API server
This server exposes a RESTful API to manage VeraId organisations and the endpoint needed by the Awala integration (if enabled).
Authentication and authorisation
We use OAuth2 with JWKS to delegate authentication to an external identity provider. We require the JWT token to define the user’s email address in the OIDC email
claim.
The API employs the following roles:
- Super admin. They can do absolutely anything on any organisation.
- Org admin. They can do anything within their own organisation.
- Org member. They can manage much of their own membership in their respective organisation.
Authorisation grant logs use the level DEBUG
to minimise PII transmission and storage for legal/privacy reasons, whilst denial logs use the level INFO
for auditing purposes.
HTTP Endpoints
It will support the following API endpoints, which are to be consumed by the VeraId CA Console (a CLI used by organisation admins) and VeraId signature producers (used by organisation members):
Unless otherwise specified, all inputs and outputs will be JSON serialised.
POST /orgs
: Create org.- Auth: Admin.
- Input:
- Name (e.g.,
acme.com
). - Awala endpoint middleware URL (optional).
- Name (e.g.,
- Output:
- Org name.
- Org public key.
GET /orgs/{orgName}
: Get org.- Auth: Org admin.
- Output:
- URLs to the org’s endpoint and direct descendants.
- Org public key.
PATCH /orgs/{orgName}
: Modify org.- Auth: Org admin.
- Input: Same as
POST /orgs
, but org name can’t be changed.
DELETE /orgs/{orgName}
: Delete org.- Auth: Org admin.
POST /orgs/{orgName}/members
: Create member.- Auth: Org admin.
- Input:
- Name (used in VeraId member certificates;
null
if member is a bot). - Email (optional; needed if they’ll access this API, not needed if they’ll use Awala).
- Role:
org_admin
orregular
.
- Name (used in VeraId member certificates;
- Output:
- URL to the new member on this API.
GET /orgs/{orgName}/members/{memberId}
: Get member.- Auth: Org admin.
PATCH /orgs/{orgName}/members/{memberId}
: Modify member.- Auth: Org admin.
- Input: Same as in
POST /orgs/{orgName}/members
.
DELETE /orgs/{orgName}/members/{memberId}
: Delete member.- Auth: Org admin.
POST /orgs/{orgName}/members/{memberId}/public-keys
: Register public key for member.- Auth: Org member.
- Input:
- The DER-encoded public key.
- The OID for the service where the respective bundles will be valid (e.g.,
1.2.3.4.5
).
- Output: The URL for the new key.
DELETE /orgs/{orgName}/members/{memberId}/public-keys/{keyId}
: Unregister public key for member.- Auth: Org member.
- Input: None.
- Output: Nothing.
GET /orgs/{orgName}/members/{memberId}/public-keys/{keyId}/bundle
: Get VeraId Member Bundle for a given public key.- Auth: Org member.
- Output: VeraId Member Bundle.
POST /orgs/{orgName}/members/{memberId}/public-key-import-tokens
: Generate single-use token to import a member public key.- Auth: Org member.
- Input:
- The OID for the service where the respective bundles will be valid (e.g.,
1.2.3.4.5
).
- The OID for the service where the respective bundles will be valid (e.g.,
- Output: A single-use UUID4.
POST /orgs/{orgName}/members/{memberId}/signature-specs
: Create signature spec.- Auth: Org member.
- Input:
providerIssuerUrl
: URL to the OpenID provider’s issuer URL (e.g.,https://accounts.google.com
).jwtSubjectField
: The field in the JWT that contains the subject.jwtSubjectValue
: The value of the subject field.serviceOid
: The OID for the service where the signature will be valid.ttlSeconds
: Time-to-live for the signature in seconds (default: 3600).plaintext
: The plaintext to be signed.
- Output: URL to the new signature spec.
GET /orgs/{orgName}/members/{memberId}/signature-specs/{signatureSpecId}
: Get signature spec.- Auth: Org member.
- Output: The signature spec details.
DELETE /orgs/{orgName}/members/{memberId}/signature-specs/{signatureSpecId}
: Delete signature spec.- Auth: Org member.
- Output: Nothing (204 No Content).
GET /credentials/signatureBundles/{specId}
: Get signature bundle.- Auth: JWT Bearer token with the endpoint URL as audience.
- Input: None (specId in path, JWT in Authorization header).
- Output: VeraId Signature Bundle with content type ‘application/vnd.veraid.signature-bundle’.
- Errors:
- 401 Unauthorized: If JWT is invalid or missing.
- 404 Not Found: If signature spec or its organisation not found.
- 503 Service Unavailable: If JWKS retrieval or DNSSEC chain retrieval fails; client may retry later.