Using walt-id for Gaia-X Dataspaces #8
-
Hello, we would like to use walt-id for our gaia-x service, which may or may not become an SSI Domain (which we currently do not know). Basically, we have gaia-x compatible connectors from EDC that have been using a simple oauth2 flow with keycloak, where everyone is registered in a common realm and public/private keys are used to verify clients. Basic auth is not supported, only public/private keys during oauth2. There is an alternative flow from EDC with distributed identities that we are currently experimenting with. To eventually function as an SSI domain, we have chosen two flows that we may need to partially fulfill, namely SSI OIDC Login and Initial Access Token Issuing. Here, we assume that we will have our own internal Keycloak as our own IAM Platform. We ignore the interactions between other components and are only interested in flows coming in and outside of the IAM Platform. We want to integrate walt-id using identity federation. We were unable to answer the following questions:
We are currently looking into developing or mocking missing parts ourselves (by extending code or writing scripts that act as user agents) and would like to use the built-in capabilities of walt-id as much as possible so that we actually test compatibility with SSIs instead of manually creating something that doesn't fulfill gaia-x requirements. |
Beta Was this translation helpful? Give feedback.
Replies: 2 comments 2 replies
-
Dear @dcandas, this is a fantastic use case on which you are working one! As walt.id is already supporting the GAIA-X ecosystem to some extent, and furthermore the IDP Kit handles the mapping from SSI to OIDC (for the KeyCloak integration), we are positive that we will be able to meet your requirements. We think it would be the best to have chat with you to discuss further details. Please drop us an email or ping us via Slack in order to schedule a call. Thx |
Beta Was this translation helpful? Give feedback.
-
Hi @dcandas, I'm looking forward to hearing more about your use case. The initial access token for registering new clients can currently be generated using the command line interface, whereas there is also a configuration option to allow unauthenticated client registrations ( Also, I have just filed an issue to support private/public key client authentication (and other methods as well), as it definitely is a useful feature that we should implement: best regards |
Beta Was this translation helpful? Give feedback.
Hi @dcandas, I'm looking forward to hearing more about your use case.
In the meantime, I think, you may want to read about the dynamic client registration API of the IDP Kit on our documentation:
https://docs.walt.id/v/idpkit/configuration-and-setup/oidc-manager-configuration/client-registration
The initial access token for registering new clients can currently be generated using the command line interface, whereas there is also a configuration option to allow unauthenticated client registrations (
openClientRegistration
). More details you find in the documentation linked above.Also, I have just filed an issue to support private/public key client authentication (and other methods as well)…