EID Gateway (EIDG) is an openID connect Provider while tenant application acts as openID connect relying party.
With OIDC protocol, relying party (tenant) and OIDC Provider (EIDG) have shared a configuration that allows parties to communicate and share information.
This configuration is composed by:
- Client Id (provided by EIDG to tenant)
- Client Secret (provided by EIDG to tenant)
- Redirect URIs (provided by tenant to EIDG)
- List of required authentication schemas and their configurations
User Interface customization
EIDG User interface can be configured for each Client Id with:- header
- footer
- Background color
API details
Authorization code flow
The authorisation process on EIDG is initiated by redirecting the user to the following endpoint: <url_servizio>/authorize?client_id=<client_id>&state=<state>&redirect_uri=<redirect_uri>&acr_values=<acr_values>&response_type=<response_type>&scope=<scope>&ui_locales=<ui_locales>&code_challenge_method=<code_challenge_method>&code_challenge<code_challenge> The parameters in this URL are:- <url_servizio> URL at which EIDG is published, different depending on the environment to be targeted (TESTING https://eid-gatewaycl.infocert.it/oauth2 PRODUCTION https://eid-gateway.infocert.it/oauth2)
- <client_id>: Client ID provided by EIDG during enrolment.
- <state>: String for use by the client application, useful for saving a session ID or status before the authorisation flow is started. EIDG will return it as it is at the end of the process.
- <redirect_uri>: Absolute URL that EIDG must redirect to at the end of the authentication process. This redirection occurs regardless of the outcome of the user authentication. This URL must match the one provided during enrollment.
- <acr_values>: A space-separated list of method codes among the ones provided in the enrollment phase. It is possible to send methods pertaining to different channel (e.g. infocert:identification:method:SPID_LEVEL_2 infocert:identification:method:CIE ) while any request with multiple same-channel methods will be rejected (e.g. infocert:identification:method:SPID_LEVEL_1 infocert:identification:method: SPID_LEVEL_2 ).
- <response_type>: Must be set to code
- <scope>: Must be set to openid
- <ui_locales>: Indicates a preferred language for EIDG’s user interface and any potential error descriptions. Must be set with the ISO two-letter code (e.g. it for Italian, en for English)
- <code_challenge_method>: Optional but highly recommended. Verification method of the client according to the PKCE for OAuth2 Must be set to S256
- <code_challenge>: Optional but highly recommended. Verification string of the client in SHA256 hash format according to the PKCE for OAuth2
STEP 1 – initial endpoint
Endpoint: /authorize Method: GET (redirect from client application) This is the first endpoint of the authorisation flow. See the previous section for the parameters to be appended to the address. By redirecting the user to this endpoint, they will be taken to the EIDG front end, where they will be able to select the desired authentication method as well as the provider, if any, from those associated with the requested <acr_values>.STEP 2 – Authentication of the user by the identity provider
At this point, the user will have to authenticate using the credentials of the chosen service and complete any credential verification steps, such as providing an OTP token or confirming the operation via app. Once authentication is complete, regardless of the outcome, the Identity Provider (hereafter IDP) redirects the user to EIDG, which processes the response received and redirects the user to the callback URL of the client application.STEP 3 – client callback
At this point, EIDG redirects the user to the client application. Depending on the outcome of the authentication, the composition of the URL is slightly different. Method: GET (redirect da EIDG) Endpoint:- <redirect_uri>?code=<authrorization_code>&state=<state> (authentication successful)
- <redirect_uri>?error=<oauth_error>&errorCode=<eidg_error>&errorDescription=<error_description>&state=<state> (authentication failed)
- <redirect_uri> Absolute URL of the endpoint on the client application indicated in step 1, which EIDG must redirect to at the end of the authentication process. This redirection occurs regardless of the outcome of the user authentication.
- <authorization_code> Code to be used in the next call to obtain access and refresh tokens.
- <state> String of the client application indicated in step 1.
- <oauth_error> Summary error code according to OAuth and OIDC
- <eidg_error> Error code produced by EIDG identifying the specific problem encountered. See Error Handling chapter below.
- <error_description> Description of the error. If available, the translated string according ti the requested starting localization will be provided, or Italian otherwise.
STEP 4 – Requesting access/refresh token
Endpoint: /token Method: POST Authentication: Basic base64(<client_id>:<client_secret>) (client_id and client_secret provided during enrolment) Content-type: application/x-www-form-urlencoded Parameters:- code Authorisation code returned by EIDG in the previous redirect.
- grant_type Type of grant to be requested. In this case, pass “authorization_code”.
- code_verifier Mandatory if PKCE was adopted during the /authorize call. Client verification string in plain format, accordin to the PKCE for OAuth2
- redirect_uri Redirect URI provided during enrolment. This stage serves to validate the origin of the request.
{
"idToken": "eyJ....fg",
"accessToken": "eyj....fg",
"refreshToken": "eyJ....pb",
"expiresIn": 360,
"tokenType": "Bearer"
}
In the event of an error during token creation, EIDG will respond with the status code appropriate to the type of problem (e.g. 400, 403, 500) and a JSON response as follows:
{
"error": "access_denied",
"errorCode": "EIDG_5",
"errorDescription": "Invalid client_id or client_secret"
}
For the error list, see the Error Handling chapter.
STEP 5 – User info retrivial
Endpoint: /user-info Method: GET Authentication: Bearer <access_token> (access_token obtained in the previous step) With this endpoint, the data of the authenticated user can be retrieved. EDIG will return a JSON that always has the same attributes. Depending on the dataset agreed to with the client, the respective attributes in the response will be valued, while the rest will be null. In the event of a successful call, EIDG will return a JSON with the user’s data, an excerpt of which is reproduced below. For a more detailed description of the complete data model, see the Data Model chapter.{
"version": "1.0",
"givenName": "Ada",
"familyName": "Lovelace",
"birthPlace":
{
"address":
{
"streetAddress": "null",
"postalCode": "null",
"addressRegion": "PI",
"addressLocality": "PISA",
"addressCountry": "IT"
}
}
"birthDate": "1985-12-10",
"gender": "F",
"taxID": "LVLDAA85T50G702B",
"....": "....",
"errorDescription": "Invalid client_id or client_secret"
}
In the event of an error during token creation, EIDG will respond with the status code appropriate to the type of problem (e.g. 400, 403, 500) and a JSON response as follows:
{
"error": "access_denied",
"errorCode": "EIDG_5",
"errorDescription": "Invalid client_id or client_secret"
}
For the error list, see the Error Handling section.
STEP 6 – Request for new access token (optional)
Endpoint: /token Method: POST Authentication: Basic base64(<client_id>:<client_secret>) (client_id and client_secret provided during enrolment) Content-type: application/x-www-form-urlencoded Parameters:- grant_type Type of grant to be requested. In this case, pass “refresh_token”.
- refresh_token Refresh token obtained with the first call to /token
{
"idToken": "eyJ....fg",
"accessToken": "eyj....fg",
"refreshToken": "eyJ....pb",
"expiresIn": 360,
"tokenType": "Bearer"
}
In the event of an error during token creation, EIDG will respond with the status code appropriate to the type of problem (e.g. 400, 403, 500) and a JSON response as follows:
{
"error": "access_denied",
"errorCode": "EIDG_5",
"errorDescription": "Invalid client_id or client_secret"
}
For the error list, see the Error Handling chapter.
STEP 7 – token revoke
Endpoint: /revoke Method: POST Authentication: Bearer <token_to_revoke> With this endpoint, an access or refresh token can be revoked to prevent further access to the user information associated with it. If an access token is passed, only this will be revoked. If a refresh token is passed, the corresponding access token will also be revoked and a new end-user authentication will be necessary in order to retrieve his personal data again.Use Cases
Tenant wants to use SPID authentication
Tenant will sign a contract with InfoCert as “SPID soggetto aggregato” and must provide:- Redirect URIs
- List of admitted origins for cors policy
- List of desided SPID attributes
- Desired SPID level
- Client Id
- Client Secret
- List of identification methods
- EIDG base url
Tenant wants to use CIE authentication
Tenant has already become “CIE Service Provider” and must provide:- Redirect URIs
- List of admitted origins for cors policy
- CIE Metadata that refers to EIDG CIE callback
- its private key to sign requests
- Client Id
- Client Secret
- List of identification methods
- EIDG base url
Tenant wants to use FranceConnect authentication
Tenant must provide:- Redirect URIs
- Desired FranceConnect level (FranceConnect or FranceConnectPlus)
- Client Id
- Client Secret
- List of identification methods
- EIDG base url
API Reference
User info model
The fields that make up the user data model are detailed below.Attribute | strong>Parent attribute | Example | Description |
version | 1.0 | Data model version. There will be versions of this model to facilitate backward compatibility | |
givenName | Marisa | Subject’s name | |
familyName | Italy | Subject’s surname | |
birthPlace | Birthplace attributes | ||
address | birthPlace | Birthplace address. Not to be confused with the address attribute below | |
streetAddress | BirthPlace.address | Not used | |
postalCode | BirthPlace.address | Not used | |
addressRegion | BirthPlace.address | RM | Birthplace province (only for those born in Italy) |
addressLocality | BirthPlace.address | ROME | Birthplace municipality (only for those born in Italy) |
addressCountry | BirthPlace.address | IT | Birthplace country code according to the ISO 3166 alpha-2 standard |
birthDate | 1930-01-01 | Date of birth yyyy-mm-dd | |
gender | F | Subject’s gender | |
taxID | TLIMRS30A41H501K | Tax code (for individuals) | |
vatID | IT12345678901 | VAT number or equivalent (for companies) | |
telephone | +393330000100 | Phone number | |
marisa.italia.cl@mailsac.com | |||
digitalAddress | marisa.italia.cl@pecmail.com | PEC certified email | |
address | Residence address. Not to be confused with the birthPlace.address attribute above | ||
streetAddress | address | Via Delle Robe 20 | Residence address (street, square, etc.) |
postalCode | address | 10156 | Residence postcode |
addressRegion | address | TO | Residence province |
addressLocality | address | Turin | Residence municipality |
addressCountry | address | IT | Residence country ISO 3166 alpha-2 standard |
electronicId | Digital identity attributes | ||
name | electronicId | SPID | Digital identity type |
country | electronicId | IT | Country of issue |
id | electronicId | INFC0000012739 | Unique ID of the provider relating to the subject. |
expirationDate | electronicId | 2024-08-24 | Identity expiry |
physicalId | Attributes relating to the physical identification document | ||
name | physicalId | ID card | Document type |
documentNumber | physicalId | AV0639329 | Document ID |
issuer | physicalId | MunicipalityPianoro | Document issuing body |
issuerDate | physicalId | 2014-03-21 | Issue date |
expirationDate | physicalId | 2024-08-22 | Expiry |
_idp | https://identity.infocert.it | Identity provider used to retrieve the dataset | |
_rawRequest | Base64 of the body of the request to the IDP | ||
_rawResponse | Base64 of the body of the IDP’s response |
Error handling
List of error codes
Below is an up-to-date list of error codes handled by EIDG and any recommended actions.errorCode | error | Error type | Resolution owner | Cause of error | Suggested operation |
SPID_19 | access_denied | ErrorCode SPID | End user | Authentication failed due to repeated submission of incorrect credentials | Show the error to the end user asking them to try again |
SPID_20 | access_denied | ErrorCode SPID | End user | User without credentials compatible with the level required by the service provider | Show the error to the end user asking them to try again |
SPID_21 or CIE_21 | access_denied | ErrorCode SPID/CIE | End user | Timeout during user authentication | Show the error to the end user asking them to try again |
SPID_22 or CIE_22 | access_denied | ErrorCode SPID/CIE | End user | Consent to submit data was denied by the user | Show the error to the end user asking them to try again |
SPID_23 or CIE_23 | access_denied | ErrorCode SPID/CIE | End user | User with suspended/revoked identity or blocked credentials | Show the error to the end user asking them to try again |
SPID_25 or CIE_25 | access_denied | ErrorCode SPID/CIE | End user | Authentication process cancelled by the user | Show the error to the end user asking them to try again |
SPID_OTHER_CODE or CIE_OTHER_CODE | server_error | ErrorCode SPID/CIE (other) | EIDG (IDP) | Incorrect response format – Contact Identity manager | Show the end user a generic error. Contact EIDG to analyse the problem. |
SPID_TECHNICAL or CIE_TECHNICAL | server_error | Server error | EIDG | An error occurred during the authentication process. Please try again. | Show the end user a generic error. Contact EIDG to analyse the problem. |
SPID_VALIDATION or CIE_VALIDATION | server_error | SAML validation error | EIDG (IDP) | Incorrect response format – Contact Identity manager | Show the end user a generic error. Contact EIDG to analyse the problem. |
SPID_PARSING or CIE_PARSING | server_error | SAML parsing error | EIDG (IDP) | Incorrect response format – Contact Identity manager | Show the end user a generic error. Contact EIDG to analyse the problem. |
EIDG_1 | invalid_request | Error in the parameters | Client application | No client_id provided | Show the end user a generic error. Check the correctness of the call to EIDG. |
EIDG_2 | invalid_request | Error in the parameters | Client application | The client_id provided is not valid | Show the end user a generic error. Check the correctness of the call to EIDG. |
EIDG_3 | invalid_request | Error in the parameters | Client application | The redirect URL does not match the one agreed to | Show the end user a generic error. Check the correctness of the call to EIDG. |
EIDG_4 | invalid_request | Error in the parameters | Client application | The requested identification_method is not valid or not available for this client | Show the end user a generic error. Check the correctness of the call to EIDG. |
EIDG_5 | access_denied | Error in the parameters | Client application | The client_id or client_secret is not valid | Show the end user a generic error. Check the correctness of the call to EIDG. |
EIDG_6 | access_denied | Error in the parameters | Client application | The client_secret provided is not valid | Show the end user a generic error. Check the correctness of the call to EIDG. |
EIDG_7 | access_denied | Error in the parameters | Client application | No grant_type provided | Show the end user a generic error. Check the correctness of the call to EIDG. |
EIDG_8 | access_denied | Error in the parameters | Client application | The grant_type provided is not valid | Show the end user a generic error. Check the correctness of the call to EIDG. |
EIDG_9 | invalid_request | Error in the parameters | Client application | Error during request validation | Show the end user a generic error. Check the correctness of the call to EIDG. |
EIDG_10 | access_denied | Server error | EIDG | Error during token generation | Show the end user a generic error. Contact EIDG to analyse the problem. |
EIDG_11 | server_error | Server error | EIDG | Error communicating with LegalDoc | Show the end user a generic error. Contact EIDG to analyse the problem. |
EIDG_12 | server_error | Request missing | Client application | Request config not found | Request expired. Invite the user to log in again with EIDG. |
EIDG_13 | server_error | Request missing | EIDG | Error while retrieving request config | Show the end user a generic error. Contact EIDG to analyse the problem. |
EIDG_14 | access_denied | Error in the parameters | Client application | Access or refresh token not found | Request expired. If the token in question is access then refresh the new token, otherwise invite the user to log in again with EIDG. |
EIDG_15 | invalid_request | Error in the parameters | Client application | Access or refresh token not valid | Show the end user a generic error. Check the correctness of the call to EIDG. |
EIDG_16 | server_error | Server error | EIDG | Error while parsing access or refresh token | Show the end user a generic error. Contact EIDG to analyse the problem. |
Scenario of usage
- Application (Client) within its own navigation flow needs to authenticate a user or receive a series of related attributes.
- Application is exposing to user “Log in with EID Gateway” button. User clicks that button, this activity produces a call to /authorize endpoint with following url params: client_id, state, id_methods (optional) and redirect_uri.
curl -k --request GET \ --url 'https://eid-gateway.infocert.it/oauth2/authorize?client_id=demo-web-app&redirect_uri=https%3A%2F%2Finternal-pr-eks-factory-private-alb-1996065579.eu-west-1.elb.amazonaws.com%2Feidgateway-testclient%2Flogin&state=examplestate' \ --header 'accept: */*'
- A success result of previous step the user-agent (browser) is redirected to the EID Gateway page in which the user can choose an identification method (for now only SPID) and IDP.
- When IDP is chosen user-agent (browser) is redirected to IDP site when user has to pass credentials and agree for sharing his data with EID Gateway and Client Application.
- When everything went well EID Gateway is redirecting browser to redirect uri passed in step 2 with authorization code, otherwise is redirecting browser to the same uri but with error message.
- Now Client Application can exchange authorization code for set of access and refresh tokens by calling /token endpoint with authorization header with Application Client’s credentials and following url params: code, grant_type (“code” as a value) and redirect_uri.
Example json result:curl -k --request POST \ --url https://eid-gateway.infocert.it/oauth2/token \ --header 'Authorization: Basic h10823g81bAHSDVV123H812G3971AJSD' \ --header 'Content-Type: application/x-www-form-urlencoded' \ --header 'accept: application/json' \ --data 'code=07b41735-1537-43db-876c-d0da1f178115&grant_type=code&redirect_uri=https%3A%2F%2Finternal-pr-eks-factory-private-alb-1996065579.eu-west-1.elb.amazonaws.com%2Feidgateway-testclient%2Flogin'
{ "access_token": "eyJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiJ9.eyJhdWQiOiJkZW1vLXdlYi1jbGllbnQiLCJuYmYiOjE2NTI4ODM0NDIsImlzcyI6ImRlbW8td2ViLWNsaWVudCIsImV4cCI6MTY1Mjg4MzYyMiwiaWF0IjoxNjUyODgzNDQyLCJqdGkiOiIwOWNmM2YxMS00YmZmLTQ2NWYtYjBiZS0xOWQ0NDRmODM3OGYifQ.PntT3TJWOETPY1MBq9ld8bb0jeaLi-ub3_PhLLqINiWWMRxnlM0SkvdzEdptPGX4CNrBG_QPYdBgoH9ru63qjolXHZivGjAzfQrTz6Hyw8O_kaYnjLAW6hI0Ph_3MdeM84T6wpY9Gj--gp1oOyo12PIiH5bSOsNLO6d-IofHSVwkfyaepHhTUfieAEeWWXvHgsvVC3YviDOXO-5NouQRNO5ZFbLf0Wgd52N35U8jxIIiM2jzsaCgh5Dr6okY3O4CdQBMl7Xw2GFpjByc-a5Tv3DZNebIOVe-rw-jTQkNcLihNZv3VWCcHhYpQ5Ql4vQ9oMb730jilpA5r8rzhwi4Qw", "expires_in": 360, "refresh_token": "eyJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiJ9.eyJleHAiOjE2NTI5Njk4NDIsImNsaWVudF9pZCI6ImRlbW8td2ViLWNsaWVudCJ9.swW_g6pCVBb_tID_Q-AJZwc44h5lWLJGA2h7qQcfOpGMql35s8XMjoTdrqf0WNbWTsGf7P8D1u7hWQRfr-uAbXQNQh1rQHjZEfMrY7AOWlmJBefjnXxaD-GUxi7RM2GwbrUhV14i8-bUZUPdywPiqYElL5T_x3Y2Pfptp6uaJK2mc_EjxzArwiX5uPzVy5BNVw3NmAvoOhhXle606k1QjYeMIPFi9LZDvU5Ud5lDBv5beV0OZog55ZzF6qTblddgU5f6zs87vvWZtAjDALvoAyIyIvH7yTjThvgGr05WVWUQrCLEeBShXsVj-4ZWCmbXcyhw9eP66cNClPxIXbfpvg", "token_type": "Bearer" }
- Now Client Application can get user attributes by calling /user-info endpoint, passing in authorization header access token value.
Example json result:curl -k --request GET \ --url https://eid-gateway.infocert.it/oauth2/user-info \ --header 'Authorization: Bearer eyJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiJ9.eyJhdWQiOiJkZW1vLXdlYi1jbGllbnQiLCJuYmYiOjE2NTI4ODM0NDIsImlzcyI6ImRlbW8td2ViLWNsaWVudCIsImV4cCI6MTY1Mjg4MzYyMiwiaWF0IjoxNjUyODgzNDQyLCJqdGkiOiIwOWNmM2YxMS00YmZmLTQ2NWYtYjBiZS0xOWQ0NDRmODM3OGYifQ.PntT3TJWOETPY1MBq9ld8bb0jeaLi-ub3_PhLLqINiWWMRxnlM0SkvdzEdptPGX4CNrBG_QPYdBgoH9ru63qjolXHZivGjAzfQrTz6Hyw8O_kaYnjLAW6hI0Ph_3MdeM84T6wpY9Gj--gp1oOyo12PIiH5bSOsNLO6d-IofHSVwkfyaepHhTUfieAEeWWXvHgsvVC3YviDOXO-5NouQRNO5ZFbLf0Wgd52N35U8jxIIiM2jzsaCgh5Dr6okY3O4CdQBMl7Xw2GFpjByc-a5Tv3DZNebIOVe-rw-jTQkNcLihNZv3VWCcHhYpQ5Ql4vQ9oMb730jilpA5r8rzhwi4Qw' \ --header 'accept: application/json'
{ "givenName": "Ada", "familyName": "Lovelace", "birthPlace": { "address": { "streetAddress": null, "postalCode": null, "addressRegion": "G702", "addressLocality": null, "addressCountry": null } }, "birthDate": null, "gender": "F", "taxID": "TINIT-LVLDAA85T50G702B", "vatID": null, "telephone": "3939393939", "email": "aabyron@hotmail.com", "address": { "streetAddress": "Via Listz 21", "postalCode": "00144", "addressRegion": "Roma", "addressLocality": "RM", "addressCountry": "IT" }, "_idp": "https://demo.spid.gov.it", "_rawRequest": "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" "_rawResponse": "<samlp:Response Destination="https://internal-svts-eks-factory-private-alb-1430683812.eu-west-1.elb.amazonaws.com/idbroker-spid/response" ID="_c1743bc4-e00a-4bba-b4e1-dd7e29664bd7" InResponseTo="_48694956-9919-47b8-9d03-aeae54a5984d" IssueInstant="2022-05-18T14:25:07Z" Version="2.0" xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion" xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol">
    <saml:Issuer Format="urn:oasis:names:tc:SAML:2.0:nameid-format:entity">https://demo.spid.gov.it</saml:Issuer><ds:Signature xmlns:ds="http://www.w3.org/2000/09/xmldsig#"><ds:SignedInfo><ds:CanonicalizationMethod Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/><ds:SignatureMethod Algorithm="http://www.w3.org/2001/04/xmldsig-more#rsa-sha256"/><ds:Reference URI="#_c1743bc4-e00a-4bba-b4e1-dd7e29664bd7"><ds:Transforms><ds:Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature"/><ds:Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/></ds:Transforms><ds:DigestMethod Algorithm="http://www.w3.org/2001/04/xmlenc#sha256"/><ds:DigestValue>2hIFFqtk9rLP6Yo7/wJGaJfiRlKST8hJnk7gli7q494=</ds:DigestValue></ds:Reference></ds:SignedInfo><ds:SignatureValue>DInk65SH4pWt89uPNETe36Dl/xcxBZ85tWV4i4Fgy8q/9SzM+yr39pbRAVTmOS7mxkYLhWZ2UOJdZfHbskstZQydX5Vz/oGKApVPp6kL/3kFg0rH4EvlB67Gtjmr6BPPK5B9Z5IGcTGQbOq2D1HoMrPbxDuYLsTuPffrrdY1k5EI6ajhwZb3iOhNvJ+14AUK55DLps2M2rsZdW1KiQZMtlus/DuW7q5CB9kIiPqN2QaCPNbmrgjebrCIodrlmuKdOS4z6leSzdOECpKl9fYRwjuWqegDvtSOj2+EYyRo+V1XEdpc8pdEpNkl04FsNlXf4oZiqw3nrIq/HypRClT7RA==</ds:SignatureValue><ds:KeyInfo><ds:X509Data><ds:X509Certificate>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</ds:X509Certificate></ds:X509Data></ds:KeyInfo></ds:Signature>

    <samlp:Status><samlp:StatusCode Value="urn:oasis:names:tc:SAML:2.0:status:Success"/></samlp:Status>
    <saml:Assertion ID="_b2b95fc8-213b-4064-9971-2efddebee381" IssueInstant="2022-05-18T14:25:07Z" Version="2.0" xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
        <saml:Issuer Format="urn:oasis:names:tc:SAML:2.0:nameid-format:entity">https://demo.spid.gov.it</saml:Issuer><ds:Signature xmlns:ds="http://www.w3.org/2000/09/xmldsig#"><ds:SignedInfo><ds:CanonicalizationMethod Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/><ds:SignatureMethod Algorithm="http://www.w3.org/2001/04/xmldsig-more#rsa-sha256"/><ds:Reference URI="#_b2b95fc8-213b-4064-9971-2efddebee381"><ds:Transforms><ds:Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature"/><ds:Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/></ds:Transforms><ds:DigestMethod Algorithm="http://www.w3.org/2001/04/xmlenc#sha256"/><ds:DigestValue>7Qwqu29gFxgKYZ0N6Peoolc3H7FcytEZn55Sfgm+Oqo=</ds:DigestValue></ds:Reference></ds:SignedInfo><ds:SignatureValue>GtFksOfvjA5/HLZvKIQEOwlEei4ERMNYPt98U1naUv6EBDivFedpjopOBo5TK46qXfm3lf/b3JWa2WwUu1FRIcuVQucZ8EQVSY+bdQEhML8pUGE1bNRtMCI1GonnfAxS9cXpq3mg4J1cYC+a0AIcr/VfbAqrCoLg1AHpWZVpgO4zSeTZW0TuermhcBtPnQr32L4C+V1ZRsoTz/0w/cXlkR8++T0qAYWRTOrqKvG76R9Slb2q5KKC5sGsRfSLsDysKtIB/c+vQobg+exEjUJzdKBgKItq0bLqKL0Rjf8H1zy/vRduViY0c/a3fQ3Ki0JHMLRtsOD8n6vvy0LVWsdb0Q==</ds:SignatureValue><ds:KeyInfo><ds:X509Data><ds:X509Certificate>MIIEGDCCAwCgAwIBAgIJAOrYj9oLEJCwMA0GCSqGSIb3DQEBCwUAMGUxCzAJBgNVBAYTAklUMQ4wDAYDVQQIEwVJdGFseTENMAsGA1UEBxMEUm9tZTENMAsGA1UEChMEQWdJRDESMBAGA1UECxMJQWdJRCBURVNUMRQwEgYDVQQDEwthZ2lkLmdvdi5pdDAeFw0xOTA0MTExMDAyMDhaFw0yNTAzMDgxMDAyMDhaMGUxCzAJBgNVBAYTAklUMQ4wDAYDVQQIEwVJdGFseTENMAsGA1UEBxMEUm9tZTENMAsGA1UEChMEQWdJRDESMBAGA1UECxMJQWdJRCBURVNUMRQwEgYDVQQDEwthZ2lkLmdvdi5pdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAK8kJVo+ugRrbbv9xhXCuVrqi4B7/MQzQc62ocwlFFujJNd4m1mXkUHFbgvwhRkQqo2DAmFeHiwCkJT3K1eeXIFhNFFroEzGPzONyekLpjNvmYIs1CFvirGOj0bkEiGaKEs+/umzGjxIhy5JQlqXE96y1+Izp2QhJimDK0/KNij8I1bzxseP0Ygc4SFveKS+7QO+PrLzWklEWGMs4DM5Zc3VRK7g4LWPWZhKdImC1rnS+/lEmHSvHisdVp/DJtbSrZwSYTRvTTz5IZDSq4kAzrDfpj16h7b3t3nFGc8UoY2Ro4tRZ3ahJ2r3b79yK6C5phY7CAANuW3gDdhVjiBNYs0CAwEAAaOByjCBxzAdBgNVHQ4EFgQU3/7kV2tbdFtphbSA4LH7+w8SkcwwgZcGA1UdIwSBjzCBjIAU3/7kV2tbdFtphbSA4LH7+w8SkcyhaaRnMGUxCzAJBgNVBAYTAklUMQ4wDAYDVQQIEwVJdGFseTENMAsGA1UEBxMEUm9tZTENMAsGA1UEChMEQWdJRDESMBAGA1UECxMJQWdJRCBURVNUMRQwEgYDVQQDEwthZ2lkLmdvdi5pdIIJAOrYj9oLEJCwMAwGA1UdEwQFMAMBAf8wDQYJKoZIhvcNAQELBQADggEBAJNFqXg/V3aimJKUmUaqmQEEoSc3qvXFITvT5f5bKw9yk/NVhR6wndL+z/24h1OdRqs76blgH8k116qWNkkDtt0AlSjQOx5qvFYh1UviOjNdRI4WkYONSw+vuavcx+fB6O5JDHNmMhMySKTnmRqTkyhjrch7zaFIWUSV7hsBuxpqmrWDoLWdXbV3eFH3mINA5AoIY/m0bZtzZ7YNgiFWzxQgekpxd0vcTseMnCcXnsAlctdir0FoCZztxMuZjlBjwLTtM6Ry3/48LMM8Z+lw7NMciKLLTGQyU8XmKKSSOh0dGh5Lrlt5GxIIJkH81C0YimWebz8464QPL3RbLnTKg+c=</ds:X509Certificate></ds:X509Data></ds:KeyInfo></ds:Signature>
        <saml:Subject>
            <saml:NameID Format="urn:oasis:names:tc:SAML:2.0:nameid-format:transient" NameQualifier="https://demo.spid.gov.it">
                    _67dab48b-13e0-4106-a34d-309949176976
            </saml:NameID>
            <saml:SubjectConfirmation Method="urn:oasis:names:tc:SAML:2.0:cm:bearer">
                <saml:SubjectConfirmationData InResponseTo="_48694956-9919-47b8-9d03-aeae54a5984d" NotOnOrAfter="2022-05-18T14:29:56Z" Recipient="https://internal-svts-eks-factory-private-alb-1430683812.eu-west-1.elb.amazonaws.com/idbroker-spid/response"/>
            </saml:SubjectConfirmation>
        </saml:Subject>
        <saml:Conditions NotBefore="2022-05-18T14:25:07Z" NotOnOrAfter="2022-05-18T14:29:56Z">
            <saml:AudienceRestriction>
                <saml:Audience>https://spidsp.infocert.it</saml:Audience>
            </saml:AudienceRestriction>
        </saml:Conditions> 
        <saml:AuthnStatement AuthnInstant="2022-05-18T14:25:07Z" SessionIndex="_92c15110-d0a3-4538-bb78-c55a09bb56f1">
            <saml:AuthnContext>
                <saml:AuthnContextClassRef>https://www.spid.gov.it/SpidL1</saml:AuthnContextClassRef>
            </saml:AuthnContext>
        </saml:AuthnStatement>
        <saml:AttributeStatement>                                     <saml:Attribute Name="name" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic">                                         <saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">Ada</saml:AttributeValue>                                     </saml:Attribute>                                                                      <saml:Attribute Name="familyName" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic">                                         <saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">Lovelace</saml:AttributeValue>                                     </saml:Attribute>                                                                      <saml:Attribute Name="fiscalNumber" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic">                                         <saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">TINIT-LVLDAA85T50G702B</saml:AttributeValue>                                     </saml:Attribute>                                                                      <saml:Attribute Name="domicileStreetAddress" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic">                                         <saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">Via Listz 21</saml:AttributeValue>                                     </saml:Attribute>                                                                      <saml:Attribute Name="domicilePostalCode" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic">                                         <saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">00144</saml:AttributeValue>                                     </saml:Attribute>                                                                      <saml:Attribute Name="domicileMunicipality" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic">                                         <saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">Roma</saml:AttributeValue>                                     </saml:Attribute>                                                                      <saml:Attribute Name="domicileProvince" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic">                                         <saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">RM</saml:AttributeValue>                                     </saml:Attribute>                                                                      <saml:Attribute Name="domicileNation" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic">                                         <saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">IT</saml:AttributeValue>                                     </saml:Attribute>                                                                      <saml:Attribute Name="idCard" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic">                                         <saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">passaporto KK1234567 questuraLivorno 2016-09-04 2026-09-03</saml:AttributeValue>                                     </saml:Attribute>                                                                      <saml:Attribute Name="placeOfBirth" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic">                                         <saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">G702</saml:AttributeValue>                                     </saml:Attribute>                                                                      <saml:Attribute Name="mobilePhone" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic">                                         <saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">3939393939</saml:AttributeValue>                                     </saml:Attribute>                                                                      <saml:Attribute Name="gender" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic">                                         <saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">F</saml:AttributeValue>                                     </saml:Attribute>                                                                      <saml:Attribute Name="email" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic">                                         <saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">aabyron@hotmail.com</saml:AttributeValue>                                     </saml:Attribute>                                                                      <saml:Attribute Name="spidCode" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic">                                         <saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">SPID-002</saml:AttributeValue>                                     </saml:Attribute>                                 </saml:AttributeStatement>
    </saml:Assertion>
</samlp:Response>" }
Use refresh token to get new valid access code
Access token has short time to live (usually few minutes), when Application needs to ask for user attributes and access token is no loger valid it can use /token endpoint again but this time with following params: refresh_token(with refresh_token value received in previous /token call), grant_type (“refresh_token” as a value) and redirect_uri. curl -k --request POST \
--url https://eid-gateway.infocert.it/oauth2/token \
--header 'Authorization: Basic h10823g81bAHSDVV123H812G3971AJSD' \
--header 'Content-Type: application/x-www-form-urlencoded' \
--header 'accept: application/json' \
--data 'refresh_token=eyJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiJ9.eyJleHAiOjE2NTI5Njk4NDIsImNsaWVudF9pZCI6ImRlbW8td2ViLWNsaWVudCJ9.swW_g6pCVBb_tID_Q-AJZwc44h5lWLJGA2h7qQcfOpGMql35s8XMjoTdrqf0WNbWTsGf7P8D1u7hWQRfr-uAbXQNQh1rQHjZEfMrY7AOWlmJBefjnXxaD-GUxi7RM2GwbrUhV14i8-bUZUPdywPiqYElL5T_x3Y2Pfptp6uaJK2mc_EjxzArwiX5uPzVy5BNVw3NmAvoOhhXle606k1QjYeMIPFi9LZDvU5Ud5lDBv5beV0OZog55ZzF6qTblddgU5f6zs87vvWZtAjDALvoAyIyIvH7yTjThvgGr05WVWUQrCLEeBShXsVj-4ZWCmbXcyhw9eP66cNClPxIXbfpvg&grant_type=refresh_token&redirect_uri=https%3A%2F%2Finternal-pr-eks-factory-private-alb-1996065579.eu-west-1.elb.amazonaws.com%2Feidgateway-testclient%2Flogin'
Example json result:
{
"access_token": "eyJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiJ9.eyJhdWQiOiJkZW1vLXdlYi1jbGllbnQiLCJuYmYiOjE2NTI4ODUwMzYsImlzcyI6ImRlbW8td2ViLWNsaWVudCIsImV4cCI6MTY1Mjg4NTIxNiwiaWF0IjoxNjUyODg1MDM2LCJqdGkiOiI2OWFkZDZmOS02ZmIwLTRhZTEtOWFkNC1iMjk0OGMxNDgzOTQifQ.h_-1u2lu4XMUB1YeD2yEkmxcxi_26zrNJsPKMjL6t1klr_BM9ervNc6mQTF1c7q8fBqicSMBL0lamNDkUd6PbbfIwHfyG1ghuakDnH18zdlIUdfdHRC6h9iwFV73OcSuuwBGA9GlAyJc2LSCWyek-vPBcmb1jWbzyjlz5LOnA4L4bgRx5cTLIki9GlsxXwmc7mneYJDcbWzO4yVhTft_U0x01n_1MU0aXGEKEw30RPdwr-SPiycAUVGkEl3XhANtOTo_tywU5oZL7Dwrq8HyTuIsMW_oh5KPKMez3q9zAF3Tzo6tJzu5TuCsS37c8EHI14HoACWcvwkgU4o8hITtIw",
"expires_in": 360,
"refresh_token": "eyJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiJ9.eyJleHAiOjE2NTI5Njk4NDIsImNsaWVudF9pZCI6ImRlbW8td2ViLWNsaWVudCJ9.swW_g6pCVBb_tID_Q-AJZwc44h5lWLJGA2h7qQcfOpGMql35s8XMjoTdrqf0WNbWTsGf7P8D1u7hWQRfr-uAbXQNQh1rQHjZEfMrY7AOWlmJBefjnXxaD-GUxi7RM2GwbrUhV14i8-bUZUPdywPiqYElL5T_x3Y2Pfptp6uaJK2mc_EjxzArwiX5uPzVy5BNVw3NmAvoOhhXle606k1QjYeMIPFi9LZDvU5Ud5lDBv5beV0OZog55ZzF6qTblddgU5f6zs87vvWZtAjDALvoAyIyIvH7yTjThvgGr05WVWUQrCLEeBShXsVj-4ZWCmbXcyhw9eP66cNClPxIXbfpvg",
"token_type": "Bearer"
}
Logout particular user -> Delete access and refresh tokens
To logout user /logout endpoint has to be called with access token value in authorization header. curl -k --request DELETE \
--url https://eid-gateway.infocert.it/oauth2/logout \
--header 'Authorization: Bearer eyJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiJ9.eyJhdWQiOiJkZW1vLXdlYi1jbGllbnQiLCJuYmYiOjE2NTI4ODM0NDIsImlzcyI6ImRlbW8td2ViLWNsaWVudCIsImV4cCI6MTY1Mjg4MzYyMiwiaWF0IjoxNjUyODgzNDQyLCJqdGkiOiIwOWNmM2YxMS00YmZmLTQ2NWYtYjBiZS0xOWQ0NDRmODM3OGYifQ.PntT3TJWOETPY1MBq9ld8bb0jeaLi-ub3_PhLLqINiWWMRxnlM0SkvdzEdptPGX4CNrBG_QPYdBgoH9ru63qjolXHZivGjAzfQrTz6Hyw8O_kaYnjLAW6hI0Ph_3MdeM84T6wpY9Gj--gp1oOyo12PIiH5bSOsNLO6d-IofHSVwkfyaepHhTUfieAEeWWXvHgsvVC3YviDOXO-5NouQRNO5ZFbLf0Wgd52N35U8jxIIiM2jzsaCgh5Dr6okY3O4CdQBMl7Xw2GFpjByc-a5Tv3DZNebIOVe-rw-jTQkNcLihNZv3VWCcHhYpQ5Ql4vQ9oMb730jilpA5r8rzhwi4Qw' \
--header 'accept: application/json'
UI Customization
The customization of the user interface of Eid-Gateway allows modifying the graphical aspect of the web page at the level of tenant clients. In particular, the following properties can be customized:- Header color: background color of the header
- Footer color: background color of the footer
- Body color: background color of the page
- Header image: background image of the header of the web page
- Body image: background image of the body of the web page
- Footer image: background image of the footer of the web page
Rules applied to the web page
Header
The header has a CSS rule ofmin-height: 180px
, which indicates the minimum height of the element. Additionally, the background image of the header is adapted to the size of the element using the CSS rule background-size: cover
. It is recommended to provide an image with a height of 180px and a width that fills the entire width of the header (Example: 4000×180).
Footer
The footer has a CSS rule ofmin-height: 100px
. In this case too, the background image of the footer is adapted to the size of the element using the CSS rule background-size: cover
. It is recommended to provide an image with a height of 100px and a width that fills the entire width of the footer (Example: 4000×100).
Body
The body has a CSS rule ofbackground-size: auto
.