You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Feb 6, 2023. It is now read-only.
@nedmsmith: "verification-key-map isn't currently extensible. Extensions could break the predicate semantics of the triple. If another use case can't be supported, then a different triple should be defined or the spec should be updated to incorporate the use case requirements where interoperation, backwards compatibility and other impacts can be evaluated."
@thomas-fossati: "While I fully agree on Ned's point of not breaking the embedding triple's semantics, it seems quite plausible that one would want to add "revocation status" information (e.g., CRLs) along with cryptographic keys and certs.
We could add an optional "revo" array and then lock the type?"
The text was updated successfully, but these errors were encountered:
Discuss extensibility of Verification-key-map
Previous discussion captured here:
@nedmsmith: "verification-key-map isn't currently extensible. Extensions could break the predicate semantics of the triple. If another use case can't be supported, then a different triple should be defined or the spec should be updated to incorporate the use case requirements where interoperation, backwards compatibility and other impacts can be evaluated."
@thomas-fossati: "While I fully agree on Ned's point of not breaking the embedding triple's semantics, it seems quite plausible that one would want to add "revocation status" information (e.g., CRLs) along with cryptographic keys and certs.
We could add an optional "revo" array and then lock the type?"
The text was updated successfully, but these errors were encountered: