Wallet-Relying Party Authentication¶
Overview¶
This document describes how Relying Parties (RPs) authenticate themselves to EUDI Wallets and how Wallets validate that RPs only request data within their declared intended use. The authentication requirements are derived from Article 5b of the eIDAS 2 regulation and the Implementing Acts.
Core Principles¶
The authentication architecture is based on the following principles:
Direct Authentication¶
RPs include certificates and attestations directly in their requests to the EUDI Wallet. This approach:
- Supports both online and offline interactions
- Reduces Wallet communication with Registrars
- Prevents potential tracking of Wallet interactions by Registrars
Separation of Concerns¶
Two distinct certificates serve different purposes:
| Certificate | Purpose | Standard |
|---|---|---|
| Access Certificate | Authenticates the RP's identity | ETSI TS 119 411-8 |
| Registration Certificate | Declares the RP's intended data use | ETSI TS 119 475 |
This separation allows RPs to include only the attestations relevant to each specific request.
Machine-Processable Intended Use¶
- Wallets can automatically match the intended use against presentation requests
- RPs can update their intended uses, but requests must never exceed registered scope
- Over-asking (requesting more than registered) is detected and flagged to users
Trust Architecture¶
RP Registration Process¶
To interact with an EUDI Wallet, an RP must:
- Register at a national Registrar — Provide identity information and undergo validation
- Obtain an Access Certificate — For authentication with Wallets
- Register intended use — Declare which attributes will be requested and for what purpose
- Obtain Registration Certificate(s) — Documenting the declared intended use
Access Certificate¶
The Access Certificate identifies the RP and enables authentication with Wallets. Key aspects:
- Identity binding: Contains the RP's verified legal identity
- Official identifiers: May include EORI, LEI, VAT number, national business register number, or other official identifiers
- Key management: RPs can request multiple certificates for key rotation
- Revocation: Can be revoked immediately to reduce breach risk
- Retention: Must remain available via the Registrar for 10 years
For technical specifications, see ETSI TS 119 411-8.
Registration Certificate¶
The Registration Certificate documents what data the RP intends to request. Key aspects:
- Intended use declaration: Specifies which attributes may be requested
- Purpose description: Human-readable explanation shown to users (multi-language support)
- Service description: Description of the RP's service
- Contact information: How users can reach the RP
- Privacy policy: Link to the RP's data protection information
- Status management: Revocation capability for invalid certificates
For technical specifications, see ETSI TS 119 475.
Wallet Validation Process¶
When receiving a presentation request, the Wallet performs the following validations:
1. RP Authentication¶
- Validate the Access Certificate chain of trust
- Verify the certificate is not revoked (via CRL or Status List)
- Confirm the RP is registered in a recognized Registrar
2. Intended Use Validation (Over-Asking Check)¶
- Verify the Registration Certificate is valid and not revoked
- Compare requested attributes against the declared intended use
- Flag over-asking if the request exceeds the registered scope
- The request must be equal to or a subset of the registered intended use
3. User Information¶
- Display RP identity and purpose to the user
- Show any warnings (e.g., over-asking detected)
- Obtain user consent before releasing data
Interoperability¶
EU-Wide Standardization (ETSI Standards)¶
The following are standardized across the EU:
| Aspect | Standard |
|---|---|
| Access Certificate format | ETSI TS 119 411-8 |
| Registration Certificate format | ETSI TS 119 475 |
| General attestation requirements | ETSI TS 119 472-1 |
| Presentation requirements | ETSI TS 119 472-2 |
| Issuance requirements | ETSI TS 119 472-3 |
Member State Specific¶
The following can be defined individually by each Member State:
- RP Registrar onboarding procedures
- Registrar API and interaction mechanisms
- Additional national requirements
Verifier-as-a-Service¶
When an RP uses a hosted verification service:
- The presented certificates must belong to the RP, not the service provider
- The RP must disclose the service provider (e.g., in their privacy policy)
- The service provider may use their own Access Certificate with delegation
Intermediaries¶
RPs may interact with Wallets through intermediaries. In this case:
- The intermediary uses its own Access Certificate
- The Registration Certificate identifies both the RP and the intermediary
- The Wallet displays both entities to the user
- Revocation of either party's certificate invalidates the relationship
Registrar Requirements¶
While specific APIs are not mandated, Registrars should provide:
- Free read access to registration information
- Public lookup of RPs by name or identifier
- Certificate history including issuance, expiration, and revocation dates
- Security measures such as rate limiting
Protocol Integration¶
For detailed technical guidance on how Access Certificates and Registration Certificates are used in the OpenID for Verifiable Credentials (OID4VC) protocol family, see OID4VC Protocol Integration.
This includes:
- Sequence diagrams for issuance (OID4VCI) and presentation (OID4VP) flows
- Certificate attachment mechanisms
- Proximity (offline) scenarios
Related Resources¶
- Trust Overview and Decision Guide — Understanding trust models
- OID4VC Protocol Integration — Protocol integration
- Trust Validation Overview — Technical validation procedures