<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.38 (Ruby 3.4.1) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-mahy-mls-sd-cwt-credential-02" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="MLS SD-JWT and SD-CWT Credentials">Messaging Layer Security Credentials using Selective Disclosure JSON and CBOR Web Tokens</title>
    <seriesInfo name="Internet-Draft" value="draft-mahy-mls-sd-cwt-credential-02"/>
    <author fullname="Rohan Mahy">
      <organization>Rohan Mahy Consulting Services</organization>
      <address>
        <email>rohan.ietf@gmail.com</email>
      </address>
    </author>
    <date year="2026" month="May" day="06"/>
    <area>Security</area>
    <workgroup>Messaging Layer Security</workgroup>
    <keyword>MLS credential</keyword>
    <keyword>SD-CWT</keyword>
    <keyword>SD-KBT</keyword>
    <keyword>SD-JWT</keyword>
    <keyword>key binding</keyword>
    <keyword>selective disclosure</keyword>
    <abstract>
      <?line 40?>

<t>The Messaging Layer Security (MLS) protocol contains Credentials used to authenticate an MLS client with a signature key pair.
Selective Disclosure CBOR Web Tokens (SD-CWT) and Selective Disclosure JSON Web Tokens (SD-JWT) define token formats where the holder can selectively reveal claims about itself with strong integrity protection and cryptographic binding to the holder's key.
This document defines MLS credentials for both these token types.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://rohanmahy.github.io/mls-sd-cwt-credential/draft-mahy-mls-sd-cwt-credential.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-mahy-mls-sd-cwt-credential/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Messaging Layer Security Working Group mailing list (<eref target="mailto:mls@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/mls/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/mls/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/rohanmahy/mls-sd-cwt-credential"/>.</t>
    </note>
  </front>
  <middle>
    <?line 46?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>This document defines new MLS <xref target="RFC9420"/> credential types for SD-CWT <xref target="I-D.ietf-spice-sd-cwt"/> and SD-JWT <xref target="RFC9901"/> tokens respectively.
The SD-CWT Credential contains a Selective Disclosure Key Binding Token (SD-KBT).
The SD-JWT Credential contains an SD-JWT with Key Binding (SD-JWT+KB), which could be represented in the traditional data format, or in a more compact binary encoding.</t>
      <t>The "holder" of one of these tokens could be the MLS client including the token in its Credential in its LeafNode (in a group or in a KeyPackage) or in an ExternalSender structure.</t>
      <ul empty="true">
        <li>
          <t>Note: It is not necessary for an AS to selectively disclose any claims.
In other words, an Identity Provider that normally generates JWT or CWT web tokens could generate the same claim set, as long as the confirmation key is included and verified by the issuer.</t>
        </li>
      </ul>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>The term Credential is used as defined in <xref section="5.3" sectionFormat="of" target="RFC9420"/>.
The terms MLS Distribution Service (DS) and MLS Authentication Service (AS) are used as defined in <xref target="RFC9750"/>.
The terms MLS client, MLS group, LeafNode, KeyPackage, PublicMessage, PrivateMessage, ratchet tree, and GroupInfo are likewise common MLS terms defined in <xref target="RFC9420"/>.</t>
    </section>
    <section anchor="new-mls-credential-types">
      <name>New MLS Credential types</name>
      <t>This document extends the list of defined CredentialTypes in MLS to include <tt>sd_cwt</tt> and <tt>sd_jwt</tt> types. Additional syntax and semantics are defined in the following subsections.</t>
      <sourcecode type="tls"><![CDATA[
struct {
    CredentialType credential_type;
    select (Credential.credential_type) {
        case basic:
            opaque identity<V>;
        case x509:
            Certificate certificates<V>;
        ...
        case sd_cwt:
            opaque sd_kbt<V>;
        case sd_jwt:
            SdJwt sd_jwt;
    };
} Credential;
]]></sourcecode>
      <t>The MLS architecture <xref target="RFC9750"/> describes the Authentication Services as having the following three services (i.e. requirements):</t>
      <ol spacing="normal" type="1"><li>
          <t>Issue credentials to clients that attest to bindings between identities and signature key pairs</t>
        </li>
        <li>
          <t>Enable a client to verify that a credential presented by another client is valid with respect to a reference identifier</t>
        </li>
        <li>
          <t>Enable a group member to verify that a credential represents the same client as another credential</t>
        </li>
      </ol>
      <t>The consequence of this is that the consumer of the SD-CWT or SD-JWT needs to be able to determine both the MLS client, and the application identity referred to in a token, in a Credential.</t>
      <section anchor="mls-sd-cwt-credential">
        <name>MLS SD-CWT Credential</name>
        <t>An MLS SD-CWT Credential contains a single SD-KBT, containing an SD-CWT in the KBT protected header.
The SD-CWT contains zero of more disclosures; if there are any disclosures they appear in the <tt>sd_claims</tt> header field, otherwise the header field is absent.</t>
        <t>Any party that can view the credential can read the disclosed claims.
For example if LeafNodes are visible to the MLS DS, because MLS handshake messages are conveyed via PublicMessage, the disclosed claims would also be visible to the DS.</t>
        <t>The SD-CWT inside the credential <bcp14>MAY</bcp14> include zero or more encrypted disclosures (in the <tt>sd_encrypted_claims</tt> header field if any encrypted disclosures are present).
Each encrypted disclosure is separately AEAD encrypted with a per-disclosure unique ephemeral key and salt.
The per-disclosure encryption key allows the holder/MLS client to disclose an element to a specific subset of members, or (in the common case when the DS is privy to the ratchet tree) only to members of the group.
A proof of concept to decrypt encrypted disclosures only for members of the group is described in <xref target="I-D.mahy-mls-member-secrets"/>.</t>
        <t>The audience in the SD-KBT is either a representation of the MLS group, or a higher-level application structure associated with an MLS group or tightly-coupled collection of groups (for example, a chat room which maintains one MLS group for the main discussion and another for moderators to discuss the moderation of the room) such that being in one group without the collection would be nonsensical.</t>
        <t>The subject in the SD-CWT represents a specific MLS client (for example a COSE key thumbprint, or a client ID URI such as a <tt>mimi:</tt> client URI as described in <xref section="3" sectionFormat="of" target="I-D.ietf-mimi-protocol"/>).
It should not use an identifier which represents multiple signature key pairs of the same type, or represents the same "user" on multiple devices.
The SD-CWT <bcp14>MAY</bcp14> contain other claims which represent a distinct "user" identity.</t>
        <t>Using the MLS signature key as the confirmation key is encouraged.
In this case, the confirmation key <bcp14>MAY</bcp14> be expressed using the COSE Key Thumbprint confirmation method.</t>
      </section>
      <section anchor="mls-sd-jwt-credential">
        <name>MLS SD-JWT Credential</name>
        <t>The SD-JWT Credential can be represented in the classic SD-JWT+KB data format defined in <xref section="4" sectionFormat="of" target="RFC9901"/> (shown below), or in a more compact binary representation.
MLS SD-JWT Credentials <bcp14>MUST</bcp14> include the Key Binding.</t>
        <t>The classic format uses only characters from the unpadded base64url character set (Section 5 of <xref target="RFC4648"/>) plus the period (<tt>.</tt>) character to separate the three parts of the <tt>Issuer-signed JWT</tt>, and the tilde (<tt>~</tt>) character to separate disclosures from the other components.</t>
        <figure>
          <name>SD-JWT+KB in classic format</name>
          <artwork><![CDATA[
<Issuer-signed JWT>~<Disclosure 1>~<Disclosure 2>~...~<Disclosure N>~<KB-JWT>
]]></artwork>
        </figure>
        <t>This document also defines a "compacted" format where each of the components of the <tt>Issuer-signed JWT</tt>, every Disclosure, and the <tt>KB-JWT</tt> are base64url decoded and stored in individual fields in the <tt>SdJwt</tt> struct.</t>
        <sourcecode type="tls"><![CDATA[
struct {
    Bool compacted;
    select (compacted) {
        case true:
            opaque protected<V>;
            opaque payload<V>;
            opaque signature<V>;
            SdJwtDisclosure disclosures<V>;
            opaque sd_jwt_key_binding<V>;
        case false:
            opaque sd_jwt_kb<V>;
    };
} SdJwt;

enum {
  false(0),
  true(1)
} Bool;
]]></sourcecode>
        <ul empty="true">
          <li>
            <t>The compacted variant allows implementations to tradeoff reduced size for the extra processing cost of base64url encoding and decoding the Credential.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The privacy considerations in SD-CWT, SD-JWT, and MLS apply.
TODO more security.</t>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>The privacy considerations in SD-CWT and SD-JWT apply. The privacy considerations of MLS are largely discussed in <xref target="RFC9750"/>.
TODO more privacy.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document requests IANA to add the following entries to the MLS Credential Types registry. Please replace RFCXXXX with the RFC of this document.</t>
      <section anchor="sd-cwt-credential">
        <name>SD-CWT Credential</name>
        <ul spacing="normal">
          <li>
            <t>Value: 0x0005 (suggested)</t>
          </li>
          <li>
            <t>Name: sd_cwt</t>
          </li>
          <li>
            <t>Recommended: Y</t>
          </li>
          <li>
            <t>Reference: RFCXXXX</t>
          </li>
        </ul>
      </section>
      <section anchor="sd-jwt-credential">
        <name>SD-JWT Credential</name>
        <ul spacing="normal">
          <li>
            <t>Value: 0x0006 (suggested)</t>
          </li>
          <li>
            <t>Name: sd_jwt</t>
          </li>
          <li>
            <t>Recommended: Y</t>
          </li>
          <li>
            <t>Reference: RFCXXXX</t>
          </li>
        </ul>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC9420" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9420.xml">
          <front>
            <title>The Messaging Layer Security (MLS) Protocol</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes"/>
            <author fullname="B. Beurdouche" initials="B." surname="Beurdouche"/>
            <author fullname="R. Robert" initials="R." surname="Robert"/>
            <author fullname="J. Millican" initials="J." surname="Millican"/>
            <author fullname="E. Omara" initials="E." surname="Omara"/>
            <author fullname="K. Cohn-Gordon" initials="K." surname="Cohn-Gordon"/>
            <date month="July" year="2023"/>
            <abstract>
              <t>Messaging applications are increasingly making use of end-to-end security mechanisms to ensure that messages are only accessible to the communicating endpoints, and not to any servers involved in delivering messages. Establishing keys to provide such protections is challenging for group chat settings, in which more than two clients need to agree on a key but may not be online at the same time. In this document, we specify a key establishment protocol that provides efficient asynchronous group key establishment with forward secrecy (FS) and post-compromise security (PCS) for groups in size ranging from two to thousands.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9420"/>
          <seriesInfo name="DOI" value="10.17487/RFC9420"/>
        </reference>
        <reference anchor="I-D.ietf-spice-sd-cwt">
          <front>
            <title>Selective Disclosure CBOR Web Tokens (SD-CWT)</title>
            <author fullname="Michael Prorock" initials="M." surname="Prorock">
              <organization>mesur.io</organization>
            </author>
            <author fullname="Orie Steele" initials="O." surname="Steele">
              <organization>Tradeverifyd</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Rohan Mahy" initials="R." surname="Mahy">
         </author>
            <date day="2" month="March" year="2026"/>
            <abstract>
              <t>   This specification describes a data minimization technique for use
   with CBOR Web Tokens (CWTs).  The approach is inspired by the
   Selective Disclosure JSON Web Token (SD-JWT), with changes to align
   with CBOR Object Signing and Encryption (COSE) and CWTs.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-spice-sd-cwt-07"/>
        </reference>
        <reference anchor="RFC9901">
          <front>
            <title>Selective Disclosure for JSON Web Tokens</title>
            <author fullname="D. Fett" initials="D." surname="Fett"/>
            <author fullname="K. Yasuda" initials="K." surname="Yasuda"/>
            <author fullname="B. Campbell" initials="B." surname="Campbell"/>
            <date month="November" year="2025"/>
            <abstract>
              <t>This specification defines a mechanism for the selective disclosure
of individual elements of a JSON data structure used as the payload
of a JSON Web Signature (JWS). The primary use case is the selective
disclosure of JSON Web Token (JWT) claims.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9901"/>
          <seriesInfo name="DOI" value="10.17487/RFC9901"/>
        </reference>
        <reference anchor="RFC2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC9750">
          <front>
            <title>The Messaging Layer Security (MLS) Architecture</title>
            <author fullname="B. Beurdouche" initials="B." surname="Beurdouche"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="E. Omara" initials="E." surname="Omara"/>
            <author fullname="S. Inguva" initials="S." surname="Inguva"/>
            <author fullname="A. Duric" initials="A." surname="Duric"/>
            <date month="April" year="2025"/>
            <abstract>
              <t>The Messaging Layer Security (MLS) protocol (RFC 9420) provides a group key agreement protocol for messaging applications. MLS is designed to protect against eavesdropping, tampering, and message forgery, and to provide forward secrecy (FS) and post-compromise security (PCS).</t>
              <t>This document describes the architecture for using MLS in a general secure group messaging infrastructure and defines the security goals for MLS. It provides guidance on building a group messaging system and discusses security and privacy trade-offs offered by multiple security mechanisms that are part of the MLS protocol (e.g., frequency of public encryption key rotation). The document also provides guidance for parts of the infrastructure that are not standardized by MLS and are instead left to the application.</t>
              <t>While the recommendations of this document are not mandatory to follow in order to interoperate at the protocol level, they affect the overall security guarantees that are achieved by a messaging application. This is especially true in the case of active adversaries that are able to compromise clients, the Delivery Service (DS), or the Authentication Service (AS).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9750"/>
          <seriesInfo name="DOI" value="10.17487/RFC9750"/>
        </reference>
        <reference anchor="RFC4648">
          <front>
            <title>The Base16, Base32, and Base64 Data Encodings</title>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
            <date month="October" year="2006"/>
            <abstract>
              <t>This document describes the commonly used base 64, base 32, and base 16 encoding schemes. It also discusses the use of line-feeds in encoded data, use of padding in encoded data, use of non-alphabet characters in encoded data, use of different encoding alphabets, and canonical encodings. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4648"/>
          <seriesInfo name="DOI" value="10.17487/RFC4648"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.mahy-mls-member-secrets">
          <front>
            <title>*** BROKEN REFERENCE ***</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="I-D.ietf-mimi-protocol">
          <front>
            <title>More Instant Messaging Interoperability (MIMI) using HTTPS and MLS</title>
            <author fullname="Richard Barnes" initials="R." surname="Barnes">
              <organization>Cisco</organization>
            </author>
            <author fullname="Matthew Hodgson" initials="M." surname="Hodgson">
              <organization>The Matrix.org Foundation C.I.C.</organization>
            </author>
            <author fullname="Konrad Kohbrok" initials="K." surname="Kohbrok">
              <organization>Phoenix R&amp;D</organization>
            </author>
            <author fullname="Rohan Mahy" initials="R." surname="Mahy">
              <organization>Rohan Mahy Consulting Services</organization>
            </author>
            <author fullname="Travis Ralston" initials="T." surname="Ralston">
              <organization>The Matrix.org Foundation C.I.C.</organization>
            </author>
            <author fullname="Raphael Robert" initials="R." surname="Robert">
              <organization>Phoenix R&amp;D</organization>
            </author>
            <date day="25" month="April" year="2026"/>
            <abstract>
              <t>   This document specifies the More Instant Messaging Interoperability
   (MIMI) transport protocol, which allows users of different messaging
   providers to interoperate in group chats (rooms), including to send
   and receive messages, share room policy, and add participants to and
   remove participants from rooms.  MIMI describes messages between
   providers, leaving most aspects of the provider-internal client-
   server communication up to the provider.  MIMI integrates the
   Messaging Layer Security (MLS) protocol to provide end-to-end
   security assurances, including authentication of protocol
   participants, confidentiality of messages exchanged within a room,
   and agreement on the state of the room.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-mimi-protocol-06"/>
        </reference>
      </references>
    </references>
    <?line 205?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Thanks to Richard Barnes for his comment.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
