Skip to content

Attestation-Based Client Authentication should support use of keys that are stored non-locally #253

@15characterlimi

Description

@15characterlimi

Right now, eudi-lib-jvm-openid4vci-kt (“VCI library”) supports OAuth 2.0 Attestation-Based Client Authentication (docs), with is done by passing a custom Signer<JWK> instance as part of OpenId4VCIConfig.

However, eudi-lib-android-wallet-core (“core library”) does not currently support combining this with the custom Secure Area feature (EudiWallet.secureAreas). Specifically, DPoPSigner hard-codes local construction of keys, rather than using the SecureArea.

Could you please fix this, so that applications building on top of the core library can use Attestation-Based Client Authentication combined with using their custom implementations of SecureArea?

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions