|||

IT-Wallet Technical Documentation - Editor's Copy

Quick search

Table of Contents

  • 1. Introduction
  • 2. Design Principles
  • 3. Architecture Overview
  • 4. The Infrastructure of Trust
  • 5. Entities
  • 6. Digital Credential Management
  • 7. Digital Credential Flows
    • 7.1. Digital Credential Issuance
    • 7.2. Digital Credential Presentation
  • 8. Endpoints
  • 9. Cryptographic Algorithms
  • 10. Security and Privacy Considerations
  • 11. General Log Retention Policies
  • 12. Defined Terms and References
  • 13. How to contribute
  • 14. Open Source Releases
  • 15. Appendix

7. Digital Credential FlowsΒΆ

Digital Credential Flows Table of Contents

  • 7.1. Digital Credential Issuance
    • 7.1.1. Credential Issuance High-Level Flows
      • 7.1.1.1. High-Level PID flow
      • 7.1.1.2. High-Level (Q)EAA flow
    • 7.1.2. Credential Issuance Low-Level Flows
      • 7.1.2.1. Low-Level Issuance Flow
      • 7.1.2.2. Refresh Token Flow
      • 7.1.2.3. Re-Issuance Flow
  • 7.2. Digital Credential Presentation
    • 7.2.1. Remote Flow
      • 7.2.1.1. Authorization Request
      • 7.2.1.2. Request URI Request
      • 7.2.1.3. Request URI Response
      • 7.2.1.4. Authorization Response
      • 7.2.1.5. Relying Party Response
      • 7.2.1.6. Status Endpoint
      • 7.2.1.7. Redirect URI
    • 7.2.2. Proximity Flow
      • 7.2.2.1. Device Engagement
      • 7.2.2.2. mdoc Request
      • 7.2.2.3. mdoc Response
      • 7.2.2.4. Session Termination
<6.3. Digital Credentials Catalogue
7.1. Digital Credential Issuance>
Last updated on 03/06/2025. Created using Sphinx 7.4.5.