Security Considerations

Security is central to the Verifier’s design, ensuring trust and privacy throughout the verification process:

  1. Transport Security: All communication occurs over HTTPS, safeguarding data in transit.

  2. Nonce and State Parameters: Verification requests incorporate unique, time-bound values to prevent replay attacks.

  3. Client Authentication: The clientSecret authenticates the relying party to the Verifier Service. Store it securely and never expose it client-side.

  4. Credential Integrity: The Verifier checks cryptographic signatures and DID Documents, rejecting credentials that fail authenticity or integrity checks.

  5. Minimal Data Exposure: The Verifier only processes essential data. It does not store unnecessary information, preserving privacy.

  6. Monitoring and Logging: Maintain logs and monitor for suspicious activities, such as repeated failed verifications.

  7. Error Handling: Avoid exposing sensitive details in error responses. Provide generic user-facing messages and log technical details internally.

By following these security practices and integrating them into your application’s operations, you maintain a robust, trusted environment for all stakeholders.

Last updated