Public Beta

Please be advised that the current system and its operations are provided on a best-effort basis and will continue to evolve over time. The security of the system and its overall maturity remain under development.

This software is a web server implementing the technical standards as specified in the “Swiss Profile”. Together with the other generic components provided, this software forms a collection of APIs allowing issuance and verification of verifiable credentials without the need of reimplementing the standards.

ecosystem components

Deployment instructions

Please make sure that you did the following before starting the deployment:

  • Registered yourself on the swiyu Trust Infrastructure portal
  • Registered yourself on the api self service portal
  • Generated the signing keys file with the didtoolbox.jar
  • Generated a DID which is registered on the identifier registry

The required steps are explained in the Base- and Trust Registry Cookbook

Set the environment variables

A sample compose file for an entire setup of both components and a database can be found in sample.compose.yml file. You will need to configure a list of environment variables in the .env file.

Issuer Agent Management

Name Description Example
SPRING_APPLICATION_NAME Name of your application  
ISSUER_ID The DID you created in the onboarding process did:tdw:QmejrSkusQgeM6FfA23L6NPoLy3N8aaiV6X5Ysvb47WSj8:identifier-reg.trust-infra.swiyu-int.admin.ch:api:v1:did:ff8eb859-6996-4e51-a976-be1ca584c124
EXTERNAL_URL This will be used to build the correct deeplink (You must provide the /oid4vci and .well-known endpoints at this) -> must use https-protocol otherwise the wallet will refuse to connect.  
DID_STATUS_LIST_VERIFICATION_METHOD Verification method, which can be taken from the did log response. The Verification Method must match the selected SIGNING_KEY! onboarding process did:tdw:QmejrSkusQgeM6FfA23L6NPoLy3N8aaiV6X5Ysvb47WSj8:identifier-reg.trust-infra.swiyu-int.admin.ch:api:v1:did:ff8eb859-6996-4e51-a976-be1ca584c124#assert-key-01
STATUS_LIST_KEY EC Private key can be taken from onboarding process you can use any generated key but it must match the DID_STATUS_LIST_VERIFICATION_METHOD  
SWIYU_PARTNER_ID The partner id you created in theswiyu Trust Infrastructure business partner ID d33fab52-1657-4240-9189-97c33b949739
SWIYU_STATUS_REGISTRY_CUSTOMER_KEY Customer key from Status Registry API Key  
SWIYU_STATUS_REGISTRY_CUSTOMER_SECRET Customer Secret from Status Registry API Secret  
SWIYU_STATUS_REGISTRY_ACCESS_TOKEN Access token from Status Registry API ACCESS Token  
SWIYU_STATUS_REGISTRY_BOOTSTRAP_REFRESH_TOKEN Refresh token from Status Registry API Refresh Token  
SWIYU_STATUS_REGISTRY_TOKEN_URL OAuth Refresh URL https://keymanager-prd.api.admin.ch/keycloak/realms/APIGW/protocol/openid-connect/token
SWIYU_STATUS_REGISTRY_API_URL Status Registry Base URL https://status-reg-api.trust-infra.swiyu-int.admin.ch
EXTERNAL_URL URL of the issuer-agent-oid4vci service  
DID_SDJWT_VERIFICATION_METHOD Verification method, which can be taken from the did log response. The Verification Method must match the selected SIGNING_KEY! did:tdw:QmejrSkusQgeM6FfA23L6NPoLy3N8aaiV6X5Ysvb47WSj8:identifier-reg.trust-infra.swiyu-int.admin.ch:api:v1:did:ff8eb859-6996-4e51-a976-be1ca584c124#assert-key-02
SDJWT_KEY EC Private key can be taken from onboarding process you can use any generated key but it must match the DID_SDJWT_VERIFICATION_METHOD  
⚙️ The generated pem .didtoolbox/assert-key-01 fille will be referenced as "assert-key-01"

Please note that by default configuration the issuer service is set up in a way to easily gain experience with the issuance process, not as a productive deployment. For additional information how to securely deploy the swiyu-issuer check out the Deployment considerations in the readme.

The provided images can be used with arm based processors, but they are not optimized. For further information, please consult the Development instructions section.

The latest images are available here:

Create a verifiable credential schema

In order to support your use case you need to adapt the issuer_metadata (see sample.compose.yml). Those metadata define the appearance of the credential in the wallet and defines what kind of credential formats are supported. For further information consult the VC visual presentation cookbook.

Initialize the status list

Once the swiyu-issuer is up and running you need to initialize the status list of your issuer so that you can issue credentials.

Request to create and initialize a status list slot

In order to create an offer first you have to initialize a status list. Please store the statusRegistryUrl as it is needed in later steps and will be referenced as $STATUS_REGISTRY_URL.

The maximum file size of the status list is currently 200kB. (Subject to evaluation and might change after public beta).
curl -X 'POST' \
  'http://localhost:8080/management/api/status-list' \
  -H 'Content-Type: application/json' \
  -d '{
  "type": "TOKEN_STATUS_LIST",
  "maxLength": 100000,
  "config": {
    "bits": 2
  }
}'

This results in a response like:

⚙️ Please store the $STATUS_REGISTRY_URL from "statusRegistryUrl" as it is required later in the Issue Credential call.
{
  "id": "$STATUS_LIST_ID",
  "statusRegistryUrl": "your new $STATUS_REGISTRY_URL",
  "type": "TOKEN_STATUS_LIST",
  "maxListEntries": 100000,
  "remainingListEntries": 100000,
  "nextFreeIndex": 0,
  "version": "1.0",
  "config": {
    "purpose": "",
    "bits": 2
  }
}

Issue credential

⚙️ Please update the statusRegistryUrl with your newly created $STATUS_REGISTRY_URL from the response above.
curl -X 'POST' \
  'http://localhost:8080/management/api/credentials' \
  -H 'Content-Type: application/json' \
  -d '{
  "metadata_credential_supported_id": [
    "my-test-vc"
  ],
  "credential_subject_data": {
    "given_name": "Test FirstName",
    "family_name": "Test LastName",
    "birth_date": "01.01.2025"
  },
  "offer_validity_seconds": 86400,
  "credential_valid_until": "2030-01-01T19:23:24Z",
  "credential_valid_from": "2025-01-01T18:23:24Z",
  "status_lists": [
    $STATUS_REGISTRY_URL
  ]
}'

With Response:


  "management_id": "$MANAGEMENT_ID",
  "offer_deeplink": "$SWIYU_OFFER_DEEPLINK"
}

⚙️ Please store the $MANAGEMENT_ID of the response as the value is required in the "Update Status" call.

To check the result, create a qr code from the resulting offer_deeplink, which then can be scanned with the swiyu wallet.

Update status

You can set the following status: CANCELLED, READY, ISSUED, SUSPENDED, REVOKED. For additional details about the status check the documentation. Using the Issuer Management service the status can be updated

⚙️ Please update the credentialID below with the correct id received from the issue credential call.
curl -X 'PATCH' http://localhost:8080/management/api/credentials/{$CREDENTIAL_ID}/status?credentialStatus=CANCELLED

The response then looks like:

{
  "id": "$CREDENTIAL_ID",
  "status": "CANCELLED"

Development instructions

Instructions for the development of the swiyu Generic Issuer can be found in the GitHub repository.

Create Images for ARM based processors

In order to optimize the image for arm based systems, you first have to check out the repository.

To create an image you to run the following command in both repositories to create local images of the services:

./mvnw install:install-file -Dfile=lib/primusX-java11-2.4.4.jar -DgroupId=com.securosys.primus -DartifactId=jce -Dversion=2.4.4 -Dpackaging=jar spring-boot:build-image

Your Feedback?

We would be pleased if you spend about 3 additional minutes and give us feedback on the swiyu Public Beta Trust Infrastructure and your onboarding process! With Public Beta, we want to give ecosystem stakeholders the opportunity to gain initial experience and build their own use cases on the trust infrastructure of the future e-ID. Your feedback will help us to further develop and improve the touchpoints, and we greatly appreciate your support.