|||

IT-Wallet Technical Documentation - Editor's Copy

Quick search

Table of Contents

  • 1. Introduction
  • 2. Brand Identity
  • 3. Architecture Overview
  • 4. User Experience Design
  • 5. The Infrastructure of Trust
  • 6. Entities
  • 7. Digital Credential Management
  • 8. Digital Credential Flows
    • 8.1. Digital Credential Issuance
      • 8.1.1. Credential Issuance High-Level Flows
      • 8.1.2. Credential Issuance Low-Level Flows
      • 8.1.3. eID Substantial Authentication with MRTD Verification for PID Issuance
    • 8.2. Digital Credential Presentation
  • 9. Endpoints
  • 10. Cryptographic Algorithms
  • 11. Security and Privacy Considerations
  • 12. General Log Retention Policies
  • 13. Defined Terms and References
  • 14. How to contribute
  • 15. Open Source Releases
  • 16. Appendix

8.1. Digital Credential IssuanceΒΆ

This section describes the PID and (Q)EAAs issuance flow with a high level of security.

Credential Issuance Table of Contents

  • 8.1.1. Credential Issuance High-Level Flows
    • 8.1.1.1. High-Level PID flow
    • 8.1.1.2. High-Level (Q)EAA flow
  • 8.1.2. Credential Issuance Low-Level Flows
    • 8.1.2.1. Low-Level Issuance Flow
    • 8.1.2.2. Refresh Token Flow
      • 8.1.2.2.1. Security Considerations
    • 8.1.2.3. Re-Issuance Flow
      • 8.1.2.3.1. Re-Issuance Flow: Security Considerations
  • 8.1.3. eID Substantial Authentication with MRTD Verification for PID Issuance
    • 8.1.3.1. Design Principles
    • 8.1.3.2. System Architecture
    • 8.1.3.3. High-Level Flow
    • 8.1.3.4. Session Management
    • 8.1.3.5. Low-Level Flow
      • 8.1.3.5.1. Phase 1: OAuth Authorization Request
      • 8.1.3.5.2. Phase 2: Primary Authentication
      • 8.1.3.5.3. Phase 3: MRTD PoP Validation Flow
      • 8.1.3.5.4. Phase 4: OAuth Authorization Response
    • 8.1.3.6. Error Management
      • 8.1.3.6.1. MRTD PoP Response Errors
      • 8.1.3.6.2. MRTD PoP Validation Response Errors
      • 8.1.3.6.3. HTTP Status Code Mapping
    • 8.1.3.7. Security Considerations
      • 8.1.3.7.1. Secure Session Management
      • 8.1.3.7.2. Cryptographic Challenge Generation
      • 8.1.3.7.3. Nonce Lifecycle Management
      • 8.1.3.7.4. Security Controls
    • 8.1.3.8. Implementation Considerations
<8. Digital Credential Flows
8.1.1. Credential Issuance High-Level Flows>
Last updated on 03/10/2025. Created using Sphinx 7.4.5.