diff --git a/docs/ob_v3p0.html b/docs/ob_v3p0.html index 96ca85fb..c9f39de3 100644 --- a/docs/ob_v3p0.html +++ b/docs/ob_v3p0.html @@ -2192,11 +2192,11 @@

IPR and Distribution Notice

"proof": [ { "type": "DataIntegrityProof", - "created": "2023-08-31T07:24:47Z", - "verificationMethod": "https://example.edu/issuers/565049#z6Mkpj5D7DyQo6BuZNwk8hxPapLZ286mBNWtwL91gXLaMq1t", + "created": "2023-09-07T13:59:00Z", + "verificationMethod": "https://example.edu/issuers/565049#z6Mkj7g2APpB4BHdDygq1WUYZLQ8RMDFQhVNXFgX82RsJm59", "cryptosuite": "eddsa-2022", "proofPurpose": "assertionMethod", - "proofValue": "z5tB5bwZCAuTQT4VJcS6o1qrkAxdsx7w1eXQsGNrHexz6LGhz76BcYegR4v7ESRkm59rzZk7vmDfL6aCzoEfCHfLq" + "proofValue": "zfD2iMr6n86s7q5VGGvw84MgY96Jq3K6nqKvdZkjEoBFSbqBkLZqcATKsQSAv4zERUeE3UhGG3rs1xW18n5ycw1q" } ] }
---------------- JWT header ---------------
@@ -2206,11 +2206,11 @@ 

IPR and Distribution Notice

"jwk": { "e": "AQAB", "kty": "RSA", - "n": "8h4VkMWnDvUUT2SMdbJjtUGHluiAOP4F08TiQm67hD6DBgBCvEjZRyikTscyyvtXOdFkuR -te32FkyijClxzp1rhmJNU3FKQ2wvE6EP2zBVpf0oUZ6uHOYKriVjYmh0QCFWQhuJrQkdDv--mSw4yHg1 -lm7Jn--tqYZILHGBYooHZ6MhA6_O4qlYLeeOImVgJTvtcnoL9lss1lg-mXx2swAQPVyaw6eVMdKslsWX -06WAfl9g_JtlYCu-NHKHJUx2wGcvDi9pF8Y0-EBdxZSJOb_VXdtxCJJu5EV6-F_uvjKl0E3-pfSr_OPL -S1Uukmam_sx7p68WMM0M5wAGiRRDlaGQ" + "n": "uXJHQVh1SIK_haI71jmBkMW-NDNriXMG1TDbP04IAS4T4rMh5d5fNbkjw4BDeBdVAuNbNM +bAPV24i7kwtCqKgNwQF77sisijVn62mpKIqE2nqjoiMzXfXp_ZPwVyrzufU2n-IjOggEdEUT_mQcz5Q2 +4vFpudGIvsn5YH1ZZlrvyCRGEavgKpUpEZailfBW55HOSMc17J4bilv_cXjHJ2IZwlAq7QX484WKYkBf +58DHLuoxDeE9y9CnnhDJ__CAijsEQxFzax5KdE0hadPkjwmeyg4Z5IIKpbqUD_ZgRQIK7FEmjMYuf7_j +D6TPhf04yzh4mVMbPpSyzlBQVchTSHkw" } } --------------- JWT payload --------------- @@ -2272,12 +2272,12 @@

IPR and Distribution Notice

} --------------- JWT --------------- eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCIsImp3ayI6eyJlIjoiQVFBQiIsImt0eSI6IlJTQSIsIm4i -OiI4aDRWa01XbkR2VVVUMlNNZGJKanRVR0hsdWlBT1A0RjA4VGlRbTY3aEQ2REJnQkN2RWpaUnlpa1Rz -Y3l5dnRYT2RGa3VSdGUzMkZreWlqQ2x4enAxcmhtSk5VM0ZLUTJ3dkU2RVAyekJWcGYwb1VaNnVIT1lL -cmlWalltaDBRQ0ZXUWh1SnJRa2REdi0tbVN3NHlIZzFsbTdKbi0tdHFZWklMSEdCWW9vSFo2TWhBNl9P -NHFsWUxlZU9JbVZnSlR2dGNub0w5bHNzMWxnLW1YeDJzd0FRUFZ5YXc2ZVZNZEtzbHNXWDA2V0FmbDln -X0p0bFlDdS1OSEtISlV4MndHY3ZEaTlwRjhZMC1FQmR4WlNKT2JfVlhkdHhDSkp1NUVWNi1GX3V2akts -MEUzLXBmU3JfT1BMUzFVdWttYW1fc3g3cDY4V01NME01d0FHaVJSRGxhR1EifX0.eyJ2YyI6eyJAY29u +OiJ1WEpIUVZoMVNJS19oYUk3MWptQmtNVy1ORE5yaVhNRzFURGJQMDRJQVM0VDRyTWg1ZDVmTmJranc0 +QkRlQmRWQXVOYk5NYkFQVjI0aTdrd3RDcUtnTndRRjc3c2lzaWpWbjYybXBLSXFFMm5xam9pTXpYZlhw +X1pQd1Z5cnp1ZlUybi1Jak9nZ0VkRVVUX21RY3o1UTI0dkZwdWRHSXZzbjVZSDFaWmxydnlDUkdFYXZn +S3BVcEVaYWlsZkJXNTVIT1NNYzE3SjRiaWx2X2NYakhKMklad2xBcTdRWDQ4NFdLWWtCZjU4REhMdW94 +RGVFOXk5Q25uaERKX19DQWlqc0VReEZ6YXg1S2RFMGhhZFBrandtZXlnNFo1SUlLcGJxVURfWmdSUUlL +N0ZFbWpNWXVmN19qRDZUUGhmMDR5emg0bVZNYlBwU3l6bEJRVmNoVFNIa3cifX0.eyJ2YyI6eyJAY29u dGV4dCI6WyJodHRwczovL3d3dy53My5vcmcvMjAxOC9jcmVkZW50aWFscy92MSIsImh0dHBzOi8vcHVy bC5pbXNnbG9iYWwub3JnL3NwZWMvb2IvdjNwMC9jb250ZXh0LTMuMC4yLmpzb24iLCJodHRwczovL3B1 cmwuaW1zZ2xvYmFsLm9yZy9zcGVjL29iL3YzcDAvZXh0ZW5zaW9ucy5qc29uIl0sImlkIjoiaHR0cDov @@ -2298,11 +2298,11 @@

IPR and Distribution Notice

aWFsX3NjaGVtYS5qc29uIiwidHlwZSI6IjFFZFRlY2hKc29uU2NoZW1hVmFsaWRhdG9yMjAxOSJ9XX0s ImlzcyI6Imh0dHBzOi8vZXhhbXBsZS5lZHUvaXNzdWVycy81NjUwNDkiLCJuYmYiOjEyNjIzMDQwMDAs Imp0aSI6Imh0dHA6Ly9leGFtcGxlLmVkdS9jcmVkZW50aWFscy8zNzMyIiwic3ViIjoiZGlkOmV4YW1w -bGU6ZWJmZWIxZjcxMmViYzZmMWMyNzZlMTJlYzIxIn0.iLEDC6-fd7Zw1MW-LH9Lqeqkio3PTXNO63JW -XraZcx5ow3wgwSeHz6v0N-CFXoDF72d2txTj92rrbQYWHXEgqmmKJvCMxCMQKtmkEA7DKa7_B9VpQ86a --CDky2C63xHiof8lP-5gnqwzJKZ-xq2tRDlus3xSK5DLvkde9AizBdAVXTo1omzy8RDYvoXBkkvtcYpV -plxh0elCW43UKKWdKLELeEhbcmxHstmQPYX7grwtxhlEwUWjEAkzR6VC1t-Tv-zwQIDa0wXs5N2rXc6l -dbl535tTMYQmwVJ-YG9ZjwqYBMP_CEeNfJXwchY-hTFdyf5xjyXN1bJDmM37LcI_QA

5.1 File Format

If the credential is signed using the § 8.2 JSON Web Token Proof Format (VC-JWT) the contents of the file MUST be the Compact JWS string formed as a result of signing the OpenBadgeCredential with VC-JWT. The file extension SHOULD be ".jws" or ".jwt".

If an embedded proof method is used instead, the contents of the file MUST be the JSON representation of the OpenBadgeCredential. The file extension SHOULD be ".json".

5.2 Web Resource

If the credential is signed using the § 8.2 JSON Web Token Proof Format (VC-JWT) the contents of the response MUST be the Compact JWS string formed as a result of signing the OpenBadgeCredential with VC-JWT. The Content-Type SHOULD be text/plain.

If an embedded proof method is used instead, the contents of the response MUST be the JSON representation of the OpenBadgeCredential. The Content-Type SHOULD be application/json or application/ld+json.

5.3 Baked Badge

OpenBadgeCredentials may be exchanged as image files with the credential encoded (baked) within. This allows the credential to be portable wherever image files may be stored or displayed.

"Baking" is the process of taking an OpenBadgeCredential and embedding it into the image, so that when a user displays the image on a page, software that is Open Badges aware can automatically extract that OpenBadgeCredential data and perform the checks necessary to see if a person legitimately earned the achievement within the image. The image MUST be in either PNG [PNG] or SVG [SVG11] format in order to support baking.

5.3.1 PNG

5.3.1.1 Baking

An iTXt chunk should be inserted into the PNG with keyword openbadgecredential.

If the credential is signed using the § 8.2 JSON Web Token Proof Format (VC-JWT) the text value of the chunk MUST be the Compact JWS string formed as a result of signing the OpenBadgeCredential with VC-JWT. Compression MUST NOT be used.

+bGU6ZWJmZWIxZjcxMmViYzZmMWMyNzZlMTJlYzIxIn0.m_nmX5N5of-fY-wMK4G90bLZnAFGDguVQx5k +009sSyFHliFiEqPBpB6ThQE9psfzU8RmV9awEKZlVHKpaZAl0Wt061SnlIQVsEMtnqgvwOgU6Mu9sBXG +c2PzIgqbTaXRJb-cZGw3PCp9ZlsAxXtZS8P5mXdA2ZI95rP5Y5IkZ4lC05NRxbQv2tE4h1gMHru69Wxa +rQtnlSpwGs4jeEV2AIWirevDdZfrmlEOw3UpHrdjdbASncWsHbt7eVIKX1j4sDNhS7F8_Iwuu8J9oN8a +yuPWgQWLRU9IFtVe0_oeEZdN-KyWfobq63a6BuidbbuwXmYMDdvqYI53ZsXn3QvB8w

5.1 File Format

If the credential is signed using the § 8.2 JSON Web Token Proof Format (VC-JWT) the contents of the file MUST be the Compact JWS string formed as a result of signing the OpenBadgeCredential with VC-JWT. The file extension SHOULD be ".jws" or ".jwt".

If an embedded proof method is used instead, the contents of the file MUST be the JSON representation of the OpenBadgeCredential. The file extension SHOULD be ".json".

5.2 Web Resource

If the credential is signed using the § 8.2 JSON Web Token Proof Format (VC-JWT) the contents of the response MUST be the Compact JWS string formed as a result of signing the OpenBadgeCredential with VC-JWT. The Content-Type SHOULD be text/plain.

If an embedded proof method is used instead, the contents of the response MUST be the JSON representation of the OpenBadgeCredential. The Content-Type SHOULD be application/json or application/ld+json.

5.3 Baked Badge

OpenBadgeCredentials may be exchanged as image files with the credential encoded (baked) within. This allows the credential to be portable wherever image files may be stored or displayed.

"Baking" is the process of taking an OpenBadgeCredential and embedding it into the image, so that when a user displays the image on a page, software that is Open Badges aware can automatically extract that OpenBadgeCredential data and perform the checks necessary to see if a person legitimately earned the achievement within the image. The image MUST be in either PNG [PNG] or SVG [SVG11] format in order to support baking.

5.3.1 PNG

5.3.1.1 Baking

An iTXt chunk should be inserted into the PNG with keyword openbadgecredential.

If the credential is signed using the § 8.2 JSON Web Token Proof Format (VC-JWT) the text value of the chunk MUST be the Compact JWS string formed as a result of signing the OpenBadgeCredential with VC-JWT. Compression MUST NOT be used.

Example 2: An example of creating a chunk with VC-JWT proof (assuming an iTXt constructor)
var chunk = new iTXt({
@@ -4766,7 +4766,7 @@ 

Token Revocation ResponseThe JSON object MUST have the nbf claim, and the NumericDate value MUST be converted to a DateTime, and MUST equal the issuanceDate of the OpenBadgeCredential object. If they do not match or if the issuanceDate has not yet occurred, the credential is not valid.
  • The JSON object MUST have the jti claim, and the value MUST match the id of the OpenBadgeCredential object. If they do not match, the credential is not valid.
  • If the JSON object has the exp claim, the NumericDate MUST be converted to a DateTime, and MUST be used to set the value of the expirationDate of the OpenBadgeCredential object. If the credential has expired, the credential is not valid.
  • -

    8.3 Linked Data Proof Format

    This standard supports the Linked Data Proof format using the Data Integrity EdDSA Cryptosuites v1.0 suite.

    Note
    +

    8.3 Linked Data Proof Format

    This standard supports the Linked Data Proof format. In order to opt for this format you MUST use the Data Integrity EdDSA Cryptosuites v1.0 suite.

    Note
    Whenever possible, you should use a library or service to create and verify a Linked Data Proof. For example, Digital Bazaar, Inc. has a GitHub project that implements the Data Integrity EdDSA Cryptosuites v1.0 eddsa-2022 suite at https://github.com/digitalbazaar/eddsa-2022-cryptosuite.

    8.3.1 Create the Proof

    Perform these steps to attach a Linked Data Proof to the credential:

    1. Create an instance of Multikey as shown in Section 2.1.1 DataIntegrityProof of [VC-DI-EDDSA].
    2. @@ -5678,11 +5678,7 @@

      B. Data Models - This class can be extended with additional properties. - - +

    B.1.4 Address

    An address for the described entity.

    @@ -5776,7 +5772,11 @@

    B. Data Models + This class can be extended with additional properties. + +

    B.1.5 Alignment

    Describes an alignment between an achievement and a node in an educational framework.

    @@ -6199,7 +6199,11 @@

    B. Data Models + This class can be extended with additional properties. + +

    B.1.11 IdentifierEntry

    @@ -6601,7 +6605,11 @@

    B. Data Models + This class can be extended with additional properties. + +

    B.1.16 Result

    Describes a result that was achieved.

    @@ -9086,11 +9094,11 @@

    D.1 Basic OpenBadgeC "proof": [ { "type": "DataIntegrityProof", - "created": "2023-08-31T07:24:47Z", - "verificationMethod": "https://example.com/issuers/876543#z6MkmzWav2ErPsrpkHSBVLJoJtexgtcd7KQUJF5cEFyn9UNk", + "created": "2023-09-07T13:59:00Z", + "verificationMethod": "https://example.com/issuers/876543#z6MkowNmc4o9CJCBwixtnx8digCou4zTeUHsuVh69VXySXux", "cryptosuite": "eddsa-2022", "proofPurpose": "assertionMethod", - "proofValue": "z4ZJEM7k9r5XMai1oUWw3NUBGieNZd6Z6nuc64jHNDg6HVuqoSEWNkRPWnrgMrFaWrSj7dxfNdZGPXsv2JiQ4QJ4H" + "proofValue": "ztKxZxsdz1Fg3cLzmzvyxNF1uUfYCyrCfVzAMDWdwgzgmLShwQv2DnmYeCub6SgBivkU7SNbRSTd7b9qtL1xFBSJ" } ] }
    ---------------- JWT header ---------------
    @@ -9100,11 +9108,11 @@ 

    D.1 Basic OpenBadgeC "jwk": { "e": "AQAB", "kty": "RSA", - "n": "vdDMfohmImBWAF221EoeEFy-ijXNXlQDfkjjHkhVfZRwNabSxbYeYzxRyTgwdI7mlSuxgS -Mm_5Q_LN7zO6cKVx7OHi6ENq5LcRjpIVr-W2EOsm0TvlewpxU7mu2mxyER5zOqWQFMjXzX8044eoYtTT -Vn2oSDhooPjsF2K8PhF__JlXhg08Ra7FmtsPJO9CBy3kULeqx9F9gruMEnLG9sIk9B4FaW0NNxiBYWyP -kONCEi59r4TQmiOfsmBC9u1Ebe5gVR1WDsIawmhYjNho-quzkAFJk-JzG1YduP6LGnOKRyJChRZVzYPd -_1spF91lAUBIa0a_9AZbbsX9S0ANojtQ" + "n": "vrtkiXxUDJ3uFqKHd45sXk1z9cy4QemooRrlGxaAMEVCxG3FOhJylB9zLRegmn4g43alzQ +ifZ0RI0b_5TT9gUHKo2PF211TzSsdDFlwYyhWnnGSUmQ9yJ91bQYg_PNP9b59hh4N94llWd9xgkMUGnL +Whv4QTjDh2DYAFiqbk69e0DjpDuGK8LubEBACUK-yecxD-AWGvnIDyZAvY0ZF6EU3WhgId7sw-YZzRtQ +dojNRVI70QTZeno_nPbS0x_fes_uL6iPFuu3WESSR6oMU-WRQ6-Ymp0NrwZjlb8AvLePnQYqluvW-_GX +Tqp9izA4AmYitD5-SC5BhYLO4POg8usw" } } --------------- JWT payload --------------- @@ -9152,12 +9160,12 @@

    D.1 Basic OpenBadgeC } --------------- JWT --------------- eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCIsImp3ayI6eyJlIjoiQVFBQiIsImt0eSI6IlJTQSIsIm4i -OiJ2ZERNZm9obUltQldBRjIyMUVvZUVGeS1palhOWGxRRGZrampIa2hWZlpSd05hYlN4YlllWXp4UnlU -Z3dkSTdtbFN1eGdTTW1fNVFfTE43ek82Y0tWeDdPSGk2RU5xNUxjUmpwSVZyLVcyRU9zbTBUdmxld3B4 -VTdtdTJteHlFUjV6T3FXUUZNalh6WDgwNDRlb1l0VFRWbjJvU0Rob29QanNGMks4UGhGX19KbFhoZzA4 -UmE3Rm10c1BKTzlDQnkza1VMZXF4OUY5Z3J1TUVuTEc5c0lrOUI0RmFXME5OeGlCWVd5UGtPTkNFaTU5 -cjRUUW1pT2ZzbUJDOXUxRWJlNWdWUjFXRHNJYXdtaFlqTmhvLXF1emtBRkprLUp6RzFZZHVQNkxHbk9L -UnlKQ2hSWlZ6WVBkXzFzcEY5MWxBVUJJYTBhXzlBWmJic1g5UzBBTm9qdFEifX0.eyJ2YyI6eyJAY29u +OiJ2cnRraVh4VURKM3VGcUtIZDQ1c1hrMXo5Y3k0UWVtb29ScmxHeGFBTUVWQ3hHM0ZPaEp5bEI5ekxS +ZWdtbjRnNDNhbHpRaWZaMFJJMGJfNVRUOWdVSEtvMlBGMjExVHpTc2RERmx3WXloV25uR1NVbVE5eUo5 +MWJRWWdfUE5QOWI1OWhoNE45NGxsV2Q5eGdrTVVHbkxXaHY0UVRqRGgyRFlBRmlxYms2OWUwRGpwRHVH +SzhMdWJFQkFDVUsteWVjeEQtQVdHdm5JRHlaQXZZMFpGNkVVM1doZ0lkN3N3LVlaelJ0UWRvak5SVkk3 +MFFUWmVub19uUGJTMHhfZmVzX3VMNmlQRnV1M1dFU1NSNm9NVS1XUlE2LVltcDBOcndaamxiOEF2TGVQ +blFZcWx1dlctX0dYVHFwOWl6QTRBbVlpdEQ1LVNDNUJoWUxPNFBPZzh1c3cifX0.eyJ2YyI6eyJAY29u dGV4dCI6WyJodHRwczovL3d3dy53My5vcmcvMjAxOC9jcmVkZW50aWFscy92MSIsImh0dHBzOi8vcHVy bC5pbXNnbG9iYWwub3JnL3NwZWMvb2IvdjNwMC9jb250ZXh0LTMuMC4yLmpzb24iXSwiaWQiOiJodHRw Oi8vZXhhbXBsZS5jb20vY3JlZGVudGlhbHMvMzUyNyIsInR5cGUiOlsiVmVyaWZpYWJsZUNyZWRlbnRp @@ -9174,11 +9182,11 @@

    D.1 Basic OpenBadgeC cmF0ZSB3aXRoaW4gYSBncm91cCBlbnZpcm9ubWVudC4iLCJuYW1lIjoiVGVhbXdvcmsifX19LCJpc3Mi OiJodHRwczovL2V4YW1wbGUuY29tL2lzc3VlcnMvODc2NTQzIiwibmJmIjoxMjYyMzA0MDAwLCJqdGki OiJodHRwOi8vZXhhbXBsZS5jb20vY3JlZGVudGlhbHMvMzUyNyIsInN1YiI6ImRpZDpleGFtcGxlOmVi -ZmViMWY3MTJlYmM2ZjFjMjc2ZTEyZWMyMSJ9.rKc8JzgsasebMABqbBDPj_VxQy_xmcT2EF8QdN3CRfi -8PPtZ9ALz6TmJXRY8r2JcvMZL5F3-5j1JYrN9YW-owW2ZX_CGmCfgRa24c7Lnz4ldcFooWfcrssjNw8A -S3_VXYmCjR0B9tWOiqCTOjjePV24ryT2YGCx1XZmCdJGRooq3jpMSi5ErwK2Y04YZvbykATk2hCVEKhF -h1f22oAmudKFKwkjvx2NtweBrUv04Nj-3Fs8dNCLzHyPCKIVJrdKqbxlKcFjBrDPg2VJYpEiP6-bPJVH -XxFTnT5zYU9hNV4gQbXAnwyoS6O0esWcI0-pEjma7eo7eYp32Nk8Akb0ptQ

    +ZmViMWY3MTJlYmM2ZjFjMjc2ZTEyZWMyMSJ9.t1LO8jdrd_Q0XspPEZczEoM2Qo8Rbcf3n2JRuydITTZ +G9FqsjF6QP_fUQU-xcWdImTdreVqn5fF4movLNUVIQKP2xJw3Ew80l-1igQT3MPXCnO391GfDvHsuNPn +kFtEEfkReO9xg8G968Msvyj6xAljsQSbBw5e9ccxNtzceNPNd8xiXA1pdrgb3hWNlzMtqpWvQYK12koZ +zAWq0xubyHHgfBUELCnPg_QsYrJo0sB9ZenxdauQ4FwpRwFJr1Ea5QfPdMKqq1CPPhv8TdKBbllPjSwg +G3MI_fHxQvSOlQDb-ntrMqWGt-GQXAxT11AA0LOdwxMTQdBaQrubqD_cU6A @@ -10568,11 +10576,11 @@

    D.2 Complete Open "proof": [ { "type": "DataIntegrityProof", - "created": "2023-08-31T07:24:47Z", - "verificationMethod": "https://1edtech.edu/issuers/565049#z6MkquzeLtAEMmgyrEivhpGba9oGaEsaYxNB1vp7rxm2B3Dp", + "created": "2023-09-07T13:59:00Z", + "verificationMethod": "https://1edtech.edu/issuers/565049#z6MkvQywJecnqhQZcYELQq3p9wp316AQb3u3WY6RUx9DfLe6", "cryptosuite": "eddsa-2022", "proofPurpose": "assertionMethod", - "proofValue": "z5ea5Au8mDD4p3gPx8B2JX1TAMC7m3JXL5RTCQnYWAg9ERX9G3eHfVsqK7cLBnxt4hHrztBMvWUTWBLa4DhEux8cm" + "proofValue": "z7hxZivS4emTQftRqF4YgLfx1K6oBxB9kzKF51a5oM32gCmvkzHDX9LgHRtzKi8WWDzwMfKh5xMHtF4djgvwDccL" } ] }
    ---------------- JWT header ---------------
    @@ -10582,11 +10590,11 @@ 

    D.2 Complete Open "jwk": { "e": "AQAB", "kty": "RSA", - "n": "1Euy9RmhbutVZNDIfSMuix8Zj43Ktd2Zx5jz9FkV1KmBSqul1SolRyyNuoCNkGXIzo3fdd -49p-pIbYZLV6DvvN1FZ5xCaCG7Zuc332cbmn-kGdFfsnM8BAbA5qOUQ5S_r-vL0D3MSeMixsspLET5-I -dztrwavnZvC5CCZBWrT8cV1dbygh5dm0j4qxcUKh_PI5B_us37wga6ixgbRz9bp68xHR83b7BMvqHVT7 -JJhPTdIufSclIyB9kPybQkBYIJK2VpYNEGmdYuPhc3Pyz4xOjdP7xnvtZjJMcFlFBzVle2mg3JFxhpN0 -2YsWWakv2FuGeQ3VMo9Cs7nC8blhXM-w" + "n": "rGODXxlFqi_OWgxRb-JbkUTz4mZzvEyXEuoRPT281HS4OLtiKiRHjxW2y-qNaRZU22tEOe +Gzj0E_aPWoI0RljW0W5j8OIKCxb9lcpB1Aap2T7Hysq6bnWOQQr9x2p9HnTzS_6pchH83QPHpI3_TL8I +C0dAzmsW7x1Iz66912riwB2wIATyAkemCbpIcvO6zWj-3HMjAVxf8cQ41mbDetbqQeQcVO2UBIrdXIlo +3Vde_dVALIconryIkILQutaJkwts0-Vy3h5REBxCkGCCEuLfXgoQ4Pm-u3pSSGXHl1257IY3VG4MopT7 +Q104wPvf4_EYi3NkbSLyaBU-dBllQe_w" } } --------------- JWT payload --------------- @@ -11288,12 +11296,12 @@

    D.2 Complete Open } --------------- JWT --------------- eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCIsImp3ayI6eyJlIjoiQVFBQiIsImt0eSI6IlJTQSIsIm4i -OiIxRXV5OVJtaGJ1dFZaTkRJZlNNdWl4OFpqNDNLdGQyWng1ano5RmtWMUttQlNxdWwxU29sUnl5TnVv -Q05rR1hJem8zZmRkNDlwLXBJYllaTFY2RHZ2TjFGWjV4Q2FDRzdadWMzMzJjYm1uLWtHZEZmc25NOEJB -YkE1cU9VUTVTX3ItdkwwRDNNU2VNaXhzc3BMRVQ1LUlkenRyd2F2blp2QzVDQ1pCV3JUOGNWMWRieWdo -NWRtMGo0cXhjVUtoX1BJNUJfdXMzN3dnYTZpeGdiUno5YnA2OHhIUjgzYjdCTXZxSFZUN0pKaFBUZEl1 -ZlNjbEl5QjlrUHliUWtCWUlKSzJWcFlORUdtZFl1UGhjM1B5ejR4T2pkUDd4bnZ0WmpKTWNGbEZCelZs -ZTJtZzNKRnhocE4wMllzV1dha3YyRnVHZVEzVk1vOUNzN25DOGJsaFhNLXcifX0.eyJ2YyI6eyJAY29u +OiJyR09EWHhsRnFpX09XZ3hSYi1KYmtVVHo0bVp6dkV5WEV1b1JQVDI4MUhTNE9MdGlLaVJIanhXMnkt +cU5hUlpVMjJ0RU9lR3pqMEVfYVBXb0kwUmxqVzBXNWo4T0lLQ3hiOWxjcEIxQWFwMlQ3SHlzcTZibldP +UVFyOXgycDlIblR6U182cGNoSDgzUVBIcEkzX1RMOElDMGRBem1zVzd4MUl6NjY5MTJyaXdCMndJQVR5 +QWtlbUNicEljdk82eldqLTNITWpBVnhmOGNRNDFtYkRldGJxUWVRY1ZPMlVCSXJkWElsbzNWZGVfZFZB +TEljb25yeUlrSUxRdXRhSmt3dHMwLVZ5M2g1UkVCeENrR0NDRXVMZlhnb1E0UG0tdTNwU1NHWEhsMTI1 +N0lZM1ZHNE1vcFQ3UTEwNHdQdmY0X0VZaTNOa2JTTHlhQlUtZEJsbFFlX3cifX0.eyJ2YyI6eyJAY29u dGV4dCI6WyJodHRwczovL3d3dy53My5vcmcvMjAxOC9jcmVkZW50aWFscy92MSIsImh0dHBzOi8vcHVy bC5pbXNnbG9iYWwub3JnL3NwZWMvb2IvdjNwMC9jb250ZXh0LTMuMC4yLmpzb24iLCJodHRwczovL3B1 cmwuaW1zZ2xvYmFsLm9yZy9zcGVjL29iL3YzcDAvZXh0ZW5zaW9ucy5qc29uIl0sImlkIjoiaHR0cDov @@ -11563,12 +11571,12 @@

    D.2 Complete Open Y2guZWR1L2NyZWRlbnRpYWxzLzM3MzIiLCJ0eXBlIjoiMUVkVGVjaENyZWRlbnRpYWxSZWZyZXNoIn19 LCJleHAiOjE4OTM0NTYwMDAsImlzcyI6Imh0dHBzOi8vMWVkdGVjaC5lZHUvaXNzdWVycy81NjUwNDki LCJuYmYiOjEyNjIzMDQwMDAsImp0aSI6Imh0dHA6Ly8xZWR0ZWNoLmVkdS9jcmVkZW50aWFscy8zNzMy -Iiwic3ViIjoiZGlkOmV4YW1wbGU6ZWJmZWIxZjcxMmViYzZmMWMyNzZlMTJlYzIxIn0.Dp3PhEtexqEb -TA-s9gXSwHqU506Kv1rpi7iM8R_xloA6Yu5jgb1gVvXOfpHm6hKq520BancPjkdKme14XlJSgjP5Ce10 -fYr3V10ApkLXrL3oRcBFthRYqohNWqA6xsVJ4Tg5OKRCJsuL9BoS-MahFZ6PSn8MWE_AA583OeekoNAP -MJQMjrj_OmbD1YPm7L3oeqjfPhAuvTpxoNzuw_EkrN6jzzRr4SOJsDk_CQYkdbtg39OcVjtFpGdic0WX --AdSGaNoyG517gJGk4Z2Ib8NM97IiIQlcm090E9AwemoDZxKy0l-QhQ6ozsNxOoB5JLJhlaVmzcuuXo3 -PBgAfELzTQ

    +Iiwic3ViIjoiZGlkOmV4YW1wbGU6ZWJmZWIxZjcxMmViYzZmMWMyNzZlMTJlYzIxIn0.NblT5_A_U1Vq +i3g4MLW0H8BkW1LfKibF9jCuR9PXww9kLYguz4hLmd-19eZYLPDqCBYDIitPXbQ3DmIQtVH2Kty1xiss +A-wv3IblhgcriyVKpYEUUb9mGD62bGoqnQ18kbWZxn3Npmuj6d-XrQ8lfz3VgU4LFWZlWH80DyXrTK5H +hEeIwmVioiB39Ps5JB0L-WXWKlyxYbm2xlAWVZLpKjASjHyFCUYzKwlG90_POYjIQWlk01E1XRe1l9L8 +e7o6LelsICbN9N3WMvxxdHArhU9_N1pQl0AZWPbo5ZhIEipZVsyjsLDJ7wfcfOuJ42WT0tytnhrEMSp- +lR8fMu1aSw @@ -11668,11 +11676,11 @@

    D.3 EndorsementCredent "proof": [ { "type": "DataIntegrityProof", - "created": "2023-08-31T07:24:48Z", - "verificationMethod": "https://state.gov/issuers/565049#z6MkjgVY1eATJqYKjdszahVLbT1FMCzfewfhR9pVgZqQGhy3", + "created": "2023-09-07T13:59:01Z", + "verificationMethod": "https://state.gov/issuers/565049#z6MkqT84vWwrxGbw9occTbnk25HKBnQEMERaRcJ8QfU4RPru", "cryptosuite": "eddsa-2022", "proofPurpose": "assertionMethod", - "proofValue": "z3P7XBixJkMhAG9RsEZwSuToBxAegqGgD3UBoJew3F9jRdz2rVMTj43fntfFoPEfHJ6gdAH9DoaRqsTUKh3AwVSp5" + "proofValue": "zdHVP5Ff3WkNJmRr7HJM8ZFGpJmiLM9VnXqawqVM3QCbp5kZ6WM2w2FwN79nYDGeGcoDYAKh9Z3Rm9rZNGdW5MzX" } ] }
    ---------------- JWT header ---------------
    @@ -11682,11 +11690,11 @@ 

    D.3 EndorsementCredent "jwk": { "e": "AQAB", "kty": "RSA", - "n": "3xWXWeA1JtNsQndUrdryqLKWEiIkXKXWI_MYE6VzltWBydddW4j0VcKqwU5N6a8GSpQDhv -UCRMF_lGGU9TlBqhh2PjAWTcWNDPpZDZWdCvySSGK4DrBKMnHBipKqYPssn-Cee7cqvUkCLiGBb8IekZ -yBfrz6RZzzP4Ou7NisTg3-0K1oyOTUt9ZAGixXZX2IMhcg6aG3LC3zcNOmnWb-R1-CfMZzmVxnWXhHg2 -mJJ7RsQYaMxWcwXzr5jgYkLQJWa21J38KokbCvCgI14rQxTiRW06sGt0gtcQvTR4X61qxuhQOn3D5b-X -uKmPom1KeLUtz0cbAdfv4d-XHqhagUWQ" + "n": "tcde-986p3RxE3gVhRfE6QT6au7pbjzQNRsWNcZc24x4GznbleQoWny8Ixz6JpNr37X8La +n-EJgPf_NpRsdgj989R_FEzN8DKTTGWrqvauwX0zCK98BQKHmwoLJjoODmdCffaTIkCxSkk_OxORLVxL +hzyPF_5g9HT2CuVBnU8Ga7mePUXhOA5cdvUFaCZcO8jODR7_SlDNAOXQrgRG157-4wlo1ohuafSm2sYD +Hl5CLckYpr8w4FTn-DtbVjyOHuCX0vCyahIg_IpyBaEZTusrCE1Zi4qCHEucnPYNQyx1IU1Pl0JAm2Hz +JnBuBQqQgsW9acSGx-yJLN6C8roJ26AQ" } } --------------- JWT payload --------------- @@ -11746,12 +11754,12 @@

    D.3 EndorsementCredent } --------------- JWT --------------- eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCIsImp3ayI6eyJlIjoiQVFBQiIsImt0eSI6IlJTQSIsIm4i -OiIzeFdYV2VBMUp0TnNRbmRVcmRyeXFMS1dFaUlrWEtYV0lfTVlFNlZ6bHRXQnlkZGRXNGowVmNLcXdV -NU42YThHU3BRRGh2VUNSTUZfbEdHVTlUbEJxaGgyUGpBV1RjV05EUHBaRFpXZEN2eVNTR0s0RHJCS01u -SEJpcEtxWVBzc24tQ2VlN2NxdlVrQ0xpR0JiOElla1p5QmZyejZSWnp6UDRPdTdOaXNUZzMtMEsxb3lP -VFV0OVpBR2l4WFpYMklNaGNnNmFHM0xDM3pjTk9tbldiLVIxLUNmTVp6bVZ4bldYaEhnMm1KSjdSc1FZ -YU14V2N3WHpyNWpnWWtMUUpXYTIxSjM4S29rYkN2Q2dJMTRyUXhUaVJXMDZzR3QwZ3RjUXZUUjRYNjFx -eHVoUU9uM0Q1Yi1YdUttUG9tMUtlTFV0ejBjYkFkZnY0ZC1YSHFoYWdVV1EifX0.eyJ2YyI6eyJAY29u +OiJ0Y2RlLTk4NnAzUnhFM2dWaFJmRTZRVDZhdTdwYmp6UU5Sc1dOY1pjMjR4NEd6bmJsZVFvV255OEl4 +ejZKcE5yMzdYOExhbi1FSmdQZl9OcFJzZGdqOTg5Ul9GRXpOOERLVFRHV3JxdmF1d1gwekNLOThCUUtI +bXdvTEpqb09EbWRDZmZhVElrQ3hTa2tfT3hPUkxWeExoenlQRl81ZzlIVDJDdVZCblU4R2E3bWVQVVho +T0E1Y2R2VUZhQ1pjTzhqT0RSN19TbEROQU9YUXJnUkcxNTctNHdsbzFvaHVhZlNtMnNZREhsNUNMY2tZ +cHI4dzRGVG4tRHRiVmp5T0h1Q1gwdkN5YWhJZ19JcHlCYUVaVHVzckNFMVppNHFDSEV1Y25QWU5ReXgx +SVUxUGwwSkFtMkh6Sm5CdUJRcVFnc1c5YWNTR3gteUpMTjZDOHJvSjI2QVEifX0.eyJ2YyI6eyJAY29u dGV4dCI6WyJodHRwczovL3d3dy53My5vcmcvMjAxOC9jcmVkZW50aWFscy92MSIsImh0dHBzOi8vcHVy bC5pbXNnbG9iYWwub3JnL3NwZWMvb2IvdjNwMC9jb250ZXh0LTMuMC4yLmpzb24iLCJodHRwczovL3B1 cmwuaW1zZ2xvYmFsLm9yZy9zcGVjL29iL3YzcDAvZXh0ZW5zaW9ucy5qc29uIl0sImlkIjoiaHR0cDov @@ -11773,11 +11781,11 @@

    D.3 EndorsementCredent RWRUZWNoQ3JlZGVudGlhbFJlZnJlc2gifX0sImV4cCI6MTg5MzQ1NjAwMCwiaXNzIjoiaHR0cHM6Ly9z dGF0ZS5nb3YvaXNzdWVycy81NjUwNDkiLCJuYmYiOjEyNjIzMDQwMDAsImp0aSI6Imh0dHA6Ly8xZWR0 ZWNoLmVkdS9lbmRvcnNlbWVudGNyZWRlbnRpYWwvMzczMiIsInN1YiI6Imh0dHBzOi8vMWVkdGVjaC5l -ZHUvaXNzdWVycy81NjUwNDkifQ.TLtm8esBisP-jaFhFHruOh2T7zOAUJoeW84OoUikTuKy-GMXPOmNM -LmCkijfY5Cn4Or-8OpyYCoJi9DdSU4PPvs4_PpixZq9icZ9vWkiz4GBBwu8SRlC7n6xiv4lhE2DiJ0CB -JGFUpBkyk4JDm4rq7RvW5LnfNVv2p4EOsdE3tA1BbOAkbEibbh95aZ1t2paopsZbAob9Fxxq584U4_e- -BVTFLswdXCm_2X5yp-4Uk9SzBXS10i6pyUNKYd7Vmhzf2ef_E-4rV7INf4UIC5NWpD2at8qvlAIooRuy -HDqlieHJgerPmMkDY4APEBYhgG_a0fvIsn2mA0w18PUpS67ZQ

    +ZHUvaXNzdWVycy81NjUwNDkifQ.Pb9WU5OAhyPh7jnlzRXv8ix8I3B2em1onzPg1gn2rWmRhBcSED7SW +N_L-bmiNTjOwgxaHduS3CzqC6sJnwp0Vk4h88X90Y2625uzwnnc1TrWV-_kEeKEFTKjit5-y9SYHunj5 +vXAE6LLjp32SDxurrlfTpXVVhVIN-X3trXOdSLxK6GEK52LjmPpCYaWuDMl5NFxRNUlqYJwRgQW2h7Dp +Gg4v6YTPhtMgirRLOZj9ZRewxQxtAg1nOHsSAS98yNejH94XOGZMv5ruBa1F4OaAs-KFxjfJ-myX_VLW +ljfpGgjUsqPnSPe7KfP4qSR0UCS6l16rfy8eVIFy5cXPNl58g @@ -11868,11 +11876,11 @@

    D.4 Achievement Ali "proof": [ { "type": "DataIntegrityProof", - "created": "2023-08-31T07:24:48Z", - "verificationMethod": "https://example.edu/issuers/565049#z6Mkpj5D7DyQo6BuZNwk8hxPapLZ286mBNWtwL91gXLaMq1t", + "created": "2023-09-07T13:59:01Z", + "verificationMethod": "https://example.edu/issuers/565049#z6Mkj7g2APpB4BHdDygq1WUYZLQ8RMDFQhVNXFgX82RsJm59", "cryptosuite": "eddsa-2022", "proofPurpose": "assertionMethod", - "proofValue": "z3BXJvtJ6iDn5Rz2dDX7kVSXXCMuQh2v2qkK1eaxpL4q1Mp6vNQiysxLgUvzA32GnYBXArGssJzQLBQoqqCzjRwxx" + "proofValue": "znsXzvX9z1LpihXdaDqLYkg8YsCCbbvLDFyznExoNVR64QwQgq8pTmkWkxJPxTqNjh3LqwaWuhMW6Vfi42rxGYsr" } ] }
    ---------------- JWT header ---------------
    @@ -11882,11 +11890,11 @@ 

    D.4 Achievement Ali "jwk": { "e": "AQAB", "kty": "RSA", - "n": "8h4VkMWnDvUUT2SMdbJjtUGHluiAOP4F08TiQm67hD6DBgBCvEjZRyikTscyyvtXOdFkuR -te32FkyijClxzp1rhmJNU3FKQ2wvE6EP2zBVpf0oUZ6uHOYKriVjYmh0QCFWQhuJrQkdDv--mSw4yHg1 -lm7Jn--tqYZILHGBYooHZ6MhA6_O4qlYLeeOImVgJTvtcnoL9lss1lg-mXx2swAQPVyaw6eVMdKslsWX -06WAfl9g_JtlYCu-NHKHJUx2wGcvDi9pF8Y0-EBdxZSJOb_VXdtxCJJu5EV6-F_uvjKl0E3-pfSr_OPL -S1Uukmam_sx7p68WMM0M5wAGiRRDlaGQ" + "n": "uXJHQVh1SIK_haI71jmBkMW-NDNriXMG1TDbP04IAS4T4rMh5d5fNbkjw4BDeBdVAuNbNM +bAPV24i7kwtCqKgNwQF77sisijVn62mpKIqE2nqjoiMzXfXp_ZPwVyrzufU2n-IjOggEdEUT_mQcz5Q2 +4vFpudGIvsn5YH1ZZlrvyCRGEavgKpUpEZailfBW55HOSMc17J4bilv_cXjHJ2IZwlAq7QX484WKYkBf +58DHLuoxDeE9y9CnnhDJ__CAijsEQxFzax5KdE0hadPkjwmeyg4Z5IIKpbqUD_ZgRQIK7FEmjMYuf7_j +D6TPhf04yzh4mVMbPpSyzlBQVchTSHkw" } } --------------- JWT payload --------------- @@ -11945,12 +11953,12 @@

    D.4 Achievement Ali } --------------- JWT --------------- eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCIsImp3ayI6eyJlIjoiQVFBQiIsImt0eSI6IlJTQSIsIm4i -OiI4aDRWa01XbkR2VVVUMlNNZGJKanRVR0hsdWlBT1A0RjA4VGlRbTY3aEQ2REJnQkN2RWpaUnlpa1Rz -Y3l5dnRYT2RGa3VSdGUzMkZreWlqQ2x4enAxcmhtSk5VM0ZLUTJ3dkU2RVAyekJWcGYwb1VaNnVIT1lL -cmlWalltaDBRQ0ZXUWh1SnJRa2REdi0tbVN3NHlIZzFsbTdKbi0tdHFZWklMSEdCWW9vSFo2TWhBNl9P -NHFsWUxlZU9JbVZnSlR2dGNub0w5bHNzMWxnLW1YeDJzd0FRUFZ5YXc2ZVZNZEtzbHNXWDA2V0FmbDln -X0p0bFlDdS1OSEtISlV4MndHY3ZEaTlwRjhZMC1FQmR4WlNKT2JfVlhkdHhDSkp1NUVWNi1GX3V2akts -MEUzLXBmU3JfT1BMUzFVdWttYW1fc3g3cDY4V01NME01d0FHaVJSRGxhR1EifX0.eyJ2YyI6eyJAY29u +OiJ1WEpIUVZoMVNJS19oYUk3MWptQmtNVy1ORE5yaVhNRzFURGJQMDRJQVM0VDRyTWg1ZDVmTmJranc0 +QkRlQmRWQXVOYk5NYkFQVjI0aTdrd3RDcUtnTndRRjc3c2lzaWpWbjYybXBLSXFFMm5xam9pTXpYZlhw +X1pQd1Z5cnp1ZlUybi1Jak9nZ0VkRVVUX21RY3o1UTI0dkZwdWRHSXZzbjVZSDFaWmxydnlDUkdFYXZn +S3BVcEVaYWlsZkJXNTVIT1NNYzE3SjRiaWx2X2NYakhKMklad2xBcTdRWDQ4NFdLWWtCZjU4REhMdW94 +RGVFOXk5Q25uaERKX19DQWlqc0VReEZ6YXg1S2RFMGhhZFBrandtZXlnNFo1SUlLcGJxVURfWmdSUUlL +N0ZFbWpNWXVmN19qRDZUUGhmMDR5emg0bVZNYlBwU3l6bEJRVmNoVFNIa3cifX0.eyJ2YyI6eyJAY29u dGV4dCI6WyJodHRwczovL3d3dy53My5vcmcvMjAxOC9jcmVkZW50aWFscy92MSIsImh0dHBzOi8vcHVy bC5pbXNnbG9iYWwub3JnL3NwZWMvb2IvdjNwMC9jb250ZXh0LTMuMC4yLmpzb24iXSwiaWQiOiJodHRw Oi8vZXhhbXBsZS5lZHUvY3JlZGVudGlhbHMvMzczMiIsInR5cGUiOlsiVmVyaWZpYWJsZUNyZWRlbnRp @@ -11972,11 +11980,11 @@

    D.4 Achievement Ali bGZpbmRlci5vcmcvY3JlZGVudGlhbC8yMDIyOS9SZXF1aXJlbWVudHNfQW5hbHlzaXMifV19fX0sImlz cyI6Imh0dHBzOi8vZXhhbXBsZS5lZHUvaXNzdWVycy81NjUwNDkiLCJuYmYiOjEyNjIzMDQwMDAsImp0 aSI6Imh0dHA6Ly9leGFtcGxlLmVkdS9jcmVkZW50aWFscy8zNzMyIiwic3ViIjoiZGlkOmV4YW1wbGU6 -ZWJmZWIxZjcxMmViYzZmMWMyNzZlMTJlYzIxIn0.fq6OUK8u6da7DAowVvU0R-aGrAYlPrB_xOf8aRKG -NxyB1bzv9XxcgWuD42r9P_DriMbnfjmAtFTXlGqHysojQRzVIkj6ubqfgngddKUSX7mIgXK7tomeL6aN -ZjkhVxo2WtRwCarVs9nnk6OGJE5Bjedf0Oje3t3-rg3gNXz7rE6ias0MQVEki5iGTFRHZvIrDxTsO9XL -_YCX7N_V2Rb1cokVV8SFZCZRb_EH5g7xH2at502bqCpHyXAQt0tE9ru9apc3-Rkd8TkWwKsV8e-ANwBy -udyuNJ-xqWRmPa9C4Em-TDmvMJ3iSnXvroGw008qUa3oZdrbuE8_xyjLoDdgkA

    +ZWJmZWIxZjcxMmViYzZmMWMyNzZlMTJlYzIxIn0.dWGcIdoq7SUmX9LLXoPcOstl8QelmGMIoIAGx3PA +V-laZ0CxaQKcYTVhb5Cb01zSq552jgqQtTLoaJ-hjyF03LPVedn1EH1mar4QGwGHhOF890d6ywXfnXBk +DiLmU0HQj16EgpkSTGEmqJPkXnajq2myqN20I2_M6DeuOuDQmwdNr-nUD42qdCzp_Mtv2HzT85YSkYUG +oCR9GWOo_i6Sf-WVTf7Z1M_G0F3GTOhYYFOAcwgyA79OJIszl8O6L6P-rWxy4QkbmOfKZXEH2VaMVr87 +MoQMq-NKnqQ5nvqTQfLuMoB5NBd1cUt5Y0e4bm03nit0C8hZ7NQDQQIWMMXwsA @@ -12067,11 +12075,11 @@

    D.5 Ac "proof": [ { "type": "DataIntegrityProof", - "created": "2023-08-31T07:24:48Z", - "verificationMethod": "https://example.edu/issuers/565049#z6Mkpj5D7DyQo6BuZNwk8hxPapLZ286mBNWtwL91gXLaMq1t", + "created": "2023-09-07T13:59:01Z", + "verificationMethod": "https://example.edu/issuers/565049#z6Mkj7g2APpB4BHdDygq1WUYZLQ8RMDFQhVNXFgX82RsJm59", "cryptosuite": "eddsa-2022", "proofPurpose": "assertionMethod", - "proofValue": "z3BXJvtJ6iDn5Rz2dDX7kVSXXCMuQh2v2qkK1eaxpL4q1Mp6vNQiysxLgUvzA32GnYBXArGssJzQLBQoqqCzjRwxx" + "proofValue": "znsXzvX9z1LpihXdaDqLYkg8YsCCbbvLDFyznExoNVR64QwQgq8pTmkWkxJPxTqNjh3LqwaWuhMW6Vfi42rxGYsr" } ] }
    ---------------- JWT header ---------------
    @@ -12081,11 +12089,11 @@ 

    D.5 Ac "jwk": { "e": "AQAB", "kty": "RSA", - "n": "8h4VkMWnDvUUT2SMdbJjtUGHluiAOP4F08TiQm67hD6DBgBCvEjZRyikTscyyvtXOdFkuR -te32FkyijClxzp1rhmJNU3FKQ2wvE6EP2zBVpf0oUZ6uHOYKriVjYmh0QCFWQhuJrQkdDv--mSw4yHg1 -lm7Jn--tqYZILHGBYooHZ6MhA6_O4qlYLeeOImVgJTvtcnoL9lss1lg-mXx2swAQPVyaw6eVMdKslsWX -06WAfl9g_JtlYCu-NHKHJUx2wGcvDi9pF8Y0-EBdxZSJOb_VXdtxCJJu5EV6-F_uvjKl0E3-pfSr_OPL -S1Uukmam_sx7p68WMM0M5wAGiRRDlaGQ" + "n": "uXJHQVh1SIK_haI71jmBkMW-NDNriXMG1TDbP04IAS4T4rMh5d5fNbkjw4BDeBdVAuNbNM +bAPV24i7kwtCqKgNwQF77sisijVn62mpKIqE2nqjoiMzXfXp_ZPwVyrzufU2n-IjOggEdEUT_mQcz5Q2 +4vFpudGIvsn5YH1ZZlrvyCRGEavgKpUpEZailfBW55HOSMc17J4bilv_cXjHJ2IZwlAq7QX484WKYkBf +58DHLuoxDeE9y9CnnhDJ__CAijsEQxFzax5KdE0hadPkjwmeyg4Z5IIKpbqUD_ZgRQIK7FEmjMYuf7_j +D6TPhf04yzh4mVMbPpSyzlBQVchTSHkw" } } --------------- JWT payload --------------- @@ -12144,12 +12152,12 @@

    D.5 Ac } --------------- JWT --------------- eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCIsImp3ayI6eyJlIjoiQVFBQiIsImt0eSI6IlJTQSIsIm4i -OiI4aDRWa01XbkR2VVVUMlNNZGJKanRVR0hsdWlBT1A0RjA4VGlRbTY3aEQ2REJnQkN2RWpaUnlpa1Rz -Y3l5dnRYT2RGa3VSdGUzMkZreWlqQ2x4enAxcmhtSk5VM0ZLUTJ3dkU2RVAyekJWcGYwb1VaNnVIT1lL -cmlWalltaDBRQ0ZXUWh1SnJRa2REdi0tbVN3NHlIZzFsbTdKbi0tdHFZWklMSEdCWW9vSFo2TWhBNl9P -NHFsWUxlZU9JbVZnSlR2dGNub0w5bHNzMWxnLW1YeDJzd0FRUFZ5YXc2ZVZNZEtzbHNXWDA2V0FmbDln -X0p0bFlDdS1OSEtISlV4MndHY3ZEaTlwRjhZMC1FQmR4WlNKT2JfVlhkdHhDSkp1NUVWNi1GX3V2akts -MEUzLXBmU3JfT1BMUzFVdWttYW1fc3g3cDY4V01NME01d0FHaVJSRGxhR1EifX0.eyJ2YyI6eyJAY29u +OiJ1WEpIUVZoMVNJS19oYUk3MWptQmtNVy1ORE5yaVhNRzFURGJQMDRJQVM0VDRyTWg1ZDVmTmJranc0 +QkRlQmRWQXVOYk5NYkFQVjI0aTdrd3RDcUtnTndRRjc3c2lzaWpWbjYybXBLSXFFMm5xam9pTXpYZlhw +X1pQd1Z5cnp1ZlUybi1Jak9nZ0VkRVVUX21RY3o1UTI0dkZwdWRHSXZzbjVZSDFaWmxydnlDUkdFYXZn +S3BVcEVaYWlsZkJXNTVIT1NNYzE3SjRiaWx2X2NYakhKMklad2xBcTdRWDQ4NFdLWWtCZjU4REhMdW94 +RGVFOXk5Q25uaERKX19DQWlqc0VReEZ6YXg1S2RFMGhhZFBrandtZXlnNFo1SUlLcGJxVURfWmdSUUlL +N0ZFbWpNWXVmN19qRDZUUGhmMDR5emg0bVZNYlBwU3l6bEJRVmNoVFNIa3cifX0.eyJ2YyI6eyJAY29u dGV4dCI6WyJodHRwczovL3d3dy53My5vcmcvMjAxOC9jcmVkZW50aWFscy92MSIsImh0dHBzOi8vcHVy bC5pbXNnbG9iYWwub3JnL3NwZWMvb2IvdjNwMC9jb250ZXh0LTMuMC4yLmpzb24iXSwiaWQiOiJodHRw Oi8vZXhhbXBsZS5lZHUvY3JlZGVudGlhbHMvMzczMiIsInR5cGUiOlsiVmVyaWZpYWJsZUNyZWRlbnRp @@ -12171,11 +12179,11 @@

    D.5 Ac bGZpbmRlci5vcmcvY3JlZGVudGlhbC8yMDIyOS9SZXF1aXJlbWVudHNfQW5hbHlzaXMifV19fX0sImlz cyI6Imh0dHBzOi8vZXhhbXBsZS5lZHUvaXNzdWVycy81NjUwNDkiLCJuYmYiOjEyNjIzMDQwMDAsImp0 aSI6Imh0dHA6Ly9leGFtcGxlLmVkdS9jcmVkZW50aWFscy8zNzMyIiwic3ViIjoiZGlkOmV4YW1wbGU6 -ZWJmZWIxZjcxMmViYzZmMWMyNzZlMTJlYzIxIn0.fq6OUK8u6da7DAowVvU0R-aGrAYlPrB_xOf8aRKG -NxyB1bzv9XxcgWuD42r9P_DriMbnfjmAtFTXlGqHysojQRzVIkj6ubqfgngddKUSX7mIgXK7tomeL6aN -ZjkhVxo2WtRwCarVs9nnk6OGJE5Bjedf0Oje3t3-rg3gNXz7rE6ias0MQVEki5iGTFRHZvIrDxTsO9XL -_YCX7N_V2Rb1cokVV8SFZCZRb_EH5g7xH2at502bqCpHyXAQt0tE9ru9apc3-Rkd8TkWwKsV8e-ANwBy -udyuNJ-xqWRmPa9C4Em-TDmvMJ3iSnXvroGw008qUa3oZdrbuE8_xyjLoDdgkA

    +ZWJmZWIxZjcxMmViYzZmMWMyNzZlMTJlYzIxIn0.dWGcIdoq7SUmX9LLXoPcOstl8QelmGMIoIAGx3PA +V-laZ0CxaQKcYTVhb5Cb01zSq552jgqQtTLoaJ-hjyF03LPVedn1EH1mar4QGwGHhOF890d6ywXfnXBk +DiLmU0HQj16EgpkSTGEmqJPkXnajq2myqN20I2_M6DeuOuDQmwdNr-nUD42qdCzp_Mtv2HzT85YSkYUG +oCR9GWOo_i6Sf-WVTf7Z1M_G0F3GTOhYYFOAcwgyA79OJIszl8O6L6P-rWxy4QkbmOfKZXEH2VaMVr87 +MoQMq-NKnqQ5nvqTQfLuMoB5NBd1cUt5Y0e4bm03nit0C8hZ7NQDQQIWMMXwsA @@ -12346,11 +12354,11 @@

    D.6 Skill Assertion (CASE "proof": [ { "type": "DataIntegrityProof", - "created": "2023-08-31T07:24:48Z", - "verificationMethod": "https://1edtech.edu/issuers/565049#z6MkquzeLtAEMmgyrEivhpGba9oGaEsaYxNB1vp7rxm2B3Dp", + "created": "2023-09-07T13:59:01Z", + "verificationMethod": "https://1edtech.edu/issuers/565049#z6MkvQywJecnqhQZcYELQq3p9wp316AQb3u3WY6RUx9DfLe6", "cryptosuite": "eddsa-2022", "proofPurpose": "assertionMethod", - "proofValue": "z5Qh5bH6fLu2kmb8f6hDhnBw2P7SR7aYjkE53QsRRDVjqhuKBopvJHfSidbseheQDCmfVt1r1qdzcHFr862a9Zkqz" + "proofValue": "z2GUpW2gDYWxuxeV1dUBBtT1fWZFHNJvTTeHCRdBHQK9bV19P4tBKEHAt4c1oApFBXdmJh1YbSAaHrcxEfAeMnmhW" } ] }
    ---------------- JWT header ---------------
    @@ -12360,11 +12368,11 @@ 

    D.6 Skill Assertion (CASE "jwk": { "e": "AQAB", "kty": "RSA", - "n": "1Euy9RmhbutVZNDIfSMuix8Zj43Ktd2Zx5jz9FkV1KmBSqul1SolRyyNuoCNkGXIzo3fdd -49p-pIbYZLV6DvvN1FZ5xCaCG7Zuc332cbmn-kGdFfsnM8BAbA5qOUQ5S_r-vL0D3MSeMixsspLET5-I -dztrwavnZvC5CCZBWrT8cV1dbygh5dm0j4qxcUKh_PI5B_us37wga6ixgbRz9bp68xHR83b7BMvqHVT7 -JJhPTdIufSclIyB9kPybQkBYIJK2VpYNEGmdYuPhc3Pyz4xOjdP7xnvtZjJMcFlFBzVle2mg3JFxhpN0 -2YsWWakv2FuGeQ3VMo9Cs7nC8blhXM-w" + "n": "rGODXxlFqi_OWgxRb-JbkUTz4mZzvEyXEuoRPT281HS4OLtiKiRHjxW2y-qNaRZU22tEOe +Gzj0E_aPWoI0RljW0W5j8OIKCxb9lcpB1Aap2T7Hysq6bnWOQQr9x2p9HnTzS_6pchH83QPHpI3_TL8I +C0dAzmsW7x1Iz66912riwB2wIATyAkemCbpIcvO6zWj-3HMjAVxf8cQ41mbDetbqQeQcVO2UBIrdXIlo +3Vde_dVALIconryIkILQutaJkwts0-Vy3h5REBxCkGCCEuLfXgoQ4Pm-u3pSSGXHl1257IY3VG4MopT7 +Q104wPvf4_EYi3NkbSLyaBU-dBllQe_w" } } --------------- JWT payload --------------- @@ -12470,12 +12478,12 @@

    D.6 Skill Assertion (CASE } --------------- JWT --------------- eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCIsImp3ayI6eyJlIjoiQVFBQiIsImt0eSI6IlJTQSIsIm4i -OiIxRXV5OVJtaGJ1dFZaTkRJZlNNdWl4OFpqNDNLdGQyWng1ano5RmtWMUttQlNxdWwxU29sUnl5TnVv -Q05rR1hJem8zZmRkNDlwLXBJYllaTFY2RHZ2TjFGWjV4Q2FDRzdadWMzMzJjYm1uLWtHZEZmc25NOEJB -YkE1cU9VUTVTX3ItdkwwRDNNU2VNaXhzc3BMRVQ1LUlkenRyd2F2blp2QzVDQ1pCV3JUOGNWMWRieWdo -NWRtMGo0cXhjVUtoX1BJNUJfdXMzN3dnYTZpeGdiUno5YnA2OHhIUjgzYjdCTXZxSFZUN0pKaFBUZEl1 -ZlNjbEl5QjlrUHliUWtCWUlKSzJWcFlORUdtZFl1UGhjM1B5ejR4T2pkUDd4bnZ0WmpKTWNGbEZCelZs -ZTJtZzNKRnhocE4wMllzV1dha3YyRnVHZVEzVk1vOUNzN25DOGJsaFhNLXcifX0.eyJ2YyI6eyJAY29u +OiJyR09EWHhsRnFpX09XZ3hSYi1KYmtVVHo0bVp6dkV5WEV1b1JQVDI4MUhTNE9MdGlLaVJIanhXMnkt +cU5hUlpVMjJ0RU9lR3pqMEVfYVBXb0kwUmxqVzBXNWo4T0lLQ3hiOWxjcEIxQWFwMlQ3SHlzcTZibldP +UVFyOXgycDlIblR6U182cGNoSDgzUVBIcEkzX1RMOElDMGRBem1zVzd4MUl6NjY5MTJyaXdCMndJQVR5 +QWtlbUNicEljdk82eldqLTNITWpBVnhmOGNRNDFtYkRldGJxUWVRY1ZPMlVCSXJkWElsbzNWZGVfZFZB +TEljb25yeUlrSUxRdXRhSmt3dHMwLVZ5M2g1UkVCeENrR0NDRXVMZlhnb1E0UG0tdTNwU1NHWEhsMTI1 +N0lZM1ZHNE1vcFQ3UTEwNHdQdmY0X0VZaTNOa2JTTHlhQlUtZEJsbFFlX3cifX0.eyJ2YyI6eyJAY29u dGV4dCI6WyJodHRwczovL3d3dy53My5vcmcvMjAxOC9jcmVkZW50aWFscy92MSIsImh0dHBzOi8vcHVy bC5pbXNnbG9iYWwub3JnL3NwZWMvb2IvdjNwMC9jb250ZXh0LTMuMC4yLmpzb24iLCJodHRwczovL3B1 cmwuaW1zZ2xvYmFsLm9yZy9zcGVjL29iL3YzcDAvZXh0ZW5zaW9ucy5qc29uIl0sImlkIjoiaHR0cDov @@ -12521,11 +12529,11 @@

    D.6 Skill Assertion (CASE RWRUZWNoSnNvblNjaGVtYVZhbGlkYXRvcjIwMTkifV19LCJpc3MiOiJodHRwczovLzFlZHRlY2guZWR1 L2lzc3VlcnMvNTY1MDQ5IiwibmJmIjoxNjU2NjMzNjAwLCJqdGkiOiJodHRwOi8vMWVkdGVjaC5lZHUv Y3JlZGVudGlhbHMvMzczMiIsInN1YiI6ImRpZDpleGFtcGxlOmViZmViMWY3MTJlYmM2ZjFjMjc2ZTEy -ZWMyMSJ9.yfPvNdO-PD0wVvnc0UsKTeo39hZFrqfHVZ0oAOTKJlYZVtBOXt87lLvh3s8GorxIluaFG-I -sNJjGT3C7BGXgR_EWWzWgLGNT6WJ0TK6lg5egzGTqZyzhCBIfRaXqrx4FbaLQj_5P8UvzhQTXGTQ9koJ -TPuc65hlCA5cSQMLVoKX7m_tXojDxbV5zbsl8xvzEQdRRcfPi6_XybfZKxFtySfPANuyzI2kyBODF8x_ -ar0M1yNtISaGxmZRugnuZxcaYkh5orMpjjxlvb52tWEXPzJdYwh9C46B-eJ4PBjadrTrmy7ZGkOGg2fr -Zdr3du3ULVARWe9HlYT6NY61EIn0_Tg

    +ZWMyMSJ9.SFJ1iyuPaFddOChrDRgk82wGvbCR5cW89VGUEVnlD_opY9r8fCtM4gbAW-lJHH-IyaA289l +Lzvz9EYXTMqZaqo6SQt_XtqvKMXkOiGieGyh_e0g-qb92DjJM3PzUXzQPT_1M_m0x1syg5AzU2BZarkU +oatIYD6XhZO7SrJAINjELGyX2L3YZYQ3qJs41v0WvNTcAsbZs3_wCIKJ9s1XJ4rYUDLI7Fgajv5YSrSa +qDu_PaezwHVIj3AdOzYdgFYrYuutKkA6MsNrLdiqOt-0CvaZiYbFIoVbzaRfCMY6v5l5LRcSh60_2rMv +TZvPVAh-PsqRtjdRFGw3ZwMDBMdVMqg
    @@ -12679,11 +12687,11 @@

    D.7 Skill As "proof": [ { "type": "DataIntegrityProof", - "created": "2023-08-31T07:24:48Z", - "verificationMethod": "https://1edtech.edu/issuers/565049#z6MkquzeLtAEMmgyrEivhpGba9oGaEsaYxNB1vp7rxm2B3Dp", + "created": "2023-09-07T13:59:01Z", + "verificationMethod": "https://1edtech.edu/issuers/565049#z6MkvQywJecnqhQZcYELQq3p9wp316AQb3u3WY6RUx9DfLe6", "cryptosuite": "eddsa-2022", "proofPurpose": "assertionMethod", - "proofValue": "zs2sgDiSrrsg6DWE3U1Q6kUUSPyVGCq52Ja66xDzekV7mwTqtKHqthRsEkxDNyWNkhySuDwjECWk5x43ga5oC6sk" + "proofValue": "z5EKN6yHXwbhLQAsrMQDi2TsNT5kdN7LNiJtZShRR1M1GD7rcJ27L6g2no5sPAmN6vLoTbN8YAorqk1jHKV9v7qcU" } ] }
    ---------------- JWT header ---------------
    @@ -12693,11 +12701,11 @@ 

    D.7 Skill As "jwk": { "e": "AQAB", "kty": "RSA", - "n": "1Euy9RmhbutVZNDIfSMuix8Zj43Ktd2Zx5jz9FkV1KmBSqul1SolRyyNuoCNkGXIzo3fdd -49p-pIbYZLV6DvvN1FZ5xCaCG7Zuc332cbmn-kGdFfsnM8BAbA5qOUQ5S_r-vL0D3MSeMixsspLET5-I -dztrwavnZvC5CCZBWrT8cV1dbygh5dm0j4qxcUKh_PI5B_us37wga6ixgbRz9bp68xHR83b7BMvqHVT7 -JJhPTdIufSclIyB9kPybQkBYIJK2VpYNEGmdYuPhc3Pyz4xOjdP7xnvtZjJMcFlFBzVle2mg3JFxhpN0 -2YsWWakv2FuGeQ3VMo9Cs7nC8blhXM-w" + "n": "rGODXxlFqi_OWgxRb-JbkUTz4mZzvEyXEuoRPT281HS4OLtiKiRHjxW2y-qNaRZU22tEOe +Gzj0E_aPWoI0RljW0W5j8OIKCxb9lcpB1Aap2T7Hysq6bnWOQQr9x2p9HnTzS_6pchH83QPHpI3_TL8I +C0dAzmsW7x1Iz66912riwB2wIATyAkemCbpIcvO6zWj-3HMjAVxf8cQ41mbDetbqQeQcVO2UBIrdXIlo +3Vde_dVALIconryIkILQutaJkwts0-Vy3h5REBxCkGCCEuLfXgoQ4Pm-u3pSSGXHl1257IY3VG4MopT7 +Q104wPvf4_EYi3NkbSLyaBU-dBllQe_w" } } --------------- JWT payload --------------- @@ -12789,12 +12797,12 @@

    D.7 Skill As } --------------- JWT --------------- eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCIsImp3ayI6eyJlIjoiQVFBQiIsImt0eSI6IlJTQSIsIm4i -OiIxRXV5OVJtaGJ1dFZaTkRJZlNNdWl4OFpqNDNLdGQyWng1ano5RmtWMUttQlNxdWwxU29sUnl5TnVv -Q05rR1hJem8zZmRkNDlwLXBJYllaTFY2RHZ2TjFGWjV4Q2FDRzdadWMzMzJjYm1uLWtHZEZmc25NOEJB -YkE1cU9VUTVTX3ItdkwwRDNNU2VNaXhzc3BMRVQ1LUlkenRyd2F2blp2QzVDQ1pCV3JUOGNWMWRieWdo -NWRtMGo0cXhjVUtoX1BJNUJfdXMzN3dnYTZpeGdiUno5YnA2OHhIUjgzYjdCTXZxSFZUN0pKaFBUZEl1 -ZlNjbEl5QjlrUHliUWtCWUlKSzJWcFlORUdtZFl1UGhjM1B5ejR4T2pkUDd4bnZ0WmpKTWNGbEZCelZs -ZTJtZzNKRnhocE4wMllzV1dha3YyRnVHZVEzVk1vOUNzN25DOGJsaFhNLXcifX0.eyJ2YyI6eyJAY29u +OiJyR09EWHhsRnFpX09XZ3hSYi1KYmtVVHo0bVp6dkV5WEV1b1JQVDI4MUhTNE9MdGlLaVJIanhXMnkt +cU5hUlpVMjJ0RU9lR3pqMEVfYVBXb0kwUmxqVzBXNWo4T0lLQ3hiOWxjcEIxQWFwMlQ3SHlzcTZibldP +UVFyOXgycDlIblR6U182cGNoSDgzUVBIcEkzX1RMOElDMGRBem1zVzd4MUl6NjY5MTJyaXdCMndJQVR5 +QWtlbUNicEljdk82eldqLTNITWpBVnhmOGNRNDFtYkRldGJxUWVRY1ZPMlVCSXJkWElsbzNWZGVfZFZB +TEljb25yeUlrSUxRdXRhSmt3dHMwLVZ5M2g1UkVCeENrR0NDRXVMZlhnb1E0UG0tdTNwU1NHWEhsMTI1 +N0lZM1ZHNE1vcFQ3UTEwNHdQdmY0X0VZaTNOa2JTTHlhQlUtZEJsbFFlX3cifX0.eyJ2YyI6eyJAY29u dGV4dCI6WyJodHRwczovL3d3dy53My5vcmcvMjAxOC9jcmVkZW50aWFscy92MSIsImh0dHBzOi8vcHVy bC5pbXNnbG9iYWwub3JnL3NwZWMvb2IvdjNwMC9jb250ZXh0LTMuMC4yLmpzb24iLCJodHRwczovL3B1 cmwuaW1zZ2xvYmFsLm9yZy9zcGVjL29iL3YzcDAvZXh0ZW5zaW9ucy5qc29uIl0sImlkIjoiaHR0cDov @@ -12833,11 +12841,11 @@

    D.7 Skill As c2NoZW1hLmpzb24iLCJ0eXBlIjoiMUVkVGVjaEpzb25TY2hlbWFWYWxpZGF0b3IyMDE5In1dfSwiaXNz IjoiaHR0cHM6Ly8xZWR0ZWNoLmVkdS9pc3N1ZXJzLzU2NTA0OSIsIm5iZiI6MTY1NjYzMzYwMCwianRp IjoiaHR0cDovLzFlZHRlY2guZWR1L2NyZWRlbnRpYWxzLzM3MzIiLCJzdWIiOiJkaWQ6ZXhhbXBsZTpl -YmZlYjFmNzEyZWJjNmYxYzI3NmUxMmVjMjEifQ.GMZs4xLpyw5qcm9FHXfba0oprWkuvd1oH1FYZCnIT -w-BzTwVO8syc_yEV1wXyKusOR64OglHOiOI5qDDzXSoxh-nmmOnrbrLv0cp1SOzf2lK8ONOejD8VKw8W -3oGr-7Af338B-MhcB72PRE_cFEf2ztFrqiM9HW7-nH6dzBXxbccodOkutMGYxqlEefeycyJV3vsPDIzP -YRkII7qwfYUydfKKxU-zj8h5TbYp2Lhbb8qtCvBwywXhjsz6eck-qxhELIiHVPvgGpf4Yp5Xzx6zYBBM -X8zrowAG2NmAUKkZpSChxOd7wB5WemjI6XIYDGPc0W6KMVyhibcBn3tGrdQRg

    +YmZlYjFmNzEyZWJjNmYxYzI3NmUxMmVjMjEifQ.EQAt6Ox-SOyC578pJol6RavGt6y5zN-zJqmZatDDY +FIF4FhEVmRdcJfXXk-XEjsIq8M0vumbxnM4WV9JV-GF1I28Ph7d8403hn-OjE4I8NmqhV3btqtt-Hxwz +edEf9JZ3UVfQzGhXe-d2xPprRxdhTQDY14tBOIXbd7AX11G-x6Jh_jJM7VXGvDxSb5goURb6Pzfw00hy +9pL15EweTtf87mK3lE8WV1EyfPGY2VvmwhuOFLNzBKnF-h-ZelNCHNziDIsDjTEWgFBLs69e6KQ1eEM2 +JqgvZKig3dyGo_b0Eb9evJ1IEra8cEYPOCoqAL9OzntV_843lG_nfJZpujvAA

    @@ -13906,15 +13914,15 @@

    E.2 JSON SchemaE.2 JSON SchemaE.2 JSON SchemaE.2 JSON SchemaE.2 JSON SchemaE.2 JSON SchemaE.2 JSON SchemaE.2 JSON SchemaE.2 JSON SchemaE.2 JSON SchemaE.2 JSON SchemaE.2 JSON SchemaE.2 JSON SchemaE.2 JSON SchemaE.2 JSON SchemaE.2 JSON Schema
    E.2.1.5 Alignment

    Describes an alignment between an achievement and a node in an educational framework.

    {
    @@ -17616,15 +17624,15 @@ 

    E.2 JSON SchemaE.2 JSON SchemaE.2 JSON SchemaE.2 JSON Schema

    E.2.1.11 IdentifierEntry

    {
       "$schema": "https://json-schema.org/draft/2019-09/schema#",
       "$id": "https://purl.imsglobal.org/spec/ob/v3p0/schema/json/ob_v3p0_identifierentry_schema.json",
    @@ -18790,15 +18798,15 @@ 

    E.2 JSON SchemaE.2 JSON SchemaE.2 JSON SchemaE.2 JSON Schema

    E.2.1.16 Result

    Describes a result that was achieved.

    {
       "$schema": "https://json-schema.org/draft/2019-09/schema#",
       "$id": "https://purl.imsglobal.org/spec/ob/v3p0/schema/json/ob_v3p0_result_schema.json",
    @@ -19991,15 +19999,15 @@ 

    E.2 JSON SchemaE.2 JSON SchemaE.2 JSON SchemaE.2 JSON SchemaE.2 JSON SchemaE.2 JSON SchemaE.2 JSON SchemaE.2 JSON SchemaE.3 OpenAPI SchemaE.3 OpenAPI SchemaE.3 OpenAPI SchemaE.3 OpenAPI SchemaE.3 OpenAPI SchemaE.3 OpenAPI SchemaE.3 OpenAPI SchemaE.3 OpenAPI SchemaG. Revision History

    H. References

    H.1 Normative references

    -
    [DATA-INTEGRITY-SPEC]
    Data Integrity. Credentials Community Group. CG-DRAFT. URL: https://w3c-ccg.github.io/data-integrity-spec/
    [OAUTH2-SBP]
    OAuth 2.0 Security Best Current Practice (draft-ietf-oauth-security-topics-11. IETF. December 28, 2019. URL: https://datatracker.ietf.org/doc/draft-ietf-oauth-security-topics/
    [OPENAPIS-3.0]
    OpenAPI Specification 3.0. OpenAPI Initiative (Linux Foundation). July 2017. URL: https://github.com/OAI/OpenAPI-Specification/blob/master/versions/3.0.0.md
    [PNG]
    Portable Network Graphics (PNG) Specification (Second Edition). Tom Lane. W3C. 10 November 2003. W3C Recommendation. URL: https://www.w3.org/TR/PNG/
    [RFC20]
    ASCII format for network interchange. V.G. Cerf. IETF. October 1969. Internet Standard. URL: https://www.rfc-editor.org/rfc/rfc20
    [RFC2119]
    Key words for use in RFCs to Indicate Requirement Levels. S. Bradner. IETF. March 1997. Best Current Practice. URL: https://www.rfc-editor.org/rfc/rfc2119
    [RFC2617]
    HTTP Authentication: Basic and Digest Access Authentication. J. Franks; P. Hallam-Baker; J. Hostetler; S. Lawrence; P. Leach; A. Luotonen; L. Stewart. IETF. June 1999. Draft Standard. URL: https://www.rfc-editor.org/rfc/rfc2617
    [RFC3629]
    UTF-8, a transformation format of ISO 10646. F. Yergeau. IETF. November 2003. Internet Standard. URL: https://www.rfc-editor.org/rfc/rfc3629
    [RFC3986]
    Uniform Resource Identifier (URI): Generic Syntax. T. Berners-Lee; R. Fielding; L. Masinter. IETF. January 2005. Internet Standard. URL: https://www.rfc-editor.org/rfc/rfc3986
    [RFC6749]
    The OAuth 2.0 Authorization Framework. D. Hardt, Ed.. IETF. October 2012. Proposed Standard. URL: https://www.rfc-editor.org/rfc/rfc6749
    [RFC6750]
    The OAuth 2.0 Authorization Framework: Bearer Token Usage. M. Jones; D. Hardt. IETF. October 2012. Proposed Standard. URL: https://www.rfc-editor.org/rfc/rfc6750
    [RFC7009]
    OAuth 2.0 Token Revocation. T. Lodderstedt, Ed.; S. Dronia; M. Scurtescu. IETF. August 2013. Proposed Standard. URL: https://www.rfc-editor.org/rfc/rfc7009
    [RFC7515]
    JSON Web Signature (JWS). M. Jones; J. Bradley; N. Sakimura. IETF. May 2015. Proposed Standard. URL: https://www.rfc-editor.org/rfc/rfc7515
    [RFC7517]
    JSON Web Key (JWK). M. Jones. IETF. May 2015. Proposed Standard. URL: https://www.rfc-editor.org/rfc/rfc7517
    [RFC7518]
    JSON Web Algorithms (JWA). M. Jones. IETF. May 2015. Proposed Standard. URL: https://www.rfc-editor.org/rfc/rfc7518
    [RFC7519]
    JSON Web Token (JWT). M. Jones; J. Bradley; N. Sakimura. IETF. May 2015. Proposed Standard. URL: https://www.rfc-editor.org/rfc/rfc7519
    [RFC7591]
    OAuth 2.0 Dynamic Client Registration Protocol. J. Richer, Ed.; M. Jones; J. Bradley; M. Machulak; P. Hunt. IETF. July 2015. Proposed Standard. URL: https://www.rfc-editor.org/rfc/rfc7591
    [RFC7636]
    Proof Key for Code Exchange by OAuth Public Clients. N. Sakimura, Ed.; J. Bradley; N. Agarwal. IETF. September 2015. Proposed Standard. URL: https://www.rfc-editor.org/rfc/rfc7636
    [SEC-11]
    IMS Global Security Framework v1.1. C. Smythe; C. Vervoort; M. McKell. IMS Global Learning Consortium. July 19th, 2021. IMS Final Release. URL: https://www.imsglobal.org/spec/security/v1p1/
    [SVG11]
    Scalable Vector Graphics (SVG) 1.1 (Second Edition). Erik Dahlström; Patrick Dengler; Anthony Grasso; Chris Lilley; Cameron McCormack; Doug Schepers; Jonathan Watt; Jon Ferraiolo; Jun Fujisawa; Dean Jackson et al. W3C. 16 August 2011. W3C Recommendation. URL: https://www.w3.org/TR/SVG11/
    [UNICODE]
    The Unicode Standard. Unicode Consortium. URL: https://www.unicode.org/versions/latest/
    [VC-DATA-MODEL]
    Verifiable Credentials Data Model v1.1. Manu Sporny; Grant Noble; Dave Longley; Daniel Burnett; Brent Zundel; Kyle Den Hartog. W3C. 3 March 2022. W3C Recommendation. URL: https://www.w3.org/TR/vc-data-model/
    [VC-DI-EDDSA]
    Data Integrity EdDSA Cryptosuites v1.0. Manu Sporny; Dmitri Zagidulin; Greg Bernstein; Sebastian Crane. W3C. 26 August 2023. W3C Working Draft. URL: https://www.w3.org/TR/vc-di-eddsa/
    [VC-EXTENSION-REGISTRY]
    Verifiable Credentials Extension Registry. Credentials Community Group. CG-DRAFT. URL: https://w3c-ccg.github.io/vc-extension-registry/
    [VCCR-10]
    1EdTech Credential Refresh Service. 1EdTech. Candidate Final Public. URL: https://imsglobal.org/spec/vccr/v1p0/
    [VCCS-10]
    1EdTech JSON Schema Validator 2019. 1EdTech. Candidate Final Public. URL: https://imsglobal.org/spec/vccs/v1p0/
    [VCRL-10]
    1EdTech Revocation List Status Method. 1EdTech. Candidate Final Public. URL: https://imsglobal.org/spec/vcrl/v1p0/
    +
    [DATA-INTEGRITY-SPEC]
    Data Integrity. Credentials Community Group. CG-DRAFT. URL: https://w3c-ccg.github.io/data-integrity-spec/
    [OAUTH2-SBP]
    OAuth 2.0 Security Best Current Practice (draft-ietf-oauth-security-topics-11. IETF. December 28, 2019. URL: https://datatracker.ietf.org/doc/draft-ietf-oauth-security-topics/
    [OPENAPIS-3.0]
    OpenAPI Specification 3.0. OpenAPI Initiative (Linux Foundation). July 2017. URL: https://github.com/OAI/OpenAPI-Specification/blob/master/versions/3.0.0.md
    [PNG]
    Portable Network Graphics (PNG) Specification (Second Edition). Tom Lane. W3C. 10 November 2003. W3C Recommendation. URL: https://www.w3.org/TR/PNG/
    [RFC20]
    ASCII format for network interchange. V.G. Cerf. IETF. October 1969. Internet Standard. URL: https://www.rfc-editor.org/rfc/rfc20
    [RFC2119]
    Key words for use in RFCs to Indicate Requirement Levels. S. Bradner. IETF. March 1997. Best Current Practice. URL: https://www.rfc-editor.org/rfc/rfc2119
    [RFC2617]
    HTTP Authentication: Basic and Digest Access Authentication. J. Franks; P. Hallam-Baker; J. Hostetler; S. Lawrence; P. Leach; A. Luotonen; L. Stewart. IETF. June 1999. Draft Standard. URL: https://www.rfc-editor.org/rfc/rfc2617
    [RFC3629]
    UTF-8, a transformation format of ISO 10646. F. Yergeau. IETF. November 2003. Internet Standard. URL: https://www.rfc-editor.org/rfc/rfc3629
    [RFC3986]
    Uniform Resource Identifier (URI): Generic Syntax. T. Berners-Lee; R. Fielding; L. Masinter. IETF. January 2005. Internet Standard. URL: https://www.rfc-editor.org/rfc/rfc3986
    [RFC6749]
    The OAuth 2.0 Authorization Framework. D. Hardt, Ed.. IETF. October 2012. Proposed Standard. URL: https://www.rfc-editor.org/rfc/rfc6749
    [RFC6750]
    The OAuth 2.0 Authorization Framework: Bearer Token Usage. M. Jones; D. Hardt. IETF. October 2012. Proposed Standard. URL: https://www.rfc-editor.org/rfc/rfc6750
    [RFC7009]
    OAuth 2.0 Token Revocation. T. Lodderstedt, Ed.; S. Dronia; M. Scurtescu. IETF. August 2013. Proposed Standard. URL: https://www.rfc-editor.org/rfc/rfc7009
    [RFC7515]
    JSON Web Signature (JWS). M. Jones; J. Bradley; N. Sakimura. IETF. May 2015. Proposed Standard. URL: https://www.rfc-editor.org/rfc/rfc7515
    [RFC7517]
    JSON Web Key (JWK). M. Jones. IETF. May 2015. Proposed Standard. URL: https://www.rfc-editor.org/rfc/rfc7517
    [RFC7518]
    JSON Web Algorithms (JWA). M. Jones. IETF. May 2015. Proposed Standard. URL: https://www.rfc-editor.org/rfc/rfc7518
    [RFC7519]
    JSON Web Token (JWT). M. Jones; J. Bradley; N. Sakimura. IETF. May 2015. Proposed Standard. URL: https://www.rfc-editor.org/rfc/rfc7519
    [RFC7591]
    OAuth 2.0 Dynamic Client Registration Protocol. J. Richer, Ed.; M. Jones; J. Bradley; M. Machulak; P. Hunt. IETF. July 2015. Proposed Standard. URL: https://www.rfc-editor.org/rfc/rfc7591
    [RFC7636]
    Proof Key for Code Exchange by OAuth Public Clients. N. Sakimura, Ed.; J. Bradley; N. Agarwal. IETF. September 2015. Proposed Standard. URL: https://www.rfc-editor.org/rfc/rfc7636
    [SEC-11]
    IMS Global Security Framework v1.1. C. Smythe; C. Vervoort; M. McKell. IMS Global Learning Consortium. July 19th, 2021. IMS Final Release. URL: https://www.imsglobal.org/spec/security/v1p1/
    [SVG11]
    Scalable Vector Graphics (SVG) 1.1 (Second Edition). Erik Dahlström; Patrick Dengler; Anthony Grasso; Chris Lilley; Cameron McCormack; Doug Schepers; Jonathan Watt; Jon Ferraiolo; Jun Fujisawa; Dean Jackson et al. W3C. 16 August 2011. W3C Recommendation. URL: https://www.w3.org/TR/SVG11/
    [UNICODE]
    The Unicode Standard. Unicode Consortium. URL: https://www.unicode.org/versions/latest/
    [VC-DATA-MODEL]
    Verifiable Credentials Data Model v1.1. Manu Sporny; Grant Noble; Dave Longley; Daniel Burnett; Brent Zundel; Kyle Den Hartog. W3C. 3 March 2022. W3C Recommendation. URL: https://www.w3.org/TR/vc-data-model/
    [VC-DI-EDDSA]
    Data Integrity EdDSA Cryptosuites v1.0. Manu Sporny; Dmitri Zagidulin; Greg Bernstein; Sebastian Crane. W3C. 2 September 2023. W3C Working Draft. URL: https://www.w3.org/TR/vc-di-eddsa/
    [VC-EXTENSION-REGISTRY]
    Verifiable Credentials Extension Registry. Credentials Community Group. CG-DRAFT. URL: https://w3c-ccg.github.io/vc-extension-registry/
    [VCCR-10]
    1EdTech Credential Refresh Service. 1EdTech. Candidate Final Public. URL: https://imsglobal.org/spec/vccr/v1p0/
    [VCCS-10]
    1EdTech JSON Schema Validator 2019. 1EdTech. Candidate Final Public. URL: https://imsglobal.org/spec/vccs/v1p0/
    [VCRL-10]
    1EdTech Revocation List Status Method. 1EdTech. Candidate Final Public. URL: https://imsglobal.org/spec/vcrl/v1p0/

    H.2 Informative references

    [BCP47]
    Tags for Identifying Languages. A. Phillips, Ed.; M. Davis, Ed.. IETF. September 2009. Best Current Practice. URL: https://www.rfc-editor.org/rfc/rfc5646
    [CEDS]
    Common Education Data Standards (CEDS) Version 7 Data Model Guide. URL: https://ceds.ed.gov/pdf/CEDS-7-0-Data-Model-Guide_for_508.pdf
    [CLR-20]
    Comprehensive Learner Record Standard v2.0. 1EdTech. IMS Base Document. URL: https://www.imsglobal.org/spec/clr/v2p0/
    [CTDL-ASN-TERMS]
    Credential Transparency Description Language ASN Terms. Credential Engine. URL: https://credreg.net/ctdlasn/terms
    [CTDL-TERMS]
    Credential Transparency Description Language Terms. Credential Engine. URL: https://credreg.net/ctdl/terms
    [did-core]
    Decentralized Identifiers (DIDs) v1.0. Manu Sporny; Amy Guy; Markus Sabadello; Drummond Reed. W3C. 19 July 2022. W3C Recommendation. URL: https://www.w3.org/TR/did-core/
    [did-use-cases]
    Use Cases and Requirements for Decentralized Identifiers. Joe Andrieu; Phil Archer; Kim Duffy; Ryan Grant; Adrian Gropper. W3C. 17 March 2021. W3C Note. URL: https://www.w3.org/TR/did-use-cases/
    [FIPS-180-4]
    FIPS PUB 180-4: Secure Hash Standard (SHS). U.S. Department of Commerce/National Institute of Standards and Technology. August 2015. National Standard. URL: https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf
    [IEEE-754]
    IEEE Standard for Floating-Point Arithmetic. Institute of Electrical and Electronics Engineers. 29 August 2008. URL: http://ieeexplore.ieee.org/servlet/opac?punumber=4610933
    [ISO3166-1]
    Codes for the representation of names of countries and their subdivisions — Part 1: Country code. International Organization for Standardization (ISO). August 2020. Published. URL: https://www.iso.org/standard/72482.html
    [ISO8601]
    Representation of dates and times. ISO 8601:2004.. International Organization for Standardization (ISO). 2004. ISO 8601:2004. URL: http://www.iso.org/iso/catalogue_detail?csnumber=40874
    [JSON-LD]
    JSON-LD 1.0. Manu Sporny; Gregg Kellogg; Markus Lanthaler. W3C. 3 November 2020. W3C Recommendation. URL: https://www.w3.org/TR/json-ld/
    [JSON-LD11]
    JSON-LD 1.1. Gregg Kellogg; Pierre-Antoine Champin; Dave Longley. W3C. 16 July 2020. W3C Recommendation. URL: https://www.w3.org/TR/json-ld11/
    [JSON-LD11-API]
    JSON-LD 1.1 Processing Algorithms and API. Gregg Kellogg; Dave Longley; Pierre-Antoine Champin. W3C. 16 July 2020. W3C Recommendation. URL: https://www.w3.org/TR/json-ld11-api/
    [MULTIBASE]
    The Multibase Data Format. IETF. Internet-Draft. URL: https://datatracker.ietf.org/doc/html/draft-multiformats-multibase-01
    [MULTICODEC]
    MULTICODEC. URL: https://github.com/multiformats/multicodec/
    [OB-20]
    Open Badges v2.0. Otto, Nate; Bohrer, Jeff; Cook, Timothy; Gylling, Markus; Hripak, Alexander; Pitcher, Justin. IMS Global Learning Consortium. April 2018. IMS Final Release. URL: https://www.imsglobal.org/spec/ob/v2p0/
    [OB-30]
    Open Badges Specification v3.0. 1EdTech. Candidate Final Public. URL: https://www.imsglobal.org/spec/ob/v3p0/
    [OB-CERT-30]
    Open Badges Specification Conformance and Certification Guide v3.0. 1EdTech. Candidate Final Public. URL: https://www.imsglobal.org/spec/ob/v3p0/cert/
    [OB-ERRATA-30]
    Open Badges Specification v3.0: Errata. URL: https://www.imsglobal.org/spec/ob/v3p0/errata/
    [OB-IMPL-30]
    Open Badges Implementation Guide v3.0. 1EdTech. Candidate Final Public. URL: https://www.imsglobal.org/spec/ob/v3p0/impl/
    [OPENAPIS]
    OpenAPI Specification. Darrell Miller; Jeremy Whitlock; Marsh Gardiner; Mike Ralphson; Ron Ratovsky; Uri Sarid; Tony Tam; Jason Harmon. OpenAPI Initiative. URL: https://www.openapis.org/
    [RFC1321]
    The MD5 Message-Digest Algorithm. R. Rivest. IETF. April 1992. Informational. URL: https://www.rfc-editor.org/rfc/rfc1321
    [RFC4122]
    A Universally Unique IDentifier (UUID) URN Namespace. P. Leach; M. Mealling; R. Salz. IETF. July 2005. Proposed Standard. URL: https://www.rfc-editor.org/rfc/rfc4122
    [RFC5280]
    Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. D. Cooper; S. Santesson; S. Farrell; S. Boeyen; R. Housley; W. Polk. IETF. May 2008. Proposed Standard. URL: https://www.rfc-editor.org/rfc/rfc5280
    [RFC8259]
    The JavaScript Object Notation (JSON) Data Interchange Format. T. Bray, Ed.. IETF. December 2017. Internet Standard. URL: https://www.rfc-editor.org/rfc/rfc8259
    [rfc9110]
    HTTP Semantics. R. Fielding, Ed.; M. Nottingham, Ed.; J. Reschke, Ed.. IETF. June 2022. Internet Standard. URL: https://www.rfc-editor.org/rfc/rfc9110
    [RSD]
    Rich Skill Descriptors. URL: https://www.openskillsnetwork.org/rsd
    [WGS84]
    National Imagery and Mapping Agency Technical Report 8350.2, Third Edition. National Imagery and Mapping Agency. 3 January 2000.
    [XMLSCHEMA-2]
    XML Schema Part 2: Datatypes Second Edition. Paul V. Biron; Ashok Malhotra. W3C. 28 October 2004. W3C Recommendation. URL: https://www.w3.org/TR/xmlschema-2/