<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.15 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-demarco-oauth-status-assertions-00" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.21.0 -->
  <front>
    <title abbrev="OAuth Status Assertions">OAuth Status Assertions</title>
    <seriesInfo name="Internet-Draft" value="draft-demarco-oauth-status-assertions-00"/>
    <author fullname="Giuseppe De Marco">
      <organization>Dipartimento per la trasformazione digitale</organization>
      <address>
        <email>gi.demarco@innovazione.gov.it</email>
      </address>
    </author>
    <author fullname="Orie Steele">
      <organization>Transmute</organization>
      <address>
        <email>orie@transmute.industries</email>
      </address>
    </author>
    <author fullname="Francesco Marino">
      <organization>Istituto Poligrafico e Zecca dello Stato</organization>
      <address>
        <email>fa.marino@ipzs.it</email>
      </address>
    </author>
    <date year="2024" month="June" day="10"/>
    <keyword>digital credentials</keyword>
    <keyword>status list</keyword>
    <keyword>revocation</keyword>
    <abstract>
      <?line 48?>

<t>Status Assertion is a signed object that demonstrates the validity status of a
digital credential.
These assertions are periodically provided
to holders, who can present these to verifier along
with the corresponding digital credentials.
The approach outlined in this document
makes the verifier able to check the non-revocation of a digital credential
without requiring to query any third-party entities.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://peppelinux.github.io/draft-demarco-status-assertions/draft-demarco-status-assertions.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-demarco-oauth-status-assertions/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/peppelinux/draft-demarco-status-assertions"/>.</t>
    </note>
  </front>
  <middle>
    <?line 59?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Status Assertions ensure the non-revocation of digital
credentials, whether in JSON Web Tokens (JWT) or CBOR Web Tokens (CWT)
format. Status Assertions function
similarly to OCSP Stapling, allowing clients to present to the
relying parties
time-stamped assertions provided by the credential issuer.
The approach outlined in this specification enables the
verification of credentials against revocation without
direct queries to third-party systems,
enhancing privacy, reducing latency, and
faciliting offline verification.</t>
      <t>The figure below illustrates the process by which a client,
such as a Wallet Instance,
requests and obtains a Status Assertion from the credential issuer.</t>
      <artwork type="ascii-art"><![CDATA[
+-----------------+                              +-------------------+
|                 | Requests Status Assertions   |                   |
|                 |----------------------------->|                   |
| Client          |                              | Credential Issuer |
|                 | Status Assertions            |                   |
|                 |<-----------------------------|                   |
+-----------------+                              +-------------------+
]]></artwork>
      <t><strong>Figure 1</strong>: Status Assertion Issuance Flow.</t>
      <t>The figure below illustrates the process by which a client
presents the Status Assertion along with the corresponding digital credential,
to prove the non-revocation status of the digital credential to a verifier.</t>
      <artwork type="ascii-art"><![CDATA[
+-- ----------------+                             +----------+
|                   | Presents Digital Credential |          |
| Client            | and Status Assertion        | Verifier |
|                   |---------------------------->|          |
+-------------------+                             +----------+
]]></artwork>
      <t><strong>Figure 2</strong>: Status Assertion Presentation Flow.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>This specification uses the terms "End-User", "Entity" as defined by
OpenID Connect Core [@OpenID.Core], the term "JSON Web Token (JWT)"
defined by JSON Web Token (JWT) <xref target="RFC7519"/>,
the term "CBOR Web Token (CWT)" defined in <xref target="RFC8392"/>, "Client" as
defined <xref target="RFC6749"/></t>
      <dl>
        <dt>Holder:</dt>
        <dd>
          <t>An entity that receives Verifiable Credentials and has
control over them to present them to the Verifiers as Verifiable Presentations.</t>
        </dd>
        <dt>Digital Credential:</dt>
        <dd>
          <t>A set of one or more claims about a subject made by a Credential Issuer.
Alternative names are "Verifiable Credential" or "Credential".</t>
        </dd>
        <dt>Credential Issuer:</dt>
        <dd>
          <t>Entity that is responsible for the issuance of the Digital Credentials.
The Issuer is responsible for the lifecycle of their issued
Digital Credentials and their validity status.</t>
        </dd>
        <dt>Holder:</dt>
        <dd>
          <t>An entity that receives Verifiable Credentials and has control over
them to present them to the Verifiers as Verifiable Presentations.</t>
        </dd>
        <dt>Verifier:</dt>
        <dd>
          <t>Entity that relies on the validity of the Digital Credentials presented to it.
This Entity, also known as a Relying Party, verifies the authenticity and
validity of the Digital Credentials, including their revocation status,
before accepting them.</t>
        </dd>
        <dt>Wallet Instance:</dt>
        <dd>
          <t>The digital Wallet in control of a User, also known as Wallet.
It securely stores the User's Digital Credentials. It can present
Digital Credentials to Verifiers
and request Status Assertions from Issuers under the control of the User.
For the purposes of this specification, the Wallet Instance is
considered as a Client.</t>
        </dd>
      </dl>
    </section>
    <section anchor="rationale">
      <name>Rationale</name>
      <t>There are cases where the Verifier only needs
to check the revocation status of a Digital Credential at the time of
presentation, and therefore it should not be allowed to
check the status of a Digital Credential over time due to some
privacy constraints,
in compliance with national privacy regulations.</t>
      <t>For instance, consider a scenario where a Verifier's repeated access to a
status list, such as the one defined in
<eref target="https://datatracker.ietf.org/doc/draft-ietf-oauth-status-list/">draft-ietf-oauth-status-list</eref>
to check the revocation status of a Digital Credential could
be deemed as excessive monitoring of the End-User's activities.</t>
      <t>This could potentially infringe upon the End-User's right to privacy,
as outlined in
<eref target="https://www.echr.coe.int/documents/convention_eng.pdf">Article 8 of the European Convention on Human Rights</eref> and
in the the European Union's General Data Protection Regulation
(<eref target="https://gdpr-info.eu/">GDPR</eref>),
by creating a detailed profile of the End-User's
Digital Credential status without explicit consent for
such continuous surveillance.</t>
    </section>
    <section anchor="requirements">
      <name>Requirements</name>
      <t>The general requirements for the implementation of Status Assertion are
listed in this section. The Status Assertion:</t>
      <ul spacing="normal">
        <li>
          <t><bcp14>SHOULD</bcp14> be presented in conjunction with the Digital Credential.</t>
        </li>
        <li>
          <t><bcp14>MUST</bcp14> include information that links it to the
referenced Digital Credential;</t>
        </li>
        <li>
          <t><bcp14>MUST</bcp14> be timestamped with its issuance datetime,
using a timestamp which is at or after the time of
Digital Credential issuance which it refers;</t>
        </li>
        <li>
          <t><bcp14>MUST</bcp14> contain the expiration datetime after which both
the Status Assertion and the Digital Credential it refers
<bcp14>MUST NOT</bcp14> be considered valid anymore. The expiration datetime <bcp14>MUST</bcp14> be
superior to the Status Assertion issuance datetime and it <bcp14>MUST</bcp14> end before
the expiration datetime of the Digital Credential;</t>
        </li>
        <li>
          <t><bcp14>MUST</bcp14> enable the offline use cases by employing validation using
a cryptographic signature and the cryptographic public key of the
Credential Issuer.</t>
        </li>
        <li>
          <t><bcp14>MUST NOT</bcp14> contain personal information about the User who owns
the Digital Credential to which the Status Assertion refers.</t>
        </li>
      </ul>
    </section>
    <section anchor="proof-of-possession-of-a-credential">
      <name>Proof of Possession of a Credential</name>
      <t>The concept of Proof of Possession (PoP) of a Credential within the
framework of the Status Assertion specification encompasses a broader
perspective than merely possessing the digital bytes of the Credential.
It involves demonstrating rightful control or ownership over the
Credential, which can manifest in various forms depending on the
technology employed and the nature of the Digital Credential itself.
For instance, a Digital Credential could be presented visually (de-visu)
with a personal portrait serving as a binding element.</t>
      <t>While this specification does not prescribe any additional methods
for the proof of possession of the Credential, it aims to offer
guidance for concrete implementations utilizing common proof of
possession mechanisms. This includes, but is not limited to:</t>
      <ol spacing="normal" type="1"><li>
          <t>Having the digital representation of the Digital Credential (the bytes).</t>
        </li>
        <li>
          <t>Controlling the confirmation method of the Credential, using the Credential's <tt>cnf</tt> parameter.</t>
        </li>
      </ol>
      <t>The essence of requiring proof of possession over the Credential
through the confirmation method, such has proving the control of the
cryptographic material related to a Credential, is
to ensure that the entity in possession of the Credential can execute
actions exclusively reserved to the legitimate Holder.
The dual-layered approach of requiring both possession of the
Credential and control over it, reinforces the security and integrity
of the Status Assertion process.
This ensures that the Holder requesting a Status Assertion is indeed
the same Holder to which the Credential was originally issued,
affirming the authenticity and rightful possession of the Credential.</t>
    </section>
    <section anchor="status-assertion-request">
      <name>Status Assertion Request</name>
      <t>The Credential Issuer provides the Wallet Instance with a Status Assertion,
which is bound to a Digital Credential.
This allows the Wallet Instance to present it, along with the
Digital Credential itself,
to a Verifier as proof of the Digital Credential's non-revocation status.</t>
      <t>The following diagram shows the Wallet Instance requesting a
Status Assertion to a Credential Issuer,
related to a specific Credential issued by the same Credential Issuer.</t>
      <artwork type="ascii-art"><![CDATA[
+-------------------+                                  +--------------------+
|                   |                                  |                    |
|  Wallet Instance  |                                  | Credential Issuer  |
|                   |                                  |                    |
+--------+----------+                                  +----------+---------+
         |                                                        |
         | HTTP POST /status                                      |
         |  status_assertion_requests = [$StatusAssertionRequest] |
         +-------------------------------------------------------->
         |                                                        |
         |  Status Assertion Responses [...]                      |
         <--------------------------------------------------------+
         |                                                        |
+--------+----------+                                  +----------+---------+
|                   |                                  |                    |
|  Wallet Instance  |                                  | Credential Issuer  |
|                   |                                  |                    |
+-------------------+                                  +--------------------+
]]></artwork>
      <t>The Wallet Instance sends the Status Assertion request to the
Credential Issuer, where:
- The request <bcp14>MUST</bcp14> contain the base64url encoded hash value of the Digital Credential,
for which the Status Assertion is requested, and enveloped in a signed
Status Assertion Request object.
- The Status Assertion Request object <bcp14>MUST</bcp14> be signed with the private key corresponding
to the confirmation claim assigned by the Issuer and contained within
the Digital Credential.</t>
      <t>When the JWT or CWT format are used, the JWT/CWT <bcp14>MUST</bcp14> contain the parameters defined in the following table.</t>
      <table>
        <thead>
          <tr>
            <th align="left">Header</th>
            <th align="left">Description</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">
              <strong>typ</strong></td>
            <td align="left">It <bcp14>MUST</bcp14> be set to <tt>status-assertion-request+jwt</tt> when JWT format is used. It <bcp14>MUST</bcp14> be set to <tt>status-assertion-request+cwt</tt> when CWT format is used.</td>
            <td align="left">
              <xref target="RFC7516"/> Section 4.1.1</td>
          </tr>
          <tr>
            <td align="left">
              <strong>alg</strong></td>
            <td align="left">A digital signature algorithm identifier such as per IANA "JSON Web Signature and Encryption Algorithms" registry. It <bcp14>MUST NOT</bcp14> be set to <tt>none</tt> or any symmetric algorithm (MAC) identifier.</td>
            <td align="left">
              <xref target="RFC7516"/> Section 4.1.1</td>
          </tr>
          <tr>
            <td align="left">
              <strong>kid</strong></td>
            <td align="left">It is the Unique identifier of the <tt>JWK</tt> or <tt>Cose_Key</tt> owned by the Holder and used for validating the signature of the Status Assertion Request. When the Credential confirmation method uses a cryptographic material, it <bcp14>MUST</bcp14> match the one contained in the Credential. The header parameter <tt>kid</tt> is required when other cryptographic public key identification methods are not used, such as <tt>x5c</tt>.</td>
            <td align="left">
              <xref target="RFC7515"/></td>
          </tr>
        </tbody>
      </table>
      <table>
        <thead>
          <tr>
            <th align="left">Payload</th>
            <th align="left">Description</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">
              <strong>iss</strong></td>
            <td align="left">Status Assertion Request Issuer identifier. The value is supposed to be used for identifying the Wallet that has issued the request. It is out of scope for this document defining how this value must be set.</td>
            <td align="left">
              <xref target="RFC9126"/>, <xref target="RFC7519"/></td>
          </tr>
          <tr>
            <td align="left">
              <strong>aud</strong></td>
            <td align="left">It <bcp14>MUST</bcp14> be set with the Credential Issuer Status Assertion endpoint URL as value that identify the intended audience.</td>
            <td align="left">
              <xref target="RFC9126"/>, <xref target="RFC7519"/></td>
          </tr>
          <tr>
            <td align="left">
              <strong>exp</strong></td>
            <td align="left">UNIX Timestamp with the expiration time of the JWT. It <bcp14>MUST</bcp14> be superior to the value set for <tt>iat</tt> .</td>
            <td align="left">
              <xref target="RFC9126"/>, <xref target="RFC7519"/>, <xref target="RFC7515"/></td>
          </tr>
          <tr>
            <td align="left">
              <strong>iat</strong></td>
            <td align="left">UNIX Timestamp with the time of JWT/CWT issuance.</td>
            <td align="left">
              <xref target="RFC9126"/>, <xref target="RFC7519"/></td>
          </tr>
          <tr>
            <td align="left">
              <strong>jti</strong></td>
            <td align="left">Unique identifier for the JWT.</td>
            <td align="left">
              <xref target="RFC7519"/> Section 4.1.7</td>
          </tr>
          <tr>
            <td align="left">
              <strong>credential_hash</strong></td>
            <td align="left">Hash value of the Digital Credential the Status Assertion is bound to.</td>
            <td align="left">this specification</td>
          </tr>
          <tr>
            <td align="left">
              <strong>credential_hash_alg</strong></td>
            <td align="left">The Algorithm used of hashing the Digital Credential to which the Status Assertion is bound. The value <bcp14>SHOULD</bcp14> be set to <tt>sha-256</tt>.</td>
            <td align="left">this specification</td>
          </tr>
        </tbody>
      </table>
      <t>Below is a non-normative example of a Status Assertion Request with
the JWT headers and payload are represented without applying signature and
encoding:</t>
      <artwork><![CDATA[
{
    "alg": "ES256",
    "typ": "status-assertion-request+jwt",
    "kid": $CREDENTIAL-CNF-JWKID
}
.
{
    "iss": "0b434530-e151-4c40-98b7-74c75a5ef760",
    "aud": "https://issuer.example.org/status-assertion-endpoint",
    "iat": 1698744039,
    "exp": 1698830439,
    "jti": "6f204f7e-e453-4dfd-814e-9d155319408c",
    "credential_hash": $Issuer-Signed-JWT-Hash
    "credential_hash_alg": "sha-256"
}
]]></artwork>
      <t>Below is a non-normative example of a Status Assertion Request object in CWT format
represented in CBOR diagnostic notation format <xref target="RFC8152"/>, where the CWT headers
and payload are presented without applying signature and encoding for better readability:</t>
      <artwork><![CDATA[
   [
       / protected / << {
       / alg / 1: -7 / ES256 /
       / typ / 16: -7 / status-assertion-request+cwt /
       / kid / 4: h'3132' / $CREDENTIAL-CNF-CWKID /
     } >>,
     / unprotected / {
     },
     / payload / << {
       / iss    / 1: 0b434530-e151-4c40-98b7-74c75a5ef760 /,
       / aud    / 3: https://issuer.example.org/status-assertion-endpoint /,
       / iat    / 6: 1698744039 /,
       / exp    / 4: 1698830439 /,
       / cti    / 7: 6f204f7e-e453-4dfd-814e-9d155319408c /,
       / credential_hash / 8: $Issuer-Signed-JWT-Hash /,
       / credential_hash_alg / 9: sha-256 /
     } >>,
   ]
]]></artwork>
      <t>Below a non-normative example representing a Status Assertion Request array with a
single Status Assertion Reuqest object in JWT format.</t>
      <artwork><![CDATA[
POST /status HTTP/1.1
Host: issuer.example.org
Content-Type: application/json

{
    "status_assertion_requests" : ["${base64url(json({typ: (some pop for status-assertion)+jwt, ...}))}.payload.signature", ... ]
}
]]></artwork>
      <t>The Status Assertion HTTP request can be sent to a single Credential Issuer
regarding multiple Digital Credentials, and <bcp14>MUST</bcp14> contain a JSON object with
the member <tt>status_assertion_requests</tt>.</t>
      <t>The <tt>status_assertion_requests</tt> <bcp14>MUST</bcp14> be set with an array of strings, where
each string within the array represents a Digital Credential
Status Assertion Request object.</t>
      <t>The Credential Issuer that receives the Status Assertion Request object
<bcp14>MUST</bcp14> validate that the Wallet Instance making the request is
authorized to request Status Assertions.
Therefore the following requirements <bcp14>MUST</bcp14> be satisfied:</t>
      <ul spacing="normal">
        <li>
          <t>The Credential Issuer <bcp14>MUST</bcp14> verify the compliance of all elements in the <tt>status_assertion_requests</tt> object
using the confirmation method contained within the Digital Credential where the Status Assertion Request
object is referred to;</t>
        </li>
        <li>
          <t>The Credential Issuer <bcp14>MUST</bcp14> verify that it is the legitimate Issuer of the Digital Credential
to which each Status Assertion Request object refers.</t>
        </li>
      </ul>
    </section>
    <section anchor="status-assertion-response">
      <name>Status Assertion Response</name>
      <t>The response <bcp14>MUST</bcp14> include a JSON object with a member
named <tt>status_assertion_responses</tt>, which contains the
Status Assertions and or the Status Assertion Errors
related to the request made by the
Wallet Instance. In the non-normative example below is
represented an HTTP Response with the
<tt>status_assertion_responses</tt> JSON member:</t>
      <artwork><![CDATA[
HTTP/1.1 200 Created
Content-Type: application/json

{
    "status_assertion_responses": ["${base64url(json({typ: status-assertion+jwt, ...}))}.payload.signature", ... ]
}
]]></artwork>
      <t>The member <tt>status_assertion_responses</tt> <bcp14>MUST</bcp14> be an array of strings,
where each of them represent a Status Assertion Response object,
as defined in
<xref target="status-assertion">the section Status Assertion</xref> or a Status Assertion Error object,
as defined in <xref target="status-assertion-error">the section Status Error</xref>.</t>
      <t>For each entry in the <tt>status_assertion_responses</tt> array, the following requirements are met:
- Each element in the array <bcp14>MUST</bcp14> match the corresponding element in the request array at
the same position index to which it is related, eg: <em>[requestAboutA, requestAboutB]</em> produces <em>[responseAboutA, responseErrorAboutB]</em>.
- Each element <bcp14>MUST</bcp14> contain the error or the status of the assertion using the <tt>typ</tt> member.
set to "status-assertion+{jwt,cwt}" or "status-assertion-error+{jwt,cwt}", depending by the object type.
- The corresponding entry in the response <bcp14>MUST</bcp14> be of the same data format as requested. For example,
if the entry in the request is "jwt", then the entry at the same position in the response <bcp14>MUST</bcp14> also be "jwt".
- The corresponding entry in the response <bcp14>MUST NOT</bcp14> contain any
information regarding the Verifier to whom it may be presented,
such as the Verifier identifier as the intended audience.</t>
    </section>
    <section anchor="status-assertion-error">
      <name>Status Assertion Error</name>
      <t>If the Status Assertion is requested for a non-existent, expired, revoked
or invalid Digital Credential, the
Credential Issuer <bcp14>MUST</bcp14> respond with an HTTP Response with the status
code set to 200 and the <tt>status_assertion_responses</tt> array with the related
Status Assertion Error object.</t>
      <t>The Status Assertion Error <bcp14>MUST NOT</bcp14> be presented or provided to a Verifier,
the only audience of the Status Assertion Error is the Holder of the Credential
that has requested the Status Assertion. Therefore,
it is not necessary that the Status Assertion Error
contains the parameter <tt>aud</tt> within its payload.</t>
      <t>Below a non-normative example of a Status Assertion Error object in JWT format,
with the headers and payload represented in JSON and without applying the signature.</t>
      <artwork><![CDATA[
{
    "alg": "ES256",
    "typ": "status-assertion-error+jwt",
    "kid": "Issuer-JWK-KID"
}
.
{
    "iss": "https://issuer.example.org",
    "jti": "6f204f7e-e453-4dfd-814e-9d155319408c"
    "credential_hash": $CREDENTIAL-HASH,
    "credential_hash_alg": "sha-256",
    "error": "credential_revoked",
    "error_description": "Credential is revoked."
    }
}
]]></artwork>
      <t>The Status Assertion Error object <bcp14>MUST</bcp14> contain the parameters described in the
table below:</t>
      <table>
        <thead>
          <tr>
            <th align="left">Header</th>
            <th align="left">Description</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">
              <strong>typ</strong></td>
            <td align="left">
              <bcp14>REQUIRED</bcp14>. Depending on the related Status Assertion Request object format, it <bcp14>MUST</bcp14> be set to <tt>status-assertion-error+jwt</tt> or <tt>status-assertion-error+cwt</tt>.</td>
            <td align="left">
              <xref target="RFC7516"/> Section 4.1.1</td>
          </tr>
          <tr>
            <td align="left">
              <strong>alg</strong></td>
            <td align="left">
              <bcp14>REQUIRED</bcp14>. Algorithm used to verify the cryptographic signature of the Status Assertion Error. Status Assertion Error that do not need to be signed <bcp14>SHOULD</bcp14> set the <tt>alg</tt> value to <tt>none</tt>. For further clarification about the requirement of signing the Status Assertion Errors, see Section <xref target="rationale-about-the-unsigned-status-assertion-errors">Rationale About The Unsigned Status Assertion Errors</xref>.</td>
            <td align="left">
              <xref target="RFC7516"/> Section 4.1.1</td>
          </tr>
        </tbody>
      </table>
      <table>
        <thead>
          <tr>
            <th align="left">Payload</th>
            <th align="left">Description</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">
              <strong>iss</strong></td>
            <td align="left">
              <bcp14>REQUIRED</bcp14>. It <bcp14>MUST</bcp14> be set to the identifier of the Issuer.</td>
            <td align="left">
              <xref target="RFC9126"/>, <xref target="RFC7519"/></td>
          </tr>
          <tr>
            <td align="left">
              <strong>jti</strong></td>
            <td align="left">
              <bcp14>REQUIRED</bcp14>. Unique identifier for the JWT.</td>
            <td align="left">
              <xref target="RFC7519"/> Section 4.1.7</td>
          </tr>
          <tr>
            <td align="left">
              <strong>credential_hash</strong></td>
            <td align="left">
              <bcp14>REQUIRED</bcp14>. The hash value <bcp14>MUST</bcp14> match the one contained in the Status Assertion Request to which the Status Assertion Error is related.</td>
            <td align="left">this specification</td>
          </tr>
          <tr>
            <td align="left">
              <strong>credential_hash_alg</strong></td>
            <td align="left">
              <bcp14>REQUIRED</bcp14>. The hash algorithm <bcp14>MUST</bcp14> match the one contained in the Status Assertion Request to which the Status Assertion Error is related.</td>
            <td align="left">this specification</td>
          </tr>
          <tr>
            <td align="left">
              <strong>error</strong></td>
            <td align="left">
              <bcp14>REQUIRED</bcp14>. The value <bcp14>SHOULD</bcp14> be assigned with one of the error types defined in <xref target="RFC6749"/><eref target="https://tools.ietf.org/html/rfc6749#section-5.2">Section 5.2</eref> or defined in the Section <eref target="status-assertion-error-values">Status Assertion Error Values</eref>.</td>
            <td align="left">
              <xref target="RFC7519"/> Section 4.1.7</td>
          </tr>
          <tr>
            <td align="left">
              <strong>error_description</strong></td>
            <td align="left">
              <bcp14>OPTIONAL</bcp14>. Text that clarifies the nature of the error, such as attribute changes, revocation reasons, in relation to the <tt>error</tt> value.</td>
            <td align="left">
              <xref target="RFC7519"/> Section 4.1.7</td>
          </tr>
        </tbody>
      </table>
      <section anchor="rationale-about-the-unsigned-status-assertion-errors">
        <name>Rationale About The Unsigned Status Assertion Errors</name>
        <t>To mitigate potential resource exhaustion attacks where an adversary could issue hundreds of fake Status Assertion Requests to force an Issuer to sign numerous Status Assertion Errors, it is advisable to set the header parameter<tt>alg</tt> value to <tt>none</tt> for Status Assertion Errors that do not require signatures. This approach conserves computational resources and prevents abuse, especially in scenarios where the Issuer's implementation could be vulnerable to resource exhaustion attacks. However, even if it is out of the scopes of this specification determine in which the Status Error Assertion signatures are necessary, when the Issuer signs the Status Assertion Errors the Client that received them <bcp14>MUST</bcp14> validate the signature.
## Status Assertion Error Values</t>
        <t>The <tt>error</tt> parameter for the Status Assertion Error object <bcp14>MUST</bcp14> be set with one of the values defined in the table below, in addition to the values specified in <xref target="RFC6749"/>:</t>
        <table>
          <thead>
            <tr>
              <th align="left">Error Parameter Value</th>
              <th align="left">Description</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">
                <strong>credential_revoked</strong></td>
              <td align="left">The Digital Credential results as already revoked. The reason of revocation <bcp14>MAY</bcp14> be provided in the <tt>error_description</tt> field.</td>
              <td align="left">this specification</td>
            </tr>
            <tr>
              <td align="left">
                <strong>credential_updated</strong></td>
              <td align="left">One or more information contained in the Digital Credential are changed. The <tt>error_description</tt> field <bcp14>SHOULD</bcp14> contain a human-readable text describing the general parameters updated without specifying each one.</td>
              <td align="left">this specification</td>
            </tr>
            <tr>
              <td align="left">
                <strong>credential_invalid</strong></td>
              <td align="left">The Digital Credential is invalid. The <tt>error_description</tt> field <bcp14>SHOULD</bcp14> contain the reason of invalidation.</td>
              <td align="left">this specification</td>
            </tr>
            <tr>
              <td align="left">
                <strong>invalid_request_signature</strong></td>
              <td align="left">The Status Assertion Request signature validation has failed. This error type is used when the proof of possession of the Digital Credential is found not valid within the Status Assertion Request.</td>
              <td align="left">this specification</td>
            </tr>
            <tr>
              <td align="left">
                <strong>credential_not_found</strong></td>
              <td align="left">The <tt>credential_hash</tt> value provided in the Status Assertion Request doesn't match with any active Digital Credential.</td>
              <td align="left">this specification</td>
            </tr>
            <tr>
              <td align="left">
                <strong>unsupported_hash_alg</strong></td>
              <td align="left">The hash algorithm set in <tt>credential_hash_alg</tt> is not supported.</td>
              <td align="left">this specification</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
    <section anchor="status-assertion">
      <name>Status Assertion</name>
      <t>When a Status Assertion is requested to a Credential Issuer, the
Issuer checks the status of the Digital Credential and creates a
Status Assertion bound to it.</t>
      <t>If the Digital Credential is valid, the Credential Issuer
creates a new Status Assertion,
which a non-normative example is given below
where the format is JWT.</t>
      <artwork><![CDATA[
{
    "alg": "ES256",
    "typ": "status-assertion+jwt",
    "kid": $ISSUER-JWKID
}
.
{
    "iss": "https://issuer.example.org",
    "iat": 1504699136,
    "exp": 1504785536,
    "credential_hash": $CREDENTIAL-HASH,
    "credential_hash_alg": "sha-256",
    "cnf": {
        "jwk": {...}
    }
}
]]></artwork>
      <t>The Status Assertion <bcp14>MUST</bcp14> contain the parameters defined below.</t>
      <table>
        <thead>
          <tr>
            <th align="left">Header Parameter Name</th>
            <th align="left">Description</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">
              <strong>alg</strong></td>
            <td align="left">A digital signature algorithm identifier such as per IANA "JSON Web Signature and Encryption Algorithms" registry. It <bcp14>MUST NOT</bcp14> be set to <tt>none</tt> or to a symmetric algorithm (MAC) identifier.</td>
            <td align="left">
              <xref target="RFC7515"/>, <xref target="RFC7517"/></td>
          </tr>
          <tr>
            <td align="left">
              <strong>typ</strong></td>
            <td align="left">It <bcp14>MUST</bcp14> be set to <tt>status-assertion+jwt</tt> when JWT format is used. It <bcp14>MUST</bcp14> be set to <tt>status-assertion+cwt</tt> when CWT format is used.</td>
            <td align="left">
              <xref target="RFC7515"/>, <xref target="RFC7517"/> and this specification</td>
          </tr>
          <tr>
            <td align="left">
              <strong>kid</strong></td>
            <td align="left">Unique identifier of the Credential Issuer JWK. It is required when <tt>x5c</tt> or other cryptographic public key resolution identifiers are not used.</td>
            <td align="left">
              <xref target="RFC7515"/></td>
          </tr>
          <tr>
            <td align="left">
              <strong>x5c</strong></td>
            <td align="left">X.509 certificate chain about the Credential Issuer. It is required when <tt>kid</tt> or other parameter are not used.</td>
            <td align="left">
              <xref target="RFC7515"/></td>
          </tr>
        </tbody>
      </table>
      <table>
        <thead>
          <tr>
            <th align="left">Payload Parameter Name</th>
            <th align="left">Description</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">
              <strong>iss</strong></td>
            <td align="left">It <bcp14>MUST</bcp14> be set to the identifier of the Issuer.</td>
            <td align="left">
              <xref target="RFC9126"/>, <xref target="RFC7519"/></td>
          </tr>
          <tr>
            <td align="left">
              <strong>iat</strong></td>
            <td align="left">UNIX Timestamp with the time of the Status Assertion issuance.</td>
            <td align="left">
              <xref target="RFC9126"/>, <xref target="RFC7519"/></td>
          </tr>
          <tr>
            <td align="left">
              <strong>exp</strong></td>
            <td align="left">UNIX Timestamp with the expiration time of the JWT. It <bcp14>MUST</bcp14> be greater than the value set for <tt>iat</tt>.</td>
            <td align="left">
              <xref target="RFC9126"/>, <xref target="RFC7519"/>, <xref target="RFC7515"/></td>
          </tr>
          <tr>
            <td align="left">
              <strong>credential_hash</strong></td>
            <td align="left">Hash value of the Digital Credential the Status Assertion is bound to.</td>
            <td align="left">this specification</td>
          </tr>
          <tr>
            <td align="left">
              <strong>credential_hash_alg</strong></td>
            <td align="left">The Algorithm used of hashing the Digital Credential to which the Status Assertion is bound. The value <bcp14>SHOULD</bcp14> be set to <tt>sha-256</tt>.</td>
            <td align="left">this specification</td>
          </tr>
          <tr>
            <td align="left">
              <strong>cnf</strong></td>
            <td align="left">JSON object containing confirmation methods. The sub-member contained within <tt>cnf</tt> member, such as <tt>jwk</tt> for JWT and <tt>Cose_Key</tt> for CWT, <bcp14>MUST</bcp14> match with the one provided within the related Digital Credential. Other confirmation methods can be utilized when the referenced Digital Credential supports them, in accordance with the relevant standards.</td>
            <td align="left">
              <xref target="RFC7800"/> Section 3.1, <xref target="RFC8747"/> Section 3.1</td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="interoperability-of-credential-issuers-supporting-status-assertions">
      <name>Interoperability of Credential Issuers Supporting Status Assertions</name>
      <t>This section outlines how Credential Issuers support Status Assertions,
detailing the necessary metadata and practices to integrate into their systems.</t>
      <section anchor="credential-issuer-metadata">
        <name>Credential Issuer Metadata</name>
        <t>The Credential Issuers that uses the Status Assertions <bcp14>MUST</bcp14> include in their
OpenID4VCI [@!OpenID.VCI] metadata the claims:</t>
        <ul spacing="normal">
          <li>
            <t><tt>status_assertion_endpoint</tt>. <bcp14>REQUIRED</bcp14>. It <bcp14>MUST</bcp14> be an HTTPs URL indicating
the endpoint where the Wallet Instances can request Status Assertions.</t>
          </li>
          <li>
            <t><tt>credential_hash_alg_supported</tt>. <bcp14>REQUIRED</bcp14>. The supported Algorithm used by
the Wallet Instance to hash the Digital Credential for which the
Status Assertion is requested,  using one of the hash algorithms listed
in the
[IANA - Named Information Hash Algorithm Registry]
(https://www.iana.org/assignments/named-information/named-information.xhtml#hash-alg).</t>
          </li>
        </ul>
      </section>
      <section anchor="issued-digital-credentials">
        <name>Issued Digital Credentials</name>
        <t>The Credential Issuers that uses the Status Assertions <bcp14>SHOULD</bcp14> include in the
issued Digital Credentials the object <tt>status</tt> with the
JSON member <tt>status_assertion</tt> set to a JSON Object containing the following
member:</t>
        <ul spacing="normal">
          <li>
            <t><tt>credential_hash_alg</tt>. <bcp14>REQUIRED</bcp14>. The Algorithm used of hashing the
Digital Credential to which the Status Assertion is bound, using one of the
hash algorithms listed in the
[IANA - Named Information Hash Algorithm Registry]
(https://www.iana.org/assignments/named-information/named-information.xhtml#hash-alg).
Among the hash algorithms, <tt>sha-256</tt> is recommended and
<bcp14>SHOULD</bcp14> be implemented by all systems.</t>
          </li>
        </ul>
        <t>The non-normative example of an unsecured payload of
an SD-JWT VC is shown below.</t>
        <artwork><![CDATA[
{
 "vct": "https://credentials.example.com/identity_credential",
 "given_name": "John",
 "family_name": "Doe",
 "email": "johndoe@example.com",
 "phone_number": "+1-202-555-0101",
 "address": {
   "street_address": "123 Main St",
   "locality": "Anytown",
   "region": "Anystate",
   "country": "US"
 },
 "birthdate": "1940-01-01",
 "is_over_18": true,
 "is_over_21": true,
 "is_over_65": true,
 "status": {
    "status_assertion": {
        "credential_hash_alg": "sha-256",
    }
 }
}
]]></artwork>
        <section anchor="credential-issuer-implementation-considerations">
          <name>Credential Issuer Implementation Considerations</name>
          <t>When the Digital Credential is issued, the Credential Issuer <bcp14>SHOULD</bcp14>
calculate the hash value using the algorithm specified in
<tt>status.status_assertion.credential_hash_alg</tt> and store this information
in its database. This practice enhances efficiency by allowing the
Credential Issuer to quickly compare the requested
<tt>credential_hash</tt> with the pre-calculated one, when processing
Status Assertion requests made by Holders.</t>
        </section>
      </section>
    </section>
    <section anchor="presenting-status-assertions">
      <name>Presenting Status Assertions</name>
      <t>The Wallet Instance that provides the Status Assertions using [@OpenID4VP], <bcp14>SHOULD</bcp14> include in the
<tt>vp_token</tt> JSON array, as defined in [@OpenID4VP], the Status Assertion along with the
related Digital Credential.</t>
      <t>The Verifier that receives a Digital Credential supporting the Status Assertion,
<bcp14>SHOULD</bcp14>:</t>
      <ul spacing="normal">
        <li>
          <t>Decode and validate the Digital Credential;</t>
        </li>
        <li>
          <t>Check the presence of <tt>status.status_assertion</tt> in the
Digital Credential. If true, the Verifier <bcp14>SHOULD</bcp14>:
          </t>
          <ul spacing="normal">
            <li>
              <t>produce the hash of the Digital Credential using the
hashing algorithm configured in <tt>status.status_assertion.credential_hash_alg</tt>;</t>
            </li>
            <li>
              <t>decode all the Status Assertions provided in the presentation,
by matching the JWS Header parameter <tt>typ</tt> set to <tt>status-assertion+jwt</tt>
and looking for the <tt>credential_hash</tt> value that matches with the
hash produced at the previous point;</t>
            </li>
            <li>
              <t>evaluate the validity of the Status Assertion.</t>
            </li>
          </ul>
        </li>
      </ul>
    </section>
    <section anchor="considerations-on-revocation-verification">
      <name>Considerations On Revocation Verification</name>
      <t>The recommendation for Verifiers to check the revocation status
of Digital Credentials as a '<bcp14>SHOULD</bcp14>' instead of a '<bcp14>MUST</bcp14>' acknowledges
that the decision to verify revocation is not absolute and may be
influenced by various factors. Consider as an example the case of age-over x;
even if it has expired, it may still perform its intended purpose.
As a result, the expiration status alone does not render it invalid.
The adaptability recognizes that the need to verify revocation status
may not always coincide with the actual usability of a Digital Credential,
allowing Verifiers to examine and make educated conclusions based on a
variety of scenarios.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TODO Security</t>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>In the design and implementation of Status Assertions, particular
attention has been paid to privacy considerations to ensure that the
system is respectful of user privacy and compliant with relevant
regulations.</t>
      <section anchor="privacy-consideration-status-assertion-request-opacity">
        <name>Privacy Consideration: Status Assertion Request Opacity</name>
        <t>The request for a Status Assertion does not transmit the Digital Credential
for which the status is being attested. Instead, it includes a proof of
possession (PoP) of the credential that is only interpretable by the
Credential Issuer who issued the digital credential for which the
Status Assertion is requested. This PoP can be achieved through a
cryptographic signature using the public key contained within the
Digital Credential over the request. This method is essential for
preventing the potential for fraudulent requests intended to mislead or
disclose sensitive information to unintended parties. By separating the
Digital Credential from the status assertion request, the system ensures
that the request does not inadvertently disclose any information about
the Digital Credential or its holder. This strategy significantly
enhances the privacy and security of the system by preventing the
assertion process from being used to collect information about
Digital Credentials or their holders through deceptive requests.</t>
      </section>
      <section anchor="privacy-consideration-opacity-of-status-assertion-content">
        <name>Privacy Consideration: Opacity of Status Assertion Content</name>
        <t>An important privacy consideration is how the Status Assertion is
structured to ensure it does not reveal any information about the User or
the Holder of the Digital Credential. The Status Assertion is crafted
to prove only the vital information needed to verify the current state
of a Digital Credential, moving beyond simple revocation or
suspension checks. This is done by focusing the assertion content on the
Digital Credential's present condition and the method for its
verification, rather than on the identity of the Digital Credential's
Holder. This approach is key in keeping the User's anonymity intact,
making sure that the Status Assertion can be applied in various
verification situations without risking the privacy of the people involved.</t>
      </section>
      <section anchor="unlinkability-and-reusability-of-status-assertions">
        <name>Unlinkability and Reusability of Status Assertions</name>
        <t>Status Assertions are designed to uphold privacy by allowing Verifiers
to operate independently, without the need for interaction or information
disclosure to third-party entities or other verifiers. This design is
pivotal in ensuring unlinkability between Verifiers, where actions
taken by one Verifier cannot be correlated or linked to actions
taken by another. Verifiers can directly validate the status of a
Digital Credential through the Status Assertion, eliminating the need
for external communication. This mechanism is key in protecting the
privacy of individuals whose Digital Credentials are being verified, as
it significantly reduces the risk of tracking or profiling based on
verification activities across various services.</t>
        <t>While Status Assertions facilitate unlinkability, they are not inherently
"single use." The specification accommodates the batch issuance of multiple
Status Assertions, which can be single-use. However, particularly for
offline interactions, a Single Assertion may be utilized by numerous
Verifiers. This flexibility ensures that Status Assertions can support
a wide range of verification scenarios, from one-time validations to
repeated checks by different entities, without compromising the privacy
or security of the Digital Credential Holder.</t>
      </section>
      <section anchor="untrackability-by-digital-credential-issuers-and-the-phone-home-problem">
        <name>Untrackability by Digital Credential Issuers and the "Phone Home" Problem</name>
        <t>A fundamental aspect of the privacy-preserving attributes of
Status Assertions is their ability to address the "phone home" problem,
which is the prevention of tracking by Digital Credential Issuers.
Traditional models often require verifiers to query a central status
list or contact the issuer directly, a process that can inadvertently
allow Credential Issuers to track when and where a Digital Credential
is verified. Status Assertions, however, encapsulate all necessary
verification information within the assertion itself. This design choice
ensures that Credential Issuers are unable to monitor the verification
activities of their issued Digital Credentials, thereby significantly
enhancing the privacy of the Holder. By removing the need for real-time
communication with the issuer for status checks, Status Assertions
effectively prevent the issuer from tracking verification activities,
further reinforcing the system's dedication to protecting user privacy.</t>
      </section>
      <section anchor="minimization-of-data-exposure">
        <name>Minimization of Data Exposure</name>
        <t>The Status Assertions are designed around the data minimization principle.
Data minimization ensures that only the necessary information required
for the scope of attesting the non revocation status of the Digital
Credential. This minimizes the exposure of potentially sensitive data.</t>
      </section>
      <section anchor="resistance-to-enumeration-attacks">
        <name>Resistance to Enumeration Attacks</name>
        <t>The design of Status Assertions incorporates measures to resist
enumeration attacks, where an adversary attempts to gather information
by systematically verifying different combinations of data.
By implementing robust cryptographic techniques and limiting the
information contained in Status Assertions, the system reduces the
feasibility of such attacks. This consideration is vital for safeguarding
the privacy of the credential holders and for ensuring the integrity of
the verification process.</t>
        <t>Status Assertions are based on a privacy-by-design approach, reflecting
a deliberate effort to balance security and privacy needs in the
Digital Credential ecosystem.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="json-web-token-claims-registration">
        <name>JSON Web Token Claims Registration</name>
        <t>This specification requests registration of the following Claims in the
IANA "JSON Web Token Claims" registry [@IANA.JWT] established by <xref target="RFC7519"/>.</t>
        <ul spacing="normal">
          <li>
            <t>Claim Name: <tt>credential_format</tt></t>
          </li>
          <li>
            <t>Claim Description: The Digital Credential format the Status Assertion is bound to.</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
          <li>
            <t>Specification Document(s):  [[ (#digital-credential-proof-of-possession) of this specification ]]</t>
          </li>
        </ul>
        <t><br/></t>
        <ul spacing="normal">
          <li>
            <t>Claim Name: <tt>credential</tt></t>
          </li>
          <li>
            <t>Claim Description: The Digital Credential the Status Assertion is bound to.</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
          <li>
            <t>Specification Document(s):  [[ (#digital-credential-proof-of-possession) of this specification ]]</t>
          </li>
        </ul>
        <t><br/></t>
        <ul spacing="normal">
          <li>
            <t>Claim Name: <tt>credential_hash</tt></t>
          </li>
          <li>
            <t>Claim Description: Hash value of the Digital Credential the Status Assertion is bound to.</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
          <li>
            <t>Specification Document(s):  [[ (#status-assertion) of this specification ]]</t>
          </li>
        </ul>
        <t><br/></t>
        <ul spacing="normal">
          <li>
            <t>Claim Name: <tt>credential_hash_alg</tt></t>
          </li>
          <li>
            <t>Claim Description: The Algorithm used of hashing the Digital Credential to which the Status Assertion is bound.</t>
          </li>
          <li>
            <t>Change Controller: IETF</t>
          </li>
          <li>
            <t>Specification Document(s):  [[ (#status-assertion) of this specification ]]</t>
          </li>
        </ul>
      </section>
      <section anchor="media-type-registration">
        <name>Media Type Registration</name>
        <t>This section requests registration of the following media types [@RFC2046] in
the "Media Types" registry [@IANA.MediaTypes] in the manner described
in [@RFC6838].</t>
        <t>To indicate that the content is a JWT-based Status Assertion:</t>
        <ul spacing="normal">
          <li>
            <t>Type name: application</t>
          </li>
          <li>
            <t>Subtype name: status-assertion-request+jwt</t>
          </li>
          <li>
            <t>Required parameters: n/a</t>
          </li>
          <li>
            <t>Optional parameters: n/a</t>
          </li>
          <li>
            <t>Encoding considerations: binary; A JWT-based Status Assertion Request object is a JWT; JWT values are encoded as a series of base64url-encoded values (some of which may be the empty string) separated by period ('.') characters.</t>
          </li>
          <li>
            <t>Security considerations: See (#Security) of [[ this specification ]]</t>
          </li>
          <li>
            <t>Interoperability considerations: n/a</t>
          </li>
          <li>
            <t>Published specification: [[ this specification ]]</t>
          </li>
          <li>
            <t>Applications that use this media type: Applications using [[ this specification ]] for requesting Status Assertions.</t>
          </li>
          <li>
            <t>Fragment identifier considerations: n/a</t>
          </li>
          <li>
            <t>Additional information:
            </t>
            <ul spacing="normal">
              <li>
                <t>File extension(s): n/a</t>
              </li>
              <li>
                <t>Macintosh file type code(s): n/a</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Person &amp; email address to contact for further information: Giuseppe De Marco, gi.demarco@innovazione.gov.it</t>
          </li>
          <li>
            <t>Intended usage: COMMON</t>
          </li>
          <li>
            <t>Restrictions on usage: none</t>
          </li>
          <li>
            <t>Author: Giuseppe De Marco, gi.demarco@innovazione.gov.it</t>
          </li>
          <li>
            <t>Change controller: IETF</t>
          </li>
          <li>
            <t>Provisional registration? No</t>
          </li>
        </ul>
        <t>To indicate that the content is a CWT-based Status Assertion Request:</t>
        <ul spacing="normal">
          <li>
            <t>Type name: application</t>
          </li>
          <li>
            <t>Subtype name: status-assertion-request+cwt</t>
          </li>
          <li>
            <t>Required parameters: n/a</t>
          </li>
          <li>
            <t>Optional parameters: n/a</t>
          </li>
          <li>
            <t>Encoding considerations: binary</t>
          </li>
          <li>
            <t>Security considerations: See (#Security) of [[ this specification ]]</t>
          </li>
          <li>
            <t>Interoperability considerations: n/a</t>
          </li>
          <li>
            <t>Published specification: [[ this specification ]]</t>
          </li>
          <li>
            <t>Applications that use this media type: Applications using [[ this specification ]] for requesting Status Assertions.</t>
          </li>
          <li>
            <t>Fragment identifier considerations: n/a</t>
          </li>
          <li>
            <t>Additional information:
            </t>
            <ul spacing="normal">
              <li>
                <t>File extension(s): n/a</t>
              </li>
              <li>
                <t>Macintosh file type code(s): n/a</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Person &amp; email address to contact for further information: Giuseppe De Marco, gi.demarco@innovazione.gov.it</t>
          </li>
          <li>
            <t>Intended usage: COMMON</t>
          </li>
          <li>
            <t>Restrictions on usage: none</t>
          </li>
          <li>
            <t>Author: Giuseppe De Marco, gi.demarco@innovazione.gov.it</t>
          </li>
          <li>
            <t>Change controller: IETF</t>
          </li>
          <li>
            <t>Provisional registration? No</t>
          </li>
        </ul>
        <t>To indicate that the content is a JWT-based Status Assertion:</t>
        <ul spacing="normal">
          <li>
            <t>Type name: application</t>
          </li>
          <li>
            <t>Subtype name: status-assertion+jwt</t>
          </li>
          <li>
            <t>Required parameters: n/a</t>
          </li>
          <li>
            <t>Optional parameters: n/a</t>
          </li>
          <li>
            <t>Encoding considerations: binary</t>
          </li>
          <li>
            <t>Security considerations: See (#Security) of [[ this specification ]]</t>
          </li>
          <li>
            <t>Interoperability considerations: n/a</t>
          </li>
          <li>
            <t>Published specification: [[ this specification ]]</t>
          </li>
          <li>
            <t>Applications that use this media type: Applications using [[ this specification ]] for issuing or presenting Status Assertions.</t>
          </li>
          <li>
            <t>Fragment identifier considerations: n/a</t>
          </li>
          <li>
            <t>Additional information:
            </t>
            <ul spacing="normal">
              <li>
                <t>File extension(s): n/a</t>
              </li>
              <li>
                <t>Macintosh file type code(s): n/a</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Person &amp; email address to contact for further information: Giuseppe De Marco, gi.demarco@innovazione.gov.it</t>
          </li>
          <li>
            <t>Intended usage: COMMON</t>
          </li>
          <li>
            <t>Restrictions on usage: none</t>
          </li>
          <li>
            <t>Author: Giuseppe De Marco, gi.demarco@innovazione.gov.it</t>
          </li>
          <li>
            <t>Change controller: IETF</t>
          </li>
          <li>
            <t>Provisional registration? No</t>
          </li>
        </ul>
        <t>To indicate that the content is a CWT-based Status Assertion:</t>
        <ul spacing="normal">
          <li>
            <t>Type name: application</t>
          </li>
          <li>
            <t>Subtype name: status-assertion+cwt</t>
          </li>
          <li>
            <t>Required parameters: n/a</t>
          </li>
          <li>
            <t>Optional parameters: n/a</t>
          </li>
          <li>
            <t>Encoding considerations: binary</t>
          </li>
          <li>
            <t>Security considerations: See (#Security) of [[ this specification ]]</t>
          </li>
          <li>
            <t>Interoperability considerations: n/a</t>
          </li>
          <li>
            <t>Published specification: [[ this specification ]]</t>
          </li>
          <li>
            <t>Applications that use this media type: Applications using [[ this specification ]] for issuing or presenting Status Assertions.</t>
          </li>
          <li>
            <t>Fragment identifier considerations: n/a</t>
          </li>
          <li>
            <t>Additional information:
            </t>
            <ul spacing="normal">
              <li>
                <t>File extension(s): n/a</t>
              </li>
              <li>
                <t>Macintosh file type code(s): n/a</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Person &amp; email address to contact for further information: Giuseppe De Marco, gi.demarco@innovazione.gov.it</t>
          </li>
          <li>
            <t>Intended usage: COMMON</t>
          </li>
          <li>
            <t>Restrictions on usage: none</t>
          </li>
          <li>
            <t>Author: Giuseppe De Marco, gi.demarco@innovazione.gov.it</t>
          </li>
          <li>
            <t>Change controller: IETF</t>
          </li>
          <li>
            <t>Provisional registration? No</t>
          </li>
        </ul>
        <t>To indicate that the content is a JWT-based Status Assertion Error:</t>
        <ul spacing="normal">
          <li>
            <t>Type name: application</t>
          </li>
          <li>
            <t>Subtype name: status-assertion-error+jwt</t>
          </li>
          <li>
            <t>Required parameters: n/a</t>
          </li>
          <li>
            <t>Optional parameters: n/a</t>
          </li>
          <li>
            <t>Encoding considerations: binary</t>
          </li>
          <li>
            <t>Security considerations: See (#Security) of [[ this specification ]]</t>
          </li>
          <li>
            <t>Interoperability considerations: n/a</t>
          </li>
          <li>
            <t>Published specification: [[ this specification ]]</t>
          </li>
          <li>
            <t>Applications that use this media type: Applications using [[ this specification ]] for issuing Status Assertions Request Errors.</t>
          </li>
          <li>
            <t>Fragment identifier considerations: n/a</t>
          </li>
          <li>
            <t>Additional information:
            </t>
            <ul spacing="normal">
              <li>
                <t>File extension(s): n/a</t>
              </li>
              <li>
                <t>Macintosh file type code(s): n/a</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Person &amp; email address to contact for further information: Giuseppe De Marco, gi.demarco@innovazione.gov.it</t>
          </li>
          <li>
            <t>Intended usage: COMMON</t>
          </li>
          <li>
            <t>Restrictions on usage: none</t>
          </li>
          <li>
            <t>Author: Giuseppe De Marco, gi.demarco@innovazione.gov.it</t>
          </li>
          <li>
            <t>Change controller: IETF</t>
          </li>
          <li>
            <t>Provisional registration? No</t>
          </li>
        </ul>
        <t>To indicate that the content is a CWT-based Status Assertion Error:</t>
        <ul spacing="normal">
          <li>
            <t>Type name: application</t>
          </li>
          <li>
            <t>Subtype name: status-assertion-error+cwt</t>
          </li>
          <li>
            <t>Required parameters: n/a</t>
          </li>
          <li>
            <t>Optional parameters: n/a</t>
          </li>
          <li>
            <t>Encoding considerations: binary</t>
          </li>
          <li>
            <t>Security considerations: See (#Security) of [[ this specification ]]</t>
          </li>
          <li>
            <t>Interoperability considerations: n/a</t>
          </li>
          <li>
            <t>Published specification: [[ this specification ]]</t>
          </li>
          <li>
            <t>Applications that use this media type: Applications using [[ this specification ]] for issuing Status Assertions Request Errors.</t>
          </li>
          <li>
            <t>Fragment identifier considerations: n/a</t>
          </li>
          <li>
            <t>Additional information:
            </t>
            <ul spacing="normal">
              <li>
                <t>File extension(s): n/a</t>
              </li>
              <li>
                <t>Macintosh file type code(s): n/a</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Person &amp; email address to contact for further information: Giuseppe De Marco, gi.demarco@innovazione.gov.it</t>
          </li>
          <li>
            <t>Intended usage: COMMON</t>
          </li>
          <li>
            <t>Restrictions on usage: none</t>
          </li>
          <li>
            <t>Author: Giuseppe De Marco, gi.demarco@innovazione.gov.it</t>
          </li>
          <li>
            <t>Change controller: IETF</t>
          </li>
          <li>
            <t>Provisional registration? No</t>
          </li>
        </ul>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-normative-references">
      <name>Normative References</name>
      <reference anchor="RFC6749">
        <front>
          <title>The OAuth 2.0 Authorization Framework</title>
          <author fullname="D. Hardt" initials="D." role="editor" surname="Hardt"/>
          <date month="October" year="2012"/>
          <abstract>
            <t>The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf. This specification replaces and obsoletes the OAuth 1.0 protocol described in RFC 5849. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6749"/>
        <seriesInfo name="DOI" value="10.17487/RFC6749"/>
      </reference>
      <reference anchor="RFC7515">
        <front>
          <title>JSON Web Signature (JWS)</title>
          <author fullname="M. Jones" initials="M." surname="Jones"/>
          <author fullname="J. Bradley" initials="J." surname="Bradley"/>
          <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
          <date month="May" year="2015"/>
          <abstract>
            <t>JSON Web Signature (JWS) represents content secured with digital signatures or Message Authentication Codes (MACs) using JSON-based data structures. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and an IANA registry defined by that specification. Related encryption capabilities are described in the separate JSON Web Encryption (JWE) specification.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7515"/>
        <seriesInfo name="DOI" value="10.17487/RFC7515"/>
      </reference>
      <reference anchor="RFC7516">
        <front>
          <title>JSON Web Encryption (JWE)</title>
          <author fullname="M. Jones" initials="M." surname="Jones"/>
          <author fullname="J. Hildebrand" initials="J." surname="Hildebrand"/>
          <date month="May" year="2015"/>
          <abstract>
            <t>JSON Web Encryption (JWE) represents encrypted content using JSON-based data structures. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and IANA registries defined by that specification. Related digital signature and Message Authentication Code (MAC) capabilities are described in the separate JSON Web Signature (JWS) specification.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7516"/>
        <seriesInfo name="DOI" value="10.17487/RFC7516"/>
      </reference>
      <reference anchor="RFC7517">
        <front>
          <title>JSON Web Key (JWK)</title>
          <author fullname="M. Jones" initials="M." surname="Jones"/>
          <date month="May" year="2015"/>
          <abstract>
            <t>A JSON Web Key (JWK) is a JavaScript Object Notation (JSON) data structure that represents a cryptographic key. This specification also defines a JWK Set JSON data structure that represents a set of JWKs. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and IANA registries established by that specification.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7517"/>
        <seriesInfo name="DOI" value="10.17487/RFC7517"/>
      </reference>
      <reference anchor="RFC7519">
        <front>
          <title>JSON Web Token (JWT)</title>
          <author fullname="M. Jones" initials="M." surname="Jones"/>
          <author fullname="J. Bradley" initials="J." surname="Bradley"/>
          <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
          <date month="May" year="2015"/>
          <abstract>
            <t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties. The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7519"/>
        <seriesInfo name="DOI" value="10.17487/RFC7519"/>
      </reference>
      <reference anchor="RFC7800">
        <front>
          <title>Proof-of-Possession Key Semantics for JSON Web Tokens (JWTs)</title>
          <author fullname="M. Jones" initials="M." surname="Jones"/>
          <author fullname="J. Bradley" initials="J." surname="Bradley"/>
          <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
          <date month="April" year="2016"/>
          <abstract>
            <t>This specification describes how to declare in a JSON Web Token (JWT) that the presenter of the JWT possesses a particular proof-of- possession key and how the recipient can cryptographically confirm proof of possession of the key by the presenter. Being able to prove possession of a key is also sometimes described as the presenter being a holder-of-key.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7800"/>
        <seriesInfo name="DOI" value="10.17487/RFC7800"/>
      </reference>
      <reference anchor="RFC8152">
        <front>
          <title>CBOR Object Signing and Encryption (COSE)</title>
          <author fullname="J. Schaad" initials="J." surname="Schaad"/>
          <date month="July" year="2017"/>
          <abstract>
            <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need for the ability to have basic security services defined for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8152"/>
        <seriesInfo name="DOI" value="10.17487/RFC8152"/>
      </reference>
      <reference anchor="RFC8392">
        <front>
          <title>CBOR Web Token (CWT)</title>
          <author fullname="M. Jones" initials="M." surname="Jones"/>
          <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
          <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
          <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
          <date month="May" year="2018"/>
          <abstract>
            <t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties. The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection. A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value. CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8392"/>
        <seriesInfo name="DOI" value="10.17487/RFC8392"/>
      </reference>
      <reference anchor="RFC8747">
        <front>
          <title>Proof-of-Possession Key Semantics for CBOR Web Tokens (CWTs)</title>
          <author fullname="M. Jones" initials="M." surname="Jones"/>
          <author fullname="L. Seitz" initials="L." surname="Seitz"/>
          <author fullname="G. Selander" initials="G." surname="Selander"/>
          <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
          <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
          <date month="March" year="2020"/>
          <abstract>
            <t>This specification describes how to declare in a CBOR Web Token (CWT) (which is defined by RFC 8392) that the presenter of the CWT possesses a particular proof-of-possession key. Being able to prove possession of a key is also sometimes described as being the holder-of-key. This specification provides equivalent functionality to "Proof-of-Possession Key Semantics for JSON Web Tokens (JWTs)" (RFC 7800) but using Concise Binary Object Representation (CBOR) and CWTs rather than JavaScript Object Notation (JSON) and JSON Web Tokens (JWTs).</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8747"/>
        <seriesInfo name="DOI" value="10.17487/RFC8747"/>
      </reference>
      <reference anchor="RFC9126">
        <front>
          <title>OAuth 2.0 Pushed Authorization Requests</title>
          <author fullname="T. Lodderstedt" initials="T." surname="Lodderstedt"/>
          <author fullname="B. Campbell" initials="B." surname="Campbell"/>
          <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
          <author fullname="D. Tonge" initials="D." surname="Tonge"/>
          <author fullname="F. Skokan" initials="F." surname="Skokan"/>
          <date month="September" year="2021"/>
          <abstract>
            <t>This document defines the pushed authorization request (PAR) endpoint, which allows clients to push the payload of an OAuth 2.0 authorization request to the authorization server via a direct request and provides them with a request URI that is used as reference to the data in a subsequent call to the authorization endpoint.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9126"/>
        <seriesInfo name="DOI" value="10.17487/RFC9126"/>
      </reference>
      <reference anchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC8174">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba" initials="B." surname="Leiba"/>
          <date month="May" year="2017"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
    </references>
    <?line 920?>

<section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>We would like to thank:</t>
      <ul spacing="normal">
        <li>
          <t>Paul Bastien</t>
        </li>
        <li>
          <t>Sara Casanova</t>
        </li>
        <li>
          <t>Emanuele De Cupis</t>
        </li>
        <li>
          <t>Riccardo Iaconelli</t>
        </li>
        <li>
          <t>Marina Adomeit</t>
        </li>
        <li>
          <t>Victor Näslund</t>
        </li>
        <li>
          <t>Giada Sciarretta</t>
        </li>
        <li>
          <t>Amir Sharif</t>
        </li>
      </ul>
    </section>
    <section anchor="document-history">
      <name>Document History</name>
      <t>-00</t>
      <ul spacing="normal">
        <li>
          <t>Removed any comparison with OAuth Status List</t>
        </li>
        <li>
          <t>Status Assertion Request and Response is now a json array with multiple entries.</t>
        </li>
        <li>
          <t>Better generalization about the confirmation methods.</t>
        </li>
        <li>
          <t>Removed any informative comparison with OAuth Status List.</t>
        </li>
        <li>
          <t>JWT and CWT typ.</t>
        </li>
        <li>
          <t>Name of the draft changed from <tt>OAuth Status Attestations</tt> to <tt>OAuth Status Assertions</tt>.</t>
        </li>
        <li>
          <t>Extended Status Assertion errors table added in <xref target="status-assertion-error">the section Status Error</xref>.</t>
        </li>
      </ul>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
