Skip to main content

Session requests

Each IRMA server exposes APIs for creating IRMA sessions with a session request. An IRMA session request contains all information required for the IRMA server and Yivi app to perform an IRMA session with, such as the attributes to be issued or verified. This page documents IRMA session requests. It applies to:

For the precise role of session requests in an IRMA session, see this diagram of an IRMA session.

Session request data types

For each of the three IRMA session types, we define a session request data type: an object whose JSON representation contains at least a JSON-LD @context key identifying which message type it is, and extra keys specific to the session type. The following three @context values identify disclosure, attribute-based signature, and issuance session requests respectively:

  • "@context": "https://irma.app/ld/request/disclosure/v2"
  • "@context": "https://irma.app/ld/request/signature/v2"
  • "@context": "https://irma.app/ld/request/issuance/v2"

(For now these URIs do not resolve to anything; they just distinguish the message type.)

Disclosure requests

Disclosure sessions are started with an irma.DisclosureRequest. Example:

{
"@context": "https://irma.app/ld/request/disclosure/v2",
"disclose": [
[
[ "irma-demo.MijnOverheid.root.BSN" ]
],
[
[
"irma-demo.nijmegen.address.street",
"irma-demo.nijmegen.address.houseNumber",
"irma-demo.nijmegen.address.city"
],
[
"irma-demo.idin.idin.address",
"irma-demo.idin.idin.city"
]
]
]
}

This asks for a (demo) BSN attribute, as well as either street, houseNumber and city from irma-demo.nijmegen.address, or address and city from irma-demo.idin.idin. The three levels correspond to a conjunction of disjunctions of conjunctions of requested attributes, allowing verifiers to request multiple attribute sets from the user, offering choices for some or all of these sets.

All of the attribute types (i.e., the string values) contained in the request must exist in their scheme (irma-demo in the example above). For the irma-demo and pbdf schemes, an index of existing attribute types that can be requested can be found here.

Attributes can be disclosed to the requestor in any of the three session types: in issuance sessions issuance proceeds only if the user discloses the required attributes just before issuance, and in attribute-based signature sessions the requested attributes are attached to the resulting attribute-based signature. Thus the disclose and labels fields introduced above can also occur in issuance or attribute-based signature session requests (see below).

Multiple credential types within inner conjunctions

In the request above we call the three JSON lists that contain strings inner conjunctions (distinguishing them from the outer conjunctions, that contain not attribute but disjunctions). Asking for multiple attributes within such an inner conjunctions of a session request is subject to the following rules:

  • When attributes coming from multiple credential types occur in an inner conjunction, at most one of them may be a non-singleton.
  • If some of the attributes occuring in the inner conjunction come from the same credential type, then the attributes that the user sends must come from the same credential instance: it is not allowed to mix attributes coming from distinct instances of that credential type. (The Yivi app automatically only offers candidate sets as choices to the user that satisfy this property.)

For example, consider the following session request:

{
"@context": "https://irma.app/ld/request/disclosure/v2",
"disclose": [
[
[
"pbdf.pbdf.diploma.degree",
"pbdf.pbdf.diploma.institute"
]
]
]
}

Supposing that the user has two instances of pbdf.pbdf.diploma whose degree and institute attributes are (degree 1, institute 1) and (degree 2, institute 2), this means that the user can choose only either (degree 1, institute 1) or (degree 2, institute 2), and not (degree 1, institute 2) or (degree 2, institute 1). (If desired it would be possible to give the user those options by asking for the two attributes in two outer conjunctions instead of within an inner conjunction.)

When combining multiple credential types within a disjunction these restrictions ensure that when the Yivi app computes candidate attribute sets for the user to choose from, the amount of resulting options stays manageable. In adddition, the second restriction is a feature on its own, allowing verifiers to request multiple attributes coming from one credential instance.

Requesting specific attribute values

Within inner conjunctions, specific attribute values can be requested by replacing the string with an object like the following:

{
"@context": "https://irma.app/ld/request/disclosure/v2",
"disclose": [
[
[
{ "type": "pbdf.pbdf.diploma.degree", "value": "PhD" },
{ "type": "pbdf.pbdf.diploma.institute", "value": null }
]
]
]
}

This would only be satisfied by a degree attribute whose value is PhD, together with any institute attribute. (Note that the object and string syntaxes can be mixed within an inner conjunction, i.e. it would be permissible in the JSON example above to replace the second object with just "pbdf.pbdf.diploma.institute".)

Null attributes

Whenever an attribute is marked with optional in the scheme (example), the issuer may skip it when it issues an instance of the containing credential type, assigning a null value to it (which is distinct from the empty string ""). When disclosing the attribute, the verifier receives null instead of a string containing the attribute value.

If a non-null attribute is required this can be requested using notNull as follows:

{
"@context": "https://irma.app/ld/request/disclosure/v2",
"disclose": [
[
[
{ "type": "irma-demo.MijnOverheid.fullName.prefix", "notNull": true }
]
]
]
}

The default value of notNull is false.

Optional disjunctions

A disjunction within a session request can be marked as optional, by including an empty inner conjunction in it:

{
"@context": "https://irma.app/ld/request/disclosure/v2",
"disclose": [
[
[ "irma-demo.nijmegen.address.city" ]
],
[
[],
[ "irma-demo.MijnOverheid.fullName.firstname" ]
]
]
}

This can be useful when certain attributes are not required, so that if the user does not have them the session does not need to be aborted.

Skip expiry check

You can allow users to disclose expired instances of credentials. This is useful for combined issuance-disclosure sessions and chained sessions if you only want to ensure that the user is still using the same device, and therefore the same secret key, as during a previous issuance session.

{
"@context": "https://irma.app/ld/request/disclosure/v2",
"disclose": [
[
[
{ "type": "irma-demo.MijnOverheid.root.BSN", "value": "12345" }
]
]
],
"skipExpiryCheck": [ "irma-demo.MijnOverheid.root" ]
}

Attribute-based signature requests

Attribute-based signature sessions are started with an irma.SignatureRequest, which are similar to disclosure requests:

{
"@context": "https://irma.app/ld/request/signature/v2",
"message": "Message to be signed by user",
"disclose": ...,
"labels": ...
}

The message field is required. The attributes to be attached to the attribute-based signature are requested with the disclose field, which along with the labels field work exactly like in disclosure sessions.

Issuance requests

Issuance sessions are started with an irma.IssuanceRequest. Example:

{
"@context": "https://irma.app/ld/request/issuance/v2",
"credentials": [{
"credential": "irma-demo.MijnOverheid.ageLower",
"validity": 1592438400,
"attributes": {
"over12": "yes",
"over16": "yes",
"over18": "yes",
"over21": "no"
}
}],
"disclose": ...,
"labels": ...
}

Per credential in the credentials array the validity is optional; if skipped it is assigned the default value of 6 months. If present, the validity is always rounded down to the nearest epoch boundary, which is one week (60 * 60 * 24 * 7 = 604800 seconds).

Attributes marked as optional in the containing credential type (example) may be skipped in the attributes map. This issues the null value to these attributes.

disclose and labels are optional, allowing for combined disclosure-issuance sessions, in which the user is required to disclose attributes before the IRMA server will issue the credentials.

The clientReturnUrl option can also be used, both for issuance only and combined disclosure-issuance sessions. Usage is similar as in disclosure sessions.

Client return URL

If the user performs a mobile session, i.e. on the same device as where the Yivi app is installed on, then after the session has completed the user will be redirect to the clientReturnUrl specified in the session request, if present.

{
"@context": "https://irma.app/ld/request/disclosure/v2",
"disclose": [
...
],
"clientReturnUrl": "https://example.com"
}

The example shows a disclosure request but clientReturnUrl can be set on session requests of any type. If set, when the user finishes a session (either successfully or unsuccessfully), she is redirected to the location specified by clientReturnUrl.

If not set:

  • On Android the Yivi app automatically toggles back to the previous app;
  • On iOS it is not possible to toggle back to the previous app due to restrictions by Apple, so the Yivi app stays open. In the top left corner of the screen, however, a button appears that leads back to the previous app.

This URL does not necessarily have to be a web URL; it can also be a universal link to another app. Universal links work both on Android and iOS. It is also possible to use iOS or Android scheme URLs. (Note however that iOS and Android scheme URLs differ from one another, so when starting a session with a scheme URL as return URL you should therefore determine on which platform the user's app is running.)

On iOS, toggling back to the calling app or website after the session can be simulated by navigating towards the calling app using a clientReturnUrl, either a normal URL or universal link. This works on Android as well, so currently this is the only platform-independent way of ensuring that the used ends up at a specified place after the session. If the URL opens a website, however, then the user is navigated towards a new browser tab instead of back to an existing browser tab, so in website-IRMA-website flows you will need to reload your webapp and state in the newly opened tab.

Augmenting the client return URL

It is possible to have the IRMA server augment the clientReturnUrl with the server token of a session (i.e., the token in the response of the /session endpoint). This token is then appended as a query parameter with name token to the clientReturnUrl. Using this token, one can the retrieve the session result.

To enable this, both the server configuration flag augment-client-return-url needs to be enabled, as well as the augmentReturnUrl session request parameter needs to be true.

{
"@context": "https://irma.app/ld/request/disclosure/v2",
"disclose": [
...
],
"augmentReturnUrl": true,
"clientReturnUrl": "https://example.com"
}

In this example, the client return url would be augmented to become https://example.com?token=0123456789abcdef, where 0123456789abcdef would be the server token of the session.

Session host

The host in the sessionPtr field of the session package can be configured using the host option in the session request. This is useful when the IRMA server can be reached through multiple URLs. In this way, a single IRMA server can be used to serve multiple requestors, each with their own hostname. The hostname is being shown to the user in the Yivi app. The IRMA server will verify that the hostname the Yivi app connects to matches the hostname in the session request.

{
"@context": "https://irma.app/ld/request/disclosure/v2",
"host": "irma.example.com",
"disclose": ...
}

This leads to the following session package:

{
"token":"KzxuWKwL5KGLKr4uerws",
"sessionPtr": {"u":"https://irma.example.com/irma/session/ysDohpoySavbHAUDjmpz","irmaqr":"disclosing"},
"frontendRequest": {
"authorization":"qGrMmL8UZwZ88Sq8gobV",
"minProtocolVersion": "1.0",
"maxProtocolVersion": "1.1"
}
}

The host field is optional. If not set, the url from the server's configuration will be used as-is. In this case, the IRMA server will not check which host the Yivi app connects to. The Yivi app on the other hand will check that the TLS certificate being used is correct.

When you use irma server, you should explicitly specify requestor permissions for this. Otherwise, only the hostname from the url in the server's configuration will be allowed. When you use the IRMA server library, no permission restrictions are imposed. If you need restrictions, then you have to implement this yourself.

Extra parameters

For each API that accepts one of the above session request data types, the requestor can provide additional parameters to configure the session at the IRMA server, by providing an extended session request instead, as follows:

{
"validity": 120,
"timeout": 120,
"callbackUrl": "https://example.com",
"nextSession": {
"url": "https://example.com/nextsession"
},
"request": ...
}

Below you can find an overview of all extra parameters and their default value.

Option (JSON)Option (Go)MeaningDefault value
"validity"ResultJwtValidityValidity of session result JWT in seconds (to determine JWT expiration time exp)120 seconds
"timeout"ClientTimeoutWait this many seconds for the Yivi app to connect before the session times out300 seconds (5 minutes)
"callbackUrl"CallbackUrlURL to post session result to"" (no callback is performed)
"nextSession"NextSessionContinue with a follow-up IRMA session when this session succeeds. The session result is posted to URL, and as response on the POST a new session request should be returned for the IRMA server to start. More documentation here.nil (there is no next session)

More information about session lifetimes and timeouts can be found in the IRMA server documentation.

JWTs: signed session requests

The IRMA API server or irma server can be configured such that it only accepts session requests that have been digitally signed in the form of a JWT. The form of the JWT depends on the session type. An example requesting IRMATube attributes::

eyJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiIsImtpZCI6ImlybWF0dWJlIn0.eyJpYXQiOjE1NjQ2NTczNzUsInN1YiI6InZlcmlmaWNhdGlvbl9yZXF1ZXN0Iiwic3ByZXF1ZXN0Ijp7InJlcXVlc3QiOnsiQGNvbnRleHQiOiJodHRwczovL2lybWEuYXBwL2xkL3JlcXVlc3QvZGlzY2xvc3VyZS92MiIsImRpc2Nsb3NlIjpbW1sicGJkZi5wYmRmLmlybWF0dWJlLnR5cGUiXV0sW1sicGJkZi5wYmRmLmFnZUxpbWl0cy5vdmVyMTIiXSxbInBiZGYuZ2VtZWVudGUucGVyc29uYWxEYXRhLm92ZXIxMiJdXV19fX0.lW9mqjrLkoahDP6Fcw_9mH5hlfl1tq5qp3W3ga0Nrd_j0NXFj-6ngqHVXEV1zhC_OkVH4LN8fMBAgN8nqaFWgEdQvrCuB7-ynuBVjLR-QU272Ym86zLEWYggAkbZ5KY40MpTxU1dgFMucG7fyAESic04OribWOCVxstAMsM28yCxvzkBMCOSjFEe3abcg_N6VvQnLn3LgZP_UrxQmQsh4DK7mBjW04LesLG1vjcliyhDGUb52FHOP_NAsG7G2FvIgojPzALlPrpTMu5p8a95wc5CGR791wybmh0F8kDdwZWAU0W2FjlX5bNPsyXN8AxRVWaRmWoGrGsQhy_sKEf8lg

In case of disclosure sessions, the body of the JWT (the part in between the two dots) contains a Base64-encoding of the following:

{
"iat": 1550424847,
"sub": "verification_request",
"sprequest": ...
}

The fields are as follows:

  • iat: Unix timestamp of the creation date of the JWT. IRMA servers may reject JWTs beyond a certain age.
  • iss: contains the requestor name, and is used by the IRMA server to lookup the appropriate key with which to verify the JWT.
  • sub: JWT subject, in case of disclosure sessions this must always be "verification_request".
  • sprequest: contains an extended disclosure session request as defined above.

For each possible session type, the contents of the sub field and the name of the field containing the session request must be as follows.

Session typesub contentsSession request field nameGo function
Disclosureverification_requestsprequestirma.NewServiceProviderJwt()
Attribute-based signaturesignature_requestabsrequestirma.NewSignatureRequestorJwt()
Issuanceissue_requestiprequestirma.NewIdentityProviderJwt()

Currently the following libraries can produce JWTs of this form:

irma server currently supports JWTs signed (asymmetrically with RSA) with the RS256 algorithm, and (symmetrically signed with HMAC-SHA256) RS256. The IRMA API server only supports RS256.