Skip to content

Conversation

@gmandyam
Copy link
Collaborator

Addressing #64

**Mandatory Claims (1-6)**: These claims are **REQUIRED** for all attestations
and provide the minimum necessary information for verifier appraisal policies:
and provide the minimum necessary information for verifier appraisal policies. Any attestation that fails
to include all mandatory claims **MUST** be rejected by the verifier:
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

MUST be rejected by the verifier

Why would the Verifier care? Especially for the non-verifiable claims. I am not sure the production Verifier itself is the right place to (always) check evidence for compliance / conformance to an EAT profile. That could be a separate tool. Maybe @laurencelundblade has an opinion.

Copy link
Collaborator

@fdamato fdamato Oct 23, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The profile shouldn`t enforce policy for the verifiers, however we can clarify that Mandatory Claim is what the Verifier would expect from a EAT that use this profile

Copy link
Collaborator Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

See new change.

@steven-bellock steven-bellock added the EAT OCP Entity Attestation Token spec label Oct 22, 2025
size constraints apply:

* The complete CWT token (including the certificate chain in the unprotected header) **SHALL NOT** exceed 64kB. This limitation aligns with the SPDM Measurement block size limit, as most OCP Attesters are expected to rely on SPDM for EAT conveyance.
* The complete CWT token (including the certificate chain in the unprotected header) **SHALL NOT** exceed 64kB (post-encoding). This limitation aligns with the SPDM Measurement block size limit, as most OCP Attesters are expected to rely on SPDM for EAT conveyance.
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

remove this, as it may creates more confusion


Implementations **MUST** account for the following signature size
implications when calculating total CWT size against the 64kB limit:
implications when calculating total (post-encoding) CWT size against the 64kB limit:
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

remove "post-encoding"

@gmandyam gmandyam force-pushed the EAT_full_profile_changes branch from 69b3351 to 1acfe25 Compare October 24, 2025 22:40
Addressing opencomputeproject#64

Signed-off-by: Giridhar Mandyam <[email protected]>
@gmandyam gmandyam force-pushed the EAT_full_profile_changes branch from 1acfe25 to 99599a9 Compare October 24, 2025 22:44
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

EAT OCP Entity Attestation Token spec

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants