SSI Issuance Integration
Introduction
Objective
This document explains how to integrate Gataca’s SSI Credential Issuance Service into your infrastructure. The integration allows your system to issue Verifiable Credentials (VCs) in line with W3C DID and Verifiable Credentials standards.
Target Audience
Developers, solution architects, and system administrators responsible for integration.
Key Benefits
Issue interoperable Verifiable Credentials.
Adhere to international SSI standards.
Ensure data security and decentralized control.
Prerequisites
Internet access to consume the exposed APIs over HTTPS.
Ports: 443 (TLS/SSL).
Integration Workflow
The following steps outline the workflow for credential issuance:
The client sends a credential issuance request to the API.
The API validates the request and processes the data.
The backend issuer generates the Verifiable Credential.
The API provides the new credential.
Sequence Diagram
API Endpoints
Detailed API endpoint documentation (including request/response formats, parameters, and error codes) is provided in the Swagger documentation.
Step-by-Step Integration Guide
Initial Configuration
1. Generate API Key
Log in to the Gataca Studio portal and generate an API key, ensuring it is linked to a specific Issuance Template if required. Once the API key is successfully generated, click the Save button to confirm the configuration.
2. Obtain API Key Credentials
After generating the API key, the associated credentials will be displayed. Store this information securely, as it will be required for authenticating requests to the platform. Note that the credentials may not be retrievable again.
Authentication
The majority of Gataca endpoints are protected to avoid unauthorized access and security issues. This protection is based on access tokens issued using basic authentication.
3. Obtain an Access Token
Use the platform’s login endpoint to retrieve an Access Token. This token is required to authenticate and authorize all protected operations within the system. Make sure to securely store the token for subsequent API requests.
Request Example
API-KEY-CREDENTIALS
: base64(api-key id:api-key secret) - You must provide the API Key ID (UUID) and secret given when creating the API Key in Studio, encoded in base64 format in the HTTP request header.
TENANT
: A tenant is a logical instance that isolates data and configurations, identified by a unique tenant ID to ensure separation from other clients.
TEMPLATE-ID
: Identifier of the template used for this verification. These identifiers are configured in Studio.
Response Example
Issuing a Credential
To generate a Verifiable Credential and uniquely associate it with a subject, the subject must first be identified. This requires an issuance process, where the subject’s identity is validated through a DID (Decentralized Identifier). Optionally, additional data such as email, phone number, or ID card can also be validated, allowing the issuing entity to reliably identify the subject.
Once the subject provides this information, the issuer must validate the submitted data. After successful validation, the issuer can proceed to issue the new credential
4. Generating Issuance Process instance
Request Example
ACCESS-TOKEN
: Access token received from the login request (This authentication must be executed by an application linked to that TENANT, not an administrator).SSI-TEMPLATE-ID
: Identifier of the template used for this issuance. These identifiers are configured in Studio.
Response Example
This response is too large to be displayed in a QR code. Therefore, only the session ID (e.g., 2xuEMaSrrxsTMyaioJuSMKejfCyBim7g) is shown to represent the issuance process within the QR code. This session ID is essential for the next step, so please ensure you copy and save it.
The structure of the Verifiable Credential shows the credential type, the trust level (if the credential needs to be issued by a trusted issuer or it can be issued by any or self-attested), the purpose for requesting the credential, and if the credential is requested mandatorily or optionally.
5. Validating the Issuance Process
Getting the information from a specific issuance process is also possible using the command below. Instead of getting the information from a set of issuance processes, this command gets the information from a specific issuance process (using the process identifier).
Request Example
ISSUANCE-PROCESS-ID: Issuance process identifier used by the end user to request new VCs.
ACCESS-TOKEN: Access token received from the authentication call. (This authentication must be executed by an app related to that issuance process, not an administrator).
Response Example
Information structure
The response consists of the following components:
Issuance Process Metadata
Identifier: A unique identifier assigned to the issuance process.
Type: The type or category of the issuance process.
Dates: Timestamps indicating creation and update times for the process.
Status: The current state of the issuance process.
Status Definitions
PENDING: The session has been created, but no additional information has been associated with the process yet.
ISSUED: Verifiable Credentials (VCs) tied to the issuance process have been successfully downloaded.
REJECTED: The issuance process has been rejected by the issuer.
Data
This field contains the newly issued Verifiable Credentials provided by the relying party.
The field is populated only when the issuance process reaches an ISSUED status.
Validator
Includes all the information shared by the end user, as requested by the relying party, to complete the authentication process into Studio.
Generate Verifiable Credential
Once the Relying Party has validated the required information, it must issue the new Verifiable Credential (VC). This involves populating the data for the new VC based on the associated issuance process.
To complete this step, the Relying Party should call the following endpoint:
Request Example
The schema for each verifiable credential type is stored in Studio. It is also possible to retrieve the schema from Studio responses (credential schema).
Each VC consists of the following components:
credentialSubject
: This is a map of fields that includes the values for the credential. Within this object, it is possible to attach the holder’s ID (DID) and define the properties specific to that type of credential.
For each VC, the following details can be included:
id (optional):
A unique identifier for the VC.
It MUST be unique, so generating a new random string for each VC is necessary.
issuer (optional):
The DID of the entity issuing the VC.
issuanceDate (optional):
The date when the VC was issued.
validFrom (optional):
The date from which the VC becomes valid.
credentialSchema (optional):
Specifies the schema used to issue the VC instead of relying on the type.
If provided, the type should be set as
VerifiableID
orVerifiableAttestation
.
evidence (optional):
A field to describe how the identification was verified prior to issuing the VC.
context (optional):
Indicates the context used for issuing the VC.
Default contexts are provided, but these can be overridden if necessary.
The response is an array representing the issuance processes, structured as follows:
Response Example
Each entry in the response is structured as follows:
Issuance Process Metadata:
Contains key details about the issuance process, including:
Identifier: A unique identifier for the process.
Type: The type of issuance process.
Dates: Relevant timestamps (e.g., creation and update times).
Status: The current status of the process, which can be:
PENDING: The session has been created, but no additional information is associated yet.
ISSUED: Verifiable Credentials (VCs) associated with the process have been issued and downloaded.
REJECTED: The issuance process has been rejected by the issuer.
Data:
This field contains the new Verifiable Credentials (VCs) issued by the Relying Party.
It is populated only when the issuance process status is updated to ISSUED.
Validator:
Includes all the information shared by the end user that was requested by the Relying Party for authentication into Studio.
Alternative - Attended issuance flow
In the previous section, we defined how to implement an unattended issuance flow, where the request and issuance processes are carried out synchronously, without requiring any manual intervention. However, there are use cases where manual validation is required, often due to legal or regulatory requirements.
For these scenarios, where an asynchronous process is necessary, this operation provides the required functionality to accommodate manual validations.
In order to allow the administrator responsible for validations to list all pending processes and proceed with the required validation steps efficiently, it is essential to utilize this endpoint, which will provide all issuance requests:
Request Example
ACCESS-TOKEN: Access token received from the authentication call.
Moreover, the same endpoint supports query parameters, enabling filtering of issuance processes by specific statuses. This functionality streamlines searches and improves efficiency, allowing administrators to quickly locate and retrieve only the processes relevant to their validation tasks:
Request Example
The response is an array of issuance processes with the following structure:
Response Example
Information Structure
The response includes the following key components:
Issuance Process Metadata
• Identifier: Unique identifier for the issuance process.
• Type: Type of issuance process.
• Dates: Timestamps related to the creation and updates of the process.
• Status: Current status of the issuance process.
Status Definitions
• PENDING: The session has been created, but no information is currently associated with the process.
• ISSUED: Verifiable Credentials (VCs) associated with the issuance process have been successfully downloaded.
• REJECTED: The issuance process has been rejected by the issuer.
Data
• This field contains the newly issued Verifiable Credentials provided by the relying party.
• This field is populated only when the issuance process reaches an ISSUED status.
Validator
• This field includes all the information shared by the end user and requested by the relying party to authenticate into Studio.
This structure provides a comprehensive overview of the issuance process, ensuring clarity and accessibility for administrators handling these processes.
Integrating the GatacaQR Component for Identity Wallet Interaction
To streamline the interaction with identity wallets, Gataca offers the GatacaQR component, a versatile JavaScript library designed for seamless session management. This component simplifies the integration process for relying parties, enabling them to generate and manage sessions effortlessly while enhancing user experience.
Key Features of GatacaQR
QR Code Rendering: Displays a QR code that users can scan to initiate interactions with their identity wallet.
Real-Time Communication: Supports features such as polling and WebSocket integration for efficient session updates.
Deep Link Triggering: Allows for direct interaction with mobile devices via deep links, bypassing the need for QR scanning in certain use cases.
Customizable Layout: Offers flexibility to adapt the appearance of the QR code and its surrounding elements to align with the relying party’s branding and design preferences.
Ease of Integration: Simplifies complex session management workflows, providing a user-friendly API for developers.
Getting Started with GatacaQR
Developers can access comprehensive manuals and resources for using the GatacaQR component through the following repositories:
NPM: @gataca/qr
GitHub: Gataca-QR Repository
By leveraging GatacaQR, developers can focus on building intuitive user journeys while relying on a robust, pre-built solution for wallet interactions. This component ensures a streamlined, secure, and highly adaptable way to integrate identity wallet capabilities into your application.
WebHooks
The Gataca Studio platform introduces support for web-hooks, providing users with a flexible mechanism to receive real-time notifications about specific events within the system. Web-hooks can be configured directly through the graphical user interface (GUI), enabling seamless integration with external systems or workflows.
How Web-Hooks Work
Configuration: Users will define web-hooks via the Studio interface, specifying the target endpoint (URL). This functionality will be available for each of the templates that define the issuance and verification processes.
Triggering Events: When an event of interest occurs, Studio sends an HTTP POST request to the user-defined endpoint.
Payload: The POST request contains a structured payload with relevant data about the event. This allows external systems to process the information immediately and take appropriate actions.
Webhook Payload Structure
The payload sent to the configured endpoint will follow this format:
id: Process identifier
subject: Subject identifier
status: Whole process status (SUCCESS, REJECT)
payload: [OPTIONAL] Map with the claims shared by the subject (avoid including id). If there is no info into the credential subject this field won’t be included.
verificationResult: List of results (steps passed, warnings and errors)
Benefits of Web-hook Integration
• Real-Time Updates: Enables immediate processing of events by external systems.
• Custom Workflows: Allows users to automate responses or actions based on Studio events.
• Scalability: Supports integration with diverse applications, including CRMs, analytics platforms, or custom systems.
Last updated