OMATrust
OMATrust can be integrated as a reputation and attestation overlay for service-oriented Universal Manifest subjects.
Terminology note: use OMATrust for product/lane semantics and OMA3 for consortium/standards-body references.
Why this lane exists
Section titled “Why this lane exists”OMATrust models trust signals for services (APIs, apps, contracts, organizations), which maps well to UM manifests that carry service identity, claims, and policy decisions in a portable envelope.
Integration model
Section titled “Integration model”Use UM core fields for portability, then add OMATrust signals through lane-specific claims, pointers, and shards:
- Claims for attestation outcomes, proof modes, and trust mode.
- Pointers to attestation lookup and verification resources.
- Shards for lifecycle and policy metadata.
Suggested claim keys
Section titled “Suggested claim keys”omatrust.policy.trustModeomatrust.proof.typeomatrust.attestation.linkedIdentifieromatrust.attestation.keyBindingomatrust.attestation.userReviewomatrust.attestation.endorsementomatrust.attestation.certificationomatrust.attestation.securityAssessment.status
Suggested pointer keys
Section titled “Suggested pointer keys”omatrust.reputation.attestationomatrust.reputation.verifyomatrust.trustedAttester.directoryomatrust.lifecycle.revocationLog
Fixture and proof coverage in this repo
Section titled “Fixture and proof coverage in this repo”- OMATrust proof-based service fixture
- OMATrust trusted-attester service fixture
- OMATrust lifecycle-edge fixture
- Journey J11 coverage
Implementation checks
Section titled “Implementation checks”- Keep parser behavior stable for unknown OMATrust extension keys.
- Enforce explicit trust-mode handling (
proof-basedvstrusted-attester). - Respect lifecycle transitions (active, revoked, superseded).
- Prevent stale-trust projections by checking freshness windows.