20.6. Overview¶
The template e-service functionality is employed to standardize data transmission from Authentic Sources to Credential Issuers. The template e-service SHOULD be published within PDND by the Credential Issuer and is accessible through the PDND Template Catalog.
20.7. Template Parameters¶
The template e-service MUST adhere to the following specifications:
Name: IT Wallet - Authentic Source - <
Credential name>Intended Recipients: IT Wallet - Authentic Source - <
Authentic Source domain>Description: Description text useful to the Credential Issuer about the new Credential <
Credential name>Technology: REST
Data variation via Signal Hub: True
Version changelog: Authentic Source e-service via template implementation
Voucher Time Limit: 20
Suggest custom threshold: False
Suggest manual agreement approval policy: False
Attributes: <
Offcial name of the Credential Issuer Public Authority>
20.8. Template Instantiation¶
Each Authentic Source SHOULD instantiate the IT Wallet - Authentic Source template e-service in PDND. The instantiation process will result in a new e-service that MUST satisfy the following requirements:
Signal Hub: True
Manual agreement approval policy: False
Daily API calls threshold for each provider: greater than 10000
Daily API calls threshold: greater than 10000
Additional information required during the creation process is provider-dependent.
20.9. Authentic Source PDND OpenAPI Specification¶
Below is the complete Open API Specification for the Authentic Source PDND e-services:
1openapi: 3.0.1
2info:
3 title: IT Wallet API - AS web services
4 version: 0.1.0
5servers:
6 - url: https://authentic-source.example.it
7 description: Authentic Source API
8paths:
9 /v1.3.1/AttributeClaims{dataset_id}:
10 post:
11 tags:
12 - e-Services PDND
13 summary: Get Attribute Claims
14 description: >-
15 This service provides the Credential Issuer with all attribute claims necessary for the issuance of a Digital Credential
16 operationId: attributeClaims
17 parameters:
18 - in: path
19 name: dataset_id
20 schema:
21 type: string
22 required: true
23 description: Identifier of the dataset as registered in the Authentic Source Registry
24 - name: Authorization
25 in: header
26 description: >-
27 JWT token obtained from <a target="blank"
28 href="https://italia.github.io/eid-wallet-it-docs/v1.0.0/en/e-service-pdnd.html#voucher-issuance">PDND
29 Interoperabilità</a>. Based on the implementation choices, it can be either Bearer or DPoP.<br/><br/><a target="blank"
30 href="https://jwt.io/#debugger-io?token=eyJhbGciOiJFUzI1NiIsImtpZCI6ImI4MzlmNGM3LTFlNWQtNGE4YS05ZmM2LTcyZDNiN2YwOTFlYyIsInR5cCI6ImF0K2p3dCJ9.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.SqKCkZyv78VfaTZzOh6iYfKdGirSrPGMvqCMZE9DFXmzhaYz5lpp-fGRjmDbj88Qrw6U_3nl5WUBUjbjxpYxAQ">EXAMPLE
31 ON JWT.IO</a>
32 required: true
33 schema:
34 type: string
35 format: Signed JWT
36 example: >-
37 DPoP
38 eyJhbGciOiJFUzI1NiIsImtpZCI6ImI4MzlmNGM3LTFlNWQtNGE4YS05ZmM2LTcyZDNiN2YwOTFlYyIsInR5cCI6ImF0K2p3dCJ9.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.SqKCkZyv78VfaTZzOh6iYfKdGirSrPGMvqCMZE9DFXmzhaYz5lpp-fGRjmDbj88Qrw6U_3nl5WUBUjbjxpYxAQ
39 - name: DPoP
40 in: header
41 description: >-
42 DPoP proof JWT, to comply with the REST_JWS_2021_POP security
43 pattern using the POP_DPoP implementation. See also <a target="blank"
44 href="https://datatracker.ietf.org/doc/html/rfc9449.html">RFC
45 9449</a>.<br/><br/>
46
47 <a target="blank" href="https://jwt.io/#debugger-io?token=eyJ0eXAiOiJkcG9wK2p3dCIsImFsZyI6IkVTMjU2IiwiandrIjp7Imt0eSI6IkVDIiwia2V5X29wcyI6WyJzaWduIl0sImtpZCI6IjM5ZmE5NjBiLTc3M2YtNDllZi04YTBlLWU3NzNlOWI5N2FlOCIsImNydiI6IlAtMjU2IiwieCI6Imh1eVhJUU52OTAyb0xzcFg0X3pvbkM5NEc2eUVsbjZsc2RtLTF3TTczMm8iLCJ5IjoiSTlQREVhd1dIcWFGREd4MVprTmstMlBWNldkcGNhSDNBZk9iQlNMaWhndyJ9fQ.eyJqdGkiOiIyYzc2ZmNhMy1jYjRlLTQzMTItOGI2ZS05NzQ5NDYyZjQyMGQiLCJodG0iOiJQT1NUIiwiYXRoIjoiNDc1MmMzMmQ2YzQ4NzYzZjBmMzljZDNkYzk5ZDJlOTk3OTMyYmFmMzc1NjNiYzVhODk5NDg3YTZmODZlNWIxZCIsImh0dSI6Imh0dHBzOi8vYXV0aGVudGljLXNvdXJjZS5leGFtcGxlLml0IiwiaWF0IjoxNzYyMjYyNjE2fQ.Mdayqq66hFzMFvN131WRZ_dxyaEu7W1Qz-ksYt6-RLGD1rCixnmnmFnNOsgFT_wztGL1zJloYTMgn9Ys6lSxgQ">EXAMPLE
48 ON JWT.IO</a>
49 required: false
50 schema:
51 type: string
52 format: JWT
53 example: >-
54 eyJ0eXAiOiJkcG9wK2p3dCIsImFsZyI6IkVTMjU2IiwiandrIjp7Imt0eSI6IkVDIiwia2V5X29wcyI6WyJzaWduIl0sImtpZCI6IjM5ZmE5NjBiLTc3M2YtNDllZi04YTBlLWU3NzNlOWI5N2FlOCIsImNydiI6IlAtMjU2IiwieCI6Imh1eVhJUU52OTAyb0xzcFg0X3pvbkM5NEc2eUVsbjZsc2RtLTF3TTczMm8iLCJ5IjoiSTlQREVhd1dIcWFGREd4MVprTmstMlBWNldkcGNhSDNBZk9iQlNMaWhndyJ9fQ.eyJqdGkiOiIyYzc2ZmNhMy1jYjRlLTQzMTItOGI2ZS05NzQ5NDYyZjQyMGQiLCJodG0iOiJQT1NUIiwiYXRoIjoiNDc1MmMzMmQ2YzQ4NzYzZjBmMzljZDNkYzk5ZDJlOTk3OTMyYmFmMzc1NjNiYzVhODk5NDg3YTZmODZlNWIxZCIsImh0dSI6Imh0dHBzOi8vYXV0aGVudGljLXNvdXJjZS5leGFtcGxlLml0IiwiaWF0IjoxNzYyMjYyNjE2fQ.Mdayqq66hFzMFvN131WRZ_dxyaEu7W1Qz-ksYt6-RLGD1rCixnmnmFnNOsgFT_wztGL1zJloYTMgn9Ys6lSxgQ
55 - name: Agid-JWT-Signature
56 in: header
57 description: >-
58 JWT containing the signature of the message headers whose integrity
59 needs to be guaranteed, to comply with the INTEGRITY_REST_02
60 security pattern (see <a target="blank"
61 href="https://italia.github.io/eid-wallet-it-docs/v1.0.0/en/e-service-pdnd.html">e-Service PDND</a>). <br/><br/>
62
63 <a target="blank" href="https://jwt.io/#debugger-io?token=eyJhbGciOiJFUzI1NiIsImtpZCI6ImQ0YzNiMmExLTk4NzYtNTQzMi0xMGZlLWRjYmE5ODc2NTQzMiIsInR5cCI6IkpXVCJ9.eyJpc3MiOiI4MjkxNGIzZi02MGIyLTQ1MjktYjRkNi0zZDRlNjdmMGE5MzMiLCJzdWIiOiI4MjkxNGIzZi02MGIyLTQ1MjktYjRkNi0zZDRlNjdmMGE5MzMiLCJhdWQiOiJodHRwczovL2F1dGhlbnRpYy1zb3VyY2UuZXhhbXBsZS5pdCIsImlhdCI6MTczMzM5Nzg0MCwibmJmIjoxNzMzNDAxNjI4LCJleHAiOjE3MzM0MDE0NDAsImp0aSI6ImQzZjdiMmM5LTI3NGEtNDJiNy04ZjhkLTJlOWQ4YjE3MzRiMCIsInNpZ25lZF9oZWFkZXJzIjpbeyJkaWdlc3QiOiJTSEEtMjU2PTcyZTE4YmRkZGYxM2M5MTFiNGRkNTYyZWUyMTk3OWE1YzlmMjM1YzNhMDFiZDE0MjZlODU3ZDhjMWEyODJmNDEifSx7ImNvbnRlbnQtdHlwZSI6ImFwcGxpY2F0aW9uL2pzb24ifV19.tG5-P96CCA6N1IYC-xk4GumoVkA3NFolpbBn2vQ2e9vpWQ8f5Sm2l4-1VrXfKTx-CUVz_puiwqkBhulrNKj2fA">EXAMPLE
64 ON JWT.IO</a>
65 required: true
66 schema:
67 type: string
68 format: JWT
69 example: eyJhbGciOiJFUzI1NiIsImtpZCI6ImQ0YzNiMmExLTk4NzYtNTQzMi0xMGZlLWRjYmE5ODc2NTQzMiIsInR5cCI6IkpXVCJ9.eyJpc3MiOiI4MjkxNGIzZi02MGIyLTQ1MjktYjRkNi0zZDRlNjdmMGE5MzMiLCJzdWIiOiI4MjkxNGIzZi02MGIyLTQ1MjktYjRkNi0zZDRlNjdmMGE5MzMiLCJhdWQiOiJodHRwczovL2F1dGhlbnRpYy1zb3VyY2UuZXhhbXBsZS5pdCIsImlhdCI6MTczMzM5Nzg0MCwibmJmIjoxNzMzNDAxNjI4LCJleHAiOjE3MzM0MDE0NDAsImp0aSI6ImQzZjdiMmM5LTI3NGEtNDJiNy04ZjhkLTJlOWQ4YjE3MzRiMCIsInNpZ25lZF9oZWFkZXJzIjpbeyJkaWdlc3QiOiJTSEEtMjU2PTcyZTE4YmRkZGYxM2M5MTFiNGRkNTYyZWUyMTk3OWE1YzlmMjM1YzNhMDFiZDE0MjZlODU3ZDhjMWEyODJmNDEifSx7ImNvbnRlbnQtdHlwZSI6ImFwcGxpY2F0aW9uL2pzb24ifV19.tG5-P96CCA6N1IYC-xk4GumoVkA3NFolpbBn2vQ2e9vpWQ8f5Sm2l4-1VrXfKTx-CUVz_puiwqkBhulrNKj2fA
70 - name: Digest
71 in: header
72 description: >-
73 Digest of the message payload, to comply with the INTEGRITY_REST_02
74 security pattern. According to <a target="blank" href="https://www.rfc-editor.org/rfc/rfc3230.html#section-4.2">RFC
75 3230 §4.2</a>, the format MUST be the following: digest-algorithm=encoded
76 digest output.
77 required: true
78 schema:
79 type: string
80 example: SHA-256=72e18bdddf13c911b4dd562ee21979a5c9f235c3a01bd1426e857d8c1a282f41
81 - name: Agid-JWT-TrackingEvidence
82 in: header
83 description: >-
84 If the Voucher type is Bearer, this header represents a JWT acting as a proof of possession, to comply with the REST_JWS_2021_POP security
85 pattern using the POP_TPoP implementation. Otherwise, it is a JWT containing the data tracked in the Consumer's domain, to comply with AUDIT_REST_02 (see <a target="blank"
86 href="https://italia.github.io/eid-wallet-it-docs/v1.0.0/en/e-service-pdnd.html">e-Service PDND</a>). <br/><br/>
87 <a target="blank" href="https://jwt.io/#debugger-io?token=eyJhbGciOiJFUzI1NiIsImtpZCI6ImQ0YzNiMmExLTk4NzYtNTQzMi0xMGZlLWRjYmE5ODc2NTQzMiIsInR5cCI6IkpXVCJ9.eyJpc3MiOiI4MjkxNGIzZi02MGIyLTQ1MjktYjRkNi0zZDRlNjdmMGE5MzMiLCJhdWQiOiJodHRwczovL2F1dGhlbnRpYy1zb3VyY2UuZXhhbXBsZS5pdCIsImV4cCI6MTczMzA1MjYwMCwibmJmIjoxNzMzMDM2NDUwLCJpYXQiOjE3MzMwMzY0MDAsImp0aSI6ImE0YjVjNmQ3LWU4ZjktYWJjZC1lZjEyLTM0NTY3ODkwMTIzNCIsImRub25jZSI6NjUyODQyNDIxMzY4NSwicHVycG9zZUlkIjoiYjJjM2Q0ZTUtZjZnNy1oOGk5LWowazEtbG1ubzEyMzQ1Njc4IiwidXNlcklEIjoiYThiN2M2ZDUtZTRmMy1nMmgxLWk5ajAta2xtbm9wcXJzdHV2IiwibG9hIjoic3Vic3RhbnRpYWwifQ.y42yfMeW2H9h0b0j0BODUml8yF20stY9q3BwoVU5BB90afBj852Q0QlInncdhjXhUjLS1V76cGBxkutDNvxRNA">EXAMPLE
88 ON JWT.IO</a>
89 required: false
90 schema:
91 type: string
92 format: JWT
93 example: eyJhbGciOiJFUzI1NiIsImtpZCI6ImQ0YzNiMmExLTk4NzYtNTQzMi0xMGZlLWRjYmE5ODc2NTQzMiIsInR5cCI6IkpXVCJ9.eyJpc3MiOiI4MjkxNGIzZi02MGIyLTQ1MjktYjRkNi0zZDRlNjdmMGE5MzMiLCJhdWQiOiJodHRwczovL2F1dGhlbnRpYy1zb3VyY2UuZXhhbXBsZS5pdCIsImV4cCI6MTczMzA1MjYwMCwibmJmIjoxNzMzMDM2NDUwLCJpYXQiOjE3MzMwMzY0MDAsImp0aSI6ImE0YjVjNmQ3LWU4ZjktYWJjZC1lZjEyLTM0NTY3ODkwMTIzNCIsImRub25jZSI6NjUyODQyNDIxMzY4NSwicHVycG9zZUlkIjoiYjJjM2Q0ZTUtZjZnNy1oOGk5LWowazEtbG1ubzEyMzQ1Njc4IiwidXNlcklEIjoiYThiN2M2ZDUtZTRmMy1nMmgxLWk5ajAta2xtbm9wcXJzdHV2IiwibG9hIjoic3Vic3RhbnRpYWwifQ.y42yfMeW2H9h0b0j0BODUml8yF20stY9q3BwoVU5BB90afBj852Q0QlInncdhjXhUjLS1V76cGBxkutDNvxRNA
94 requestBody:
95 content:
96 application/json:
97 schema:
98 $ref: "#/components/schemas/CredentialClaimsRequest"
99 required: true
100 responses:
101 "200":
102 description: OK
103 content:
104 application/jwt:
105 schema:
106 $ref: "#/components/schemas/CredentialClaimsResponse"
107 example: "eyJ0eXAiOiJKV1QiLCJhbGciOiJFUzI1NiIsImtpZCI6IjRlNTAzYjU0LWNiZDUtNDZkOC1iNzhhLTAxMTY5OTEyMmYzMCJ9.eyJpc3MiOiJodHRwczovL2F1dGhlbnRpYy1zb3VyY2UuZXhhbXBsZS5pdCIsIm5iZiI6MTczNjg0NjY4OCwiZXhwIjoxNzM2ODQ2OTI4LCJpYXQiOjE3MzY4NDY2ODgsImF1ZCI6IjgyOTE0YjNmLTYwYjItNDUyOS1iNGQ2LTNkNGU2N2YwYTkzMyIsImp0aSI6ImM4YmQ4YTJmLWU5OTAtNDRmYS05MDEzLTFiMzUzYmZjNWEwZCJ9.4BgoaKyVOupA67tXLQeIK8QNEiYkB646_35HndTkWxS9xypF7FJqyqV24z6EJirSgn5BlT2ZrgqeDURSjJuPUg"
108 "400":
109 description: Bad Request
110 content:
111 application/json:
112 schema:
113 type: object
114 properties:
115 error:
116 type: string
117 description: The error code
118 enum: [invalid_request, invalid_dpop_proof]
119 error_description:
120 type: string
121 description: Text in human-readable form providing further details to clarify the nature of the error encountered
122 example: >-
123 The request cannot be fulfilled because it is missing
124 required parameters, contains invalid parameters, or
125 is otherwise malformed.
126 required:
127 - error
128 examples:
129 invalid_request:
130 value:
131 error: invalid_request
132 error_description: >-
133 The request cannot be fulfilled because it is missing
134 required parameters, contains invalid parameters, or is
135 otherwise malformed
136 invalid_dpop_proof:
137 value:
138 error: invalid_dpop_proof
139 error_description: >-
140 The request cannot be fulfilled because it contains an
141 invalid dpop proof
142 "401":
143 description: Unauthorized
144 headers:
145 WWW-Authenticate:
146 description: The request cannot be fulfilled because the Voucher is expired, revoked or otherwise malformed. See <a target="blank" href="https://datatracker.ietf.org/doc/html/rfc6750.html#section-3">RFC6750</a> and <a target="blank" href="https://datatracker.ietf.org/doc/html/rfc9449.html#section-7.1-11">RFC9449</a> for details.
147 schema:
148 type: string
149 example: >-
150 Bearer error="invalid_token", error_description="The access token expired"
151 "404":
152 description: Claims not found
153 content:
154 application/json:
155 schema:
156 type: object
157 properties:
158 error:
159 type: string
160 description: The error code
161 enum: [not_found]
162 error_description:
163 type: string
164 description: >-
165 Text in human-readable form providing further details to
166 clarify the nature of the error encountered
167 example: >-
168 The authentic source cannot fulfill the request because the
169 claims were not found
170 required:
171 - error
172 "500":
173 description: Internal Server Error
174 content:
175 application/json:
176 schema:
177 type: object
178 properties:
179 error:
180 type: string
181 description: The error code
182 enum: [server_error]
183 error_description:
184 type: string
185 description: >-
186 Text in human-readable form providing further details to
187 clarify the nature of the error encountered
188 required:
189 - error
190 example:
191 error: server_error
192 error_description: >-
193 The request cannot be fulfilled because the e-Service Endpoint encountered an internal problem
194 "503":
195 description: Service Unavailable
196 content:
197 application/json:
198 schema:
199 type: object
200 properties:
201 error:
202 type: string
203 description: The error code
204 enum: [temporarily_unavailable]
205 error_description:
206 type: string
207 description: >-
208 Text in human-readable form providing further details to
209 clarify the nature of the error encountered
210 required:
211 - error
212 example:
213 error: "temporarily_unavailable"
214 error_description: "The request cannot be fulfilled because the e-Service Endpoint is temporarily unavailable (e.g., due to maintainance or overload)"
215components:
216 schemas:
217 CredentialClaimsResponse:
218 properties:
219 Header:
220 type: object
221 properties:
222 alg:
223 description: A digital signature algorithm identifier.
224 type: string
225 example: RS256
226 kid:
227 description: Unique identifier of the JWK used by the Provider to sign the JWT.
228 type: string
229 example: "cdb52532-dd94-40ef-824d-9c55b10e6bc9"
230 typ:
231 description: It MUST be set to 'JWT'.
232 type: string
233 example: "JWT"
234 required: [alg, kid, typ]
235 Payload:
236 type: object
237 properties:
238 iss:
239 description: The identifier of the e-Service.
240 type: string
241 example: "https://authentic-source.example.it"
242 aud:
243 description: The identifier of the Consumer.
244 type: string
245 example: "31670092-eec0-4f95-88da-e1c7ce5e4505"
246 exp:
247 description: UNIX timestamp representing the JWT expiration time.
248 type: integer
249 example: 1736846928
250 iat:
251 description: UNIX timestamp representing the JWT issuance time.
252 type: integer
253 example: 1736846688
254 jti:
255 description: Unique identifier of the JWT to prevent replay attacks.
256 type: string
257 example: "8b971b43-e990-44fa-9013-1b353bfc5a0f"
258 nbf:
259 description: UNIX timestamp representing the JWT first validity time.
260 type: string
261 example: "1736846688"
262 interval:
263 description: Required if claims parameter is not present. This represents the estimated amount of time (in seconds) required before making the request of the attribute claims again.
264 type: integer
265 example: "864000"
266 userClaims:
267 description: List of User Claims.
268 type: object
269 properties:
270 given_name:
271 description: Current First Name.
272 type: string
273 example: '"Mario"'
274 family_name:
275 description: Current Family Name.
276 type: string
277 example: '"Rossi"'
278 birth_date:
279 description: Date of Birth.
280 type: string
281 example: '"1980-01-10"'
282 birth_place:
283 description: Place of Birth.
284 type: string
285 example: '"Roma"'
286 tax_id_code:
287 description: National tax identification number. REQUIRED if personal_administrative_number is absent.
288 type: string
289 example: '"TINIT-XXXXXXXXXXXXXXXX"'
290 personal_administrative_number:
291 description: National unique identifier of a natural person. REQUIRED if tax_id_code is absent.
292 type: string
293 example: '"XX00000XX"'
294 attributeClaims:
295 description: List of Datasets of Attribute.
296 type: array
297 items:
298 type: object
299 properties:
300 object_id:
301 description: Unique identifier of the Dataset.
302 type: string
303 example: "6F9619FF-8B86-D011-B42D-00C04FC964FF"
304 status:
305 description: Status of the Dataset.
306 type: string
307 enum: ["VALID","INVALID", "SUSPENDED"]
308 example: "VALID"
309 last_updated:
310 description: Last time the status or attributes of the Dataset have been updated. Its format is `YYYY-MM-DDTHH:MM:SSZ`.
311 type: string
312 example:
313 additionalProperties:
314 type: string
315 required: [object_id, status, last_updated]
316 example: '[{"object_id": "6F9619FF-8B86-D011-B42D-00C04FC964FF", "nationality": "IT"}, {...}]'
317 required: [iss, aud, exp, iat, jti]
318 CredentialClaimsRequest:
319 required:
320 - unique_id
321 type: object
322 properties:
323 unique_id:
324 type: string
325 description: ID ANPR or Tax identification number
326 object_id:
327 type: string
328 description: Unique identifier of the Credential dataset or `jti` of the Agid-JWT-Signature Credential Issuer deferred flow's request. If this parameter is present only the indicated dataset is returned