|
| 1 | +# EWC RFC013: Issuing Photo ID Verifiable Credential - v1.0 |
| 2 | + |
| 3 | +**Authors:** |
| 4 | + |
| 5 | +* Matteo Marangoni, SICPA, Spain |
| 6 | +* Xavi Vila, SICPA, Spain |
| 7 | +* Dimitroglo, Veaceslav, SICPA, Spain |
| 8 | + |
| 9 | +**Reviewers:** |
| 10 | + |
| 11 | +* Mr. Lal Chandran, iGrant.io, Sweden |
| 12 | +* Viky Manaila, Intesi Group, Italy |
| 13 | + |
| 14 | +**Status:** pre-approve v1.0 |
| 15 | + |
| 16 | +Copyright © 2025 All Rights Reserved |
| 17 | +Published under a Creative Commons Attribution 4.0 International License |
| 18 | + |
| 19 | +--- |
| 20 | + |
| 21 | +## **Table of Contents** |
| 22 | + |
| 23 | +1. [Summary](#1-summary) |
| 24 | +2. [Motivation](#2-motivation) |
| 25 | + 2.1 [The need of a photo ID](#21-the-need-of-a-photo-id) |
| 26 | + 2.2 [ISO/IEC TS 23220 and Photo ID Issuance Process](#22-isoiec-ts-23220-and-photo-id-issuance-process) |
| 27 | + 2.3 [ETSI TS 119 461 and Identity Proofing Requirements](#23-etsi-ts-119-461-and-identity-proofing-requirements) |
| 28 | +3. [Scope](#3-scope) |
| 29 | + 3.1 [Photo ID as an Electronic Attestation of Attributes](#31-photo-id-as-an-electronic-attestation-of-attributes) |
| 30 | +4. [Pre-requisites](#4-pre-requisites) |
| 31 | + 4.1 [Photo ID as a EAA](#41-photo-id-as-a-eaa) |
| 32 | + 4.2 [Photo ID as a QEAA](#42-photo-id-as-a-qeaa) |
| 33 | +5. [Issuance Flow](#5-issuance-flow) |
| 34 | + 5.1 [Actors](#51-actors) |
| 35 | + 5.2 [Flow Details](#52-flow-details) |
| 36 | + 5.2.1 [Setup Phase](#521-setup-phase) |
| 37 | + 5.2.2 [Credential Issuance Request (OpenID4VCI)](#522-credential-issuance-request-openid4vci) |
| 38 | + 5.2.3 [Dynamic Credential Request – Option A: ID proofing with PID](#523-dynamic-credential-request--option-a-id-proofing-with-pid) |
| 39 | + 5.2.4 [Dynamic Credential Request - Option B: Unattended remote ID Proofing using eMRTD](#524-dynamic-credential-request---option-b-unattended-remote-id-proofing-using-emrtd) |
| 40 | + 5.2.5 [Credential Issuance Completion](#525-credential-issuance-completion) |
| 41 | +6. [Electronic Attestation Type](#60-electronic-attestation-type) |
| 42 | +7. [References](#70-references) |
| 43 | + |
| 44 | +--- |
| 45 | + |
| 46 | +## **1 Summary** |
| 47 | +This specification defines the implementation of the "Photo ID profile" defined in Annex C of ISO/IEC TS 23220-4, in mdoc and SD-JWT. The attestation issued is derived from an **electronic Machine-Readable Travel Document (eMRTD)** by a Qualified Trust Service Provider (QTSP). |
| 48 | + |
| 49 | +The issuance process includes verifying the identity of the subject using eID means issued with a high Level of Assurance (LoA High), such as a **Personal ID (PID) credential**, or alternatively conducting an unnattended remote identity proofing using identity documents. The issuance follows the **OpenID4VC** framework, ensuring interoperability with **EUDI Wallets**. |
| 50 | + |
| 51 | +### **Key Benefits:** |
| 52 | + |
| 53 | +- **Enhancing digital identity verification** while maintaining strong security and privacy guarantees. |
| 54 | +- **Facilitating travel and remote identity proofing**, reducing the need for physical document checks. |
| 55 | +- **Complying with international standards** such as **SD-JWT**, and **mDoc (ISO/IEC TS 23220)**. |
| 56 | +- **Enabling selective disclosure**, allowing users to share only necessary attributes (e.g., verifying age without revealing full birthdate), enhancing privacy and data minimization. |
| 57 | + |
| 58 | + |
| 59 | +## 2 Motivation |
| 60 | + |
| 61 | +### 2.1 The need of a photo ID |
| 62 | + |
| 63 | +The need for a photo ID arises from the limitations of the current Personal ID (PID) issued within the European Digital Identity Wallet (EUDI Wallet) ecosystem. Specifically, PIDs may not always include a photo, which is a required attribute in certain use cases where biometric verification is necessary or a physical presence of the individual is required. Furthermore, some use cases, such as traveling, require specific documentation (e.g., passport) that includes a document number, which is not included in the PID schema. Therefore, a separate photo ID attestation is necessary to fulfill these requirements. |
| 64 | + |
| 65 | +### 2.2 ISO/IEC TS 23220 and Photo ID Issuance Process |
| 66 | + |
| 67 | +The ISO/IEC TS 23220 series provides a comprehensive framework for identity management via mobile devices. Specifically, in ISO/IEC TS 23220-2, the standard outlines the data model and encoding rules required for generic eID systems, which forms the foundation for our Photo ID implementation. |
| 68 | + |
| 69 | +Section 5 of ISO/IEC TS 23220-2 describes the identity data collection and confirmation process, highlighting how "ID documents are issued by binding an applicant with a real-life identity." The standard emphasizes that "an issuer collects evidence to verify the attributes provided by the applicant, and this process is called identity proofing." This corresponds directly to the identity verification procedures an issuer will perform when issuing Photo ID attestations. |
| 70 | + |
| 71 | + |
| 72 | + |
| 73 | +ISO/IEC TS 23220-2 Figure 1 illustrates the issuing process of an eID document, showing how an applicant provides an application form and evidence (such as ID cards issued by an Authority) to the issuer. The issuer then collects other evidence if needed, proves the applicant's identity, binds that identity with the holder, and confirms the applicant through photo ID or by person of authority. |
| 74 | + |
| 75 | +Furthermore, Section 6 of ISO/IEC TS 23220-2 defines the data model specification that we will implement for the Photo ID, including the meta attributes for person entity (Section 6.3.1) which specifies the data elements that express attributes for describing a natural person, including crucial elements like family name, given names, date of birth, portrait, and biometric templates. |
| 76 | + |
| 77 | +### 2.3 ETSI TS 119 461 and Identity Proofing Requirements |
| 78 | + |
| 79 | +The identity proofing and verification procedures mentioned above are further elaborated and standardized in ETSI TS 119 461, which specifies "policy and security requirements for trust service components providing identity proofing of trust service subjects." This standard is particularly relevant to our implementation as it defines the requirements for identity proofing at two levels: Baseline and Extended Level of Identity Proofing (LoIP). |
| 80 | + |
| 81 | +The Baseline level of assurance is sufficient for use cases where the risk of identity fraud is low, such as online services that require a basic level of identity verification. In contrast, the Extended level of assurance could be required for use cases where the risk of identity fraud is higher, such as online services that require a high level of identity verification, or where the user is requesting access to sensitive information. |
| 82 | + |
| 83 | +Section 9 of ETSI TS 119 461 defines various use cases for identity proofing, including: |
| 84 | + |
| 85 | +* Physical presence (Section 9.2.1) |
| 86 | +* Attended remote identity proofing using identity documents (Section 9.2.2) |
| 87 | +* Unattended remote identity proofing using identity documents (Section 9.2.3) |
| 88 | +* Identity proofing using eID means (Section 9.2.4) |
| 89 | +* Identity proofing using digital signature with certificate (Section 9.2.5) |
| 90 | + |
| 91 | +In our implementation, the passport validation step described in Section 4.2.4 of this RFC will follow the unattended remote identity proofing requirements specified in Section 9.2.3 of ETSI TS 119 461. This includes requirements related to automated validation of digital identity documents (VAL-8.3.2 requirements) and binding to applicant by automated face biometrics (BIN-8.4.3 requirements). |
| 92 | + |
| 93 | +By adhering to both the ISO/IEC TS 23220 data model and the ETSI TS 119 461 identity proofing requirements, our Photo ID issuance process ensures a high level of interoperability within the European identity ecosystem. |
| 94 | + |
| 95 | +## 3 Scope |
| 96 | + |
| 97 | +We consider 2 possible scenarios when issuing a Photo ID attestation: |
| 98 | + |
| 99 | +1. The **Issuer** has all the necessary data required to issue a valid photo ID credential. This **Issuance Authority** performs the required identity proofing before issuing the attestation to the citizen (this might include remote identity proofing, authentication using PID or in-person verification). |
| 100 | + |
| 101 | +2. **Issuer** requests the required data from the citizen at the moment of issuing the photo ID attestation. In this case the Issuer (e.g. a **QTSP**) performs the required identity verification before issuing the attestation to the citizen. |
| 102 | + |
| 103 | +In this RFC we will be focusing on the **scenario 2)**. |
| 104 | + |
| 105 | +### 3.1 Photo ID as an Electronic Attestation of Attributes |
| 106 | + |
| 107 | +Depending on the recognition needs and handling within the digital identity ecosystem, Photo ID could be issued as **Qualified** or as **non-Qualified** attestation of attributes as per eIDAS regulation. |
| 108 | + |
| 109 | +* Non-qualified attestations, on the other hand, are issued by a broader range of providers, operate under potentially diverse legal and contractual rules, and their trustworthiness and recognition depend on the specific context and agreements in place. |
| 110 | +* Qualified attestations are issued by accredited entities, adhere to specific legal and technical standards ensuring a high level of trust and legal validity, and are integrated within a formal trust framework with trusted lists. |
| 111 | + |
| 112 | +## 4 Pre-requisites |
| 113 | + |
| 114 | +### 4.1 Photo ID as a EAA |
| 115 | + |
| 116 | +⚠️ ***Open question for Revieers*** |
| 117 | +We would appreciate your feedback on the following: Should the Photo ID be considered for issuance as a non-qualified EAA? |
| 118 | + |
| 119 | +### 4.2 Photo ID as a QEAA |
| 120 | + |
| 121 | +Besides the requirements laid down in Annex V of Regulation (EU) 2024/1183, when issuing a QEAA, the following requirements must be met: |
| 122 | + |
| 123 | +* **Issuer**: QEAA must be issued by a Qualified Trust Service Provider (QTSP). |
| 124 | +* **Identity Proofing**: The QTSP must verify the identity of the natural person to whom the QEAA is to be issued. |
| 125 | +* **Attribute Verification**: The QTSP must ensure with complete certainty the correctness and accuracy of the attested attributes of the person to whom the QEAA is issued. |
| 126 | + |
| 127 | +Annex C of the ETSI TS 119 461 specifies requirements for identity proofing targeted explicitly to fulfil requirements of the amended eIDAS regulation for issuing of qualified certificates and qualified electronic attestation of attributes. |
| 128 | + |
| 129 | +In this RFC, 2 identity proofing use cases (of the Annex C.3 - Use cases for issuing of QEAA) are considered: |
| 130 | + |
| 131 | +- ID proofing with PID: Use case for identity proofing by authentication using eID means (C.3.2): |
| 132 | + |
| 133 | + - Requires Extended LoIP. |
| 134 | + - Requires a notified eID with level **high** (EUDI Wallet with PID). |
| 135 | + - The other attributes would be obtained from the Machine-Readable Travel Document (eMRTD) data, authenticated by the SOD signature. |
| 136 | + - Perform user binding verification by comparing attributes from the PID such as first and last name and date of birth, to those in the identity document. |
| 137 | + |
| 138 | +- ID proofing without PID: Use case for identity proofing by other identification means (C.3.4): |
| 139 | + |
| 140 | + - Perform an unattended remote identity proofing using a digital identity document (eMRTD). |
| 141 | + - Requires Extended LoIP. |
| 142 | + - The ID proofing process must follow the unattended remote identity proofing requirements specified in Section 9.2.3 of ETSI TS 119 461. This includes requirements related to automated validation of digital identity documents and binding to applicant by automated face biometrics. |
| 143 | + |
| 144 | + |
| 145 | + |
| 146 | +## **5 Issuance Flow** |
| 147 | + |
| 148 | +The issuance process follows **OpenID4VCI** Authorisation Code flow as described in the [EWC RFC001: Issue Verifiable Credential - v2.0](https://github.com/EWC-consortium/eudi-wallet-rfcs/blob/main/ewc-rfc001-issue-verifiable-credential.md), and extends it by implementing Dynamic Credential Request (OpenID4VCI draft 13), ensuring a standardized method for **credential issuance**. |
| 149 | + |
| 150 | +It follows the OpenID4VC High Assurance Interop profile, where it is recommended that the Credential Issuer and the Wallet MUST support the authorization code flow. So no pre-authorized code flow is used. |
| 151 | + |
| 152 | +### High-level flow diagram. |
| 153 | + |
| 154 | +This diagram provides a high-level overview of the credential issuance process, highlighting the main steps involved. |
| 155 | + |
| 156 | +```mermaid |
| 157 | +sequenceDiagram |
| 158 | + participant Wallet as EUDI Wallet |
| 159 | + participant Issuer as PhotoId Issuer(QTSP) |
| 160 | + participant Scanner as Passport Scanner App |
| 161 | + |
| 162 | + Note over Wallet, Issuer: Setup |
| 163 | + Wallet->>Issuer: Discover Request |
| 164 | + Issuer-->>Wallet: Discover Response |
| 165 | + Note over Wallet, Issuer: Issuance request (OpenID4VCI) |
| 166 | + Wallet->>+Issuer: Auth Request |
| 167 | + |
| 168 | + alt Opt 1: With PID authentication |
| 169 | + Note over Wallet,Issuer: Dynamic credential request: 1) PID |
| 170 | + Issuer->>Wallet: Request PID |
| 171 | + Wallet-->>Issuer: Present PID |
| 172 | + Issuer->>Issuer: Check if PID is valid |
| 173 | + |
| 174 | + Note over Scanner,Issuer: Dynamic credential request: <br> 2) Passport |
| 175 | + Issuer->>Scanner: Passport scan |
| 176 | + Scanner-->>Issuer: Passport data |
| 177 | + Issuer->>Issuer: Match data with PID presentation |
| 178 | + else Opt 2: Unattended Remote ID Proofing |
| 179 | + Note over Issuer,Scanner: Dynamic credential request: <br> Unattended remote ID proofing |
| 180 | + Issuer->>+Scanner: Passport scan |
| 181 | + Scanner->>Scanner: Biometric and liveness check |
| 182 | + Scanner-->>-Issuer: Passport data + ID proof |
| 183 | + end |
| 184 | + |
| 185 | + Issuer-->>-Wallet: Auth Response |
| 186 | + Note over Issuer,Wallet: Complete Issuance |
| 187 | + Wallet->>+Issuer: Credential Request |
| 188 | + Issuer-->>-Wallet: Credential Response |
| 189 | +``` |
| 190 | + |
| 191 | + |
| 192 | +## 5.1 Actors |
| 193 | + |
| 194 | +| Actor | Description | |
| 195 | +|--------|------------| |
| 196 | +| **UA (User Agent)** | The user's browser used to interact with different entities. | |
| 197 | +| **W (EUDI Wallet)** | The user's digital wallet storing credentials. | |
| 198 | +| **IS (PhotoID Issuer - QTSP)** | A Qualified Trust Service Provider (QTSP) issuing the attestations. | |
| 199 | +| **QS (Qualified Seal - QTSP)** | The QTSP responsible for digitally sealing/verifying the issued attestations. | |
| 200 | +| **PS (Passport Scanner App)** | The app used to scan the user's passport and extract relevant data. | |
| 201 | +| **ES (External Source - Passport Scanner BE)** | A backend service for processing and validating scanned passport data. | |
| 202 | + |
| 203 | +--- |
| 204 | + |
| 205 | +## 5.2 Flow Details |
| 206 | + |
| 207 | +### 5.2.1. Setup Phase |
| 208 | +Before any attestations are issued, the **EUDI Wallet (W)** and the **PhotoID Issuer (IS)** establish a connection. |
| 209 | + |
| 210 | +1. **Wallet (W) discovers Issuer (IS)** |
| 211 | + - **W → IS:** Discover Request |
| 212 | + - **IS → W:** Discover Response |
| 213 | + |
| 214 | + The Wallet and Issuer exchange metadata to establish connection endpoints and cryptographic parameters necessary for secure communication. This typically includes OpenID discovery mechanisms. |
| 215 | + |
| 216 | +### 5.2.2. Credential Issuance Request (OpenID4VCI) |
| 217 | + |
| 218 | +The issuance process starts when the user (UA) scans an OpenID4VCI credential offer QR or clicks on a deeplink. |
| 219 | +**Wallet** will invoke **UA (User Agent)** to send Authorisation Request to the **Authorization Server (QTSP ISSUER)**. |
| 220 | + |
| 221 | +After receiving Authorisation Request the **IS (PhotoID Issuer - QTSP)** will start the dynamic credential request to obtain the required data ( PID and Passport) to obtain PhotoID attestation. |
| 222 | + |
| 223 | + |
| 224 | +Dynamic credential request will consist of two steps, described in the following sections. |
| 225 | + |
| 226 | +### 5.2.3. Dynamic Credential Request – Option A: ID proofing with PID |
| 227 | + |
| 228 | +#### Step 1: User authentication with PID |
| 229 | + |
| 230 | +First steps will use OPENID4VP – as described in [EWC RFC002: Present Verifiable Credentials - v1.0 |
| 231 | +](https://github.com/EWC-consortium/eudi-wallet-rfcs/blob/main/ewc-rfc002-present-verifiable-credentials.md) to request and verify the user’s PID. |
| 232 | + |
| 233 | + |
| 234 | +#### Step 2: Passport attributes Validation |
| 235 | + |
| 236 | +After PID validation, the second step of the **Dynamic Credential Request** should trigger a flow to obtain Passport data. |
| 237 | + |
| 238 | +It is out of the scope of this document to describe the details of the passport reading process, but we expect the flow to be close to some OAuth2-based flow. |
| 239 | + |
| 240 | + |
| 241 | +If using OAuth2 authorization code flow, the user would be redirected to a Passport Reading Service application and prompted to scan their Passport alongside additional biometric checks to ensure the holder of the physical document is managing the application. Finally, the user would grant permission to share Passport data with the issuer. |
| 242 | + |
| 243 | +### 5.2.4. Dynamic Credential Request - Option B: Unattended remote ID Proofing using eMRTD |
| 244 | + |
| 245 | +This step is analogous to the previous step, but in this case the id proofing process should include the unattended remote identity proofing requirements specified in Section 9.2.3 of ETSI TS 119 461. |
| 246 | + |
| 247 | +### 5.2.5. Credential Issuance Completion |
| 248 | + |
| 249 | +Issuer performs an attribute-based verification to ensure PID data corresponds and matches a subset of the Passport’s claims. |
| 250 | +Once identity is verified, the **attestation is issued and sealed**. |
| 251 | + |
| 252 | +## **6.0 Electronic Attestation Type** |
| 253 | +The attestation is issued in one of the follows: |
| 254 | +- **SD-JWT format**, as defined in **[`ds013-photo-id.json`](https://github.com/EWC-consortium/eudi-wallet-rulebooks-and-schemas/blob/main/data-schemas/ds013-photo-id.json)**. |
| 255 | +- **mDoc format**, as specified in **ISO/IEC TS 23220-4 Annex C (2024-08-14)**. |
| 256 | + |
| 257 | +## **7.0 References** |
| 258 | +1. **EUDI Wallet JSON Schema**: [`ds013-photo-id.json`](https://github.com/EWC-consortium/eudi-wallet-rulebooks-and-schemas/blob/main/data-schemas/ds013-photo-id.json) |
| 259 | +2. **ISO/IEC TS 23220-4 (E) Annex C** *(2024-08-14)*: Defines the **mDoc format** for Photo ID. |
| 260 | +3. **ISO/IEC 18013-5**: Specifies **mobile driving licenses and digital identity display properties**. |
| 261 | +4. **OpenID4VCI**: [Draft Specification](https://openid.net/specs/openid-4-verifiable-credential-issuance-1_0.html). |
| 262 | + |
0 commit comments