8. Entity Onboarding¶
This section defines the technical specifications for entity lifecycle management in the IT-Wallet ecosystem based on the Registry Infrastructure defined in Registry Infrastructure. This includes initial onboarding procedures, ongoing management operations, such as data updates and modifications, and federation exit processes.
For a high-level overview of the onboarding process, see Onboarding System. The Section Onboarding Journey Maps provides an onboarding journey map from the perspective of Entity's operators.
8.1. Overview¶
8.1.1. Entity Onboarding System Architecture¶
The IT-Wallet ecosystem operates on a federated trust infrastructure, requiring participating entities to establish mutual trust before engaging in any interactions involving User attributes.
The onboarding framework defines technical registration procedures based on the type of participant:
Authentic Sources follow data-focused registration processes.
Operational Entities (Credential Issuers, Relying Parties, Wallet Providers) follow trust establishment procedures.
8.1.2. Entity Types and Onboarding Pathways¶
The following table summarizes entity types, their roles, and corresponding onboarding pathways:
Entity Type |
Primary Role |
Onboarding Pathway |
Key Requirements |
---|---|---|---|
Authentic Sources |
Authoritative data providers for Digital Credential attributes |
Data authority validation; API integration (e.g., PDND) |
|
Credential Issuers |
Generate and issue Digital Credentials using Authentic Source data |
IT-Wallet Trust Infrastructure compliance; see The Infrastructure of Trust |
|
Relying Parties |
Verify Digital Credentials for service access |
IT-Wallet Trust Infrastructure compliance; see The Infrastructure of Trust |
|
Wallet Providers |
Provide wallet solutions to citizens |
IT-Wallet Trust Infrastructure compliance (see The Infrastructure of Trust); Wallet Attestation capabilities (see Wallet Instance Initialization and Registration) |
|
Wallet Instances |
User-level digital wallet applications |
Indirect registration via Wallet Provider, see Wallet Instance Initialization and Registration |
Wallet Attestation from certified Wallet Provider |
8.1.3. Administrative and Technical Registration¶
The onboarding process follows a structured multi-phase approach:
Administrative Registration: All entities MUST complete initial administrative registration that validates their legal standing, regulatory compliance, and organizational eligibility to participate in the IT-Wallet ecosystem.
Technical Registration: Following administrative approval, entities make technical registration through specialised pathways:
Authentic Source Registration: Data-focused registration procedures with API integration validation.
Federation Registration: Cryptographic trust establishment as defined in Section The Infrastructure of Trust.
IT-Wallet Registry Integration:
Claims Registry Integration: Authentic Sources select standardized claim definitions from Claims Registry during capability declaration.
Taxonomy Integration: All entities use Taxonomy hierarchical classification (domains, purposes) for organizational structure to categorize Credentials.
Authentic Source Registry Integration: Authentic Sources registered with their declared claims and capabilities, enabling Credential Issuers discovery and coordination.
Federation Registry Integration: Operational entities included for trust validation during Credential operations.
Catalog Integration: Credential types published in Digital Credentials Catalog Structure based on supervisory body policies for public discovery eligibility.
All registry components and their interactions are detailed in Registry Infrastructure.
8.2. Authentic Sources Registration Process¶
Authentic Sources MUST complete a structured registration process to confirm their status as authoritative data providers in the IT-Wallet ecosystem. This process includes specifying requirements and undergoing procedural validation, as detailed in Authentic Source Operator Journey.
8.2.1. Authentic Source Registration Requirements¶
Authentic Sources MUST comply with the following technical requirements:
Claims Compliance:
Claims Registry Adoption: The Entities MUST use standardized Claims Registry identifiers in data responses. Custom claim mapping is not allowed.
API Integration Standards:
Public Entities: MUST integrate through PDND platform with e-service implementation following national specifications.
Private Entities: MUST provide a complete OpenAPI 3.0 API Specification document that includes authorization framework, request/response schemas, error handling mechanisms, and sandbox environment for testing.
Response Format Standardization:
Standard Claims Format: The Entities MUST use Claims Registry identifiers and formats in all data responses.
State Mapping: The Entities MUST handle clear mapping between their internal states and standard Credential states (valid, suspended, revoked).
Security and Quality Assurance:
Security Standards: The Entities MUST implement TLS 1.3 or higher with robust authentication mechanisms, forward secrecy, and cryptographic algorithms that meet current and emerging security standards, end-to-end confidentiality and integrity of all communications, maintaining compliance with evolving regulatory requirements and industry best practices.
User Authentication Evidence: The Entities MAY request User authentication evidence from Credential Issuer before granting access to e-services for obtaining User attributes.
Data Quality: The Entities MUST specify update frequency and provide data freshness guarantees.
Audit Trail: The Entities MUST implement logging capabilities for all data access and provisioning activities.
8.2.2. Authentic Sources Registration Information Requirements¶
Note
Only Italian Authentic Sources can be onboarded at the current stage of IT-Wallet.
During registration, Authentic Sources MUST provide the following information:
Information Category |
Description and Examples |
---|---|
Organization Information |
REQUIRED. Organization Details including:
|
Data Capabilities Declaration |
REQUIRED. Available claims:
|
API Implementation Details |
REQUIRED. Integration information details:
|
Data Provision Capabilities |
REQUIRED. Indicates if Authentic Source supports immediate/deferred data provision (boolean). |
User Information |
OPTIONAL. Markdown-formatted text containing human-readable information about data availability constraints or limitations. For example, if the Authentic Source database only contains data registered after a specific date, this information MUST be conveyed to Users. Example: "Driving license data is available for licenses issued after January 1, 2020. For older licenses, contact the local motorization office.". |
Display Properties |
OPTIONAL. Visual branding suggestions for Digital Credentials using Authentic Source data:
|
8.2.3. Authentic Source Registration Procedure¶
The Authentic Source registration follows a technical process as described below.
Step 1 - Registration Package Preparation: The Entity prepares registration information according to the requirements table above. A non-normative example of information in JSON format is provided below.
{
"entity_id": "https://transport-authority.gov.example",
"organization_name": "National Transport Authority",
"organization_type": "public",
"ipa_code": "nta_001",
"legal_identifier": "12345678901",
"organization_country": "XX",
"homepage_uri": "https://www.gov.example/transport",
"email_contacts": [
"registry@transport-authority.gov.example",
"technical-support@transport-authority.gov.example"
],
"policy_uri": "https://www.gov.example/transport/privacy-policy",
"logo_uri": "https://www.gov.example/assets/transport-logo.svg",
"logo_uri#integrity": "sha-256-a665a45920422f9d417e4867efdc4fb8a04a1f3fff1fa07e998e86f7f7a27ae3",
"data_capabilities": [
{
"description": "Driving license data is available for licenses issued after January 1, 2020. For older licenses, contact the local transport authority office.",
"domains": ["IDENTITY", "AUTHORIZATION"],
"intended_purposes": ["DRIVING_LICENSE"],
"available_claims": [
"given_name",
"family_name",
"birth_date",
"birth_place",
"issue_date",
"expiry_date",
"document_number",
"driving_privileges"
],
"integration_method": "pdnd",
"integration_endpoint": "https://api.gov.example/transport/driving-license",
"api_specification": "https://docs.gov.example/transport/api-oas3.yaml",
"data_provision": {
"immediate_flow": true,
"deferred_flow": false
},
"update_frequency": "real_time",
"display": {
"background_color": "#003d82",
"text_color": "#ffffff"
}
}
]
}
Step 2 - Technical Validation: Supervisory Body validates submitted registration focusing on:
Claims Registry Compliance: Validation of claims format, identifiers, and existence in Claims Registry.
Taxonomy Validation: Verification that declared domains, and purposes are valid taxonomy entries.
API Integration Verification:
Public Entities: PDND e-service specification compliance verification
Private Entities: OpenAPI 3.0 specification completeness including authorization framework, request/response schemas, error handling mechanisms, and sandbox environment.
Response Format Standards: Verification of Claims Registry format usage and state mapping specification.
Step 3 - Authentic Source Registry Publication: Upon successful validation:
Authentic Source Entity is published in the Authentic Source Registry with complete declared capabilities.
Authentic Source becomes discoverable by Credential Issuers for integration requests.
Authentic Source is ready for operational data provision.
Note
Authentic Source registration is complete and independent of Credential Issuer integration. Authentic Sources become discoverable immediately upon Authentic Source Registry publication, while Credential availability to end Users depends on administrative Authentic Source to Credential Issuer authorization followed by successful technical integration and Supervisory Body policy approval for catalog eligibility.
8.4. Federation Entities Onboarding Process¶
Federation Entities, including Credential Issuers, Relying Parties, and Wallet Providers, must complete onboarding procedures to become eligible participants in the IT-Wallet ecosystem. This process establishes distributed trust by issuing X.509 Certificates, validating Trust Chains, and confirming compliance, as described in The Infrastructure of Trust.
8.4.2. Federation Onboarding Prerequisites¶
Federation Entities MUST comply with the following technical requirements before initiating the onboarding process:
Key Generation: The entities MUST generate at least two key pairs using elliptic curve cryptography as specified in Cryptographic Algorithms:
Federation Key Pair: Used for signing Entity Configurations and attesting application specific keys.
Application Specific Key Pair(s)*: Used for entity-specific protocol operations, such as Credential issuance and Credential presentation.
Application Specific Key Attestation: The entities MUST create self-signed X.509 Certificates for their application specific keys using the Federation Entity Private Key.
Entity Configuration Preparation: The entities MUST publish an Entity Configuration (EC) signed with their Federation Entity Private Key at the
/.well-known/openid-federation
endpoint as defined in The Infrastructure of Trust. The EC MUST include:
A
jwks
claim containing the Federation Entity Key in JSON Web Key (JWK) format.An
iss
claim with the Federation Entity Identifier as defined in Federation Roles.A
sub
claim equal to theiss
claim.
iat
andexp
claims defining a valid time interval.A
metadata
claim containing entity-specific metadata organized by Metadata Types (see Credential Issuer Entity Configuration, Relying Party Entity Configuration, or Wallet Provider Entity Configuration) with application specific keys included in the metadatajwks
fields and self-signed X.509 Certificates in the correspondingx5c
claims.X.509 Certificate Signing Request (CSR): The entities MUST prepare a X.509 Certificate Signing Request (CSR) in PKCS #10 format containing the Federation Entity Key for X.509 Certificate issuance by the Federation Authority, as defined in Trust Infrastructure Requirements.
8.4.3. Federation Onboarding Procedure¶
The federation onboarding follows a structured 4-step procedure, it can be performed by the Trust Anchor or an Intermediate.
Note
The following procedure applies to Wallet Providers, Credential Issuers and Relying Parties that wish to perform onboarding in the IT-Wallet federation. The Federation Authority is referred to Trust Anchor or Intermediate according to organizational characteristics and federation governance policies.
Note
This section covers the technical registration requirements. All administrative information, such as legal entity validation, regulatory compliance, organizational eligibility, is assumed to have been collected and validated by the Supervisory Body during the administrative registration phase, which is out of scope for this technical specification. Examples of administrative information include: legal entity name, business registration numbers, contact persons, legal compliance documentation, and operational authorizations.
Step 1 - Onboarding Request Submission: Federation Entity initiates the onboarding process by submitting a technical registration request including the following information.
Technical Information Category |
Requirements and Description |
---|---|
Federation Entity Identifier |
REQUIRED. A unique URL that identifies the Federation Entity as defined in Federation Roles. |
Federation Entity Key (JWK) |
REQUIRED. Elliptic public key in JSON Web Key format used for signing Entity Configurations and attesting application specific keys, using cryptographic algorithms specified in Cryptographic Algorithms. |
X.509 Certificate Signing Request (CSR) |
REQUIRED. CSR in PKCS #10 format for X.509 Certificate issuance by the Federation Authority. The CSR MUST:
|
Warning
Before submitting the technical onboarding request, Federation Entities MUST ensure that their /.well-known/openid-federation
endpoint publishes a valid Entity Configuration (as defined in Entity Configuration) signed with their Federation Entity Private Key corresponding to the Federation Entity Key provided in the request. The Entity Configuration MUST already include application specific keys in the metadata with self-signed X.509 Certificates in the x5c
claims.
A non-normative example of the technical information structure that Federation Entities submit during Step 1 onboarding request:
The example below shows the decoded content of the CSR:
Certificate Request:
Data:
Version: 0 (0x0)
Subject: CN=credentials.example.gov, OU=Digital Credentials, O=Example Organization, L=Roma, ST=Lazio, C=IT, emailAddress=technical@credentials.example.gov
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (256 bit)
ASN1 OID: prime256v1
NIST CURVE: P-256
Signature Algorithm: ecdsa-with-SHA256
Note
The CSR Subject attributes MUST comply with the requirements specified in X.509 Certificates Issuance for Federation Entities.
Note
The Federation Entity Keys contained in the jwks
object and the public keys contained in the certificate_signing_requests
object MUST match. The keys are provided in two formats: JWK format and PKCS #10 CSR format for X.509 Certificate issuance. Application specific keys are included only in the Entity Configuration metadata, and they MUST NOT be included in the onboarding request.
Note
The Entity Configuration Endpoint is constructed automatically by appending /.well-known/openid-federation
to the Federation Entity Identifier (entity_id
). Federation Entities do not need to specify this endpoint separately in the registration request.
Step 2 - Federation Authority Validation and X.509 Certificate Issuance: Following the onboarding request submission, the Federation Authority MUST perform:
Verification of information provided in the registration request.
Validation of the Entity Configuration, and the metadata contained in it, published at the entity's
/.well-known/openid-federation
endpoint (as defined in The Infrastructure of Trust).Metadata Policy Application: Application of federation-specific metadata policies to the entity's metadata based on organizational characteristics and authorization scope as defined in Subordinate Statements. When onboarded through an Intermediate, both Intermediate and Trust Anchor policies apply, with Trust Anchor policies taking precedence in case of conflicts.
X.509 Certificate Issuance: Certification of the Federation Entity Key with X.509 Certificate issuance using the trust infrastructure detailed in Trust Infrastructure Requirements. Intermediates MUST issue X.509 Certificates using appropriate naming constraints limiting the use of DNS names and URIs to their subordinates only.
Upon successful validation, the entity receives a response containing an X.509 Certificate Chain where:
The first element is the X.509 Certificate containing the Federation Entity Key (issued by the Federation Authority).
For Trust Anchor onboarding: The second element is the Trust Anchor's self-signed X.509 Certificate for validating the first X.509 Certificate.
For Intermediate onboarding: Additional elements include the Intermediate's X.509 Certificate and the Trust Anchor's self-signed Certificate, forming a complete X.509 X.509 Certificate chain.
All X.509 Certificates are expressed in DER format and encoded in Base64.
Example X.509 X.509 Certificate chain response:
[
"MIIDqjCCA1GgAwIBAgIGAZc6/V9qMAoGCCqGSM49BAMCMIGzMQsw...",
"MIIDQzCCAuigAwIBAgIGAZc6+XlDMAoGCCqGSM49BAMCMIGzMQsw..."
]
Note
If issuance process fails, the requestor entity receives a response with identified issues to be resolved before submitting a new onboarding request.
Note
Each entity can collect its X.509 Certificate Chain by obtaining the Trust Anchor's self-signed X.509 Certificate, which is included within the Entity Configuration's jwks
object, and by aggregating all the x5c
values published by its superior entities, from the Trust Anchor down to its immediate superior. This enables the entity to reconstruct the full certificate chain required for validation and trust establishment within the federation.
Step 3 - Fetch Subordinate Statement: as confirmation of success of the onboarding process, the entity MUST fetch the Subordinate Statement about itself from the immediate Federation Authority using the /fetch
endpoint as defined in Federation API endpoints.
Example fetch request:
GET /fetch?sub=https%3A%2F%2Fcredentials.example.gov HTTP/1.1
Host: trust-anchor.example.gov
Note
If the /fetch
endpoint responds with status code set to 400
or 404
, the entity MUST resolve the issues described in the response message, before calling the fetch endpoint again.
Step 4: Entity Configuration Update and Onboarding Completion
Following the fetch request, the Federation Authority returns the entity's Subordinate Statement, which is a signed JWT containing:
Entity Metadata: The entity's validated metadata with applied federation policies.
Trust Information: Information about the trust relationship between the Federation Authority and the entity, including the issued x5c within the jwk object about the Subordinate.
Trust Marks: The Trust Marks issued by the Federation Authority for the entity's specific operational scope and capabilities.
Example Federation JWK about the Subordinate including the issued X.509 Certificate:
{ "kid": "NsXymfIILEPR5Y0t", "kty": "EC", "x": "gXY4FApFJCj91Gpb1K9GEIouTq2X3L0K64Iq0ob4l_g", "y": "l-6dcrIrFVdrzoY9cRJv9zNuFOR3MsDz6TSDhB0xEo4", "crv": "P-256", "x5c": [ "MIIDqjCCA1GgAwIBAgIGAZc6/V9qMAoGCCqGSM49BAMCMIGzMQsw..." ] }
The Federation Entity MUST complete the onboarding process by:
Update and Publish the Entity Configuration:
The content of
/.well-known/openid-federation
endpoint must be updated to include the following claims:
Add an
authority_hints
claim with a JSON Array containing the immediate Federation Authority's Federation Entity Identifier (Trust Anchor for direct onboarding, or Intermediate for mediated onboarding) as defined in Federation Roles.Integrate Trust Marks: Include the Trust Marks from the Subordinate Statement in the Entity Configuration using the
trust_marks
claim as specified in Entity Configuration Leaves and Intermediates.Example authority_hints addition:
{ "iat": 1718207217, "exp": 1749743216, "iss": "https://credentials.example.gov", "sub": "https://credentials.example.gov", "authority_hints": ["https://trust-anchor.example.gov"], //... }Example Trust Marks integration:
"trust_marks": [ { "trust_mark_type": "https://trust-anchor.example.gov/trust_marks/federation-entity/credential-issuer", "trust_mark": "eyJhbGciOiJFUzI1NiIsInR5cCI6IkpXVCJ9.eyJpc3MiOiJodHRwczovL3RydXN0LWFuY2hvci5leGFtcGxlLmdvdiIsInN1YiI6Imh0dHBzOi8vY3JlZGVudGlhbC1pc3N1ZXIuZXhhbXBsZS5nb3YiLCJ0cnVzdF9tYXJrX3R5cGUiOiJodHRwczovL3RydXN0LWFuY2hvci5leGFtcGxlLmdvdi90cnVzdF9tYXJrcy9mZWRlcmF0aW9uLWVudGl0eS9jcmVkZW50aWFsLWlzc3VlciIsImlhdCI6MTcwMDAwMDAwMCwiZXhwIjoxNzMwMDAwMDAwfQ.abc123signature" } ]
Note
To update Trust Marks after onboarding, the entity can use the fetch endpoint of its immediate superior to obtain all the updated Trust Marks about itself. When the Trust Mark issuer is different from the superior entity that has onboarded the entity, Federation Entities can obtain fresh Trust Marks anytime needed by using the Federation Trust Mark endpoint as defined in Federation API endpoints.
Upon successful completion of Step 4, the entity onboarding is successfully completed. The entity is now operational within the IT-Wallet federation and ready for operational activities.
Note
Federation Registry Integration: Upon successful onboarding completion, the entity's Federation Entity Identifier becomes discoverable through the Trust Anchor's entity listing mechanisms (as defined in The Infrastructure of Trust), indicating active federation participation. The entity becomes part of the federation infrastructure detailed in Registry Infrastructure.
8.4.4. IT-Wallet Federation Trust Marks¶
Federation Entities receive IT-Wallet Federation Trust Marks during successful onboarding completion. Trust Marks are issued by the Federation Authority (Trust Anchor for direct onboarding, Intermediate for mediated onboarding) and serve as verifiable attestations about compliance with IT-Wallet technical profiles and or authorization policies.
8.4.4.1. Trust Mark Types and Schema¶
Entities MAY receive multiple Trust Marks for different purposes. Trust Mark identifiers MUST follow a hierarchical schema that reflects the authorization scope:
https://<federation_authority_domain>/trust_marks/<purpose>/<entity_type>
Where:
<federation_authority_domain>
: The domain of the issuing Federation Authority.
<purpose>
: The Trust Mark purpose. Thefederation-entity
purpose is REQUIRED for all entities. Additional Trust Mark purposes MAY be supported, such asauthorization_policy
for granular operational scope definitions.
<entity_type>
: The recipient entity type (e.g.,credential-issuer
,relying-party
,wallet-provider
).
8.4.4.2. Trust Mark Structure¶
Trust Marks in Entity Configuration MUST be represented as JSON objects containing the following claims:
Claim |
Description |
---|---|
trust_mark_type |
REQUIRED. Identifier for the type of Trust Mark following the schema: |
trust_mark |
REQUIRED. A signed JSON Web Token representing the Trust Mark issued by the Federation Authority. |
The Trust Mark JWT (contained in the trust_mark
claim above) includes the following claims:
Claim |
Description |
---|---|
iss |
REQUIRED. Federation Authority issuing the Trust Mark (immediate superior: Trust Anchor or Intermediate). |
sub |
REQUIRED. Federation Entity Identifier of the subject. |
trust_mark_type |
REQUIRED. Unique Trust Mark identifier, MUST match the |
iat |
REQUIRED. Trust Mark issuance timestamp. |
exp |
REQUIRED. Trust Mark expiration timestamp. |
organization_type |
REQUIRED. Entity organization type ( |
vat_number |
RECOMMENDED. VAT number of the entity (typically for private organizations). |
legal_identifier |
RECOMMENDED. Legal registration number or identifier of the entity (e.g., business registration number, tax code). |
ipa_code |
RECOMMENDED. IPA (Indice delle Pubbliche Amministrazioni) code for public sector entities. |
organization_name |
RECOMMENDED. Full name of the Organizational Entity. |
RECOMMENDED. Institutional or PEC email of the organization. |
|
logo_uri |
OPTIONAL. URL pointing to the Trust Mark logo for UI/UX purposes. |
ref |
OPTIONAL. URL with additional web information about the Trust Mark. |
The following non-normative examples illustrate different Trust Mark JWT contents for federation membership and different authorization policies:
{
"iss": "https://trust-anchor.eid-wallet.example.it",
"sub": "https://ci.public-authority.gov.example",
"trust_mark_type": "https://trust-anchor.eid-wallet.example.it/trust_marks/federation-entity/credential-issuer",
"iat": 1718207217,
"exp": 1749743216,
"organization_type": "public",
"ipa_code": "pub_001",
"legal_identifier": "12345678901",
"organization_name": "Public Authority Services",
"email": "registry@public-authority.gov.example"
}
{
"iss": "https://trust-anchor.eid-wallet.example.it",
"sub": "https://rental.cars.example.com",
"trust_mark_type": "https://trust-anchor.eid-wallet.example.it/trust_marks/authorization_policy/relying-party",
"iat": 1718207217,
"exp": 1749743216,
"organization_type": "private",
"vat_number": "IT12345678901",
"legal_identifier": "12345678901",
"organization_name": "Premium Car Rental Services Ltd",
"email": "compliance@rental.cars.example.com",
"authorized_claims": ["given_name", "family_name", "driving_privileges"],
"authorized_credential_types": ["mobile-driving-license"],
"scope_restrictions": {
"domains": ["AUTHORIZATION"],
"purposes": ["DRIVING_LICENSE"]
}
}
{
"iss": "https://trust-anchor.eid-wallet.example.it",
"sub": "https://private-badge.ci.example.com",
"trust_mark_type": "https://trust-anchor.eid-wallet.example.it/trust_marks/authorization_policy/credential-issuer",
"iat": 1718207217,
"exp": 1749743216,
"organization_type": "private",
"vat_number": "IT98765432101",
"legal_identifier": "98765432101",
"organization_name": "Badge Services Ltd",
"email": "compliance@rprivate-badge.ci.example.com",
"authorized_claims": ["given_name", "family_name", "company_id"],
"authorized_credential_types": ["example-company-badge"],
"scope_restrictions": {
"domains": ["MEMBERSHIP"],
"purposes": ["ASSOCIATION"]
}
}
Federation Entities MUST integrate Trust Marks in their Entity Configuration using the trust_marks
claim as specified in Entity Configuration Leaves and Intermediates. Entities MAY receive multiple Trust Marks for different authorization scopes.
{
"iss": "https://credentials.example.gov",
"sub": "https://credentials.example.gov",
"jwks": {
// jwks content
},
"authority_hints": ["https://trust-anchor.eid-wallet.example.it"],
"trust_marks": [
{
"trust_mark_type": "https://trust-anchor.eid-wallet.example.it/trust_marks/federation-entity/credential-issuer",
"trust_mark": "eyJhbGciOiJFUzI1NiIsImtpZCI6IlRydXN0QW5jaG9yS2V5SWQiLCJ0eXAiOiJKV1QifQ..."
}
],
"metadata": {
// Metadata content
}
}
{
"iss": "https://healthcare-ci.example.gov",
"sub": "https://healthcare-ci.example.gov",
"jwks": {
// jwks content
},
"authority_hints": ["https://healthcare.intermediate.eid-wallet.example.it"],
"trust_marks": [
{
"trust_mark_type": "https://healthcare.intermediate.eid-wallet.example.it/trust_marks/federation-entity/credential-issuer",
"trust_mark": "eyJhbGciOiJFUzI1NiIsImtpZCI6IkhlYWx0aGNhcmVJbnRlcm1lZGlhdGVLZXlJZCIsInR5cCI6IkpXVCJ9..."
}
],
"metadata": {
// Metadata content
}
}
8.4.4.3. Trust Mark Validation¶
Federation participants validate Trust Mark status through two mechanisms:
Static Validation: Cryptographic verification using the issuing Federation Authority's public key from the Trust Chain.
Dynamic Validation: Real-time status verification, against any revocations, using the Federation Authority's
/trust_mark_status
endpoint as defined in Federation API endpoints.
For comprehensive X.509 Certificate management procedures, including chain validation, revocation verification, and lifecycle management, see X.509 Certificate Management Operations.