Hi Brian

Yes, I think that we should  focus our development effort on the D-TA as
all the other functionality is totally dependent on it.

Regards

Kealan

On Wed, 12 Jun 2019 at 00:23, Brian Spector <br...@qredo.com> wrote:

> On the same topic of conversation, I believe the most crucial thing is
> to get a functioning D-TA out first. It is from a D-TA that all other
> applications can be built upon.
>
> The vision for this D-TA was outlined in a blog post earlier in the
> week, but I will restate it:
>
> The Decentralized Trust Authority has two jobs: 1) Issue shares of
> secrets to clients or servers or peers, or 2) safeguard secrets in a
> decentralized manner, acting as a “Fiduciary” for its Beneficiary.
>
> Use case 1) describes a D-TA issuing secrets to an MFA server or
> clients, as an example, or issuing ECDSA or Edwards curve keys to
> Beneficiaries to recreate a whole bitcoin key, as another example.
>
> Use case 2), as an example, would have a D-TA receive shares of a BLS
> key, use these keys as signature keys, to enable signature to be
> collected by a signature aggregator, who then turns the complete
> signature into a seed value for an HD Wallet.
>
> Both cases need a functioning D-TA that operates in roughly the same
> manner.
>
> We are working on D-TA code and a D-TA REST API that supports use case
> 2). This is what we will be committing to the Milagro project
> imminently.
>
> I suggest that, as a group, we start here as our focal point of
> collaboration to make sure that what we are building can support both
> scenarios.
>
> To that end, I have started updating the milagro website to support the
> inclusion of Swagger style rest API documentation. The old website was
> horribly out of date.
>
> While there is still some more porting to do, I should have this done by
> Thursday.
>
> On the subject of the code contribution, I believe it will have the
> ability to digest signed JWT tokens in bearer form to validated the
> calls from applications to 1) issue secrets or 2) safeguard secrets on
> its behalf.
>
> Focusing on the D-TA, and the D-TA’s API first just seems like a
> sensible approach. If we get the API right on the D-TA, I think
> everything else will go fast.
>
> Does everyone agree that we start with the D-TA, and then move on to the
> MFA server?
>
> Thanks
> Brian
>
>
> On 9 Jun 2019, at 16:08, Kealan McCusker wrote:
>
> > Hi All
> >
> > I would like to start a discussion about what should be in the first
> > release of the ZKP MFA component of the Milagro server.
> >
> > ZKP MFA, at it's simplest, is a drop in replacement for username /
> > password
> > that enables multi-factor authentication, no server side hashed
> > password db
> > and, best of all, it works in software!
> >
> > Here are two ways to integrate ZKP MFA into your system;
> >
> > 1. Directly
> > 2. OpenId Connect (ODIC)
> >
> > Obviously, only the second option allows federation of identity. I
> > propose,
> > at least initially, that we directly integrate the authentication
> > server
> > into a system requiring this service.
> >
> > There is also in the current Milagor repo's an old method of
> > integrating
> > ZKP MFA. In my view, it is not fit for purpose and should not be
> > followed.
> >
> > Regards
> >
> > Kealan
>

Reply via email to