            <td align="left">UNIX Timestamp with the time of JWT/CWT issuance.</td>
            <td align="left">
              <xref target="RFC9126"/>, <xref target="RFC7519"/></td>
          </tr>
          <tr>
            <td align="left">
              <strong>jti</strong></td>
            <td align="left">Unique identifier for the JWT.</td>
            <td align="left">
              <xref target="RFC7519"/> Section 4.1.7</td>
          </tr>
          <tr>
            <td align="left">
              <strong>cti</strong></td>
            <td align="left">Unique identifier for the CWT.</td>
            <td align="left">
              <xref target="RFC7519"/> Section 4.1.7</td>
          </tr>
          <tr>
            <td align="left">
              <strong>credential_hash</strong></td>
            <td align="left">Hash value of the Digital Credential the Status Assertion is bound to.</td>
            <td align="left">this specification</td>
          </tr>
          <tr>
            <td align="left">
              <strong>credential_hash_alg</strong></td>
            <td align="left">The Algorithm used of hashing the Digital Credential to which the Status Assertion is bound. The value <bcp14>SHOULD</bcp14> be set to <tt>sha-256</tt>.</td>
            <td align="left">this specification</td>
          </tr>
        </tbody>
      </table>
      <t>Below is a non-normative example of a Status Assertion Request with
the JWT headers and payload represented without applying signature and
encoding:</t>
      <artwork><![CDATA[
{
    "alg": "ES256",
    "typ": "status-assertion-request+jwt"
}
.
{
    "iss": "0b434530-e151-4c40-98b7-74c75a5ef760",
    "aud": "https://issuer.example.org/status-assertion-endpoint",
    "iat": 1698744039,
    "exp": 1698830439,
    "jti": "6f204f7e-e453-4dfd-814e-9d155319408c",
    "credential_hash": $hash-about-Issuer-Signed-JWT
    "credential_hash_alg": "sha-256"
}
]]></artwork>
      <t>Below is a non-normative example of a Status Assertion Request object in CWT format
represented in CBOR diagnostic notation format <xref target="RFC8152"/>, where the CWT headers
and payload are presented without applying signature and encoding for better readability:</t>
      <artwork><![CDATA[
   [
       / protected / << {
       / alg / 1: -7 / ES256 /
       / typ / 16: -7 / status-assertion-request+cwt /
     } >>,
     / unprotected / {
     },
     / payload / << {
       / iss    / 1: 0b434530-e151-4c40-98b7-74c75a5ef760 /,
       / aud    / 3: https://issuer.example.org/status-assertion-endpoint /,
       / iat    / 6: 1698744039 /,
       / exp    / 4: 1698830439 /,
       / cti    / 7: 6f204f7e-e453-4dfd-814e-9d155319408c /,
       / credential_hash / 8: $hash-about-MobileSecurityObject /,
       / credential_hash_alg / 9: sha-256 /
     } >>,
   ]
]]></artwork>
      <t>Below a non-normative example representing a Status Assertion Request array with a
single Status Assertion Request object in JWT format.</t>
      <artwork><![CDATA[
POST /status HTTP/1.1
Host: issuer.example.org
Content-Type: application/json

{
    "status_assertion_requests" : ["${base64url(json({typ: (some pop for status-assertion)+jwt, ...}))}.payload.signature", ... ]
}
]]></artwork>
      <t>The Status Assertion HTTP request can be sent to a single Credential Issuer
regarding multiple Digital Credentials, and <bcp14>MUST</bcp14> contain a JSON object with
the member <tt>status_assertion_requests</tt>.</t>
      <t>The <tt>status_assertion_requests</tt> <bcp14>MUST</bcp14> be set with an array of strings, where
each string within the array represents a Digital Credential
Status Assertion Request object.</t>
      <t>The Credential Issuer that receives the Status Assertion Request object
<bcp14>MUST</bcp14> validate that the Wallet Instance making the request is
authorized to request Status Assertions.
Therefore the following requirements <bcp14>MUST</bcp14> be satisfied:</t>
      <ul spacing="normal">
        <li>
          <t>The Credential Issuer <bcp14>MUST</bcp14> verify the compliance of all elements in the <tt>status_assertion_requests</tt> object
using the confirmation method contained within the Digital Credential where the Status Assertion Request
object is referred to;</t>
        </li>
        <li>
          <t>The Credential Issuer <bcp14>MUST</bcp14> verify that it is the legitimate Issuer of the Digital Credential
to which each Status Assertion Request object refers.</t>
        </li>
      </ul>
    </section>
    <section anchor="status-assertion-response">
      <name>Status Assertion Response</name>
      <t>The response <bcp14>MUST</bcp14> include a JSON object with a member
named <tt>status_assertion_responses</tt>, which contains the
Status Assertions and or the Status Assertion Errors
related to the request made by the
Wallet Instance. In the non-normative example below is
represented an HTTP Response with the
<tt>status_assertion_responses</tt> JSON member:</t>
      <artwork><![CDATA[
HTTP/1.1 200 OK
Content-Type: application/json

{
    "status_assertion_responses": ["${base64url(json({typ: status-assertion+jwt, ...}))}.payload.signature", ... ]
}
]]></artwork>
      <t>The member <tt>status_assertion_responses</tt> <bcp14>MUST</bcp14> be an array of strings,
where each of them represent a Status Assertion Response object,
as defined in
<xref target="status-assertion">the section Status Assertion</xref> or a Status Assertion Error object,
as defined in <xref target="status-assertion-error">the section Status Error</xref>.</t>
      <t>For each entry in the <tt>status_assertion_responses</tt> array, the following requirements are met:
- Each element in the array <bcp14>MUST</bcp14> match the corresponding element in the request array at
the same position index to which it is related, eg: <em>[requestAboutA, requestAboutB]</em> may produce <em>[responseAboutA, responseErrorAboutB]</em>.
- Each element <bcp14>MUST</bcp14> contain the error or the status of the assertion, using the <tt>typ</tt> member
set to "status-assertion+{jwt,cwt}" or "status-assertion-error+{jwt,cwt}", depending by the object type.
- The corresponding entry in the response <bcp14>MUST</bcp14> be of the same data format as requested. For example,
if the entry in the request is "jwt", then the entry at the same position in the response <bcp14>MUST</bcp14> also be "jwt".
- The corresponding entry in the response <bcp14>MUST NOT</bcp14> contain any
information regarding the Verifier to whom it may be presented,
such as the Verifier identifier as the intended audience.</t>
    </section>
    <section anchor="status-assertion-error">
      <name>Status Assertion Error</name>
      <t>If the Status Assertion is requested for a non-existent, expired, revoked
or invalid Digital Credential, the
Credential Issuer <bcp14>MUST</bcp14> respond with an HTTP Response with the status
code set to 200 and the <tt>status_assertion_responses</tt> array with the related
Status Assertion Error object.</t>
      <t>The Status Assertion Error <bcp14>MUST NOT</bcp14> be presented or provided to a Verifier,
the only audience of the Status Assertion Error is the Holder of the Credential
that has requested the Status Assertion. Therefore,
it is not necessary that the Status Assertion Error
contains the parameter <tt>aud</tt>; if present, it <bcp14>MUST</bcp14> be set to the same
value as the <tt>iss</tt> parameter used by the Wallet in the corresponding
Status Assertion Request object.</t>
      <t>Below a non-normative example of a Status Assertion Error object in JWT format,
with the headers and payload represented in JSON and without applying the signature.</t>
      <artwork><![CDATA[
{
    "alg": "ES256",
    "typ": "status-assertion-error+jwt",
    "kid": "Issuer-JWK-KID"
}
.
{
    "iss": "https://issuer.example.org",
    "jti": "6f204f7e-e453-4dfd-814e-9d155319408c"
    "credential_hash": $hash-about-Issuer-Signed-JWT,
    "credential_hash_alg": "sha-256",
    "error": "credential_revoked",
    "error_description": "Credential is revoked."
    }
}
]]></artwork>
      <t>The Status Assertion Error object <bcp14>MUST</bcp14> contain the parameters described in the
table below:</t>
      <table>
        <thead>
          <tr>
            <th align="left">Header</th>
            <th align="left">Description</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">
              <strong>typ</strong></td>
            <td align="left">
              <bcp14>REQUIRED</bcp14>. Depending on the related Status Assertion Request object format, it <bcp14>MUST</bcp14> be set to <tt>status-assertion-error+jwt</tt> or <tt>status-assertion-error+cwt</tt>.</td>
            <td align="left">
              <xref target="RFC7516"/> Section 4.1.1</td>
          </tr>
          <tr>
            <td align="left">
              <strong>alg</strong></td>
            <td align="left">
              <bcp14>REQUIRED</bcp14>. Algorithm used to verify the cryptographic signature of the Status Assertion Error. Status Assertion Error that do not need to be signed <bcp14>SHOULD</bcp14> set the <tt>alg</tt> value to <tt>none</tt>. For further clarification about the requirement of signing the Status Assertion Errors, see Section <xref target="rationale-about-the-unsigned-status-assertion-errors">Rationale About The Unsigned Status Assertion Errors</xref>.</td>
            <td align="left">
              <xref target="RFC7516"/> Section 4.1.1</td>
          </tr>
        </tbody>
      </table>
      <table>
        <thead>
          <tr>
            <th align="left">Payload</th>
            <th align="left">Description</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">
              <strong>iss</strong></td>
            <td align="left">
              <bcp14>REQUIRED</bcp14>. It <bcp14>MUST</bcp14> be set to the identifier of the Issuer.</td>
            <td align="left">
              <xref target="RFC9126"/>, <xref target="RFC7519"/></td>
          </tr>
          <tr>
            <td align="left">
              <strong>jti</strong></td>
            <td align="left">
              <bcp14>REQUIRED</bcp14>. Unique identifier for the JWT.</td>
            <td align="left">
              <xref target="RFC7519"/> Section 4.1.7</td>
          </tr>
          <tr>
            <td align="left">
              <strong>credential_hash</strong></td>
            <td align="left">
              <bcp14>REQUIRED</bcp14>. The hash value <bcp14>MUST</bcp14> match the one contained in the Status Assertion Request to which the Status Assertion Error is related.</td>
            <td align="left">this specification</td>
          </tr>
          <tr>
            <td align="left">
              <strong>credential_hash_alg</strong></td>
            <td align="left">
              <bcp14>REQUIRED</bcp14>. The hash algorithm <bcp14>MUST</bcp14> match the one contained in the Status Assertion Request to which the Status Assertion Error is related.</td>
            <td align="left">this specification</td>
          </tr>
          <tr>
            <td align="left">
              <strong>error</strong></td>
            <td align="left">
              <bcp14>REQUIRED</bcp14>. The value <bcp14>SHOULD</bcp14> be assigned with one of the error types defined in <xref target="RFC6749"/><eref target="https://tools.ietf.org/html/rfc6749#section-5.2">Section 5.2</eref> or defined in the Section <eref target="status-assertion-error-values">Status Assertion Error Values</eref>.</td>
            <td align="left">
              <xref target="RFC7519"/> Section 4.1.7</td>
          </tr>
          <tr>
            <td align="left">
              <strong>error_description</strong></td>
            <td align="left">
              <bcp14>OPTIONAL</bcp14>. Text that clarifies the nature of the error, such as attribute changes, revocation reasons, in relation to the <tt>error</tt> value.</td>
            <td align="left">
              <xref target="RFC7519"/> Section 4.1.7</td>
          </tr>
        </tbody>
      </table>
      <section anchor="rationale-about-the-unsigned-status-assertion-errors">
        <name>Rationale About The Unsigned Status Assertion Errors</name>
        <t>To mitigate potential resource exhaustion attacks where an adversary could issue hundreds of fake Status Assertion Requests to force an Issuer to sign numerous Status Assertion Errors, it is advisable to set the header parameter<tt>alg</tt> value to <tt>none</tt> for Status Assertion Errors that do not require signatures. This approach conserves computational resources and prevents abuse, especially in scenarios where the Issuer's implementation could be vulnerable to resource exhaustion attacks. However, even if it is out of the scopes of this specification determine in which the Status Error Assertion signatures are necessary, when the Issuer signs the Status Assertion Errors the Client that received them <bcp14>MUST</bcp14> validate the signature.</t>
      </section>
      <section anchor="status-assertion-error-values">
        <name>Status Assertion Error Values</name>
        <t>The <tt>error</tt> parameter for the Status Assertion Error object <bcp14>MUST</bcp14> be set with one of the values defined in the table below, in addition to the values specified in <xref target="RFC6749"/>:</t>
        <table>
          <thead>
            <tr>
              <th align="left">Error Parameter Value</th>
              <th align="left">Description</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">
                <strong>credential_revoked</strong></td>
              <td align="left">The Digital Credential results as already revoked. The reason of revocation <bcp14>MAY</bcp14> be provided in the <tt>error_description</tt> field.</td>
              <td align="left">this specification</td>
            </tr>
            <tr>
              <td align="left">
                <strong>credential_updated</strong></td>
              <td align="left">One or more information contained in the Digital Credential are changed. The <tt>error_description</tt> field <bcp14>SHOULD</bcp14> contain a human-readable text describing the general parameters updated without specifying each one.</td>
              <td align="left">this specification</td>
            </tr>
            <tr>
              <td align="left">
                <strong>credential_invalid</strong></td>
              <td align="left">The Digital Credential is invalid. The <tt>error_description</tt> field <bcp14>SHOULD</bcp14> contain the reason of invalidation.</td>
              <td align="left">this specification</td>
            </tr>
            <tr>
              <td align="left">
                <strong>invalid_request_signature</strong></td>
              <td align="left">The Status Assertion Request signature validation has failed. This error type is used when the proof of possession of the Digital Credential is found not valid within the Status Assertion Request.</td>
              <td align="left">this specification</td>
            </tr>
            <tr>
              <td align="left">
                <strong>credential_not_found</strong></td>
              <td align="left">The <tt>credential_hash</tt> value provided in the Status Assertion Request doesn't match with any active Digital Credential.</td>
              <td align="left">this specification</td>
            </tr>
            <tr>
              <td align="left">
                <strong>unsupported_hash_alg</strong></td>
              <td align="left">The hash algorithm set in <tt>credential_hash_alg</tt> is not supported.</td>
              <td align="left">this specification</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
    <section anchor="status-assertion">
      <name>Status Assertion</name>
      <t>When a Status Assertion is requested to a Credential Issuer, the
Issuer checks the status of the Digital Credential and creates a
Status Assertion bound to it.</t>
      <t>If the Digital Credential is valid, the Credential Issuer
creates a new Status Assertion,
which a non-normative example is given below
where the format is JWT.</t>
      <artwork><![CDATA[
{
    "alg": "ES256",
    "typ": "status-assertion+jwt",
    "kid": $ISSUER-JWKID
}
.
{
    "iss": "https://issuer.example.org",
    "iat": 1504699136,
    "exp": 1504785536,
    "credential_hash": $hash-about-Issuer-Signed-JWT,
    "credential_hash_alg": "sha-256",
    "cnf": {
        "jwk": {...}
    }
}
]]></artwork>
      <t>The Status Assertion <bcp14>MUST</bcp14> contain the parameters defined below.</t>
      <table>
        <thead>
          <tr>
            <th align="left">Header Parameter Name</th>
            <th align="left">Description</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">
              <strong>alg</strong></td>
            <td align="left">A digital signature algorithm identifier such as per IANA "JSON Web Signature and Encryption Algorithms" registry. It <bcp14>MUST NOT</bcp14> be set to <tt>none</tt> or to a symmetric algorithm (MAC) identifier.</td>
            <td align="left">
              <xref target="RFC7515"/>, <xref target="RFC7517"/></td>
          </tr>
          <tr>
            <td align="left">
              <strong>typ</strong></td>
            <td align="left">It <bcp14>MUST</bcp14> be set to <tt>status-assertion+jwt</tt> when JWT format is used. It <bcp14>MUST</bcp14> be set to <tt>status-assertion+cwt</tt> when CWT format is used.</td>
            <td align="left">
              <xref target="RFC7515"/>, <xref target="RFC7517"/> and this specification</td>
          </tr>
          <tr>
            <td align="left">
              <strong>kid</strong></td>
            <td align="left">Unique identifier of the Credential Issuer JWK. It is required when <tt>x5c</tt> or other cryptographic public key resolution identifiers are not used.</td>
            <td align="left">
              <xref target="RFC7515"/></td>
          </tr>
          <tr>
            <td align="left">
              <strong>x5c</strong></td>
            <td align="left">X.509 certificate chain about the Credential Issuer. It is required when <tt>kid</tt> or other parameter are not used.</td>
            <td align="left">
              <xref target="RFC7515"/></td>
          </tr>
        </tbody>
      </table>
      <table>
        <thead>
          <tr>
            <th align="left">Payload Parameter Name</th>
            <th align="left">Description</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">
              <strong>iss</strong></td>
            <td align="left">It <bcp14>MUST</bcp14> be set to the identifier of the Issuer.</td>
            <td align="left">
              <xref target="RFC9126"/>, <xref target="RFC7519"/></td>
          </tr>
          <tr>
            <td align="left">
              <strong>iat</strong></td>
            <td align="left">UNIX Timestamp with the time of the Status Assertion issuance.</td>
            <td align="left">
              <xref target="RFC9126"/>, <xref target="RFC7519"/></td>
          </tr>
          <tr>
            <td align="left">
              <strong>exp</strong></td>
            <td align="left">UNIX Timestamp with the expiration time of the JWT. It <bcp14>MUST</bcp14> be greater than the value set for <tt>iat</tt>.</td>
            <td align="left">
              <xref target="RFC9126"/>, <xref target="RFC7519"/>, <xref target="RFC7515"/></td>
          </tr>
          <tr>
            <td align="left">
              <strong>credential_hash</strong></td>
            <td align="left">Hash value of the Digital Credential the Status Assertion is bound to.</td>
            <td align="left">this specification</td>
          </tr>
          <tr>
            <td align="left">
              <strong>credential_hash_alg</strong></td>
            <td align="left">The Algorithm used of hashing the Digital Credential to which the Status Assertion is bound. The value <bcp14>SHOULD</bcp14> be set to <tt>sha-256</tt>.</td>
            <td align="left">this specification</td>
          </tr>
          <tr>
            <td align="left">
              <strong>cnf</strong></td>
            <td align="left">JSON object containing confirmation methods. The sub-member contained within <tt>cnf</tt> member, such as <tt>jwk</tt> for JWT and <tt>Cose_Key</tt> for CWT, <bcp14>MUST</bcp14> match with the one provided within the related Digital Credential. Other confirmation methods can be utilized when the referenced Digital Credential supports them, in accordance with the relevant standards.</td>
            <td align="left">
              <xref target="RFC7800"/> Section 3.1, <xref target="RFC8747"/> Section 3.1</td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="interoperability-of-credential-issuers-supporting-status-assertions">
      <name>Interoperability of Credential Issuers Supporting Status Assertions</name>
      <t>This section outlines how Credential Issuers support Status Assertions,
detailing the necessary metadata and practices to integrate into their systems.</t>
      <section anchor="credential-issuer-metadata">
        <name>Credential Issuer Metadata</name>
        <t>The Credential Issuers that uses the Status Assertions <bcp14>MUST</bcp14> include in their
OpenID4VCI <xref target="OpenID4VCI"/> metadata the claims:</t>
        <ul spacing="normal">
          <li>
            <t><tt>status_assertion_endpoint</tt>. <bcp14>REQUIRED</bcp14>. It <bcp14>MUST</bcp14> be an HTTPs URL indicating
the endpoint where the Wallet Instances can request Status Assertions.</t>
          </li>
          <li>
            <t><tt>credential_hash_alg_supported</tt>. <bcp14>REQUIRED</bcp14>. The supported Algorithm used by
the Wallet Instance to hash the Digital Credential for which the
Status Assertion is requested,  using one of the hash algorithms listed
in the <xref target="IANA-HASH-REG"/>.</t>
          </li>
        </ul>
      </section>
      <section anchor="issued-digital-credentials">
        <name>Issued Digital Credentials</name>
        <t>The Credential Issuers that uses the Status Assertions <bcp14>SHOULD</bcp14> include in the
issued Digital Credentials the object <tt>status</tt> with the
JSON member <tt>status_assertion</tt> set to a JSON Object containing the following
member:</t>
        <ul spacing="normal">
          <li>
            <t><tt>credential_hash_alg</tt>. <bcp14>REQUIRED</bcp14>. The Algorithm used of hashing the
Digital Credential to which the Status Assertion is bound, using one of the
hash algorithms listed in the <xref target="IANA-HASH-REG"/>.
Among the hash algorithms, <tt>sha-256</tt> is recommended and
<bcp14>SHOULD</bcp14> be implemented by all systems.</t>
          </li>
        </ul>
        <t>The non-normative example of an unsecured payload of
an <xref target="SD-JWT.VC"/> is shown below.</t>
        <artwork><![CDATA[
{
 "vct": "https://credentials.example.com/identity_credential",
 "given_name": "John",
 "family_name": "Doe",
 "email": "johndoe@example.com",
 "phone_number": "+1-202-555-0101",
 "address": {
   "street_address": "123 Main St",
   "locality": "Anytown",
   "region": "Anystate",
   "country": "US"
 },
 "birthdate": "1940-01-01",
 "is_over_18": true,
 "is_over_21": true,
 "is_over_65": true,
 "status": {
    "status_assertion": {
        "credential_hash_alg": "sha-256",
    }
 }
}
]]></artwork>
        <section anchor="credential-issuer-implementation-considerations">
          <name>Credential Issuer Implementation Considerations</name>
          <t>When the Digital Credential is issued, the Credential Issuer should
calculate the hash value using the algorithm specified in
<tt>status.status_assertion.credential_hash_alg</tt> and store this information
in its database. This practice enhances efficiency by allowing the
Credential Issuer to quickly compare the requested
<tt>credential_hash</tt> with the pre-calculated one, when processing
Status Assertion requests made by Holders.</t>
        </section>
      </section>
    </section>
    <section anchor="presenting-status-assertions">
      <name>Presenting Status Assertions</name>
      <t>The Wallet Instance that provides the Status Assertions using <xref target="OpenID4VP"/>, <bcp14>SHOULD</bcp14> include in the
<tt>vp_token</tt> JSON array, as defined in <xref target="OpenID4VP"/>, the Status Assertion along with the
related Digital Credential.</t>
      <t>The Verifier that receives a Digital Credential supporting the Status Assertion,
<bcp14>SHOULD</bcp14>:</t>
      <ul spacing="normal">
        <li>
          <t>Decode and validate the Digital Credential;</t>
        </li>
        <li>
          <t>Check the presence of <tt>status.status_assertion</tt> in the
Digital Credential. If true, the Verifier <bcp14>SHOULD</bcp14>:
          </t>
          <ul spacing="normal">
            <li>
              <t>produce the hash of the Digital Credential using the
hashing algorithm configured in <tt>status.status_assertion.credential_hash_alg</tt>;</t>
            </li>
            <li>
              <t>decode all the Status Assertions provided in the presentation,
by matching the JWS Header parameter <tt>typ</tt> set to <tt>status-assertion+jwt</tt>
and looking for the <tt>credential_hash</tt> value that matches with the
hash produced at the previous point;</t>
            </li>
            <li>
              <t>evaluate the validity of the Status Assertion.</t>
            </li>
          </ul>
        </li>
      </ul>
    </section>
    <section anchor="considerations-on-revocation-verification">
      <name>Considerations On Revocation Verification</name>
      <t>The recommendation for Verifiers to check the revocation status
of Digital Credentials as a '<bcp14>SHOULD</bcp14>' instead of a '<bcp14>MUST</bcp14>' acknowledges
that the decision to verify revocation is not absolute and may be
influenced by various factors. Consider as an example the case of age-over x;
even if it has expired, it may still perform its intended purpose.
As a result, the expiration status alone does not render it invalid.
The adaptability recognizes that the need to verify revocation status
may not always coincide with the actual usability of a Digital Credential,
allowing Verifiers to examine and make educated conclusions based on a
variety of scenarios.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TODO Security</t>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>In the design and implementation of Status Assertions, particular
attention has been paid to privacy considerations to ensure that the
system is respectful of user privacy and compliant with relevant
regulations.</t>
      <section anchor="privacy-consideration-status-assertion-request-opacity">
        <name>Privacy Consideration: Status Assertion Request Opacity</name>
        <t>The request for a Status Assertion does not transmit the Digital Credential
for which the status is being attested. Instead, it includes a proof of
possession (PoP) of the Digital Credential that is only interpretable by the
Credential Issuer who issued the Digital Credential for which the
Status Assertion is requested. This PoP can be achieved through a
cryptographic signature using the public key contained within the
Digital Credential over the request. This method is essential for
preventing the potential for fraudulent requests intended to mislead or
disclose sensitive information to unintended parties. By separating the
Digital Credential from the Status Assertion Request, the system ensures
that the request does not inadvertently disclose any information about
the Digital Credential or its Holder. This strategy significantly
enhances the privacy and security of the system by preventing the
assertion process from being used to collect information about
Digital Credentials or their Holders through deceptive requests.</t>
      </section>
      <section anchor="privacy-consideration-opacity-of-status-assertion-content">
        <name>Privacy Consideration: Opacity of Status Assertion Content</name>
        <t>An important privacy consideration is how the Status Assertion is
structured to ensure it does not reveal any information about the User or
the Holder of the Digital Credential. The Status Assertion is crafted
to prove only the vital information needed to verify the current state
of a Digital Credential, moving beyond simple revocation or
suspension checks. This is done by focusing the assertion content on the
Digital Credential's present condition and the method for its
verification, rather than on the identity of the Digital Credential's
Holder. This approach is key in keeping the User's anonymity intact,
making sure that the Status Assertion can be applied in various
verification situations without risking the privacy of the people involved.</t>
      </section>
      <section anchor="unlinkability-and-reusability-of-status-assertions">
        <name>Unlinkability and Reusability of Status Assertions</name>
        <t>Status Assertions are designed to uphold privacy by allowing Verifiers
to operate independently, without the need for interaction or information
disclosure to third-party entities or other Verifiers. This design is
pivotal in ensuring unlinkability between Verifiers, where actions
taken by one Verifier cannot be correlated or linked to actions
taken by another. Verifiers can directly validate the status of a
Digital Credential through the Status Assertion, eliminating the need
for external communication. This mechanism is key in protecting the
privacy of individuals whose Digital Credentials are being verified, as
it significantly reduces the risk of tracking or profiling based on
verification activities across various services.</t>
        <t>While Status Assertions facilitate unlinkability, they are not inherently
"single use." The specification accommodates the batch issuance of multiple
Status Assertions, which can be single-use. However, particularly for
offline interactions, a Single Assertion may be utilized by numerous
Verifiers. This flexibility ensures that Status Assertions can support
a wide range of verification scenarios, from one-time validations to
repeated checks by different entities, without compromising the privacy
or security of the Digital Credential Holder.</t>
      </section>
      <section anchor="untrackability-by-digital-credential-issuers-and-the-phone-home-problem">
        <name>Untrackability by Digital Credential Issuers and the "Phone Home" Problem</name>
        <t>A fundamental aspect of the privacy-preserving attributes of
Status Assertions is their ability to address the "phone home" problem,
which is the prevention of tracking by Digital Credential Issuers.
Traditional models often require Verifiers to query a central status
list or contact the issuer directly, a process that can inadvertently
allow Credential Issuers to track when and where a Digital Credential
is verified. Status Assertions, however, encapsulate all necessary
verification information within the assertion itself. This design choice
ensures that Credential Issuers are unable to monitor the verification
activities of their issued Digital Credentials, thereby significantly
enhancing the privacy of the Holder. By removing the need for real-time
communication with the Issuer for status checks, Status Assertions
effectively prevent the Issuer from tracking verification activities,
further reinforcing the system's dedication to protecting User privacy.</t>
      </section>
      <section anchor="minimization-of-data-exposure">
        <name>Minimization of Data Exposure</name>
        <t>The Status Assertions are designed around the data minimization principle.
Data minimization ensures that only the necessary information required
for the scope of attesting the non revocation status of the Digital
Credential. This minimizes the exposure of potentially sensitive data.</t>
      </section>
      <section anchor="resistance-to-enumeration-attacks">
        <name>Resistance to Enumeration Attacks</name>
        <t>The design of Status Assertions incorporates measures to resist
enumeration attacks, where an adversary attempts to gather information
by systematically verifying different combinations of data.
By implementing robust cryptographic techniques and limiting the
information contained in Status Assertions, the system reduces the
feasibility of such attacks. This consideration is vital for safeguarding
the privacy of the Holders and for ensuring the integrity of
the verification process.</t>
        <t>Status Assertions are based on a privacy-by-design approach, reflecting
a deliberate effort to balance security and privacy needs in the
Digital Credential ecosystem.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="json-web-token-claims-registration">
        <name>JSON Web Token Claims Registration</name>
        <t>This specification requests registration of the following Claims in the
IANA "JSON Web Token Claims" registry <xref target="IANA.JWT"/> established by <xref target="RFC7519"/>.</t>
        <ul spacing="normal">
          <li>
            <t>Claim Name: <tt>credential_hash</tt></t>
          </li>
          <li>
            <t>Claim Description: Hash value of the Digital Credential the Status Assertion is bound to.</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
          <li>
            <t>Specification Document(s): <xref target="status-assertion">this specification</xref></t>
          </li>
        </ul>
        <t><br/></t>
        <ul spacing="normal">
          <li>
            <t>Claim Name: <tt>credential_hash_alg</tt></t>
          </li>
          <li>
            <t>Claim Description: The Algorithm used of hashing the Digital Credential to which the Status Assertion is bound.</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
          <li>
            <t>Specification Document(s): <xref target="status-assertion">this specification</xref></t>
          </li>
        </ul>
      </section>
      <section anchor="media-type-registration">
        <name>Media Type Registration</name>
        <t>This section requests registration of the following media types <xref target="RFC2046"/> in
the "Media Types" registry <xref target="IANA.MediaTypes"/> in the manner described
in <xref target="RFC6838"/>.</t>
        <t>To indicate that the content is a JWT-based Status Assertion:</t>
        <ul spacing="normal">
          <li>
            <t>Type name: application</t>
          </li>
          <li>
            <t>Subtype name: status-assertion-request+jwt</t>
          </li>
          <li>
            <t>Required parameters: n/a</t>
          </li>
          <li>
            <t>Optional parameters: n/a</t>
          </li>
          <li>
            <t>Encoding considerations: binary; A JWT-based Status Assertion Request object is a JWT; JWT values are encoded as a series of base64url-encoded values (some of which may be the empty string) separated by period ('.') characters.</t>
          </li>
          <li>
            <t>Security considerations: See (#Security) of <xref target="security-considerations">this specification</xref></t>
          </li>
          <li>
            <t>Interoperability considerations: n/a</t>
          </li>
          <li>
            <t>Published specification: this specification</t>
          </li>
          <li>
            <t>Applications that use this media type: Applications using this specification for requesting Status Assertions.</t>
          </li>
          <li>
            <t>Fragment identifier considerations: n/a</t>
          </li>
          <li>
            <t>Additional information:
            </t>
            <ul spacing="normal">
              <li>
                <t>File extension(s): n/a</t>
              </li>
              <li>
                <t>Macintosh file type code(s): n/a</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Person &amp; email address to contact for further information: Giuseppe De Marco, gi.demarco@innovazione.gov.it</t>
          </li>
          <li>
            <t>Intended usage: COMMON</t>
          </li>
          <li>
            <t>Restrictions on usage: none</t>
          </li>
          <li>
            <t>Author: Giuseppe De Marco, gi.demarco@innovazione.gov.it</t>
          </li>
          <li>
            <t>Change controller: IETF</t>
          </li>
          <li>
            <t>Provisional registration? No</t>
          </li>
        </ul>
        <t>To indicate that the content is a CWT-based Status Assertion Request:</t>
        <ul spacing="normal">
          <li>
            <t>Type name: application</t>
          </li>
          <li>
            <t>Subtype name: status-assertion-request+cwt</t>
          </li>
          <li>
            <t>Required parameters: n/a</t>
          </li>
          <li>
            <t>Optional parameters: n/a</t>
          </li>
          <li>
            <t>Encoding considerations: binary</t>
          </li>
          <li>
            <t>Security considerations: See (#Security) of <xref target="security-considerations">this specification</xref></t>
          </li>
          <li>
            <t>Interoperability considerations: n/a</t>
          </li>
          <li>
            <t>Published specification: this specification</t>
          </li>
          <li>
            <t>Applications that use this media type: Applications using this specification for requesting Status Assertions.</t>
          </li>
          <li>
            <t>Fragment identifier considerations: n/a</t>
          </li>
          <li>
            <t>Additional information:
            </t>
            <ul spacing="normal">
              <li>
                <t>File extension(s): n/a</t>
              </li>
              <li>
                <t>Macintosh file type code(s): n/a</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Person &amp; email address to contact for further information: Giuseppe De Marco, gi.demarco@innovazione.gov.it</t>
          </li>
          <li>
            <t>Intended usage: COMMON</t>
          </li>
          <li>
            <t>Restrictions on usage: none</t>
          </li>
          <li>
            <t>Author: Giuseppe De Marco, gi.demarco@innovazione.gov.it</t>
          </li>
          <li>
            <t>Change controller: IETF</t>
          </li>
          <li>
            <t>Provisional registration? No</t>
          </li>
        </ul>
        <t>To indicate that the content is a JWT-based Status Assertion:</t>
        <ul spacing="normal">
          <li>
            <t>Type name: application</t>
          </li>
          <li>
            <t>Subtype name: status-assertion+jwt</t>
          </li>
          <li>
            <t>Required parameters: n/a</t>
          </li>
          <li>
            <t>Optional parameters: n/a</t>
          </li>
          <li>
            <t>Encoding considerations: binary</t>
          </li>
          <li>
            <t>Security considerations: See (#Security) of <xref target="security-considerations">this specification</xref></t>
          </li>
          <li>
            <t>Interoperability considerations: n/a</t>
          </li>
          <li>
            <t>Published specification: this specification</t>
          </li>
          <li>
            <t>Applications that use this media type: Applications using this specification for issuing or presenting Status Assertions.</t>
          </li>
          <li>
            <t>Fragment identifier considerations: n/a</t>
          </li>
          <li>
            <t>Additional information:
            </t>
            <ul spacing="normal">
              <li>
                <t>File extension(s): n/a</t>
              </li>
              <li>
                <t>Macintosh file type code(s): n/a</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Person &amp; email address to contact for further information: Giuseppe De Marco, gi.demarco@innovazione.gov.it</t>
          </li>
          <li>
            <t>Intended usage: COMMON</t>
          </li>
          <li>
            <t>Restrictions on usage: none</t>
          </li>
          <li>
            <t>Author: Giuseppe De Marco, gi.demarco@innovazione.gov.it</t>
          </li>
          <li>
            <t>Change controller: IETF</t>
          </li>
          <li>
            <t>Provisional registration? No</t>
          </li>
        </ul>
        <t>To indicate that the content is a CWT-based Status Assertion:</t>
        <ul spacing="normal">
          <li>
            <t>Type name: application</t>
          </li>
          <li>
            <t>Subtype name: status-assertion+cwt</t>
          </li>
          <li>
            <t>Required parameters: n/a</t>
          </li>
          <li>
            <t>Optional parameters: n/a</t>
          </li>
          <li>
            <t>Encoding considerations: binary</t>
          </li>
          <li>
            <t>Security considerations: See (#Security) of <xref target="security-considerations">this specification</xref></t>
          </li>
          <li>
            <t>Interoperability considerations: n/a</t>
          </li>
          <li>
            <t>Published specification: this specification</t>
          </li>
          <li>
            <t>Applications that use this media type: Applications using this specification for issuing or presenting Status Assertions.</t>
          </li>
          <li>
            <t>Fragment identifier considerations: n/a</t>
          </li>
          <li>
            <t>Additional information:
            </t>
            <ul spacing="normal">
              <li>
                <t>File extension(s): n/a</t>
              </li>
              <li>
                <t>Macintosh file type code(s): n/a</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Person &amp; email address to contact for further information: Giuseppe De Marco, gi.demarco@innovazione.gov.it</t>
          </li>
          <li>
            <t>Intended usage: COMMON</t>
          </li>
          <li>
            <t>Restrictions on usage: none</t>
          </li>
          <li>
            <t>Author: Giuseppe De Marco, gi.demarco@innovazione.gov.it</t>
          </li>
          <li>
            <t>Change controller: IETF</t>
          </li>
          <li>
            <t>Provisional registration? No</t>
          </li>
        </ul>
        <t>To indicate that the content is a JWT-based Status Assertion Error:</t>
        <ul spacing="normal">
          <li>
            <t>Type name: application</t>
          </li>
          <li>
            <t>Subtype name: status-assertion-error+jwt</t>
          </li>
          <li>
            <t>Required parameters: n/a</t>
          </li>
          <li>
            <t>Optional parameters: n/a</t>
          </li>
          <li>
            <t>Encoding considerations: binary</t>
          </li>
          <li>
            <t>Security considerations: See (#Security) of <xref target="security-considerations">this specification</xref></t>
          </li>
          <li>
            <t>Interoperability considerations: n/a</t>
          </li>
          <li>
            <t>Published specification: this specification</t>
          </li>
          <li>
            <t>Applications that use this media type: Applications using this specification for issuing Status Assertions Request Errors.</t>
          </li>
          <li>
            <t>Fragment identifier considerations: n/a</t>
          </li>
          <li>
            <t>Additional information:
            </t>
            <ul spacing="normal">
              <li>
                <t>File extension(s): n/a</t>
              </li>
              <li>
                <t>Macintosh file type code(s): n/a</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Person &amp; email address to contact for further information: Giuseppe De Marco, gi.demarco@innovazione.gov.it</t>
          </li>
          <li>
            <t>Intended usage: COMMON</t>
          </li>
          <li>
            <t>Restrictions on usage: none</t>
          </li>
          <li>
            <t>Author: Giuseppe De Marco, gi.demarco@innovazione.gov.it</t>
          </li>
          <li>
            <t>Change controller: IETF</t>
          </li>
          <li>
            <t>Provisional registration? No</t>
          </li>
        </ul>
        <t>To indicate that the content is a CWT-based Status Assertion Error:</t>
        <ul spacing="normal">
          <li>
            <t>Type name: application</t>
          </li>
          <li>
            <t>Subtype name: status-assertion-error+cwt</t>
          </li>
          <li>
            <t>Required parameters: n/a</t>
          </li>
          <li>
            <t>Optional parameters: n/a</t>
          </li>
          <li>
            <t>Encoding considerations: binary</t>
          </li>
          <li>
            <t>Security considerations: See (#Security) of <xref target="security-considerations">this specification</xref></t>
          </li>
          <li>
            <t>Interoperability considerations: n/a</t>
          </li>
          <li>
            <t>Published specification: this specification</t>
          </li>
          <li>
            <t>Applications that use this media type: Applications using this specification for issuing Status Assertions Request Errors.</t>
          </li>
          <li>
            <t>Fragment identifier considerations: n/a</t>
          </li>
          <li>
            <t>Additional information:
            </t>
            <ul spacing="normal">
              <li>
                <t>File extension(s): n/a</t>
              </li>
              <li>
                <t>Macintosh file type code(s): n/a</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Person &amp; email address to contact for further information: Giuseppe De Marco, gi.demarco@innovazione.gov.it</t>
          </li>
          <li>
            <t>Intended usage: COMMON</t>
          </li>
          <li>
            <t>Restrictions on usage: none</t>
          </li>
          <li>
            <t>Author: Giuseppe De Marco, gi.demarco@innovazione.gov.it</t>
          </li>
          <li>
            <t>Change controller: IETF</t>
          </li>
          <li>
            <t>Provisional registration? No</t>
          </li>
        </ul>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2046">
          <front>
            <title>Multipurpose Internet Mail Extensions (MIME) Part Two: Media Types</title>
            <author fullname="N. Freed" initials="N." surname="Freed"/>
            <author fullname="N. Borenstein" initials="N." surname="Borenstein"/>
            <date month="November" year="1996"/>
            <abstract>
              <t>This second document defines the general structure of the MIME media typing system and defines an initial set of media types. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2046"/>
          <seriesInfo name="DOI" value="10.17487/RFC2046"/>
        </reference>
        <reference anchor="RFC6749">
          <front>
            <title>The OAuth 2.0 Authorization Framework</title>
            <author fullname="D. Hardt" initials="D." role="editor" surname="Hardt"/>
            <date month="October" year="2012"/>
            <abstract>
              <t>The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf. This specification replaces and obsoletes the OAuth 1.0 protocol described in RFC 5849. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6749"/>
          <seriesInfo name="DOI" value="10.17487/RFC6749"/>
        </reference>
        <reference anchor="RFC6838">
          <front>
            <title>Media Type Specifications and Registration Procedures</title>
            <author fullname="N. Freed" initials="N." surname="Freed"/>
            <author fullname="J. Klensin" initials="J." surname="Klensin"/>
            <author fullname="T. Hansen" initials="T." surname="Hansen"/>
            <date month="January" year="2013"/>
            <abstract>
              <t>This document defines procedures for the specification and registration of media types for use in HTTP, MIME, and other Internet protocols. This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="13"/>
          <seriesInfo name="RFC" value="6838"/>
          <seriesInfo name="DOI" value="10.17487/RFC6838"/>
        </reference>
        <reference anchor="RFC7515">
          <front>
            <title>JSON Web Signature (JWS)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Signature (JWS) represents content secured with digital signatures or Message Authentication Codes (MACs) using JSON-based data structures. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and an IANA registry defined by that specification. Related encryption capabilities are described in the separate JSON Web Encryption (JWE) specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7515"/>
          <seriesInfo name="DOI" value="10.17487/RFC7515"/>
        </reference>
        <reference anchor="RFC7516">
          <front>
            <title>JSON Web Encryption (JWE)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Hildebrand" initials="J." surname="Hildebrand"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Encryption (JWE) represents encrypted content using JSON-based data structures. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and IANA registries defined by that specification. Related digital signature and Message Authentication Code (MAC) capabilities are described in the separate JSON Web Signature (JWS) specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7516"/>
          <seriesInfo name="DOI" value="10.17487/RFC7516"/>
        </reference>
        <reference anchor="RFC7517">
          <front>
            <title>JSON Web Key (JWK)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>A JSON Web Key (JWK) is a JavaScript Object Notation (JSON) data structure that represents a cryptographic key. This specification also defines a JWK Set JSON data structure that represents a set of JWKs. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and IANA registries established by that specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7517"/>
          <seriesInfo name="DOI" value="10.17487/RFC7517"/>
        </reference>
        <reference anchor="RFC7519">
          <front>
            <title>JSON Web Token (JWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties. The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7519"/>
          <seriesInfo name="DOI" value="10.17487/RFC7519"/>
        </reference>
        <reference anchor="RFC7800">
          <front>
            <title>Proof-of-Possession Key Semantics for JSON Web Tokens (JWTs)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="April" year="2016"/>
            <abstract>
              <t>This specification describes how to declare in a JSON Web Token (JWT) that the presenter of the JWT possesses a particular proof-of- possession key and how the recipient can cryptographically confirm proof of possession of the key by the presenter. Being able to prove possession of a key is also sometimes described as the presenter being a holder-of-key.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7800"/>
          <seriesInfo name="DOI" value="10.17487/RFC7800"/>
        </reference>
        <reference anchor="RFC8152">
          <front>
            <title>CBOR Object Signing and Encryption (COSE)</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="July" year="2017"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need for the ability to have basic security services defined for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8152"/>
          <seriesInfo name="DOI" value="10.17487/RFC8152"/>
        </reference>
        <reference anchor="RFC8392">
          <front>
            <title>CBOR Web Token (CWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties. The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection. A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value. CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8392"/>
          <seriesInfo name="DOI" value="10.17487/RFC8392"/>
        </reference>
        <reference anchor="RFC8747">
          <front>
            <title>Proof-of-Possession Key Semantics for CBOR Web Tokens (CWTs)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="L. Seitz" initials="L." surname="Seitz"/>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="March" year="2020"/>
            <abstract>
              <t>This specification describes how to declare in a CBOR Web Token (CWT) (which is defined by RFC 8392) that the presenter of the CWT possesses a particular proof-of-possession key. Being able to prove possession of a key is also sometimes described as being the holder-of-key. This specification provides equivalent functionality to "Proof-of-Possession Key Semantics for JSON Web Tokens (JWTs)" (RFC 7800) but using Concise Binary Object Representation (CBOR) and CWTs rather than JavaScript Object Notation (JSON) and JSON Web Tokens (JWTs).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8747"/>
          <seriesInfo name="DOI" value="10.17487/RFC8747"/>
        </reference>
        <reference anchor="RFC9126">
          <front>
            <title>OAuth 2.0 Pushed Authorization Requests</title>
            <author fullname="T. Lodderstedt" initials="T." surname="Lodderstedt"/>
            <author fullname="B. Campbell" initials="B." surname="Campbell"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <author fullname="D. Tonge" initials="D." surname="Tonge"/>
            <author fullname="F. Skokan" initials="F." surname="Skokan"/>
            <date month="September" year="2021"/>
            <abstract>
              <t>This document defines the pushed authorization request (PAR) endpoint, which allows clients to push the payload of an OAuth 2.0 authorization request to the authorization server via a direct request and provides them with a request URI that is used as reference to the data in a subsequent call to the authorization endpoint.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9126"/>
          <seriesInfo name="DOI" value="10.17487/RFC9126"/>
        </reference>
        <reference anchor="OpenID.Core" target="https://www.iana.org/assignments/media-types/media-types.xhtml">
          <front>
            <title>Media Types</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="OpenID4VCI" target="https://openid.net/specs/openid-4-verifiable-credential-issuance-1_0.html">
          <front>
            <title>OpenID for Verifiable Credential Issuance</title>
            <author>
              <organization>OpenID Foundation</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="IANA.MediaTypes" target="https://www.iana.org/assignments/media-types/media-types.xhtml">
          <front>
            <title>Media Types</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="IANA.JOSE" target="https://www.iana.org/assignments/jose/jose.xhtml">
          <front>
            <title>JSON Object Signing and Encryption (JOSE)</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="IANA.JWT" target="https://www.iana.org/assignments/jwt/jwt.xhtml">
          <front>
            <title>JSON Web Token Claims</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="IANA.CWT" target="https://www.iana.org/assignments/cwt/cwt.xhtml">
          <front>
            <title>CBOR Web Token (CWT) Claims</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RFC9596">
          <front>
            <title>CBOR Object Signing and Encryption (COSE) "typ" (type) Header Parameter</title>
            <author fullname="M.B. Jones" initials="M.B." surname="Jones"/>
            <author fullname="O. Steele" initials="O." surname="Steele"/>
            <date month="June" year="2024"/>
            <abstract>
              <t>This specification adds the equivalent of the JSON Object Signing and Encryption (JOSE) "typ" (type) header parameter to CBOR Object Signing and Encryption (COSE). This enables the benefits of explicit typing (as defined in RFC 8725, "JSON Web Token Best Current Practices") to be brought to COSE objects. The syntax of the COSE type header parameter value is the same as the existing COSE content type header parameter.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9596"/>
          <seriesInfo name="DOI" value="10.17487/RFC9596"/>
        </reference>
        <reference anchor="IANA-HASH-REG" target="https://www.iana.org/assignments/named-information/named-information.xhtml#hash-alg">
          <front>
            <title>IANA - Named Information Hash Algorithm Registry</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="draft-ietf-oauth-status-list" target="https://datatracker.ietf.org/doc/draft-ietf-oauth-status-list">
          <front>
            <title>draft-ietf-oauth-status-list</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="ECHR-ART8" target="https://www.echr.coe.int/documents/convention_eng.pdf">
          <front>
            <title>Article 8 of the European Convention on Human Rights</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="GDPR" target="https://gdpr-info.eu/">
          <front>
            <title>GDPR</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="SD-JWT.VC">
          <front>
            <title>SD-JWT-based Verifiable Credentials (SD-JWT VC)</title>
            <author fullname="Oliver Terbu" initials="O." surname="Terbu">
              <organization>MATTR</organization>
            </author>
            <author fullname="Daniel Fett" initials="D." surname="Fett">
              <organization>Authlete Inc.</organization>
            </author>
            <author fullname="Brian Campbell" initials="B." surname="Campbell">
              <organization>Ping Identity</organization>
            </author>
            <date day="4" month="March" year="2024"/>
            <abstract>
              <t>   This specification describes data formats as well as validation and
   processing rules to express Verifiable Credentials with JSON payloads
   with and without selective disclosure based on the SD-JWT
   [I-D.ietf-oauth-selective-disclosure-jwt] format.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-oauth-sd-jwt-vc-03"/>
        </reference>
        <reference anchor="ISO.mdoc">
          <front>
            <title>ISO/IEC 18013-5:2021 ISO-compliant driving licence</title>
            <author>
              <organization>ISO/IEC JTC 1/SC 17</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="OpenID4VP" target="https://openid.net/specs/openid-4-verifiable-presentations-1_0.html">
          <front>
            <title>OpenID for Verifiable Credential Presentation</title>
            <author>
              <organization>OpenID Foundation</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RFC6066" target="https://datatracker.ietf.org/doc/html/rfc6066">
          <front>
            <title>Transport Layer Security (TLS) Extensions: Extension Definitions</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
    <?line 961?>

<section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>We would like to thank:</t>
      <ul spacing="normal">
        <li>
          <t>Paul Bastien</t>
        </li>
        <li>
          <t>Sara Casanova</t>
        </li>
        <li>
          <t>Emanuele De Cupis</t>
        </li>
        <li>
          <t>Riccardo Iaconelli</t>
        </li>
        <li>
          <t>Marina Adomeit</t>
        </li>
        <li>
          <t>Victor Näslund</t>
        </li>
        <li>
          <t>Giada Sciarretta</t>
        </li>
        <li>
          <t>Amir Sharif</t>
        </li>
      </ul>
    </section>
    <section anchor="document-history">
      <name>Document History</name>
      <t>-02</t>
      <ul spacing="normal">
        <li>
          <t>Removed several comparisons with OAuth Status List</t>
        </li>
        <li>
          <t>Status Assertion Request and Response is now a json array with multiple entries.</t>
        </li>
        <li>
          <t>Better generalization about the confirmation methods.</t>
        </li>
        <li>
          <t>Removed any informative comparison with OAuth Status List.</t>
        </li>
        <li>
          <t>JWT and CWT typ.</t>
        </li>
        <li>
          <t>Name of the draft changed from <tt>OAuth Status Attestations</tt> to <tt>OAuth Status Assertions</tt>.</t>
        </li>
        <li>
          <t>Extended Status Assertion errors table added in <xref target="status-assertion-error">the section Status Error</xref>.</t>
        </li>
      </ul>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
