Introduction to acapy-cloud
Trust Ecosystem in a Box
Table of Contents
First Steps
After spinning up the containers following the Quick Start Guide, you are ready to rumble.
Navigating to the Swagger UI endpoints:
- Multitenant-Admin (Managing tenants) -> http://cloudapi.127.0.0.1.nip.io/tenant-admin/docs
- Governance (Acting as governance) -> http://cloudapi.127.0.0.1.nip.io/governance/docs
- Tenant (Acting as a tenant) -> http://cloudapi.127.0.0.1.nip.io/tenant/docs
- Public (Interface to read the trust registry) -> http://cloudapi.127.0.0.1.nip.io/public/docs
provides a good overview of the intended functionalities. You'll find endpoints for admin actions (managing wallets) and tenant actions (for holders, issuers and verifiers). Additionally, there are trust registry and webhooks endpoints.
NOTE: Regardless of the multitude of containers and mechanisms running in acapy-cloud, its aforementioned Swagger UI's are the main interaction points intended between clients and the stack. These should be the only endpoints that clients should interact with.
Using the Swagger UI
The Swagger UI is documented. It shows you endpoints, expected parameters, and what example requests and responses look like. At the bottom of the UI, you can also find a list of all request/response models used, with definitions and example values.
Following Docker Container Logs
It can be handy to follow the logs of a specific container. A convenient way to do so is using:
kubectl logs -f $(kubectl get pods -l app.kubernetes.io/instance=YOUR_CONTAINER_NAME -o jsonpath="{.items[0].metadata.name}")
And replacing YOUR_CONTAINER_NAME
with the name of the container you want to follow (e.g., endorser-web).
You can find the container name in the docker-compose.yaml.
Authentication
Authentication is handled by acapy-cloud, and from a client perspective it's kept simple and convenient. Either, via
the Swagger UI auth (padlock button in UI) or via the header data of your client specifying an x-api-key
. Regardless
of whether you use the UI or another client, the x-api-key
value consists of two parts, separated by a dot:
{role}.{key/token}
This means the header has the format 'x-api-key: {role}.{key/token}
, which would look like,
e.g., 'x-api-key: governance.adminApiKey'
or 'x-api-key: tenant.ey..'
(JWT token).
The first part, role
, specifies the role on the surface and targets the correct endpoints and authentication
mechanisms under the hood. acapy-cloud knows how to interpret the roles and will produce the correct target URLs for
the ACA-Py agent (tenant
and tenant-admin
target the multitenant agent, and governance
targets the governance
agent) with the correct headers expected by the agent.
For admin roles, pass the agent API key as the second part of {role}.{key}
:
- The
governance
role requires the Governance Agent API Key (which was used in starting up the governance agent) as the right-hand side token in thex-api-key
header (in order to authenticate access to the governance agent). - The
tenant-admin
role requires the Multitenant Agent API Key (which was used in starting up the multitenant agent) as the right-hand side token in thex-api-key
header (in order to target the admin interface of the multitenant agent).
Requests for the tenant
role require the wallet JWT as the token in {role}.{token}
. These requests will internally
obtain a Bearer {TOKEN}
header passed to the multitenant agent.
The definitions and capabilities of the three roles are as follows:
acapy-cloud Roles
Governance Role
Authentication header: 'x-api-key: governance.<GOVERNANCE AGENT API KEY>'
- governance
- is:
- trust authority
- transaction endorser
- can:
- make connections
- create schemas
- create credential definitions
- manage trust registry
- issue credential
- verify credential
- send basic messages
- is:
Tenant Administration Role
Authentication header: 'x-api-key: tenant-admin.<MULTITENANT AGENT API KEY>'
- tenant-admin
- is:
- trust ecosystem admin
- is transaction author
- can:
- only create, update, and delete tenants (wallets) for trust ecosystem issuers, verifiers, and users
- is:
Tenant Role (Trust Ecosystem Issuers, Verifiers, and Holders)
Authentication header: 'x-api-key: tenant.<TENANT JWT>'
- tenant
- is:
- holder
- issuer/verifier
- if is issuer or verifier
- issuers are transaction authors
- verifiers are not transaction authors
- automatically registered with the trust registry
- can:
- make connections
- create credential definitions
- issue credential
- create/manage wallets
- all transactions written to the ledger are counter-signed by the governance transaction endorser role
- if is user (holder):
- holder only
- can:
- make connections
- manage own wallet
- receive and store credentials
- respond to/create proof request
- send basic messages
- is:
Workflows and Roles Overview
Creating schemas
Using the admin role(s) you can create and register schemas. Successful schema creation will automatically write it to the ledger.
The ledger is also a useful place to look at what schemas you have at your disposal. In fact, this should be the preferred way, because schemas can exist on the ledger but have been invalidated on the trust registry. This will be checked by acapy-cloud and only valid schemas are allowed for use.
Credentials
The main feature revolves around issuing credentials, and verifying proofs based on these credentials.
Creating and issuing credentials
In order to issue a credential one must first:
- Create a schema and
- Register the schema with the trust registry.
via the governance agent. Only the governance agent can register a schema on the ledger.
Then:
- Register an issuer with a tenant admin controller. This automatically registers them on the trust registry.
The registered issuer can then issue a credential, using the related schema on the trust registry, with the following steps:
- Create a connection between the issuer and some other entity that you want to hold a credential
- Once a connection is established, use the connection ID to create and issue a credential (have a look at the models in Swagger - it will tell you what data you need to provide and will receive back)
- Holder accepts credential issuance
- Holder stores credential in wallet
In summary, we have:
- Created a schema (using the governance admin)
- Registered a schema on the ledger (via the governance admin)
- Created (a wallet for) an issuer and future holder using the tenant-admin
- Registered an issuer (for a schema)
- Created a connection between an issuer and a prospective holder (using connections API)
- Proposed a credential to a prospective holder from an issuer
- Accepted and stored an offered credential
Please note that when creating/issuing a credential, endorsing, and verifying credentials, acapy-cloud checks whether the requested instructions are valid against the trust registry.
Requesting a proof/using a credential
Now that we have an entity holding a credential (having a stored credential in their wallet), the next step is to use this credential. What we need to do:
- Register a verifier on the trust registry (using a tenant-admin controller).
- Establish a connection between a holder (of a credential) and a verifier (using connections/invitations API).
- Using the data models and the 'dance' described in the ACA-Py docs, you can now arrange for negotiating a proof exchange
User management/Creating wallets
Using the admin role(s), you can create wallets for tenant or eco-system partners. These are all sub wallets. Successful creation returns the wallet creation response, including the wallet id and JWT for authentication.
Further Reading
- acapy-cloud Architecture Overview
- Quick Start Guide
- Common Steps
- Example Flows
- Governance as Code
- Trust Registry
- Webhooks
Quick Start Guide
This guide will walk you through the steps to get acapy-cloud up and running smoothly.
Ensure that you meet the system requirements and have the necessary prerequisites installed.
System Requirements & Prerequisites
To successfully set up and run the project, your system should meet the following requirements and have the following prerequisites installed:
Requirements
- Memory: 16GB of RAM
- CPU: Intel i5 (minimum 4 cores) or equivalent
- Disk Space: Approximately 32GB of free space for Docker images and data
Prerequisites
- Operating System: Linux or macOS (Windows users should use WSL as outlined below)
- Tools:
- Bash
- Docker
- Docker Compose
- Mise
[!NOTE] As of now, Mise does not support Windows. Windows users are recommended to use WSL. If using WSL, additional steps are required for Kind to work properly. Refer to the Kind WSL2 Guide for more details.
Installing Docker
Follow the official Docker installation instructions for your operating system:
Installing Docker Compose
Refer to the official Docker Compose installation guide:
Setting up Mise
Mise is used to install and manage development tooling for this project. Choose one of the following installation methods. We strongly recommend using your system's package manager to install Mise.
# Homebrew
brew install mise
# Build from source (requires Rust)
cargo install mise
# Arch Linux User Repository
yay -S mise-bin
# Debian/Ubuntu APT (amd64)
sudo apt-get update && sudo apt-get install -y gpg wget curl
sudo install -dm 755 /etc/apt/keyrings
wget -qO - https://mise.jdx.dev/gpg-key.pub | gpg --dearmor | sudo tee /etc/apt/keyrings/mise-archive-keyring.gpg > /dev/null
echo "deb [signed-by=/etc/apt/keyrings/mise-archive-keyring.gpg arch=amd64] https://mise.jdx.dev/deb stable main" | sudo tee /etc/apt/sources.list.d/mise.list
sudo apt-get update
sudo apt-get install -y mise
# Debian/Ubuntu APT (arm64)
sudo apt-get update && sudo apt-get install -y gpg wget curl
sudo install -dm 755 /etc/apt/keyrings
wget -qO - https://mise.jdx.dev/gpg-key.pub | gpg --dearmor | sudo tee /etc/apt/keyrings/mise-archive-keyring.gpg > /dev/null
echo "deb [signed-by=/etc/apt/keyrings/mise-archive-keyring.gpg arch=arm64] https://mise.jdx.dev/deb stable main" | sudo tee /etc/apt/sources.list.d/mise.list
sudo apt-get update
sudo apt-get install -y mise
For alternative installation methods, visit the Mise Installation Documentation.
Activating Mise in Your Shell
After installation, activate Mise by adding the following to your shell configuration:
# Bash
echo 'eval "$(mise activate bash)"' >> ~/.bashrc && source ~/.bashrc
# Zsh
echo 'eval "$(mise activate zsh)"' >> ~/.zshrc && source ~/.zshrc
# Fish
echo 'mise activate fish | source' >> ~/.config/fish/config.fish && source ~/.config/fish/config.fish
Once activated, run the following commands to trust and install all required tools:
mise trust
mise install
For support with other shells, refer to the Mise Shell Support Documentation.
Project Setup
-
Clone the Repository:
git clone https://github.com/didx-xyz/acapy-cloud cd acapy-cloud
-
Start the Project:
In the root directory of the project, execute:
mise run tilt:up
-
Stop the Project:
When you're done, stop the project by running:
mise run tilt:down
-
Destroy the Kind Cluster:
To remove the Kind cluster as well:
mise run tilt:down:destroy
-
Clean Slate (Optional):
To remove everything, including the Docker cache, execute:
mise run tilt:down:destroy:all
Accessing Services
Once the project is running, access various services via their Swagger interfaces at the following URLs:
- ACA-Py Governance Agent: http://governance-agent.cloudapi.127.0.0.1.nip.io
- ACA-Py Multitenant Agent: http://multitenant-agent.cloudapi.127.0.0.1.nip.io
- Governance: http://cloudapi.127.0.0.1.nip.io/governance/docs
- Multitenant-Admin: http://cloudapi.127.0.0.1.nip.io/tenant-admin/docs
- Public: http://cloudapi.127.0.0.1.nip.io/public/docs
- Tenant: http://cloudapi.127.0.0.1.nip.io/tenant/docs
- Trust Registry: http://trust-registry.cloudapi.127.0.0.1.nip.io/docs
- Waypoint: http://waypoint.cloudapi.127.0.0.1.nip.io/docs
Customization
Customize each Docker container's environment parameters by editing its corresponding .yaml
file
located within the helm/acapy-cloud/conf/local
directory. For example, to change the auto-provision
setting for
the ACA-Py multitenant instance from true
to false
, modify the ACAPY_AUTO_PROVISION
value under the env
section
in helm/acapy-cloud/conf/local/multitenant-agent.yaml
.
To configure log levels, search for LOG_LEVEL
and set to your desired level.
Next Steps
- Common Steps: Understand the general capabilities of the project once it's up and running.
- Example Flows: Learn how to perform specific SSI flows.
Trust Registry
As a client, you can retrieve the trust registry but not alter it. This design is intentional as only administrative actions should modify the trust registry, and such actions are only possible with an admin role.
NOTE: The Trust Registry GET API endpoint is not protected and should not be publicly accessible.
The Trust Registry serves as a gatekeeper interface for interactions, maintaining the truth states about actors, their respective roles as issuers and/or verifiers, and schemas.
The Swagger docs are divided into three main sections:
- Actor - For actor information and actions on the ledger
- Schema - For schema information and actions on the ledger
- Default - To retrieve all information from the registry
The trust registry provides access to this data via actors
and schemas
keys, which can be found in the JSON blob
retrieved from requesting the endpoint. Their structures are as follows:
{
"actors": [
{
"name": "Test Actor-0.26703024264670694",
"roles": [
"issuer",
"verifier"
],
"did": "did:sov:XfbLjZFxgoznN24LUVxaQH",
"id": "test-actor-0.26703024264670694",
"didcomm_invitation": null,
"image_url": "https://upload.wikimedia.org/wikipedia/commons/7/70/Example.png"
},
...
}
The fields here should be self-explanatory.
And,
{
"schemas": [
"z5Bug71M7Sj7cYpbVBDmN:2:test_schema:0.3",
"MnspmfkzjLXd6WXyjCYJKW:2:test_schema:0.3",
"E2HWvrZYs9SCXXHCZtFV1U:2:test_schema:0.3",
...
]
}
where "z5Bug71M7Sj7cYpbVBDmN:2:test_schema:0.3"
represents the schema ID, name, and version respectively.
NOTE: In a production environment, this should not be exposed to the internet or interacted with directly. It's advisable to either avoid exposing this to the internet or set up a separate security layer for the trust registry. This is because it's crucial to prevent unauthorized individuals from making changes to the trust registry.
Trust Registry Interactions
Below, we outline where and how the Trust Registry is consulted to verify that Issuers, Verifiers, and Schemas are compliant.
Issuer Actions
When a user/tenant initiates any issuer-related action, the Trust Registry is used to verify the following:
- Issuer Verification:
- For creating credential definitions, creating credential offers, and issuing credentials: Confirms that the tenant is registered with the role of an issuer.
- For accepting credentials: Confirms that the tenant is receiving a credential from a registered issuer.
- Schema Validation: Ensures that the referenced schema is valid and registered within the Trust Registry.
If either step fails, the operation is blocked, and an appropriate error message is returned to the user. The operation is logged and able to be reviewed by an administrator.
--- title: Trust Registry called during issuer operations --- flowchart LR App(Issuer Action:<br>Credential Operations) -->|Consults| TR[Trust Registry] subgraph Trust Registry Checks TR -->|Validates| Check1{Issuer Verification} Check1 -->|If Unauthorized| Block[⨯ Block Operation] Check1 -->|If Authorized| Check2{Schema Validation} Check2 -->|Not on TR| Block end Check2 -->|If Registered| Continue[✓ Proceed with Operation] style TR fill:#a8d1ff,stroke:#1e88e5,color:black style Block fill:#ffcdd2,stroke:#e53935,color:black style Continue fill:#c8e6c9,stroke:#43a047,color:black
Verifier Actions
When a tenant initiates any verifier-related action (sending proof requests or receiving proof presentations), the Trust Registry is used to verify the following:
- Verifier Verification:
- For sending proof requests: Confirms that the tenant sending the request is registered as a verifier.
- For accepting proof requests: Validates that the proof is being presented to a registered verifier.
- Schema Validation: Ensures that the attributes being requested are associated with schemas registered within the Trust Registry.
If either step fails, the operation is blocked as a bad request, with an appropriate error message returned to the user.
--- title: Trust Registry called during proof requests --- flowchart LR Start(Verifier Action:<br>Proof Request Operations) -->|Consult| TR[Trust Registry] subgraph Trust Registry Checks TR -->|Validates| Check1{Verifier Verification} Check1 -->|If Unauthorized| Block[⨯ Block Operation] Check1 -->|If Authorized| Check2{Schema exists on TR} Check2 -->|Not on TR| Block end Check2 -->|If Registered| Continue[✓ Proceed with Operation] style TR fill:#a8d1ff,stroke:#1e88e5,color:black style Block fill:#ffcdd2,stroke:#e53935,color:black style Continue fill:#c8e6c9,stroke:#43a047,color:black
Webhooks/Event Consumption
Primary Method: NATS
The recommended and most efficient way to consume events is through our NATS implementation. NATS provides a robust, scalable solution for event streaming and processing. For detailed information about consuming events from our NATS implementation, please refer to this document: NATS.
Alternative: Waypoint Service
The Waypoint service provides a specialized Server-Sent Events (SSE) endpoint for cases where you need to wait for a specific event that you know is coming. This is particularly useful when you need to track the state change of a specific entity and have all the necessary filter information.
The Waypoint service exposes a single SSE endpoint, via the main app, for event streaming:
GET
/v1/sse/{wallet_id}/{topic}/{field}/{field_id}/{desired_state}
This endpoint is designed for targeted event retrieval where you can specify exact filters to wait for a particular event.
How to use
The endpoint requires specific filter parameters:
wallet_id
: Identifier for the specific wallettopic
: The event topic to subscribe tofield
: Filter field from the event payloadfield_id
: Specific value for the filter fielddesired_state
: The desired state of the event
For example, if you're waiting for a specific connection to reach the 'completed' state, you would use:
field
: "connection_id"field_id
: "<your_connection_id>"desired_state
: "completed"
The stream will remain open until the desired event (matching the filters) is found and returned, at which point the stream will be closed or timeout after 60 seconds.
Valid topics include:
topics = Literal[
"basic-messages",
"connections",
"credentials",
"credentials_indy",
"credentials_ld",
"endorsements",
"issuer_cred_rev",
"oob",
"problem_report",
"proofs",
"revocation",
]
Implementing Your Event Listener
Here's an example of how to implement a SSE event listener using JavaScript:
const EventSource = require('eventsource');
const wallet_id = '<your_wallet_id>';
const url = `http://cloudapi.127.0.0.1.nip.io/tenant-admin/v1/sse/${wallet_id}/proofs/connections/<some_id>/done`;
const headers = {
'x-api-key': 'tenant.<tenant/wallet_token>',
};
const eventSource = new EventSource(url, { headers });
// Event listener for incoming server-sent events
eventSource.onmessage = (event) => {
const eventData = JSON.parse(event.data);
console.log("EVENT ==> ", eventData);
};
// Event listener for handling errors
eventSource.onerror = (error) => {
console.error('EventSource error:', error);
// Add your error handling logic here
};
console.log("Listening for events...");
This script establishes a connection to the SSE endpoint and listens for incoming events. When an event is received, it's logged to the console. Error handling is also implemented to manage any issues that may arise during the connection.
NOTE: Ensure that you replace
<your_wallet_id>
with the actual wallet ID and use the appropriatex-api-key
for authentication.
Authentication
The Waypoint service requires authentication to access the SSE endpoint. This is managed through the x-api-key
header
in the request. The key should be in the format tenant.<tenant/wallet_token>
. Failing to provide valid authentication
will result in a 403 HTTP Error.
A tenant will only be able to listen to events that belong to their wallet and a tenant-admin is able to listen to all events belonging to their group.
NATS
NATS is an open-source messaging system designed for high-performance, lightweight, and reliable communication between distributed applications. It supports pub-sub (publish-subscribe), request-reply, and message queue patterns, allowing for flexible communication between microservices, IoT devices, and cloud-native systems.
Key Features
- Simple: Text-based protocol with straightforward publish-subscribe semantics
- Fast: Written in Go, capable of millions of messages per second
- Lightweight: Small footprint, minimal dependencies
- Cloud Native: Built for modern distributed systems
Core Concepts
- Publishers: Send messages to subjects
- Subscribers: Receive messages from subjects
- Subjects: Named channels for message routing
- Queue Groups: Load balance messages across subscribers
Message Patterns
- Publish/Subscribe: One-to-many message distribution
- Request/Reply: Synchronous communication
- Queue Groups: Load balanced message processing
- Stream Processing: Persistent message streams (via NATS Streaming/JetStream)
Consuming our NATS
Please contact us for help with connecting/authenticating to our NATS service
Governance as Code: Building Your Trust Ecosystem
This guide introduces key concepts and demonstrates how to programmatically define and manage your trust ecosystem using acapy-cloud's APIs. You'll learn how to:
- Define schemas for credentials
- Create and manage different types of tenants (issuers, verifiers, holders)
- Create credential definitions
- Query and manage the trust registry
The examples use the provided Swagger UI interfaces but can also be automated through direct API calls.
1. Schemas
Schemas are used to define attributes related to credentials. To define schemas for your trust ecosystem, follow the steps below:
- Access the API through the Governance interface.
- Authenticate with
governance.
+APIKEY
role. - Generate a new schema with a
POST
to the following API endpoint:/v1/definitions/schemas
.
An example of a successful response to generate a DID:
{
"id": "PWmeoVrsLE2pu1idEwWFRW:2:test_schema:0.3.0",
"name": "test_schema",
"version": "0.3.0",
"attribute_names": ["speed"]
}
2. Creating Tenants
In the multi-tenant environment, you can set up issuers, verifiers, and holders. Each tenant gets their own wallet, and the different roles have different privileges.
Issuers
To create an issuer tenant for your trust ecosystem, follow the steps below:
- Access the API through the Multitenant-Admin.
- Authenticate with
tenant-admin.
+APIKEY
role. - Create a new tenant with a
POST
to the following API endpoint:/tenant-admin/v1/admin/tenants/
, using the example request body below.
{
"wallet_label": "Demo Issuer",
"wallet_name": "Faber",
"roles": ["issuer"],
"group_id": "API demo",
"image_url": "https://upload.wikimedia.org/wikipedia/commons/7/70/Example.png"
}
An example of a successful response to create a new Issuer Tenant:
{
"access_token": "tenant.eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJ3YWxsZXRfaWQiOiIwNTYxODM2Mi1iMDI0LTQ2YzUtYjgzYy02YzZiOGM3NzkyZDgiLCJpYXQiOjE3MDAxMjgxNTN9.x_0xa9glFFW44PbfoBiEQY0Lt0dOBLVJgUkdavgusWU",
"wallet_id": "05618362-b024-46c5-b83c-6c6b8c7792d8",
"wallet_label": "Demo Issuer",
"wallet_name": "Faber",
"created_at": "2025-01-16T09:49:13.067595Z",
"updated_at": "2025-01-16T09:49:13.111843Z",
"image_url": "https://upload.wikimedia.org/wikipedia/commons/7/70/Example.png",
"group_id": "API demo"
}
Verifiers
To create a verifier, follow these steps:
-
Access the API through Multitenant-Admin
-
Authenticate using the
tenant-admin.
+APIKEY
role -
Generate a new tenant with a
POST
request to the API endpoint/tenant-admin/v1/admin/tenants/
using the request body detailed in the example below{ "wallet_label": "Demo Verifier", "wallet_name": "Acme", "roles": [ "verifier" ], "group_id": "API demo", "image_url": "https://upload.wikimedia.org/wikipedia/commons/7/70/Example.png" }'
-
Below is an example of a successful response to the creation of a new Verifier Tenant:
{ "access_token": "tenant.eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJ3YWxsZXRfaWQiOiIwNTYxODM2Mi1iMDI0LTQ2YzUtYjgzYy02YzZiOGM3NzkyZDgiLCJpYXQiOjE3MDAxMjgxNTN9.x_0xa9glFFW44PbfoBiEQY0Lt0dOBLVJgUkdavgusWU", "wallet_id": "05618362-b024-46c5-b83c-6c6b8c7792d8", "wallet_label": "Demo Verifier", "wallet_name": "Acme", "created_at": "2025-01-16T09:49:13.067595Z", "updated_at": "2025-01-16T09:49:13.111843Z", "image_url": "https://upload.wikimedia.org/wikipedia/commons/7/70/Example.png", "group_id": "API demo" }
Holders
Holders are regular tenants without any additional privileges in the Trust Ecosystem. They are created in the same way,
without any roles
in the create request
-
Access the API through Multitenant-Admin
-
Authenticate using
tenant-admin.
+APIKEY
role -
Generate a new tenant with a
POST
to the API endpoint/tenant-admin/v1/admin/tenants/
using the request body in the example below{ "wallet_label": "Demo Holder", "wallet_name": "Alice", "group_id": "API demo", "image_url": "https://upload.wikimedia.org/wikipedia/commons/7/70/Example.png" }
-
Here is an example of a successful response to creating a new Holder Tenant:
{ "access_token": "tenant.eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJ3YWxsZXRfaWQiOiI0ZTBjNzBmYi1mMmFkLTRmNTktODFmMy05M2Q4ZGY5Yjk3N2EiLCJpYXQiOjE3MDAxMTkzMjJ9.lXrNVWN_bzRXkkBfOd1Yey6D0iqsHpOuXt6aZYwMLp4", "wallet_id": "4e0c70fb-f2ad-4f59-81f3-93d8df9b977a", "wallet_label": "Demo Holder", "wallet_name": "Alice", "created_at": "2025-01-16T07:22:02.086605Z", "updated_at": "2025-01-16T07:22:02.105980Z", "image_url": "https://upload.wikimedia.org/wikipedia/commons/7/70/Example.png", "group_id": "API demo" }
3. Credential Definitions
Credential definitions are expected to be created by all Issuers within the trust ecosystem who wish to issue
credentials to holders. The Trust Authority, which administers the trust ecosystem and enables tenants to write to
the Indy Ledger, acts as the Transaction Endorser
of the Trust Ecosystem. Meanwhile, Issuers serve as
Transaction Authors
within the Trust Ecosystem. For additional information on Transaction Endorsers
and
Transaction Authors
, please refer to
Aries Transaction Endorser Support.
To create credential definitions through the Transaction Endorser Protocol
for trust ecosystem issuers,
follow the steps below:
-
Access the Tenant Swagger UI
-
Authenticate as an Issuer using
tenant.
+JWTKey
x-api-key -
Create a new schema with a
POST
to the API endpoint/v1/definitions/credentials
using the request body illustrated in the example below.NOTE: The schema ID should already exist in the ledger and be accessible in the Trust Registry
{ "tag": "default", "schema_id": "JPqFhPEM4UiR2ZNK9CM4NA:2:test_schema:0.3.0" }
-
Below is an example of a successful response to writing a credential definition:
{ "id": "EfFA6wi7fcZNWzRuHeQqaj:3:CL:8:default", "tag": "default", "schema_id": "JPqFhPEM4UiR2ZNK9CM4NA:2:test_schema:0.3.0" }
4. Trust Registry
To query entries in the Trust Registry, adhere to the following steps:
-
Access the Public Swagger UI
-
Authenticate as an Issuer using
tenant.
+JWTKey
roleNOTE: The Trust Registry is currently public and accessible to anyone on the internet
-
The trust-registry has 5 GET endpoints:
-
GET
/v1/trust-registry/schemas
will return all schemas on the trust registryResponse:
[ { "did": "GXK1Ubc58DvZDe48zPYdcf", "name": "Proof of Person", "version": "0.1.0", "id": "GXK1Ubc58DvZDe48zPYdcf:2:Proof of Person:0.1.0" }, { "did": "GXK1Ubc58DvZDe48zPYdcf", "name": "Proof of Address", "version": "0.1.0", "id": "GXK1Ubc58DvZDe48zPYdcf:2:Proof of Address:0.1.0" }, { "did": "GXK1Ubc58DvZDe48zPYdcf", "name": "Proof of Medical Aid", "version": "0.1.0", "id": "GXK1Ubc58DvZDe48zPYdcf:2:Proof of Medical Aid:0.1.0" }, { "did": "GXK1Ubc58DvZDe48zPYdcf", "name": "Proof of Bank Account", "version": "0.1.0", "id": "GXK1Ubc58DvZDe48zPYdcf:2:Proof of Bank Account:0.1.0" } ]
-
GET
/v1/trust-registry/schemas/{schema_id}
will return the schema based on id passedResponse:
{ "did": "GXK1Ubc58DvZDe48zPYdcf", "name": "Proof of Bank Account", "version": "0.1.0", "id": "GXK1Ubc58DvZDe48zPYdcf:2:Proof of Bank Account:0.1.0" }
-
GET
/v1/trust-registry/actors
will return all actors on the trust registry -
Optionally one of the following query parameters can be passed to get a specific actor:
actor_did
actor_id
actor_name
Response:
[ { "id": "9bdbc626-1499-48e2-a5db-878d347e290b", "name": "[email protected]", "roles": ["issuer"], "did": "did:sov:J1Sg8UHXyuyBCUUpRY3EeZ", "didcomm_invitation": "http://cloudapi.127.0.0.1.nip.io/tenant-admin?oob=eyJAdHlwZSI6ICJodHRwczovL2RpZGNvbW0ub3JnL291dC1...Y29tbS5vcmcvZGlkZXhjaGFuZ2UvMS4wIl19" }, { "id": "fe523496-e0b5-4aea-a038-6ed6cbd686b8", "name": "[email protected]", "roles": ["verifier"], "did": "did:key:z6MkkUK3zRys1WezsaoAtXZtAJrhP7dh5qxbpJMe6cbDcW3s", "didcomm_invitation": "http://cloudapi.127.0.0.1.nip.io/tenant-admin?oob=eyJAdHlwZSI6ICJodHRwczovL2RpZGNvbW0ub3JnL291dC1vZi1iYW...jb21tLm9yZy9kaWRleGNoYW5nZS8xLjAiXX0=" }, { "id": "cf058a03-1f88-4fa9-97dc-96a9cabf8d3e", "name": "Bank Issuer & Verifier", "roles": ["issuer", "verifier"], "did": "did:sov:UhJ5C8hgSiNzpoAYwVcnW9", "didcomm_invitation": "http://cloudapi.127.0.0.1.nip.io/tenant-admin?oob=eyJAdHlwZSI6ICJodHRwczovL2RpZGNvbW0ub3Jn...odHRovL2RpZGNvbW0ub3JnL2RpZGV4Y2hhbmdlLzEuMCJdfQ==" } ]
GET
/v1/trust-registry/actors/issuers
will return all actors withissuer
as a roleGET
/v1/trust-registry/actors/verifiers
will return all actors withverifier
as a role
-
For how to establish connections, issue credentials, and verify proofs, please refer to the Example Flows guide.
Example Flow
This document will provide you with more detail through the end-to-end flows:
- Onboarding an Issuer, Verifier and a Holder
- Creating a Credential Schema
- The Issuer creating a Credential definition
- Create Connection between Issuer and Holder
- Issuing a credential to a Holder
- Create Connection between Verifier and Holder
- The Verifier doing a proof request against the Holder's Credential
- Revoking Credentials
- Verifying Revoked Credentials
- Self-Attested Attributes
- Restrictions on Proofs
- Requested Predicates
1: Onboarding Tenants
When onboarding users, also referred to as tenants or wallets, you need to use
the tenant-admin
role. Below, you will find the curl commands used to create
an Issuer
, Verifier
and a Holder
. If you are using the
Multitenant-Admin Swagger UI
to do the onboarding, just use the JSON in the field marked with -d
in the
curl commands.
The difference between an Issuer
, Verifier
and Holder
is that issuers and
verifiers have privileged roles, and are therefore written to the trust registry,
allowing them to issue credentials and to verify proof requests in our ecosystem.
A holder is a regular tenant without a role, and therefore cannot act as an
issuer or verifier. They are all "tenants", and therefore each will have a
tenant access token.
Onboard Issuer
Note the
x-api-key
used during the tenant creation that follows
curl -X 'POST' \
'http://cloudapi.127.0.0.1.nip.io/tenant-admin/v1/admin/tenants' \
-H 'accept: application/json' \
-H 'Content-Type: application/json' \
-H 'x-api-key: tenant-admin.adminApiKey' \
-d '{
"wallet_label": "Demo Issuer",
"wallet_name": "Faber",
"roles": [
"issuer"
],
"group_id": "API demo",
"image_url": "https://upload.wikimedia.org/wikipedia/commons/7/70/Example.png"
}'
Response:
{
"access_token": "tenant.eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJ3YWxsZXRfaWQiOiJkZWEwYTlmYi0wODhkLTQ2ODktYmM5Yy04YTFiYWI5MDYxNzAiLCJpYXQiOjE3MDA2MzE4NzN9.7Pwb5Q6BKHA6N9luJH1uDiHdgSZXPWwvdV4O0xZeqFQ",
"wallet_label": "Demo Issuer",
"wallet_name": "Faber",
"created_at": "2025-01-20T09:49:45.809544Z",
"updated_at": "2025-01-20T09:49:45.841851Z",
"image_url": "https://upload.wikimedia.org/wikipedia/commons/7/70/Example.png",
"group_id": "API demo"
}
The access_token
is what must be used as x-api-key to act as this tenant.
Onboard Verifier
curl -X 'POST' \
'http://cloudapi.127.0.0.1.nip.io/tenant-admin/v1/admin/tenants' \
-H 'accept: application/json' \
-H 'Content-Type: application/json' \
-H 'x-api-key: tenant-admin.adminApiKey' \
-d '{
"wallet_label": "Demo Verifier",
"wallet_name": "Acme",
"roles": [
"verifier"
],
"group_id": "API demo",
"image_url": "https://upload.wikimedia.org/wikipedia/commons/7/70/Example.png"
}'
Response:
{
"access_token": "tenant.eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJ3YWxsZXRfaWQiOiI5Mjg5MzY1OC1mZTJkLTRmMmQtODI2OC1hNjBhNjAxOTQ1YTkiLCJpYXQiOjE3MDA2MzE2MTd9.E5USXOEmKlpZelGzwGs7VxZWfQzvOBPADB2r95pyuWA",
"wallet_id": "92893658-fe2d-4f2d-8268-a60a601945a9",
"wallet_label": "Demo Verifier",
"wallet_name": "Acme",
"created_at": "2025-01-22T05:40:16.606565Z",
"updated_at": "2025-01-22T05:40:16.630619Z",
"image_url": "https://upload.wikimedia.org/wikipedia/commons/7/70/Example.png",
"group_id": "API demo"
}
Onboard Holder
curl -X 'POST' \
'http://cloudapi.127.0.0.1.nip.io/tenant-admin/v1/admin/tenants' \
-H 'accept: application/json' \
-H 'Content-Type: application/json' \
-H 'x-api-key: tenant-admin.adminApiKey' \
-d '{
"wallet_label": "Demo Holder",
"wallet_name": "Alice",
"group_id": "API demo",
"image_url": "https://upload.wikimedia.org/wikipedia/commons/7/70/Example.png"
}'
Response:
{
"access_token": "tenant.eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJ3YWxsZXRfaWQiOiIyMjcxZjdmMi03MzU5LTRkMDgtYWI2Ni0xMWI2NjFlZDA5ZjQiLCJpYXQiOjE3MDA2MzE2OTN9.uKfcvq06KSlLHlGkH9zaXHcFA3V2WzNvxRVbyNgjXNc",
"wallet_id": "2271f7f2-7359-4d08-ab66-11b661ed09f4",
"wallet_label": "Demo Holder",
"wallet_name": "Alice",
"created_at": "2025-01-22T05:41:32.662976Z",
"updated_at": "2025-01-22T05:41:32.707778Z",
"image_url": "https://upload.wikimedia.org/wikipedia/commons/7/70/Example.png",
"group_id": "API demo"
}
Next: Create Credential Schema
2: Create Schema
Only the Governance
role can create Schemas. Note the x-api-key
used in the
following request.
curl -X 'POST' \
'http://cloudapi.127.0.0.1.nip.io/governance/v1/definitions/schemas' \
-H 'accept: application/json' \
-H 'Content-Type: application/json' \
-H 'x-api-key: governance.adminApiKey' \
-d '{
"name": "Person",
"version": "0.1.0",
"attribute_names": [
"Name","Surname","Age"
]
}'
Response:
{
"id": "QpSW24YVf61A3sAWxArfF6:2:Person:0.1.0",
"name": "Person",
"version": "0.1.0",
"attribute_names": ["Surname", "Age", "Name"]
}
Note down the schema id in the id
field.
Next: Create Credential Definition
3: Create Credential Definition
Once a schema has been created by the governance agent, the Issuer
can create a credential definition
.
They will use the credential definition as a unique reference to the schema.
Creating a Credential Definition
To create a credential definition, the issuer needs to send a POST request to the appropriate endpoint. Below is an example of how to create a non-revocable credential definition:
curl -X 'POST' \
'http://cloudapi.127.0.0.1.nip.io/tenant/v1/definitions/credentials' \
-H 'accept: application/json' \
-H 'Content-Type: application/json' \
-H 'x-api-key: tenant.<Issuer token>' \
-d '{
"tag": "Demo Person",
"schema_id": "QpSW24YVf61A3sAWxArfF6:2:Person:0.1.0",
"support_revocation": false
}'
Response:
{
"id": "2hPti9M3aQqsRCy8N6jrDB:3:CL:10:Demo Person",
"tag": "Demo Person",
"schema_id": "QpSW24YVf61A3sAWxArfF6:2:Person:0.1.0"
}
Note down the credential definition id in the id
field.
If you don't need revocation support, you can continue to the next section: Create Connection. Otherwise, stick around for an explanation of revocable credential definitions.
Creating a Revocable Credential Definition
Revocation enables an issuer to revoke credentials, i.e., make a credential invalid some time after issuance. The process to make credentials revocable is straightforward, but there are a few things the issuer should keep track of. The goal of this section is to explain everything involved in revocation.
To issue credentials that are revocable, the credential definition needs to be created with revocation support enabled.
When creating a credential definition, set "support_revocation": true
. This will enable revocation on all credentials
issued against this credential definition.
Example payload for creating a revocable credential definition:
{
"tag": "My cred def",
"schema_id": "QpSW24YVf61A3sAWxArfF6:2:Person:0.1.0",
"support_revocation": true
}
The creation of a credential definition with revocation enabled can take up to a minute before a user gets a response from the API endpoint. The reason for this is the creation of revocation registries. These registries are essential for the cryptographic processes involved with revocation. See more on this here.
The management of these registries is obfuscated away from the user as it can be complicated and cumbersome. However, there are a few things to take note of. Once a registry is full, the application will automatically switch to a new registry. These registries are created on the fly, and the application will always have two "active" registries: one that is currently being used and the next one in the queue, i.e., the one the application will switch to once the current one is filled.
There is also a fee associated with the creation of these registries as there is a definition of them that needs to end up on the ledger. These definitions are needed for the revocation process to work.
There is an event associated with the creation of these revocation registries with the topic name revocation
.
Here is an example event of an initial event associated with the creation of the revocation registries:
{
"wallet_id": "8960ee4d-d79d-4444-abca-ad2edbfef600",
"topic": "revocation",
"origin": "tenant faber",
"group_id": "GroupA",
"payload": {
"created_at": "2025-01-02T08:11:11.039583Z",
"cred_def_id": "WWzcvsHULP1Fkf9GUYRZg8:3:CL:8:Epic",
"error_msg": null,
"issuer_did": "WWzcvsHULP1Fkf9GUYRZg8",
"max_cred_num": 4,
"pending_pub": [],
"record_id": "bf1219ca-75bf-4931-911b-1fe2ace39683",
"revoc_def_type": "CL_ACCUM",
"revoc_reg_def": null,
"revoc_reg_entry": null,
"revoc_reg_id": "WWzcvsHULP1Fkf9GUYRZg8:4:WWzcvsHULP1Fkf9GUYRZg8:3:CL:8:Epic:CL_ACCUM:bf1219ca-75bf-4931-911b-1fe2ace39683",
"state": "init",
"tag": null,
"tails_hash": null,
"tails_local_path": null,
"tails_public_uri": null,
"updated_at": "2025-01-02T08:11:11.039583Z"
}
}
Note: This event only fires on the creation of registries or when registries fill up and a new one takes its place. This event does not fire with the revocation of credentials.
When a credential is issued with revocation support, it will be intrinsically connected with a registry.
Next: Create Connection
4: Create Connection
Now that the Issuer has a credential definition, they can start issuing
credentials. However, in order to do that, they first need to create a
connection to the holder. There are multiple ways to create connections. We will
use the /v1/connections/
endpoints in these examples.
Create connection between Holder and Issuer
POST /v1/connections/did-exchange/create-request
This endpoint allows a tenant to send a request to another tenant with a public DID to create a connection. Tenants on the platform are configured to auto-accept connections; therefore, connections will proceed to completion automatically.
The following parameters are available on the endpoint:
their_public_did
The DID of the party you want to connect to.alias
An alias for the connection. Defaults to None.goal
Optional self-attested string for sharing the intent of the connection.goal_code
Similar to goal.my_label
Will be the wallet label, can be overwritten.use_did
Your local DID to use for the connection.use_did_method
The method to use for the connection: "did:peer:2" or "did:peer:4".use_public_did
Use your public DID for this connection. Defaults to False.
Note: Only one of
use_did
,use_did_method
oruse_public_did
should be specified. If none of these are specified, a new local DID will be created for this connection.
As the Holder
, we create a connection with the Issuer
using the did-exchange
protocol.
Response:
{
"alias": "Alice-Faber",
"connection_id": "165148b3-7e3b-4dec-9568-69694a2ba67f",
"connection_protocol": "didexchange/1.0",
"created_at": "2025-01-14T09:31:52.686641Z",
"error_msg": null,
"invitation_key": null,
"invitation_mode": "once",
"invitation_msg_id": null,
"my_did": "EYPGsWQrpZbxSEbcHRUZum",
"state": "request-sent",
"their_did": "did:sov:VvWbYuE8GAkxCgKp6FnPWK",
"their_label": null,
"their_public_did": "did:sov:VvWbYuE8GAkxCgKp6FnPWK",
"their_role": "inviter",
"updated_at": "2025-01-14T09:31:52.724460Z"
}
Both tenants can listen to Webhooks to track the progress of
the connection being made. Once the state
is completed
, the connection is
established. This can also be verified by fetching connection records for the holder or
issuer, and validating that their connection has transitioned to state: completed
.
Below is an example of a webhook event indicating the completed
state.
Note: The field IDs will be unique to each tenant, i.e., the
connection_id
of theIssuer
will be different from that of theHolder
, even though they refer to the same connection.
{
"wallet_id": "4e0c70fb-f2ad-4f59-81f3-93d8df9b977a",
"topic": "connections",
"origin": "multitenant",
"payload": {
"alias": "Holder <> Issuer",
"connection_id": "359b30a2-c98d-4c00-b318-8185d1d0e64d",
"connection_protocol": "connections/1.0",
"created_at": "2025-01-16T07:57:18.451554Z",
"error_msg": null,
"invitation_key": "8Vd5YSVBw5p6BJ8nHngZ2UcCKBmTSxQHoNWfaBQJXW5U",
"invitation_mode": "once",
"invitation_msg_id": "0ef82415-20ba-4d1e-818b-92a70355ec6e",
"my_did": "NXk4JkDpFff4MpnTwvn1Wa",
"state": "completed",
"their_did": "LN2WMyrMFH74L1GTkSteka",
"their_label": "Demo Issuer",
"their_public_did": null,
"their_role": "inviter",
"updated_at": "2025-01-16T07:57:18.748560Z"
}
}
Next: 5: Issue a Credential
5: Issuing a Credential
Now the Issuer issues credentials
Now that a connection has been made between the Issuer
and the Holder
, the Issuer
can send the credential to the
Holder
using the connection_id
from the Issuer's
perspective.
Again both tenants can listen for events on the topic:
credentials
Issuing a Non-Revocable Credential
To issue a non-revocable credential, the issuer needs to send a POST request to the appropriate endpoint. Below is an example of how to issue a non-revocable credential:
curl -X 'POST' \
'http://cloudapi.127.0.0.1.nip.io/tenant/v1/issuer/credentials' \
-H 'accept: application/json' \
-H 'Content-Type: application/json' \
-H 'x-api-key: tenant.<Issuer token>' \
-d '{
"type": "indy",
"indy_credential_detail": {
"credential_definition_id": "QrHj82kaE61jnB5451zvvG:3:CL:12:Demo Person",
"attributes": {
"Name": "Alice",
"Surname": "Holder",
"Age": "25"
}
},
"connection_id": "c78f9423-370e-4800-a48e-962456083943"
}'
Response:
{
"attributes": {
"Name": "Alice",
"Surname": "Holder",
"Age": "25"
},
"connection_id": "c78f9423-370e-4800-a48e-962456083943",
"created_at": "2025-01-20T09:59:29.820002Z",
"credential_definition_id": "QrHj82kaE61jnB5451zvvG:3:CL:12:Demo Person",
"credential_exchange_id": "v2-f126edb7-1ac1-43a3-bf1f-60b8feae4701",
"did": null,
"error_msg": null,
"role": "issuer",
"schema_id": "FS9J6WZ6KVxwy5eGH32CgM:2:Person:0.1.0",
"state": "offer-sent",
"thread_id": "9ceeb941-4ebd-42ec-9ffc-ea0b7fe39722",
"type": "indy",
"updated_at": "2025-01-20T09:59:29.820002Z"
}
As you can see from the state, an offer has now been sent, and needs to be accepted/requested by the holder.
Note that the issuer will now have what's called a credential exchange record in state: offer-sent. Pending exchange records can be viewed by calling
GET /v1/issuer/credentials
, and completed credential exchange records are deleted by default, but can be preserved by adding an optionalsave_exchange_record=True
field to the request.
Issuing a Revocable Credential
Credentials that support revocation are issued in the same way as described above, but there is additional information that the issuer needs to keep track of.
There is a webhook event topic that an issuer can subscribe to called "issuer_cred_rev"
. The "issuer_cred_rev"
event has information on the issued credential and how it is connected to the revocation registries and some metadata.
This event will fire under two circumstances:
- Once a credential (with revocation support) is issued.
- And when a credential is revoked.
The state of the event will correspond with these events, i.e. first it will be "issued" and after revocation it will be "revoked".
Let's take a look at an example event:
{
"wallet_id": "5df42bab-6719-4c8a-a615-8086435d4de4",
"topic": "issuer_cred_rev",
"origin": "tenant faber",
"group_id": "GroupA",
"payload": {
"created_at": "2025-01-30T08:51:18.177543Z",
"cred_def_id": "QrMaE11MnC6zjKNY1pxbq8:3:CL:8:Epic",
"cred_ex_id": "af4bad3f-3fcc-47ab-85e6-24224dcb2779",
"cred_ex_version": "2",
"cred_rev_id": "2",
"record_id": "57bd9c72-fa29-4f65-bd89-4e241471073a",
"rev_reg_id": "QrMaE11MnC6zjKNY1pxbq8:4:QrMaE11MnC6zjKNY1pxbq8:3:CL:8:Epic:CL_ACCUM:53462552-d716-4b0b-8b5c-914a3574d2c4",
"state": "issued",
"updated_at": "2025-01-30T08:51:18.177543Z"
}
}
Taking a look at the payload, there are a few fields we are interested in:
"cred_def_id"
or credential definition id: The same id the issuer gets when creating a credential definition (also used when issuing credentials)."cred_ex_id"
or credential exchange id: This is the same exchange id that can be found in the credential exchange record."cred_rev_id"
or credential revocation id: This is the id that ties the credential to the revocation registry."rev_reg_id"
or revocation registry id: This is the id of the revocation registry the credential was issued against.
The "issuer_cred_rev"
event is not the only place this data is available. Under the issuer API,
there is an endpoint: GET /v1/issuer/credentials/revocation/record
.
This endpoint will return the payload object of the "issuer_cred_rev"
event:
{
"created_at": "2025-01-30T08:51:18.177543Z",
"cred_def_id": "QrMaE11MnC6zjKNY1pxbq8:3:CL:8:Epic",
"cred_ex_id": "af4bad3f-3fcc-47ab-85e6-24224dcb2779",
"cred_ex_version": "2",
"cred_rev_id": "2",
"record_id": "57bd9c72-fa29-4f65-bd89-4e241471073a",
"rev_reg_id": "QrMaE11MnC6zjKNY1pxbq8:4:QrMaE11MnC6zjKNY1pxbq8:3:CL:8:Epic:CL_ACCUM:53462552-d716-4b0b-8b5c-914a3574d2c4",
"state": "issued",
"updated_at": "2025-01-30T08:51:18.177543Z"
}
This endpoint has three query parameters:
"credential_exchange_id"
"credential_revocation_id"
"revocation_registry_id"
If "credential_exchange_id"
is not provided, both the "credential_revocation_id"
and "revocation_registry_id"
must be provided.
So with the "credential_exchange_id"
(from the credential exchange record), an issuer can get the relevant data
needed to revoke the credential associated with the exchange id.
[!NOTE] Issuers take note: The most important thing the issuer needs to keep track of is how their credential exchange ids map to credentials they have issued to holders. Without knowing how their exchange ids map to their holders, they won't know which credential to revoke.
Holder requests credential
Now the Holder
needs to respond to the credential sent to them. Below the Holder
is getting all their connections.
We are doing this to get the connection_id
of the connection to the issuer.
This connection_id
can also be gotten from the SSE events
.
curl -X 'GET' \
'http://cloudapi.127.0.0.1.nip.io/tenant/v1/connections' \
-H 'accept: application/json' \
-H 'x-api-key: tenant.<Holder token>'
Response:
[
{
"alias": "Holder <> Issuer",
"connection_id": "ac3b0d56-eb33-408a-baeb-0370164d47ae",
"connection_protocol": "connections/1.0",
"created_at": "2025-01-20T09:56:41.437966Z",
"error_msg": null,
"invitation_key": "91ZNSpDgVoV12kHcmUqyp1JmGeKE7oGi9NFd2WMzKt4X",
"invitation_mode": "once",
"invitation_msg_id": "6a86e6c7-af25-4e5d-87fe-b42f559b13b9",
"my_did": "MYhLew4uq58mou8SCTNFYp",
"state": "completed",
"their_did": "6wMwbinRJ5XKyBJKm7P5av",
"their_label": "Demo Issuer",
"their_public_did": null,
"their_role": "inviter",
"updated_at": "2025-01-20T09:56:41.656141Z"
}
]
Note the connection_id
in the above response.
The Holder
can then find the credentials offered to them on this connection_id
by calling /v1/issuer/credentials
with the optional connection_id
query parameter:
curl -X 'GET' \
'http://cloudapi.127.0.0.1.nip.io/tenant/v1/issuer/credentials?connection_id=ac3b0d56-eb33-408a-baeb-0370164d47ae' \
-H 'accept: application/json' \
-H 'x-api-key: tenant.<Holder token>'
Response:
[
{
"attributes": {
"Name": "Alice",
"Surname": "Holder",
"Age": "25"
},
"connection_id": "ac3b0d56-eb33-408a-baeb-0370164d47ae",
"created_at": "2025-01-20T09:59:29.868946Z",
"credential_definition_id": "QrHj82kaE61jnB5451zvvG:3:CL:12:Demo Person",
"credential_exchange_id": "v2-c492cec7-2f2d-4d5f-b839-b57dcd8f8eee",
"did": null,
"error_msg": null,
"role": "holder",
"schema_id": "FS9J6WZ6KVxwy5eGH32CgM:2:Person:0.1.0",
"state": "offer-received",
"thread_id": "9ceeb941-4ebd-42ec-9ffc-ea0b7fe39722",
"type": "indy",
"updated_at": "2025-01-20T09:59:29.868946Z"
}
]
Note the credential_exchange_id
and state: offer-received
. Additionally, note that the holder and the issuer have
different credential_exchange_id
references for the same credential exchange interaction.
The Holder
can now request the credential, using the credential_exchange_id
from the above response,
by calling /v1/issuer/credentials/{credential_exchange_id}/request
:
curl -X 'POST' \
'http://cloudapi.127.0.0.1.nip.io/tenant/v1/issuer/credentials/v2-c492cec7-2f2d-4d5f-b839-b57dcd8f8eee/request' \
-H 'accept: application/json' \
-H 'x-api-key: tenant.<Holder token>' \
-d ''
Response:
{
"attributes": {
"Name": "Alice",
"Surname": "Holder",
"Age": "25"
},
"connection_id": "ac3b0d56-eb33-408a-baeb-0370164d47ae",
"created_at": "2025-01-20T09:59:29.868946Z",
"credential_definition_id": "QrHj82kaE61jnB5451zvvG:3:CL:12:Demo Person",
"credential_exchange_id": "v2-c492cec7-2f2d-4d5f-b839-b57dcd8f8eee",
"did": null,
"error_msg": null,
"role": "holder",
"schema_id": "FS9J6WZ6KVxwy5eGH32CgM:2:Person:0.1.0",
"state": "request-sent",
"thread_id": "9ceeb941-4ebd-42ec-9ffc-ea0b7fe39722",
"type": "indy",
"updated_at": "2025-01-20T10:02:02.708045Z"
}
The holder request has been sent, and an automated workflow will transition the credential to being stored in the holder's wallet.
We can listen on SSE and wait for state
to be done
on the topic
: credentials
{
"wallet_id": "7bb24cc8-2e56-4326-9020-7870ad67b257",
"topic": "credentials",
"origin": "multitenant",
"payload": {
"attributes": null,
"connection_id": "ac3b0d56-eb33-408a-baeb-0370164d47ae",
"created_at": "2025-01-20T09:59:29.868946Z",
"credential_definition_id": "QrHj82kaE61jnB5451zvvG:3:CL:12:Demo Person",
"credential_exchange_id": "v2-c492cec7-2f2d-4d5f-b839-b57dcd8f8eee",
"did": null,
"error_msg": null,
"role": "holder",
"schema_id": "FS9J6WZ6KVxwy5eGH32CgM:2:Person:0.1.0",
"state": "done",
"thread_id": "9ceeb941-4ebd-42ec-9ffc-ea0b7fe39722",
"type": "indy",
"updated_at": "2025-01-20T10:02:03.043100Z"
}
}
Once the state is done, the credential will be in the Holder
's wallet. We can list the credential in
the wallet by doing the following call as the Holder
:
curl -X 'GET' \
'http://cloudapi.127.0.0.1.nip.io/tenant/v1/wallet/credentials' \
-H 'accept: application/json' \
-H 'x-api-key: tenant.<Holder token>'
Response:
{
"results": [
{
"attrs": {
"Surname": "Holder",
"Name": "Alice",
"Age": "25"
},
"cred_def_id": "QrHj82kaE61jnB5451zvvG:3:CL:12:Demo Person",
"cred_rev_id": null,
"referent": "86dfb6ef-1ff5-41fd-977b-092a1d97e20b",
"rev_reg_id": null,
"schema_id": "FS9J6WZ6KVxwy5eGH32CgM:2:Person:0.1.0"
}
]
}
Note: the credential has no reference to a
credential_exchange_id
. In the wallet context, thereferent
is the credential id, and is different from thecredential_exchange_id
used during the credential exchange.
Hooray! 🥳🎉 The holder now has a credential!
Next: Create connection with Verifier
6: Create Connection between Verifier and Holder
Again we first create a connection
, this time between the Verifier
and
Holder
. For this connection we use the Out Of Band (OOB) protocol to connect to a
tenant that does not necessarily have a public DID.
Note: A verifier is not necessarily onboarded with a public DID - only if they have an issuer role too - so they can only set
use_public_did
to true if they have configured it themselves.
curl -X 'POST' \
'http://cloudapi.127.0.0.1.nip.io/tenant/v1/oob/create-invitation' \
-H 'Content-Type: application/json' \
-H 'X-Api-Key: tenant.<Verifier token>' \
-d '{
"alias": "Verifier<>Holder",
"multi_use": false,
"use_public_did": false,
"create_connection": true
}'
Response:
{
"created_at": null,
"invi_msg_id": "754dfe3b-2a08-4863-bfaf-6af7b1e44c99",
"invitation": {
"@id": "754dfe3b-2a08-4863-bfaf-6af7b1e44c99",
"@type": "https://didcomm.org/out-of-band/1.1/invitation",
"accept": null,
"goal": null,
"goal_code": null,
"handshake_protocols": [
"https://didcomm.org/didexchange/1.0",
"https://didcomm.org/connections/1.0"
],
"imageUrl": "https://upload.wikimedia.org/wikipedia/commons/7/70/Example.png",
"label": "FaberIssuer",
"requests~attach": null,
"services": [
{
"id": "#inline",
"type": "did-communication",
"recipientKeys": [
"did:key:z6MkjtuC76aqXhKQPekfT51GrtURJW8gZPXrGJi8huG6SkNx#z6MkjtuC76aqXhKQPekfT51GrtURJW8gZPXrGJi8huG6SkNx"
],
"serviceEndpoint": "http://multitenant-agent:3020"
}
]
},
"invitation_id": null,
"invitation_url": "http://multitenant-agent:3020?oob=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",
"oob_id": "12b5be90-b8fc-40a8-9568-af85b7b31c9b",
"state": "initial",
"trace": false,
"updated_at": null
}
The Holder
accepts the invitation using the invitation
object shown above.
Alternatively, the invitation can be decoded from the base64 payload in the
invitation_url
field, found after the oob=
parameter:
curl -X 'POST' \
'http://cloudapi.127.0.0.1.nip.io/tenant/v1/oob/accept-invitation' \
-H 'Content-Type: application/json' \
-H 'X-Api-Key: tenant.<Holder token>' \
-d '{
"alias": "Alice<>Verifier",
"use_existing_connection": true,
"invitation": {
"@id": "754dfe3b-2a08-4863-bfaf-6af7b1e44c99",
"@type": "https://didcomm.org/out-of-band/1.1/invitation",
"accept": null,
"goal": null,
"goal_code": null,
"handshake_protocols": [
"https://didcomm.org/didexchange/1.0",
"https://didcomm.org/connections/1.0"
],
"imageUrl": "https://upload.wikimedia.org/wikipedia/commons/7/70/Example.png",
"label": "FaberIssuer",
"requests~attach": null,
"services": [
{
"id": "#inline",
"type": "did-communication",
"recipientKeys": [
"did:key:z6MkjtuC76aqXhKQPekfT51GrtURJW8gZPXrGJi8huG6SkNx#z6MkjtuC76aqXhKQPekfT51GrtURJW8gZPXrGJi8huG6SkNx"
],
"serviceEndpoint": "http://multitenant-agent:3020"
}
]
}
}'
Response:
{
"attach_thread_id": null,
"connection_id": "c750b292-8d3e-467e-8e92-f0ecf19ee97e",
"created_at": "2025-01-15T06:21:25.555579Z",
"invi_msg_id": "754dfe3b-2a08-4863-bfaf-6af7b1e44c99",
"invitation": {
"@id": "754dfe3b-2a08-4863-bfaf-6af7b1e44c99",
"@type": "https://didcomm.org/out-of-band/1.1/invitation",
"accept": null,
"goal": null,
"goal_code": null,
"handshake_protocols": [
"https://didcomm.org/didexchange/1.0",
"https://didcomm.org/connections/1.0"
],
"imageUrl": "https://upload.wikimedia.org/wikipedia/commons/7/70/Example.png",
"label": "FaberIssuer",
"requests~attach": null,
"services": [
{
"id": "#inline",
"type": "did-communication",
"recipientKeys": [
"did:key:z6MkjtuC76aqXhKQPekfT51GrtURJW8gZPXrGJi8huG6SkNx#z6MkjtuC76aqXhKQPekfT51GrtURJW8gZPXrGJi8huG6SkNx"
],
"serviceEndpoint": "http://multitenant-agent:3020"
}
]
},
"multi_use": false,
"oob_id": "b2ae7b58-4ce2-4ee8-81cd-3bba30c6cc8f",
"our_recipient_key": null,
"role": "receiver",
"state": "deleted",
"their_service": null,
"trace": false,
"updated_at": "2025-01-15T06:21:25.555579Z"
}
Listen to Webhooks until this connection is in state
: completed
.
{
"wallet_id": "7bb24cc8-2e56-4326-9020-7870ad67b257",
"topic": "connections",
"origin": "multitenant",
"payload": {
"alias": "Holder <> Verifier",
"connection_id": "bc8f43aa-5c02-401d-86a0-45d6d08f94b8",
"connection_protocol": "connections/1.0",
"created_at": "2025-01-20T10:06:01.683789Z",
"error_msg": null,
"invitation_key": "Cn3rHufXa94xCUKoSGseXinFSn6oNBb543n15NE6mLzJ",
"invitation_mode": "once",
"invitation_msg_id": "4a68ed4b-6a86-45e2-95e9-a76edcd93bc4",
"my_did": "CnjLLG4U5RPbrYHG4cTMWw",
"state": "completed",
"their_did": "2guow2rkGp9wESxZPEWPSJ",
"their_label": "Demo Verifier",
"their_public_did": null,
"their_role": "inviter",
"updated_at": "2025-01-20T10:06:01.922033Z"
}
}
Next: Verify Issued Credential
7: Verify Issued Credential
Sending proof request
Once the connection is established, the Verifier can send a proof request.
There are optional restrictions and additional fields that can be added to the proof request, which are beyond the scope of this simple example. For more information, please see our docs for restrictions on proofs.
curl -X 'POST' \
'http://cloudapi.127.0.0.1.nip.io/tenant/v1/verifier/send-request' \
-H 'accept: application/json' \
-H 'Content-Type: application/json' \
-d '{
"comment": "Demo",
"type": "indy",
"indy_proof_request": {
"requested_attributes": {
"holder_surname": { "name": "Surname", "restrictions":[]},
"holder_name": { "name": "Name", "restrictions": []},
"holder_age": { "name": "Age", "restrictions": []}
},
"requested_predicates": {}
},
"connection_id": "5ef9f4e0-9f98-4e43-aef7-de11da2ccd40"
}'
Response:
{
"connection_id": "5ef9f4e0-9f98-4e43-aef7-de11da2ccd40",
"created_at": "2025-01-22T10:12:20.755226Z",
"error_msg": null,
"parent_thread_id": "ce5b5597-d3fa-437b-a857-0927694cc4b9",
"presentation": null,
"presentation_request": {
"name": null,
"non_revoked": null,
"nonce": "1040329690360437135931695",
"requested_attributes": {
"holder_surname": {
"name": "Surname",
"names": null,
"non_revoked": null,
"restrictions": []
},
"holder_name": {
"name": "Name",
"names": null,
"non_revoked": null,
"restrictions": []
},
"holder_age": {
"name": "Age",
"names": null,
"non_revoked": null,
"restrictions": []
}
},
"requested_predicates": {},
"version": null
},
"proof_id": "v2-57c1bf16-1fc3-4506-b672-8b11580c4920",
"role": "verifier",
"state": "request-sent",
"thread_id": "ce5b5597-d3fa-437b-a857-0927694cc4b9",
"updated_at": "2025-01-22T10:12:20.755226Z",
"verified": null
}
Note that the verifier will now have what's called a presentation exchange record in state: request-sent. Pending presentation records can be viewed by calling
GET /v1/verifier/proofs
, and completed presentation exchange records are deleted by default, but can be preserved by adding an optionalsave_exchange_record=True
field to the request.
Holder responds to proof request
The holder would have received a webhook event on topic proofs
, indicating they have received a request. Example webhook:
{
"wallet_id": "4e0c70fb-f2ad-4f59-81f3-93d8df9b977a",
"topic": "proofs",
"origin": "multitenant",
"payload": {
"connection_id": "ab1cc0fe-d797-429c-be36-7830a79d52a1",
"created_at": "2025-01-16T09:59:19.612647Z",
"error_msg": null,
"parent_thread_id": null,
"presentation": null,
"presentation_request": null,
"proof_id": "v2-ba39fb0f-4dff-4bce-8db0-fdad3432cc7d",
"role": "prover",
"state": "request-received",
"thread_id": "aea706fd-5492-4ed7-ab1c-1bb9ff309926",
"updated_at": "2025-01-16T09:59:19.612647Z",
"verified": null
}
}
The Holder will now see a presentation exchange record when they call GET
on the /v1/verifier/proofs
endpoint:
curl -X 'GET' \
'http://cloudapi.127.0.0.1.nip.io/tenant/v1/verifier/proofs' \
-H 'accept: application/json'
-H 'x-api-key: tenant.<holder token>' \
Response:
[
{
"connection_id": "ab1cc0fe-d797-429c-be36-7830a79d52a1",
"created_at": "2025-01-16T09:59:19.612647Z",
"error_msg": null,
"parent_thread_id": "aea706fd-5492-4ed7-ab1c-1bb9ff309926",
"presentation": null,
"presentation_request": {
"name": "Proof Request",
"non_revoked": null,
"nonce": "234234",
"requested_attributes": {
"holder_surname": {
"name": "surname",
"names": null,
"non_revoked": null,
"restrictions": []
},
"holder_name": {
"name": "name",
"names": null,
"non_revoked": null,
"restrictions": []
},
"holder_age": {
"name": "age",
"names": null,
"non_revoked": null,
"restrictions": []
}
},
"requested_predicates": {},
"version": "1.0"
},
"proof_id": "v2-ba39fb0f-4dff-4bce-8db0-fdad3432cc7d",
"role": "prover",
"state": "request-received",
"thread_id": "aea706fd-5492-4ed7-ab1c-1bb9ff309926",
"updated_at": "2025-01-16T09:59:19.612647Z",
"verified": null
}
]
Note that their role indicates prover
, and the state is request-received
. Prover is the term used for a holder in a
proof exchange. Additionally, note that the prover and the verifier have different proof_id
references for the same
proof interaction.
The Holder/Prover can now check which credentials match the fields that are requested in the proof request by using the
proof_id
and making a call to /v1/verifier/proofs/{proof_id}/credentials
.
NOTE: If the call is successful, but returns an empty list
[]
, it means that the credentials of theHolder
do not match the requested fields in the proof request.
curl -X 'GET' \
'http://cloudapi.127.0.0.1.nip.io/tenant/v1/verifier/proofs/v2-93e29a31-5eab-4091-9d1d-f27220f445fd/credentials' \
-H 'accept: application/json'
Response:
NOTE: This response is a list. Each object in this list corresponds to a credential, matching the requested attributes. In this case, the response has only one object, meaning all the requested attributes are found in one credential.
[
{
"cred_info": {
"attrs": {
"Age": "25",
"Surname": "Holder",
"Name": "Alice"
},
"cred_def_id": "2hPti9M3aQqsRCy8N6jrDB:3:CL:10:Demo Person",
"cred_rev_id": null,
"referent": "10e6b03f-2b60-431a-9634-731594423120",
"rev_reg_id": null,
"schema_id": "QpSW24YVf61A3sAWxArfF6:2:Person:0.1.0"
},
"interval": null,
"presentation_referents": ["holder_name", "holder_age", "holder_surname"]
}
]
We can now use the referent
(the referent is the holder's reference to their credential id) from the response above to
accept the proof request:
curl -X 'POST' \
'http://cloudapi.127.0.0.1.nip.io/tenant/v1/verifier/accept-request' \
-H 'accept: application/json' \
-H 'Content-Type: application/json' \
-d '{
"proof_id": "v2-614a1035-c855-417d-8a8e-0c824bb6ab0f",
"type": "indy",
"indy_presentation_spec": {
"requested_attributes": {
"holder_surname": {
"cred_id": "10e6b03f-2b60-431a-9634-731594423120",
"revealed": true
},
"holder_name": {
"cred_id": "10e6b03f-2b60-431a-9634-731594423120",
"revealed": true
},
"holder_age": {
"cred_id": "10e6b03f-2b60-431a-9634-731594423120",
"revealed": true
}
},
"requested_predicates": {},
"self_attested_attributes": {}
}
}'
Click to see Response
{
"connection_id": "43264326-57a7-4ef4-aa65-906dd9c15961",
"created_at": "2025-01-22T06:11:46.956062Z",
"error_msg": null,
"parent_thread_id": "13a9375e-c124-445d-9242-d77ee54cf47f",
"presentation": {
"identifiers": [
{
"cred_def_id": "2hPti9M3aQqsRCy8N6jrDB:3:CL:10:Demo Person",
"rev_reg_id": null,
"schema_id": "QpSW24YVf61A3sAWxArfF6:2:Person:0.1.0",
"timestamp": null
}
],
"proof": {
"aggregated_proof": {
"c_hash": "3219322627487542487718476352817657516298296911958347169452423884069641575597",
"c_list": [
[2,221,130,248,96,145,3,19,86,111,75,202,101,190,166,101,222,83,181,133,88,134,...]
]
},
"proofs": [
{
"non_revoc_proof": null,
"primary_proof": {
"eq_proof": {
"a_prime": "92597261364394573165798933206533873274818813554675314388834609214520451243506734698448...",
"e": "13957611453314484376536548594867291175484947973045451726862617289480834912062823268784462725...",
"m": {
"master_secret": "113138788366524810935384910670667169176189186849867816774981002913273272990310..."
},
"m2": "9527966448141582634179217567781606687146704440935821032302777460114542256740868407661366941...",
"revealed_attrs": {
"holder_age": "25",
"holder_name": "27034640024117331033063128044004318218486816931520886405535659934417438781507",
"holder_surname": "108415864455171922802944099373800995974825385451497756533671241088029831060565"
},
"v": "13310269669535827858183383537992882823597862340798892194315939604086055386082234517559247559..."
},
"ge_proofs": []
}
}
]
},
"requested_proof": {
"predicates": {},
"revealed_attr_groups": null,
"revealed_attrs": {
"holder_surname": {
"encoded": "108415864455171922802944099373800995974825385451497756533671241088029831060565",
"raw": "Holder",
"sub_proof_index": 0
},
"holder_name": {
"encoded": "27034640024117331033063128044004318218486816931520886405535659934417438781507",
"raw": "Alice",
"sub_proof_index": 0
},
"holder_age": {
"encoded": "25",
"raw": "25",
"sub_proof_index": 0
}
},
"self_attested_attrs": {},
"unrevealed_attrs": {}
}
},
"presentation_request": {
"name": "Proof Request",
"non_revoked": null,
"nonce": "234234",
"requested_attributes": {
"holder_surname": {
"name": "surname",
"names": null,
"non_revoked": null,
"restrictions": []
},
"holder_name": {
"name": "name",
"names": null,
"non_revoked": null,
"restrictions": []
},
"holder_age": {
"name": "age",
"names": null,
"non_revoked": null,
"restrictions": []
}
},
"requested_predicates": {},
"version": "1.0"
},
"proof_id": "v2-614a1035-c855-417d-8a8e-0c824bb6ab0f",
"role": "prover",
"state": "presentation-sent",
"thread_id": "13a9375e-c124-445d-9242-d77ee54cf47f",
"updated_at": "2025-01-22T06:28:01.553809Z",
"verified": null
}
If the proof request is valid, then the verification will complete automatically. Once again, we wait for the exchange
to be completed by listening on SSE. Here is an example webhook event for the topic proofs
in the done
state.
{
"wallet_id": "92893658-fe2d-4f2d-8268-a60a601945a9",
"topic": "proofs",
"origin": "multitenant",
"payload": {
"connection_id": "5ef9f4e0-9f98-4e43-aef7-de11da2ccd40",
"created_at": "2025-01-22T06:11:46.897536Z",
"error_msg": null,
"parent_thread_id": null,
"presentation": null,
"presentation_request": null,
"proof_id": "v2-e83d3d75-9eb1-4d54-a321-7d0d5c5d286e",
"role": "verifier",
"state": "done",
"thread_id": "13a9375e-c124-445d-9242-d77ee54cf47f",
"updated_at": "2025-01-22T06:28:01.704464Z",
"verified": true
}
}
Verifier can get the proof with all its data by making the following call:
curl -X 'GET' \
'http://cloudapi.127.0.0.1.nip.io/tenant/v1/verifier/proofs' \
-H 'accept: application/json'
Click to see Response
[
{
"connection_id": "5ef9f4e0-9f98-4e43-aef7-de11da2ccd40",
"created_at": "2025-01-22T06:11:46.897536Z",
"error_msg": null,
"parent_thread_id": "13a9375e-c124-445d-9242-d77ee54cf47f",
"presentation": {
"identifiers": [
{
"cred_def_id": "2hPti9M3aQqsRCy8N6jrDB:3:CL:10:Demo Person",
"rev_reg_id": null,
"schema_id": "QpSW24YVf61A3sAWxArfF6:2:Person:0.1.0",
"timestamp": null
}
],
"proof": {
"aggregated_proof": {
"c_hash": "3219322627487542487718476352817657516298296911958347169452423884069641575597",
"c_list": [
[2,221,130,248,96,145,3,19,86,111,75,202,101,190,166,101,222,83,181,133,88,134,152,205,154,157,...]
]
},
"proofs": [
{
"non_revoc_proof": null,
"primary_proof": {
"eq_proof": {
"a_prime": "9259726136439457316579893320653387327481881355467531438883460921452045124350673469620...",
"e": "1395761145331448437653654859486729117548494797304545172686261728948083491206282326878446272...",
"m": {
"master_secret": "11313878836652481093538491067066716917618918684986781677498100291327327294712..."
},
"m2": "952796644814158263417921756778160668714670444093582103230277746011454225674086840766136694...",
"revealed_attrs": {
"holder_age": "25",
"holder_name": "27034640024117331033063128044004318218486816931520886405535659934417438781507",
"holder_surname": "108415864455171922802944099373800995974825385451497756533671241088029831060565"
},
"v": "1331026966953582785818338353799288282359786234079889219431593960408605538608223451755924755..."
},
"ge_proofs": []
}
}
]
},
"requested_proof": {
"predicates": {},
"revealed_attr_groups": null,
"revealed_attrs": {
"holder_surname": {
"encoded": "108415864455171922802944099373800995974825385451497756533671241088029831060565",
"raw": "Holder",
"sub_proof_index": 0
},
"holder_name": {
"encoded": "27034640024117331033063128044004318218486816931520886405535659934417438781507",
"raw": "Alice",
"sub_proof_index": 0
},
"holder_age": {
"encoded": "25",
"raw": "25",
"sub_proof_index": 0
}
},
"self_attested_attrs": {},
"unrevealed_attrs": {}
}
},
"presentation_request": {
"name": "Proof Request",
"non_revoked": null,
"nonce": "234234",
"requested_attributes": {
"holder_surname": {
"name": "surname",
"names": null,
"non_revoked": null,
"restrictions": []
},
"holder_name": {
"name": "name",
"names": null,
"non_revoked": null,
"restrictions": []
},
"holder_age": {
"name": "age",
"names": null,
"non_revoked": null,
"restrictions": []
}
},
"requested_predicates": {},
"version": "1.0"
},
"proof_id": "v2-e83d3d75-9eb1-4d54-a321-7d0d5c5d286e",
"role": "verifier",
"state": "done",
"thread_id": "13a9375e-c124-445d-9242-d77ee54cf47f",
"updated_at": "2025-01-22T06:28:01.704464Z",
"verified": true
}
]
Hooray! 🥳🎉 Well done, you now know how to issue and verify credentials!
If you would like to learn about revoking credentials, please proceed to the next section: Revoking Credentials.
8: Revoking Credentials
Revoking a credential can take one of two routes depending on the issuer's use case.
Depending on the frequency and volume of credential revocations, issuers may choose to batch publish their revocations or not. Since there is a cost associated with publishing revocations to the ledger, it is recommended that issuers batch revocations when possible.
Automatic Publishing of Revocations
[!WARNING] This endpoint should not be used to revoke more than one credential in quick succession. For multiple revocations, follow the batching route.
The fast and easy way to revoke a credential is to automatically publish the revocation to the ledger, as shown in the example below.
POST /v1/issuer/credentials/revoke
{
"credential_exchange_id": "v2-af4bad3f-3fcc-47ab-85e6-24224dcb2779",
"credential_definition_id": "QrMaE11MnC6zjKNY1pxbq8:3:CL:8:Epic",
"auto_publish_on_ledger": true
}
The endpoint will respond with:
{
"cred_rev_ids_published": {
"QrMaE11MnC6zjKNY1pxbq8:4:QrMaE11MnC6zjKNY1pxbq8:3:CL:8:Epic:CL_ACCUM:53462552-d716-4b0b-8b5c-914a3574d2c4": [2]
}
}
The "issuer_cred_rev"
event will fire again with the updated status revoked.
{
"wallet_id": "5df42bab-6719-4c8a-a615-8086435d4de4",
"topic": "issuer_cred_rev",
"origin": "tenant faber",
"group_id": "GroupA",
"payload": {
"created_at": "2025-01-30T08:51:18.177543Z",
"cred_def_id": "QrMaE11MnC6zjKNY1pxbq8:3:CL:8:Epic",
"cred_ex_id": "af4bad3f-3fcc-47ab-85e6-24224dcb2779",
"cred_ex_version": "2",
"cred_rev_id": "2",
"record_id": "57bd9c72-fa29-4f65-bd89-4e241471073a",
"rev_reg_id": "QrMaE11MnC6zjKNY1pxbq8:4:QrMaE11MnC6zjKNY1pxbq8:3:CL:8:Epic:CL_ACCUM:53462552-d716-4b0b-8b5c-914a3574d2c4",
"state": "revoked",
"updated_at": "2025-01-30T12:21:16.686124Z"
}
}
The revocation status endpoint will also be updated to the new state.
GET /v1/issuer/credentials/revocation/record?credential_exchange_id=v2-af4bad3f-3fcc-47ab-85e6-24224dcb2779
{
"created_at": "2025-01-30T08:51:18.177543Z",
"cred_def_id": "QrMaE11MnC6zjKNY1pxbq8:3:CL:8:Epic",
"cred_ex_id": "af4bad3f-3fcc-47ab-85e6-24224dcb2779",
"cred_ex_version": "2",
"cred_rev_id": "2",
"record_id": "57bd9c72-fa29-4f65-bd89-4e241471073a",
"rev_reg_id": "QrMaE11MnC6zjKNY1pxbq8:4:QrMaE11MnC6zjKNY1pxbq8:3:CL:8:Epic:CL_ACCUM:53462552-d716-4b0b-8b5c-914a3574d2c4",
"state": "revoked",
"updated_at": "2025-01-30T12:21:16.686124Z"
}
For emphasis: every credential revoked in this manner will trigger a ledger operation, which incurs a cost. If an issuer has multiple credentials to revoke, it is recommended not to auto-publish to the ledger.
Manual Publishing of Revocations (Batching)
By setting "auto_publish_on_ledger"
to false, an issuer can call
revoke on all the credential exchange ids they would like to revoke without
performing multiple ledger operations.
POST /v1/issuer/credentials/revoke
{
"credential_exchange_id": "v2-6dbfbeeb-468f-4017-93f7-09c3602b15d4",
"credential_definition_id": "QrMaE11MnC6zjKNY1pxbq8:3:CL:8:Epic",
"auto_publish_on_ledger": false
}
The endpoint will respond with:
{
"cred_rev_ids_published": {}
}
However, the "issuer_cred_rev"
event won't fire after every call as it does with "auto_publish_on_ledger": true
,
because the credential's status will only update when the revocation has been published to the ledger.
This is also reflected in the revocation record, as the state remains issued.
GET /v1/issuer/credentials/revocation/record?credential_exchange_id=v2-6dbfbeeb-468f-4017-93f7-09c3602b15d4
{
"created_at": "2025-01-30T12:49:25.210664Z",
"cred_def_id": "QrMaE11MnC6zjKNY1pxbq8:3:CL:8:Epic",
"cred_ex_id": "6dbfbeeb-468f-4017-93f7-09c3602b15d4",
"cred_ex_version": "2",
"cred_rev_id": "3",
"record_id": "287a40fe-a23e-4675-b21f-5b72835b25be",
"rev_reg_id": "QrMaE11MnC6zjKNY1pxbq8:4:QrMaE11MnC6zjKNY1pxbq8:3:CL:8:Epic:CL_ACCUM:53462552-d716-4b0b-8b5c-914a3574d2c4",
"state": "issued",
"updated_at": "2025-01-30T12:49:25.210664Z"
}
Once revocation is called on all the credential exchange ids that need to be revoked, the revocations can then be published to the ledger.
Revocations that were called with "auto_publish_on_ledger": false"
are pending publication.
An issuer can either publish these revocations or clear the revocation, i.e., not revoke the credential.
Publishing Pending Revocations
The publish revocation endpoint can be used to publish revocations in bulk, or an issuer can be very specific about which revocations they want to publish.
The body sent to the endpoint specifies what needs to be published. This body is a revocation registry to credential map/dictionary.
Each key is a revocation registry ID (rev_reg_id
), and its value is a list
of credential revocation IDs (cred_rev_id
) to be published.
The payload below will publish 6 revocations across two registries.
POST /v1/issuer/credentials/publish-revocations
{
"revocation_registry_credential_map": {
"WWzcvsHULP1Fkf9GUYRZg8:4:WWzcvsHULP1Fkf9GUYRZg8:3:CL:8:Epic:CL_ACCUM:cd2e0473-31f7-4cde-883d-6fceac1ce0d7": [
"1",
"2",
"3"
],
"WWzcvsHULP1Fkf9GUYRZg8:4:WWzcvsHULP1Fkf9GUYRZg8:3:CL:8:Epic:CL_ACCUM:bf1219ca-75bf-4931-911b-1fe2ace39683": [
"1",
"2",
"4"
]
}
}
Providing an empty list for a registry ID instructs the system to publish all pending revocations for that ID.
The payload below will publish all pending revocations for the given registry ID (rev_reg_id
).
POST /v1/issuer/credentials/publish-revocations
{
"revocation_registry_credential_map": {
"WWzcvsHULP1Fkf9GUYRZg8:4:WWzcvsHULP1Fkf9GUYRZg8:3:CL:8:Epic:CL_ACCUM:cd2e0473-31f7-4cde-883d-6fceac1ce0d7": []
}
}
An empty map/dictionary signifies that all pending revocations across all registry IDs (belonging to the issuer) should be published.
POST /v1/issuer/credentials/publish-revocations
{
"revocation_registry_credential_map": {}
}
This endpoint responds with:
{
"cred_rev_ids_published": {
"rev_reg_id_1": [1, 2],
"rev_reg_id_2": [0, 3]
}
}
The issuer_cred_rev
event will also fire for every credential that was revoked after the revocations were published.
Clearing Pending Revocations
The clear revocation endpoint functions in the same way as the publish revocation endpoint. Instead of publishing the revocations, it clears them, i.e., the credential is not revoked and is still considered valid.
The response to the clearing endpoint is also different from the publish endpoint. The clear pending revocation endpoint responds with the still pending revocations.
The payload below will clear the pending revocation on cred_rev_id = 5
.
POST /v1/issuer/credentials/clear-pending-revocations
{
"revocation_registry_credential_map": {
"CJnbcDL4vBkRzDSw5dS1Pa:4:CJnbcDL4vBkRzDSw5dS1Pa:3:CL:8:Epic:CL_ACCUM:55bd2b4c-672b-4749-b8d3-b1b8137d1012": ["5"]
}
}
Response of still pending cred_rev_ids
for the registry:
{
"revocation_registry_credential_map": {
"CJnbcDL4vBkRzDSw5dS1Pa:4:CJnbcDL4vBkRzDSw5dS1Pa:3:CL:8:Epic:CL_ACCUM:55bd2b4c-672b-4749-b8d3-b1b8137d1012": [
"1",
"2",
"3",
"4"
]
}
}
This call will clear all pending revocations for the given registry ID.
POST /v1/issuer/credentials/clear-pending-revocations
{
"revocation_registry_credential_map": {
"CJnbcDL4vBkRzDSw5dS1Pa:4:CJnbcDL4vBkRzDSw5dS1Pa:3:CL:8:Epic:CL_ACCUM:55bd2b4c-672b-4749-b8d3-b1b8137d1012": []
}
}
Response (no more pending revocations):
{
"revocation_registry_credential_map": {}
}
This call will clear all revocations for all registries.
POST /v1/issuer/credentials/clear-pending-revocations
{
"revocation_registry_credential_map": {}
}
Response (no more pending revocations):
{
"revocation_registry_credential_map": {}
}
Getting Pending Revocations per Revocation Registry
An issuer can get the pending revocations per revocation registry.
This is very easy to do; just call the following endpoint with the rev_reg_id
:
GET /v1/issuer/credentials/get-pending-revocations/{revocation_registry_id}
Response:
{
"pending_cred_rev_ids": [0, 1, 2, 3]
}
The response contains the integers of the cred_rev_ids
that are pending revocation for the rev_reg_id
called.
Next: Verifying Revoked Credentials
Verifying Revoked Credentials
In order to make sure a credential is not revoked, when making a proof request, it is important to include the
non_revoked
field. This field defines a time frame where a verifier wants a credential to be valid i.e. not revoked.
To define this time frame, the non_revoked
field has two subfields from
(optional) and to
, both accepting dates in
seconds since the Unix epoch. In most cases, the current time should be used, as the verifier is typically interested in
credentials that are valid at the time of sending the proof request. Unless, of course, the verifier's use case requires
some specific time.
NB: The
non-revoked
field can be passed as an empty object ("non-revoked":{}
), then the application will use the current time when sending the proof request.
The non-revoked
field can be specified for all requested attributes (global):
...
"indy_proof_request": {
"non_revoked": {
"from": 0,
"to": 1714727880
},
"requested_attributes": {
...
or it can be added to specific attributes individually:
...
"indy_proof_request": {
"requested_attributes": {
"surname": { "name": "Surname", "non_revoked":{"to":1714727880}},
...
When both are specified simultaneously, the attribute-specific one will take priority:
...
"indy_proof_request": {
"non_revoked":{"to":1714727999},
"requested_attributes": {
"surname": { "name": "Surname", "non_revoked":{"to":1714727880}},
"name": {"name": "Name"}
...
In the above snippet,
Surname
will be checked against the"non_revoked": {"to": 1714727880}
value, whileName
will be checked against the global value"non_revoked": {"to": 1714727999}
.
Verifying non-revoked before the revocation date
When specifying a non_revoked
time frame that precedes the revocation time, the proof request will pass. This is by
design as the credential was valid in that time frame.
Let's demonstrate:
Listing the holder's credentials:
GET /wallet/credentials
Response:
{
"results": [
{
"attrs": {
"Surname": "Alice",
"Age": "25",
"Name": "Holder"
},
"cred_def_id": "BzDvB7StHDD1HQKczybHWC:3:CL:16:Demo_Person",
"cred_rev_id": "1",
"referent": "47b18eb8-35f1-4d89-865e-d8355bec77fe",
"rev_reg_id": "BzDvB7StHDD1HQKczybHWC:4:BzDvB7StHDD1HQKczybHWC:3:CL:16:Demo_Person:CL_ACCUM:73890f4d-42fd-42c5-9a2e-b39fe0358fc6",
"schema_id": "Pp7wcmoHgeMb3td99E5Yo8:2:Person:0.1.0"
}
]
}
The holder can check the revocation status of their credential:
GET /wallet/credentials/47b18eb8-35f1-4d89-865e-d8355bec77fe/revocation-status
Response:
{
"revoked": true
}
The holder can see that their credential is revoked. Let's try a verification flow with this credential.
In this example, the verifier sends a request specifying a date/time (2025-01-07 9:00 AM) before the revocation:
POST /verifier/send-request
Request body:
{
"comment": "string",
"trace": true,
"type": "indy",
"indy_proof_request": {
"non_revoked": {
"from": 0,
"to": 1715065200
},
"requested_attributes": {
"surname": { "name": "Surname" },
"name": { "name": "Name" },
"age": { "name": "Age" }
},
"requested_predicates": {}
},
"save_exchange_record": true,
"connection_id": "cf45f341-57ad-42bc-b727-6f35e311e7e7"
}
The holder responds:
POST /verifier/accept-request
Request body:
{
"proof_id": "v2-142c6cd8-a84c-441f-b099-2b39ed6d2099",
"type": "indy",
"indy_presentation_spec": {
"requested_attributes": {
"age": {
"cred_id": "47b18eb8-35f1-4d89-865e-d8355bec77fe",
"revealed": true
},
"name": {
"cred_id": "47b18eb8-35f1-4d89-865e-d8355bec77fe",
"revealed": true
},
"surname": {
"cred_id": "47b18eb8-35f1-4d89-865e-d8355bec77fe",
"revealed": true
}
},
"requested_predicates": {},
"self_attested_attributes": {}
},
"save_exchange_record": true
}
The verifier will receive the following webhook on the proofs
topic:
{
"wallet_id": "9a7adafe-3a09-499b-a171-6d39a426bf9e",
"topic": "proofs",
"origin": "tenant faber",
"group_id": "GroupA",
"payload": {
"connection_id": "cf45f341-57ad-42bc-b727-6f35e311e7e7",
"created_at": "2025-01-07T07:21:58.776430Z",
"error_msg": null,
"parent_thread_id": null,
"presentation": null,
"presentation_request": null,
"proof_id": "v2-635d106c-7777-4368-bc57-d24f7f878343",
"role": "verifier",
"state": "done",
"thread_id": "b8c70d2b-fe36-4216-9d0a-7c30a6fceb5e",
"updated_at": "2025-01-07T07:29:10.445048Z",
"verified": true
}
}
As you can see, the holder's credential is valid ("verified": true
), since the verifier requested a
non_revoked
timestamp before the revocation took place.
Verifying non-revoked after revocation date
Now, the verifier specifies a date/time (2025-01-07 9:11 AM) after the revocation occurred
POST /verifier/send-request
Request body:
{
"comment": "string",
"trace": true,
"type": "indy",
"indy_proof_request": {
"non_revoked": {
"from": 0,
"to": 1715065860
},
"requested_attributes": {
"surname": { "name": "Surname" },
"name": { "name": "Name" },
"age": { "name": "Age" }
},
"requested_predicates": {}
},
"save_exchange_record": true,
"connection_id": "cf45f341-57ad-42bc-b727-6f35e311e7e7"
}
The holder responds:
POST /verifier/accept-request
Request body:
{
"proof_id": "v2-1894498a-579b-4dd9-9875-856c7f3f4381",
"type": "indy",
"indy_presentation_spec": {
"requested_attributes": {
"age": {
"cred_id": "47b18eb8-35f1-4d89-865e-d8355bec77fe",
"revealed": true
},
"name": {
"cred_id": "47b18eb8-35f1-4d89-865e-d8355bec77fe",
"revealed": true
},
"surname": {
"cred_id": "47b18eb8-35f1-4d89-865e-d8355bec77fe",
"revealed": true
}
},
"requested_predicates": {},
"self_attested_attributes": {}
},
"save_exchange_record": true
}
The verifier will receive the following webhook:
{
"wallet_id": "9a7adafe-3a09-499b-a171-6d39a426bf9e",
"topic": "proofs",
"origin": "tenant faber",
"group_id": "GroupA",
"payload": {
"connection_id": "cf45f341-57ad-42bc-b727-6f35e311e7e7",
"created_at": "2025-01-07T08:02:41.229378Z",
"error_msg": null,
"parent_thread_id": null,
"presentation": null,
"presentation_request": null,
"proof_id": "v2-6aaf1b87-45aa-49ee-8e2e-24fe79663fa6",
"role": "verifier",
"state": "done",
"thread_id": "53fe75f8-f4b8-4e22-ae1a-b3a13f2f41c9",
"updated_at": "2025-01-07T08:18:33.060039Z",
"verified": false
}
}
As you can see, the verification has now failed ("verified": false
).
Congratulations! You now know how to verify if credentials are revoked or not. 🥳🎉
Self-Attested Attributes
ACA-Py allows a holder/prover to respond to proof requests with self-attested values for requested attributes. This means the prover can provide values that are not represented by credentials in their wallet.
Responding with self-attested attributes
If a prover receives a proof request they can respond with self-attested values. However if there are restrictions on these attributes and the prover responds with self-attested attributes, then the proof will fail.
Let's take a look at how to respond with self_attested_attributes
.
Below a verifier will send a proof request, requesting the prover's name
and cell_number
.
The verifier sends the proof request:
POST /v1/verifier/send-request
{
"comment": "Demo",
"type": "indy",
"indy_proof_request": {
"requested_attributes": {
"given_name": { "name": "name" },
"cellphone": { "name": "cell_number" }
},
"requested_predicates": {}
},
"save_exchange_record": true,
"connection_id": "38f14bc4-4ec5-42bc-8f69-ffe8f792dfaf"
}
Taking a look at the proof request above, the verifier requested two different attributes with attribute
referents given_name
and cellphone
, each requesting attribute name
and cell_number
respectively.
Take a look at how the prover responds to the proof below, specifically in regard to the attribute referent
cellphone
. By doing this, the prover is able to provide a value that they don't have in their credentials.
POST /v1/verifier/accept-request
{
"proof_id": "v2-d0d0e554-ce14-492e-935e-64a7be72ec5b",
"type": "indy",
"indy_presentation_spec": {
"requested_attributes": {
"given_name": {
"cred_id": "cb844509-c687-48aa-bbea-dbaecca28a11",
"revealed": true
}
},
"requested_predicates": {},
"self_attested_attributes": {
"cellphone": "0123456789"
}
}
}
In the verifier's proof record below, we can see the values the prover responded with can be found
under self_attested_attrs
.
Note that some large payloads are obfuscated in the following response for readability.
{
"connection_id": "38f14bc4-4ec5-42bc-8f69-ffe8f792dfaf",
"created_at": "2025-01-05T11:09:25.161719Z",
"error_msg": null,
"parent_thread_id": "839aae9d-29e7-4e7b-aad5-f157d62fe750",
"presentation": {
"identifiers": [
{
"cred_def_id": "Ph5VFe1yyiwoPKbJmn33d6:3:CL:16:Demo_cred_def",
"rev_reg_id": null,
"schema_id": "4vedijxB6SCddvXVYWaTwP:2:Demo:0.1.0",
"timestamp": null
}
],
"proof": {
"aggregated_proof": {...},
"proofs": [...]
},
"requested_proof": {
"predicates": {},
"revealed_attr_groups": null,
"revealed_attrs": {
"given_name": {
"encoded": "...",
"raw": "Alice",
"sub_proof_index": 0
}
},
"self_attested_attrs": {
"cellphone": "0123456789"
},
"unrevealed_attrs": {}
}
},
"presentation_request": {
"name": "Proof",
"non_revoked": null,
"nonce": "1177112554048610547997440",
"requested_attributes": {
"given_name": {
"name": "name",
"names": null,
"non_revoked": null,
"restrictions": null
},
"self_attested": {
"name": "cell_number",
"names": null,
"non_revoked": null,
"restrictions": null
}
},
"requested_predicates": {},
"version": "1.0"
},
"proof_id": "v2-9d2d22b0-7381-4070-8929-6578399c9ae9",
"role": "verifier",
"state": "done",
"thread_id": "839aae9d-29e7-4e7b-aad5-f157d62fe750",
"updated_at": "2025-01-05T11:10:55.867679Z",
"verified": true
}
Note that the proof is valid (verified: true
), and that the prover's cellphone number is available in
the self_attested_attrs
section as cell_number
, the name of the requested attribute.
Implementing Restrictions on Proofs
Both the requested_attributes
and requested_predicates
fields have a
restrictions
field.
The restrictions
field is crucial for specifying conditions on the credentials
used to respond to proofs.
Restrictions are applied the same way to requested_attributes
and
requested_predicates
.
Fields to Restrict On
The fields in the list below can be used to apply restrictions to proofs:
schema_name
schema_id
schema_version
schema_issuer_did
(DID of the entity that issued the schema)issuer_did
(DID of the issuer of the credential)cred_def_id
(ID of the credential definition)attr::attr-name::value
(whereattr-name
is the name of an attribute in a credential)
Example Payload of Restrictions in Proofs
Below is an example body of a proof request with restrictions on the
requested_attributes
:
{
"comment": "test",
"type": "indy",
"indy_proof_request": {
"requested_attributes": {
"g_name": {
"name": "name",
"restrictions": [
{
"schema_name": "demo",
"schema_id": "EoNkijxxJx3RSpnFPQvweP:2:demo:0.1.0",
"schema_version": "0.1.0",
"schema_issuer_did": "EoNkijxxJx3RSpnFPQvweP",
"issuer_did": "8c7aBwbxcN8y6mEKBavq54",
"cred_def_id": "8c7aBwbxcN8y6mEKBavq54:3:CL:16:cred_def_1",
"attr::surname::value": "Demo"
}
]
}
},
"requested_predicates": {}
},
"save_exchange_record": false,
"connection_id": "8277590e-ffb5-4437-9226-3a06e1f22031"
}
Applying all of the schema restrictions to a proof request can be overkill.
In ACA-Py, the schema_id
is made up of the schema name, version, and schema
issuer DID.
Therefore, if a restriction is applied to the schema_id
, then effectively the
schema_name
, schema_version
, and schema_issuer_did
restrictions have also
been applied.
The last restriction in the list "attr::surname::value":"Demo"
ensures that
the credential has an attribute named surname
with the value Demo
.
Example Proof Flow with Restrictions
Below is the result of listing the credentials in a holder's wallet.
All of the credentials have the attributes name
and surname
, but all three of
the credentials are based on unique schemas and credential definitions with
extra/different attributes.
GET /v1/wallet/credentials
{
"results": [
{
"attrs": {
"surname": "Demo",
"name": "Alice"
},
"cred_def_id": "3aMAZrkZkA7odBfZkEL15Y:3:CL:16:cred_def_1",
"cred_rev_id": null,
"referent": "4225da38-975b-4efc-93a8-32577cc5ba46",
"rev_reg_id": null,
"schema_id": "S73FJ6deq6fRhBEfiTckkA:2:Demo1:0.0.1"
},
{
"attrs": {
"is_cool": "True",
"surname": "Demo",
"sa_citizen": "yes",
"name": "Alice"
},
"cred_def_id": "3aMAZrkZkA7odBfZkEL15Y:3:CL:18:cred_def_3",
"cred_rev_id": null,
"referent": "76d3f7be-4367-48f4-86d9-05343ddd48d4",
"rev_reg_id": null,
"schema_id": "S73FJ6deq6fRhBEfiTckkA:2:Demo3:0.0.3"
},
{
"attrs": {
"sa_citizen": "yes",
"name": "Alice",
"surname": "Demo"
},
"cred_def_id": "3aMAZrkZkA7odBfZkEL15Y:3:CL:17:cred_def_2",
"cred_rev_id": null,
"referent": "3a100d3e-13cb-457b-8248-ad61589514c3",
"rev_reg_id": null,
"schema_id": "S73FJ6deq6fRhBEfiTckkA:2:Demo2:0.0.2"
}
]
}
No Restrictions on Proof Request
When sending a proof request for the attribute surname
, with no restrictions, we
see that the holder can respond with any one of the credentials:
POST /v1/verifier/send-request
{
"type": "indy",
"indy_proof_request": {
"requested_attributes": {
"get_surname": {
"name": "surname",
"restrictions": []
}
},
"requested_predicates": {}
},
"save_exchange_record": true,
"connection_id": "696f19ef-6cb9-4ca3-a729-9d02f0c47e1e"
}
When the holder checks what credentials can respond to the proof by calling the
route below with the proof_id
, we see that the holder can respond with any of the credentials, as all of them
can satisfy the get_surname
property in the requested_attributes
.
GET /v1/verifier/proofs/{proof_id}/credentials
[
{
"cred_info": {
"attrs": {
"name": "Alice",
"surname": "Demo"
},
"cred_def_id": "3aMAZrkZkA7odBfZkEL15Y:3:CL:16:cred_def_1",
"cred_rev_id": null,
"referent": "4225da38-975b-4efc-93a8-32577cc5ba46",
"rev_reg_id": null,
"schema_id": "S73FJ6deq6fRhBEfiTckkA:2:Demo1:0.0.1"
},
"interval": null,
"presentation_referents": ["get_surname"]
},
{
"cred_info": {
"attrs": {
"sa_citizen": "yes",
"surname": "Demo",
"name": "Alice",
"is_cool": "True"
},
"cred_def_id": "3aMAZrkZkA7odBfZkEL15Y:3:CL:18:cred_def_3",
"cred_rev_id": null,
"referent": "76d3f7be-4367-48f4-86d9-05343ddd48d4",
"rev_reg_id": null,
"schema_id": "S73FJ6deq6fRhBEfiTckkA:2:Demo3:0.0.3"
},
"interval": null,
"presentation_referents": ["get_surname"]
},
{
"cred_info": {
"attrs": {
"sa_citizen": "yes",
"surname": "Demo",
"name": "Alice"
},
"cred_def_id": "3aMAZrkZkA7odBfZkEL15Y:3:CL:17:cred_def_2",
"cred_rev_id": null,
"referent": "3a100d3e-13cb-457b-8248-ad61589514c3",
"rev_reg_id": null,
"schema_id": "S73FJ6deq6fRhBEfiTckkA:2:Demo2:0.0.2"
},
"interval": null,
"presentation_referents": ["get_surname"]
}
]
Restriction on Schema ID
Below, the proof request has a restriction on schema_id
:
POST /v1/verifier/send-request
{
"type": "indy",
"indy_proof_request": {
"requested_attributes": {
"get_surname": {
"name": "surname",
"restrictions": [
{
"schema_id": "S73FJ6deq6fRhBEfiTckkA:2:Demo1:0.0.1"
}
]
}
},
"requested_predicates": {}
},
"save_exchange_record": true,
"connection_id": "696f19ef-6cb9-4ca3-a729-9d02f0c47e1e"
}
When the holder checks which credential will satisfy the proof request, only the
credential with the schema_id
that matches the restriction is returned.
GET /v1/verifier/proofs/{proof_id}/credentials
[
{
"cred_info": {
"attrs": {
"name": "Alice",
"surname": "Demo"
},
"cred_def_id": "3aMAZrkZkA7odBfZkEL15Y:3:CL:16:cred_def_1",
"cred_rev_id": null,
"referent": "4225da38-975b-4efc-93a8-32577cc5ba46",
"rev_reg_id": null,
"schema_id": "S73FJ6deq6fRhBEfiTckkA:2:Demo1:0.0.1"
},
"interval": null,
"presentation_referents": ["get_surname"]
}
]
Restriction on Credential Definition ID
When restricting to the credential definition ID (cred_def_id
):
POST /v1/verifier/send-request
{
"type": "indy",
"indy_proof_request": {
"requested_attributes": {
"get_surname": {
"name": "surname",
"restrictions": [
{
"cred_def_id": "3aMAZrkZkA7odBfZkEL15Y:3:CL:17:cred_def_2"
}
]
}
},
"requested_predicates": {}
},
"save_exchange_record": true,
"connection_id": "696f19ef-6cb9-4ca3-a729-9d02f0c47e1e"
}
When the holder checks which credential will satisfy the proof request, only the
credential with the cred_def_id
that matches the restriction is returned.
GET /v1/verifier/proofs/{proof_id}/credentials
[
{
"cred_info": {
"attrs": {
"sa_citizen": "yes",
"name": "Alice",
"surname": "Demo"
},
"cred_def_id": "3aMAZrkZkA7odBfZkEL15Y:3:CL:17:cred_def_2",
"cred_rev_id": null,
"referent": "3a100d3e-13cb-457b-8248-ad61589514c3",
"rev_reg_id": null,
"schema_id": "S73FJ6deq6fRhBEfiTckkA:2:Demo2:0.0.2"
},
"interval": null,
"presentation_referents": ["get_surname"]
}
]
Restriction on Value of Attribute in Credential
When restricting to an attribute value that is in one of the credentials.
In this case, we check that the holder has the attribute is_cool
and the value
is True
.
POST /v1/verifier/send-request
{
"type": "indy",
"indy_proof_request": {
"requested_attributes": {
"get_surname": {
"name": "surname",
"restrictions": [
{
"attr::is_cool::value": "True"
}
]
}
},
"requested_predicates": {}
},
"save_exchange_record": true,
"connection_id": "696f19ef-6cb9-4ca3-a729-9d02f0c47e1e"
}
When the holder checks which credential will satisfy the proof, the credential
with the is_cool
attribute with value True
is returned.
GET /v1/verifier/proofs/{proof_id}/credentials
[
{
"cred_info": {
"attrs": {
"is_cool": "True",
"surname": "Demo",
"sa_citizen": "yes",
"name": "Alice"
},
"cred_def_id": "3aMAZrkZkA7odBfZkEL15Y:3:CL:18:cred_def_3",
"cred_rev_id": null,
"referent": "76d3f7be-4367-48f4-86d9-05343ddd48d4",
"rev_reg_id": null,
"schema_id": "S73FJ6deq6fRhBEfiTckkA:2:Demo3:0.0.3"
},
"interval": null,
"presentation_referents": ["get_surname"]
}
]
Restriction on Attribute Value Not in Credentials
When restricting to an attribute value that is not in any of the credentials:
POST /v1/verifier/send-request
{
"type": "indy",
"indy_proof_request": {
"requested_attributes": {
"get_surname": {
"name": "surname",
"restrictions": [
{
"attr::is_cool::value": "False"
}
]
}
},
"requested_predicates": {}
},
"save_exchange_record": true,
"connection_id": "696f19ef-6cb9-4ca3-a729-9d02f0c47e1e"
}
When the holder checks if they have a credential that satisfies the proof, no credential is returned.
GET /v1/verifier/proofs/{proof_id}/credentials
[]
This indicates to the holder that they do not have any credentials that satisfy the restrictions in the proof request.
Proof Request with Requested Predicates
In ACA-Py, requested predicates are conditions used in proof requests to ensure that certain attributes meet specific criteria without revealing the actual attribute values.
Predicates enable verifiers to request proofs that certain numeric attributes (like age, income, or date) satisfy conditions such as greater than (>), less than (<), greater than or equal to (>=), or less than or equal to (<=) a specified value.
This allows for selective disclosure, enhancing privacy by only proving the required attribute conditions without disclosing the exact values.
The Credential
In order to make a proof request with requested predicates, the credential will need to have an attribute with a value that is an integer. However, if a credential is issued as a string of integers, ACA-Py can convert that to an integer to perform the predicate check.
Furthermore, it is important for the verifier to understand how a credential attribute was set by an issuer to accurately incorporate a predicate in the proof request.
The Proof Request
Let's take a look at the requested_predicates
object in the indy_proof_request
object.
"requested_predicates":{
"name": string,
"p_type": string,
"p_value": int,
"restrictions": <restrictions>,
"non_revoked": <non_revoc_interval>,
}
- The
name
field is the same as in therequested_attributes
; it refers to theattribute
of the credential that is being checked. - The
p_type
can be one of the following strings:>=
greater or equal<=
less or equal>
greater as<
less than
- The
p_value
is the integer that the credential value is being checked against. - The
restrictions
field is used to put restrictions on the credential attribute the prover can respond with. Please take a look at this for more information on restrictions. non-revoked
: See the revocation section of the documentation for information on how to check if a credential is revoked.
Example Proof Flow
Below is an example of a proof request with a requested_predicates
on the attribute dob
(date of birth). The
goal of the predicate is to determine if the holder is over the age of 18, without sharing the holder's date of birth.
It has been noted that the verifier needs to understand how a credential attribute has been set to accurately incorporate a predicate. Let's take a look at the credential that has been used here:
{
"attrs": {
"dob": "19900101",
"surname": "Demo",
"name": "Alice"
},
"cred_def_id": "JQKddffbKAw46ERuwLK5cF:3:CL:16:Demo_cred_def",
"cred_rev_id": "1",
"referent": "484f7946-b897-4767-914f-9a9357d4c2db",
"rev_reg_id": "JQKddffbKAw46ERuwLK5cF:4:JQKddffbKAw46ERuwLK5cF:3:CL:16:Demo_cred_def:CL_ACCUM:5c7eb3ed-fbf3-4bf0-a711-ecd8a9365236",
"schema_id": "4dcSmgArjVgpnfjiy6yNAo:2:Demo_schema:0.1.0"
}
We can see that the dob
has the format yyyymmdd
, so the verifier can check if a holder's birth date is before the
date required to be 18 years old. So the verifier needs to check that: {holder's_dob} <= {date_18_years_ago}
.
Issue proof request
POST v1/verifier/send-request
with body:
{
"comment": "Demo",
"trace": true,
"type": "indy",
"indy_proof_request": {
"requested_attributes": {},
"requested_predicates": {
"age_over_18": {
"name": "dob",
"p_type": "<=",
"p_value": 20060530,
"restrictions": [
{
"cred_def_id": "JQKddffbKAw46ERuwLK5cF:3:CL:16:Demo_cred_def"
}
]
}
}
},
"save_exchange_record": true,
"connection_id": "b993c5db-71bc-4733-a0d9-a72b106ce435"
}
Note the restriction on the
cred_def_id
above. This ensures the credential comes from a specific issuer and credential definition where we know how thedob
has been set.
The holder checks if they have a credential that can satisfy the proof request
GET v1/verifier/proofs/v2-8797794c-cbc0-46be-9a63-2e5d1dc06f6c/credentials
Response:
[
{
"cred_info": {
"attrs": {
"dob": "19900101",
"surname": "Demo",
"name": "Alice"
},
"cred_def_id": "JQKddffbKAw46ERuwLK5cF:3:CL:16:Demo_cred_def",
"cred_rev_id": "1",
"referent": "484f7946-b897-4767-914f-9a9357d4c2db",
"rev_reg_id": "JQKddffbKAw46ERuwLK5cF:4:JQKddffbKAw46ERuwLK5cF:3:CL:16:Demo_cred_def:CL_ACCUM:5c7eb3ed-fbf3-4bf0-a711-ecd8a9365236",
"schema_id": "4dcSmgArjVgpnfjiy6yNAo:2:Demo_schema:0.1.0"
},
"interval": null,
"presentation_referents": ["age_over_18"]
}
]
The response above shows that the credential returned can be used to respond to the requested predicate age_over_18
.
The holder accepts the proof request
POST v1/verifier/accept-request
with body:
{
"proof_id": "v2-8797794c-cbc0-46be-9a63-2e5d1dc06f6c",
"type": "indy",
"indy_presentation_spec": {
"requested_attributes": {},
"requested_predicates": {
"age_over_18": {
"cred_id": "484f7946-b897-4767-914f-9a9357d4c2db"
}
},
"self_attested_attributes": {}
},
"save_exchange_record": true
}
The verifier's proof records
The verifier's webhook events will update on the topic proofs
:
{
"wallet_id": "c32d6406-c200-4b5f-a126-c301ef112477",
"topic": "proofs",
"origin": "tenant faber",
"group_id": "GroupA",
"payload": {
"connection_id": "b993c5db-71bc-4733-a0d9-a72b106ce435",
"created_at": "2025-01-30T09:24:07.325448Z",
"error_msg": null,
"parent_thread_id": null,
"presentation": null,
"presentation_request": null,
"proof_id": "v2-284e8535-fa1a-4aac-8121-d192747030a0",
"role": "verifier",
"state": "done",
"thread_id": "17e82614-1304-4c1c-8778-fc81ba18ee4c",
"updated_at": "2025-01-30T09:29:37.117900Z",
"verified": true
}
}
We can see above that the proof request is complete (state: done
) and the predicate is satisfied (verified: true
).
Let's take a look at the verifier's proof record of the above exchange. Take note of the fact that the revealed_attrs
field is empty and the dob
attribute has not been revealed.
Note that some large payloads are obfuscated in the following response for readability.
{
"connection_id": "b993c5db-71bc-4733-a0d9-a72b106ce435",
"created_at": "2025-01-30T09:24:07.325448Z",
"error_msg": null,
"parent_thread_id": "17e82614-1304-4c1c-8778-fc81ba18ee4c",
"presentation": {
"identifiers": [
{
"cred_def_id": "JQKddffbKAw46ERuwLK5cF:3:CL:16:Demo_cred_def",
"rev_reg_id": "JQKddffbKAw46ERuwLK5cF:4:JQKddffbKAw46ERuwLK5cF:3:CL:16:Demo_cred_def:CL_ACCUM:5c7eb3ed-fbf3-4bf0-a711-ecd8a9365236",
"schema_id": "4dcSmgArjVgpnfjiy6yNAo:2:Demo_schema:0.1.0",
"timestamp": null
}
],
"proof": {
"aggregated_proof": {
"c_hash": "68083911735211467518460000736130275255547049313413354347790350217175401850873",
"c_list": [
[...],
[...],
[...],
[...],
[...],
[...]
]
},
"proofs": [
{
"non_revoc_proof": null,
"primary_proof": {
"eq_proof": {
"a_prime": ...,
"e": "119387358330875008402881076664442056750743658498957523102535902524764053894914591462886392266566631581734329790860931884982192173917395976",
"m": {
"name": "7206276404206857526783008541561244555270605578873171016811937079648008986898196821392261775064255800859371904017451184715729911369974354710297447142369137945850835288326799057347",
"dob": "7368174653071291467509243264983933988639387392718531361951217165284981758551875371467982169180823227163338243768448614046815815061385189049986863952228267732988077455166323300407",
"surname": "9277859084159715510916067354455243694867960264025518355252696241577763324112627218858326603964984582107518819046740146145718105070048856832278651029469711744592187338261777919850",
"master_secret": "15045190061493745649555708650672366392238186118529591984135989041588891839998311612694530842691834680254513558290039881402761553159200315443609127293501475087910035652196924119659"
},
"m2": ...,
"revealed_attrs": {},
"v": ...
},
"ge_proofs": [
{
"alpha": ...,
"mj": ...,
"predicate": {
"attr_name": "dob",
"p_type": "LE",
"value": 20060530
},
"r": {...},
"t": {...},
"u": {...}
}
]
}
}
]
},
"requested_proof": {
"predicates": {
"age_over_18": {
"sub_proof_index": 0
}
},
"revealed_attr_groups": null,
"revealed_attrs": {},
"self_attested_attrs": {},
"unrevealed_attrs": {}
}
},
"presentation_request": {
"name": "Proof",
"non_revoked": null,
"nonce": "824421356049834403305010",
"requested_attributes": {},
"requested_predicates": {
"age_over_18": {
"name": "dob",
"non_revoked": null,
"p_type": "<=",
"p_value": 20060530,
"restrictions": [
{
"cred_def_id": "JQKddffbKAw46ERuwLK5cF:3:CL:16:Demo_cred_def"
}
]
}
},
"version": "1.0"
},
"proof_id": "v2-284e8535-fa1a-4aac-8121-d192747030a0",
"role": "verifier",
"state": "done",
"thread_id": "17e82614-1304-4c1c-8778-fc81ba18ee4c",
"updated_at": "2025-01-30T09:29:37.117900Z",
"verified": true
}
Hooray! 🥳🎉 Well done, you now know how to send and respond to a predicate proof.
Common Steps
This document provides a quick overview of the most common steps: creating wallets, issuing credentials, and verifying credentials. More detailed descriptions of the different steps can be found in the Example Flows document.
Note: It is always helpful to inspect the Swagger UIs to understand the available endpoints, their expected inputs, and the corresponding outputs. If requests fail, check the Swagger UI to ensure you've called the correct endpoint with the correct data. The Swagger UIs are accessible, under a vanilla setup, at:
- Multitenant-Admin (Managing tenants) -> http://cloudapi.127.0.0.1.nip.io/tenant-admin/docs
- Governance (Acting as governance) -> http://cloudapi.127.0.0.1.nip.io/governance/docs
- Tenant (Acting as a tenant) -> http://cloudapi.127.0.0.1.nip.io/tenant/docs
- Public (Interface to read the trust registry) -> http://cloudapi.127.0.0.1.nip.io/public/docs
If you find any model descriptions unclear in the document below, try checking the Swagger UI documentation before opening an issue.
It is also recommended to understand and perhaps set up a webhook listener (refer to our Webhooks doc). This will significantly aid in observing the activities occurring in the ACA-Py instances in the background.
Creating Wallets
The admin "wallet" is already configured as it is not a subwallet on a multi-tenant agent. To create subwallets for tenants, you have to use the tenant admin role. The permissions and routing to the correct ACA-Py instance are handled by acapy-cloud under the hood. You need to provide two things:
-
Authorization in the header:
{"x-api-key": "tenant-admin.APIKEY"}
, wheretenant-admin
is a fixed term representing the role, andAPIKEY
is the auth token you must know and provide. Note: This auth string is separated by a dot, so keep that in there. -
The wallet payload (body) of the wallet you want to create, e.g.,
{ "wallet_label": "Demo Issuer", "wallet_name": "Faber", "roles": ["issuer"], "group_id": "API demo", "image_url": "https://upload.wikimedia.org/wikipedia/commons/7/70/Example.png" }
Send this to the /tenant-admin/v1/admin/tenants
endpoint. You can omit the
roles field altogether or pass "issuer" and/or "verifier". All payloads are
documented in Swagger, so if in doubt, consult the
Multitenant-Admin docs.
Creating a tenant with roles will update the trust registry by writing an entry
for an actor
, including wallet details and its associated roles.
If you wish to later update entities roles, you will have to do that again via
the tenants admin API, which will handle interacting with the trust registry
(see also the Swagger for update tenant
).
Creating Schemas
To create schemas and effectively write them to the ledger as well as registering them on the trust registry, use the governance role:
-
Provide the following authentication header:
{ "x-api-key": "governance.ADMIN_API_KEY" }
Replace the
ADMIN_API_KEY
with the actual API key. Keep the dot and recall thatgovernance
is a keyword known to acapy-cloud as a role. It will resolve the correct endpoint and available actions based on the role and provided token. -
Provide the information about the schema, e.g.:
{ "name": "yourAwesomeSchemaName", "version": "1.3.7", "attributes": ["skill", "age"] }
Note that you will need to have a public DID to do so (if your agent lacks one, you can use the governance role to create one: see Bootstrapping the Trust Ecosystem). Run the request with the header from 1. and the payload from 2. against the Governance URL and endpoint
/v1/definitions/schemas
(POST method). Upon success, the created schema will be returned.
Issuing a Credential
-
Register a schema (see above)
-
Register an issuer (create a wallet passing "issuer" as a role - see above)
-
Issuer creates credential definition
-
Create a connection between the issuer and prospective holder
A connection can be created using the
/v1/connections/did-exchange/create-request
endpoint of the Tenant URL. Here, you will also need to authenticate via the header, e.g., using{ "x-api-key": "tenant.WALLET_TOKEN" }
where the
WALLET_TOKEN
is the bearer token you get from the create wallet response for a tenant wallet.Use the issuer's public DID as the
their_public_did
parameter in the request.This will automatically establish a connection between the issuer and the holder, and can be verified by checking the connection records (
GET /v1/connections
) for either party.Alternatively, an OOB invitation can be used to create a connection. Please see this example docs for more details.
-
Issue a credential from issuer to prospect holder
- Create and send a credential authenticating with the issuer. The credential has the form:
{ "connection_id": "string", "schema_id": "string", "attributes": { "additionalProp1": "string", "additionalProp2": "string", "additionalProp3": "string" } }
This should correspond to a schema you created previously, and the
connection_id
is the ID of the connection you created in the previous step. If you're unsure what that ID is, you can always run a GET request against theconnections
endpoint to find it. -
Accept and store the credential in the holder wallet
-
Using the holder (authenticating with the holder auth header), issue a GET request against the
/v1/issuer/credentials
endpoint, providing the connection ID of the connection established above. Note: The connection IDs are unique for each entity, so the connection between the issuer and the holder is one connection with two separate connection IDs - one for the issuer and one for the holder. This will provide you with a credential record that should be in the state of being offered. Providing the connection ID again, you can now use the holder to store the credential by posting to/v1/issuer/credentials/{credential_exchange_id}/store
-
(Optional) Get yor credentials from your wallet (
wallet/credentials
) check whether the credential is actually stored. You can also check this via waypoint.
Verifying a Credential
-
Ensure you followed Issuing a Credential steps to have a wallet with a credential (prover)
-
Register an entity as a verifier (verifier)
- In other words, create or update a wallet, passing the role "verifier"
-
Create a connection between 1. prover and 2. verifier the same way as in Issuing a Credential
-
Create a proof request (
/v1/verifier/create-request
) using the verifier and send it to the prover. Consult the Swaggerverifier
endpoints. POST to/v1/verifier/send-request
with a payload of the following form, replacing the values accordingly (and ensuring they can be covered by the previously created schema and issued credential):{ "connection_id": "string", "indy_proof_request": { "requested_attributes": { "additionalProp1": { "name": "string", "names": ["string"], "non_revoked": {}, "restrictions": [] } }, "requested_predicates": { "additionalProp1": { "name": "string", "p_type": "<", "p_value": 0, "non_revoked": {}, "restrictions": [] }, "name": "string", "non_revoked": {}, "version": "string" } } }
-
Send the proof request.
- From the prover, get the proof records using
/v1/verifier/proofs
and create a proof request you want to send, just as above (same payload format and endpoint).
- From the prover, get the proof records using
-
Accept the proof request.
- From the verifier, you can now accept (or reject; see
/v1/verifier/reject-request
on Swagger for payload) by POSTing to/v1/verifier/send-request
, adjusting the payload to:
{ "proof_id": "string", "indy_presentation_spec": { "requested_attributes": { "additionalProp1": { "cred_id": "string", "revealed": true } }, "requested_predicates": { "additionalProp1": { "cred_id": "string", "timestamp": 0 } }, "self_attested_attributes": { "additionalProp1": "string", "additionalProp2": "string", "additionalProp3": "string" } } }
- From the verifier, you can now accept (or reject; see
-
(Optional) Wait for the prover and verifier's webhook, using waypoint, and see that the presentation is acknowledged. Alternatively, GET the proof records and check the
state
field.
Note: There are multiple flows to this "dance". For further details, you may want to refer to the official Aries-RFC.
If you'd like to delve deeper into more of acapy-cloud's capabilities, please see the Example Flows document.
Bootstrapping the Trust Ecosystem with acapy-cloud
[!NOTE] ⚡ The steps described here are now automated during startup. You can skip this guide under a vanilla setup.
1. Prerequisites
Before starting, ensure you have completed the steps in the Quick Start Guide and have all services running.
2. Generate a DID for the Endorser
-
Access the API through the Governance swagger docs
-
Authenticate with
governance.
+APIKEY
role -
Generate a new DID with a
POST
to the following API endpoint:/v1/wallet/dids/
-
An example successful response to generate a DID would look like this:
{ "did": "LESjYcQUBF2o3kFy5EUqTL", "key_type": null, "method": null, "posture": null, "verkey": "BUxNgHYEYm5bsTEpjo9Dkgr5zGA4feeiuiq32HfqyCKg" }
-
Copy the
DID
andVerkey
3. Anchor New DID to Indy Ledger
- Go to Ledger Web Interface
- Select
Register from DID
- Paste the
DID
andVerkey
and select RoleEndorser
- Click
Register DID
- DID should be successfully written to the Indy Ledger with a response as below
Identity successfully registered:
DID: LESjYcQUBF2o3kFy5EUqTL
Verkey: BUxNgHYEYm5bsTEpjo9Dkgr5zGA4feeiuiq32HfqyCKg
4. Accept Transaction Author Agreement
-
Connect to ACA-Py Governance Agent API
-
Authenticate by setting the
x-api-key
header with the API Key of the Governance Agent via Swagger/Postman/Insomnia -
Get the TAA from the following endpoint
/ledger/taa
. An example response would be like this:{ "result": { "aml_record": { "aml": { "at_submission": "The agreement was reviewed by the user and accepted at the time of submission of this transaction.", "for_session": "The agreement was reviewed by the user and accepted at some point in the user’s session prior to submission.", "on_file": "An authorized person accepted the agreement, and such acceptance is on file with the user’s organization.", "product_eula": "The agreement was included in the software product’s terms and conditions as part of a license to the end user.", "service_agreement": "The agreement was included in the terms and conditions the user accepted as part of contracting a service.", "wallet_agreement": "The agreement was reviewed by the user and this affirmation was persisted in the user’s wallet for use during submission." }, "amlContext": "http://aml-context-descr", "version": "1.0" }, "taa_record": { "digest": "0be4d87dec17a7901cb8ba8bb4239ee34d4f6e08906f3dad81d1d052dccc078f", "ratification_ts": 1597654073, "text": "This is a sample Transaction Authors Agreement **(TAA)**, for the VON test Network.\n\nOn public ledger systems this will typically contain legal constraints that must be accepted before any write operations will be permitted.", "version": "1.1" }, "taa_required": true, "taa_accepted": null } }
-
Copy the
text
andversion
from the API response. -
Accept the TAA by POSTing to the following API endpoint:
/ledger/taa/accept
.-
Paste the
text
andversion
from the previous step into the POST body. -
Set the
mechanism
toservice_agreement
. A complete POST JSON body example is as follows:{ "mechanism": "service_agreement", "text": "This is a sample Transaction Authors Agreement **(TAA)**, for the VON test Network.\n\nOn public ledger systems this will typically contain legal constraints that must be accepted before any write operations will be permitted.", "version": "1.1" }
This should yield an empty JSON response with a
200
status code.
-
5. Set Public DID
- Go to the Governance interface
- Execute the PUT endpoint to set a Public DID:
/v1/wallet/dids/public?did=
- Use the DID that you anchored to the ledger in step 3
- A successful response should look like this. You can also query the Public DID endpoint
/wallet/dids/public
of the Governance Agent to confirm that the public DID is now set:
{
"did": "LESjYcQUBF2o3kFy5EUqTL",
"key_type": "ed25519",
"method": "sov",
"posture": "posted",
"verkey": "BUxNgHYEYm5bsTEpjo9Dkgr5zGA4feeiuiq32HfqyCKg"
}
6. Congratulations
- You have now successfully bootstrapped a Trust Ecosystem with acapy-cloud!
- You can now write schemas, create credential definitions, manage tenants, and more.
Continue by reading about Governance as Code.
Overview of acapy-cloud Architecture
This document provides a brief overview of the acapy-cloud Architecture, focusing on the two key components: the Admin Agent and the Multi-tenant Agent.
Admin Agent
The Admin Agent and the Multi-tenant Agent are both exposed via the same Swagger UI under the same URL. They are differentiated based on the authorization method, which also specifies a role. For more information on this, refer to the workflows document.
The Admin Agent represents GOVERNANCE, or in a broader sense, the administrative entity. This non-multitenant agent is used for various administrative functions such as creating schemas, managing actors against the trust registry, and managing wallets.
Multi-tenant Agent
Like the Admin Agent, the Multi-tenant Agent is also exposed via the same Swagger UI under the same URL, with distinction made based on the authorization method and role.
The Multi-tenant Agent is designed for sub-wallet and tenant management from the tenant's perspective.
For a more comprehensive understanding of multi-tenancy, please refer to the ACA-Py docs.