Update credential revocation status
PUT/v2/config/digital-wallet/openid/sdjwt/credential/history/:credentialExchangeId/revocation-status
Updates the revocation status of an issued credential using the IETF Token Status List.
Request
Path Parameters
Unique identifier of the credential exchange record tracking a single OID4VCI credential issuance lifecycle.
- application/json
Body
Possible values: [Operational, Revoked, Suspended]
New revocation status. Operational reactivates a suspended credential. Revoked permanently invalidates. Suspended temporarily invalidates (can be reactivated).
Responses
- 200
- 401
- 500
Credential revocation status updated successfully
Response Headers
- application/json
- Schema
- Example (from schema)
Schema
credentialHistory object
Unique identifier for the credential exchange record, tracking the full lifecycle of a single OID4VCI credential issuance.
Issuance mode used for this exchange. InTime means the credential was issued immediately via the OID4VCI Credential Endpoint. Deferred means the credential is pending via the Deferred Credential Endpoint.
When true, the issuance used the OID4VCI Pre-Authorized Code Flow. When false, the Authorization Code Flow was used.
The OID4VCI Credential Offer URI or JSON sent to the holder to initiate the issuance flow.
Possible values: [pending, ready]
Processing status of the credential. pending means the credential is being prepared. ready means it is available for the holder to retrieve.
Possible values: [offer_sent, offer_received, credential_issued, credential_acked, credential_accepted, credential_deleted, issuance_denied]
Lifecycle status of the credential exchange in the OID4VCI protocol flow: offer_sent (Credential Offer sent to holder), offer_received (holder scanned/received offer), credential_issued (credential issued via Credential Endpoint), credential_acked (holder acknowledged receipt), credential_accepted (holder accepted credential), credential_deleted (holder deleted credential), issuance_denied (issuer denied issuance).
Client identifier of the holder's wallet, typically a DID or URL. Provided during the OID4VCI Token Request.
Transaction code (tx_code) for the Pre-Authorized Code Flow.
Unix timestamp (in seconds) when this exchange record was created.
Unix timestamp (in seconds) when this exchange record was last modified.
credential object
The credential payload being issued. Contains type and credentialSubject for W3C VC (JWT) format, or vct/doctype and claims for IETF SD-JWT VC / ISO 18013-5 mDoc/mDL formats.
The credential payload being issued. Contains type and credentialSubject for W3C VC (JWT) format, or vct/doctype and claims for IETF SD-JWT VC / ISO 18013-5 mDoc/mDL formats.
disclosureMapping object
Selective disclosure mapping for IETF SD-JWT VC credentials. Each entry maps a claim path to its disclosure setting.
Selective disclosure mapping for IETF SD-JWT VC credentials. Each entry maps a claim path to its disclosure setting.
Identifier of a presentation definition required for dynamic credential requests.
Identifier of the presentation exchange session linked to a dynamic credential request.
holder object
Metadata about the credential holder obtained during the OID4VCI exchange.
Identifier of the holder, typically a DID or display name resolved from wallet client metadata.
Possible values: [jwt_vc_json, dc+sd-jwt, mso_mdoc]
Credential format used for this issuance. Values: jwt_vc_json (W3C VC JWT), dc+sd-jwt (IETF SD-JWT VC), mso_mdoc (ISO 18013-5 mDoc/mDL).
Indicates whether revocation is enabled for the issued credential.
Possible values: [Operational, Revoked, Suspended]
Current revocation status: Operational (valid), Revoked (permanently invalidated), Suspended (temporarily invalidated).
OAuth 2.0 client assertion JWT provided by the holder's wallet for client authentication.
Type of the client assertion token.
Indicates whether the holder's client assertion JWT was verified.
Wallet Unit Attestation (WUA) credential presented by the holder, certifying the wallet instance is genuine.
Proof of Possession for the Wallet Unit Attestation.
Indicates whether the Wallet Unit Attestation was verified.
The signed credential token (JWT, SD-JWT, or mDoc) issued to the holder.
cnf object
Confirmation claim (cnf) containing the holder's public key JWK for key binding.
Confirmation claim (cnf) containing the holder's public key JWK for key binding.
JWT Token Identifier (jti) — unique identifier for the issued credential token.
Proof JWT provided by the holder in the OID4VCI Credential Request, demonstrating key possession.
Type of the proof provided in the Credential Request (e.g. jwt).
decodedWalletUnitAttestation object
Decoded payload of the holder's Wallet Unit Attestation credential.
Decoded payload of the holder's Wallet Unit Attestation credential.
OpenID Connect ID Token shared by the holder during the issuance flow.
Decoded payload of the holder's OpenID Connect ID Token.
Indicates whether the holder's OpenID Connect ID Token was verified.
Human-readable reason why the issuer denied the credential issuance request.
Array of previously issued credential tokens that have expired.
Array of decoded expired credential payloads.
credentialResponseEncryption object
The details of issuer trust service provider
The details of holder trust service provider
Identifier of the individual recipient the credential offer was sent to.
Mapper identifier linking the credential offer to an external individual record.
Minimum polling interval (in seconds) for the OID4VCI Deferred Credential Endpoint.
{
"credentialHistory": {
"CredentialExchangeId": "string",
"issuanceMode": "string",
"isPreAuthorised": true,
"credentialOffer": "string",
"credentialStatus": "pending",
"status": "offer_sent",
"clientId": "string",
"userPin": "string",
"createdAt": 0,
"updatedAt": 0,
"credential": {},
"disclosureMapping": {},
"presentationDefinitionId": "string",
"presentationExchangeId": "string",
"holder": {
"name": "string"
},
"credentialFormat": "jwt_vc_json",
"supportRevocation": true,
"revocationStatus": "Operational",
"clientAssertion": "string",
"clientAssertionTokenType": "string",
"isClientAssertionVerified": true,
"walletUnitAttestation": "string",
"walletUnitAttestationPoP": "string",
"walletUnitAttestationVerified": true,
"credentialToken": "string",
"cnf": {},
"jti": "string",
"proof": "string",
"proofType": "string",
"decodedWalletUnitAttestation": {},
"idToken": "string",
"idTokenDecoded": {},
"idTokenVerified": true,
"issuanceDeniedReason": "string",
"expiredCredentialTokens": [
"string"
],
"expiredCredentials": [
{}
],
"credentialResponseEncryption": {
"alg": "string",
"enc": "string",
"jwk": {}
},
"issuerTrustServiceProvider": {},
"holderTrustServiceProvider": {},
"individualId": "string",
"mapperId": "string",
"credentialResponseInterval": 0
}
}
Unauthorized
Response Headers
- application/json
- Schema
- Example (from schema)
Schema
{
"errorCode": 400,
"errorDescription": "Bad input parameter"
}
Internal server error
Response Headers
- application/json
- Schema
- Example (from schema)
Schema
{
"errorCode": 400,
"errorDescription": "Bad input parameter"
}