Get Started

Provide Data

advertise data and services to trusted organizations add authorization servers enabling client applications to authenticate themselves and obtain tokens publish your apis for all federation participants to discover request certificates for mtls prerequisites your organization is onboarded within the ecosystem/federation you are an administrator user within your organization add server add an authorisation servers docid\ aw0rfr 6i9dbui8sh7hkd sometimes referred to as openid provider to publish your apis for external consumption it makes it possible for data receivers docid 0icz dap0cfxtlrhddxni to discover its configuration using oidc discovery ( / well known endpoint) and obtain data, after properly onboarded, using their client applications credentials select servers > new server fill in the details of the organization's authorization server field name required field description example customer friendly server name yes should be equal to the brand name that can be easily identifiable by the customer on the consent flow a dd the name without abbreviations so that it can be recognized by the customer that is to provide their consent to share data maximum of 256 characters raidiam openid discovery document uri yes the uri that points to the openid discovery document ( / well known endpoint https //raidiam com/openid configuration/ well known payload signing certificate uri yes uri points to the signature certificates and public keys used to payload signatures by data receivers should point to the certificate you uploaded to the authorization server in the previous section of this article https //raidiam com/payload uricertificate customer friendly logo uri yes the logo that represents the brand name added on the customer friendly name https //raidiam com/logo svg developer portal uri no uri for the server developer portal https //developers raidiam com terms of service uri no uri that points to the server terms of service uri https //raidiam com/tos notification webhook endpoint no endpoint of the webhook notification uri that will be used to receive notifications from the directory note this endpoint needs confirmation visit the url sent to endpoint within 3 days to confirm the subscription this uri is optional and allows the server to receive notification in case any relevant information on connect is added or updated webhook site/97askmbf c320 4982 b0ff f7728893aa description yes 1 character limit 256 characters 2\ description cannot have links 3\ should contain a description of the brand with any additional information the user should know can also contain organization introductory text organization start date institution differences contact channels this is where you can describe your brand, bringing any additional information to help the user make the right choice while providing their authorization to access the apis save some organizations may have different authorization servers responsible for issuing access tokens that give access to different apis or services in such cases, add additional authorization servers your organization has add organization transport certificate for mtls optional if your organization uses mutual tls (mtls) in order to enhance the security of its resources, you need to request a transport certificate this certificate both the data providers docid\ apm ilivcfpfft1ld0puc and data receivers docid 0icz dap0cfxtlrhddxni trust empowers your technical assets, such as the authorization server and resource server, enabling them to engage in secure tls handshakes during communication with client applications navigate to your organization select organization certificates > new certificate select transport as the certificate type and continue in your terminal, execute the provided command to generate a certificate signing request (csr) upload the generated csr/pem your csr/pem is sent to the public key infrastructure docid\ ukxpxzgjtt4iswg9nbxe0 which checks its validity and passes the request further to the public key infrastructure docid\ ukxpxzgjtt4iswg9nbxe0 for certificate issuance download the issued certificate and add it to the organization's authorization server and resource server configuration optionally, you can also view the public and private keys docid\ xb31qsym6rjvvzucnk1ex associated with the issued certificate in a form of a public and private keys docid\ xb31qsym6rjvvzucnk1ex publish apis for data receivers to discover select servers and choose one of the available authorization servers for which you wish to publish the apis select api resources > new api resource select the api family type available within your ecosystem and its version provide a start date configuring when your apis start to be available for the data receivers docid 0icz dap0cfxtlrhddxni to integrate with provide the certification uri if required the requirement for providing the certification uri can behave in the two following ways if the ecosystem has the automatic api certification process available, the conformance tests run for the apis if the ecosystem does not have the automatic api certification process available, you need to provide a valid certification uri serving as a proof that your apis are implemented according to the required standard select save expand the dropdown next to the apis you added and add api discovery endpoints by adding api discovery endpoints, you can provide a base url for the api and the rest is automatically filled in according to the requirements for the given api that come from your trust framework such requirements are defined by the trust framework participants docid\ zwoo4fno16xiy1mcodij5 and their data apis profile provide the api base url and api version and generate endpoints do not add a slash at the end of the base url it is added automatically for you during the api discovery the api version is also automatically appended into the resulting api endpoint select all of the available discovered apis or select the ones you want to publish and save next steps start receive data docid\ de7d6t3s kbkp2ngddb8l add server docid\ tykucwbkh0mzly9tesuiw publish authorisation server certification docid\ w16yop7kmcywzvmngrvwh manage apis for discovery and integration docid\ x qbohmahvd2nrwqtc0zd organisations docid\ fzu1lra3zs plig6pgjpv