Issuing a Known Customer Credential
Known Customer Credentials (KCCs) are Verifiable Credentials designed to streamline the Know Your Customer (KYC) process for tbDEX protocol users. KCCs help in gaining access to PFIs providing regulated financial services.
For a comprehensive exploration of the practical applications and compliance considerations of KCCs, refer to our KCC Compliance Guide which provides detailed examples and insights into how KCCs align with certain regulatory requirements, offering valuable context for those overseeing the implementation and management of KCCs.
In this guide, we'll cover:
- Performing Identity Verification (IDV) as a necessary step before issuing a Known Customer Credential (KCC), by implementing an HTTP API conformant with Self Issued OpenID Provider V2 (SIOPv2) and OpenID for Verifiable Presentations (OID4VP).
- Designing and detailing the required properties of a KCC.
- Issuing a KCC conformant with OpenID for Verifiable Credential Issuance (OID4VCI) following successful IDV.
Environment Setup
If you haven't already, please follow the Credential Issuance Server Setup Guide for detailed instructions on the dependencies and packages needed to set up your server.
IDV Process
Identity Verification is a critical component of typical KYC requirements, where certain types of Personally Identifying Information (PII) are collected and verified from an individual. IDV is a crucial step before a KCC can be issued.
%%{
init: {
'theme': 'base',
'themeVariables': {
'background': '#000',
'primaryColor': '#333',
'primaryTextColor': '#fff',
'secondaryColor': '#9a1aff',
'tertiaryColor': '#000',
'fontFamily': 'IBM Plex Mono',
'primaryBorderColor': '#ffec19',
'actorTextColor': '#24f2ff',
'actorBorder': '#ffec19',
'actorBkg': '#000',
'sequenceNumberColor': '#f00',
'loopTextColor': '#24f2ff'
}
}
}%%
sequenceDiagram
autonumber
participant W as Webview
participant D as Mobile Wallet
participant I as Issuer
D->>+I: GET did:ex:issuer?service=IDV
I->>I: Construct SIOPv2 Authorization Request
I-->>-D: SIOPv2 Authorization Request
D->>D: Construct SIOPv2 Authorization Response
D->>+I: SIOPv2 Authorization Response
I->>I: Construct IDV Request
I-->>-D: IDV Request
D->>D: Verify IDV Request
D->>W: Load URL in IDV Request
The IDV flow begins when the customer's agent (e.g. Wallet application) sends an HTTP request to the Issuer's IDV service endpoint specified in the Issuer's Decentralized Identifier (DID) Document.
1. Handling Incoming Requests
Implement an endpoint to handle incoming GET requests from the Wallet. When a request is received, you'll need to construct the SIOPv2 Authorization Request.
Approach 1: Requesting only id_token
When a Verifiable Presentation is not an accepted form of IDV, you can respond to the customer's Wallet application by requesting only an id_token
from them:
Approach 2: Requesting both id_token
and vp_token
When a Verifiable Presentation is an accepted form of IDV, you can respond to the customer's Wallet application by requesting an id_token
and a vp_token
from them:
The SIOPv2 Authorization request above that you as the issuer send to your customer contains the following key information about you as well as a Presentation Definition.
client_id
: Issuer's DID, establishing the issuer/requestor's identity.response_type
: Lets the Wallet know the desired format, withid_token
being required identity token andvp_token
for optional verifiable presentation token. The inclusion ofvp_token
means a presentation definition is required within the request.response_uri
: Indicates the callback URL for the Wallet, ensuring direct communication between the Wallet and the Issuer.nonce
: A unique identifier tying together the request and its response.
2. Encode the SIOPv2 Authorization Request and respond:
3. Wallet's SIOPv2 Authorization Response
The Wallet will then respond with an HTTP POST SIOPv2 Authorization Response. The HTTP request body must include an id_token
and optionally a vp_token
, both of which must be JSON Web Tokens (JWTs). Here is an example HTTP POST request body (which includes the optional vp_token
):
// Wallet.js example HTTP POST request body
{
"id_token": "eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJpc3MiOiJkaWQ6ZGh0OmN1c3RvbWVyRGlkIiwic3ViIjoiZGlkOmRodDpjdXN0b21lckRpZCIsImF1ZCI6Imlzc3VlckRpZC51cmkiLCJub25jZSI6Im4tMFM2X1d6QTJNaiIsImV4cCI6MTYxODg4NDQ3MywiaWF0IjoxNjE4ODgwODczfQ...",
"vp_token": "eyJhbGciOiJFZERTQSIsInR5cCI6IkpXVCIsImtpZCI6ImRpZDprZXk6...}"
}
The decoded JWT Claims for the id_token
and vp_token
are as follows:
// Wallet.js id_token decoded JWT claims
{
"iss": "did:dht:customerDid",
"sub": "did:dht:customerDid", // Customer's DID string
"aud": "did:dht:issuerDid", // Issuer's DID string
"nonce": "n-0S6_WzA2Mj", // Unique string from the Issuer's Auth request
"exp": 1618884473, // Expiration time
"iat": 1618880873 // issued at time
}
// Wallet.js vp_token decoded JWT claims
{
"@context": [
"https://www.w3.org/2018/credentials/v1",
"https://identity.foundation/presentation-exchange/submission/v1"
],
"type": ["VerifiablePresentation", "PresentationSubmission"],
"presentation_submission": {
"id": "epzZXstAcVNt5MRrcyG91",
"definition_id": "IDCardCredentials",
"descriptor_map": [
{
"id": "IDCardCredential",
"format": "jwt_vc",
"path": "$.vp.verifiableCredential[0]"
},
{
"id": "nationalIdentifierVerification",
"format": "jwt_vc",
"path": "$.vp.verifiableCredential[1]"
}
]
},
"verifiableCredential": [
"eyJhbGciOiJFZERTQSIsInR5cCI6IkpXVCIsImtpZCI6..."
]
}