20.6. Panoramica

La funzionalità del servizio elettronico template viene utilizzata per standardizzare la trasmissione dei dati dalle Fonti Autentiche ai Fornitori di Attestati Elettronici. Il servizio elettronico template DOVREBBE essere pubblicato all'interno della PDND dal Fornitore di Attestati Elettronici ed è accessibile attraverso il Catalogo Template PDND.

20.7. Parametri del Template

Il servizio elettronico template DEVE rispettare le seguenti proprietà:

  • Name: IT Wallet - Fonte Autentica - <Nome dell'Attestato Elettronico>

  • Intended Recipients: IT Wallet - Fonte Autentica - <Dominio della Fonte Autentica>

  • Description: Descrizioni utili al Fornitore di Attestati Elettronici in relazione al nuovo attestato elettronico <Nome dell'Attestato Elettronico>

  • Technology: REST

  • Data variation via Signal Hub: True

  • Version changelog: Servizio elettronico Fonte Autentica tramite implementazione template

  • Voucher Time Limit: 20

  • Suggest custom threshold: False

  • Suggest manual agreement approval policy: False

  • Attributes: <Nome ufficiale dell'Ente Pubblico Fornitore di Attestati Elettronici>

20.8. Istanziazione del Template

Ogni Fonte Autentica DOVREBBE istanziare il servizio elettronico template IT Wallet - Fonte Autentica nella PDND. Il processo di istanziazione risulterà in un nuovo servizio elettronico che DEVE soddisfare i seguenti requisiti:

  • Signal Hub: True

  • Politica di approvazione manuale: False

  • Soglia giornaliera chiamate API per ogni fornitore: maggiore di 10000

  • Soglia giornaliera chiamate API: maggiore di 10000

Informazioni aggiuntive richieste durante il processo di creazione sono dipendenti dal fornitore.

20.9. Specifica OpenAPI della Fonte Autentica PDND

Di seguito è riportata la specifica OpenAPI completa per i servizi elettronici della Fonte Autentica PDND:

  1openapi: 3.0.1
  2info:
  3  title: IT Wallet API - AS web services
  4  version: 0.1.0
  5servers:
  6  - url: https://authentic-source.example.it
  7    description: Authentic Source API
  8paths:
  9  /v1.3.1/AttributeClaims{dataset_id}:
 10    post:
 11      tags:
 12        - e-Services PDND
 13      summary: Get Attribute Claims
 14      description: >-
 15        This service provides the Credential Issuer with all attribute claims necessary for the issuance of a Digital Credential
 16      operationId: attributeClaims
 17      parameters:
 18        - in: path
 19          name: dataset_id
 20          schema:
 21            type: string
 22          required: true
 23          description: Identifier of the dataset as registered in the Authentic Source Registry 
 24        - name: Authorization
 25          in: header
 26          description: >-
 27            JWT token obtained from <a target="blank"
 28            href="https://italia.github.io/eid-wallet-it-docs/v1.0.0/en/e-service-pdnd.html#voucher-issuance">PDND
 29            Interoperabilità</a>. Based on the implementation choices, it can be either Bearer or DPoP.<br/><br/><a target="blank"
 30            href="https://jwt.io/#debugger-io?token=eyJhbGciOiJFUzI1NiIsImtpZCI6ImI4MzlmNGM3LTFlNWQtNGE4YS05ZmM2LTcyZDNiN2YwOTFlYyIsInR5cCI6ImF0K2p3dCJ9.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.SqKCkZyv78VfaTZzOh6iYfKdGirSrPGMvqCMZE9DFXmzhaYz5lpp-fGRjmDbj88Qrw6U_3nl5WUBUjbjxpYxAQ">EXAMPLE
 31            ON JWT.IO</a>
 32          required: true
 33          schema:
 34            type: string
 35            format: Signed JWT
 36            example: >-
 37              DPoP
 38              eyJhbGciOiJFUzI1NiIsImtpZCI6ImI4MzlmNGM3LTFlNWQtNGE4YS05ZmM2LTcyZDNiN2YwOTFlYyIsInR5cCI6ImF0K2p3dCJ9.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.SqKCkZyv78VfaTZzOh6iYfKdGirSrPGMvqCMZE9DFXmzhaYz5lpp-fGRjmDbj88Qrw6U_3nl5WUBUjbjxpYxAQ
 39        - name: DPoP
 40          in: header
 41          description: >-
 42            DPoP proof JWT, to comply with the REST_JWS_2021_POP security
 43            pattern using the POP_DPoP implementation. See also <a target="blank"
 44            href="https://datatracker.ietf.org/doc/html/rfc9449.html">RFC
 45            9449</a>.<br/><br/>
 46
 47            <a target="blank" href="https://jwt.io/#debugger-io?token=eyJ0eXAiOiJkcG9wK2p3dCIsImFsZyI6IkVTMjU2IiwiandrIjp7Imt0eSI6IkVDIiwia2V5X29wcyI6WyJzaWduIl0sImtpZCI6IjM5ZmE5NjBiLTc3M2YtNDllZi04YTBlLWU3NzNlOWI5N2FlOCIsImNydiI6IlAtMjU2IiwieCI6Imh1eVhJUU52OTAyb0xzcFg0X3pvbkM5NEc2eUVsbjZsc2RtLTF3TTczMm8iLCJ5IjoiSTlQREVhd1dIcWFGREd4MVprTmstMlBWNldkcGNhSDNBZk9iQlNMaWhndyJ9fQ.eyJqdGkiOiIyYzc2ZmNhMy1jYjRlLTQzMTItOGI2ZS05NzQ5NDYyZjQyMGQiLCJodG0iOiJQT1NUIiwiYXRoIjoiNDc1MmMzMmQ2YzQ4NzYzZjBmMzljZDNkYzk5ZDJlOTk3OTMyYmFmMzc1NjNiYzVhODk5NDg3YTZmODZlNWIxZCIsImh0dSI6Imh0dHBzOi8vYXV0aGVudGljLXNvdXJjZS5leGFtcGxlLml0IiwiaWF0IjoxNzYyMjYyNjE2fQ.Mdayqq66hFzMFvN131WRZ_dxyaEu7W1Qz-ksYt6-RLGD1rCixnmnmFnNOsgFT_wztGL1zJloYTMgn9Ys6lSxgQ">EXAMPLE
 48            ON JWT.IO</a>
 49          required: false
 50          schema:
 51            type: string
 52            format: JWT
 53            example: >-
 54              eyJ0eXAiOiJkcG9wK2p3dCIsImFsZyI6IkVTMjU2IiwiandrIjp7Imt0eSI6IkVDIiwia2V5X29wcyI6WyJzaWduIl0sImtpZCI6IjM5ZmE5NjBiLTc3M2YtNDllZi04YTBlLWU3NzNlOWI5N2FlOCIsImNydiI6IlAtMjU2IiwieCI6Imh1eVhJUU52OTAyb0xzcFg0X3pvbkM5NEc2eUVsbjZsc2RtLTF3TTczMm8iLCJ5IjoiSTlQREVhd1dIcWFGREd4MVprTmstMlBWNldkcGNhSDNBZk9iQlNMaWhndyJ9fQ.eyJqdGkiOiIyYzc2ZmNhMy1jYjRlLTQzMTItOGI2ZS05NzQ5NDYyZjQyMGQiLCJodG0iOiJQT1NUIiwiYXRoIjoiNDc1MmMzMmQ2YzQ4NzYzZjBmMzljZDNkYzk5ZDJlOTk3OTMyYmFmMzc1NjNiYzVhODk5NDg3YTZmODZlNWIxZCIsImh0dSI6Imh0dHBzOi8vYXV0aGVudGljLXNvdXJjZS5leGFtcGxlLml0IiwiaWF0IjoxNzYyMjYyNjE2fQ.Mdayqq66hFzMFvN131WRZ_dxyaEu7W1Qz-ksYt6-RLGD1rCixnmnmFnNOsgFT_wztGL1zJloYTMgn9Ys6lSxgQ
 55        - name: Agid-JWT-Signature
 56          in: header
 57          description: >-
 58            JWT containing the signature of the message headers whose integrity
 59            needs to be guaranteed, to comply with the INTEGRITY_REST_02
 60            security pattern (see <a target="blank"
 61            href="https://italia.github.io/eid-wallet-it-docs/v1.0.0/en/e-service-pdnd.html">e-Service PDND</a>). <br/><br/>
 62
 63            <a target="blank" href="https://jwt.io/#debugger-io?token=eyJhbGciOiJFUzI1NiIsImtpZCI6ImQ0YzNiMmExLTk4NzYtNTQzMi0xMGZlLWRjYmE5ODc2NTQzMiIsInR5cCI6IkpXVCJ9.eyJpc3MiOiI4MjkxNGIzZi02MGIyLTQ1MjktYjRkNi0zZDRlNjdmMGE5MzMiLCJzdWIiOiI4MjkxNGIzZi02MGIyLTQ1MjktYjRkNi0zZDRlNjdmMGE5MzMiLCJhdWQiOiJodHRwczovL2F1dGhlbnRpYy1zb3VyY2UuZXhhbXBsZS5pdCIsImlhdCI6MTczMzM5Nzg0MCwibmJmIjoxNzMzNDAxNjI4LCJleHAiOjE3MzM0MDE0NDAsImp0aSI6ImQzZjdiMmM5LTI3NGEtNDJiNy04ZjhkLTJlOWQ4YjE3MzRiMCIsInNpZ25lZF9oZWFkZXJzIjpbeyJkaWdlc3QiOiJTSEEtMjU2PTcyZTE4YmRkZGYxM2M5MTFiNGRkNTYyZWUyMTk3OWE1YzlmMjM1YzNhMDFiZDE0MjZlODU3ZDhjMWEyODJmNDEifSx7ImNvbnRlbnQtdHlwZSI6ImFwcGxpY2F0aW9uL2pzb24ifV19.tG5-P96CCA6N1IYC-xk4GumoVkA3NFolpbBn2vQ2e9vpWQ8f5Sm2l4-1VrXfKTx-CUVz_puiwqkBhulrNKj2fA">EXAMPLE
 64            ON JWT.IO</a>
 65          required: true
 66          schema:
 67            type: string
 68            format: JWT
 69            example: eyJhbGciOiJFUzI1NiIsImtpZCI6ImQ0YzNiMmExLTk4NzYtNTQzMi0xMGZlLWRjYmE5ODc2NTQzMiIsInR5cCI6IkpXVCJ9.eyJpc3MiOiI4MjkxNGIzZi02MGIyLTQ1MjktYjRkNi0zZDRlNjdmMGE5MzMiLCJzdWIiOiI4MjkxNGIzZi02MGIyLTQ1MjktYjRkNi0zZDRlNjdmMGE5MzMiLCJhdWQiOiJodHRwczovL2F1dGhlbnRpYy1zb3VyY2UuZXhhbXBsZS5pdCIsImlhdCI6MTczMzM5Nzg0MCwibmJmIjoxNzMzNDAxNjI4LCJleHAiOjE3MzM0MDE0NDAsImp0aSI6ImQzZjdiMmM5LTI3NGEtNDJiNy04ZjhkLTJlOWQ4YjE3MzRiMCIsInNpZ25lZF9oZWFkZXJzIjpbeyJkaWdlc3QiOiJTSEEtMjU2PTcyZTE4YmRkZGYxM2M5MTFiNGRkNTYyZWUyMTk3OWE1YzlmMjM1YzNhMDFiZDE0MjZlODU3ZDhjMWEyODJmNDEifSx7ImNvbnRlbnQtdHlwZSI6ImFwcGxpY2F0aW9uL2pzb24ifV19.tG5-P96CCA6N1IYC-xk4GumoVkA3NFolpbBn2vQ2e9vpWQ8f5Sm2l4-1VrXfKTx-CUVz_puiwqkBhulrNKj2fA
 70        - name: Digest
 71          in: header
 72          description: >-
 73            Digest of the message payload, to comply with the INTEGRITY_REST_02
 74            security pattern. According to <a target="blank" href="https://www.rfc-editor.org/rfc/rfc3230.html#section-4.2">RFC
 75            3230 §4.2</a>, the format MUST be the following: digest-algorithm=encoded
 76            digest output.
 77          required: true
 78          schema:
 79            type: string
 80            example: SHA-256=72e18bdddf13c911b4dd562ee21979a5c9f235c3a01bd1426e857d8c1a282f41
 81        - name: Agid-JWT-TrackingEvidence
 82          in: header
 83          description: >-
 84            If the Voucher type is Bearer, this header represents a JWT acting as a proof of possession, to comply with the REST_JWS_2021_POP security
 85            pattern using the POP_TPoP implementation. Otherwise, it is a JWT containing the data tracked in the Consumer's domain, to comply with AUDIT_REST_02 (see <a target="blank"
 86            href="https://italia.github.io/eid-wallet-it-docs/v1.0.0/en/e-service-pdnd.html">e-Service PDND</a>). <br/><br/>
 87            <a target="blank" href="https://jwt.io/#debugger-io?token=eyJhbGciOiJFUzI1NiIsImtpZCI6ImQ0YzNiMmExLTk4NzYtNTQzMi0xMGZlLWRjYmE5ODc2NTQzMiIsInR5cCI6IkpXVCJ9.eyJpc3MiOiI4MjkxNGIzZi02MGIyLTQ1MjktYjRkNi0zZDRlNjdmMGE5MzMiLCJhdWQiOiJodHRwczovL2F1dGhlbnRpYy1zb3VyY2UuZXhhbXBsZS5pdCIsImV4cCI6MTczMzA1MjYwMCwibmJmIjoxNzMzMDM2NDUwLCJpYXQiOjE3MzMwMzY0MDAsImp0aSI6ImE0YjVjNmQ3LWU4ZjktYWJjZC1lZjEyLTM0NTY3ODkwMTIzNCIsImRub25jZSI6NjUyODQyNDIxMzY4NSwicHVycG9zZUlkIjoiYjJjM2Q0ZTUtZjZnNy1oOGk5LWowazEtbG1ubzEyMzQ1Njc4IiwidXNlcklEIjoiYThiN2M2ZDUtZTRmMy1nMmgxLWk5ajAta2xtbm9wcXJzdHV2IiwibG9hIjoic3Vic3RhbnRpYWwifQ.y42yfMeW2H9h0b0j0BODUml8yF20stY9q3BwoVU5BB90afBj852Q0QlInncdhjXhUjLS1V76cGBxkutDNvxRNA">EXAMPLE
 88            ON JWT.IO</a>
 89          required: false
 90          schema:
 91            type: string
 92            format: JWT
 93            example: eyJhbGciOiJFUzI1NiIsImtpZCI6ImQ0YzNiMmExLTk4NzYtNTQzMi0xMGZlLWRjYmE5ODc2NTQzMiIsInR5cCI6IkpXVCJ9.eyJpc3MiOiI4MjkxNGIzZi02MGIyLTQ1MjktYjRkNi0zZDRlNjdmMGE5MzMiLCJhdWQiOiJodHRwczovL2F1dGhlbnRpYy1zb3VyY2UuZXhhbXBsZS5pdCIsImV4cCI6MTczMzA1MjYwMCwibmJmIjoxNzMzMDM2NDUwLCJpYXQiOjE3MzMwMzY0MDAsImp0aSI6ImE0YjVjNmQ3LWU4ZjktYWJjZC1lZjEyLTM0NTY3ODkwMTIzNCIsImRub25jZSI6NjUyODQyNDIxMzY4NSwicHVycG9zZUlkIjoiYjJjM2Q0ZTUtZjZnNy1oOGk5LWowazEtbG1ubzEyMzQ1Njc4IiwidXNlcklEIjoiYThiN2M2ZDUtZTRmMy1nMmgxLWk5ajAta2xtbm9wcXJzdHV2IiwibG9hIjoic3Vic3RhbnRpYWwifQ.y42yfMeW2H9h0b0j0BODUml8yF20stY9q3BwoVU5BB90afBj852Q0QlInncdhjXhUjLS1V76cGBxkutDNvxRNA
 94      requestBody:
 95        content:
 96          application/json:
 97            schema:
 98              $ref: "#/components/schemas/CredentialClaimsRequest"
 99        required: true
100      responses:
101        "200":
102          description: OK
103          content:
104            application/jwt:
105              schema:
106                $ref: "#/components/schemas/CredentialClaimsResponse"
107              example: "eyJ0eXAiOiJKV1QiLCJhbGciOiJFUzI1NiIsImtpZCI6IjRlNTAzYjU0LWNiZDUtNDZkOC1iNzhhLTAxMTY5OTEyMmYzMCJ9.eyJpc3MiOiJodHRwczovL2F1dGhlbnRpYy1zb3VyY2UuZXhhbXBsZS5pdCIsIm5iZiI6MTczNjg0NjY4OCwiZXhwIjoxNzM2ODQ2OTI4LCJpYXQiOjE3MzY4NDY2ODgsImF1ZCI6IjgyOTE0YjNmLTYwYjItNDUyOS1iNGQ2LTNkNGU2N2YwYTkzMyIsImp0aSI6ImM4YmQ4YTJmLWU5OTAtNDRmYS05MDEzLTFiMzUzYmZjNWEwZCJ9.4BgoaKyVOupA67tXLQeIK8QNEiYkB646_35HndTkWxS9xypF7FJqyqV24z6EJirSgn5BlT2ZrgqeDURSjJuPUg"
108        "400":
109          description: Bad Request
110          content:
111            application/json:
112              schema:
113                type: object
114                properties:
115                  error:
116                    type: string
117                    description: The error code
118                    enum: [invalid_request, invalid_dpop_proof]
119                  error_description:
120                    type: string
121                    description: Text in human-readable form providing further details to clarify the nature of the error encountered
122                    example: >-
123                      The request cannot be fulfilled because it is missing
124                      required parameters, contains invalid parameters, or
125                      is otherwise malformed.
126                required:
127                  - error
128              examples:
129                invalid_request:
130                  value:
131                    error: invalid_request
132                    error_description: >-
133                      The request cannot be fulfilled because it is missing
134                      required parameters, contains invalid parameters, or is
135                      otherwise malformed
136                invalid_dpop_proof:
137                  value:
138                    error: invalid_dpop_proof
139                    error_description: >-
140                      The request cannot be fulfilled because it contains an
141                      invalid dpop proof
142        "401":
143          description: Unauthorized
144          headers:
145            WWW-Authenticate:
146              description: The request cannot be fulfilled because the Voucher is expired, revoked or otherwise malformed. See <a target="blank" href="https://datatracker.ietf.org/doc/html/rfc6750.html#section-3">RFC6750</a> and <a target="blank" href="https://datatracker.ietf.org/doc/html/rfc9449.html#section-7.1-11">RFC9449</a> for details.
147              schema:
148                type: string
149                example: >-
150                  Bearer error="invalid_token", error_description="The access token expired"
151        "404":
152          description: Claims not found
153          content:
154            application/json:
155              schema:
156                type: object
157                properties:
158                  error:
159                    type: string
160                    description: The error code
161                    enum: [not_found]
162                  error_description:
163                    type: string
164                    description: >-
165                      Text in human-readable form providing further details to
166                      clarify the nature of the error encountered
167                    example: >-
168                      The authentic source cannot fulfill the request because the
169                      claims were not found
170                required:
171                  - error
172        "500":
173          description: Internal Server Error
174          content:
175            application/json:
176              schema:
177                type: object
178                properties:
179                  error:
180                    type: string
181                    description: The error code
182                    enum: [server_error]
183                  error_description:
184                    type: string
185                    description: >-
186                      Text in human-readable form providing further details to
187                      clarify the nature of the error encountered
188                required:
189                  - error
190              example:
191                error: server_error
192                error_description: >-
193                  The request cannot be fulfilled because the e-Service Endpoint encountered an internal problem
194        "503":
195          description: Service Unavailable
196          content:
197            application/json:
198              schema:
199                type: object
200                properties:
201                  error:
202                    type: string
203                    description: The error code
204                    enum: [temporarily_unavailable]
205                  error_description:
206                    type: string
207                    description: >-
208                      Text in human-readable form providing further details to
209                      clarify the nature of the error encountered
210                required:
211                  - error
212              example:
213                error: "temporarily_unavailable"
214                error_description: "The request cannot be fulfilled because the e-Service Endpoint is temporarily unavailable (e.g., due to maintainance or overload)"
215components:
216  schemas:
217    CredentialClaimsResponse:
218      properties:
219        Header:
220          type: object
221          properties:
222            alg:
223              description: A digital signature algorithm identifier.
224              type: string
225              example: RS256
226            kid:
227              description: Unique identifier of the JWK used by the Provider to sign the JWT.
228              type: string
229              example: "cdb52532-dd94-40ef-824d-9c55b10e6bc9"
230            typ:
231              description: It MUST be set to 'JWT'.
232              type: string
233              example: "JWT"
234          required: [alg, kid, typ]
235        Payload:
236          type: object
237          properties:
238            iss:
239              description: The identifier of the e-Service.
240              type: string
241              example: "https://authentic-source.example.it"
242            aud:
243              description: The identifier of the Consumer.
244              type: string
245              example: "31670092-eec0-4f95-88da-e1c7ce5e4505"
246            exp:
247              description: UNIX timestamp representing the JWT expiration time.
248              type: integer
249              example: 1736846928
250            iat:
251              description: UNIX timestamp representing the JWT issuance time.
252              type: integer
253              example: 1736846688
254            jti:
255              description: Unique identifier of the JWT to prevent replay attacks.
256              type: string
257              example: "8b971b43-e990-44fa-9013-1b353bfc5a0f"
258            nbf:
259              description: UNIX timestamp representing the JWT first validity time.
260              type: string
261              example: "1736846688"
262            interval:
263              description: Required if claims parameter is not present. This represents the estimated amount of time (in seconds) required before making the request of the attribute claims again.
264              type: integer
265              example: "864000"
266            userClaims:
267              description: List of User Claims.
268              type: object
269              properties:
270                given_name:
271                  description: Current First Name.
272                  type: string
273                  example: '"Mario"'
274                family_name:
275                  description: Current Family Name.
276                  type: string
277                  example: '"Rossi"'
278                birth_date:
279                  description: Date of Birth.
280                  type: string
281                  example: '"1980-01-10"'
282                birth_place:
283                  description: Place of Birth.
284                  type: string
285                  example: '"Roma"'
286                tax_id_code:
287                  description: National tax identification number. REQUIRED if personal_administrative_number is absent.
288                  type: string
289                  example: '"TINIT-XXXXXXXXXXXXXXXX"'
290                personal_administrative_number:
291                  description: National unique identifier of a natural person. REQUIRED if tax_id_code is absent.
292                  type: string
293                  example: '"XX00000XX"'
294            attributeClaims:
295              description: List of Datasets of Attribute.
296              type: array
297              items: 
298                type: object
299                properties:
300                  object_id:
301                    description: Unique identifier of the Dataset.
302                    type: string
303                    example: "6F9619FF-8B86-D011-B42D-00C04FC964FF"
304                  status:
305                    description: Status of the Dataset.
306                    type: string
307                    enum: ["VALID","INVALID", "SUSPENDED"]
308                    example: "VALID"
309                  last_updated:
310                    description: Last time the status or attributes of the Dataset have been updated. Its format is `YYYY-MM-DDTHH:MM:SSZ`.
311                    type: string
312                    example:
313                additionalProperties:
314                  type: string
315                required: [object_id, status, last_updated]
316                example: '[{"object_id": "6F9619FF-8B86-D011-B42D-00C04FC964FF", "nationality": "IT"}, {...}]'
317            metadataClaims:
318              description: List of Metadata Claims.
319              type: array
320              items: 
321                type: object
322                properties:
323                  object_id:
324                    description: Unique identifier of the Dataset.
325                    type: string
326                    example: "6F9619FF-8B86-D011-B42D-00C04FC964FF"
327                  issuance_date:
328                    description: Administrative validity start date of the Dataset
329                    type: string
330                    example: '"2025-01-01"'
331                  expiry_date:
332                    description: Administrative expiry date of the Dataset.
333                    type: string
334                    example: '"2025-12-31"'
335                required: [object_id]
336          required: [iss, aud, exp, iat, jti]
337    CredentialClaimsRequest:
338      required:
339        - unique_id
340      type: object
341      properties:
342        unique_id:
343          type: string
344          description: ID ANPR or Tax identification number
345        object_id:
346          type: string
347          description: Unique identifier of the Credential dataset or `jti` of the Agid-JWT-Signature Credential Issuer deferred flow's request. If this parameter is present only the indicated dataset is returned