You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: main/oid4vc/index.html
+12-7Lines changed: 12 additions & 7 deletions
Original file line number
Diff line number
Diff line change
@@ -1446,7 +1446,12 @@
1446
1446
1447
1447
1448
1448
<h1id="openid4vci-plugin-for-aca-py">OpenID4VCI Plugin for ACA-Py<aclass="headerlink" href="#openid4vci-plugin-for-aca-py" title="Permanent link">¶</a></h1>
1449
-
<p>This plugin implements <ahref="https://openid.net/specs/openid-4-verifiable-credential-issuance-1_0-11.html">OpenID4VCI (Draft 11)</a>. The OpenID4VCI specification is in active development, as is this plugin. Consider this plugin experimental; endpoints and records may change to reflect upstream changes in the specification.</p>
<p>This repository showcases a simplified demonstration of the OID4VCI (OpenID for Verifiable Credential Issuers) integration with the <ahref="https://github.com/Sphereon-Opensource/ssi-mobile-wallet">Sphereon Wallet app</a>. Follow the steps below to run the demo successfully.</p>
@@ -1515,7 +1520,7 @@ <h3 id="integrating-the-status-list-plugin">Integrating the Status List Plugin<a
<p>ACA-Py provides a pluggable mechanism for registering routes for consumption by the controller, the Admin API. This Admin Server makes it trivial to extend the controller from plugins. ACA-Py does not, however, provide a similar mechanism for publicly accessible HTTP Endpoints. Generally speaking, the only public endpoint ACA-Py provides is the DIDComm Messaging endpoint. The OpenID4VCI protocol requires endpoints that are publicly accessible to present and exchange tokens for credentials. This Plugin accomplishes this by starting a separate <ahref="https://docs.aiohttp.org/en/stable/index.html">aiohttp server</a> (similar to how the Admin server is separate from the DIDComm messaging server) and publishes the OpenID4VCI endpoints through this separate server.</p>
1555
-
<p>Details of the endpoints can be found at <code>/api/docs</code> or in the <ahref="https://openid.net/specs/openid-4-verifiable-credential-issuance-1_0-11.html">OpenId4VCI Specification</a>.</p>
1560
+
<p>Details of the endpoints can be found at <code>/api/docs</code> or in the <ahref="https://openid.net/specs/openid-4-verifiable-credential-issuance-1_0.html">OpenId4VCI Specification</a>.</p>
<p>The plugin exposes Admin API routes for consumption by the Controller to facilitate Credential Issuance over OpenID4VCI. The Admin API Routes can be found under <code>/api/docs</code> of the Admin Server in the <code>oid4vci</code> section.</p>
<p>For the <code>id</code>, <code>format</code>, <code>cryptographic_binding_supported</code>, <code>cryptographic_suites_supported</code>, and <code>display</code> attributes, see the <ahref="https://openid.net/specs/openid-4-verifiable-credential-issuance-1_0-11.html">OpenID4VCI Specification, Section 10.2.3</a>.</p>
1718
+
<p>For the <code>id</code>, <code>format</code>, <code>cryptographic_binding_supported</code>, <code>cryptographic_suites_supported</code>, and <code>display</code> attributes, see the <ahref="https://openid.net/specs/openid-4-verifiable-credential-issuance-1_0.html">OpenID4VCI Specification, Section 10.2.3</a>.</p>
1714
1719
<ul>
1715
1720
<li><code>type</code> is a required attribute for JWT-VC (recorded as <code>types</code> in the <code>SupportedCredential.format_data</code> dictionary), and <code>credentialSubject</code> represents display characteristics of the credential only and is not an exhaustive list of the credential attributes. These values are reported in the credential issuer metadata.</li>
1716
1721
<li>The <code>@context</code> of credential to be issued, as well as the <code>type</code> are stored in the <code>SupportedCredential.vc_additional_data</code> dictionary. These values are NOT reported in the credential issuer metadata.</li>
0 commit comments