-
|
You can use this channel to post any questions or feedback related to the DIIP V4 Test Bed. To register your organization, your wallets and receive an account to login please send a mail to testbed@fides.community. Access to the Test Bed: https://itb.ilabs.ai/ |
Beta Was this translation helpful? Give feedback.
Replies: 54 comments 200 replies
-
|
Great initiative! I can see and start the test cases for the personal wallet, but I don't see it for the organisation wallet (Holder). Of course I can download the issuance request and give that to the organisation wallet, but it would be nice if there would be an input field to specify the credential offer endpoint of the org wallet. |
Beta Was this translation helpful? Give feedback.
-
|
The pre-authorized code flow doesn't return the REQUIRED pre-auhthorized code in the credential offer: { In the grants, it should include something like (besides the authorization_code): "urn:ietf:params:oauth:grant-type:pre-authorized_code": { |
Beta Was this translation helpful? Give feedback.
-
|
many thanks there was a typo and was triggering code flow instead.. should be fixed now.. |
Beta Was this translation helpful? Give feedback.
-
|
[like] Eelco Klaver reacted to your message:
…________________________________
From: Nikos Triantafyllou ***@***.***>
Sent: Monday, June 16, 2025 2:05:49 PM
To: FIDEScommunity/DIIP ***@***.***>
Cc: Eelco Klaver ***@***.***>; Mention ***@***.***>
Subject: Re: [FIDEScommunity/DIIP] DIIP V4 Test Bed (Discussion #59)
many thanks there was a typo and was triggering code flow instead.. should be fixed now..
Closing but if you find any issues please re-open @k00ij<https://github.com/k00ij>
—
Reply to this email directly, view it on GitHub<#59 (comment)>, or unsubscribe<https://github.com/notifications/unsubscribe-auth/AAELVVSYRDZSVG2AA4NNT3T3D3FL3AVCNFSM6AAAAAB7IEZWHCVHI2DSMVQWIX3LMV43URDJONRXK43TNFXW4Q3PNVWWK3TUHMYTGNBYGQ4DCNI>.
You are receiving this because you were mentioned.Message ID: ***@***.***>
|
Beta Was this translation helpful? Give feedback.
-
|
A quick feedback message: I am trying to get a grip on what this platform actually does, for me as issuer builder as SURF. It seems that I can create an intermediate service that creates a QR code that can then be used by wallets to consume it. However, it is inconvenient to use QR codes. There are wallets that can consume links (same-device flows for example, or command-line-base wallets). It would be more convenient to have the intermediate service generate the credential offer and then have the ITB generate a qr code from that if that is required. Or perhaps create a set of tests that are not kicked off with a QR code, but directly with a credential offer. |
Beta Was this translation helpful? Give feedback.
-
W3C VCDM-based CredentialsIn DIIPv4 Credential Format it is described that:
Currently in the Test Bed, W3C VCDM-based Credentials are issued and secured as described in OpenID4VCI, which does not align with the method specified in Securing JSON-LD Verifiable Credentials with SD-JWT. What is the intended method? |
Beta Was this translation helpful? Give feedback.
-
Digital Credentials Query Language (DCQL)In DIIPv4 Section 4.6 it is described that:
In OID4VP the Digital Credential Query Language (DCQL) is defined. Currently in all Test Cases for Presentation ( "dcql_query": {
"credentials": [
{
// ...
"claims": [
{
"path": [
"$.given_name"
]
},
{
"path": [
"$.family_name"
]
},
{
"path": [
"$.birth_date"
]
},
{
"path": [
"$.age_over_18"
]
},
{
"path": [
"$.issuance_date"
]
},
{
"path": [
"$.expiry_date"
]
},
{
"path": [
"$.issuing_authority"
]
},
{
"path": [
"$.issuing_country"
]
}
],
// ...
}
]
}Note that the |
Beta Was this translation helpful? Give feedback.
-
VP Response
|
Beta Was this translation helpful? Give feedback.
-
Invalid JWE ResponseWhen posting to the VP endpoint with an I also tested with some other verifiers, and there the decryption seems to work (so at least the JWE seems to be correct). |
Beta Was this translation helpful? Give feedback.
-
Inconsistent request URI methodThe DIIP V4 Interop Profile explicitly mentions to support only the "get" method as a part of request_uri. However, we notice test case 9 "Test case 000009: VP did:web direct_post, post and sdjwt" tests the "post" method which is not part of the DIIP V4 profile. OID4VP defines two values for the request_uri_method in the Authorization Request: get and post. DIIP requires support for only the get method. OID4VP Request: openid4vp://?request_uri=https://itb.ilabs.ai/rfc-issuer/did/VPrequest/104c363d-a124-4b17-a15d-50dc324a105b&**request_uri_method=post**&client_id=decentralized_identifier:did:web:itb.ilabs.ai:rfc-issuer |
Beta Was this translation helpful? Give feedback.
-
Need clarity on Test case 000001: VCI Authorization Code flow X.509 SD-JWTDo you believe you could kindly confirm why the title of test case 000001 includes the word "X509" in the title and how this relates to the DIIP V4 Interop Profile? The reason I ask is because I was under the impression the DIIP V4 Profile will not use X509 certificates. |
Beta Was this translation helpful? Give feedback.
-
Authorization Request JWT Missing Required typ Value oauth-authz-req+jwtAccording to the OID4VP Specification (draft-28), Section 6.3 and RFC9101, the typ header in a JWT-secured Authorization Request must be: Whether this would be corrected ? |
Beta Was this translation helpful? Give feedback.
-
Beta Was this translation helpful? Give feedback.
-
Titles of VCI pre-authorization code flow test cases appear to be interchangedThe test case - "Test case 000002: VCI pre-authorization code flow - no PIN - sdjwt", it incorrectly prompts for a pin. Conversely, in the test case - "Test case 000003: VCI pre-authorization code flow - PIN - sdjwt", it does not ask for a pin where it is supposed to. Is this a typo? Could you please confirm if this will be modified? |
Beta Was this translation helpful? Give feedback.
-
Clarification required on VCI pre-authorization code flow - with PIN - sdjwtI have a few questions regarding the pre-authorization code flow - with PIN. Test case ref:
|
Beta Was this translation helpful? Give feedback.
-
Invalid Response mode on testing reject scenarioWhen testing the holder reject scenario, As per the openid4vp draft 28 spec, "If the Response URI has successfully processed the Authorization Response or Authorization Error Response, it MUST respond with an HTTP status code of 200 with Content-Type of application/json and a JSON object in the response body." we are expecting http status code as 200, but we are getting error 400 and error desc as {"error":"No vp_token found in the request body."} |
Beta Was this translation helpful? Give feedback.
-
Credential Proof Not AcceptedDIIP test case 3, I send the following credential request: I get the message |
Beta Was this translation helpful? Give feedback.
-
ITB Issuance Requests all failWhen I try to start a new issuance request, it immediately fails with the following error: [2025-09-22 07:13:35] INFO - Starting session Could you please have a look at it? Thanks. |
Beta Was this translation helpful? Give feedback.
-
|
Hi @endimion I am testing our browser based organizational wallet against the testbed, and I ran into two issues: Our environment is rejecting your credentials because the status list it refers to has expired on September 18.
|
Beta Was this translation helpful? Give feedback.
-
Clarification on well-known url for credential issuer meta datawe’d like clarification on how .well-known URL resolution should work for the openid-credential-issuer discovery endpoint. Here’s a comparison: Spec Example (OID4VCI 1.0):Issuer URL: Credential Issuer Metadata:https://issuer.example.com/.well-known/openid-credential-issuer/tenant OAuth Authorization Server (RFC 8414):https://issuer.example.com/.well-known/oauth-authorization-server/tenant Your Implementation (FINDENET):Issuer URL: Also referring this spec for wellknown configuration This raises a few questions:
|
Beta Was this translation helpful? Give feedback.
-
mDOC credential
|
Beta Was this translation helpful? Give feedback.
-
No
|
Beta Was this translation helpful? Give feedback.
-
|
Beta Was this translation helpful? Give feedback.
-
DID:Web in ITB Test issuer not according to specsHi, during testing different wallets with our Verifier, we noticed that the ITB is too lenient on the did:web resolution. The DID document of the RFC issuer is available on two different URLs: According to the did:web specification the second URL should not resolve to the DID document, since a path is specified (see step 4, the path is /rfc-issuer). The result is that some of the personal wallets use this method and think they are DIIP v4 compliant. When testing with other Verifiers, the wallet fails to retrieve the DID document. To be complete, here is the part of the did:web specification: 2.5.2 Read (Resolve)
|
Beta Was this translation helpful? Give feedback.
-
|
Hi, I'm getting this error from the Test Bed, meaning I can't even start the tests.
|
Beta Was this translation helpful? Give feedback.
-
Linkability of Status List and Credential Signing KeysAt the moment, we only support using the same issuer key when verifying the signature of the credential and its status list. We have noticed that the status list and the credentials are not signed using the same keys. The credential uses a The specifications are not very clear: https://datatracker.ietf.org/doc/html/draft-ietf-oauth-status-list-12#section-11.3, but it seems clear that the keys should either be either the same, either owned by the same entity (e.g. same Are there any plans to change this (maybe DIIP v5)? Or is there any link that I'm missing when it comes to linking the keys? |
Beta Was this translation helpful? Give feedback.
-
W3C VCDM 2.0 includes
|
Beta Was this translation helpful? Give feedback.
-
|
[laugh] Eelco Klaver reacted to your message:
…________________________________
From: Nikos Triantafyllou ***@***.***>
Sent: Monday, October 20, 2025 7:31:05 AM
To: FIDEScommunity/DIIP ***@***.***>
Cc: Eelco Klaver ***@***.***>; Mention ***@***.***>
Subject: Re: [FIDEScommunity/DIIP] DIIP V4 Test Bed (Discussion #59)
haven't deployed the update yet.. give me a hour to finish a meeting :) will also double check why you are getting an expired list...
—
Reply to this email directly, view it on GitHub<#59 (reply in thread)>, or unsubscribe<https://github.com/notifications/unsubscribe-auth/AAELVVTCNNW4M32RNITVZ233YSFTTAVCNFSM6AAAAAB7IEZWHCVHI2DSMVQWIX3LMV43URDJONRXK43TNFXW4Q3PNVWWK3TUHMYTINZSGY2DEOA>.
You are receiving this because you were mentioned.Message ID: ***@***.***>
|
Beta Was this translation helpful? Give feedback.
-
Presentation verifier attestation should be an objectDuring the presentation test, I'm getting the following Which is failing our validation. I double checked the specification and it seems that the verifier attestations should be an array of objects, and not strings: https://openid.net/specs/openid-4-verifiable-presentations-1_0-28.html#section-5.1:~:text=type%20specific%20parameters%0A%7D-,verifier_attestations,-%3A and https://openid.net/specs/openid-4-verifiable-presentations-1_0-28.html#verifier-attestations. |
Beta Was this translation helpful? Give feedback.
-
|
Is the test bed down? We get this error message when trying to run tests:
|
Beta Was this translation helpful? Give feedback.






For those that could't join the Q&A session today, please find below the link to the recording
https://netorg17025239-my.sharepoint.com/:v:/g/personal/harmen_fides_community/Ec8b7pjo6JlHqnoDTKxS8EMBZXR2AkmEBqhzi_BbCQp4Ww?e=ly5l2O