8. Entity Onboarding

This section defines the technical specifications for entity lifecycle management in the IT-Wallet ecosystem based on the Registry Infrastructure defined in Registry Infrastructure. This includes initial onboarding procedures, ongoing management operations, such as data updates and modifications, and federation exit processes.

For a high-level overview of the onboarding process, see Onboarding System. The Section Onboarding Journey Maps provides an onboarding journey map from the perspective of Entity's operators.

8.1. Overview

8.1.1. Entity Onboarding System Architecture

The IT-Wallet ecosystem operates on a federated trust infrastructure, requiring participating entities to establish mutual trust before engaging in any interactions involving User attributes.

The onboarding framework defines technical registration procedures based on the type of participant:

  1. Authentic Sources follow data-focused registration processes.

  2. Operational Entities (Credential Issuers, Relying Parties, Wallet Providers) follow trust establishment procedures.

8.1.2. Entity Types and Onboarding Pathways

The following table summarizes entity types, their roles, and corresponding onboarding pathways:

Table 8.1 Entity Types and Onboarding Pathways

Entity Type

Primary Role

Onboarding Pathway

Key Requirements

Authentic Sources

Authoritative data providers for Digital Credential attributes

Authentic Sources Registration Process

Data authority validation; API integration (e.g., PDND)

Credential Issuers

Generate and issue Digital Credentials using Authentic Source data

Federation Entities Onboarding Process

IT-Wallet Trust Infrastructure compliance; see The Infrastructure of Trust

Relying Parties

Verify Digital Credentials for service access

Federation Entities Onboarding Process

IT-Wallet Trust Infrastructure compliance; see The Infrastructure of Trust

Wallet Providers

Provide wallet solutions to citizens

Federation Entities Onboarding Process

IT-Wallet Trust Infrastructure compliance (see The Infrastructure of Trust); Wallet Attestation capabilities (see Wallet Instance Initialization and Registration)

Wallet Instances

User-level digital wallet applications

Indirect registration via Wallet Provider, see Wallet Instance Initialization and Registration

Wallet Attestation from certified Wallet Provider

8.1.3. Administrative and Technical Registration

The onboarding process follows a structured multi-phase approach:

  1. Administrative Registration: All entities MUST complete initial administrative registration that validates their legal standing, regulatory compliance, and organizational eligibility to participate in the IT-Wallet ecosystem.

  2. Technical Registration: Following administrative approval, entities make technical registration through specialised pathways:

  • Authentic Source Registration: Data-focused registration procedures with API integration validation.

  • Federation Registration: Cryptographic trust establishment as defined in Section The Infrastructure of Trust.

  1. IT-Wallet Registry Integration:

  • Claims Registry Integration: Authentic Sources select standardized claim definitions from Claims Registry during capability declaration.

  • Taxonomy Integration: All entities use Taxonomy hierarchical classification (domains, purposes) for organizational structure to categorize Credentials.

  • Authentic Source Registry Integration: Authentic Sources registered with their declared claims and capabilities, enabling Credential Issuers discovery and coordination.

  • Federation Registry Integration: Operational entities included for trust validation during Credential operations.

  • Catalog Integration: Credential types published in Digital Credentials Catalog Structure based on supervisory body policies for public discovery eligibility.

All registry components and their interactions are detailed in Registry Infrastructure.

8.2. Authentic Sources Registration Process

Authentic Sources MUST complete a structured registration process to confirm their status as authoritative data providers in the IT-Wallet ecosystem. This process includes specifying requirements and undergoing procedural validation, as detailed in Authentic Source Operator Journey.

8.2.1. Authentic Source Registration Requirements

Authentic Sources MUST comply with the following technical requirements:

  • Claims Compliance:

    • Claims Registry Adoption: The Entities MUST use standardized Claims Registry identifiers in data responses. Custom claim mapping is not allowed.

  • API Integration Standards:

    • Public Entities: MUST integrate through PDND platform with e-service implementation following national specifications.

    • Private Entities: MUST provide a complete OpenAPI 3.0 API Specification document that includes authorization framework, request/response schemas, error handling mechanisms, and sandbox environment for testing.

  • Response Format Standardization:

    • Standard Claims Format: The Entities MUST use Claims Registry identifiers and formats in all data responses.

    • State Mapping: The Entities MUST handle clear mapping between their internal states and standard Credential states (valid, suspended, revoked).

  • Security and Quality Assurance:

    • Security Standards: The Entities MUST implement TLS 1.3 or higher with robust authentication mechanisms, forward secrecy, and cryptographic algorithms that meet current and emerging security standards, end-to-end confidentiality and integrity of all communications, maintaining compliance with evolving regulatory requirements and industry best practices.

    • User Authentication Evidence: The Entities MAY request User authentication evidence from Credential Issuer before granting access to e-services for obtaining User attributes.

    • Data Quality: The Entities MUST specify update frequency and provide data freshness guarantees.

    • Audit Trail: The Entities MUST implement logging capabilities for all data access and provisioning activities.

8.2.2. Authentic Sources Registration Information Requirements

Note

Only Italian Authentic Sources can be onboarded at the current stage of IT-Wallet.

During registration, Authentic Sources MUST provide the following information:

Table 8.2 Authentic Source Registration Information Requirements

Information Category

Description and Examples

Organization Information

REQUIRED. Organization Details including:

  • Organization name, type ("public" or "private") and country (ISO 3166-1 alpha-2).

  • Administrative identifier codes such as IPA registration code (REQUIRED only for public Authentic Sources) and legal identifier (tax payer's number or VAT number).

  • Contact Information including technical and administrative contacts, such as email addresses, homepage URI, privacy policy URI.

Data Capabilities Declaration

REQUIRED. Available claims:

  • Array of claim identifiers from Claims Registry that the Authentic Source provides (e.g., ["given_name", "family_name", "driving_privileges"]).

  • Taxonomy classification for Authentic Source scope (e.g., ["AUTHORIZATION"] domains and ["DRIVING_LICENSE"] purposes).

API Implementation Details

REQUIRED. Integration information details:

  • Authorization framework for API access.

  • API definitions such as Request/Response Formats, including error management.

Data Provision Capabilities

REQUIRED. Indicates if Authentic Source supports immediate/deferred data provision (boolean).

User Information

OPTIONAL. Markdown-formatted text containing human-readable information about data availability constraints or limitations. For example, if the Authentic Source database only contains data registered after a specific date, this information MUST be conveyed to Users.

Example: "Driving license data is available for licenses issued after January 1, 2020. For older licenses, contact the local motorization office.".

Display Properties

OPTIONAL. Visual branding suggestions for Digital Credentials using Authentic Source data:

  • Background color for Digital Credentials in hexadecimal format (e.g., "#003d82").

  • Text color for Digital Credentials in hexadecimal format (e.g., "#ffffff").

  • Logo URI with cryptographic integrity verification for Digital Credential branding.

  • Visual template URI with integrity verification for Digital Credential presentation.

8.2.3. Authentic Source Registration Procedure

The Authentic Source registration follows a technical process as described below.

Authentic Source registration process showing the 3-step procedure

Fig. 8.1 Authentic Source Registration Process.

Step 1 - Registration Package Preparation: The Entity prepares registration information according to the requirements table above. A non-normative example of information in JSON format is provided below.

Listing 8.1 Authentic Source Registration example
{
  "entity_id": "https://transport-authority.gov.example",
  "organization_name": "National Transport Authority",
  "organization_type": "public",
  "ipa_code": "nta_001",
  "legal_identifier": "12345678901",
  "organization_country": "XX",
  "homepage_uri": "https://www.gov.example/transport",
  "email_contacts": [
    "registry@transport-authority.gov.example",
    "technical-support@transport-authority.gov.example"
  ],
  "policy_uri": "https://www.gov.example/transport/privacy-policy",
  "logo_uri": "https://www.gov.example/assets/transport-logo.svg",
  "logo_uri#integrity": "sha-256-a665a45920422f9d417e4867efdc4fb8a04a1f3fff1fa07e998e86f7f7a27ae3",
  "data_capabilities": [
    {
      "description": "Driving license data is available for licenses issued after January 1, 2020. For older licenses, contact the local transport authority office.",
      "domains": ["IDENTITY", "AUTHORIZATION"],
      "intended_purposes": ["DRIVING_LICENSE"],
      "available_claims": [
        "given_name",
        "family_name",
        "birth_date",
        "birth_place",
        "issue_date",
        "expiry_date",
        "document_number",
        "driving_privileges"
      ],
      "integration_method": "pdnd",
      "integration_endpoint": "https://api.gov.example/transport/driving-license",
      "api_specification": "https://docs.gov.example/transport/api-oas3.yaml",
      "data_provision": {
        "immediate_flow": true,
        "deferred_flow": false
      },
      "update_frequency": "real_time",
      "display": {
        "background_color": "#003d82",
        "text_color": "#ffffff"
      }
    }
  ]
}

Step 2 - Technical Validation: Supervisory Body validates submitted registration focusing on:

  • Claims Registry Compliance: Validation of claims format, identifiers, and existence in Claims Registry.

  • Taxonomy Validation: Verification that declared domains, and purposes are valid taxonomy entries.

  • API Integration Verification:

    • Public Entities: PDND e-service specification compliance verification

    • Private Entities: OpenAPI 3.0 specification completeness including authorization framework, request/response schemas, error handling mechanisms, and sandbox environment.

  • Response Format Standards: Verification of Claims Registry format usage and state mapping specification.

Step 3 - Authentic Source Registry Publication: Upon successful validation:

  • Authentic Source Entity is published in the Authentic Source Registry with complete declared capabilities.

  • Authentic Source becomes discoverable by Credential Issuers for integration requests.

  • Authentic Source is ready for operational data provision.

Note

Authentic Source registration is complete and independent of Credential Issuer integration. Authentic Sources become discoverable immediately upon Authentic Source Registry publication, while Credential availability to end Users depends on administrative Authentic Source to Credential Issuer authorization followed by successful technical integration and Supervisory Body policy approval for catalog eligibility.

8.3. Authentic Source to Credential Issuer Authorization Process

Following administrative Authentic Source to Credential Issuer authorization obtained during the administrative registration phase, technical integration procedures establish the operational API connections and data access mechanisms between Credential Issuers and Authentic Sources.

Technical integration encompasses:

  • API Endpoint Configuration: Establishment of secure API connections as specified in Authentic Source technical specifications (PDND e-services for public Authentic Sources, OpenAPI 3.0 implementations for private Authentic Sources).

  • Claims Mapping Validation: Verification that Credential Issuer implementation correctly maps Authentic Source data responses to standardized Claims Registry identifiers.

  • Data Flow Testing: Validation of immediate or deferred data provision capabilities and error handling mechanisms.

  • Security Implementation: Configuration of authentication, authorization, and audit logging as required by Authentic Source security standards.

8.4. Federation Entities Onboarding Process

Federation Entities, including Credential Issuers, Relying Parties, and Wallet Providers, must complete onboarding procedures to become eligible participants in the IT-Wallet ecosystem. This process establishes distributed trust by issuing X.509 Certificates, validating Trust Chains, and confirming compliance, as described in The Infrastructure of Trust.

8.4.1. Hierarchical Federation Authority Model

The IT-Wallet federation implements a hierarchical onboarding model where Federation Entities MUST be onboarded by one of the following actors:

  1. Trust Anchor: The root authority that has the capability to directly onboard any Federation Entity.

  2. Intermediates: Delegated authorities that onboard Leaf Entities on behalf of Trust Anchor.

Both Trust Anchors and Intermediates act as Federation Authorities with the following onboarding capabilities:

  • X.509 Certificate Issuance: Issue X.509 Certificates to their Immediate Subordinates with appropriate naming constraints as defined in X.509 PKI.

  • Metadata Policy Application: Apply federation-specific metadata policies with cascading effect (Trust Anchor policies override Intermediate policies).

  • Trust Mark Issuance: Issue Federation Trust Marks attesting Subordinate capabilities and grants, according to the trust framework.

Therefore, Federation Entities MAY be onboarded through different paths:

  • Direct Trust Anchor Onboarding: Entity directly registers with the Trust Anchor.

  • Intermediate-mediated Onboarding: Entity registers with an appropriate Intermediate.

8.4.2. Federation Onboarding Prerequisites

Federation Entities MUST comply with the following technical requirements before initiating the onboarding process:

  • Key Generation: The entities MUST generate at least two key pairs using elliptic curve cryptography as specified in Cryptographic Algorithms:

    • Federation Key Pair: Used for signing Entity Configurations and attesting application specific keys.

    • Application Specific Key Pair(s)*: Used for entity-specific protocol operations, such as Credential issuance and Credential presentation.

  • Application Specific Key Attestation: The entities MUST create self-signed X.509 Certificates for their application specific keys using the Federation Entity Private Key.

  • Entity Configuration Preparation: The entities MUST publish an Entity Configuration (EC) signed with their Federation Entity Private Key at the /.well-known/openid-federation endpoint as defined in The Infrastructure of Trust. The EC MUST include:

  • X.509 Certificate Signing Request (CSR): The entities MUST prepare a X.509 Certificate Signing Request (CSR) in PKCS #10 format containing the Federation Entity Key for X.509 Certificate issuance by the Federation Authority, as defined in Trust Infrastructure Requirements.

8.4.3. Federation Onboarding Procedure

The federation onboarding follows a structured 4-step procedure, it can be performed by the Trust Anchor or an Intermediate.

Note

The following procedure applies to Wallet Providers, Credential Issuers and Relying Parties that wish to perform onboarding in the IT-Wallet federation. The Federation Authority is referred to Trust Anchor or Intermediate according to organizational characteristics and federation governance policies.

Note

This section covers the technical registration requirements. All administrative information, such as legal entity validation, regulatory compliance, organizational eligibility, is assumed to have been collected and validated by the Supervisory Body during the administrative registration phase, which is out of scope for this technical specification. Examples of administrative information include: legal entity name, business registration numbers, contact persons, legal compliance documentation, and operational authorizations.

Federation entity onboarding process showing the 4-step procedure

Fig. 8.2 Federation Entity Onboarding Process.

Step 1 - Onboarding Request Submission: Federation Entity initiates the onboarding process by submitting a technical registration request including the following information.

Table 8.3 Federation Onboarding Technical Request Information

Technical Information Category

Requirements and Description

Federation Entity Identifier

REQUIRED. A unique URL that identifies the Federation Entity as defined in Federation Roles.

Federation Entity Key (JWK)

REQUIRED. Elliptic public key in JSON Web Key format used for signing Entity Configurations and attesting application specific keys, using cryptographic algorithms specified in Cryptographic Algorithms.

X.509 Certificate Signing Request (CSR)

REQUIRED. CSR in PKCS #10 format for X.509 Certificate issuance by the Federation Authority. The CSR MUST:

  • Contain only the Federation Entity Keys.

  • Be signed with the corresponding Federation Entity Private Key.

  • Define the X.509 Certificate Subject with required attributes as specified in X.509 Certificates Issuance for Federation Entities.

Warning

Before submitting the technical onboarding request, Federation Entities MUST ensure that their /.well-known/openid-federation endpoint publishes a valid Entity Configuration (as defined in Entity Configuration) signed with their Federation Entity Private Key corresponding to the Federation Entity Key provided in the request. The Entity Configuration MUST already include application specific keys in the metadata with self-signed X.509 Certificates in the x5c claims.

A non-normative example of the technical information structure that Federation Entities submit during Step 1 onboarding request:

The example below shows the decoded content of the CSR:

Listing 8.2 CSR decoded content example
Certificate Request:
    Data:
        Version: 0 (0x0)
        Subject: CN=credentials.example.gov, OU=Digital Credentials, O=Example Organization, L=Roma, ST=Lazio, C=IT, emailAddress=technical@credentials.example.gov
        Subject Public Key Info:
            Public Key Algorithm: id-ecPublicKey
                Public-Key: (256 bit)
                ASN1 OID: prime256v1
                NIST CURVE: P-256
    Signature Algorithm: ecdsa-with-SHA256

Note

The CSR Subject attributes MUST comply with the requirements specified in X.509 Certificates Issuance for Federation Entities.

Note

The Federation Entity Keys contained in the jwks object and the public keys contained in the certificate_signing_requests object MUST match. The keys are provided in two formats: JWK format and PKCS #10 CSR format for X.509 Certificate issuance. Application specific keys are included only in the Entity Configuration metadata, and they MUST NOT be included in the onboarding request.

Note

The Entity Configuration Endpoint is constructed automatically by appending /.well-known/openid-federation to the Federation Entity Identifier (entity_id). Federation Entities do not need to specify this endpoint separately in the registration request.

Step 2 - Federation Authority Validation and X.509 Certificate Issuance: Following the onboarding request submission, the Federation Authority MUST perform:

  • Verification of information provided in the registration request.

  • Validation of the Entity Configuration, and the metadata contained in it, published at the entity's /.well-known/openid-federation endpoint (as defined in The Infrastructure of Trust).

  • Metadata Policy Application: Application of federation-specific metadata policies to the entity's metadata based on organizational characteristics and authorization scope as defined in Subordinate Statements. When onboarded through an Intermediate, both Intermediate and Trust Anchor policies apply, with Trust Anchor policies taking precedence in case of conflicts.

  • X.509 Certificate Issuance: Certification of the Federation Entity Key with X.509 Certificate issuance using the trust infrastructure detailed in Trust Infrastructure Requirements. Intermediates MUST issue X.509 Certificates using appropriate naming constraints limiting the use of DNS names and URIs to their subordinates only.

Upon successful validation, the entity receives a response containing an X.509 Certificate Chain where:

  • The first element is the X.509 Certificate containing the Federation Entity Key (issued by the Federation Authority).

  • For Trust Anchor onboarding: The second element is the Trust Anchor's self-signed X.509 Certificate for validating the first X.509 Certificate.

  • For Intermediate onboarding: Additional elements include the Intermediate's X.509 Certificate and the Trust Anchor's self-signed Certificate, forming a complete X.509 X.509 Certificate chain.

  • All X.509 Certificates are expressed in DER format and encoded in Base64.

Example X.509 X.509 Certificate chain response:

[
  "MIIDqjCCA1GgAwIBAgIGAZc6/V9qMAoGCCqGSM49BAMCMIGzMQsw...",
  "MIIDQzCCAuigAwIBAgIGAZc6+XlDMAoGCCqGSM49BAMCMIGzMQsw..."
]

Note

If issuance process fails, the requestor entity receives a response with identified issues to be resolved before submitting a new onboarding request.

Note

Each entity can collect its X.509 Certificate Chain by obtaining the Trust Anchor's self-signed X.509 Certificate, which is included within the Entity Configuration's jwks object, and by aggregating all the x5c values published by its superior entities, from the Trust Anchor down to its immediate superior. This enables the entity to reconstruct the full certificate chain required for validation and trust establishment within the federation.

Step 3 - Fetch Subordinate Statement: as confirmation of success of the onboarding process, the entity MUST fetch the Subordinate Statement about itself from the immediate Federation Authority using the /fetch endpoint as defined in Federation API endpoints.

Example fetch request:

GET /fetch?sub=https%3A%2F%2Fcredentials.example.gov HTTP/1.1
Host: trust-anchor.example.gov

Note

If the /fetch endpoint responds with status code set to 400 or 404, the entity MUST resolve the issues described in the response message, before calling the fetch endpoint again.

Step 4: Entity Configuration Update and Onboarding Completion

Following the fetch request, the Federation Authority returns the entity's Subordinate Statement, which is a signed JWT containing:

  • Entity Metadata: The entity's validated metadata with applied federation policies.

  • Trust Information: Information about the trust relationship between the Federation Authority and the entity, including the issued x5c within the jwk object about the Subordinate.

  • Trust Marks: The Trust Marks issued by the Federation Authority for the entity's specific operational scope and capabilities.

    Example Federation JWK about the Subordinate including the issued X.509 Certificate:

    {
      "kid": "NsXymfIILEPR5Y0t",
      "kty": "EC",
      "x": "gXY4FApFJCj91Gpb1K9GEIouTq2X3L0K64Iq0ob4l_g",
      "y": "l-6dcrIrFVdrzoY9cRJv9zNuFOR3MsDz6TSDhB0xEo4",
      "crv": "P-256",
      "x5c": [
        "MIIDqjCCA1GgAwIBAgIGAZc6/V9qMAoGCCqGSM49BAMCMIGzMQsw..."
      ]
    }
    

The Federation Entity MUST complete the onboarding process by:

  1. Update and Publish the Entity Configuration:

The content of /.well-known/openid-federation endpoint must be updated to include the following claims:

  • Add an authority_hints claim with a JSON Array containing the immediate Federation Authority's Federation Entity Identifier (Trust Anchor for direct onboarding, or Intermediate for mediated onboarding) as defined in Federation Roles.

  • Integrate Trust Marks: Include the Trust Marks from the Subordinate Statement in the Entity Configuration using the trust_marks claim as specified in Entity Configuration Leaves and Intermediates.

Example authority_hints addition:

{
  "iat": 1718207217,
  "exp": 1749743216,
  "iss": "https://credentials.example.gov",
  "sub": "https://credentials.example.gov",
  "authority_hints": ["https://trust-anchor.example.gov"],
  //...
}

Example Trust Marks integration:

"trust_marks": [
  {
    "trust_mark_type": "https://trust-anchor.example.gov/trust_marks/federation-entity/credential-issuer",
    "trust_mark": "eyJhbGciOiJFUzI1NiIsInR5cCI6IkpXVCJ9.eyJpc3MiOiJodHRwczovL3RydXN0LWFuY2hvci5leGFtcGxlLmdvdiIsInN1YiI6Imh0dHBzOi8vY3JlZGVudGlhbC1pc3N1ZXIuZXhhbXBsZS5nb3YiLCJ0cnVzdF9tYXJrX3R5cGUiOiJodHRwczovL3RydXN0LWFuY2hvci5leGFtcGxlLmdvdi90cnVzdF9tYXJrcy9mZWRlcmF0aW9uLWVudGl0eS9jcmVkZW50aWFsLWlzc3VlciIsImlhdCI6MTcwMDAwMDAwMCwiZXhwIjoxNzMwMDAwMDAwfQ.abc123signature"
  }
]

Note

To update Trust Marks after onboarding, the entity can use the fetch endpoint of its immediate superior to obtain all the updated Trust Marks about itself. When the Trust Mark issuer is different from the superior entity that has onboarded the entity, Federation Entities can obtain fresh Trust Marks anytime needed by using the Federation Trust Mark endpoint as defined in Federation API endpoints.

Upon successful completion of Step 4, the entity onboarding is successfully completed. The entity is now operational within the IT-Wallet federation and ready for operational activities.

Note

Federation Registry Integration: Upon successful onboarding completion, the entity's Federation Entity Identifier becomes discoverable through the Trust Anchor's entity listing mechanisms (as defined in The Infrastructure of Trust), indicating active federation participation. The entity becomes part of the federation infrastructure detailed in Registry Infrastructure.

8.4.4. IT-Wallet Federation Trust Marks

Federation Entities receive IT-Wallet Federation Trust Marks during successful onboarding completion. Trust Marks are issued by the Federation Authority (Trust Anchor for direct onboarding, Intermediate for mediated onboarding) and serve as verifiable attestations about compliance with IT-Wallet technical profiles and or authorization policies.

8.4.4.1. Trust Mark Types and Schema

Entities MAY receive multiple Trust Marks for different purposes. Trust Mark identifiers MUST follow a hierarchical schema that reflects the authorization scope:

https://<federation_authority_domain>/trust_marks/<purpose>/<entity_type>

Where:

  • <federation_authority_domain>: The domain of the issuing Federation Authority.

  • <purpose>: The Trust Mark purpose. The federation-entity purpose is REQUIRED for all entities. Additional Trust Mark purposes MAY be supported, such as authorization_policy for granular operational scope definitions.

  • <entity_type>: The recipient entity type (e.g., credential-issuer, relying-party, wallet-provider).

8.4.4.2. Trust Mark Structure

Trust Marks in Entity Configuration MUST be represented as JSON objects containing the following claims:

Table 8.4 Trust Mark Object Claims (in Entity Configuration)

Claim

Description

trust_mark_type

REQUIRED. Identifier for the type of Trust Mark following the schema: https://<federation_authority_domain>/trust_marks/<purpose>/<entity_type>.

trust_mark

REQUIRED. A signed JSON Web Token representing the Trust Mark issued by the Federation Authority.

The Trust Mark JWT (contained in the trust_mark claim above) includes the following claims:

Table 8.5 Trust Mark JWT Claims

Claim

Description

iss

REQUIRED. Federation Authority issuing the Trust Mark (immediate superior: Trust Anchor or Intermediate).

sub

REQUIRED. Federation Entity Identifier of the subject.

trust_mark_type

REQUIRED. Unique Trust Mark identifier, MUST match the trust_mark_type claim.

iat

REQUIRED. Trust Mark issuance timestamp.

exp

REQUIRED. Trust Mark expiration timestamp.

organization_type

REQUIRED. Entity organization type (public or private).

vat_number

RECOMMENDED. VAT number of the entity (typically for private organizations).

legal_identifier

RECOMMENDED. Legal registration number or identifier of the entity (e.g., business registration number, tax code).

ipa_code

RECOMMENDED. IPA (Indice delle Pubbliche Amministrazioni) code for public sector entities.

organization_name

RECOMMENDED. Full name of the Organizational Entity.

email

RECOMMENDED. Institutional or PEC email of the organization.

logo_uri

OPTIONAL. URL pointing to the Trust Mark logo for UI/UX purposes.

ref

OPTIONAL. URL with additional web information about the Trust Mark.

The following non-normative examples illustrate different Trust Mark JWT contents for federation membership and different authorization policies:

{
  "iss": "https://trust-anchor.eid-wallet.example.it",
  "sub": "https://ci.public-authority.gov.example",
  "trust_mark_type": "https://trust-anchor.eid-wallet.example.it/trust_marks/federation-entity/credential-issuer",
  "iat": 1718207217,
  "exp": 1749743216,
  "organization_type": "public",
  "ipa_code": "pub_001",
  "legal_identifier": "12345678901",
  "organization_name": "Public Authority Services",
  "email": "registry@public-authority.gov.example"
}
{
  "iss": "https://trust-anchor.eid-wallet.example.it",
  "sub": "https://rental.cars.example.com",
  "trust_mark_type": "https://trust-anchor.eid-wallet.example.it/trust_marks/authorization_policy/relying-party",
  "iat": 1718207217,
  "exp": 1749743216,
  "organization_type": "private",
  "vat_number": "IT12345678901",
  "legal_identifier": "12345678901",
  "organization_name": "Premium Car Rental Services Ltd",
  "email": "compliance@rental.cars.example.com",
  "authorized_claims": ["given_name", "family_name", "driving_privileges"],
  "authorized_credential_types": ["mobile-driving-license"],
  "scope_restrictions": {
    "domains": ["AUTHORIZATION"],
    "purposes": ["DRIVING_LICENSE"]
  }
}
{
  "iss": "https://trust-anchor.eid-wallet.example.it",
  "sub": "https://private-badge.ci.example.com",
  "trust_mark_type": "https://trust-anchor.eid-wallet.example.it/trust_marks/authorization_policy/credential-issuer",
  "iat": 1718207217,
  "exp": 1749743216,
  "organization_type": "private",
  "vat_number": "IT98765432101",
  "legal_identifier": "98765432101",
  "organization_name": "Badge Services Ltd",
  "email": "compliance@rprivate-badge.ci.example.com",
  "authorized_claims": ["given_name", "family_name", "company_id"],
  "authorized_credential_types": ["example-company-badge"],
  "scope_restrictions": {
    "domains": ["MEMBERSHIP"],
    "purposes": ["ASSOCIATION"]
  }
}

Federation Entities MUST integrate Trust Marks in their Entity Configuration using the trust_marks claim as specified in Entity Configuration Leaves and Intermediates. Entities MAY receive multiple Trust Marks for different authorization scopes.

{
  "iss": "https://credentials.example.gov",
  "sub": "https://credentials.example.gov",
  "jwks": {
   // jwks content
  },
  "authority_hints": ["https://trust-anchor.eid-wallet.example.it"],
  "trust_marks": [
    {
      "trust_mark_type": "https://trust-anchor.eid-wallet.example.it/trust_marks/federation-entity/credential-issuer",
      "trust_mark": "eyJhbGciOiJFUzI1NiIsImtpZCI6IlRydXN0QW5jaG9yS2V5SWQiLCJ0eXAiOiJKV1QifQ..."
    }
  ],
  "metadata": {
   // Metadata content
  }
}
{
  "iss": "https://healthcare-ci.example.gov",
  "sub": "https://healthcare-ci.example.gov",
  "jwks": {
   // jwks content
  },
  "authority_hints": ["https://healthcare.intermediate.eid-wallet.example.it"],
  "trust_marks": [
    {
      "trust_mark_type": "https://healthcare.intermediate.eid-wallet.example.it/trust_marks/federation-entity/credential-issuer",
      "trust_mark": "eyJhbGciOiJFUzI1NiIsImtpZCI6IkhlYWx0aGNhcmVJbnRlcm1lZGlhdGVLZXlJZCIsInR5cCI6IkpXVCJ9..."
    }
  ],
  "metadata": {
   // Metadata content
 }
}

8.4.4.3. Trust Mark Validation

Federation participants validate Trust Mark status through two mechanisms:

  1. Static Validation: Cryptographic verification using the issuing Federation Authority's public key from the Trust Chain.

  2. Dynamic Validation: Real-time status verification, against any revocations, using the Federation Authority's /trust_mark_status endpoint as defined in Federation API endpoints.

For comprehensive X.509 Certificate management procedures, including chain validation, revocation verification, and lifecycle management, see X.509 Certificate Management Operations.