|||
IT-Wallet Technical Documentation - Editor's Copy
Quick search
Table of Contents
1. Introduction
2. Design Principles
3. Architecture Overview
4. The Infrastructure of Trust
5. Entities
6. Digital Credential Management
7. Digital Credential Flows
7.1. Digital Credential Issuance
7.2. Digital Credential Presentation
8. Endpoints
9. Cryptographic Algorithms
10. Security and Privacy Considerations
11. General Log Retention Policies
12. Defined Terms and References
13. How to contribute
14. Open Source Releases
15. Appendix
7.
Digital Credential Flows
ΒΆ
Digital Credential Flows Table of Contents
7.1. Digital Credential Issuance
7.1.1. Credential Issuance High-Level Flows
7.1.1.1. High-Level PID flow
7.1.1.2. High-Level (Q)EAA flow
7.1.2. Credential Issuance Low-Level Flows
7.1.2.1. Low-Level Issuance Flow
7.1.2.2. Refresh Token Flow
7.1.2.3. Re-Issuance Flow
7.2. Digital Credential Presentation
7.2.1. Remote Flow
7.2.1.1. Authorization Request
7.2.1.2. Request URI Request
7.2.1.3. Request URI Response
7.2.1.4. Authorization Response
7.2.1.5. Relying Party Response
7.2.1.6. Status Endpoint
7.2.1.7. Redirect URI
7.2.2. Proximity Flow
7.2.2.1. Device Engagement
7.2.2.2. mdoc Request
7.2.2.3. mdoc Response
7.2.2.4. Session Termination
<
6.3.
Digital Credentials Catalogue
7.1.
Digital Credential Issuance
>