Skip to main content

Open Enterprise Agent API Reference (1.31.0)

Download OpenAPI specification:Download

The Open Enterprise Agent API facilitates the integration and management of self-sovereign identity capabilities within applications. It supports DID (Decentralized Identifiers) management, verifiable credential exchange, and secure messaging based on DIDComm standards. The API is designed to be interoperable with various blockchain and DLT (Distributed Ledger Technology) platforms, ensuring wide compatibility and flexibility. Key features include connection management, credential issuance and verification, and secure, privacy-preserving communication between entities. Additional information and the full list of capabilities can be found in the Open Enterprise Agent documentation

Connections Management

The Connections Management endpoints facilitate the initiation of connection flows between the current Agent and peer Agents, regardless of whether they reside in Cloud Agent or edge environments. This implementation adheres to the DIDComm Messaging v2.0 - Out of Band Messages specification section 9.5.4 - to generate invitations. The from field of the out-of-band invitation message contains a freshly generated Peer DID that complies with the did:peer:2 specification. This Peer DID includes the 'uri' location of the DIDComm messaging service, essential for the invitee's subsequent execution of the connection flow. Upon accepting an invitation, the invitee sends a connection request to the inviter's DIDComm messaging service endpoint. The connection request's 'type' attribute must be specified as "https://atalaprism.io/mercury/connections/1.0/request". The inviter agent responds with a connection response message, indicated by a 'type' attribute of "https://atalaprism.io/mercury/connections/1.0/response". Both request and response types are proprietary to the Open Enterprise Agent ecosystem.

Retrieves the list of connection flow records available from the Agent's database.

Retrieve of a list containing connections available from the Agent's database. The API returns a comprehensive collection of connection flow records within the system, regardless of their state. Each connection item includes essential metadata such as connection ID, thread ID, state, role, participant information, and other relevant details. Pagination support is available, allowing for efficient handling of large datasets.

Authorizations:
apiKeyAuthjwtAuth
query Parameters
offset
integer <int32>

The number of items to skip before returning results. Default is 0 if not specified.

limit
integer <int32>

The maximum number of items to return. Defaults to 100 if not specified.

thid
string

The thid, shared between the inviter and the invitee, that uniquely identifies a connection flow.

Responses

Response samples

Content type
application/json
{
  • "contents": [ ],
  • "kind": "ConnectionsPage",
  • "self": "/prism-agent/connections?offset=10&limit=10",
  • "pageOf": "",
  • "next": "/prism-agent/connections?offset=20&limit=10",
  • "previous": "/prism-agent/connections?offset=0&limit=10"
}

Create a new connection invitation that can be delivered out-of-band to a peer Agent.

Create a new connection invitation that can be delivered out-of-band to a peer Agent, regardless of whether it resides in Cloud Agent or edge environment. The generated invitation adheres to the DIDComm Messaging v2.0 - Out of Band Messages specification section 9.5.4. The from field of the out-of-band invitation message contains a freshly generated Peer DID that complies with the did:peer:2 specification. This Peer DID includes the 'uri' location of the DIDComm messaging service, essential for the invitee's subsequent execution of the connection flow. In the Agent database, the created connection record has an initial state set to InvitationGenerated. The request body may contain a label that can be used as a human readable alias for the connection, for example {'label': "Connection with Bob"}

Authorizations:
apiKeyAuthjwtAuth
Request Body schema: application/json

JSON object required for the connection creation.

label
string

A human readable alias for the connection.

goalCode
string

A self-attested code the receiver may want to display to the user or use in automatically deciding what to do with the out-of-band message.

goal
string

A self-attested string that the receiver may want to display to the user about the context-specific goal of the out-of-band message.

Responses

Request samples

Content type
application/json
{
  • "label": "Peter",
  • "goalCode": "issue-vc",
  • "goal": "To issue a Faber College Graduate credential"
}

Response samples

Content type
application/json
{}

Retrieves a specific connection flow record from the Agent's database based on its unique `connectionId`.

Retrieve a specific connection flow record from the Agent's database based in its unique connectionId. The returned item includes essential metadata such as connection ID, thread ID, state, role, participant information, and other relevant details.

Authorizations:
apiKeyAuthjwtAuth
path Parameters
connectionId
required
string <uuid>

The connectionId uniquely identifying the connection flow record.

Responses

Response samples

Content type
application/json
{}

Accept a new connection invitation received out-of-band from another peer Agent.

Accept an new connection invitation received out-of-band from another peer Agent. The invitation must be compliant with the DIDComm Messaging v2.0 - Out of Band Messages specification section 9.5.4. A new connection record with state ConnectionRequestPending will be created in the agent database and later processed by a background job to send a connection request to the peer Agent. The created record will contain a newly generated pairwise Peer DID used for that connection. A connection request will then be sent to the peer Agent to actually establish the connection, moving the record state to ConnectionRequestSent, and waiting the connection response from the peer Agent.

Authorizations:
apiKeyAuthjwtAuth
Request Body schema: application/json

The request used by an invitee to accept a connection invitation received from an inviter, using out-of-band mechanism.

invitation
required
string

The base64-encoded raw out-of-band invitation.

Responses

Request samples

Content type
application/json
{
  • "invitation": "eyJAaWQiOiIzZmE4NWY2NC01NzE3LTQ1NjItYjNmYy0yYzk2M2Y2NmFmYTYiLCJAdHlwZSI6Imh0dHBzOi8vZGlkY29tbS5vcmcvbXktZmFtaWx5LzEuMC9teS1tZXNzYWdlLXR5cGUiLCJkaWQiOiJXZ1d4cXp0ck5vb0c5MlJYdnhTVFd2IiwiaW1hZ2VVcmwiOiJodHRwOi8vMTkyLjE2OC41Ni4xMDEvaW1nL2xvZ28uanBnIiwibGFiZWwiOiJCb2IiLCJyZWNpcGllbnRLZXlzIjpbIkgzQzJBVnZMTXY2Z21NTmFtM3VWQWpacGZrY0pDd0R3blpuNnozd1htcVBWIl0sInJvdXRpbmdLZXlzIjpbIkgzQzJBVnZMTXY2Z21NTmFtM3VWQWpacGZrY0pDd0R3blpuNnozd1htcVBWIl0sInNlcnZpY2VFbmRwb2ludCI6Imh0dHA6Ly8xOTIuMTY4LjU2LjEwMTo4MDIwIn0="
}

Response samples

Content type
application/json
{}

Issue Credentials Protocol

The Issue Credentials Protocol endpoints facilitate the initiation of credential issuance flows between the current Agent and peer Agents, regardless of whether they reside in Cloud Agent or edge environments. This implementation adheres to the Issue Credential Protocol 3.0 specification to execute credential issuance flows. The flow is initiated by the issuer who creates a credential offer and sends it to the holder's DIDComm messaging service endpoint. Upon accepting the received offer, the holder sends a credential request to the issuer. The issuer agent will then issue the credential (JWT or AnonCreds) and send an issue credential message containing the verifiable credential to the holder. The current implementation only supports one of the three alternative beginnings proposed in the spec, which is "the Issuer begin with an offer".

As a credential issuer, create a new credential offer that will be sent to a holder Agent.

Creates a new credential offer that will be delivered, through a previously established DIDComm connection, to a holder Agent. The subsequent credential offer message adheres to the Issue Credential Protocol 3.0 - Offer Credential specification. The created offer can be of two types: 'JWT' or 'AnonCreds'.

Authorizations:
apiKeyAuthjwtAuth
Request Body schema: application/json

The credential offer object.

validityPeriod
number <double>

The validity period in seconds of the verifiable credential that will be issued.

schemaId
string

The URL pointing to the JSON schema that will be used for this offer (should be 'http' or 'https'). When dereferenced, the returned content should be a JSON schema compliant with the 'Draft 2020-12' version of the specification. Note that this parameter only applies when the offer is of type 'JWT'.

credentialDefinitionId
string <uuid>

The unique identifier (UUID) of the credential definition that will be used for this offer. It should be the identifier of a credential definition that exists in the issuer agent's database. Note that this parameter only applies when the offer is of type 'AnonCreds'.

credentialFormat
string

The credential format for this offer (defaults to 'JWT')

claims
required
any

The set of claims that will be included in the issued credential. The JSON object should comply with the schema applicable for this offer (i.e. 'schemaId' or 'credentialDefinitionId').

automaticIssuance
boolean

Specifies whether or not the credential should be automatically generated and issued when receiving the CredentialRequest from the holder. If set to false, a manual approval by the issuer via another API call will be required for the VC to be issued.

issuingDID
string

The short-form issuer Prism DID by which the JWT verifiable credential will be issued. Note that this parameter only applies when the offer is type 'JWT'.

connectionId
required
string <uuid>

The unique identifier of a DIDComm connection that already exists between the this issuer agent and the holder cloud or edeg agent. It should be the identifier of a connection that exists in the issuer agent's database. This connection will be used to execute the issue credential protocol.

Responses

Request samples

Content type
application/json
{}

Response samples

Content type
application/json
{
  • "recordId": "80d612dc-0ded-4ac9-90b4-1b8eabb04545",
  • "thid": "0527aea1-d131-3948-a34d-03af39aba8b4",
  • "credentialFormat": "JWT",
  • "subjectId": "did:prism:3bb0505d13fcb04d28a48234edb27b0d4e6d7e18a81e2c1abab58f3bbc21ce6f",
  • "validityPeriod": 3600,
  • "claims": {
    },
  • "automaticIssuance": true,
  • "createdAt": "2024-03-20T18:35:17.903237532Z",
  • "updatedAt": "2019-08-24T14:15:22Z",
  • "role": "Issuer",
  • "protocolState": "CredentialSent",
  • "credential": "eyJzY2hlbWFfaWQiOiJodHRwOi8vaG9zdC5kb2NrZXIuaW50ZXJuYWw6ODA4MC9wcmlzbS1hZ2VudC9zY2hlbWEtcmVnaXN0cnkvc2NoZW1hcy8zOTZmZDE2OC02YmVmLTMyNDItYTJiNy1hNTZlYWM1MDc2OWMvc2NoZW1hIiwiY3JlZF9kZWZfaWQiOiJodHRwOi8vMTkyLjE2OC4wLjE0OjgwODAvcHJpc20tYWdlbnQvY3JlZGVudGlhbC1kZWZpbml0aW9uLXJlZ2lzdHJ5L2RlZmluaXRpb25zLzNhZmQxZWJkLWIzN2ItMzRiNC1iMWQ2LWYwMDQ5ZmU5ZmQ1Mi9kZWZpbml0aW9uIiwicmV2X3JlZ19pZCI6bnVsbCwidmFsdWVzIjp7ImdpdmVuTmFtZSI6eyJyYXciOiJBbGljZSIsImVuY29kZWQiOiIyNzAzNDY0MDAyNDExNzMzMTAzMzA2MzEyODA0NDAwNDMxODIxODQ4NjgxNjkzMTUyMDg4NjQwNTUzNTY1OTkzNDQxNzQzODc4MTUwNyJ9LCJlbWFpbEFkZHJlc3MiOnsicmF3IjoiYWxpY2VAd29uZGVybGFuZC5jb20iLCJlbmNvZGVkIjoiNzUxMDcwNDYzNDAxNjU2NzcwMTE5NDIwNzU2NDQwMDkwNjY1NDE2NjExNDg4MjI1ODkwMzM2Nzk4NjEyMDkxODY0OTI3Njg2Njk5MjQifSwiZmFtaWx5TmFtZSI6eyJyYXciOiJXb25kZXJsYW5kIiwiZW5jb2RlZCI6IjE2NzkwODQ5MzEyMzc0Nzk0NzM2ODEzMzc3NTY3MjUzODUxMzczNjA3OTcwNDczMzc3NzAxNDc3MjY5MTk0MDE5NTU3NjU0NTYyMDM1In0sImRhdGVPZklzc3VhbmNlIjp7InJhdyI6IjIwMjAtMTEtMTNUMjA6MjA6MzkrMDA6MDAiLCJlbmNvZGVkIjoiNTM4Njg1NTk1MzE3NDg0NjcwOTc1MjA4NTkwNTMwODE4MzU3NDc0MzU2MTE2MDY4NDIwNDExNDc1ODIwMDQ4NzQzNDgwNDYxNjQ2ODUifSwiZHJpdmluZ0xpY2Vuc2VJRCI6eyJyYXciOiIxMjM0NSIsImVuY29kZWQiOiIxMjM0NSJ9LCJkcml2aW5nQ2xhc3MiOnsicmF3IjoiMyIsImVuY29kZWQiOiIzIn19LCJzaWduYXR1cmUiOnsicF9jcmVkZW50aWFsIjp7Im1fMiI6IjMzNjg4ODUzNTU3NTg2MDI3MDg3OTY5ODAzMjgzMzcyNzE4Nzc5MDAzNDAzMDgwODMzMjQzNDIxMTU3MDA5NzE4MDUzMTMyNDIwODAwIiwiYSI6IjEwMjUxMTg2OTU5MTg2NDc2NDcwNzU0MTQ0MDg5NDE3MjI4OTM1Mjk0ODgxNDExMTc5ODYwNzgxODIxODY2OTcyODIyMzg1MTQ1OTcwNDA4Mzk2Mjg5OTM2NzgzNTUxMDk4NDA2MjE2MjcwNjgyNDM1ODg3NjY0OTI0MzQwMDg3NTY4MDMyNzMyMzYwMDc5MTI2ODk2MDU3NDA3MTYyMjI0NDgwODM2NTgzNjY2MzQ1MzA5NzQ0NDE5NjA0ODg5ODA1NDU3Mjc4NDE0MjgyMjA4NzIzMDIwNDQzNzk0MjM0NzU1NTgwNjA1MTE1NjU3NTQ4NjE1MTgwNTU1ODEzMjA0MzQyNjkzNjYyODQzNzY4MjQ2NDM1NjU4MjQ5MDYyMjUxMzYwNzE2MzEyNzM4MjAyMTU2NTEwNzM2NDY1ODk2NjIyNDY4MDk3OTY0OTk0NTA1NDUwMjczMzQ2Mzk4MzY4NzcxNDM3MzAzNTI2NjE0NTk4NTU4Mjg0MTAxNzk0NjYwOTAxNDMwOTI4MzY1MTk3MzA2MDIxMzQ5OTQ3MDI2MzIzMzEwOTE3MjgzODM0ODY2NzI1MzgyMDg4NDIzNDU1NzE0MDY3MTk1NDEzMDA4MzAxNTQ2MTA1NzY4NTAxNzMxNjEwMjk3MDY5ODUyNjAxMTgxMTM3OTg2NjM2MDU2MjI4MTE4NzUzMTM1NjMxMDIwNzA0MzYxODQxNTg0MjA0NzIwMDU1NjY0ODIxMTczOTA3MzYyMTQzNTQyNjk1NTExMTMxNzU3NTE0OTUxMDY2ODQ2MzIyMDAyNzYxMzg4MzIwNjkyNSIsImUiOiIyNTkzNDQ3MjMwNTUwNjIwNTk5MDcwMjU0OTE0ODA2OTc1NzE5MzgyNzc4ODk1MTUxNTIzMDYyNDk3Mjg1ODMxMDU2NjU4MDA3MTMzMDY3NTkxNDk5ODE2OTA1NTkxOTM5ODcxNDMwMTIzNjc5MTMyMDYyOTkzMjM4OTk2OTY5NDIyMTMyMzU5NTY3NDI5Mjk4MTYwMTkzMjA4MDYyNzM5NTc5MDExNDE1Njk0NDAwMjUyMTkiLCJ2IjoiMTAwODYwMTE5NjExNDQ0MjUxODg1ODcyNzA0OTEyNDQwMTQzNTA0MDEwMDQ3NzE3MzYxNzgxMjIwOTQ0OTA3OTE3ODM0NTE3NjQyOTk5MDgxMjEzMDcyNTI4NzU5NTczMzIyNDM1NjU5NzY4OTI2NzA4MjE0NTI5Njg0Njg5NTc5MjAwNzY4MDkxMTM0OTM0MzYxNDUyNzM5ODUwMjEyODc1MDUwMzg5NjkzOTMxMjEzMDg2MTUyOTM4NzA2ODc4MzQyNjIxNjQ1MTc2NDY5NTU0NDMyNTY2MDk0MDY5NjU2ODkzNDg1NjQyNDI2MTc0MjA5MjY3OTI1MDEzODkxMTU2MzAzMzY0MzUwMzgwNTUwMzQ4OTk3MDI1Nzc3NDc5NDg3ODI0NDkzNzg4MDYwNTg1NzMxMTY2NDM5OTE1MTc3ODUyNTYwNjczMjkwODA2Mjk5ODEyOTY1NjMwNDc2OTc0NzExNDY4MDE1MzY4NzM2NTc3MDEzNDE2NjE3ODc0MTc3ODgwNjMzNTc1OTAwMzQyODM5MDUxNjc4NjExNDMxMTk5Mzk3NTIzMDE5Njc0NTA3MjM0NDAzNzcyMTcxMDM3Nzg3NzUyNTMwMjIyODYyNDg5OTMzMzczMzY1MjIwNTc4MDIzNDY2NjkyMDQ4MTA0NTE0NjczMzMwMzMwNzQ1OTEyMjUzNzQ0MDQwMjI1NTM4NjMxNDk2MjY4NDM0MDk5Njk3Nzk1NTY5MDA3MTExMjQzMTg4MTc3MzUyNjE5MTUxNzk1NjEzNTAwNjg5MzUwMzQyNTk3NjA1ODY2MjUyOTYwMjQ3ODg4OTE2NDIwNDcyMDEzNDYzMTA5NTA5MjMxNDcwNjc4MDc5MDI2Mzc3MzY4NDEwNTIyODg3NDExOTIyMzE4Njk5NzA4MjkxNzI4NTg3ODgzNjExODMyMjU4MTE5MzI2ODQ5NjkxODI1MDI2MzU2NDQ1OTM1NjYxOTkyODEyNjIwNDY4MzAxMjEwMzMwNTA1NjEwMjYyNTU5MDk5NDgwNzcxMjA0NDU0ODg0MDI5ODA3MDcwOTM4NDU5OTgxNDM1NjQyNTkzNTQyODc0ODAifSwicl9jcmVkZW50aWFsIjpudWxsfSwic2lnbmF0dXJlX2NvcnJlY3RuZXNzX3Byb29mIjp7InNlIjoiMjMwNDc5NjEzNTA0MDI5NTI3NTk3NzM3MTY4NjY0OTQ5MzQwNzk1NTg1ODM5NTQ4OTI2MTEwMjQ2NzU0NzA3OTgyNjc2MDEyMjIyMTYyNzQyNTQ2Nzg4NDI3MDA4MDQ5NzIyNDMwNDgyODAyOTYyNTgxNDE2ODI2MjEzMTgwMTE4MTA4MTA1Nzg1NjA4OTg5NjEyNTU0ODMwOTE5MjU4MTI0NDgyMzUwNTQ2MTkxOTQ5NTU5ODM2NTk4NzcxMTE0MzI1NjA5MTI4MjUxMTc1MDM4NDMxNDA2NzM2NTc1MDkwMzk5ODk0MDQzMjc3MTg5MTM3MzE1NTM5NTQ2MTE3Mjk2NTM1OTMyOTQ3NDk3NTU0Mjg0NDc1NjkxNDE1NDEzMzIzNjE2OTYyNTk1NDAzMTkxMjQ4ODY2NDE1MjI0NDY2MTU2OTgyODg4OTkyNTAxNjc1NTcwNjI0MzQ2MzMyMTE0NjMzMDQ1NzUxNDg3NzU3ODM3MDA5Mzc3ODMwNTI1MTU5MjUwNjMwMjcxNjY3NDQxMDI3MTM5MjE3Nzc5ODU5MDExMjUxOTc1OTczNjY0NTc4MjMxOTk1Mzc3OTE4Mjg4MTkyNjIyMDM5NDEzMDM0ODg5MjM3Mzg2NzU4Mzg3NTcwNTMxNDc1OTQxMDU2MTg3NzUzOTEyNDA0NzkwNzQ5NzgzMTM0OTk3MDgzODk3NjE5MTczMTg3MDg1MzE1MjQ3NTM4NjU2OTcwOTE0NzI2MzM1ODA1ODY5OTk3NzI3OTc5NTUwMjIzNjkzMDA2MjcwNjIzNTc3NjM2NTIyNjIyNTY0MTE4NTMiLCJjIjoiOTM2NzQ1MDczNzcxNzQ3MjE3OTg3OTY2OTYzMDQxNzUzMTE4NDk0NDE4NDQ0NzQ1MDI3NzAyMjI3Nzk0NzU1ODQ2Mjg3ODMzMzU4NTAifSwicmV2X3JlZyI6bnVsbCwid2l0bmVzcyI6bnVsbH0=",
  • "issuingDID": "did:prism:3bb0505d13fcb04d28a48234edb27b0d4e6d7e18a81e2c1abab58f3bbc21ce6f",
  • "metaRetries": 5
}

Retrieves the list of issue credential records from the Agent's database.

Retrieves the list of issue credential records from the Agent's database. The API returns a comprehensive collection of issue credential flow records within the system, regardless of their state. The returned items include essential metadata such as record ID, thread ID, state, role, issued credential, and other relevant details.

Authorizations:
apiKeyAuthjwtAuth
query Parameters
offset
integer <int32>

The number of items to skip before returning results. Default is 0 if not specified.

limit
integer <int32>

The maximum number of items to return. Defaults to 100 if not specified.

thid
string

The thread ID associated with a specific credential issue flow execution.

Responses

Response samples

Content type
application/json
{
  • "contents": [ ],
  • "kind": "Collection",
  • "self": "/prism-agent/issue-credentials/records?offset=10&limit=10",
  • "pageOf": "/prism-agent/issue-credentials/records",
  • "next": "/prism-agent/issue-credentials/records?offset=20&limit=10",
  • "previous": "/prism-agent/issue-credentials/records?offset=0&limit=10"
}

Retrieves a specific issue credential flow record from the Agent's database based on its unique `recordId`.

Retrieves a specific issue credential flow record from the Agent's database based on its unique recordId. The API returns a comprehensive collection of issue credential flow records within the system, regardless of their state. The returned items include essential metadata such as record ID, thread ID, state, role, issued credential, and other relevant details.

Authorizations:
apiKeyAuthjwtAuth
path Parameters
recordId
required
string

The recordId uniquely identifying the issue credential flow record.

Responses

Response samples

Content type
application/json
{
  • "recordId": "80d612dc-0ded-4ac9-90b4-1b8eabb04545",
  • "thid": "0527aea1-d131-3948-a34d-03af39aba8b4",
  • "credentialFormat": "JWT",
  • "subjectId": "did:prism:3bb0505d13fcb04d28a48234edb27b0d4e6d7e18a81e2c1abab58f3bbc21ce6f",
  • "validityPeriod": 3600,
  • "claims": {
    },
  • "automaticIssuance": true,
  • "createdAt": "2024-03-20T18:35:17.903237532Z",
  • "updatedAt": "2019-08-24T14:15:22Z",
  • "role": "Issuer",
  • "protocolState": "CredentialSent",
  • "credential": "eyJzY2hlbWFfaWQiOiJodHRwOi8vaG9zdC5kb2NrZXIuaW50ZXJuYWw6ODA4MC9wcmlzbS1hZ2VudC9zY2hlbWEtcmVnaXN0cnkvc2NoZW1hcy8zOTZmZDE2OC02YmVmLTMyNDItYTJiNy1hNTZlYWM1MDc2OWMvc2NoZW1hIiwiY3JlZF9kZWZfaWQiOiJodHRwOi8vMTkyLjE2OC4wLjE0OjgwODAvcHJpc20tYWdlbnQvY3JlZGVudGlhbC1kZWZpbml0aW9uLXJlZ2lzdHJ5L2RlZmluaXRpb25zLzNhZmQxZWJkLWIzN2ItMzRiNC1iMWQ2LWYwMDQ5ZmU5ZmQ1Mi9kZWZpbml0aW9uIiwicmV2X3JlZ19pZCI6bnVsbCwidmFsdWVzIjp7ImdpdmVuTmFtZSI6eyJyYXciOiJBbGljZSIsImVuY29kZWQiOiIyNzAzNDY0MDAyNDExNzMzMTAzMzA2MzEyODA0NDAwNDMxODIxODQ4NjgxNjkzMTUyMDg4NjQwNTUzNTY1OTkzNDQxNzQzODc4MTUwNyJ9LCJlbWFpbEFkZHJlc3MiOnsicmF3IjoiYWxpY2VAd29uZGVybGFuZC5jb20iLCJlbmNvZGVkIjoiNzUxMDcwNDYzNDAxNjU2NzcwMTE5NDIwNzU2NDQwMDkwNjY1NDE2NjExNDg4MjI1ODkwMzM2Nzk4NjEyMDkxODY0OTI3Njg2Njk5MjQifSwiZmFtaWx5TmFtZSI6eyJyYXciOiJXb25kZXJsYW5kIiwiZW5jb2RlZCI6IjE2NzkwODQ5MzEyMzc0Nzk0NzM2ODEzMzc3NTY3MjUzODUxMzczNjA3OTcwNDczMzc3NzAxNDc3MjY5MTk0MDE5NTU3NjU0NTYyMDM1In0sImRhdGVPZklzc3VhbmNlIjp7InJhdyI6IjIwMjAtMTEtMTNUMjA6MjA6MzkrMDA6MDAiLCJlbmNvZGVkIjoiNTM4Njg1NTk1MzE3NDg0NjcwOTc1MjA4NTkwNTMwODE4MzU3NDc0MzU2MTE2MDY4NDIwNDExNDc1ODIwMDQ4NzQzNDgwNDYxNjQ2ODUifSwiZHJpdmluZ0xpY2Vuc2VJRCI6eyJyYXciOiIxMjM0NSIsImVuY29kZWQiOiIxMjM0NSJ9LCJkcml2aW5nQ2xhc3MiOnsicmF3IjoiMyIsImVuY29kZWQiOiIzIn19LCJzaWduYXR1cmUiOnsicF9jcmVkZW50aWFsIjp7Im1fMiI6IjMzNjg4ODUzNTU3NTg2MDI3MDg3OTY5ODAzMjgzMzcyNzE4Nzc5MDAzNDAzMDgwODMzMjQzNDIxMTU3MDA5NzE4MDUzMTMyNDIwODAwIiwiYSI6IjEwMjUxMTg2OTU5MTg2NDc2NDcwNzU0MTQ0MDg5NDE3MjI4OTM1Mjk0ODgxNDExMTc5ODYwNzgxODIxODY2OTcyODIyMzg1MTQ1OTcwNDA4Mzk2Mjg5OTM2NzgzNTUxMDk4NDA2MjE2MjcwNjgyNDM1ODg3NjY0OTI0MzQwMDg3NTY4MDMyNzMyMzYwMDc5MTI2ODk2MDU3NDA3MTYyMjI0NDgwODM2NTgzNjY2MzQ1MzA5NzQ0NDE5NjA0ODg5ODA1NDU3Mjc4NDE0MjgyMjA4NzIzMDIwNDQzNzk0MjM0NzU1NTgwNjA1MTE1NjU3NTQ4NjE1MTgwNTU1ODEzMjA0MzQyNjkzNjYyODQzNzY4MjQ2NDM1NjU4MjQ5MDYyMjUxMzYwNzE2MzEyNzM4MjAyMTU2NTEwNzM2NDY1ODk2NjIyNDY4MDk3OTY0OTk0NTA1NDUwMjczMzQ2Mzk4MzY4NzcxNDM3MzAzNTI2NjE0NTk4NTU4Mjg0MTAxNzk0NjYwOTAxNDMwOTI4MzY1MTk3MzA2MDIxMzQ5OTQ3MDI2MzIzMzEwOTE3MjgzODM0ODY2NzI1MzgyMDg4NDIzNDU1NzE0MDY3MTk1NDEzMDA4MzAxNTQ2MTA1NzY4NTAxNzMxNjEwMjk3MDY5ODUyNjAxMTgxMTM3OTg2NjM2MDU2MjI4MTE4NzUzMTM1NjMxMDIwNzA0MzYxODQxNTg0MjA0NzIwMDU1NjY0ODIxMTczOTA3MzYyMTQzNTQyNjk1NTExMTMxNzU3NTE0OTUxMDY2ODQ2MzIyMDAyNzYxMzg4MzIwNjkyNSIsImUiOiIyNTkzNDQ3MjMwNTUwNjIwNTk5MDcwMjU0OTE0ODA2OTc1NzE5MzgyNzc4ODk1MTUxNTIzMDYyNDk3Mjg1ODMxMDU2NjU4MDA3MTMzMDY3NTkxNDk5ODE2OTA1NTkxOTM5ODcxNDMwMTIzNjc5MTMyMDYyOTkzMjM4OTk2OTY5NDIyMTMyMzU5NTY3NDI5Mjk4MTYwMTkzMjA4MDYyNzM5NTc5MDExNDE1Njk0NDAwMjUyMTkiLCJ2IjoiMTAwODYwMTE5NjExNDQ0MjUxODg1ODcyNzA0OTEyNDQwMTQzNTA0MDEwMDQ3NzE3MzYxNzgxMjIwOTQ0OTA3OTE3ODM0NTE3NjQyOTk5MDgxMjEzMDcyNTI4NzU5NTczMzIyNDM1NjU5NzY4OTI2NzA4MjE0NTI5Njg0Njg5NTc5MjAwNzY4MDkxMTM0OTM0MzYxNDUyNzM5ODUwMjEyODc1MDUwMzg5NjkzOTMxMjEzMDg2MTUyOTM4NzA2ODc4MzQyNjIxNjQ1MTc2NDY5NTU0NDMyNTY2MDk0MDY5NjU2ODkzNDg1NjQyNDI2MTc0MjA5MjY3OTI1MDEzODkxMTU2MzAzMzY0MzUwMzgwNTUwMzQ4OTk3MDI1Nzc3NDc5NDg3ODI0NDkzNzg4MDYwNTg1NzMxMTY2NDM5OTE1MTc3ODUyNTYwNjczMjkwODA2Mjk5ODEyOTY1NjMwNDc2OTc0NzExNDY4MDE1MzY4NzM2NTc3MDEzNDE2NjE3ODc0MTc3ODgwNjMzNTc1OTAwMzQyODM5MDUxNjc4NjExNDMxMTk5Mzk3NTIzMDE5Njc0NTA3MjM0NDAzNzcyMTcxMDM3Nzg3NzUyNTMwMjIyODYyNDg5OTMzMzczMzY1MjIwNTc4MDIzNDY2NjkyMDQ4MTA0NTE0NjczMzMwMzMwNzQ1OTEyMjUzNzQ0MDQwMjI1NTM4NjMxNDk2MjY4NDM0MDk5Njk3Nzk1NTY5MDA3MTExMjQzMTg4MTc3MzUyNjE5MTUxNzk1NjEzNTAwNjg5MzUwMzQyNTk3NjA1ODY2MjUyOTYwMjQ3ODg4OTE2NDIwNDcyMDEzNDYzMTA5NTA5MjMxNDcwNjc4MDc5MDI2Mzc3MzY4NDEwNTIyODg3NDExOTIyMzE4Njk5NzA4MjkxNzI4NTg3ODgzNjExODMyMjU4MTE5MzI2ODQ5NjkxODI1MDI2MzU2NDQ1OTM1NjYxOTkyODEyNjIwNDY4MzAxMjEwMzMwNTA1NjEwMjYyNTU5MDk5NDgwNzcxMjA0NDU0ODg0MDI5ODA3MDcwOTM4NDU5OTgxNDM1NjQyNTkzNTQyODc0ODAifSwicl9jcmVkZW50aWFsIjpudWxsfSwic2lnbmF0dXJlX2NvcnJlY3RuZXNzX3Byb29mIjp7InNlIjoiMjMwNDc5NjEzNTA0MDI5NTI3NTk3NzM3MTY4NjY0OTQ5MzQwNzk1NTg1ODM5NTQ4OTI2MTEwMjQ2NzU0NzA3OTgyNjc2MDEyMjIyMTYyNzQyNTQ2Nzg4NDI3MDA4MDQ5NzIyNDMwNDgyODAyOTYyNTgxNDE2ODI2MjEzMTgwMTE4MTA4MTA1Nzg1NjA4OTg5NjEyNTU0ODMwOTE5MjU4MTI0NDgyMzUwNTQ2MTkxOTQ5NTU5ODM2NTk4NzcxMTE0MzI1NjA5MTI4MjUxMTc1MDM4NDMxNDA2NzM2NTc1MDkwMzk5ODk0MDQzMjc3MTg5MTM3MzE1NTM5NTQ2MTE3Mjk2NTM1OTMyOTQ3NDk3NTU0Mjg0NDc1NjkxNDE1NDEzMzIzNjE2OTYyNTk1NDAzMTkxMjQ4ODY2NDE1MjI0NDY2MTU2OTgyODg4OTkyNTAxNjc1NTcwNjI0MzQ2MzMyMTE0NjMzMDQ1NzUxNDg3NzU3ODM3MDA5Mzc3ODMwNTI1MTU5MjUwNjMwMjcxNjY3NDQxMDI3MTM5MjE3Nzc5ODU5MDExMjUxOTc1OTczNjY0NTc4MjMxOTk1Mzc3OTE4Mjg4MTkyNjIyMDM5NDEzMDM0ODg5MjM3Mzg2NzU4Mzg3NTcwNTMxNDc1OTQxMDU2MTg3NzUzOTEyNDA0NzkwNzQ5NzgzMTM0OTk3MDgzODk3NjE5MTczMTg3MDg1MzE1MjQ3NTM4NjU2OTcwOTE0NzI2MzM1ODA1ODY5OTk3NzI3OTc5NTUwMjIzNjkzMDA2MjcwNjIzNTc3NjM2NTIyNjIyNTY0MTE4NTMiLCJjIjoiOTM2NzQ1MDczNzcxNzQ3MjE3OTg3OTY2OTYzMDQxNzUzMTE4NDk0NDE4NDQ0NzQ1MDI3NzAyMjI3Nzk0NzU1ODQ2Mjg3ODMzMzU4NTAifSwicmV2X3JlZyI6bnVsbCwid2l0bmVzcyI6bnVsbH0=",
  • "issuingDID": "did:prism:3bb0505d13fcb04d28a48234edb27b0d4e6d7e18a81e2c1abab58f3bbc21ce6f",
  • "metaRetries": 5
}

As a holder, accept a new credential offer received from another issuer Agent.

As a holder, accept a new credential offer received from an issuer Agent. The subsequent credential request message sent to the issuer adheres to the Issue Credential Protocol 3.0 - Request Credential specification.

Authorizations:
apiKeyAuthjwtAuth
path Parameters
recordId
required
string

The recordId uniquely identifying the issue credential flow record.

Request Body schema: application/json

The accept credential offer request object.

subjectId
string

The short-form subject Prism DID to which the JWT verifiable credential will be issued. This parameter only applies if the offer is of type 'JWT'.

Responses

Request samples

Content type
application/json
{
  • "subjectId": "did:prism:3bb0505d13fcb04d28a48234edb27b0d4e6d7e18a81e2c1abab58f3bbc21ce6f"
}

Response samples

Content type
application/json
{
  • "recordId": "80d612dc-0ded-4ac9-90b4-1b8eabb04545",
  • "thid": "0527aea1-d131-3948-a34d-03af39aba8b4",
  • "credentialFormat": "JWT",
  • "subjectId": "did:prism:3bb0505d13fcb04d28a48234edb27b0d4e6d7e18a81e2c1abab58f3bbc21ce6f",
  • "validityPeriod": 3600,
  • "claims": {
    },
  • "automaticIssuance": true,
  • "createdAt": "2024-03-20T18:35:17.903237532Z",
  • "updatedAt": "2019-08-24T14:15:22Z",
  • "role": "Issuer",
  • "protocolState": "CredentialSent",
  • "credential": "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",
  • "issuingDID": "did:prism:3bb0505d13fcb04d28a48234edb27b0d4e6d7e18a81e2c1abab58f3bbc21ce6f",
  • "metaRetries": 5
}

As an issuer, issues the verifiable credential related the identified issuance flow record.

As an issuer, issues the verifiable credential related the identified issuance flow record. The JWT or AnonCreds credential will be generated and sent to the holder Agent asynchronously and through DIDComm. Note that this endpoint should only be called when automatic issuance is disabled for this record (i.e. automaticIssuance attribute set to false at offer creation time).

Authorizations:
apiKeyAuthjwtAuth
path Parameters
recordId
required
string

The recordId uniquely identifying the issue credential flow record.

Responses

Response samples

Content type
application/json
{
  • "recordId": "80d612dc-0ded-4ac9-90b4-1b8eabb04545",
  • "thid": "0527aea1-d131-3948-a34d-03af39aba8b4",
  • "credentialFormat": "JWT",
  • "subjectId": "did:prism:3bb0505d13fcb04d28a48234edb27b0d4e6d7e18a81e2c1abab58f3bbc21ce6f",
  • "validityPeriod": 3600,
  • "claims": {
    },
  • "automaticIssuance": true,
  • "createdAt": "2024-03-20T18:35:17.903237532Z",
  • "updatedAt": "2019-08-24T14:15:22Z",
  • "role": "Issuer",
  • "protocolState": "CredentialSent",
  • "credential": "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",
  • "issuingDID": "did:prism:3bb0505d13fcb04d28a48234edb27b0d4e6d7e18a81e2c1abab58f3bbc21ce6f",
  • "metaRetries": 5
}

Verification

The Verification endpoints enable the management and lookup of verification policies,which are applied to W3C Verifiable Credentials in JWT format.

Users can retrieve and paginate existing policies or create new ones. These policies determine the verification criteria, allowing users to specify constraints such as schemaId and trustedIssuers in the current implementation.

The constraints are defined using the schemaId and a sequence of trustedIssuers. This functionality ensures the system's integrity and adherence to specific verification requirements.

Endpoints are secured by apiKeyAuth or jwtAuth authentication.

Lookup verification policies by query

Lookup verification policies by name, and control the pagination by offset and limit parameters

Authorizations:
apiKeyAuthjwtAuth
query Parameters
name
string

A human-readable name for the verification policy. The name cannot be empty.

offset
integer <int32>
limit
integer <int32>
order
string

Responses

Response samples

Content type
application/json
{
  • "self": "/prism-agent/verification/policies?name=Trusted&offset=0&limit=10",
  • "kind": "VerificationPolicyPage",
  • "pageOf": "/prism-agent/verification/policies",
  • "next": "/prism-agent/verification/policies?skip=20&limit=10",
  • "previous": "/prism-agent/verification/policies?skip=0&limit=10",
  • "contents": [
    ]
}

Create the new verification policy

Create the new verification policy

Authorizations:
apiKeyAuthjwtAuth
Request Body schema: application/json

Create verification policy object

id
string <uuid>

A unique identifier to address the verification policy instance. UUID is generated by the backend.

name
required
string non-empty

A human-readable name for the verification policy. The name cannot be empty.

description
required
string

A human-readable description of the verification policy.

Array of objects (VerificationPolicyConstraint)

The object that describes the constraints of the verification policy. Each constraint is a tuple of the schemaId and a set of DIDs of the trusted issuers.

Responses

Request samples

Content type
application/json
{
  • "id": "0527aea1-d131-3948-a34d-03af39aba8b5",
  • "name": "Trusted Issuers Verification Policy",
  • "description": "Verification policy that checks if the credential was issued by a trusted issuer.",
  • "constraints": []
}

Response samples

Content type
application/json
{
  • "self": "/prism-agent/verification/policies/0527aea1-d131-3948-a34d-03af39aba8b4",
  • "kind": "VerificationPolicy",
  • "id": "0527aea1-d131-3948-a34d-03af39aba8b5",
  • "nonce": 1234,
  • "name": "Trusted Issuers Verification Policy",
  • "description": "Verification policy that checks if the credential was issued by a trusted issuer.",
  • "createdAt": "2022-03-10T12:00Z",
  • "updatedAt": "2022-03-10T12:00Z",
  • "constraints": []
}

Fetch the verification policy by id

Get the verification policy by id

Authorizations:
apiKeyAuthjwtAuth
path Parameters
id
required
string <uuid>

Get the verification policy by id

Responses

Response samples

Content type
application/json
{
  • "self": "/prism-agent/verification/policies/0527aea1-d131-3948-a34d-03af39aba8b4",
  • "kind": "VerificationPolicy",
  • "id": "0527aea1-d131-3948-a34d-03af39aba8b5",
  • "nonce": 1234,
  • "name": "Trusted Issuers Verification Policy",
  • "description": "Verification policy that checks if the credential was issued by a trusted issuer.",
  • "createdAt": "2022-03-10T12:00Z",
  • "updatedAt": "2022-03-10T12:00Z",
  • "constraints": []
}

Update the verification policy object by id

Update the verification policy entry

Authorizations:
apiKeyAuthjwtAuth
path Parameters
id
required
string <uuid>
query Parameters
nonce
required
integer <int32>

Nonce of the previous VerificationPolicy

Request Body schema: application/json

Update verification policy object

id
string <uuid>

A unique identifier to address the verification policy instance. UUID is generated by the backend.

name
required
string non-empty

A human-readable name for the verification policy. The name cannot be empty.

description
required
string

A human-readable description of the verification policy.

Array of objects (VerificationPolicyConstraint)

The object that describes the constraints of the verification policy. Each constraint is a tuple of the schemaId and a set of DIDs of the trusted issuers.

Responses

Request samples

Content type
application/json
{
  • "id": "0527aea1-d131-3948-a34d-03af39aba8b5",
  • "name": "Trusted Issuers Verification Policy",
  • "description": "Verification policy that checks if the credential was issued by a trusted issuer.",
  • "constraints": []
}

Response samples

Content type
application/json
{
  • "self": "/prism-agent/verification/policies/0527aea1-d131-3948-a34d-03af39aba8b4",
  • "kind": "VerificationPolicy",
  • "id": "0527aea1-d131-3948-a34d-03af39aba8b5",
  • "nonce": 1234,
  • "name": "Trusted Issuers Verification Policy",
  • "description": "Verification policy that checks if the credential was issued by a trusted issuer.",
  • "createdAt": "2022-03-10T12:00Z",
  • "updatedAt": "2022-03-10T12:00Z",
  • "constraints": []
}

Deleted the verification policy by id

Delete the verification policy by id

Authorizations:
apiKeyAuthjwtAuth
path Parameters
id
required
string <uuid>

Delete the verification policy by id

Responses

Response samples

Content type
application/json
{
  • "status": 200,
  • "title": "Malformed email",
  • "detail": "The received '{}à!è@!.b}' email does not conform to the email format",
  • "instance": "The received '{}à!è@!.b}' email does not conform to the email format"
}

Schema Registry

The Schema Registry is a REST API that allows to publish and lookup credential schemas in W3C and AnonCreds formats.

The Credential Schema is a JSON document that describes the structure of the credential and consists of the following parts: metadata, schema and signature. The metadata contains the following fields:

  • id - locally unique identifier of the schema
  • version - version of the schema
  • author - the DID of the issuer of the schema
  • guid - globally unique identifier of the schema (generated by the Schema Registry based on author, id and version)
  • name - name of the schema
  • tags - list of tags that describe the schema
  • createdAt - timestamp of the schema creation
  • description - description of the schema

The schema contains the JSON Schema that describes the structure of the credential in the schema field The signature contains the signature of the schema by the issuer in the proof field. The signature is generated by the issuer's DID key using Ed25519Signature2020 method.

The Credential Schema object is immutable, so update operation creates a new version of the schema. The Credential Schema is referenced via schemaId field in the issuance and verification flows.

Endpoints are secured by apiKeyAuth or jwtAuth authentication.

Lookup schemas by indexed fields

Lookup schemas by author, name, tags parameters and control the pagination by offset and limit parameters

Authorizations:
apiKeyAuthjwtAuth
query Parameters
author
string
Example: author=did:prism:4a5b5cf0a513e83b598bbea25cd6196746747f361a73ef77068268bc9bd732ff
name
string
Example: name=DrivingLicense
version
string
Example: version=1.0.0
tags
string
Example: tags=driving
offset
integer <int32>

The number of items to skip before returning results. Default is 0 if not specified.

limit
integer <int32>

The maximum number of items to return. Defaults to 100 if not specified.

order
string

Responses

Response samples

Content type
application/json
{
  • "contents": [ ],
  • "kind": "CredentialSchemaPage",
  • "self": "/prism-agent/schema-registry/schemas?skip=10&limit=10",
  • "pageOf": "/prism-agent/schema-registry/schemas",
  • "next": "/prism-agent/schema-registry/schemas?skip=20&limit=10",
  • "previous": "/prism-agent/schema-registry/schemas?skip=0&limit=10"
}

Publish new schema to the schema registry

Create the new credential schema record with metadata and internal JSON Schema on behalf of Cloud Agent. The credential schema will be signed by the keys of Cloud Agent and issued by the DID that corresponds to it.

Authorizations:
apiKeyAuthjwtAuth
Request Body schema: application/json

JSON object required for the credential schema creation

name
required
string non-empty

A human-readable name for the credential schema. A piece of Metadata.

version
required
string^(0|[1-9]\d*)\.(0|[1-9]\d*)\.(0|[1-9]\d*)(?:-...

Denotes the revision of a given Credential Schema. It should follow semantic version convention to describe the impact of the schema evolution.

description
string non-empty

A human-readable description of the credential schema

type
required
string

This field resolves to a JSON schema with details about the schema metadata that applies to the schema. A piece of Metadata.

schema
required
any

Valid JSON Schema where the Credential Schema data fields are defined. A piece of Metadata

tags
Array of strings

Tokens that allow to lookup and filter the credential schema records.

author
required
string^did:(?<method>[a-z0-9]+(:[a-z0-9]+)*)\:(?<id...

DID of the identity which authored the credential schema. A piece of Metadata.

Responses

Request samples

Content type
application/json
{
  • "name": "DrivingLicense",
  • "version": "1.0.0",
  • "description": "Simple credential schema for the driving licence verifiable credential.",
  • "schema": {
    },
  • "tags": [
    ],
  • "author": "did:prism:4a5b5cf0a513e83b598bbea25cd6196746747f361a73ef77068268bc9bd732ff"
}

Response samples

Content type
application/json
{
  • "guid": "0527aea1-d131-3948-a34d-03af39aba8b4",
  • "id": "0527aea1-d131-3948-a34d-03af39aba8b5",
  • "longId": "did:prism:4a5b5cf0a513e83b598bbea25cd6196746747f361a73ef77068268bc9bd732ff/0527aea1-d131-3948-a34d-03af39aba8b4?version=1.0.0",
  • "name": "DrivingLicense",
  • "version": "1.0.0",
  • "tags": [
    ],
  • "description": "Simple credential schema for the driving licence verifiable credential.",
  • "schema": {
    },
  • "author": "did:prism:4a5b5cf0a513e83b598bbea25cd6196746747f361a73ef77068268bc9bd732ff",
  • "authored": "2022-03-10T12:00Z",
  • "proof": {
    },
  • "kind": "CredentialSchema",
  • "self": "/prism-agent/schema-registry/schemas/0527aea1-d131-3948-a34d-03af39aba8b4"
}

Publish the new version of the credential schema to the schema registry

Publish the new version of the credential schema record with metadata and internal JSON Schema on behalf of Cloud Agent. The credential schema will be signed by the keys of Cloud Agent and issued by the DID that corresponds to it.

Authorizations:
apiKeyAuthjwtAuth
path Parameters
author
required
string

DID of the identity which authored the credential schema. A piece of Metadata.

id
required
string <uuid>

A locally unique identifier to address the schema. UUID is generated by the backend.

Request Body schema: application/json

JSON object required for the credential schema update

name
required
string non-empty

A human-readable name for the credential schema. A piece of Metadata.

version
required
string^(0|[1-9]\d*)\.(0|[1-9]\d*)\.(0|[1-9]\d*)(?:-...

Denotes the revision of a given Credential Schema. It should follow semantic version convention to describe the impact of the schema evolution.

description
string non-empty

A human-readable description of the credential schema

type
required
string

This field resolves to a JSON schema with details about the schema metadata that applies to the schema. A piece of Metadata.

schema
required
any

Valid JSON Schema where the Credential Schema data fields are defined. A piece of Metadata

tags
Array of strings

Tokens that allow to lookup and filter the credential schema records.

author
required
string^did:(?<method>[a-z0-9]+(:[a-z0-9]+)*)\:(?<id...

DID of the identity which authored the credential schema. A piece of Metadata.

Responses

Request samples

Content type
application/json
{
  • "name": "DrivingLicense",
  • "version": "1.0.0",
  • "description": "Simple credential schema for the driving licence verifiable credential.",
  • "schema": {
    },
  • "tags": [
    ],
  • "author": "did:prism:4a5b5cf0a513e83b598bbea25cd6196746747f361a73ef77068268bc9bd732ff"
}

Response samples

Content type
application/json
{
  • "guid": "0527aea1-d131-3948-a34d-03af39aba8b4",
  • "id": "0527aea1-d131-3948-a34d-03af39aba8b5",
  • "longId": "did:prism:4a5b5cf0a513e83b598bbea25cd6196746747f361a73ef77068268bc9bd732ff/0527aea1-d131-3948-a34d-03af39aba8b4?version=1.0.0",
  • "name": "DrivingLicense",
  • "version": "1.0.0",
  • "tags": [
    ],
  • "description": "Simple credential schema for the driving licence verifiable credential.",
  • "schema": {
    },
  • "author": "did:prism:4a5b5cf0a513e83b598bbea25cd6196746747f361a73ef77068268bc9bd732ff",
  • "authored": "2022-03-10T12:00Z",
  • "proof": {
    },
  • "kind": "CredentialSchema",
  • "self": "/prism-agent/schema-registry/schemas/0527aea1-d131-3948-a34d-03af39aba8b4"
}

Fetch the schema from the registry by `guid`

Fetch the credential schema by the unique identifier

Authorizations:
(apiKeyAuthadminApiKeyAuthjwtAuth)
path Parameters
guid
required
string <uuid>

Globally unique identifier of the credential schema record

Responses

Response samples

Content type
application/json
{
  • "guid": "0527aea1-d131-3948-a34d-03af39aba8b4",
  • "id": "0527aea1-d131-3948-a34d-03af39aba8b5",
  • "longId": "did:prism:4a5b5cf0a513e83b598bbea25cd6196746747f361a73ef77068268bc9bd732ff/0527aea1-d131-3948-a34d-03af39aba8b4?version=1.0.0",
  • "name": "DrivingLicense",
  • "version": "1.0.0",
  • "tags": [
    ],
  • "description": "Simple credential schema for the driving licence verifiable credential.",
  • "schema": {
    },
  • "author": "did:prism:4a5b5cf0a513e83b598bbea25cd6196746747f361a73ef77068268bc9bd732ff",
  • "authored": "2022-03-10T12:00Z",
  • "proof": {
    },
  • "kind": "CredentialSchema",
  • "self": "/prism-agent/schema-registry/schemas/0527aea1-d131-3948-a34d-03af39aba8b4"
}

Fetch the schema from the registry by `guid`

Fetch the credential schema by the unique identifier

Authorizations:
(apiKeyAuthadminApiKeyAuthjwtAuth)
path Parameters
guid
required
string <uuid>

Responses

Response samples

Content type
application/json
null

Credential Definition Registry

The Credential Definition Registry is a REST API that allows to publish and lookup Anoncreds Credential Definition entities.

A credential definition is generated by the issuer before credential any issuances and published for anyone (primarily holders and verifiers) to use. In generating the published credential definition, related private data is also generated and held as a secret by the issuer. The secret data includes the private keys necessary to generate signed verifiable credentials that can be presented and verified using the published credential definition.

Endpoints are secured by apiKeyAuth or jwtAuth authentication.

Lookup credential definitions by indexed fields

Lookup credential definitions by author, name, tag parameters and control the pagination by offset and limit parameters

Authorizations:
apiKeyAuthjwtAuth
query Parameters
author
string
Example: author=did:prism:4a5b5cf0a513e83b598bbea25cd6196746747f361a73ef77068268bc9bd732ff
name
string
Example: name=DrivingLicense
version
string
Example: version=1.0.0
tag
string
Example: tag=licence
offset
integer <int32>

The number of items to skip before returning results. Default is 0 if not specified.

limit
integer <int32>

The maximum number of items to return. Defaults to 100 if not specified.

order
string

Responses

Response samples

Content type
application/json
{
  • "contents": [ ],
  • "kind": "CredentialSchemaPage",
  • "self": "/prism-agent/schema-registry/schemas?skip=10&limit=10",
  • "pageOf": "/prism-agent/schema-registry/schemas",
  • "next": "/prism-agent/schema-registry/schemas?skip=20&limit=10",
  • "previous": "/prism-agent/schema-registry/schemas?skip=0&limit=10"
}

Publish new definition to the definition registry

Create the new credential definition record with metadata and internal JSON Schema on behalf of Cloud Agent. The credential definition will be signed by the keys of Cloud Agent and issued by the DID that corresponds to it.

Authorizations:
apiKeyAuthjwtAuth
Request Body schema: application/json

JSON object required for the credential definition creation

name
required
string non-empty

A human-readable name for the credential definition. A piece of Metadata.

description
string non-empty

A human-readable description of the credential definition

version
required
string^(0|[1-9]\d*)\.(0|[1-9]\d*)\.(0|[1-9]\d*)(?:-...

Denotes the revision of a given Credential Definition. It should follow semantic version convention to describe the impact of the credential definition evolution.

tag
required
string

Token that allow to lookup and filter the credential definition records.

author
required
string^did:(?<method>[a-z0-9]+(:[a-z0-9]+)*)\:(?<id...

DID of the identity which authored the credential definition. A piece of Metadata.

schemaId
required
string

The unique identifier of the schema used for this credential definition.

signatureType
required
string

Signature type used in the CredentialDefinition.

supportRevocation
required
boolean

Boolean flag indicating whether revocation is supported for this CredentialDefinition.

Responses

Request samples

Content type
application/json
{}

Response samples

Content type
application/json
{
  • "guid": "0527aea1-d131-3948-a34d-03af39aba8b4",
  • "id": "0527aea1-d131-3948-a34d-03af39aba8b5",
  • "longId": "did:prism:4a5b5cf0a513e83b598bbea25cd6196746747f361a73ef77068268bc9bd732ff/0527aea1-d131-3948-a34d-03af39aba8b4?version=1.0.0",
  • "name": "DrivingLicense",
  • "version": "1.0.0",
  • "tag": "licence",
  • "description": "Simple credential definition for the driving licence verifiable credential.",
  • "author": "did:prism:4a5b5cf0a513e83b598bbea25cd6196746747f361a73ef77068268bc9bd732ff",
  • "authored": "2022-03-10T12:00Z",
  • "definition": {
    },
  • "keyCorrectnessProof": null,
  • "signatureType": "CL",
  • "supportRevocation": false,
  • "proof": {
    },
  • "kind": "CredentialDefinition",
  • "self": "/prism-agent/credential-definition-registry/schemas/0527aea1-d131-3948-a34d-03af39aba8b4"
}

Fetch the credential definition from the registry by `guid`

Fetch the credential definition by the unique identifier

Authorizations:
(apiKeyAuthadminApiKeyAuthjwtAuth)
path Parameters
guid
required
string <uuid>

Globally unique identifier of the credential definition record

Responses

Response samples

Content type
application/json
{
  • "guid": "0527aea1-d131-3948-a34d-03af39aba8b4",
  • "id": "0527aea1-d131-3948-a34d-03af39aba8b5",
  • "longId": "did:prism:4a5b5cf0a513e83b598bbea25cd6196746747f361a73ef77068268bc9bd732ff/0527aea1-d131-3948-a34d-03af39aba8b4?version=1.0.0",
  • "name": "DrivingLicense",
  • "version": "1.0.0",
  • "tag": "licence",
  • "description": "Simple credential definition for the driving licence verifiable credential.",
  • "author": "did:prism:4a5b5cf0a513e83b598bbea25cd6196746747f361a73ef77068268bc9bd732ff",
  • "authored": "2022-03-10T12:00Z",
  • "definition": {
    },
  • "keyCorrectnessProof": null,
  • "signatureType": "CL",
  • "supportRevocation": false,
  • "proof": {
    },
  • "kind": "CredentialDefinition",
  • "self": "/prism-agent/credential-definition-registry/schemas/0527aea1-d131-3948-a34d-03af39aba8b4"
}

Fetch the inner definition field of the credential definition from the registry by `guid`

Fetch the inner definition fields of the credential definition by the unique identifier

Authorizations:
(apiKeyAuthadminApiKeyAuthjwtAuth)
path Parameters
guid
required
string <uuid>

Responses

Response samples

Content type
application/json
null

DID

The DID endpoints expose publicly available DID operations.

The key distinction from the DID Registrar endpoints is that it directly exposes the DID resources interfacing with the VDR. It is independent of the key management and the exposed operations are not part of the tenancy within the Agent. It serves as a proxy for interacting with the VDR, facilitating actions like resolving DIDs.

Resolve Prism DID to a W3C representation

Resolve Prism DID to a W3C DID document representation. The response can be the DID resolution result or DID document representation depending on the Accept request header. The response is implemented according to resolver HTTP binding in the DID resolution spec.

Authorizations:
(apiKeyAuthadminApiKeyAuthjwtAuth)
path Parameters
didRef
required
string
Example: did:prism:4a5b5cf0a513e83b598bbea25cd6196746747f361a73ef77068268bc9bd732ff

Prism DID according to the Prism DID method syntax

Responses

Response samples

Content type
{
  • "didDocument": {
    },
  • "didDocumentMetadata": {
    },
  • "didResolutionMetadata": {
    }
}

DID Registrar

The DID Registrar endpoints facilitate the management of PRISM DIDs hosted in the cloud agent.

Implentation of DID management in the cloud agent. The agent securely manages and stores DIDs along with their keys in its secret storage. These endpoints allow users to create, read, update, deactivate, and publish without direct exposure to the key material. These DIDs can be utilized for various operations during issuance and verification processes.

More examples and tutorials can be found in this documentation.

List all DIDs stored in the agent's wallet

List all DIDs stored in the agent's wallet. Return a paginated items ordered by created timestamp.

Authorizations:
apiKeyAuthjwtAuth
query Parameters
offset
integer <int32>

The number of items to skip before returning results. Default is 0 if not specified.

limit
integer <int32>

The maximum number of items to return. Defaults to 100 if not specified.

Responses

Response samples

Content type
application/json
{
  • "self": "string",
  • "kind": "string",
  • "pageOf": "string",
  • "next": "string",
  • "previous": "string",
  • "contents": [
    ]
}

Create an unpublished PRISM DID and store it in the agent's wallet

Create an unpublished PRISM DID and store it in the agent's wallet. The public/private keys of the DID will be derived according to the didDocumentTemplate and managed by the agent. The DID can later be published to the VDR using the publications endpoint. After the DID is created, it has the CREATED status.

Authorizations:
apiKeyAuthjwtAuth
Request Body schema: application/json
required
object (CreateManagedDidRequestDocumentTemplate)
Array of objects (ManagedDIDKeyTemplate)
Array of objects (Service)
contexts
Array of strings

Responses

Request samples

Content type
application/json
{}

Response samples

Content type
application/json
{
  • "longFormDid": "did:prism:4a5b5cf0a513e83b598bbea25cd6196746747f361a73ef77068268bc9bd732ff:Cr4BCrsBElsKBmF1dGgtMRAEQk8KCXNlY3AyNTZrMRIg0opTuxu-zt6aRbT1tPniG4eu4CYsQPM3rrLzvzNiNgwaIIFTnyT2N4U7qCQ78qtWC3-p0el6Hvv8qxG5uuEw-WgMElwKB21hc3RlcjAQAUJPCglzZWNwMjU2azESIKhBU0eCOO6Vinz_8vhtFSAhYYqrkEXC8PHGxkuIUev8GiAydFHLXb7c22A1Uj_PR21NZp6BCDQqNq2xd244txRgsQ"
}

Get a specific DID stored in the agent's wallet

Get a specific DID stored in the agent's wallet

Authorizations:
apiKeyAuthjwtAuth
path Parameters
didRef
required
string
Example: did:prism:4a5b5cf0a513e83b598bbea25cd6196746747f361a73ef77068268bc9bd732ff

Prism DID according to the Prism DID method syntax

Responses

Response samples

Content type
application/json
{
  • "did": "did:prism:4a5b5cf0a513e83b598bbea25cd6196746747f361a73ef77068268bc9bd732ff",
  • "longFormDid": "did:prism:4a5b5cf0a513e83b598bbea25cd6196746747f361a73ef77068268bc9bd732ff:Cr4BCrsBElsKBmF1dGgtMRAEQk8KCXNlY3AyNTZrMRIg0opTuxu-zt6aRbT1tPniG4eu4CYsQPM3rrLzvzNiNgwaIIFTnyT2N4U7qCQ78qtWC3-p0el6Hvv8qxG5uuEw-WgMElwKB21hc3RlcjAQAUJPCglzZWNwMjU2azESIKhBU0eCOO6Vinz_8vhtFSAhYYqrkEXC8PHGxkuIUev8GiAydFHLXb7c22A1Uj_PR21NZp6BCDQqNq2xd244txRgsQ",
  • "status": "CREATED"
}

Publish the DID stored in the agent's wallet to the VDR

Initiate the publication of the DID stored in the agent's wallet to the VDR. The publishing process is asynchronous. Attempting to publish the same DID while the previous publication is ongoing will not initiate another publication. After the submission of the DID publication, its status is changed to PUBLICATION_PENDING. Upon confirmation after a predefined number of blocks, the status is changed to PUBLISHED. In case of a failed DID publication, the status is reverted to CREATED.

Authorizations:
apiKeyAuthjwtAuth
path Parameters
didRef
required
string
Example: did:prism:4a5b5cf0a513e83b598bbea25cd6196746747f361a73ef77068268bc9bd732ff

Prism DID according to the Prism DID method syntax

Responses

Response samples

Content type
application/json
{
  • "scheduledOperation": {
    }
}

Update DID in the agent's wallet and post update operation to the VDR

Update DID in the agent's wallet and post the update operation to the VDR. Only the DID with status PUBLISHED can be updated. This endpoint updates the DID document from the last confirmed operation. The update operation is asynchornous operation and the agent will reject a new update request if the previous operation is not yet comfirmed.

Authorizations:
apiKeyAuthjwtAuth
path Parameters
didRef
required
string
Example: did:prism:4a5b5cf0a513e83b598bbea25cd6196746747f361a73ef77068268bc9bd732ff

Prism DID according to the Prism DID method syntax

Request Body schema: application/json
Array of objects (UpdateManagedDIDRequestAction)
Array
actionType
required
string (ActionType)
Enum: "ADD_KEY" "ADD_SERVICE" "PATCH_CONTEXT" "REMOVE_KEY" "REMOVE_SERVICE" "UPDATE_SERVICE"
object (ManagedDIDKeyTemplate)

A key-pair template to add to DID document.

object (RemoveEntryById)
object (Service)

A service that should appear in the DID document. https://www.w3.org/TR/did-core/#services

object (RemoveEntryById)
object (UpdateManagedDIDServiceAction)

A patch to existing Service. 'type' and 'serviceEndpoint' cannot both be empty.

object (PatchContextAction)

Responses

Request samples

Content type
application/json
{
  • "actions": [
    ]
}

Response samples

Content type
application/json
{
  • "scheduledOperation": {
    }
}

Deactivate DID in the agent's wallet and post deactivate operation to the VDR

Deactivate DID in the agent's wallet and post deactivate operation to the VDR. Only the DID with status PUBLISHED can be deactivated. The deactivate operation is asynchornous operation and the agent will reject a new deactivate request if the previous operation is not yet comfirmed.

Authorizations:
apiKeyAuthjwtAuth
path Parameters
didRef
required
string
Example: did:prism:4a5b5cf0a513e83b598bbea25cd6196746747f361a73ef77068268bc9bd732ff

Prism DID according to the Prism DID method syntax

Responses

Response samples

Content type
application/json
{
  • "scheduledOperation": {
    }
}

Wallet Management

The Wallet Management endpoints enable both users and administrators to manage wallets.

In a multitenant agent, wallet is a container for various resources (e.g. Connections, DIDs) and it isolates the access based on the authorization settings. Admnistrator can utilize the endpoints to manage and onboard tenants. See this example for instructions how to utilize the endpoints for administrator. Tenants can also manage and onboard their own wallets using these endpoints depending on the configuration. See this document for a detailed example for self-service tenants onboarding.

Wallet permissions are controlled by UMA configuration which the agent exposes endpoints to easily configure wallet access using uma-permissions resource. The permissions can also be configured out-of-band directly on the external IAM provider that supports the UMA standard.

List all permitted wallets

List all permitted wallets. If the role is admin, returns all the wallets. If the role is tenant, only return permitted wallets.

Authorizations:
adminApiKeyAuthapiKeyAuthjwtAuth
query Parameters
offset
integer <int32>

The number of items to skip before returning results. Default is 0 if not specified.

limit
integer <int32>

The maximum number of items to return. Defaults to 100 if not specified.

Responses

Response samples

Content type
application/json
{
  • "self": "string",
  • "kind": "string",
  • "pageOf": "string",
  • "next": "string",
  • "previous": "string",
  • "contents": [
    ]
}

Create a new wallet

Create a new wallet with the option to provide the seed. The seed will be used for all PRISM DID keypair derivation within the wallet.

If the role is admin, a wallet can be created at any time. If the role is tenant, a wallet can only be created if there is no existing wallet permission for that tenant. The permission for the tenant will be automatically granted after the wallet is created with tenant role.

Authorizations:
adminApiKeyAuthapiKeyAuthjwtAuth
Request Body schema: application/json
seed
string

A BIP32 seed encoded in hexadecimal string. It is expected to represent 64-bytes binary seed (128 hex characters).

name
required
string [ 1 .. 128 ] characters

A name of the wallet

id
string <uuid>

The unique id of the wallet. Randomly generated if not specified.

Responses

Request samples

Content type
application/json
{
  • "seed": "c9994785ce6d548134020f610b76102ca1075d3bb672a75ec8c9a27a7b8607e3b9b384e43b77bb08f8d5159651ae38b98573f7ecc79f2d7e1f1cc371ce60cf8a",
  • "name": "my-wallet-1",
  • "id": "00000000-0000-0000-0000-000000000000"
}

Response samples

Content type
application/json
{
  • "id": "00000000-0000-0000-0000-000000000000",
  • "name": "my-wallet-1",
  • "createdAt": "2023-01-01T00:00:00Z",
  • "updatedAt": "2023-01-01T00:00:00Z"
}

Get the wallet by ID

Get the wallet by ID. If the role is tenant, only search the ID of permitted wallets.

Authorizations:
adminApiKeyAuthapiKeyAuthjwtAuth
path Parameters
walletId
required
string <uuid>

Responses

Response samples

Content type
application/json
{
  • "id": "00000000-0000-0000-0000-000000000000",
  • "name": "my-wallet-1",
  • "createdAt": "2023-01-01T00:00:00Z",
  • "updatedAt": "2023-01-01T00:00:00Z"
}

Create a UMA resource permission on an authorization server for the wallet.

Create a UMA resource permission on an authorization server for the wallet. This grants the wallet permission to the specified subject, where the subject denotes the identity of the tenant on an authorization server.

Authorizations:
adminApiKeyAuthapiKeyAuthjwtAuth
path Parameters
walletId
required
string <uuid>
Request Body schema: application/json
subject
required
string <uuid>

The subject ID that should be granted the permission to the wallet. This can be found in the sub claim of a JWT token.

Responses

Request samples

Content type
application/json
{
  • "subject": "00000000-0000-0000-0000-000000000000"
}

Response samples

Content type
application/json
{
  • "status": 200,
  • "title": "Malformed email",
  • "detail": "The received '{}à!è@!.b}' email does not conform to the email format",
  • "instance": "The received '{}à!è@!.b}' email does not conform to the email format"
}

Delete a UMA resource permission on an authorization server for the wallet.

Remove a UMA resource permission on an authorization server for the wallet. This remove the wallet permission to the specified subject, where the subject denotes the identity of the tenant on an authorization server.

Authorizations:
adminApiKeyAuthapiKeyAuthjwtAuth
path Parameters
walletId
required
string <uuid>
query Parameters
subject
required
string <uuid>

Responses

Response samples

Content type
application/json
{
  • "status": 200,
  • "title": "Malformed email",
  • "detail": "The received '{}à!è@!.b}' email does not conform to the email format",
  • "instance": "The received '{}à!è@!.b}' email does not conform to the email format"
}

System

The System is a REST API that allows to check the system health and scrap the runtime metrics.

The health endpoint returns the current version of the running service. This information can be used to check the health status of the running service in the docker or kubernetes environment.

The metrics endpoint returns the runtime metrics of the running service scraped from the internal prometheus registry. This information is collected by the prometheus server and can be used to monitor the running service.

Check the health status of the running service

Returns the health info object of the running service

Authorizations:
(apiKeyAuthadminApiKeyAuthjwtAuth)

Responses

Response samples

Content type
application/json
{
  • "version": "1.1.0"
}

Collect the runtime metrics of the running service

Returns the metrics of the running service from the internal Prometheus registry

Authorizations:
(apiKeyAuthadminApiKeyAuthjwtAuth)

Responses

Response samples

Content type
application/json
{
  • "status": 200,
  • "title": "Malformed email",
  • "detail": "The received '{}à!è@!.b}' email does not conform to the email format",
  • "instance": "The received '{}à!è@!.b}' email does not conform to the email format"
}

Credential status list

Fetch credential status list by its ID

Fetch credential status list by its ID

Authorizations:
(apiKeyAuthadminApiKeyAuthjwtAuth)
path Parameters
id
required
string <uuid>

Globally unique identifier of the credential status list

Responses

Response samples

Content type
application/json
{
  • "type": [
    ],
  • "issuer": "did:prism:462c4811bf61d7de25b3baf86c5d2f0609b4debe53792d297bf612269bf8593a",
  • "issuanceDate": "2024-03-20T18:35:17.949576647Z",
  • "credentialSubject": {},
  • "proof": {
    }
}

Revoke a credential by its ID

Marks credential to be ready for revocation, it will be revoked automatically

Authorizations:
apiKeyAuthjwtAuth
path Parameters
id
required
string

Revoke a credential by its ID

Responses

Response samples

Content type
application/json
{
  • "status": 200,
  • "title": "Malformed email",
  • "detail": "The received '{}à!è@!.b}' email does not conform to the email format",
  • "instance": "The received '{}à!è@!.b}' email does not conform to the email format"
}

Present Proof

Gets the list of proof presentation records.

list of presentation statuses

Authorizations:
apiKeyAuthjwtAuth
query Parameters
offset
integer <int32>

The number of items to skip before returning results. Default is 0 if not specified.

limit
integer <int32>

The maximum number of items to return. Defaults to 100 if not specified.

thid
string

Responses

Response samples

Content type
application/json
{
  • "contents": [ ],
  • "self": "/present-proof/presentations",
  • "kind": "Collection",
  • "pageOf": 1,
  • "next": "",
  • "previous": ""
}

As a Verifier, create a new proof presentation request and send it to the Prover.

Holder presents proof derived from the verifiable credential to verifier.

Authorizations:
apiKeyAuthjwtAuth
Request Body schema: application/json

The present proof creation request.

connectionId
required
string <uuid>

The unique identifier of an established connection between the verifier and the prover.

object (Options)

The options to use when creating the proof presentation request (e.g., domain, challenge).

Array of objects (ProofRequestAux)

The type of proofs requested in the context of this proof presentation request (e.g., VC schema, trusted issuers, etc.)

object (AnoncredPresentationRequestV1)

Anoncred Presentation Request

credentialFormat
string

The credential format (default to 'JWT')

Responses

Request samples

Content type
application/json
{
  • "connectionId": "bc528dc8-69f1-4c5a-a508-5f8019047900",
  • "options": {},
  • "proofs": [ ],
  • "anoncredPresentationRequest": "AnoncredPresentationRequestV1(Map(attribute1 -> AnoncredRequestedAttributeV1(Attribute 1,List(Map(cred_def_id -> credential_definition_id_of_attribute1)),Some(AnoncredNonRevokedIntervalV1(Some(1635734400),Some(1735734400))))),Map(predicate1 -> AnoncredRequestedPredicateV1(Predicate 1,>=,18,List(Map(schema_id -> schema_id_of_predicate1)),Some(AnoncredNonRevokedIntervalV1(Some(1635734400),None)))),Example Presentation Request,1234567890,1.0,None)",
  • "credentialFormat": "JWT"
}

Response samples

Content type
application/json
{
  • "presentationId": "3c6d9fa5-d277-431e-a6cb-d3956e47e610",
  • "thid": "0527aea1-d131-3948-a34d-03af39aba8b4",
  • "role": "Verifier",
  • "status": "RequestPending",
  • "proofs": [ ],
  • "data": [ ],
  • "connectionId": "bc528dc8-69f1-4c5a-a508-5f8019047900",
  • "metaRetries": 5
}

Gets an existing proof presentation record by its unique identifier. More information on the error can be found in the response body.

Returns an existing presentation record by id.

Authorizations:
apiKeyAuthjwtAuth
path Parameters
presentationId
required
string <uuid>

The unique identifier of the presentation record.

Responses

Response samples

Content type
application/json
{
  • "presentationId": "3c6d9fa5-d277-431e-a6cb-d3956e47e610",
  • "thid": "0527aea1-d131-3948-a34d-03af39aba8b4",
  • "role": "Verifier",
  • "status": "RequestPending",
  • "proofs": [ ],
  • "data": [ ],
  • "connectionId": "bc528dc8-69f1-4c5a-a508-5f8019047900",
  • "metaRetries": 5
}

Updates the proof presentation record matching the unique identifier, with the specific action to perform.

Accept or reject presentation of proof request.

Authorizations:
apiKeyAuthjwtAuth
path Parameters
presentationId
required
string <uuid>

The unique identifier of the presentation record.

Request Body schema: application/json

The action to perform on the proof presentation record.

action
required
string
Enum: "request-accept" "request-reject" "presentation-accept" "presentation-reject"

The action to perform on the proof presentation record.

proofId
Array of strings

The unique identifier of the issue credential record - and hence VC - to use as the prover accepts the presentation request. Only applicable on the prover side when the action is request-accept.

object (AnoncredCredentialProofsV1)

A list of proofs from the Anoncred library, each corresponding to a credential.

Responses

Request samples

Content type
application/json
{
  • "action": "request-accept",
  • "proofId": [
    ],
  • "anoncredPresentationRequest": {
    }
}

Response samples

Content type
application/json
{
  • "presentationId": "3c6d9fa5-d277-431e-a6cb-d3956e47e610",
  • "thid": "0527aea1-d131-3948-a34d-03af39aba8b4",
  • "role": "Verifier",
  • "status": "RequestPending",
  • "proofs": [ ],
  • "data": [ ],
  • "connectionId": "bc528dc8-69f1-4c5a-a508-5f8019047900",
  • "metaRetries": 5
}

Identity and Access Management

Get all entities

Get all entities with the pagination by offset and limit parameters

Authorizations:
adminApiKeyAuthjwtAuth
query Parameters
offset
integer <int32>

The number of items to skip before returning results. Default is 0 if not specified.

limit
integer <int32>

The maximum number of items to return. Defaults to 100 if not specified.

Responses

Response samples

Content type
application/json
{
  • "contents": [
    ],
  • "kind": "CredentialSchemaPage",
  • "self": "/prism-agent/schema-registry/schemas?skip=10&limit=10",
  • "pageOf": "/prism-agent/schema-registry/schemas",
  • "next": "/prism-agent/schema-registry/schemas?skip=20&limit=10",
  • "previous": "/prism-agent/schema-registry/schemas?skip=0&limit=10"
}

Create a new entity record

Create the new entity record. The entity record is a representation of the account in the system.

Authorizations:
adminApiKeyAuthjwtAuth
Request Body schema: application/json

JSON object required for the entity creation

id
string <uuid>

The new id of the entity to be created. If this field is not provided, the server will generate a new UUID for the entity

name
required
string [ 1 .. 128 ] characters

The new name of the entity to be created. If this field is not provided, the server will generate a random name for the entity

walletId
string <uuid>

The new walletId of the entity to be created. If this field is not provided, the server will set the default walletId

Responses

Request samples

Content type
application/json
{
  • "id": "00000000-0000-0000-0000-000000000000",
  • "name": "John Doe",
  • "walletId": "00000000-0000-0000-0000-000000000000"
}

Response samples

Content type
application/json
{}

Update the entity record name by `id`

Update the entity record name by id

Authorizations:
adminApiKeyAuthjwtAuth
path Parameters
id
required
string <uuid>
Request Body schema: application/json

JSON object required for the entity name update

name
required
string [ 1 .. 128 ] characters

New name of the entity

Responses

Request samples

Content type
application/json
{
  • "name": "John Doe"
}

Response samples

Content type
application/json
{}

Update the entity record `walletId` by `id`

Update the entity record walletId field by id

Authorizations:
adminApiKeyAuthjwtAuth
path Parameters
id
required
string <uuid>
Request Body schema: application/json

JSON object required for the entity walletId update

walletId
required
string <uuid>

The walletId owned by the entity

Responses

Request samples

Content type
application/json
{
  • "walletId": "00000000-0000-0000-0000-000000000000"
}

Response samples

Content type
application/json
{}

Get the entity by the `id`

Get the entity by the unique identifier

Authorizations:
adminApiKeyAuthjwtAuth
path Parameters
id
required
string <uuid>

Identifier of the entity

Responses

Response samples

Content type
application/json
{}

Delete the entity by `id`

Delete the entity by the unique identifier

Authorizations:
adminApiKeyAuthjwtAuth
path Parameters
id
required
string <uuid>

Identifier of the entity

Responses

Response samples

Content type
application/json
{
  • "status": 200,
  • "title": "Malformed email",
  • "detail": "The received '{}à!è@!.b}' email does not conform to the email format",
  • "instance": "The received '{}à!è@!.b}' email does not conform to the email format"
}

Register the `apikey` for the entity

Register the apikey for the entity.

Authorizations:
adminApiKeyAuthjwtAuth
Request Body schema: application/json

JSON object required for the registering the entity and apikey

entityId
required
string <uuid>

The entityId of the entity to be updated

apiKey
required
string [ 16 .. 128 ] characters

The apikey of the entity to be updated

Responses

Request samples

Content type
application/json
{
  • "entityId": "01234567-0000-0000-0000-000000000000",
  • "apiKey": "dkflks3DflkFmkllnDfde"
}

Response samples

Content type
application/json
{
  • "status": 200,
  • "title": "Malformed email",
  • "detail": "The received '{}à!è@!.b}' email does not conform to the email format",
  • "instance": "The received '{}à!è@!.b}' email does not conform to the email format"
}

Unregister the `apikey` for the entity

Unregister the apikey for the entity.

Authorizations:
adminApiKeyAuthjwtAuth
Request Body schema: application/json

JSON object required for the unregistering the entity and apikey

entityId
required
string <uuid>

The entityId of the entity to be updated

apiKey
required
string [ 16 .. 128 ] characters

The apikey of the entity to be updated

Responses

Request samples

Content type
application/json
{
  • "entityId": "01234567-0000-0000-0000-000000000000",
  • "apiKey": "dkflks3DflkFmkllnDfde"
}

Response samples

Content type
application/json
{
  • "status": 200,
  • "title": "Malformed email",
  • "detail": "The received '{}à!è@!.b}' email does not conform to the email format",
  • "instance": "The received '{}à!è@!.b}' email does not conform to the email format"
}

Events

List wallet webhook notifications

Authorizations:
apiKeyAuthjwtAuth

Responses

Response samples

Content type
application/json
{
  • "self": "string",
  • "kind": "string",
  • "pageOf": "string",
  • "next": "string",
  • "previous": "string",
  • "contents": [
    ]
}

Create wallet webhook notifications

Authorizations:
apiKeyAuthjwtAuth
Request Body schema: application/json
url
required
string
object (Map_String)

Responses

Request samples

Content type
application/json
{
  • "url": "string",
  • "customHeaders": {
    }
}

Response samples

Content type
application/json
{
  • "id": "00000000-0000-0000-0000-000000000000",
  • "customHeaders": {
    },
  • "createdAt": "1970-01-01T00:00:00Z"
}

Delete the wallet webhook notification by `id`

Authorizations:
apiKeyAuthjwtAuth
path Parameters
id
required
string <uuid>

ID of the webhook notification to delete.

Responses

Response samples

Content type
application/json
{
  • "status": 200,
  • "title": "Malformed email",
  • "detail": "The received '{}à!è@!.b}' email does not conform to the email format",
  • "instance": "The received '{}à!è@!.b}' email does not conform to the email format"
}