Capability system
The MDN uses a capability-based access control system that enables fine-grained control over data access and sharing. Capabilities are represented as signed tokens that grant specific permissions to MDN participants.
When using the Mee website the key is short-lived and stored in-browser. In case of the Mee smartwallet the key is stored in private device storage.
Service Providers may set up scenarios where users have limited control over some of their data according to the needs of the Provider’s app (e.g. the User can read but not update the data). However, the ultimate control over data sharing remains with the user.
Token Structure
Each capability token contains:
from
: Identity of the capability grantor (context-scoped)to
: Target custodian identifiersub
: Identity of whose data is being accessed (context-scoped)cap
: Capability definitionexp
: Expiration timestamp
The from
and sub
fields allow for delegation scenarios - for example, when Alice grants Bob access to Carol’s data (with appropriate permissions), from
would be Alice’s identity while sub
would be Carol’s.
Capability Types
Context Operations
Controls administrative operations on Identity Contexts. Multiple operations can be combined in a single capability:
create
: Create new contextsdelete
: Remove existing contextsread_delegate_to_any
: Delegate read-only access to any participantrw_delegate_to_any
: Delegate read-write access to any participantrw_delegate_to_owner
: Delegate read-write access specifically to the context owner
Context Data Access
Controls access to specific data paths within a context. Available permissions are:
read
: Read-only accesswrite
: Write accessdelete
: Ability to delete dataany
: Grants all permissions
{ "context_id": "some-context-id", "context_data_access": [ { "paths": ["path/pattern/*"], "permissions": ["read", "write", "delete"] } ]}
Delegation
Delegation enables controlled data sharing between different Relying Parties - for example, Provider A can request credit card data from a context scoped to Provider B. The delegation process is mediated y the User’s Identity Agent and maintains identity scoping. Users must provide explicit consent for delegation to other Relying Parties, whether they’re Providers or other Users.
Example Tokens
Direct User-to-User Sharing
When Alice wants to share chat data with Bob:
{ "from": "alice-scoped-id-for-bob", "to": "bob-custodian-id", "sub": "alice-scoped-id-for-bob", "cap": { "context_id": "alice-owned-chat-ctx", "context_data_access": [ { "paths": ["chat/bob"], "permissions": ["read", "write", "delete"] }, { "paths": ["chat/alice/contact_info"], "permissions": ["read"] } ] }, "exp": 123}
Provider Integration
When a user connects with a Provider (like a news site):
{ "from": "alice-newssite-scoped-id", "to": "newssite-custodian-uid", "sub": "alice-newssite-scoped-id", "cap": { "context_operations": [ "create", "read_delegate_to_any", "rw_delegate_to_owner" ] }, "exp": 123}