-
Firebase crashlytics is installed in the application. This is not required for the application to work. It should be completely removed.
Jak2k updated
2 months ago
-
Dear team,
State is currently generated inside `AuthorizeIssuanceImpl` and can not be extracted or stored after calling `AuthorizeIssuance.prepareAuthorizationRequest()` without parsing resulting `…
-
GitHub discussions provide more features than plain comments below an issue and it could be a great place to answer questions or/and having (long) discussions over complicated topics. See some comment…
-
Hi.
Specification says we should add (conditionally) `Location` to `AuthorizationDetails` which is missing now.
https://github.com/eu-digital-identity-wallet/eudi-lib-jvm-openid4vci-kt/blob/main/s…
-
As of now, the reference implementation of the wallet only supports retrieving the two specific credentials, National ID and Driving Licence, from one hardcoded issuer service.
Is there a plan to add…
-
There are published repositories for issuing to the wallet using QR codes (see [Issuer Repository](https://github.com/eu-digital-identity-wallet/eudi-srv-pid-issuer) and [Online Implementation](https:…
Detzy updated
2 months ago
-
The discovery phase is described as "Steps 1-4 (Discovery): The User selects the PID/(Q)EAA Provider using the Wallet Instance, the Metadata for the selected PID/(Q)EAA Provider are processed by the W…
-
Hi!
We have been trying to use the CBOR formatter API to create and sign Mdocs, as described here: https://github.com/eu-digital-identity-wallet/eudi-srv-web-issuing-eudiw-py/blob/main/api_docs/cbor_…
-
Regarding the keyring in the TEE: although it is an excellent idea, be aware that (as far as I know) we are out of specification with respect to EUDI-ARF, because it says that the sk(s) must be genera…
-
Please explain how credential issuer accepts the key provided in proof parameter - should any public key be accepted? Lets assume that the authorization server and credential issuer are separate entit…