7. Registry Infrastructure¶
The IT-Wallet ecosystem operates through a registry infrastructure that provides standardized data definitions, entity registration, and credential discovery capabilities. The registry system consists of multiple interconnected components that support the complete lifecycle of digital credential operations from entity onboarding to credential presentation.
The registry architecture addresses semantic standardization, federation trust management, and credential discovery requirements through specialized registry components that ensure interoperability and compliance across the ecosystem.
7.1. Registry Architecture Overview¶
The IT-Wallet registry system comprises five main components:
Claims Registry: Standardized semantic definitions for individual credential attributes, data types, and validation rules.
Authentic Source (AS) Registry: Catalog of registered data providers with their declared capabilities and available claims.
Federation Registry: Authoritative list of trusted entities participating in the federation with their technical configurations.
Digital Credentials Catalog: Public discovery mechanism for available credential types with their metadata and issuance information.
Taxonomy: Hierarchical classification system organizing credentials by domain and purpose.
These registry components are interconnected and maintained by the Supervisory Body to ensure consistency, security, and regulatory compliance across the ecosystem.
7.2. Registry Discovery Endpoint¶
The Trust Anchor MUST provide a discovery mechanism for all registry components through standardized well-known endpoints providing metadata and REST API discovery information to handle complex operations like pagination and filtering.
The Trust Anchor MUST publish registry discovery metadata at the .well-known/it-wallet-registry
endpoint with content negotiation support:
Default Content-Type:
application/jwt
(signed JWT ensuring authenticity and integrity)Alternative Content-Type:
application/json
(plain JSON for development/debugging purposes)
Moreover, the IT-Wallet registry system MUST use two distinct access patterns:
Data Registry APIs: MUST support pagination and filtering capabilities.
Federation Trust Infrastructure: as defined in The Infrastructure of Trust.
Below a non-normative example is given.
GET /.well-known/it-wallet-registry HTTP/1.1
Host: trust-anchor.eid-wallet.example.it
Accept: application/jwt
HTTP/1.1 200 OK
Content-Type: application/jwt
eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCJ9...
GET /.well-known/it-wallet-registry HTTP/1.1
Host: trust-anchor.eid-wallet.example.it
Accept: application/json
HTTP/1.1 200 OK
Content-Type: application/json
JWT payload structure (when decoded):
{
"registry_version": "1.0",
"last_updated": "2024-03-15T10:30:00Z",
"endpoints": {
"claims_registry": "https://trust-anchor.eid-wallet.example.it/api/v1/claims",
"authentic_sources": "https://trust-anchor.eid-wallet.example.it/api/v1/authentic-sources",
"credential_catalog": "https://trust-anchor.eid-wallet.example.it/api/v1/credential-catalog",
"taxonomy": "https://trust-anchor.eid-wallet.example.it/api/v1/taxonomy",
"federation_list": "https://trust-anchor.eid-wallet.example.it/list",
"federation_fetch": "https://trust-anchor.eid-wallet.example.it/fetch",
"federation_resolve": "https://trust-anchor.eid-wallet.example.it/resolve",
"federation_trust_mark_status": "https://trust-anchor.eid-wallet.example.it/trust_mark_status",
"federation_historical_keys": "https://trust-anchor.eid-wallet.example.it/historical-jwks"
},
"content_negotiation": ["application/json", "application/jwt"]
}
7.3. Claims Registry¶
The Claims Registry provides standardized semantic definitions for individual Credential attributes, data types, and validation rules. This registry serves as the semantic foundation for credential attribute standardization across the IT-Wallet ecosystem, working in coordination with the Taxonomy component for hierarchical classification.
The Supervisory Body MUST maintain the Claims Registry to ensure semantic consistency and regulatory compliance across the ecosystem. The registry MUST contain:
Standardised Claims: Semantic definitions for all credential attributes with data types and validation rules.
Interoperability Mappings: Alias definitions for claims that use different terminology across standards (e.g., ISO18013-5
place_of_birth
mapped to canonicalbirth_place
).Data Formats: Standardised data types (string, date, numeric, boolean, email, url, image, array, object) with validation patterns.
The Claims Registry MUST ensure:
Semantic Consistency: Prevents conflicts between duplicate or overlapping claims across the ecosystem.
Cross-border Interoperability: Ensures EU compliance and consistent claim interpretation.
Schema Validation: Provides authoritative definitions for claim validation across all credential scenarios.
Regulatory Alignment: Coordinates with national and EU regulatory framework.
Credential-Agnostic Scenarios: Supports scenarios where user convenience and business operational efficiency are prioritized over regulatory compliance and audit trails.
Note
The Claims Registry defines semantic properties of individual attributes, but MUST NOT specify selective disclosure capabilities. Selective disclosure depends on credential format implementations (SD-JWT, mDocs), issuer technical configurations, and presentation context. These capabilities are specified at the credential type level within the Digital Credentials Catalog and implemented during credential presentation flows.
7.3.1. Claims Registry Usage¶
The Claims Registry MUST support the complete ecosystem lifecycle:
During Onboarding Process:
AS Registration: Authentic Sources declare available claims from standardized registry during capability registration.
CI Registration: Credential Issuers select AS entities based on required claims and register credential types for catalog publication.
RP Registration: Relying Parties specify authorization requirements using domains/purposes for specific credential types and/or User's attributes.
During Operational Activities:
Credential Issuance: Claims definitions ensure consistent data representation across different credential types.
Presentation Requests: RPs reference claims for schema validation and authorization verification in both credential-specific and credential-agnostic scenarios.
Policy Enforcement: Authorization policies leverage domain/purpose classifications for access control.
7.3.2. Claims Registry Structure¶
The Claims Registry maintains language-neutral, technical definitions for semantic consistency across the ecosystem. User-facing localizations for claim names and descriptions are provided through the Digital Credentials Catalog localization bundles, enabling efficient multilingual support without compromising the registry's structural integrity.
A non-normative example of Claims Registry structure is given below:
{
"registry_version": "1.0",
"claims": {
"given_name": {
"type": "string",
"description": "Person's given name(s) as appears on official documents",
"aliases": ["first_name", "forename", "given_names"],
"max_length": 100,
"validation": {
"pattern": "^[\\p{L}\\s\\-\\'\\.']+$",
"min_length": 1
}
},
"family_name": {
"type": "string",
"description": "Person's family name as appears on official documents",
"aliases": ["last_name", "surname", "family_names"],
"max_length": 100,
"validation": {
"pattern": "^[\\p{L}\\s\\-\\'\\.']+$",
"min_length": 1
}
},
"birth_date": {
"type": "date",
"description": "Date of birth in ISO 8601 format",
"format": "YYYY-MM-DD",
"validation": {
"min_date": "1900-01-01",
"max_date": "current_date"
}
},
"birth_place": {
"type": "string",
"description": "Place of birth as registered in official records",
"aliases": ["place_of_birth"],
"max_length": 100
},
"tax_code": {
"type": "string",
"description": "Italian fiscal identification code (Codice Fiscale)",
"validation": {
"pattern": "^[A-Z]{6}[0-9]{2}[A-Z][0-9]{2}[A-Z][0-9]{3}[A-Z]$",
"length": 16
}
},
"personal_administrative_number": {
"type": "string",
"description": "ANPR unique person identifier",
"validation": {
"pattern": "^[A-Z0-9]+$"
}
},
"document_number": {
"type": "string",
"description": "Document serial number or identifier",
"validation": {
"pattern": "^[A-Z0-9]+$",
"max_length": 20
}
},
"issue_date": {
"type": "date",
"description": "Document issue date",
"format": "YYYY-MM-DD",
"validation": {
"max_date": "current_date"
}
},
"expiry_date": {
"type": "date",
"description": "Document expiry date",
"format": "YYYY-MM-DD",
"validation": {
"min_date": "current_date"
}
},
"driving_privileges": {
"type": "array",
"description": "Array of authorized vehicle categories with details",
"items": {
"type": "object",
"properties": {
"vehicle_category_code": {
"type": "string",
"enum": ["AM", "A1", "A2", "A", "B", "BE", "C", "CE", "D", "DE"]
},
"issue_date": {"type": "date", "format": "YYYY-MM-DD"},
"expiry_date": {"type": "date", "format": "YYYY-MM-DD"},
"restrictions": {"type": "string", "description": "Category-specific restrictions"}
}
}
},
"portrait": {
"type": "string",
"format": "binary",
"description": "Person's photograph as binary string (JPEG or JPEG2000)",
"encoding": "base64",
"content_type": ["image/jpeg", "image/jp2"],
"validation": {
"max_size_bytes": 50000,
"min_width": 100,
"min_height": 100
}
},
"issuing_authority": {
"type": "string",
"description": "Authority that issued the document",
"max_length": 100
},
"issuing_country": {
"type": "string",
"description": "Country code that issued the document",
"validation": {
"pattern": "^[A-Z]{2}$",
"length": 2
}
}
}
}
7.4. Authentic Source Registry¶
The Supervisory Body MUST maintain the Authentic Source Registry to enable coordinated data access and credential issuance across the ecosystem. The AS Registry MUST contain at least:
Organization Information: Legal entity details, regulatory status, and authoritative role within specific domains.
Data Capabilities: Declared claims availability referencing standardized definitions from the Claims Registry with corresponding Taxonomy classifications.
Integration Methods: Technical access mechanisms (PDND for public AS, custom APIs for private AS).
Intended Purposes: Supported credential types and business contexts for AS-CI coordination.
Data Quality Assurance: Authoritative status, update frequency, and audit trail capabilities.
The AS Registry MUST ensure:
Coordinated Data Access: Enables CI discovery of appropriate data from Authentic Sources for credential issuance.
AS-CI Integration: Facilitates approval workflows and data access coordination between entities.
Quality Assurance: Maintains authoritative status and data reliability across different domains.
Regulatory Compliance: Supports public administration transparency and private sector coordination requirements.
7.4.1. AS Registry Usage¶
The AS Registry supports ecosystem coordination throughout the operational lifecycle:
- During Onboarding Process:
AS Self-Declaration: Authentic Sources register capabilities before any credential types exist in the catalog.
CI Discovery: Credential Issuers search for AS entities based on required claims and intended credential types.
Approval Coordination: AS entities evaluate and approve CI access requests for data provision.
- During Operational Activities:
Data Source Resolution: CI systems reference AS Registry for real-time data access during credential issuance.
Quality Validation: AS Registry information supports data origin verification and audit requirements.
Integration Management: Technical endpoints and access methods enable standardized AS-CI communication.
7.4.2. Public vs Private AS Coordination¶
The AS Registry architecture supports different coordination patterns reflecting distinct operational requirements:
Public Administration AS (Standardized Integration): Government entities provide authoritative data through regulated mechanisms:
PDND Integration:
"integration_method": "pdnd_eservice"
for standardized government data access.Regulatory Compliance: Full transparency requirements with public catalog publication.
Audit Requirements: Complete traceability for government credential issuance processes.
Private Sector AS (Flexible Integration): Private entities provide specialized data through custom arrangements:
Custom APIs:
"integration_method": "custom_api"
for business-specific data access patterns.Selective Disclosure: Limited public visibility with CI-specific approval workflows.
Business Flexibility: Tailored integration supporting diverse private sector use cases.
This approach enables both regulatory transparency for public administration and business flexibility for private sector entities while maintaining coordinated data access across the ecosystem.
7.4.3. AS Registry Structure¶
During registration, Authentic Sources declare their capabilities before credential types exist in the catalog. This declaration establishes the foundation for subsequent CI registration and credential type creation.
7.4.3.1. AS Unique Identifier Schema¶
Each Authentic Source MUST be assigned a unique identifier that follows the HTTPS URL schema defined below. This identifier is used for referencing AS entities across the registry system and in the Digital Credentials Catalog, ensuring consistency with OpenID Federation entity identification patterns.
AS Identifier Schema:
https://{organization_domain}[/{optional_path}]
Schema Components:
organization_domain: DNS domain controlled by the organization
optional_path: Additional path component for specific services or departments
The AS identifier MUST follow these normative rules:
HTTPS Protocol: MUST use HTTPS scheme for security and trust verification
Domain Ownership: Organization MUST control the DNS domain used in the identifier
Uniqueness: Guaranteed through DNS namespace uniqueness
Stability: SHOULD remain stable over time to avoid reference breakage
Resolvability: The URL SHOULD be resolvable (though not required to serve content)
Examples of compliant AS identifiers:
https://motorizzazione.gov.example
: Public - Ministry of Transport, Motorization Dept
https://registry.anpr.example
: Public - National Registry of Resident Population
https://api.bank.example/auth-source
: Private - Example Bank Financial Services
7.4.3.2. AS Registry Parameters¶
The AS Registry MUST contain the following parameters for each registered Authentic Source:
Parameter |
Type |
Description |
---|---|---|
entity_id |
string |
REQUIRED. Unique identifier following the normative schema: |
organization_info |
JSON object |
REQUIRED. Legal entity details and organizational metadata. |
organization_info.organization_name |
string |
REQUIRED. Legal name of the organization. |
organization_info.organization_type |
string |
REQUIRED. Entity classification: |
organization_info.ipa_code |
string |
REQUIRED only for Public AS. IPA registration code for government entities. |
organization_info.legal_identifier |
string |
REQUIRED. Legal registration identifier (Fiscal Code/VAT Number, or equivalent national identifier for foreign entities). |
organization_info.homepage_uri |
string |
REQUIRED. URL pointing to the organization's homepage. |
organization_info.contacts |
String Array |
REQUIRED. Array of technical/administrative contact email addresses. |
organization_info.policy_uri |
string |
REQUIRED. URL to privacy policy document. |
organization_info.tos_uri |
string |
REQUIRED only for Private AS. URL to terms of service document. |
organization_info.organization_country |
string |
REQUIRED. Two-letter ISO 3166-1 alpha-2 country code of the organization. |
organization_info.logo_uri |
string |
OPTIONAL. URL to the organization's logo image. |
organization_info.service_documentation |
string |
OPTIONAL. URL pointing to the Authentic Source service documentation. |
organization_info.user_information |
string |
OPTIONAL. A string containing human-readable information about the Digital Credential relevant to the User. This string MUST be provided by the Authentic Source to the Trust Anchor during onboarding and MUST be formatted using Markdown format as defined in RFC 7763. The Markdown formatting can be plain text or a combination of text and links. For example, if the Authentic Source's database only contains the data required for Digital Credential attributes registered after a specific date, this information MUST be conveyed to the Trust Anchor in this Markdown string. |
data_capabilities |
JSON Objects Array |
REQUIRED. Array containing data capability specifications. |
data_capabilities[].domains |
String Array |
REQUIRED. Taxonomy domain (e.g., |
data_capabilities[].intended_purposes |
String Array |
REQUIRED. Business purposes served (e.g., |
data_capabilities[].available_claims |
String Array |
REQUIRED. Claims available from this data capability. |
data_capabilities[].integration_method |
string |
REQUIRED. Authorization framework used for data access. MUST be |
data_capabilities[].integration_endpoint |
string |
REQUIRED. Service access point (PDND endpoint for Public AS, API endpoint for Private AS). |
data_capabilities[].api_specification |
string |
REQUIRED. URL to OpenAPI 3.0 specification document for this data capability. |
data_capabilities[].data_provision |
JSON object |
OPTIONAL. Data provision capabilities and timing specifications. |
data_capabilities[].data_provision.immediate_flow |
boolean |
REQUIRED. Indicates if the Authentic Source supports immediate data provision. |
data_capabilities[].data_provision.deferred_flow |
boolean |
REQUIRED. Indicates if the Authentic Source supports deferred data provision. |
data_capabilities[].data_provision.max_response_time_minutes |
integer |
CONDITIONAL. Maximum time in minutes for the Authentic Source to respond to a deferred data provision request. REQUIRED if |
data_capabilities[].data_provision.notification_methods |
String Array |
CONDITIONAL. Array of notification methods supported by the Authentic Source for deferred data provision, such as |
data_capabilities[].update_frequency |
string |
OPTIONAL. Indicates how frequently the Authentic Source updates its data. Possible values: |
display |
JSON object |
OPTIONAL. Visual branding suggestions that Authentic Sources can provide for credentials using their data. |
display.background_color |
string |
OPTIONAL. Suggested background color for credentials in hexadecimal format (e.g., |
display.text_color |
string |
OPTIONAL. Suggested text color for credentials in hexadecimal format (e.g., |
display.logo_uri |
string |
OPTIONAL. URI to the Authentic Source's logo for credential branding. |
display.logo_uri#integrity |
string |
CONDITIONAL. Cryptographic digest of the logo for integrity verification. REQUIRED if |
display.template_uri |
string |
OPTIONAL. URI to a visual template that the Authentic Source suggests for credentials using their data. |
display.template_uri#integrity |
string |
CONDITIONAL. Cryptographic digest of the template for integrity verification. REQUIRED if |
7.4.3.3. AS Registry Example¶
A non-normative example of AS Registry structure is given below:
[
{
"entity_id": "https://motorizzazione.gov.example",
"organization_info": {
"organization_name": "MIT -- Direzione Generale per la Motorizzazione",
"organization_type": "public",
"ipa_code": "m_inf",
"legal_identifier": "80192770587",
"organization_country": "IT",
"homepage_uri": "https://www.gov.example/transport",
"contacts": ["registry@gov.example", "technical-support@gov.example"],
"policy_uri": "https://www.gov.example/transport/privacy-policy",
"logo_uri": "https://www.gov.example/assets/transport-logo.svg",
"service_documentation": "https://docs.gov.example/transport/api-docs",
"user_information": "Vehicle registration data is available for licenses issued after January 1, 2020. For older licenses, contact the local motorization office."
},
"data_capabilities": [
{
"domains": ["IDENTITY", "AUTHORIZATION"],
"intended_purposes": ["DRIVING_LICENSE", "PERSON_IDENTIFICATION"],
"available_claims": [
"given_name", "family_name", "birth_date", "birth_place",
"issue_date", "expiry_date", "document_number", "driving_privileges",
"portrait", "un_distinguishing_sign", "document_iss_country", "document_iss_authority"
],
"integration_method": "pdnd",
"integration_endpoint": "https://api.gov.example/transport/driving-license",
"api_specification": "https://docs.gov.example/transport/api-oas3.yaml",
"data_provision": {
"immediate_flow": true,
"deferred_flow": false
},
"update_frequency": "real_time"
}
],
"display": {
"background_color": "#003d82",
"text_color": "#ffffff",
"logo_uri": "https://www.gov.example/assets/transport-logo.svg",
"logo_uri#integrity": "sha-256-a665a45920422f9d417e4867efdc4fb8a04a1f3fff1fa07e998e86f7f7a27ae3"
}
},
{
"entity_id": "https://api.bank.example/auth-source",
"organization_info": {
"organization_name": "Example Bank S.p.A.",
"organization_type": "private",
"legal_identifier": "12345678901",
"homepage_uri": "https://www.bank.example",
"contacts": ["digital-credentials@bank.example", "api-support@bank.example"],
"policy_uri": "https://www.bank.example/privacy-policy",
"tos_uri": "https://www.bank.example/terms-of-service",
"organization_country": "IT",
"logo_uri": "https://www.bank.example/assets/logo.svg",
"service_documentation": "https://docs.bank.example/psd2-api",
"user_information": "Financial data access requires customer consent and is subject to PSD2 regulations. Account information is available for active accounts only."
},
"data_capabilities": [
{
"domains": ["FINANCIAL"],
"intended_purposes": ["BANK_ACCOUNT", "INCOME_CERTIFICATE"],
"available_claims": [
"given_name", "family_name", "birth_date", "tax_code",
"account_holder_name", "iban", "account_status", "account_opening_date",
"bank_name", "bank_code"
],
"integration_method": "oauth2",
"integration_endpoint": "https://api.bank.example/psd2/v1/accounts",
"api_specification": "https://api.bank.example/docs/psd2-openapi.yaml",
"data_provision": {
"immediate_flow": true,
"deferred_flow": false
},
"update_frequency": "daily"
},
{
"domains": ["FINANCIAL"],
"intended_purposes": ["PAYMENT_HISTORY"],
"available_claims": [
"given_name", "family_name", "tax_code",
"transaction_history", "average_balance", "credit_score_indicator"
],
"integration_method": "oauth2",
"integration_endpoint": "https://api.bank.example/psd2/v1/transactions",
"api_specification": "https://api.bank.example/docs/psd2-openapi.yaml",
"data_provision": {
"immediate_flow": false,
"deferred_flow": true,
"max_response_time_minutes": 1440,
"notification_methods": ["push", "poll"]
},
"update_frequency": "weekly"
}
]
}
]
7.4.4. AS-CI Coordination¶
Following AS registration, the AS Registry enables Credential Issuers to discover suitable AS entities and request integration approval. This coordination process is detailed in entity-onboarding:AS-CI Integration Process.
7.5. Federation Registry¶
The Federation Registry provides the cryptographic trust infrastructure for all IT-Wallet ecosystem participants. The Federation Registry maintains the authoritative list of trusted entities and their operational status using federation-specific endpoints as defined in Federation API endpoints.
7.5.1. Registry Integration Role¶
Within the IT-Wallet registry architecture, the Federation Registry serves as the trust validation layer for:
Entity Authentication: Validates the cryptographic identity of all participants before registry operations
Trust Chain Verification: Provides the cryptographic foundation for Credential Issuers, Relying Parties, and Wallet Providers entity validation
Compliance Verification: Maintains Trust Marks that attest regulatory compliance and operational status
7.5.2. Federation Registry Access¶
Federation Registry operations are accessed through the Trust Anchor's federation endpoints as detailed in Federation API endpoints. The registry discovery architecture provides federation endpoint information via the registry discovery endpoint described in Registry Discovery Endpoint.
Note
Federation endpoints are available through both the registry discovery mechanism (for unified registry access) and the Trust Anchor's Entity Configuration at .well-known/openid-federation
(for federation-specific operations). Both sources provide the same endpoint URLs but serve different discovery patterns: registry discovery for initial ecosystem orientation, Entity Configuration for standard OpenID Federation 1.0 compliance.
For complete technical specifications of federation protocols, entity configurations, trust evaluation mechanisms, and trust chain validation, see The Infrastructure of Trust.
7.6. Digital Credentials Catalog¶
The Digital Credentials Catalog is the registry of all available Digital Credentials recognized within the IT-Wallet ecosystem. It is published by the Trust Anchor and publicly available by all Entities through a specialized Federation endpoint. It acts as a single reference point for all actors involved in the process of issuing, verifying and using Digital Credentials.
The Digital Credential Catalog aims to:
Facilitate Digital Credential discovery for Users.
Standardize the technical and functional description of Digital Credentials.
Enable interoperability between different Issuers and Relying Parties.
Simplify the integration process for Wallet Providers and Relying Parties.
Ensure trust in the ecosystem through certified information.
Provide transparency on the ecosystem of available Digital Credentials.
The main Entities involved in the Digital Credential Catalog are:
Trust Anchor: It manages and maintains the Digital Credential Catalog, guaranteeing its authenticity and integrity.
Supervisory Body: It interacts with the Trust Anchor and the Digital Credential Catalog to monitor the registration phase ensuring security and privacy according to national/European regulations, keeping all the information reliable and updated.
Digital Credential Issuers: The entities authorized to issue Digital Credentials, registering them in the Catalog.
Relying Parties: They use the Digital Credential Catalog to gather all the information needed about the Digital Credentials they intend to request during the presentation phase.
Wallet Providers: They access the Digital Credential Catalog to identify the available Digital Credentials and to retrieve all necessary information for integrating them into their Wallet Solutions.
Users: The Users who indirectly use the Digital Credentials Catalog through their Wallet Instances to discover and request Digital Credentials.
Authentic Sources: The Entities that hold the original data that is attested in the Digital Credentials. They provide support to Issuers in registering the Digital Credentials in the Catalog.
Fig. 7.1 Entity-Relationship diagram of Digital Credential Catalog.¶
The following table summarizes the main information that MUST be provided by the Digital Credential Catalog:
Information related to |
Description |
---|---|
Digital Credential Metadata |
Essential identifying information and characteristics of the Digital Credential, including:
|
Digital Credential Issuers |
Details about the organization authorized to issue the Digital Credential, such as:
|
Authentic Sources |
Information about the authoritative data source. |
Technical Specification |
Technical details, including:
|
Terms of Use |
Conditions and limitations for Digital Credential usage, such as:
|
Claims and Taxonomy References |
Content and classification information:
|
The Trust Anchor MUST publish and keep up to date all the information at the Digital Credential Catalog .well-known endpoint ensuring data reliability, authenticity and integrity. In particular, the Digital Credential Catalog, claims and taxonomy MUST be available through the .well-known/credential-catalog
endpoint.
7.6.1. Digital Credentials Hierarchy¶
Digital Credentials recognized within the IT-Wallet ecosystem are hierarchically classified and standardized according to the following main domains and purposes. Additional purposes MAY be added as the IT-Wallet ecosystem grows.
Domain |
Purpose |
Description |
---|---|---|
IDENTITY |
|
Credentials that establish or verify the identity of a person, including physical and digital identity documents legally recognized by national laws. |
AUTHORIZATION |
|
Credentials that grant specific permissions, rights or authorizations to perform certain activities or access restricted areas. |
EDUCATION |
|
Credentials related to educational achievements, qualifications, and professional training recognition. |
HEALTH |
|
Credentials related to healthcare access, medical history, insurance coverage, and health-related documents. |
FINANCIAL |
|
Credentials that attest to financial status, income levels, taxation, banking information, or economic situation of individuals or families. |
MEMBERSHIP |
|
Credentials that confirm affiliation with organizations, participation in programs, or membership status. |
ATTESTATION |
|
Credentials that provide official statements, confirmations of status, or certifications issued by authorities. |
Each Credential MUST specify domains and purposes to enable both Credential-Specific Scenarios and Credential-Agnostic Scenarios according to Relying Party's requirements and presentation request patterns:
Credential-Specific Scenarios (Primary for Government/Regulated Sectors): RPs request specific credential types for compliance and audit requirements, including for example:
Government Services:
"vct_values": ["person_identification_data"]
for PID-specific identity verification.Police Controls:
"docType": "org.iso.18013.5.1.mDL"
for driving license verification.Banking KYC: Specific credential types mandated by financial regulations.
Healthcare Services:
"vct_values": ["european_disability_card"]
for EU-compliant disability benefit access.
Credential-Agnostic Scenarios (Typical for Private Business): RPs request specific claims regardless of credential source for operational efficiency, such as:
E-commerce Delivery: Any credential, among those to which he is authorized to access, containing
given_name
,family_name
,address
for shipping.Subscriptions: Any credential, among those to which he is authorized to access, with
given_name
,Service Personalization: Business applications requiring basic personal data without strong source requirements.
This approach allows:
Policy-based authorization by using domain/purpose mappings.
Flexible RP registration supporting both government compliance needs and business operational requirements.
7.6.2. Digital Credentials Catalog Structure¶
Digital Credentials Catalog contents is secured in a JWS that contains the following JOSE header parameters:
JOSE header |
Description |
Reference |
---|---|---|
typ |
REQUIRED. It MUST be set to |
[RFC 7515 Section 4.1.9]. |
alg |
REQUIRED. A digital signature algorithm identifier such as per IANA "JSON Web Signature and Encryption Algorithms" registry. It MUST be one of the supported algorithms in Section Cryptographic Algorithms and MUST NOT be set to |
[RFC 7515 Section 4.1.1]. |
kid |
REQUIRED. Unique identifier of the public key. |
[RFC 7515 Section 4.1.4]. |
x5c |
OPTIONAL. Contains the X.509 public key Certificate or Certificate chain [RFC 5280] corresponding to the key used to digitally sign the JWS. When the header parameter kid value is present, it MUST refer to the same leaf's cryptographic public key used with the X.509 Certificate. |
[RFC 7515 Section 4.1.6.]. |
cty |
REQUIRED. It MUST be set to |
[RFC 7515 Section 4.1.6.]. |
The JWS payload contains the following parameters:
Field Name |
Description |
---|---|
catalog_version |
REQUIRED. Version of the Digital Credential Catalog format. |
iss |
REQUIRED. Issuer identifier of the Digital Credential Catalog. |
last_modified |
REQUIRED. Timestamp of the last modification to the Digital Credential Catalog. |
credentials |
REQUIRED. Array containing Digital Credential definitions. |
wallet_attestation |
REQUIRED. A JSON Object containing definitions for Wallet Attestations, including their supported formats, associated claims, and Levels of Assurance (LoA). This Object is used by other entities, such as Issuers and Relying Parties, to retrieve information about the Wallet Attestation formats supported within the ecosystem. |
Each element of the credentials
array contains at least the following information:
Field Name |
Description |
---|---|
version |
REQUIRED. Version of the Digital Credential definition. |
credential_type |
REQUIRED. Unique identifier of the Digital Credential type. |
legal_type |
REQUIRED. Legal classification of the Credential (e.g., |
localization |
OPTIONAL. Localization settings, including:
|
name |
REQUIRED. Human-readable name of the Digital Credential. A suffix |
description |
REQUIRED. Human-readable Digital Credential description. A suffix |
restriction_policy |
OPTIONAL. Legal restrictions on Wallet Solutions and/or Credential Issuers allowed to request/issue the Digital Credential.
|
pricing_policy |
OPTIONAL. Information about Digital Credential pricing, including:
|
validity_info |
Information about Digital Credential validity, including at least:
|
authentication |
REQUIRED. Digital Credential authentication requirements.
|
purposes |
REQUIRED. Array of usage purposes for which the Digital Credential can be used, defining specific usage contexts and required claims for each purpose, such as:
|
issuers |
REQUIRED. Array of relevant information about authorized Credential Issuers, including administrative and technical data such as Organization name, a reference to the API specification document and supported issuance mechanisms (for example the deferred flow support). |
authentic_sources |
REQUIRED. Array of string identifiers referencing authorized Authentic Sources as registered in the Authentic Source Registry. Each identifier corresponds to an |
formats |
REQUIRED. Array of supported technical formats of Digital Credentials, including:
|
display_properties |
REQUIRED. Visual presentation properties of Digital Credentials, e.g.:
|
claims |
REQUIRED. Array of claims contained in the Digital Credential. It MUST include at least the following claims:
|
The wallet_attestation
Object contains at least the following information:
Field Name |
Description |
---|---|
credential_type |
REQUIRED. Unique identifier of the Wallet Attestation. It MUST be set to |
name |
REQUIRED. Human-readable name of the Wallet Attestation. It MUST be set to |
description |
REQUIRED. Human-readable Digital Credential description. |
aal_values_supported |
REQUIRED. Array of Strings each of which is a Level of Assurance (LoA) supported by the Wallet Attestation. It MUST include at least the levels |
formats |
REQUIRED. Array of supported formats for the Wallet Attestation, including:
|
claims |
REQUIRED. Array of claims contained in the Wallet Attestation. It MUST include at least the following claims:
|
The corresponding example of Digital Credentials Catalog as decoded in JSON for both header and payload is the following:
{
"typ":"JOSE",
"alg":"ES256",
"kid":"e9bc097a-ce51-4036-9562-d2ade882db0d",
"cty":"application/json"
}
{
"catalog_version": "1.0",
"iss": "https://trust-registry.eid-wallet.example.it",
"last_modified": "2025-03-15T12:00:00Z",
"credentials": [
{
"version": "1.0",
"credential_type": "mDL",
"legal_type": "pub-eaa",
"localization": {
"default_locale": "it",
"available_locales": ["en", "it", "fr", "de"],
"base_uri": "https://trust-registry.eid-wallet.example.it/.well-known/l10n/mdl/",
"version": "1.0.0"
},
"name_l10n_id": "credential.mdl.name",
"description_l10n_id": "credential.mdl.description",
"restriction_policy": {
"allowed_wallet_ids": [
"https://wallet-provider.example.org/wallet_solution",
"https://wallet-provider2.example.org/wallet_solution"
],
"allowed_issuer_ids": [
"https://issuer.example.org"
]
},
"pricing_policy": {
"models": [
{
"pricing_type": "verification_based",
"price": 0.01,
"currency": "EUR"
}
],
"pricing_model_uri": "https://example.com/pricing"
},
"validity_info": {
"max_validity_days": 365,
"status_methods": ["status_list"],
"allowed_states": [
"valid",
"revoked",
"suspended"
]
},
"authentication": {
"user_auth_required": true,
"min_loa": "high",
"supported_schemes": ["it-wallet"]
},
"purposes": [
{
"id": "DRIVING_LICENSE"
},
{
"id": "PERSON_IDENTIFICATION"
}
],
"issuers": [
{
"id": "https://issuer.example.org",
"organization_name": "Digital Credential Issuer of Example",
"organization_code": "ci_example_it",
"organization_country": "IT",
"contacts": [
"mailto:informazioni@example.it",
"mailto:protocollo@pec.example.it"
],
"legal_type": "pub-eaa",
"homepage_uri": "https://issuer.example.org",
"logo_uri": "https://issuer.example.org/logo.svg",
"policy_uri": "https://issuer.example.org/privacy",
"tos_uri": "https://issuer.example.org/terms",
"service_documentation": "https://issuer.example.org/.well-known/service-doc",
"issuance_flows": {
"deferred_flow": true,
"max_deferred_issuance_time_minutes": 1440,
"notification_methods": ["push", "polling"]
}
}
],
"authentic_sources": [
"https://motorizzazione.gov.example"
],
"formats": [
{
"configuration_id": "dc_sd_jwt_mDL",
"format": "dc+sd-jwt",
"vct": "https://trust-registry.eid-wallet.example.it/1.0/mDL",
"schema_uri": "https://trust-registry.eid-wallet.example.it/.well-known/schemas/sd-jwt/mDL",
"schema_uri#integrity": "sha256-c8b708728e4c5756e35c03aeac257ca878d1f717d7b61f621be4d36dbd9b9c16"
},
{
"configuration_id": "mso_mdoc_mDL",
"format": "mso_mdoc",
"docType": "org.iso.18013.5.1",
"schema_uri": "https://trust-registry.eid-wallet.example.it/.well-known/schemas/mdoc/mDL",
"schema_uri#integrity": "sha256-c8b708728e4c5756e35c03aeac257ca878d1f717d7b61f621be4d36dbd9b9c16"
}
],
"display_properties": {
"templates": [
{
"authentic_source_id": "https://authentic-sources.example.org",
"template_uri": "https://authsource.example.com/.well-known/templates/mDL.svg",
"template_uri#integrity": "sha256-8cLlJNXN-TsMk-PmKjZ5t0WRL5ca_xGgX3c1VLmXfh-9c",
"properties": {
"orientation": "landscape",
"color_scheme": "light",
"contrast": "high"
}
}
],
"background_color": "#008558",
"text_color": "#FFFFFF",
"logo_uri": "https://trust-registry.eid-wallet.example.it/.well-known/logos/mDL.svg"
},
"claims": [
{
"name": "family_name",
"display_name_l10n_id": "claims.family_name.name",
"namespaces": ["org.iso.18013.5.1"]
},
{
"name": "given_name",
"display_name_l10n_id": "claims.given_name.name",
"namespaces": ["org.iso.18013.5.1"]
},
{
"name": "birth_date",
"display_name_l10n_id": "claims.birth_date.name",
"namespaces": ["org.iso.18013.5.1"]
},
{
"name": "issue_date",
"display_name_l10n_id": "claims.issue_date.name",
"namespaces": ["org.iso.18013.5.1"]
},
{
"name": "expiry_date",
"display_name_l10n_id": "claims.expiry_date.name",
"namespaces": ["org.iso.18013.5.1"]
},
{
"name": "issuing_authority",
"display_name_l10n_id": "claims.issuing_authority.name",
"namespaces": ["org.iso.18013.5.1"]
},
{
"name": "document_number",
"display_name_l10n_id": "claims.document_number.name",
"namespaces": ["org.iso.18013.5.1"]
},
{
"name": "portrait",
"display_name_l10n_id": "claims.portrait.name",
"namespaces": ["org.iso.18013.5.1"]
},
{
"name": "driving_privileges",
"display_name_l10n_id": "claims.driving_privileges.name",
"namespaces": ["org.iso.18013.5.1"]
},
{
"name": "un_distinguishing_sign",
"display_name_l10n_id": "claims.un_distinguishing_sign.name",
"namespaces": ["org.iso.18013.5.1"]
},
{
"name": "administrative_number",
"display_name_l10n_id": "claims.administrative_number.name",
"namespaces": ["org.iso.18013.5.1"]
},
{
"name": "issuing_country",
"display_name_l10n_id": "claims.issuing_country.name",
"namespaces": ["org.iso.18013.5.1"]
},
{
"name": "issuing_jurisdiction",
"display_name_l10n_id": "claims.issuing_jurisdiction.name",
"namespaces": ["org.iso.18013.5.1"]
}
]
}
],
"wallet_attestation": {
"version": "1.0",
"credential_type": "WalletAttestation",
"name": "Wallet Attestation",
"description": "Attestation of the Wallet capabilities and compliance with the EUDI Wallet specifications.",
"aal_values_supported": [
"https://trust-list.eu/aal/low",
"https://trust-list.eu/aal/medium",
"https://trust-list.eu/aal/high"
],
"formats": [
{
"format": "dc+sd-jwt",
"configuration_id": "dc_sd_jwt_wa",
"vct": "https://trust-registry.it-wallet.example.it/WalletAttestation",
"schema_uri": "https://trust-registry.it-wallet.example.it/.well-known/schemas/sd-jwt/WalletAttestation",
"schema_uri#integrity": "sha256-Lxn6dNpkPdoeoRgO5+n0jNhJZ8MbKfXfP195+dNR0dc="
},
{
"format": "mso_mdoc",
"configuration_id": "mso_mdoc_wa",
"docType": "it.wallet.trust-registry.WalletAttestation",
"schema_uri": "https://trust-registry.eid-wallet.example.it/.well-known/schemas/mdoc/WalletAttestation",
"schema_uri#integrity": "sha256-GcqnMfzyCw+0UTz9EI6JO0oUTD0WS3p+hQ2E7VfjTLA="
},
{
"format": "oauth-client-attestation+jwt",
"configuration_id": "jwt_wa",
"schema_uri": "https://trust-registry.it-wallet.example.it/.well-known/schemas/jwt/WalletAttestation",
"schema_uri#integrity": "sha256-2s9AJsZwjuAZ4D4EAl3qDJGvy92sThQkX6W9zDF2Sgg="
}
],
"claims": [
{
"name": "sub",
"namespaces": ["it.wallet.trust-registry.WalletAttestation"]
},
{
"name": "aal",
"namespaces": ["it.wallet.trust-registry.WalletAttestation"]
},
{
"name": "wallet_link",
"namespaces": ["it.wallet.trust-registry.WalletAttestation"]
},
{
"name": "wallet_name",
"namespaces": ["it.wallet.trust-registry.WalletAttestation"]
}
]
}
}
Note
For a better and more efficient management of the localisation of the information contained in the Digital Credentials Catalog, an Entity consulting it SHOULD:
Download the basic version of the Digital Credentials Catalog (compact, without localisations) using the
.well-known/credential-catalog
endpoint.Determine the User's preferred language.
Download only the necessary localisation bundles.
Dynamically merge localised content with the Digital Credentials Catalog structure.
A non-normative example of a localisation bundle output is given below:
{ "driving_license.name": "Patente di Guida", "driving_license.description": "Patente di guida ufficiale valida in Italia e nell'UE", "purpose.driving_authorization.name": "Abilitazione alla guida", "purpose.driving_authorization.description": "Verifica di Abilitazione alla guida", "claims.given_name.name": "Nome", "...": "..." }
Localization bundles MUST be available at the URI specified in the localization_info.bundles_base_uri claim of the Digital Credentials Catalog. Each locale bundle MUST be accessible following the naming pattern {locale_code}.json, where {locale_code} is replaced with the corresponding locale code from the available_locales array.
A non-normative example of the Italian localization URI for the mDL bundle would be https://trust-registry.eid-wallet.example.it/.well-known/l10n/mdl/it.json.
Entities SHOULD verify the integrity of downloaded localization bundles using the digest method and values specified in the localization_info.integrity claim. This ensures that the localization data has not been tampered with during transmission.
7.7. Taxonomy¶
The Taxonomy provides the semantic foundation for Digital Credential interoperability by maintaining the authoritative vocabulary for organizing credentials within the IT-Wallet ecosystem. The taxonomy is credential format neutral and has the aim of facilitating Digital Credentials integrations in the IT-Wallet Technical Solutions.
The taxonomy provides, in a single resource, the hierarchical classification system organizing domains and purposes that can be applied to credential types, supporting authorization policy evaluation and ecosystem-wide standardization.
Taxonomy Objectives:
Semantic Foundation: Establish standardized vocabulary for domains and purposes across the ecosystem
Policy Framework: Enable structured authorization decisions based on hierarchical classification
Interoperability: Ensure consistent interpretation of credential classifications
Extensibility: Support evolution of the ecosystem with new domains and purposes
Cross-Border Compliance: Align with EU regulatory requirements and international standards
Taxonomy Structure:
The taxonomy maintains a two-level hierarchical structure:
Domains: Top-level classification representing broad functional areas (e.g., IDENTITY, AUTHORIZATION, FINANCIAL)
Purposes: Specific credential use cases within each domain (e.g., PERSON_IDENTIFICATION, DRIVING_LICENSE, BANK_ACCOUNT) for which credentials can be used
Localization Support:
The taxonomy supports multilingual environments through the _l10n_id
suffix pattern, enabling efficient localization management for user interfaces and cross-border implementations.
Taxonomy Usage:
Claims Registry: Individual claims catalog
AS Registry: Authentic Sources declare capabilities using taxonomy classifications
Digital Credentials Catalog: Credential types specify domains and supported purposes
Authorization Policies: Policy evaluation leverages taxonomy structure for access control decisions
The taxonomy is accessible through the dedicated taxonomy endpoint as defined in the registry discovery mechanism and is maintained by the Supervisory Body to ensure regulatory compliance and semantic consistency.
A non-normative example of Taxonomy structure is given below:
{
"version": "1.0",
"last_modified": "2025-04-10T12:00:00Z",
"id": "urn:taxonomy:it-wallet",
"localization": {
"default_locale": "it",
"available_locales": ["en", "it", "fr", "de"],
"base_uri": "https://trust-registry.eid-wallet.example.it/.well-known/l10n/taxonomy/",
"version": "1.0.0"
},
"name_l10n_id": "taxonomy.name",
"description_l10n_id": "taxonomy.description",
"domains": [
{
"id": "IDENTITY",
"name_l10n_id": "domain.identity.name",
"description_l10n_id": "domain.identity.description",
"purposes": [
{
"id": "PERSON_IDENTIFICATION",
"name_l10n_id": "purpose.person_identification.name",
"description_l10n_id": "purpose.person_identification.description"
},
{
"id": "ELECTRONIC_RESIDENCY",
"name_l10n_id": "purpose.electronic_residency.name",
"description_l10n_id": "purpose.electronic_residency.description"
}
]
},
{
"id": "AUTHORIZATION",
"name_l10n_id": "domain.authorization.name",
"description_l10n_id": "domain.authorization.description",
"purposes": [
{
"id": "DRIVING_LICENSE",
"name_l10n_id": "purpose.driving_license.name",
"description_l10n_id": "purpose.driving_license.description"
},
{
"id": "PROFESSIONAL_LICENSE",
"name_l10n_id": "purpose.professional_license.name",
"description_l10n_id": "purpose.professional_license.description"
},
{
"id": "TRAVEL_DOCUMENT",
"name_l10n_id": "purpose.travel_document.name",
"description_l10n_id": "purpose.travel_document.description"
},
{
"id": "ACCESS_PERMIT",
"name_l10n_id": "purpose.access_permit.name",
"description_l10n_id": "purpose.access_permit.description"
}
]
},
{
"id": "EDUCATION",
"name_l10n_id": "domain.education.name",
"description_l10n_id": "domain.education.description",
"purposes": [
{
"id": "ACADEMIC_DEGREE",
"name_l10n_id": "purpose.academic_degree.name",
"description_l10n_id": "purpose.academic_degree.description"
},
{
"id": "CERTIFICATE",
"name_l10n_id": "purpose.certificate.name",
"description_l10n_id": "purpose.certificate.description"
},
{
"id": "TRAINING_RECOGNITION",
"name_l10n_id": "purpose.training_recognition.name",
"description_l10n_id": "purpose.training_recognition.description"
}
]
},
{
"id": "HEALTH",
"name_l10n_id": "domain.health.name",
"description_l10n_id": "domain.health.description",
"purposes": [
{
"id": "INSURANCE_CARD",
"name_l10n_id": "purpose.insurance_card.name",
"description_l10n_id": "purpose.insurance_card.description"
},
{
"id": "DISABILITY_CARD",
"name_l10n_id": "purpose.disability_card.name",
"description_l10n_id": "purpose.disability_card.description"
},
{
"id": "MEDICAL_PRESCRIPTION",
"name_l10n_id": "purpose.medical_prescription.name",
"description_l10n_id": "purpose.medical_prescription.description"
}
]
},
{
"id": "FINANCIAL",
"name_l10n_id": "domain.financial.name",
"description_l10n_id": "domain.financial.description",
"purposes": [
{
"id": "INCOME_CERTIFICATE",
"name_l10n_id": "purpose.income_certificate.name",
"description_l10n_id": "purpose.income_certificate.description"
},
{
"id": "TAX_STATEMENT",
"name_l10n_id": "purpose.tax_statement.name",
"description_l10n_id": "purpose.tax_statement.description"
},
{
"id": "FAMILY_ECONOMIC_STATUS",
"name_l10n_id": "purpose.family_economic_status.name",
"description_l10n_id": "purpose.family_economic_status.description"
},
{
"id": "BANK_ACCOUNT",
"name_l10n_id": "purpose.bank_account.name",
"description_l10n_id": "purpose.bank_account.description"
},
{
"id": "PAYMENT_HISTORY",
"name_l10n_id": "purpose.payment_history.name",
"description_l10n_id": "purpose.payment_history.description"
}
]
},
{
"id": "MEMBERSHIP",
"name_l10n_id": "domain.membership.name",
"description_l10n_id": "domain.membership.description",
"purposes": [
{
"id": "ASSOCIATION",
"name_l10n_id": "purpose.association.name",
"description_l10n_id": "purpose.association.description"
},
{
"id": "LOYALTY_PROGRAM",
"name_l10n_id": "purpose.loyalty_program.name",
"description_l10n_id": "purpose.loyalty_program.description"
},
{
"id": "CLUB_MEMBERSHIP",
"name_l10n_id": "purpose.club_membership.name",
"description_l10n_id": "purpose.club_membership.description"
}
]
},
{
"id": "ATTESTATION",
"name_l10n_id": "domain.attestation.name",
"description_l10n_id": "domain.attestation.description",
"purposes": [
{
"id": "PUBLIC_STATEMENT",
"name_l10n_id": "purpose.public_statement.name",
"description_l10n_id": "purpose.public_statement.description"
},
{
"id": "CIVIL_STATUS",
"name_l10n_id": "purpose.civil_status.name",
"description_l10n_id": "purpose.civil_status.description"
},
{
"id": "CERTIFICATION",
"name_l10n_id": "purpose.certification.name",
"description_l10n_id": "purpose.certification.description"
}
]
}
]
}
7.8. Registry Integration and Cross-References¶
The registry components are interconnected and work together to support the complete credential ecosystem:
AS Registry ↔ Taxonomy: AS entities declare capabilities using taxonomy classifications for standardized categorization.
AS Registry ↔ Catalog: Credential types reference AS capabilities for data source validation.
Catalog ↔ Taxonomy: Credential entries specify domains and purposes from the taxonomy for discovery and authorization.
Federation Registry ↔ All Components: Provides cryptographic trust validation for all registry operations and entity authentication.