-
In the issuance request we use the WIA and we implicitly assume that the public part of the key contained in the WIA (cnf.jwk) must be used to verify the signature of the issuance request
reading t…
-
### Introduction/background material
Digital wallets promise to revolutionise the digital interactions of businesses, governments and people.
Unless they are implemented carefully, they can open…
-
https://italia.github.io/eudi-wallet-it-docs/rpseq/en/relying-party-solution.html#cross-device-flow-status-checks-and-security
- [ ] mange status endpoint in db
-
This is valid if there is only one ~verifier~ Wallet Provider. If there is more than one Wallet Provider then RP will have to make the user choose their Wallet Provider to provide the correct redirect…
-
https://github.com/italia/eudi-wallet-it-docs/pull/87#issue-1830163472
-
from Roland
In https://italia.github.io/eudi-wallet-it-docs/versione-corrente/en/pid-eaa-issuance.html
HIgh-level PID flow.
The document says: "the Wallet Instance queries the Trust Anchor to f…
-
@rohe 's
There is no description of what the Wallet Instance Attestation request and response should look like. Of the JWTs yes, but not for the messages.
-
We have the mongo storage but we don't use it
we need an abstract interface and the possibility to enable multiple storage engine
the branch where we complete with task is https://github.com/ita…
-
there are several mentions about SPID (title of the page for instance) that are out of scope for this project
these must be fixed
-
https://github.com/italia/eidas-it-wallet-docs/blob/0a918c452512f9b77887b2748b75cffb98579558/docs/en/revocation-lists.rst?plain=1#L1