You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 2 Next »

Meeting Date

  • The TSWG holds a plenary meeting once every four weeks on Tuesdays. The 2024 meeting dates are: 23 Jan, 20 Feb, 19 Mar, 16 Apr, 14 May, 11 June, 9 July, 6 Aug, 3 Sept, 1 Oct, 29 Oct, and 26 Nov.
  • The meeting is at 08:00-09:00 PT / 15:00-16:00 UTC.
  • The TSWG holds an APAC meeting every Wednesday at 18:00-19:00 PT / 01:00-02:00 UTC. This meeting is a consolidated report-out and discussion across all TSWG Task Forces.
  • See the ToIP Calendar for all meeting dates, times and logistics, including Zoom links.

Zoom Meeting Link / Recording

(These links will be replaced with a link to the recording of the meetings as soon as they are available.)

Attendees

Agenda Items and Notes (including all relevant links)

TimeAgenda ItemLeadNotes
3 min
  • Start recording
  • Welcome & antitrust notice
  • Introduction of new members
  • Agenda review
Chairs
  • Antitrust Policy Notice: Attendees are reminded to adhere to the meeting agenda and not participate in activities prohibited under antitrust and competition laws. Only members of ToIP who have signed the necessary agreements are permitted to participate in this activity beyond an observer role.
  • New Members:
10 minGeneral announcementsAllUpdates from TSWG members of general interest to the group.
2 minReview of action items from the previous meetingChairs
20 minTask Force ReportsTF Leads

Technology Architecture TFWenjing Chu  Drummond Reed

  • Drummond Reed shared that he plans to dive into the conversion of the ToIP Technology Architecture Specification into Spec-Up and the addition of: 1) the 3rd generation ToIP stack diagram (ToIP Trust Canvas), 2) canonical use cases, 3) glossary, 4) consistency with the Trust Spanning Protocol, Trust Registry Protocol, and other newer ToIP specs.

Trust Registry TFAndor Kesselman Antti Kettunen  Darrell O'Donnell

  • There continue to be some inputs/edits to the Implementers Draft.
  • The TRTF will be talking with Sam Curren about the DIF Trust Establishment specification to see how we get aligned on the data model (since DIF Trust Establishment does not use any API or protocol). First blush is that it could make sense, but the DIF Trust Establishment spec may only apply to credential exchange, whereas the TRP is much broader.
  • A joint meeting of TRTF and DIF Trust Establishment is proposed in the next few weeks.
  • The TRTF will also be looking into OpenID Federation. Dima Postnikov is involved with that work.
  • Putting the Trust Registry Protocol in front of an OpenID Federation should be quite simple.
  • We also discussed defining the Trust Registry Protocol as a trust task protocol based on TSP. Darrell O'Donnell said that he started with an API for simplicity.

Trust Spanning Protocol TFDrummond Reed Wenjing Chu Samuel Smith 

  • We are openly inviting implementations and contributors to implementation projects.
    • Wenjing Chu said that his implementation project is underway and was demonstrated at IIW.
    • Samuel Smith said that his team was planning on a Python implementation.
    • We also talked about different language bindings and also transport protocol bindings.
    • We discussed that it would be ideal if both did:webs and did:tdw implementations could work with TSP.
  • We agreed to start a series of Github discussions comparing TSP with other trust-related protocols (or families of protocols).
  • We discussed conformance tests for TSP, which will naturally include test against the TSP codes in CESR. Wenjing Chu felt we do not need to check CESR conformance for codes outside of those use by TSP.

ACDC TF — Samuel Smith Phil Feairheller 

  • The key action item now on the 3 specs in review, is to add normative statements and conformance criteria. However, according to Sam Smith, it will not be hard to add RFC 2119 normative statements and conformance criteria.
  • We discussed the use of CESR code tables, and how the use of a particular code table or set of entries in one or more code tables can be used in the definition of a trust task.
  • Wenjing Chu clarified that the plan is that all of the TSP codes will be included in the CESR 2.0 specification. 
  • Control of a CESR code table space can give a trust task protocol authors an entire tree. For example, a 3 byte code (24 bytes) can be used as the namespace for a trust task protocol.
  • Jo Spencer asked about inheritance between codes. Wenjing said that, as long as both parties can understand the data being transferred, that should satisfy both parties.

AI & Metaverse (AIM) Technology TFWenjing Chu 

  • No meeting since last week.

Credential Exchange Protocols TFMathieu Glaude 

  • No report.

did:webs Task Force  Lance Byrd Phil Feairheller Markus Sabadello 

  • Almost done, moved to bi-weekly schedule.

X.509 VID Task ForceEric Scouten Wenjing Chu

  • Meets tomorrow to discuss a new proposal for a spec __________.


We briefly discussed the proposed did:tdw Task Force. 

We also discussed the idea of a SCID spec that can be foundational for all SCID-based VID types AND a guide to how to secure SCID-based infrastructure.

10 minConformance criteria discussion

10 minSpecial topic #2

5 min
  • Review decisions/action items
  • Planning for next meeting 
Chairs

Screenshots/Diagrams (numbered for reference in notes above)

#1



#2



#3



#4



#5



#6



#7



#8



#9



#10


Decisions

  • Sample Decision Item

Action Items

  • Sample Action Item


  • No labels