|||
IT-Wallet Technical Documentation - Editor's Copy
Quick search
Table of Contents
1. Introduction
2. Design Principles
3. Architecture Overview
4. The Infrastructure of Trust
5. Entities
6. Digital Credential Management
6.1. Digital Credential Data Model
6.2. Digital Credential Lifecycle
6.3. Digital Credentials Catalogue
7. Digital Credential Flows
8. Endpoints
9. Cryptographic Algorithms
10. Security and Privacy Considerations
11. General Log Retention Policies
12. Defined Terms and References
13. How to contribute
14. Open Source Releases
15. Appendix
6.
Digital Credential Management
ΒΆ
Digital Credential Management Table of Contents
6.1. Digital Credential Data Model
6.1.1. SD-JWT-VC Credential Format
6.1.1.1. Credential SD-JWT Parameters
6.1.1.2. Digital Credential Metadata Type
6.1.1.3. PID Claims
6.1.1.4. PID Non-Normative Examples
6.1.1.5. (Q)EAA non-normative Examples
6.1.2. mdoc-CBOR Credential Format
6.1.2.1. Attribute Namespaces
6.1.2.2. Attributes
6.1.2.3. Mobile Security Object
6.1.2.4. mdoc-CBOR Examples
6.1.2.5. CBOR Acronyms
6.1.3. Cross-Format Credential Parameters Mapping
6.2. Digital Credential Lifecycle
6.2.1. Credential Transitions
6.2.1.1. Credential Transition to Issued
6.2.1.2. Credential Transition to Valid
6.2.1.3. Credential Transition to Expired
6.2.1.4. Credential Transition to Revoked
6.2.1.5. Credential Transition to Suspended
6.2.2. Credential Lifecycle Management
6.2.2.1. Digital Credential Revocation and Suspension
6.2.2.2. Entities Involved
6.2.2.3. Status Update Flows
6.2.3. Validity Verification Mechanisms
6.2.3.1. OAuth Status Assertions
6.2.4. OAuth Status Lists
6.2.4.1. Status Lists Creation
6.3. Digital Credentials Catalogue
6.3.1. Digital Credentials Categories
6.3.2. Digital Credentials Catalogue Structure
6.3.3. Claims Taxonomy
6.3.4. Digital Credentials Catalogue Endpoint
6.3.4.1. Digital Credentials Catalogue Request
6.3.4.2. Digital Credentials Catalogue Response
<
5.4.
Authentic Sources
6.1.
Digital Credential Data Model
>