Create and verify EBSI-compliant W3C Verifiable Presentations in JWT format.
For more details, see VC Framework.
Notes:
- this library implements the VC Data Model 1.1 specification and VC Data Model 2.0 specification.
- this library only supports
2020-12JSON Schemas.
Installation
Using npm:
npm i --save did-jwt @cef-ebsi/verifiable-presentation
Using yarn:
yarn add did-jwt @cef-ebsi/verifiable-presentation
Usage
The library exposes 2 main entry points. Depending on the VCDM version that you want to support (1.1 or 2.0), you will import one or the other:
"@cef-ebsi/verifiable-presentation/vcdm11.js"for VCDM 1.1 presentations"@cef-ebsi/verifiable-presentation/vcdm20.js"for VCDM 2.0 presentations
The APIs exposed by the 2 entry points are almost identical. The main difference is related to the credentials payload.
VCDM 1.1
Configuration
All the methods described below require a configuration object. The library exports a TypeScript interface that you can use to properly define the configuration object. Here's an example of such a configuration object:
import type { EbsiEnvConfiguration } from "@cef-ebsi/verifiable-presentation/vcdm11.js";
const config = {
// List of trusted hosts
hosts: ["api-test.ebsi.eu"],
// Defines the URI scheme
scheme: "ebsi",
// Defines the network config
network: {
// Network component, as it appears in the URI
name: "test",
// Whether the network component is optional or not
isOptional: false,
},
// The list of the supported services (with their version number)
services: {
"did-registry": "v5",
"trusted-issuers-registry": "v5",
"trusted-policies-registry": "v3",
"trusted-schemas-registry": "v3",
},
} as const satisfies EbsiEnvConfiguration;
Creating VP JWTs
Prerequisites
Create an EbsiIssuer object to sign VP JWTs:
import type { EbsiIssuer } from "@cef-ebsi/verifiable-presentation/vcdm11.js";
import { ES256Signer } from "@cef-ebsi/did-jwt";
import { hexToBytes } from "@noble/curves/utils.js";
const privateKey = hexToBytes("<hex private key>");
const signer = {
alg: "ES256",
did: "did:key:z2dmzD81cgPx8Vki7JbuuMmFYrWPgYoytykUZ3eyqht1j9KbsEYvdrjxMjQ4tpnje9BDBTzuNDP3knn6qLZErzd4bJ5go2CChoPjd5GAH3zpFJP5fuwSk66U5Pq6EhF4nKnHzDnznEP8fX99nZGgwbAh1o7Gj1X52Tdhf7U4KTk66xsA5r",
kid: "did:key:z2dmzD81cgPx8Vki7JbuuMmFYrWPgYoytykUZ3eyqht1j9KbsEYvdrjxMjQ4tpnje9BDBTzuNDP3knn6qLZErzd4bJ5go2CChoPjd5GAH3zpFJP5fuwSk66U5Pq6EhF4nKnHzDnznEP8fX99nZGgwbAh1o7Gj1X52Tdhf7U4KTk66xsA5r#z2dmzD81cgPx8Vki7JbuuMmFYrWPgYoytykUZ3eyqht1j9KbsEYvdrjxMjQ4tpnje9BDBTzuNDP3knn6qLZErzd4bJ5go2CChoPjd5GAH3zpFJP5fuwSk66U5Pq6EhF4nKnHzDnznEP8fX99nZGgwbAh1o7Gj1X52Tdhf7U4KTk66xsA5r",
signer: ES256Signer(privateKey),
} satisfies EbsiIssuer;
In order to create a valid VP JWT, the signer MUST either be a Legal Entity (LE) registered in the DID Registry (EBSI DID method v1), or a Natural Person using the did:key method (with the codec jwk_jcs-pub).
Creating a Verifiable Presentation
Specify a payload matching the Schemas["Presentation"] interface. Create a JWT by signing it with the previously configured issuer and a target audience using the createVerifiablePresentationJwt function:
import {
createVerifiablePresentationJwt,
type CreateVerifiablePresentationJwtOptions,
type Schemas,
} from "@cef-ebsi/verifiable-presentation/vcdm11.js";
const vpPayload = {
"@context": ["https://www.w3.org/2018/credentials/v1"],
holder:
"did:key:z2dmzD81cgPx8Vki7JbuuMmFYrWPgYoytykUZ3eyqht1j9KbsEYvdrjxMjQ4tpnje9BDBTzuNDP3knn6qLZErzd4bJ5go2CChoPjd5GAH3zpFJP5fuwSk66U5Pq6EhF4nKnHzDnznEP8fX99nZGgwbAh1o7Gj1X52Tdhf7U4KTk66xsA5r",
id: "urn:did:123456",
type: ["VerifiablePresentation"],
verifiableCredential: [
"eyJhbGciOiJFUzI1NiIsImtpZCI6ImRpZDplYnNpOnp0VFlFeWRjUFEyU3JLb2doSHF4QmZLI0JFTmRqRGZhdGxLai11UW92WUpsT184U2pPY1ZIdmk2SHJYS0xLRUI3UG8iLCJ0eXAiOiJKV1QifQ.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.qMegxHlOiFeQN-C3_BOKdfVtMsRA8bQNT5gfnHLxWZDda3wTskHHXo09_c_OLZcJ_lepj4VMjJUSOwLPZ2OV_Q",
],
} satisfies Schemas["Presentation"];
const audience = "did:ebsi:zfbWWSGtyFacugKnSJXuZ8V";
const options = {
/**
* Custom Axios request headers
*/
// axiosHeaders?: RawAxiosRequestHeaders;
/**
* User-defined VP JWT `exp`
* If none is provided, fallback to `payload.verifiableCredential` JWTs lowest `exp`.
*/
// exp?: number;
/**
* Additional header parameters to add to the JWT header
*/
// header?: Partial<VpJwtHeader>;
/**
* User-defined VP JWT `nbf`
* If none is provided, fallback to `payload.verifiableCredential` JWTs highest `nbf`.
*/
// nbf?: number;
/**
* The nonce is used to stop a replay attack
*/
// nonce?: string;
/**
* Verification relationship
* @defaultValue "authentication"
*/
// proofPurpose?: ProofPurposeTypes;
/**
* Determines whether to validate the Verifiable Presentation payload or not.
* Validation is active by default.
*
* Note: even when skipValidation is set to true, the payload must be a valid
* EBSI Verifiable Presentation.
* @defaultValue false
*/
// skipValidation?: boolean;
/**
* Axios requests timeout (in milliseconds). Default: 15 seconds
*/
// timeout?: number;
/**
* Credential verification options
*/
// verifyCredentialOptions?: VerifyCredentialOptions;
} satisfies CreateVerifiablePresentationJwtOptions;
const vpJwt = await createVerifiablePresentationJwt(
vpPayload,
signer,
audience,
config,
options,
);
console.log(vpJwt);
// eyJhbGciOiJFUzI1NiIsImtpZCI6ImRpZDprZXk6ejJkbXpEODFjZ1B4OFZraTdKYnV1TW1GWXJXUGdZb3l0eWtVWjNleXFodDFqOUtic0VZdmRyanhNalE0dHBuamU5QkRCVHp1TkRQM2tubjZxTFpFcnpkNGJKNWdvMkNDaG9QamQ1R0FIM3pwRkpQNWZ1d1NrNjZVNVBxNkVoRjRuS25IekRuem5FUDhmWDk5blpHZ3diQWgxbzdHajFYNTJUZGhmN1U0S1RrNjZ4c0E1ciN6MmRtekQ4MWNnUHg4VmtpN0pidXVNbUZZcldQZ1lveXR5a1VaM2V5cWh0MWo5S2JzRVl2ZHJqeE1qUTR0cG5qZTlCREJUenVORFAza25uNnFMWkVyemQ0Yko1Z28yQ0Nob1BqZDVHQUgzenBGSlA1ZnV3U2s2NlU1UHE2RWhGNG5Lbkh6RG56bkVQOGZYOTluWkdnd2JBaDFvN0dqMVg1MlRkaGY3VTRLVGs2NnhzQTVyIiwidHlwIjoiSldUIn0.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.K96SuPGYzZnARaV5TtK3AYUaVhc8Y6ZG1HsKwxMZERDayqyks2mdAAkZCKdmxyO-JnDPPRap0_13q439tE7RCQ
Verifying JWTs
Prerequisites
Pass in a VP JWT to verify and the target audience using the verifyPresentationJwt function:
import {
verifyPresentationJwt,
type VerifyPresentationJwtOptions,
} from "@cef-ebsi/verifiable-presentation/vcdm11.js";
const vpJwt =
"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.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.K96SuPGYzZnARaV5TtK3AYUaVhc8Y6ZG1HsKwxMZERDayqyks2mdAAkZCKdmxyO-JnDPPRap0_13q439tE7RCQ";
const audience = "did:ebsi:zfbWWSGtyFacugKnSJXuZ8V";
const options = {
/**
* Custom Axios request headers
*/
// axiosHeaders?: RawAxiosRequestHeaders;
/**
* Time in seconds expanding the validity period of the JWT, both before "nbf" and after "exp". Default : 0 second.
* Note: the did-jwt library uses a similar `skewTime` parameter with a default value of 5 minutes (300 seconds).
*/
// clockSkew?: number;
/**
* Verification relationship
* @defaultValue "authentication"
*/
// proofPurpose?: ProofPurposeTypes;
/**
* Determines whether to validate the resolution of the VP holder DID or not.
* Validation is active by default.
* @defaultValue false
*/
// skipHolderDidResolutionValidation?: boolean;
/**
* Determines whether to validate the signature of the VP JWT or not.
* Validation is active by default.
* @defaultValue false
*/
// skipSignatureValidation?: boolean;
/**
* Axios requests timeout (in milliseconds). Default: 15 seconds
*/
// timeout?: number;
/**
* Unix timestamp. Optional comparison date. Default: current date and time.
* For the JWT to be valid, `nbf` ≤ `validAt` ≤ `exp`.
*/
// validAt?: number;
/**
* Credential verification options
*/
// verifyCredentialOptions?: VerifyCredentialOptions;
} satisfies VerifyPresentationJwtOptions;
const verifiedVp = await verifyPresentationJwt(
vpJwt,
audience,
config,
options,
);
console.log(JSON.stringify(verifiedVp, undefined, 2));
/*
{
"@context": [
"https://www.w3.org/2018/credentials/v1"
],
"holder": "did:key:z2dmzD81cgPx8Vki7JbuuMmFYrWPgYoytykUZ3eyqht1j9KbsEYvdrjxMjQ4tpnje9BDBTzuNDP3knn6qLZErzd4bJ5go2CChoPjd5GAH3zpFJP5fuwSk66U5Pq6EhF4nKnHzDnznEP8fX99nZGgwbAh1o7Gj1X52Tdhf7U4KTk66xsA5r",
"id": "urn:did:123456",
"type": [
"VerifiablePresentation"
],
"verifiableCredential": [
"eyJhbGciOiJFUzI1NiIsImtpZCI6ImRpZDplYnNpOnp0VFlFeWRjUFEyU3JLb2doSHF4QmZLI0JFTmRqRGZhdGxLai11UW92WUpsT184U2pPY1ZIdmk2SHJYS0xLRUI3UG8iLCJ0eXAiOiJKV1QifQ.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.qMegxHlOiFeQN-C3_BOKdfVtMsRA8bQNT5gfnHLxWZDda3wTskHHXo09_c_OLZcJ_lepj4VMjJUSOwLPZ2OV_Q"
]
}
*/
VCDM 2.0
Configuration
All the methods described below require a configuration object. The library exports a TypeScript interface that you can use to properly define the configuration object. Here's an example of such a configuration object:
import type { EbsiEnvConfiguration } from "@cef-ebsi/verifiable-presentation/vcdm20.js";
const config = {
// List of trusted hosts
hosts: ["api-pilot.ebsi.eu"],
// Defines the URI scheme
scheme: "ebsi",
// Defines the network config
network: {
// Network component, as it appears in the URI
name: "pilot",
// Whether the network component is optional or not
isOptional: false,
},
// The list of the supported services (with their version number)
services: {
"did-registry": "v5",
"trusted-issuers-registry": "v5",
"trusted-policies-registry": "v3",
"trusted-schemas-registry": "v3",
},
} as const satisfies EbsiEnvConfiguration;
Creating VP JWTs
Prerequisites
Create an EbsiIssuer object to sign VP JWTs:
import type { EbsiIssuer } from "@cef-ebsi/verifiable-presentation/vcdm20.js";
import { ES256Signer } from "@cef-ebsi/did-jwt";
import { hexToBytes } from "@noble/curves/utils.js";
const privateKey = hexToBytes("<hex private key>");
const signer = {
alg: "ES256",
did: "did:key:z2dmzD81cgPx8Vki7JbuuMmFYrWPgYoytykUZ3eyqht1j9KbsEYvdrjxMjQ4tpnje9BDBTzuNDP3knn6qLZErzd4bJ5go2CChoPjd5GAH3zpFJP5fuwSk66U5Pq6EhF4nKnHzDnznEP8fX99nZGgwbAh1o7Gj1X52Tdhf7U4KTk66xsA5r",
kid: "did:key:z2dmzD81cgPx8Vki7JbuuMmFYrWPgYoytykUZ3eyqht1j9KbsEYvdrjxMjQ4tpnje9BDBTzuNDP3knn6qLZErzd4bJ5go2CChoPjd5GAH3zpFJP5fuwSk66U5Pq6EhF4nKnHzDnznEP8fX99nZGgwbAh1o7Gj1X52Tdhf7U4KTk66xsA5r#z2dmzD81cgPx8Vki7JbuuMmFYrWPgYoytykUZ3eyqht1j9KbsEYvdrjxMjQ4tpnje9BDBTzuNDP3knn6qLZErzd4bJ5go2CChoPjd5GAH3zpFJP5fuwSk66U5Pq6EhF4nKnHzDnznEP8fX99nZGgwbAh1o7Gj1X52Tdhf7U4KTk66xsA5r",
signer: ES256Signer(privateKey),
} satisfies EbsiIssuer;
In order to create a valid VP JWT, the signer MUST either be a Legal Entity (LE) registered in the DID Registry (EBSI DID method v1), or a Natural Person using the did:key method (with the codec jwk_jcs-pub).
Creating a Verifiable Presentation
Specify a payload matching the Schemas["Presentation"] interface. Create a JWT by signing it with the previously configured issuer and a target audience using the createVerifiablePresentationJwt function:
import {
createVerifiablePresentationJwt,
type CreateVerifiablePresentationJwtOptions,
type Schemas,
} from "@cef-ebsi/verifiable-presentation/vcdm20.js";
const vpPayload = {
"@context": ["https://www.w3.org/ns/credentials/v2"],
holder:
"did:key:z2dmzD81cgPx8Vki7JbuuMmFYrWPgYoytykUZ3eyqht1j9KbsEYvdrjxMjQ4tpnje9BDBTzuNDP3knn6qLZErzd4bJ5go2CChoPjd5GAH3zpFJP5fuwSk66U5Pq6EhF4nKnHzDnznEP8fX99nZGgwbAh1o7Gj1X52Tdhf7U4KTk66xsA5r",
id: "urn:did:123456",
type: ["VerifiablePresentation"],
verifiableCredential: [
{
"@context": "https://www.w3.org/ns/credentials/v2",
id: "data:application/vc+jwt,eyJhbGciOiJFUzI1NiIsImtpZCI6ImRpZDplYnNpOnp0VFlFeWRjUFEyU3JLb2doSHF4QmZLI0JFTmRqRGZhdGxLai11UW92WUpsT184U2pPY1ZIdmk2SHJYS0xLRUI3UG8iLCJ0eXAiOiJ2Yytqd3QifQ.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.Rt5CvN_FybntXZ8Y_9bb7mYuyD1o9jMQ839UPDdUwJVfihdUCy-2I7a5sMkxIccuMUDmzdgDDVcAUmCzjQ7seg",
type: "EnvelopedVerifiableCredential",
},
],
} satisfies Schemas["Presentation"];
const audience = "did:ebsi:z25rB44FLiDYHsJy5gUjQ2RV";
const options = {
/**
* Custom Axios request headers
*/
// axiosHeaders?: RawAxiosRequestHeaders;
/**
* Additional header parameters to add to the JWT header
*/
// header?: Partial<VpJwtHeader>;
/**
* The nonce is used to stop a replay attack
*/
// nonce?: string;
/**
* Additional JWT claims to add to the VC JWT payload
*/
// payload?: Partial<VpJwtClaims>;
/**
* Verification relationship
* @defaultValue "authentication"
*/
// proofPurpose?: ProofPurposeTypes;
/**
* Determines whether to validate the Verifiable Presentation payload or not.
* Validation is active by default.
*
* Note: even when skipValidation is set to true, the payload must be a valid
* EBSI Verifiable Presentation.
* @defaultValue false
*/
// skipValidation?: boolean;
/**
* Axios requests timeout (in milliseconds). Default: 15 seconds
*/
// timeout?: number;
/**
* Credential verification options
*/
// verifyCredentialOptions?: VerifyCredentialOptions;
} satisfies CreateVerifiablePresentationJwtOptions;
const vpJwt = await createVerifiablePresentationJwt(
vpPayload,
signer,
audience,
config,
options,
);
console.log(vpJwt);
// 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.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.3GuksIn5_CWl2r_Zt5860MCq-pB4qfSM2kv_XnBMNCdjiBeiELUd47E1beTMF0wgmoNP6iHzQXLQcjvAfChBlA
Verifying JWTs
Prerequisites
Pass in a VP JWT to verify and the target audience using the verifyPresentationJwt function:
import {
verifyPresentationJwt,
type VerifyPresentationJwtOptions,
} from "@cef-ebsi/verifiable-presentation/vcdm20.js";
const vpJwt =
"eyJhbGciOiJFUzI1NiIsImtpZCI6ImRpZDprZXk6ejJkbXpEODFjZ1B4OFZraTdKYnV1TW1GWXJXUGdZb3l0eWtVWjNleXFodDFqOUtic0VZdmRyanhNalE0dHBuamU5QkRCVHp1TkRQM2tubjZxTFpFcnpkNGJKNWdvMkNDaG9QamQ1R0FIM3pwRkpQNWZ1d1NrNjZVNVBxNkVoRjRuS25IekRuem5FUDhmWDk5blpHZ3diQWgxbzdHajFYNTJUZGhmN1U0S1RrNjZ4c0E1ciN6MmRtekQ4MWNnUHg4VmtpN0pidXVNbUZZcldQZ1lveXR5a1VaM2V5cWh0MWo5S2JzRVl2ZHJqeE1qUTR0cG5qZTlCREJUenVORFAza25uNnFMWkVyemQ0Yko1Z28yQ0Nob1BqZDVHQUgzenBGSlA1ZnV3U2s2NlU1UHE2RWhGNG5Lbkh6RG56bkVQOGZYOTluWkdnd2JBaDFvN0dqMVg1MlRkaGY3VTRLVGs2NnhzQTVyIiwidHlwIjoidnArand0In0.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.3GuksIn5_CWl2r_Zt5860MCq-pB4qfSM2kv_XnBMNCdjiBeiELUd47E1beTMF0wgmoNP6iHzQXLQcjvAfChBlA";
const audience = "did:ebsi:z25rB44FLiDYHsJy5gUjQ2RV";
const options = {
/**
* Custom Axios request headers
*/
// axiosHeaders?: RawAxiosRequestHeaders;
/**
* Time in seconds expanding the validity period of the JWT, both before "nbf" and after "exp". Default : 0 second.
* Note: the did-jwt library uses a similar `skewTime` parameter with a default value of 5 minutes (300 seconds).
*/
// clockSkew?: number;
/**
* Verification relationship
*/
// proofPurpose?: ProofPurposeTypes;
/**
* Determines whether to validate the resolution of the VP holder DID or not.
* Validation is active by default.
* @defaultValue false
*/
// skipHolderDidResolutionValidation?: boolean;
/**
* Determines whether to validate the signature of the VP JWT or not.
* Validation is active by default.
* @defaultValue false
*/
// skipSignatureValidation?: boolean;
/**
* Axios requests timeout (in milliseconds). Default: 15 seconds
*/
// timeout?: number;
/**
* Unix timestamp. Optional comparison date. Default: current date and time.
* For the JWT to be valid, the presentation and all its credentials must be valid at the given time.
*/
// validAt?: number;
/**
* Credential verification options
*/
// verifyCredentialOptions?: VerifyCredentialOptions;
} satisfies VerifyPresentationJwtOptions;
const verifiedPresentation = await verifyPresentationJwt(
vpJwt,
audience,
config,
options,
);
console.log(JSON.stringify(verifiedPresentation, undefined, 2));
/*
{
"@context": [
"https://www.w3.org/ns/credentials/v2"
],
"holder": "did:key:z2dmzD81cgPx8Vki7JbuuMmFYrWPgYoytykUZ3eyqht1j9KbsEYvdrjxMjQ4tpnje9BDBTzuNDP3knn6qLZErzd4bJ5go2CChoPjd5GAH3zpFJP5fuwSk66U5Pq6EhF4nKnHzDnznEP8fX99nZGgwbAh1o7Gj1X52Tdhf7U4KTk66xsA5r",
"id": "urn:did:123456",
"type": [
"VerifiablePresentation"
],
"verifiableCredential": [
{
"@context": "https://www.w3.org/ns/credentials/v2",
"id": "data:application/vc+jwt,eyJhbGciOiJFUzI1NiIsImtpZCI6ImRpZDplYnNpOnp0VFlFeWRjUFEyU3JLb2doSHF4QmZLI0JFTmRqRGZhdGxLai11UW92WUpsT184U2pPY1ZIdmk2SHJYS0xLRUI3UG8iLCJ0eXAiOiJ2Yytqd3QifQ.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.Rt5CvN_FybntXZ8Y_9bb7mYuyD1o9jMQ839UPDdUwJVfihdUCy-2I7a5sMkxIccuMUDmzdgDDVcAUmCzjQ7seg",
"type": "EnvelopedVerifiableCredential"
}
]
}
*/
Axios config defaults
The library uses the global axios instance to make HTTP requests. If needed, you can specify config defaults. More information on axios configuration can be found here.
For instance, if you want to override the default HTTPS agent with a custom agent using https-proxy-agent, you can do it like so:
import axios from "axios";
import { HttpsProxyAgent } from "https-proxy-agent";
axios.defaults.httpsAgent = new HttpsProxyAgent("http://168.63.76.32:3128");
Try it online
The VC & VP validator tool uses the @cef-ebsi/verifiable-presentation to verify VP JWTs.