Cerca

Identity & Onboarding

Integration methodologies

EID Gateway (EIDG) is an openID connect Provider while tenant application acts as openID connect relying party.
With OIDC protocol, relying party (tenant) and OIDC Provider (EIDG) have shared a configuration that allows parties to communicate and share information. This configuration is composed by:
  • Client Id (provided by EIDG to tenant)
  • Client Secret (provided by EIDG to tenant)
  • Redirect URIs (provided by tenant to EIDG)
  • List of required authentication schemas and their configurations
Client Id and secrets are parameter to identify tenant and avoid uncontrolled accesses. Redirect URIs is list of tenant application URIs that are allowed to receive callback from OIDC Provider. Before using EIDG tenant has agreed about which authentication schemas is interested to use and with their specific configurations. For example in case tenant is interested to SPID authentication schema, it must provide list of SPID attributes it is interested to and also SPID livel (level 1 or level2) this complete configuration will be stored EIDG implements authorization code flow to start OIDC authentication session, with this authentication flow user is redirected from tenant application to OIDC provider frontend, and there user provides his credentials, when login succeeds user is redirected from OIDC Provider to tenant application and then authentication flow is correctly closed. With this integration method user does not provide his credentials outside OIDC Provider environment, tenant application and OIDC provider are separated environment.

User Interface customization

EIDG User interface can be configured for each Client Id with:
  • header
  • footer
  • Background color
Header can be an image, accepted formats are: png, jpg, svg; CSS rule is backgroud-size: cover and high is 180 pixels. Suggested size is: 4000x 180 pixels. Footer can be an image, accepted formats are: png, jpg, svg; CSS rule is backgroud-size: cover and high is 100 pixels. Suggested size is: 4000x 100 pixels. Background color can be any RGB color, note font color can’t be changed.

API details

Authorization code flow

The authorisation process on EIDG is initiated by redirecting the user to the following endpoint: <url_servizio>/authorize?client_id=<client_id>&state=<state>&redirect_uri=<redirect_uri>&acr_values=<acr_values>&response_type=<response_type>&scope=<scope>&ui_locales=<ui_locales>&code_challenge_method=<code_challenge_method>&code_challenge<code_challenge> The parameters in this URL are:
  • <url_servizio> URL at which EIDG is published, different depending on the environment to be targeted (TESTING https://eid-gatewaycl.infocert.it/oauth2 PRODUCTION https://eid-gateway.infocert.it/oauth2)
  • <client_id>: Client ID provided by EIDG during enrolment.
  • <state>: String for use by the client application, useful for saving a session ID or status before the authorisation flow is started. EIDG will return it as it is at the end of the process.
  • <redirect_uri>: Absolute URL that EIDG must redirect to at the end of the authentication process. This redirection occurs regardless of the outcome of the user authentication. This URL must match the one provided during enrollment.
  • <acr_values>: A space-separated list of method codes among the ones provided in the enrollment phase. It is possible to send methods pertaining to different channel (e.g. infocert:identification:method:SPID_LEVEL_2 infocert:identification:method:CIE ) while any request with multiple same-channel methods will be rejected (e.g. infocert:identification:method:SPID_LEVEL_1 infocert:identification:method: SPID_LEVEL_2 ).
  • <response_type>: Must be set to code
  • <scope>: Must be set to openid
  • <ui_locales>: Indicates a preferred language for EIDG’s user interface and any potential error descriptions. Must be set with the ISO two-letter code (e.g. it for Italian, en for English)
  • <code_challenge_method>: Optional but highly recommended. Verification method of the client according to the PKCE for OAuth2 Must be set to S256
  • <code_challenge>: Optional but highly recommended. Verification string of the client in SHA256 hash format according to the PKCE for OAuth2
The EIDG authorisation process is based on the OAuth2 protocol and involves a series of steps to authorise the client so that the requested user information can be retrieved. The various steps that make up a complete authorisation flow are detailed below. All endpoints listed are to be considered relative to the main URL of the service indicated as <url_servizio>.

STEP 1 – initial endpoint

Endpoint: /authorize Method: GET (redirect from client application) This is the first endpoint of the authorisation flow. See the previous section for the parameters to be appended to the address. By redirecting the user to this endpoint, they will be taken to the EIDG front end, where they will be able to select the desired authentication method as well as the provider, if any, from those associated with the requested <acr_values>.

STEP 2 – Authentication of the user by the identity provider

At this point, the user will have to authenticate using the credentials of the chosen service and complete any credential verification steps, such as providing an OTP token or confirming the operation via app. Once authentication is complete, regardless of the outcome, the Identity Provider (hereafter IDP) redirects the user to EIDG, which processes the response received and redirects the user to the callback URL of the client application.

STEP 3 – client callback

At this point, EIDG redirects the user to the client application. Depending on the outcome of the authentication, the composition of the URL is slightly different. Method: GET (redirect da EIDG) Endpoint:
  • <redirect_uri>?code=<authrorization_code>&state=<state> (authentication successful)
  • <redirect_uri>?error=<oauth_error>&errorCode=<eidg_error>&errorDescription=<error_description>&state=<state> (authentication failed)
The parameters of the URLs are as follows:
  • <redirect_uri> Absolute URL of the endpoint on the client application indicated in step 1, which EIDG must redirect to at the end of the authentication process. This redirection occurs regardless of the outcome of the user authentication.
  • <authorization_code> Code to be used in the next call to obtain access and refresh tokens.
  • <state> String of the client application indicated in step 1.
  • <oauth_error> Summary error code according to OAuth and OIDC
  • <eidg_error> Error code produced by EIDG identifying the specific problem encountered. See Error Handling chapter below.
  • <error_description> Description of the error. If available, the translated string according ti the requested starting localization will be provided, or Italian otherwise.

STEP 4 – Requesting access/refresh token

Endpoint: /token Method: POST Authentication: Basic base64(<client_id>:<client_secret>) (client_id and client_secret provided during enrolment) Content-type: application/x-www-form-urlencoded Parameters:
  • code Authorisation code returned by EIDG in the previous redirect.
  • grant_type Type of grant to be requested. In this case, pass “authorization_code”.
  • code_verifier Mandatory if PKCE was adopted during the /authorize call. Client verification string in plain format, accordin to the PKCE for OAuth2
  • redirect_uri Redirect URI provided during enrolment. This stage serves to validate the origin of the request.
With this endpoint, the authorisation code is exchanged for the first access and refresh tokens. Unless otherwise required, the access token is valid for 3 minutes, while the refresh token is valid for 24 hours. In the event of a successfully created token, a status code of 201 (Created) is returned and a JSON response consisting of the two tokens, the type of authentication to be used (always Bearer for now) and the expiration of the access token in seconds.
{
    "idToken": "eyJ....fg",
    "accessToken": "eyj....fg",
    "refreshToken": "eyJ....pb",
    "expiresIn": 360,
    "tokenType": "Bearer"
}
In the event of an error during token creation, EIDG will respond with the status code appropriate to the type of problem (e.g. 400, 403, 500) and a JSON response as follows:
{
    "error": "access_denied",
    "errorCode": "EIDG_5",
    "errorDescription": "Invalid client_id or client_secret"
}
For the error list, see the Error Handling chapter.

STEP 5 – User info retrivial

Endpoint: /user-info Method: GET Authentication: Bearer <access_token> (access_token obtained in the previous step) With this endpoint, the data of the authenticated user can be retrieved. EDIG will return a JSON that always has the same attributes. Depending on the dataset agreed to with the client, the respective attributes in the response will be valued, while the rest will be null. In the event of a successful call, EIDG will return a JSON with the user’s data, an excerpt of which is reproduced below. For a more detailed description of the complete data model, see the Data Model chapter.
{
    "version": "1.0",
    "givenName": "Ada",
    "familyName": "Lovelace",
    "birthPlace":
        {
            "address": 
                {
                    "streetAddress": "null",
                    "postalCode": "null",
                    "addressRegion": "PI",
                    "addressLocality": "PISA",
                    "addressCountry": "IT"
                }
            }
    "birthDate": "1985-12-10",
    "gender": "F",
    "taxID": "LVLDAA85T50G702B",
    "....": "....",
    "errorDescription": "Invalid client_id or client_secret"
}
In the event of an error during token creation, EIDG will respond with the status code appropriate to the type of problem (e.g. 400, 403, 500) and a JSON response as follows:
{
    "error": "access_denied",
    "errorCode": "EIDG_5",
    "errorDescription": "Invalid client_id or client_secret"
}
For the error list, see the Error Handling section.

STEP 6 – Request for new access token (optional)

Endpoint: /token Method: POST Authentication: Basic base64(<client_id>:<client_secret>) (client_id and client_secret provided during enrolment) Content-type: application/x-www-form-urlencoded Parameters:
  • grant_type Type of grant to be requested. In this case, pass “refresh_token”.
  • refresh_token Refresh token obtained with the first call to /token
With this endpoint, a new access token is provided if the one available has expired. In the event of a successfully created token, a status code of 201 (Created) is returned and a JSON response consisting of the two tokens, the type of authentication to be used (always Bearer for now) and the expiration of the access token in seconds.
{
    "idToken": "eyJ....fg",
    "accessToken": "eyj....fg",
    "refreshToken": "eyJ....pb",
    "expiresIn": 360,
    "tokenType": "Bearer"
}
In the event of an error during token creation, EIDG will respond with the status code appropriate to the type of problem (e.g. 400, 403, 500) and a JSON response as follows:
{
    "error": "access_denied",
    "errorCode": "EIDG_5",
    "errorDescription": "Invalid client_id or client_secret"
}
For the error list, see the Error Handling chapter.

STEP 7 – token revoke

Endpoint: /revoke Method: POST Authentication: Bearer <token_to_revoke> With this endpoint, an access or refresh token can be revoked to prevent further access to the user information associated with it. If an access token is passed, only this will be revoked. If a refresh token is passed, the corresponding access token will also be revoked and a new end-user authentication will be necessary in order to retrieve his personal data again.

Use Cases

Tenant wants to use SPID authentication

Tenant will sign a contract with InfoCert as “SPID soggetto aggregato” and must provide:
  • Redirect URIs
  • List of admitted origins for cors policy
  • List of desided SPID attributes
  • Desired SPID level
InfoCert must provide:
  • Client Id
  • Client Secret
  • List of identification methods
  • EIDG base url
With following info InfoCert will prepare a specific metadata for tenant and will communicate that metadata to AGID. After AGID checks metatada will be sent (byAGID) to all SPID IDPs to make it available. Tenant will start OIDC authorization code flow passing identification method(s) as arc values so EIDG will present proper User Interface. After user authenticated tenant application will call userInfo to get userInfo attributes.

Tenant wants to use CIE authentication

Tenant has already become “CIE Service Provider” and must provide:
  • Redirect URIs
  • List of admitted origins for cors policy
  • CIE Metadata that refers to EIDG CIE callback
  • its private key to sign requests
InfoCert must provide:
  • Client Id
  • Client Secret
  • List of identification methods
  • EIDG base url
With following info InfoCert will configure tenant metadata and key. Tenant will start OIDC authorization code flow passing identification method(s) as arc values so EIDG will present proper User Interface. After user authenticated tenant application will call userInfo to get userInfo attributes.

Tenant wants to use FranceConnect authentication

Tenant must provide:
  • Redirect URIs
  • Desired FranceConnect level (FranceConnect or FranceConnectPlus)
InfoCert must provide:
  • Client Id
  • Client Secret
  • List of identification methods
  • EIDG base url
Tenant will start OIDC authorization code flow passing identification method(s) as arc values so EIDG will present proper User Interface. After user authenticated tenant application will call userInfo to get userInfo attributes.

API Reference

User info model

The fields that make up the user data model are detailed below.
Attribute strong>Parent attribute Example Description
version 1.0 Data model version. There will be versions of this model to facilitate backward compatibility
givenName Marisa Subject’s name
familyName Italy Subject’s surname
birthPlace Birthplace attributes
address birthPlace Birthplace address. Not to be confused with the address attribute below
streetAddress BirthPlace.address Not used
postalCode BirthPlace.address Not used
addressRegion BirthPlace.address RM Birthplace province (only for those born in Italy)
addressLocality BirthPlace.address ROME Birthplace municipality (only for those born in Italy)
addressCountry BirthPlace.address IT Birthplace country code according to the ISO 3166 alpha-2 standard
birthDate 1930-01-01 Date of birth yyyy-mm-dd
gender F Subject’s gender
taxID TLIMRS30A41H501K Tax code (for individuals)
vatID IT12345678901 VAT number or equivalent (for companies)
telephone +393330000100 Phone number
email marisa.italia.cl@mailsac.com Email
digitalAddress marisa.italia.cl@pecmail.com PEC certified email
address Residence address. Not to be confused with the birthPlace.address attribute above
streetAddress address Via Delle Robe 20 Residence address (street, square, etc.)
postalCode address 10156 Residence postcode
addressRegion address TO Residence province
addressLocality address Turin Residence municipality
addressCountry address IT Residence country ISO 3166 alpha-2 standard
electronicId Digital identity attributes
name electronicId SPID Digital identity type
country electronicId IT Country of issue
id electronicId INFC0000012739 Unique ID of the provider relating to the subject.
expirationDate electronicId 2024-08-24 Identity expiry
physicalId Attributes relating to the physical identification document
name physicalId ID card Document type
documentNumber physicalId AV0639329 Document ID
issuer physicalId MunicipalityPianoro Document issuing body
issuerDate physicalId 2014-03-21 Issue date
expirationDate physicalId 2024-08-22 Expiry
_idp https://identity.infocert.it Identity provider used to retrieve the dataset
_rawRequest Base64 of the body of the request to the IDP
_rawResponse Base64 of the body of the IDP’s response

Error handling

List of error codes

Below is an up-to-date list of error codes handled by EIDG and any recommended actions.
errorCode error Error type Resolution owner Cause of error Suggested operation
SPID_19 access_denied ErrorCode SPID End user Authentication failed due to repeated submission of incorrect credentials Show the error to the end user asking them to try again
SPID_20 access_denied ErrorCode SPID End user User without credentials compatible with the level required by the service provider Show the error to the end user asking them to try again
SPID_21 or CIE_21 access_denied ErrorCode SPID/CIE End user Timeout during user authentication Show the error to the end user asking them to try again
SPID_22 or CIE_22 access_denied ErrorCode SPID/CIE End user Consent to submit data was denied by the user Show the error to the end user asking them to try again
SPID_23 or CIE_23 access_denied ErrorCode SPID/CIE End user User with suspended/revoked identity or blocked credentials Show the error to the end user asking them to try again
SPID_25 or CIE_25 access_denied ErrorCode SPID/CIE End user Authentication process cancelled by the user Show the error to the end user asking them to try again
SPID_OTHER_CODE or CIE_OTHER_CODE server_error ErrorCode SPID/CIE (other) EIDG (IDP) Incorrect response format – Contact Identity manager Show the end user a generic error. Contact EIDG to analyse the problem.
SPID_TECHNICAL or CIE_TECHNICAL server_error Server error EIDG An error occurred during the authentication process. Please try again. Show the end user a generic error. Contact EIDG to analyse the problem.
SPID_VALIDATION or CIE_VALIDATION server_error SAML validation error EIDG (IDP) Incorrect response format – Contact Identity manager Show the end user a generic error. Contact EIDG to analyse the problem.
SPID_PARSING or CIE_PARSING server_error SAML parsing error EIDG (IDP) Incorrect response format – Contact Identity manager Show the end user a generic error. Contact EIDG to analyse the problem.
EIDG_1 invalid_request Error in the parameters Client application No client_id provided Show the end user a generic error. Check the correctness of the call to EIDG.
EIDG_2 invalid_request Error in the parameters Client application The client_id provided is not valid Show the end user a generic error. Check the correctness of the call to EIDG.
EIDG_3 invalid_request Error in the parameters Client application The redirect URL does not match the one agreed to Show the end user a generic error. Check the correctness of the call to EIDG.
EIDG_4 invalid_request Error in the parameters Client application The requested identification_method is not valid or not available for this client Show the end user a generic error. Check the correctness of the call to EIDG.
EIDG_5 access_denied Error in the parameters Client application The client_id or client_secret is not valid Show the end user a generic error. Check the correctness of the call to EIDG.
EIDG_6 access_denied Error in the parameters Client application The client_secret provided is not valid Show the end user a generic error. Check the correctness of the call to EIDG.
EIDG_7 access_denied Error in the parameters Client application No grant_type provided Show the end user a generic error. Check the correctness of the call to EIDG.
EIDG_8 access_denied Error in the parameters Client application The grant_type provided is not valid Show the end user a generic error. Check the correctness of the call to EIDG.
EIDG_9 invalid_request Error in the parameters Client application Error during request validation Show the end user a generic error. Check the correctness of the call to EIDG.
EIDG_10 access_denied Server error EIDG Error during token generation Show the end user a generic error. Contact EIDG to analyse the problem.
EIDG_11 server_error Server error EIDG Error communicating with LegalDoc Show the end user a generic error. Contact EIDG to analyse the problem.
EIDG_12 server_error Request missing Client application Request config not found Request expired. Invite the user to log in again with EIDG.
EIDG_13 server_error Request missing EIDG Error while retrieving request config Show the end user a generic error. Contact EIDG to analyse the problem.
EIDG_14 access_denied Error in the parameters Client application Access or refresh token not found Request expired. If the token in question is access then refresh the new token, otherwise invite the user to log in again with EIDG.
EIDG_15 invalid_request Error in the parameters Client application Access or refresh token not valid Show the end user a generic error. Check the correctness of the call to EIDG.
EIDG_16 server_error Server error EIDG Error while parsing access or refresh token Show the end user a generic error. Contact EIDG to analyse the problem.

Scenario of usage

  1. Application (Client) within its own navigation flow needs to authenticate a user or receive a series of related attributes.
  2. Application is exposing to user “Log in with EID Gateway” button. User clicks that button, this activity produces a call to /authorize endpoint with following url params: client_id, state, id_methods (optional) and redirect_uri.
    curl -k --request GET \
    --url 'https://eid-gateway.infocert.it/oauth2/authorize?client_id=demo-web-app&redirect_uri=https%3A%2F%2Finternal-pr-eks-factory-private-alb-1996065579.eu-west-1.elb.amazonaws.com%2Feidgateway-testclient%2Flogin&state=examplestate' \
    --header 'accept: */*'
    
  3. A success result of previous step the user-agent (browser) is redirected to the EID Gateway page in which the user can choose an identification method (for now only SPID) and IDP.
  4. When IDP is chosen user-agent (browser) is redirected to IDP site when user has to pass credentials and agree for sharing his data with EID Gateway and Client Application.
  5. When everything went well EID Gateway is redirecting browser to redirect uri passed in step 2 with authorization code, otherwise is redirecting browser to the same uri but with error message.
  6. Now Client Application can exchange authorization code for set of access and refresh tokens by calling /token endpoint with authorization header with Application Client’s credentials and following url params: code, grant_type (“code” as a value) and redirect_uri.
    curl -k --request POST \
      --url https://eid-gateway.infocert.it/oauth2/token \
      --header 'Authorization: Basic h10823g81bAHSDVV123H812G3971AJSD' \
      --header 'Content-Type: application/x-www-form-urlencoded' \
      --header 'accept: application/json' \
      --data 'code=07b41735-1537-43db-876c-d0da1f178115&grant_type=code&redirect_uri=https%3A%2F%2Finternal-pr-eks-factory-private-alb-1996065579.eu-west-1.elb.amazonaws.com%2Feidgateway-testclient%2Flogin'
    
    Example json result:
    {
       "access_token": "eyJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiJ9.eyJhdWQiOiJkZW1vLXdlYi1jbGllbnQiLCJuYmYiOjE2NTI4ODM0NDIsImlzcyI6ImRlbW8td2ViLWNsaWVudCIsImV4cCI6MTY1Mjg4MzYyMiwiaWF0IjoxNjUyODgzNDQyLCJqdGkiOiIwOWNmM2YxMS00YmZmLTQ2NWYtYjBiZS0xOWQ0NDRmODM3OGYifQ.PntT3TJWOETPY1MBq9ld8bb0jeaLi-ub3_PhLLqINiWWMRxnlM0SkvdzEdptPGX4CNrBG_QPYdBgoH9ru63qjolXHZivGjAzfQrTz6Hyw8O_kaYnjLAW6hI0Ph_3MdeM84T6wpY9Gj--gp1oOyo12PIiH5bSOsNLO6d-IofHSVwkfyaepHhTUfieAEeWWXvHgsvVC3YviDOXO-5NouQRNO5ZFbLf0Wgd52N35U8jxIIiM2jzsaCgh5Dr6okY3O4CdQBMl7Xw2GFpjByc-a5Tv3DZNebIOVe-rw-jTQkNcLihNZv3VWCcHhYpQ5Ql4vQ9oMb730jilpA5r8rzhwi4Qw",
       "expires_in": 360,
       "refresh_token": "eyJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiJ9.eyJleHAiOjE2NTI5Njk4NDIsImNsaWVudF9pZCI6ImRlbW8td2ViLWNsaWVudCJ9.swW_g6pCVBb_tID_Q-AJZwc44h5lWLJGA2h7qQcfOpGMql35s8XMjoTdrqf0WNbWTsGf7P8D1u7hWQRfr-uAbXQNQh1rQHjZEfMrY7AOWlmJBefjnXxaD-GUxi7RM2GwbrUhV14i8-bUZUPdywPiqYElL5T_x3Y2Pfptp6uaJK2mc_EjxzArwiX5uPzVy5BNVw3NmAvoOhhXle606k1QjYeMIPFi9LZDvU5Ud5lDBv5beV0OZog55ZzF6qTblddgU5f6zs87vvWZtAjDALvoAyIyIvH7yTjThvgGr05WVWUQrCLEeBShXsVj-4ZWCmbXcyhw9eP66cNClPxIXbfpvg",
       "token_type": "Bearer"
    }
    
  7. Now Client Application can get user attributes by calling /user-info endpoint, passing in authorization header access token value.
    curl -k --request GET \
    --url https://eid-gateway.infocert.it/oauth2/user-info \
    --header 'Authorization: Bearer eyJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiJ9.eyJhdWQiOiJkZW1vLXdlYi1jbGllbnQiLCJuYmYiOjE2NTI4ODM0NDIsImlzcyI6ImRlbW8td2ViLWNsaWVudCIsImV4cCI6MTY1Mjg4MzYyMiwiaWF0IjoxNjUyODgzNDQyLCJqdGkiOiIwOWNmM2YxMS00YmZmLTQ2NWYtYjBiZS0xOWQ0NDRmODM3OGYifQ.PntT3TJWOETPY1MBq9ld8bb0jeaLi-ub3_PhLLqINiWWMRxnlM0SkvdzEdptPGX4CNrBG_QPYdBgoH9ru63qjolXHZivGjAzfQrTz6Hyw8O_kaYnjLAW6hI0Ph_3MdeM84T6wpY9Gj--gp1oOyo12PIiH5bSOsNLO6d-IofHSVwkfyaepHhTUfieAEeWWXvHgsvVC3YviDOXO-5NouQRNO5ZFbLf0Wgd52N35U8jxIIiM2jzsaCgh5Dr6okY3O4CdQBMl7Xw2GFpjByc-a5Tv3DZNebIOVe-rw-jTQkNcLihNZv3VWCcHhYpQ5Ql4vQ9oMb730jilpA5r8rzhwi4Qw' \
    --header 'accept: application/json'
    
    Example json result:
       {
           "givenName": "Ada",
           "familyName": "Lovelace",
           "birthPlace": {
               "address": {
                   "streetAddress": null,
                   "postalCode": null,
                   "addressRegion": "G702",
                   "addressLocality": null,
                   "addressCountry": null
               }
           },
           "birthDate": null,
           "gender": "F",
           "taxID": "TINIT-LVLDAA85T50G702B",
           "vatID": null,
           "telephone": "3939393939",
           "email": "aabyron@hotmail.com",
           "address": {
               "streetAddress": "Via Listz 21",
               "postalCode": "00144",
               "addressRegion": "Roma",
               "addressLocality": "RM",
               "addressCountry": "IT"
           },
           "_idp": "https://demo.spid.gov.it",
           "_rawRequest": 
             "nVNbb9owFP4rlt9zhUKwCBUDVUPqNlbSPexlMonTWkrszOcE6L+vc2kXpA6xvUX25/Ndzpf57aksyEEYkFrFNHB9SoRKdSbVU0wfkzsnoreLOfCyqNiyxmf1IH7XApDYdwpYexHT2iimOUhgipcCGKZst/xyz0LXZ5XRqFNdULIEEAYt0UorqEthdsIcZCo2KhOnmIYWgWjkvkbRIayIc0hAydqSS8Wx1fuMWAHzvEyU2oVKZu6TPrgSvUYXgKZks47pr/3ID/b5ZObkk3zmjKNw6kTTdOLM/GA0zbKbbDyxkzcAtSUC5AqtGj8MHT9ywnHiR8yfspHv3kSzn5Rse0OfpOpiuuR+34GAfU6SrbP9tkso+fEWtwXQLtyQtexmEGt4eTB/C5OSO21KjpfhzYnMnLyFMqFQ4gslX+3p95oXMpfC/IkTdZUWrlS5Ti1Hk6d96xkBlV2LoIvrcHNv6Kz3WbGGc7Pe6kKmL0O7V9fo3+2i4QqkNU29dxl9j0XWttr2DcUJ/0vPSpcVNxKajdrKyrIu+62y4exVYVf2IPIBx7Ubfg/8eDye1Xxnv++DLugPyRb9Ev7it78+/7UXrw=="
           
           "_rawResponse": "<samlp:Response Destination="https://internal-svts-eks-factory-private-alb-1430683812.eu-west-1.elb.amazonaws.com/idbroker-spid/response" ID="_c1743bc4-e00a-4bba-b4e1-dd7e29664bd7" InResponseTo="_48694956-9919-47b8-9d03-aeae54a5984d" IssueInstant="2022-05-18T14:25:07Z" Version="2.0" xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion" xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol">
    <saml:Issuer Format="urn:oasis:names:tc:SAML:2.0:nameid-format:entity">https://demo.spid.gov.it</saml:Issuer><ds:Signature xmlns:ds="http://www.w3.org/2000/09/xmldsig#"><ds:SignedInfo><ds:CanonicalizationMethod Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/><ds:SignatureMethod Algorithm="http://www.w3.org/2001/04/xmldsig-more#rsa-sha256"/><ds:Reference URI="#_c1743bc4-e00a-4bba-b4e1-dd7e29664bd7"><ds:Transforms><ds:Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature"/><ds:Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/></ds:Transforms><ds:DigestMethod Algorithm="http://www.w3.org/2001/04/xmlenc#sha256"/><ds:DigestValue>2hIFFqtk9rLP6Yo7/wJGaJfiRlKST8hJnk7gli7q494=</ds:DigestValue></ds:Reference></ds:SignedInfo><ds:SignatureValue>DInk65SH4pWt89uPNETe36Dl/xcxBZ85tWV4i4Fgy8q/9SzM+yr39pbRAVTmOS7mxkYLhWZ2UOJdZfHbskstZQydX5Vz/oGKApVPp6kL/3kFg0rH4EvlB67Gtjmr6BPPK5B9Z5IGcTGQbOq2D1HoMrPbxDuYLsTuPffrrdY1k5EI6ajhwZb3iOhNvJ+14AUK55DLps2M2rsZdW1KiQZMtlus/DuW7q5CB9kIiPqN2QaCPNbmrgjebrCIodrlmuKdOS4z6leSzdOECpKl9fYRwjuWqegDvtSOj2+EYyRo+V1XEdpc8pdEpNkl04FsNlXf4oZiqw3nrIq/HypRClT7RA==</ds:SignatureValue><ds:KeyInfo><ds:X509Data><ds:X509Certificate>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</ds:X509Certificate></ds:X509Data></ds:KeyInfo></ds:Signature>

    <samlp:Status><samlp:StatusCode Value="urn:oasis:names:tc:SAML:2.0:status:Success"/></samlp:Status>
    <saml:Assertion ID="_b2b95fc8-213b-4064-9971-2efddebee381" IssueInstant="2022-05-18T14:25:07Z" Version="2.0" xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
        <saml:Issuer Format="urn:oasis:names:tc:SAML:2.0:nameid-format:entity">https://demo.spid.gov.it</saml:Issuer><ds:Signature xmlns:ds="http://www.w3.org/2000/09/xmldsig#"><ds:SignedInfo><ds:CanonicalizationMethod Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/><ds:SignatureMethod Algorithm="http://www.w3.org/2001/04/xmldsig-more#rsa-sha256"/><ds:Reference URI="#_b2b95fc8-213b-4064-9971-2efddebee381"><ds:Transforms><ds:Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature"/><ds:Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/></ds:Transforms><ds:DigestMethod Algorithm="http://www.w3.org/2001/04/xmlenc#sha256"/><ds:DigestValue>7Qwqu29gFxgKYZ0N6Peoolc3H7FcytEZn55Sfgm+Oqo=</ds:DigestValue></ds:Reference></ds:SignedInfo><ds:SignatureValue>GtFksOfvjA5/HLZvKIQEOwlEei4ERMNYPt98U1naUv6EBDivFedpjopOBo5TK46qXfm3lf/b3JWa2WwUu1FRIcuVQucZ8EQVSY+bdQEhML8pUGE1bNRtMCI1GonnfAxS9cXpq3mg4J1cYC+a0AIcr/VfbAqrCoLg1AHpWZVpgO4zSeTZW0TuermhcBtPnQr32L4C+V1ZRsoTz/0w/cXlkR8++T0qAYWRTOrqKvG76R9Slb2q5KKC5sGsRfSLsDysKtIB/c+vQobg+exEjUJzdKBgKItq0bLqKL0Rjf8H1zy/vRduViY0c/a3fQ3Ki0JHMLRtsOD8n6vvy0LVWsdb0Q==</ds:SignatureValue><ds:KeyInfo><ds:X509Data><ds:X509Certificate>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</ds:X509Certificate></ds:X509Data></ds:KeyInfo></ds:Signature>
        <saml:Subject>
            <saml:NameID Format="urn:oasis:names:tc:SAML:2.0:nameid-format:transient" NameQualifier="https://demo.spid.gov.it">
                    _67dab48b-13e0-4106-a34d-309949176976
            </saml:NameID>
            <saml:SubjectConfirmation Method="urn:oasis:names:tc:SAML:2.0:cm:bearer">
                <saml:SubjectConfirmationData InResponseTo="_48694956-9919-47b8-9d03-aeae54a5984d" NotOnOrAfter="2022-05-18T14:29:56Z" Recipient="https://internal-svts-eks-factory-private-alb-1430683812.eu-west-1.elb.amazonaws.com/idbroker-spid/response"/>
            </saml:SubjectConfirmation>
        </saml:Subject>
        <saml:Conditions NotBefore="2022-05-18T14:25:07Z" NotOnOrAfter="2022-05-18T14:29:56Z">
            <saml:AudienceRestriction>
                <saml:Audience>https://spidsp.infocert.it</saml:Audience>
            </saml:AudienceRestriction>
        </saml:Conditions> 
        <saml:AuthnStatement AuthnInstant="2022-05-18T14:25:07Z" SessionIndex="_92c15110-d0a3-4538-bb78-c55a09bb56f1">
            <saml:AuthnContext>
                <saml:AuthnContextClassRef>https://www.spid.gov.it/SpidL1</saml:AuthnContextClassRef>
            </saml:AuthnContext>
        </saml:AuthnStatement>
        <saml:AttributeStatement>                                     <saml:Attribute Name="name" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic">                                         <saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">Ada</saml:AttributeValue>                                     </saml:Attribute>                                                                      <saml:Attribute Name="familyName" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic">                                         <saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">Lovelace</saml:AttributeValue>                                     </saml:Attribute>                                                                      <saml:Attribute Name="fiscalNumber" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic">                                         <saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">TINIT-LVLDAA85T50G702B</saml:AttributeValue>                                     </saml:Attribute>                                                                      <saml:Attribute Name="domicileStreetAddress" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic">                                         <saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">Via Listz 21</saml:AttributeValue>                                     </saml:Attribute>                                                                      <saml:Attribute Name="domicilePostalCode" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic">                                         <saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">00144</saml:AttributeValue>                                     </saml:Attribute>                                                                      <saml:Attribute Name="domicileMunicipality" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic">                                         <saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">Roma</saml:AttributeValue>                                     </saml:Attribute>                                                                      <saml:Attribute Name="domicileProvince" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic">                                         <saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">RM</saml:AttributeValue>                                     </saml:Attribute>                                                                      <saml:Attribute Name="domicileNation" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic">                                         <saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">IT</saml:AttributeValue>                                     </saml:Attribute>                                                                      <saml:Attribute Name="idCard" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic">                                         <saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">passaporto KK1234567 questuraLivorno 2016-09-04 2026-09-03</saml:AttributeValue>                                     </saml:Attribute>                                                                      <saml:Attribute Name="placeOfBirth" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic">                                         <saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">G702</saml:AttributeValue>                                     </saml:Attribute>                                                                      <saml:Attribute Name="mobilePhone" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic">                                         <saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">3939393939</saml:AttributeValue>                                     </saml:Attribute>                                                                      <saml:Attribute Name="gender" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic">                                         <saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">F</saml:AttributeValue>                                     </saml:Attribute>                                                                      <saml:Attribute Name="email" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic">                                         <saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">aabyron@hotmail.com</saml:AttributeValue>                                     </saml:Attribute>                                                                      <saml:Attribute Name="spidCode" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic">                                         <saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">SPID-002</saml:AttributeValue>                                     </saml:Attribute>                                 </saml:AttributeStatement>
    </saml:Assertion>
</samlp:Response>"
    }
    

Use refresh token to get new valid access code

Access token has short time to live (usually few minutes), when Application needs to ask for user attributes and access token is no loger valid it can use /token endpoint again but this time with following params: refresh_token(with refresh_token value received in previous /token call), grant_type (“refresh_token” as a value) and redirect_uri.
   curl -k --request POST \
  --url https://eid-gateway.infocert.it/oauth2/token \
  --header 'Authorization: Basic h10823g81bAHSDVV123H812G3971AJSD' \
  --header 'Content-Type: application/x-www-form-urlencoded' \
  --header 'accept: application/json' \
  --data 'refresh_token=eyJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiJ9.eyJleHAiOjE2NTI5Njk4NDIsImNsaWVudF9pZCI6ImRlbW8td2ViLWNsaWVudCJ9.swW_g6pCVBb_tID_Q-AJZwc44h5lWLJGA2h7qQcfOpGMql35s8XMjoTdrqf0WNbWTsGf7P8D1u7hWQRfr-uAbXQNQh1rQHjZEfMrY7AOWlmJBefjnXxaD-GUxi7RM2GwbrUhV14i8-bUZUPdywPiqYElL5T_x3Y2Pfptp6uaJK2mc_EjxzArwiX5uPzVy5BNVw3NmAvoOhhXle606k1QjYeMIPFi9LZDvU5Ud5lDBv5beV0OZog55ZzF6qTblddgU5f6zs87vvWZtAjDALvoAyIyIvH7yTjThvgGr05WVWUQrCLEeBShXsVj-4ZWCmbXcyhw9eP66cNClPxIXbfpvg&grant_type=refresh_token&redirect_uri=https%3A%2F%2Finternal-pr-eks-factory-private-alb-1996065579.eu-west-1.elb.amazonaws.com%2Feidgateway-testclient%2Flogin'
Example json result:
   {
      "access_token": "eyJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiJ9.eyJhdWQiOiJkZW1vLXdlYi1jbGllbnQiLCJuYmYiOjE2NTI4ODUwMzYsImlzcyI6ImRlbW8td2ViLWNsaWVudCIsImV4cCI6MTY1Mjg4NTIxNiwiaWF0IjoxNjUyODg1MDM2LCJqdGkiOiI2OWFkZDZmOS02ZmIwLTRhZTEtOWFkNC1iMjk0OGMxNDgzOTQifQ.h_-1u2lu4XMUB1YeD2yEkmxcxi_26zrNJsPKMjL6t1klr_BM9ervNc6mQTF1c7q8fBqicSMBL0lamNDkUd6PbbfIwHfyG1ghuakDnH18zdlIUdfdHRC6h9iwFV73OcSuuwBGA9GlAyJc2LSCWyek-vPBcmb1jWbzyjlz5LOnA4L4bgRx5cTLIki9GlsxXwmc7mneYJDcbWzO4yVhTft_U0x01n_1MU0aXGEKEw30RPdwr-SPiycAUVGkEl3XhANtOTo_tywU5oZL7Dwrq8HyTuIsMW_oh5KPKMez3q9zAF3Tzo6tJzu5TuCsS37c8EHI14HoACWcvwkgU4o8hITtIw",
      "expires_in": 360,
      "refresh_token": "eyJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiJ9.eyJleHAiOjE2NTI5Njk4NDIsImNsaWVudF9pZCI6ImRlbW8td2ViLWNsaWVudCJ9.swW_g6pCVBb_tID_Q-AJZwc44h5lWLJGA2h7qQcfOpGMql35s8XMjoTdrqf0WNbWTsGf7P8D1u7hWQRfr-uAbXQNQh1rQHjZEfMrY7AOWlmJBefjnXxaD-GUxi7RM2GwbrUhV14i8-bUZUPdywPiqYElL5T_x3Y2Pfptp6uaJK2mc_EjxzArwiX5uPzVy5BNVw3NmAvoOhhXle606k1QjYeMIPFi9LZDvU5Ud5lDBv5beV0OZog55ZzF6qTblddgU5f6zs87vvWZtAjDALvoAyIyIvH7yTjThvgGr05WVWUQrCLEeBShXsVj-4ZWCmbXcyhw9eP66cNClPxIXbfpvg",
      "token_type": "Bearer"
   }

Logout particular user -> Delete access and refresh tokens

To logout user /logout endpoint has to be called with access token value in authorization header.
   curl -k --request DELETE \
  --url https://eid-gateway.infocert.it/oauth2/logout \
  --header 'Authorization: Bearer eyJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiJ9.eyJhdWQiOiJkZW1vLXdlYi1jbGllbnQiLCJuYmYiOjE2NTI4ODM0NDIsImlzcyI6ImRlbW8td2ViLWNsaWVudCIsImV4cCI6MTY1Mjg4MzYyMiwiaWF0IjoxNjUyODgzNDQyLCJqdGkiOiIwOWNmM2YxMS00YmZmLTQ2NWYtYjBiZS0xOWQ0NDRmODM3OGYifQ.PntT3TJWOETPY1MBq9ld8bb0jeaLi-ub3_PhLLqINiWWMRxnlM0SkvdzEdptPGX4CNrBG_QPYdBgoH9ru63qjolXHZivGjAzfQrTz6Hyw8O_kaYnjLAW6hI0Ph_3MdeM84T6wpY9Gj--gp1oOyo12PIiH5bSOsNLO6d-IofHSVwkfyaepHhTUfieAEeWWXvHgsvVC3YviDOXO-5NouQRNO5ZFbLf0Wgd52N35U8jxIIiM2jzsaCgh5Dr6okY3O4CdQBMl7Xw2GFpjByc-a5Tv3DZNebIOVe-rw-jTQkNcLihNZv3VWCcHhYpQ5Ql4vQ9oMb730jilpA5r8rzhwi4Qw' \
  --header 'accept: application/json'

UI Customization

The customization of the user interface of Eid-Gateway allows modifying the graphical aspect of the web page at the level of tenant clients. In particular, the following properties can be customized:
  • Header color: background color of the header
  • Footer color: background color of the footer
  • Body color: background color of the page
  • Header image: background image of the header of the web page
  • Body image: background image of the body of the web page
  • Footer image: background image of the footer of the web page
The following image formats are allowed: png, jpg, or svg.

Rules applied to the web page

Header
The header has a CSS rule of min-height: 180px, which indicates the minimum height of the element. Additionally, the background image of the header is adapted to the size of the element using the CSS rule background-size: cover. It is recommended to provide an image with a height of 180px and a width that fills the entire width of the header (Example: 4000×180).
Footer
The footer has a CSS rule of min-height: 100px. In this case too, the background image of the footer is adapted to the size of the element using the CSS rule background-size: cover. It is recommended to provide an image with a height of 100px and a width that fills the entire width of the footer (Example: 4000×100).
Body
The body has a CSS rule of background-size: auto.

EID Gateway

Fill the form to request information



Furthermore, for the purposes referred to in paragraph 4, letter e), f) and g) of the information notice:

  1. I agree to the processing of Data in relation to the sending by the Data Controller of commercial and/or promotional communications relating to own products/services of any kinds or products/services of other companies
  2. I agree to the communication or transfer of Data to other companies who will use them for their own commercial and / or promotional purposes as autonomous Data Controller