You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -128,4 +128,4 @@ See the [LICENCE](./LICENCE) file for details.
128
128
129
129
*[Contact the European Commission](https://commission.europa.eu/about-european-commission/contact_en)
130
130
*[Follow the European Commission on social media](https://european-union.europa.eu/contact-eu/social-media-channels_en#/search?page=0&institutions=european_commission)
131
-
*[Resources for partners](https://commission.europa.eu/resources-partners_en)
131
+
*[Resources for partners](https://commission.europa.eu/resources-partners_en)
Copy file name to clipboardExpand all lines: docs/annexes/annex-2/annex-2-high-level-requirements.md
+12-12Lines changed: 12 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -309,7 +309,7 @@ private key corresponding to public key in the WUA is in possession by the Walle
309
309
A topic related to the WUA is the following. It would be useful if the Wallet Unit would be able provide a proof that the PID or attestation private key is protected by the same WSCA as the WUA private
310
310
key. Because if that is the case, the PID Provider or Attestation Provider can be sure that the
311
311
security level of the new PID or attestation key is the same as the security
312
-
level of the WUA key.Moreover, such a proof could also be useful if case of a combined presentation of attributes as discussed in [Topic 18](#a2318-topic-18---combined-presentations-of-attributes), to give assurance to the Relying Party that all of these attestations originate from the same WSCA/WSCD and thus are related to the same User.
312
+
level of the WUA key.Moreover, such a proof could also be useful if case of a combined presentation of attributes as discussed in [Topic 18](#a2318-topic-18---combined-presentations-of-attributes), to give assurance to the Relying Party that all of these attestations originate from the same WSCA/WSCD and thus are related to the same User.
313
313
314
314
However, at the moment of writing this version of the ARF, no commonly agreed technical specification of such a proof is available. Moreover, even if such a specification were available, it is
315
315
not fully clear how many WSCAs/WSCDs available to Wallet Units will support the cryptographic functionalities
@@ -659,7 +659,7 @@ catalogue, as described in [Topic 25](#a2325-topic-25---unified-definition-and-c
659
659
| ARB_09 | The Schema Provider for an Attestation Rulebook SHALL specify, for each attribute in the attestation, whether the presence of that attribute is mandatory, optional, or conditional. |
660
660
| ARB_10 | The Schema Provider for an Attestation Rulebook for an ISO/IEC 18013-5 compliant attestation MAY define a domestic namespace to specify attributes that are specific to that Rulebook and are not included in the applicable EU-wide or sectoral namespace. All requirements for namespaces in this Topic also apply for domestic namespaces. |
661
661
| ARB_11 | The Schema Provider for an Attestation Rulebook describing a type of attestation that is a QEAA or a PuB-EAA SHALL include in the Rulebook an attribute as meant in [Annex V](https://eur-lex.europa.eu/legal-content/EN/ALL/?uri=CELEX:32024R1183#d1e40-54-1) point a) and [Annex VII](https://eur-lex.europa.eu/legal-content/EN/ALL/?uri=CELEX:32024R1183#d1e40-56-1) point a) of the [European Digital Identity Regulation]. This attribute SHALL reference the technical specification meant in ARB_25. |
662
-
| ARB_12 | The Schema Provider for an Attestation Rulebook describing a type of attestation that is a non-qualified EAA SHOULD include an attribute in the Rulebook indicating that the attestation is an EAA.This attribute SHALL reference the technical specification meant in ARB_25. |
662
+
| ARB_12 | The Schema Provider for an Attestation Rulebook describing a type of attestation that is a non-qualified EAA SHOULD include an attribute in the Rulebook indicating that the attestation is an EAA.This attribute SHALL reference the technical specification meant in ARB_25. |
663
663
| ARB_13 | The Schema Provider for an Attestation Rulebook describing a type of attestation that is a QEAA SHALL include in the Rulebook one or more attributes or metadata representing the set of data meant in [Annex V](https://eur-lex.europa.eu/legal-content/EN/ALL/?uri=CELEX:32024R1183#d1e40-54-1) point b) of the [European Digital Identity Regulation]. |
664
664
| ARB_14 | The Schema Provider for an attestation Rulebook describing a type of attestation that is a PuB-EAA SHALL include in the Rulebook one or more attributes or metadata representing the set of data meant in [Annex VII](https://eur-lex.europa.eu/legal-content/EN/ALL/?uri=CELEX:32024R1183#d1e40-56-1) point b) of the [European Digital Identity Regulation]. |
665
665
| ARB_15 | The Schema Provider for an Attestation Rulebook describing a type of attestation that is a non-qualified EAA SHOULD include in the Rulebook one or more attributes or metadata representing the set of data meant in [Annex V](https://eur-lex.europa.eu/legal-content/EN/ALL/?uri=CELEX:32024R1183#d1e40-54-1) point b) of the [European Digital Identity Regulation]. |
@@ -835,7 +835,7 @@ function of a dashboard ensures a higher degree of transparency, privacy
835
835
and control of the User over their personal data.
836
836
837
837
This Topic lists high-level requirements related to the functions
838
-
of such a dashboard.
838
+
of such a dashboard.
839
839
840
840
##### HLRs <!-- omit from toc -->
841
841
@@ -862,11 +862,11 @@ of such a dashboard.
862
862
##### Description <!-- omit from toc -->
863
863
864
864
This topic deals with the requirement for Strong User (Customer) Authentication
865
-
(SCA) in the context of authenticating a User as part of electronic payments.
865
+
(SCA) in the context of authenticating a User as part of electronic payments.
866
866
867
867
Users would like to be able to authenticate themselves during online
868
868
payments securely and conveniently using their Wallet Units, so that
869
-
they can enjoy a seamless and protected shopping/ payment experience.
869
+
they can enjoy a seamless and protected shopping/ payment experience.
870
870
871
871
The goal is to implement Strong Customer Authentication (SCA) for electronic
872
872
payments, ensuring a high level of security and compliance with
@@ -878,10 +878,10 @@ lays down the requirements for strong customer authentication (SCA), which needs
878
878
to be complied with when accessing a payment account online and for initiating
879
879
electronic payments, or carrying out any action through a remote channel which
880
880
may imply a risk of payment fraud or other abuses. The use of the wallet for SCA
881
-
will be in full compliance with those requirements.
881
+
will be in full compliance with those requirements.
882
882
883
883
In the future, a Wallet Unit could also be used for payments with Central Bank
884
-
Digital Currencies.
884
+
Digital Currencies.
885
885
886
886
##### HLRs <!-- omit from toc -->
887
887
@@ -1110,7 +1110,7 @@ Notes:
1110
1110
example, date of birth or age are not relevant information for legal
1111
1111
persons. Specifying a different Rulebook for legal-person PIDs
1112
1112
allows Relying Parties and other Wallet Units to request
1113
-
these attributes.
1113
+
these attributes.
1114
1114
- A legal-person Wallet Solution may be implemented in the same
1115
1115
manner as a natural-person Wallet Solution, meaning chiefly that it
1116
1116
is implemented on a mobile device operated by a single User, who is
@@ -1140,7 +1140,7 @@ does the same for legal-persons PIDs.
of the [European Digital Identity Regulation] also mentions the possibility of
1142
1142
issuing eIDs that also could attest a natural person representing the natural or
1143
-
legal person.At current time, this Topic proposes to not describe any
1143
+
legal person.At current time, this Topic proposes to not describe any
1144
1144
requirements for such eID schemes without further Member State input for such
1145
1145
eID schemes. The main reason is that there is no cross-border legal framework
1146
1146
for mutual recognition of powers and mandates. Powers and mandates are generally
@@ -1580,7 +1580,7 @@ See [Topic 12](#a2312-topic-12---attestation-rulebooks).
1580
1580
This Topic discusses the ability of QTSPs issuing electronic attestations of
1581
1581
attributes to verify those attributes by electronic means at the request
1582
1582
of the User, wherever those attributes rely on Authentic Sources within
1583
-
the public sector.
1583
+
the public sector.
1584
1584
1585
1585
##### HLRs <!-- omit from toc -->
1586
1586
@@ -1692,7 +1692,7 @@ transparency, privacy and control of the Users over their personal
1692
1692
data.
1693
1693
1694
1694
This Topic lists high-level requirements related to the function
1695
-
of Users requesting the deletion of their personal data fromRelying
1695
+
of Users requesting the deletion of their personal data fromRelying
1696
1696
Parties through their Wallet Unit.
1697
1697
1698
1698
Note: A Relying Party may use the services of an intermediary to request data
@@ -1813,4 +1813,4 @@ The topic of ZKPs for the EUDI Wallet ecosystem was introduced in the [Discussio
1813
1813
| ZKP_06 | A ZKP scheme SHOULD be able to generate proofs for already issued PIDs and attestations in the formats specified in [ISO/IEC 18013-5] or [SD-JWT VC]. |
1814
1814
| ZKP_07 | A ZKP scheme SHALL NOT introduce any additional communication or information that could be used to track or link User activity during, before, or after proof generation. |
1815
1815
| ZKP_08 | A ZKP scheme SHALL rely solely on algorithms standardised by a standardisation organisation recognised by the Commission or in a standard recognised by the Commission. |
1816
-
| ZKP_09 | Use of a ZKP scheme SHALL NOT prevent the Wallet Unit's ability to provide User authentication with Level of Assurance "high". |
1816
+
| ZKP_09 | Use of a ZKP scheme SHALL NOT prevent the Wallet Unit's ability to provide User authentication with Level of Assurance "high". |
Copy file name to clipboardExpand all lines: docs/index.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -107,7 +107,7 @@ The latest **authoritative version** is tagged as [release/tag in this repositor
107
107
108
108
## Contributing
109
109
110
-
Please read [CONTRIBUTING.md](https://github.com/eu-digital-identity-wallet/eudi-doc-architecture-and-reference-framework/blob/main/CONTRIBUTING.md) for details on our code of conduct,
110
+
Please read [CONTRIBUTING.md](CONTRIBUTING.md) for details on our code of conduct,
111
111
and the process for submitting pull requests to us.
Copy file name to clipboardExpand all lines: docs/technical-specifications/ts2-notification-publication-provider-information.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -463,4 +463,4 @@ The file [``EUDI-Providers.json``](https://github.com/eu-digital-identity-wallet
463
463
464
464
### A.3 XML-Schema (informative)
465
465
466
-
The file [``EUDI-Providers.xsd``](https://github.com/eu-digital-identity-wallet/eudi-doc-architecture-and-reference-framework-private/blob/provider-notification/docs/technical-specifications/api/EUDI-Providers.xsd) contains the XML-Schema definitions corresponding to the Data Model specified in [clause 2](#2-data-model) above.
466
+
The file [``EUDI-Providers.xsd``](https://github.com/eu-digital-identity-wallet/eudi-doc-architecture-and-reference-framework-private/blob/provider-notification/docs/technical-specifications/api/EUDI-Providers.xsd) contains the XML-Schema definitions corresponding to the Data Model specified in [clause 2](#2-data-model) above.
0 commit comments