From 9984cd97027f56abc6c9cf6dea5746d73718da43 Mon Sep 17 00:00:00 2001
From: Manu Sporny
Date: Sun, 8 Dec 2024 12:46:51 -0500
Subject: [PATCH] Fix link to PSD2 in CR1 draft.
---
transitions/2025/CR1/index.html | 85 ++++++++++++++++++++++++++++-----
1 file changed, 73 insertions(+), 12 deletions(-)
diff --git a/transitions/2025/CR1/index.html b/transitions/2025/CR1/index.html
index 55164e1..c523c1f 100644
--- a/transitions/2025/CR1/index.html
+++ b/transitions/2025/CR1/index.html
@@ -248,7 +248,7 @@
"editors": [
{
"name": "Manu Sporny",
- "url": "https://digitalbazaar.com/",
+ "url": "https://www.linkedin.com/in/manusporny/",
"company": "Digital Bazaar",
"companyURL": "http://digitalbazaar.com/",
"w3cid": 41758
@@ -501,7 +501,7 @@ Controllable Identifier Document 1.0
Editors:
- Manu Sporny (Digital Bazaar )
+ Manu Sporny (Digital Bazaar )
Michael B. Jones (Invited Expert )
@@ -601,7 +601,7 @@ Controllable Identifier Document 1.0
This document is governed by the
03 November 2023 W3C Process Document .
-
Table of Contents Abstract Status of This Document 1. Introduction1.1 Use Cases1.2 Requirements1.3 Conformance1.4 Terminology2. Data Model2.1 Controller Documents2.1.1 Subjects2.1.2 Controllers2.1.3 Also Known As2.1.4 Services2.2 Verification Methods2.2.1 Verification Material2.2.2 Multikey2.2.3 JsonWebKey2.2.4 Referring to Verification Methods2.3 Verification Relationships2.3.1 Authentication2.3.2 Assertion2.3.3 Key Agreement2.3.4 Capability Invocation2.3.5 Capability Delegation2.4 Multibase2.5 Multihash3. Algorithms3.1 Base Encode3.2 Base Decode3.3 Retrieve Verification Method3.4 Processing Errors4. Contexts and Vocabularies4.1 Vocabulary4.2 JSON-LD context4.2.1 Context Injection4.3 Datatypes4.3.1 The multibase
Datatype5. Security Considerations5.1 Proving Control and Binding5.1.1 Proving Control of an Identifier and/or Controller Document5.1.2 Binding to Physical Identity5.2 Identifier Ambiguity5.3 Key and Signature Expiration5.4 Verification Method Rotation5.5 Verification Method Revocation5.5.1 Revocation Semantics5.6 Choosing a Multiformat5.7 Encrypted Data in Controller Documents5.8 Content Integrity Protection5.9 Integrity Protection of Controllers5.10 Level of Assurance5.11 Service Endpoints for Authentication and Authorization6. Privacy Considerations6.1 Keep Personal Data Private6.2 Relationship to the Same-Origin Policy6.3 Identifier Correlation Risks6.4 Controller Document Correlation Risks6.5 Subject Classification6.6 Service Privacy7. Accessibility Considerations7.1 Presenting Time ValuesA. ExamplesA.1 Multikey ExamplesA.2 JsonWebKey ExamplesB. Revision HistoryC. AcknowledgementsD. ReferencesD.1 Normative referencesD.2 Informative references
+ Table of Contents Abstract Status of This Document 1. Introduction1.1 Use Cases1.2 Requirements1.3 Conformance1.4 Terminology2. Data Model2.1 Controller Documents2.1.1 Subjects2.1.2 Controllers2.1.3 Also Known As2.1.4 Services2.2 Verification Methods2.2.1 Verification Material2.2.2 Multikey2.2.3 JsonWebKey2.2.4 Referring to Verification Methods2.3 Verification Relationships2.3.1 Authentication2.3.2 Assertion2.3.3 Key Agreement2.3.4 Capability Invocation2.3.5 Capability Delegation2.4 Multibase2.5 Multihash3. Algorithms3.1 Base Encode3.2 Base Decode3.3 Retrieve Verification Method3.4 Processing Errors4. Contexts and Vocabularies4.1 Vocabulary4.2 JSON-LD context4.2.1 Context Injection4.3 Datatypes4.3.1 The multibase
Datatype5. Security Considerations5.1 Proving Control and Binding5.1.1 Proving Control of an Identifier and/or Controller Document5.1.2 Binding to Physical Identity5.2 Identifier Ambiguity5.3 Key and Signature Expiration5.4 Verification Method Rotation5.5 Verification Method Revocation5.5.1 Revocation Semantics5.6 Choosing a Multiformat5.7 Encrypted Data in Controller Documents5.8 Content Integrity Protection5.9 Integrity Protection of Controllers5.10 Level of Assurance5.11 Service Endpoints for Authentication and Authorization6. Privacy Considerations6.1 Keep Personal Data Private6.2 Relationship to the Same-Origin Policy6.3 Identifier Correlation Risks6.4 Controller Document Correlation Risks6.5 Subject Classification6.6 Service Privacy7. Accessibility Considerations7.1 Presenting Time ValuesA. IANA ConsiderationsA.1 application/cidB. ExamplesB.1 Multikey ExamplesB.2 JsonWebKey ExamplesC. Revision HistoryD. AcknowledgementsE. ReferencesE.1 Normative referencesE.2 Informative references
-