Configuring Credential Issuance Flows¶
The issuance system uses a two-layer configuration approach:
- Credential Configurations - Define the structure, format, and metadata of individual credentials
- Issuance Configuration - Define the issuance configuration that get used to group multiple credentials and publish the issuer metadata
API Endpoints¶
The system uses two separate endpoints for the two-layer configuration:
Credential Configurations¶
To manage individual credential configurations, use the
/issuer-management/credentials endpoint. This endpoint handles the definition
of credential types, their formats, claims, and display properties.
Issuance Configuration¶
To manage the issuance flow, use the /issuer-management/issuance endpoint. This endpoint
handles grouping credentials and defining authorization or webhooks.
Based on your passed access token, both endpoints will be scoped to the tenant ID of the
token. You also need the issuance:manage role to access these endpoints.
The configurations are internally stored in a database.
Creating Credential Offers¶
Via the credential offer endpoint you can create a credential offer that can be presented to the user. When creating an offer, you can:
- Define the flow - Either go with the pre authorized flow or require user authentication via the authorization code flow
- Provide credentials - Use
credentialConfigurationIdsto specify which credentials to issue from the issuance configuration - Optionally override claims - Use the
valuesparameter to provide custom claims for specific credentials - Optionally pass claim webhooks - Use the
claimsWebhookparameter to dynamically fetch claims during the issuance flow - Optionally pass notification webhooks - Use the
notifyWebhookparameter to get notified about issuance status changes
Credential Issuance Flow¶
This flow describes how a backend service starts an issuance flow of an attestation. EUDIPLO creates the OID4VCI request and handles the protocol flow with the wallet. It also shows the interactions with webhooks when they are configured.
sequenceDiagram
autonumber
actor Wallet as EUDI Wallet
participant EUDIPLO as Middleware
participant Service as End Service (with Webhooks)
Service->>EUDIPLO: Request OID4VCI issuance offer
EUDIPLO-->>Service: Return credential offer link
Service->>Wallet: Present offer link to user
Wallet->>EUDIPLO: Authorization Request (auth / pre-auth)
note over EUDIPLO: Validate request, locate credential config
alt Claims webhook configured
EUDIPLO->>Service: Fetch claims dynamically (claims webhook)
Service-->>EUDIPLO: Claims response (JSON)
else No webhook
note over EUDIPLO: Use claims from Offer or static configuration
end
EUDIPLO->>EUDIPLO: Create credential with claims
EUDIPLO-->>Wallet: Return issued credential
Wallet->>EUDIPLO: Sending notification
opt Notification webhook configured
EUDIPLO->>Service: Notify status (accepted / denied)
Service-->>EUDIPLO: 2xx ACK
end
The response with the credential offer link will also provide the session ID. It is included in the requests from the optional webhooks to identify the specific issuance flow. You can also use the id to query the issuance status at the API.
Documentation Structure¶
This issuance documentation is organized into the following sections:
- Credential Configuration - Learn how to define individual credential types, their structure, claims, and display properties
- Issuance Configuration - Understand how to create issuance configurations that group multiple credentials and define issuance parameters such as authorization and webhooks
Quick Start¶
For a quick start, follow these steps:
- Create a credential configuration - Define your credential type using the Credential Configuration guide
- Create an issuance configuration - Define the issuance configuration using the Issuance Configuration guide
- Issue credentials - Start the issuance flow by creating credential offers
Passing Claims¶
EUDIPLO provides multiple methods to pass claims (data) for credentials during issuance, with a clear priority system that determines which claims are used.
Priority Order¶
Claims are resolved in the following priority order (highest to lowest):
- Offer-level webhook - Webhook specified in the credential offer
- Offer-level static claims - Claims specified in the credential offer
- Configuration-level webhook - Webhook defined in the credential configuration
- Configuration-level static claims - Claims defined in the credential configuration
Claims are not merged
Higher priority sources completely override lower priority sources - claims are not merged. If an offer-level webhook is provided, all configuration-level claims will be entirely ignored.
For a detailed explanation of the claims priority system and how to configure each method, see the Fetching Claims section in the Credential Configuration documentation.
When to Use Each Method¶
- Configuration-level static claims - Default values for all credentials of this type, fixed metadata (e.g., issuing country, authority)
- Configuration-level webhook - Dynamic claims based on authentication context, personalized credentials requiring real-time data
- Offer-level static claims - Claims known at offer creation time, overriding specific values for individual issuances
- Offer-level webhook - Custom data source per offer, testing different webhook endpoints