You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/annexes/annex-1/annex-1-definitions.md
+12-12Lines changed: 12 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -92,7 +92,7 @@ Identity Regulation] or the Commission Implementing Regulations, the latter take
92
92
precedence.
93
93
94
94
In some cases, a term has its origin in the context of
95
-
a specific Topic in [Annex 2](../annex-2/annex-2-high-level-requirements.md). In
95
+
a specific Topic in [Annex 2](../annex-2/annex-2.01-high-level-requirements.md). In
96
96
such a case, the topic number is mentioned in a note. If
97
97
the definition relies on an external source, such as a
98
98
standard or a formal publication, that source is mentioned.
@@ -102,27 +102,27 @@ standard or a formal publication, that source is mentioned.
102
102
| Administrative validity period (of a PID or attestation) | The date(s) from and/or up to which the attributes in the attestation are valid, which are represented as attribute(s) in the attestation. *Note: Some attestations, for instance diplomas, do not have an administrative validity period.* |
103
103
| Attestation | When not further qualified, a collective term for a QEAA, PuB-EAA, or (non-qualified) EAA. |
104
104
| Attestation Provider | When not further qualified, a collective term for QEAA Provider, PuB-EAA Provider, or (non-qualified) EAA Provider. |
105
-
| Attestation Revocation List | A mechanism provided by a PID Provider or an Attestation Provider (or a trusted party acting on its behalf) for communicating the revocation status of PIDs and attestations, by publishing a list of identifiers of revoked PIDs or attestations. *Note: See [Topic 7](../annex-2/annex-2-high-level-requirements.md#a237-topic-7---attestation-revocation-and-revocation-checking).* |
106
-
| Attestation Rulebook | A document describing the attestation type, namespace(s), and other features for a specific attestation type. *Note: See [Topic 12](../annex-2/annex-2-high-level-requirements.md#a2312-topic-12---attestation-rulebooks).* |
107
-
| Attestation Status List | A mechanism provided by a PID Provider or an Attestation Provider (or a trusted party acting on its behalf) for communicating the revocation status of PIDs and attestations, by publishing status information (Valid or Invalid) for all relevant PIDs or attestations. *Notes: -See [Topic 7](../annex-2/annex-2-high-level-requirements.md#a237-topic-7---attestation-revocation-and-revocation-checking). -Which PIDs or attestations are relevant is determined by the entity publishing the status list. For example, a status list may contain all PIDs or attestations whose validity period is not over yet at the time of publication of the list.* |
108
-
| Attestation type | An identifier for a type of attestation, unique within the context of the EUDI Wallet ecosystem. *Note: See [Topic 12](../annex-2/annex-2-high-level-requirements.md#a2312-topic-12---attestation-rulebooks).* |
105
+
| Attestation Revocation List | A mechanism provided by a PID Provider or an Attestation Provider (or a trusted party acting on its behalf) for communicating the revocation status of PIDs and attestations, by publishing a list of identifiers of revoked PIDs or attestations. *Note: See [Topic 7](../annex-2/annex-2.02-high-level-requirements-by-topic.md#a237-topic-7---attestation-revocation-and-revocation-checking).* |
106
+
| Attestation Rulebook | A document describing the attestation type, namespace(s), and other features for a specific attestation type. *Note: See [Topic 12](../annex-2/annex-2.02-high-level-requirements-by-topic.md#a2312-topic-12---attestation-rulebooks).* |
107
+
| Attestation Status List | A mechanism provided by a PID Provider or an Attestation Provider (or a trusted party acting on its behalf) for communicating the revocation status of PIDs and attestations, by publishing status information (Valid or Invalid) for all relevant PIDs or attestations. *Notes: -See [Topic 7](../annex-2/annex-2.02-high-level-requirements-by-topic.md#a237-topic-7---attestation-revocation-and-revocation-checking). -Which PIDs or attestations are relevant is determined by the entity publishing the status list. For example, a status list may contain all PIDs or attestations whose validity period is not over yet at the time of publication of the list.* |
108
+
| Attestation type | An identifier for a type of attestation, unique within the context of the EUDI Wallet ecosystem. *Note: See [Topic 12](../annex-2/annex-2.02-high-level-requirements-by-topic.md#a2312-topic-12---attestation-rulebooks).* |
109
109
| Certificate Authority (CA) | An entity which is trusted by one or more parties in the EUDI Wallet ecosystem to create and seal certificates. |
110
110
| Certificate Policy (CP) | A named set of rules that indicates the applicability of a certificate to a particular community and/or class of application with common security requirements. |
111
-
| Holder (when used in the context of Wallet-to-Wallet interactions) | A User wishing to use their Wallet Unit to present attributes from a PID or attestation to the User of another Wallet Unit. *Notes: See also Verifier. - See [Topic 30](../annex-2/annex-2-high-level-requirements.md#a2330-topic-30---interaction-between-wallet-units).* |
111
+
| Holder (when used in the context of Wallet-to-Wallet interactions) | A User wishing to use their Wallet Unit to present attributes from a PID or attestation to the User of another Wallet Unit. *Notes: See also Verifier. - See [Topic 30](../annex-2/annex-2.02-high-level-requirements-by-topic.md#a2330-topic-30---interaction-between-wallet-units).* |
112
112
| Holder Wallet Unit | A Wallet Unit used by a Holder. |
113
-
| Intermediary | A Relying Party that offers services to other (intermediated) Relying Parties to, on their behalf, connect to Wallet Units and request the User attributes that these intermediated Relying Parties need. *Note: See [Topic 52](../annex-2/annex-2-high-level-requirements.md#a2352-topic-52-relying-party-intermediaries)* |
113
+
| Intermediary | A Relying Party that offers services to other (intermediated) Relying Parties to, on their behalf, connect to Wallet Units and request the User attributes that these intermediated Relying Parties need. *Note: See [Topic 52](../annex-2/annex-2.02-high-level-requirements-by-topic.md#a2352-topic-52-relying-party-intermediaries)* |
114
114
| Keystore | A hardware-backed repository and service in which non-critical cryptographic assets are generated, stored, and used exclusively inside a dedicated hardware security boundary. *Notes: - Examples include a Secure Element, a TPM, TEE, or secure enclave, or a remote HSM. - Critical cryptographic assets are generated, stored, and used in a WSCA/WSCD.* |
115
-
| Namespace | A specification of the attribute identifier, syntax and semantics of attributes that can be used in an attestation, having an identifier that is unique within the context of the EUDI Wallet ecosystem. *Note: See [Topic 12](../annex-2/annex-2-high-level-requirements.md#a2312-topic-12---attestation-rulebooks).* |
115
+
| Namespace | A specification of the attribute identifier, syntax and semantics of attributes that can be used in an attestation, having an identifier that is unique within the context of the EUDI Wallet ecosystem. *Note: See [Topic 12](../annex-2/annex-2.02-high-level-requirements-by-topic.md#a2312-topic-12---attestation-rulebooks).* |
116
116
| National Accreditation Bodies (NAB) | A body that performs accreditation with authority derived from a Member State under [Regulation (EC) No 765/2008](https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=celex:32008R0765). |
117
-
| Notification | The act of transferring information to the European Commission. *Note: see [Topics 31](../annex-2/annex-2-high-level-requirements.md#a2331-topic-31---pid-provider-wallet-provider-attestation-provider-and-access-certificate-authority-notification-and-publication). |
118
-
| Pseudonym | Data uniquely representing a User which in itself does not allow to infer the User's attributes or person identification data, without the use of additional information that is kept separately by the issuer of the data uniquely representing the user. *Note: See [Topic 11](../annex-2/annex-2-high-level-requirements.md#a2311-topic-11---pseudonyms).*|
117
+
| Notification | The act of transferring information to the European Commission. *Note: see [Topics 31](../annex-2/annex-2.02-high-level-requirements-by-topic.md#a2331-topic-31---pid-provider-wallet-provider-attestation-provider-and-access-certificate-authority-notification-and-publication). |
118
+
| Pseudonym | Data uniquely representing a User which in itself does not allow to infer the User's attributes or person identification data, without the use of additional information that is kept separately by the issuer of the data uniquely representing the user. *Note: See [Topic 11](../annex-2/annex-2.02-high-level-requirements-by-topic.md#a2311-topic-11---pseudonyms).*|
119
119
| Public Key Infrastructure (PKI) | Systems, software, and communication protocols that are used by EUDI Wallet ecosystem components to distribute, manage, and control public keys. A PKI publishes public keys and establishes trust within an environment by validating and verifying the public keys mapping to an entity. |
120
120
| Qualified Electronic Signature Remote Creation Provider | A natural or a legal person that offers services related to the remote creation, validation, and management of qualified electronic signatures that meet legal requirements and standards in the [European Digital Identity Regulation] to be considered as legally equivalent to handwritten signatures. |
121
121
| Relying Party Instance | A software and/or hardware module with the capability to interact with a Wallet Unit and to perform Relying Party authentication, that is controlled by a Relying Party. |
122
122
| Selective Disclosure | The capability enabling the User to present a subset of the attributes included in a PID or attestation. |
123
-
| SUA attestation| An attestation used for strong user authentication in the context of electronic payments, such that, when a Relying Party sends a presentation request for the attestation to a Wallet Unit, it includes transactional data in the request. *Note: See [Topic 20](../annex-2/annex-2-high-level-requirements.md#a2320-topic-20---strong-user-authentication-for-electronic-payments)* |
123
+
| SUA attestation| An attestation used for strong user authentication in the context of electronic payments, such that, when a Relying Party sends a presentation request for the attestation to a Wallet Unit, it includes transactional data in the request. *Note: See [Topic 20](../annex-2/annex-2.02-high-level-requirements-by-topic.md#a2320-topic-20---strong-user-authentication-for-electronic-payments)* |
124
124
| Technical validity period (of a PID or attestation) | The dates (and possibly times) from and up to which the attestation is valid, which are represented as metadata of the attestation. *Note: All PIDs and attestations have a technical validity period, which is typically much shorter than its administrative validity period (if existent). The technical validity period is chosen based on a risk analysis, e.g. with regard to User privacy.* |
125
125
| Trust Anchor | An authoritative entity represented by a public key and associated data. *Note: based on RFC 5914.* |
126
126
| Trusted List | Repository of information about authoritative entities in a particular legal or contractual context which provides information about their current and historical status. |
127
-
| Verifier (when used in the context of Wallet-to-Wallet interactions) | A User wishing to use their Wallet Unit to request attributes from a PID or attestation from the User of another Wallet Unit. *Note: See [Topic 30](../annex-2/annex-2-high-level-requirements.md#a2330-topic-30---interaction-between-wallet-units)* |
127
+
| Verifier (when used in the context of Wallet-to-Wallet interactions) | A User wishing to use their Wallet Unit to request attributes from a PID or attestation from the User of another Wallet Unit. *Note: See [Topic 30](../annex-2/annex-2.02-high-level-requirements-by-topic.md#a2330-topic-30---interaction-between-wallet-units)* |
128
128
| Verifier Wallet Unit | A Wallet Unit used by a Verifier. |
Copy file name to clipboardExpand all lines: docs/annexes/annex-2/annex-2.01-high-level-requirements.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,11 +10,11 @@ are included in the [high-level-requirements.csv file](https://raw.githubusercon
10
10
requirements. Insofar relevant, the texts in the introduction to each Topic in the original
11
11
Annex 2 were moved to suitable sections in the ARF main document.
12
12
13
-
For the convenience of readers, the high-level requirements in the .csv file are also included in two new .md files, called [annex-2-high-level-requirements-by-topic.md](./annex-2-high-level-requirements-by-topic.md) and [annex-2-high-level-requirements-by-category.md](./annex-2-high-level-requirements-by-category.md), which were generated from the .csv file. Note that in case of deviations between the .csv file and the .md files, the .csv file takes precedence.
13
+
For the convenience of readers, the high-level requirements in the .csv file are also included in two new .md files, called [annex-2.02-high-level-requirements-by-topic.md](./annex-2.02-high-level-requirements-by-topic.md) and [annex-2.03-high-level-requirements-by-category.md](./annex-2.03-high-level-requirements-by-category.md), which were generated from the .csv file. Note that in case of deviations between the .csv file and the .md files, the .csv file takes precedence.
14
14
15
-
The requirements in these files are identical, but they are ordered in a different manner. The file [annex-2-high-level-requirements-by-topic.md](./annex-2-high-level-requirements-by-topic.md) contains the high-level requirements in the same order as the original (i.e., pre-v2.7.0) Annex 2 file, meaning ordered per discussion topic. It also contains the same Topic numbers and section indicators. However, Topics in the original file that did not contain any high-level requirements have been removed from the .csv file and hence from the resulting .md file.
15
+
The requirements in these files are identical, but they are ordered in a different manner. The file [annex-2.02-high-level-requirements-by-topic.md](./annex-2.02-high-level-requirements-by-topic.md) contains the high-level requirements in the same order as the original (i.e., pre-v2.7.0) Annex 2 file, meaning ordered per discussion topic. It also contains the same Topic numbers and section indicators. However, Topics in the original file that did not contain any high-level requirements have been removed from the .csv file and hence from the resulting .md file.
16
16
17
-
The file [annex-2-high-level-requirements-by-category.md](./annex-2-high-level-requirements-by-category.md) orders the high-level requirements on the basis of their subject, meaning the entity that has to comply with each requirement. To enable this, a new system of requirement identifiers was developed, next to the existing identifiers which are based on topic. These new requirement identifiers have a simple, hierarchical format: PART-CATEGORY-SUBCATEGORY-ID, where
17
+
The file [annex-2.03-high-level-requirements-by-category.md](./annex-2.03-high-level-requirements-by-category.md) orders the high-level requirements on the basis of their subject, meaning the entity that has to comply with each requirement. To enable this, a new system of requirement identifiers was developed, next to the existing identifiers which are based on topic. These new requirement identifiers have a simple, hierarchical format: PART-CATEGORY-SUBCATEGORY-ID, where
18
18
19
19
- PART is either actor-specific requirements (AS) or ecosystem-wide requirements (EW).
20
20
- CATEGORY is a two or three-letter code based on the six main categories established below. This provides immediate context.
0 commit comments