Skip to main content

Direct Onboarding

Direct onboarding allows an organisation to join a Trusted List by submitting an application form and a Certificate Signing Request (CSR) through the IDunion web console. The Trusted List Owner reviews the submission and approves or rejects it. No Verifiable Credential wallet is required from the applicant. This onboarding guide is scoped for a test environment. Onboarding for a production environment may differ.


Prerequisites

  • An active account on the IDunion web console
  • Your organisation's legal details (at least organization name)
  • For Wallet Provider trust lists: the name and URL of your wallet solution
  • A CSR file (.pem or .csr). If you do not have one, follow Step 0 below to generate one.

Step-by-step guide

0. Generate a Certificate Signing Request (CSR)

Skip this step if you already have a CSR file.

A CSR cryptographically binds your organisation's identity to a public key. It is used to issue the X.509 certificate that will anchor your entry in the Trust List. You will upload this file in Step 5.

The following commands use the openssl command-line tool, available on Linux, macOS, and Windows (via WSL or Git Bash).

Step 0.1 — Generate a private key

openssl genpkey -algorithm EC -pkeyopt ec_paramgen_curve:P-256 -out private.key

This creates an EC private key using the P-256 curve and saves it to private.key. Keep this file secure and never share it.

Step 0.2 — Generate the CSR

openssl req -new -key private.key -out request.csr \
-subj "/C=DE/ST=Berlin/L=Berlin/O=Your Organisation Name/CN=your.domain.example"

Replace the -subj fields with your organisation's details:

FieldDescriptionExample
CISO 3166 two-letter country codeDE
STState or regionBerlin
LCity or localityBerlin
OFull legal name of your organisationExample GmbH
CNCommon name — typically your domain or organisation nameexample.com

The command produces request.csr. You will upload this file in Step 5.

Step 0.3 — Verify the CSR (optional)

Inspect the contents of the generated CSR before uploading:

openssl req -text -noout -verify -in request.csr

1. Log in

Open the IDunion web console and log in with your account credentials.

login-signup.png


2. Open the Trust List directory

From the dashboard, navigate to the Trusted List Directory. This lists all publicly available Trust Lists you can apply to join.

initial-screen.png


3. Select a Trusted List

Find the Trusted List you want to join and click on it to open its detail page. Review the Trusted List's name, type, and description to confirm it is the right one for your organisation.

tl-view.png


4. Start the onboarding request

On the Trusted List detail page, click "Request Onboarding". This opens the application form.

onboarding-form.png


5. Upload the Certificate Signing Request (CSR)

Click "Upload CSR" and select your .pem or .csr file generated in Step 0. Your private key never leaves your infrastructure.

For HSM integration options see Key Management.

onboarding-csr-empty.png

onboarding-csr-provided.png


6. Fill in organisation details

Complete the fields in the application form. Required fields are marked accordingly.

FieldDescription
Organisation NameFull legal name of your organisation
Trade NameTrading name or brand name (if different from legal name)
Street AddressRegistered office street address
CityCity
Province/ StateState or region
Postal CodePostal or ZIP code
JurisdictionCountry (ISO 3166 two-letter code, e.g. DE)
EmailOfficial contact email address
PhoneContact phone number including country code
WebsiteURL of your organisation's website
Terms & ConditionsURL of your organisation's Terms & Conditions

For Wallet Provider trust lists, the following additional fields are displayed:

FieldDescription
Wallet Solution NameName of the wallet solution you operate
Wallet Solution Reference IDInternal reference or product ID of the wallet solution
Wallet Solution URLURL of the wallet solution's public information page

6. Upload the Certificate Signing Request (CSR)

Click "Upload CSR" and select your .pem or .csr file generated in Step 0. Your private key never leaves your infrastructure.

For HSM integration options see Key Management.

onboarding-csr-empty.png

onboarding-csr-provided.png


7. Submit the application

Review all the information you have entered, then click "Submit". The console sends your application to the Trust List Owner for review.

You will see a confirmation message indicating that your request has been received and is pending review.

onboarding-review.png

onboarding-submitted-pending.png


What happens next

After submission the process moves to the Trust List Owner. You do not need to take any further action at this point.

  1. The Trust List Owner receives a notification of your request in their dashboard.
  2. They review your organisation details and CSR.
  3. They click "Approve" or "Reject".

If approved:

  • A Trust List Record (TLR) is created for your organisation.
  • A did:web identifier and a DID Document are generated and linked to your X.509 certificate.
  • An ETSI TS 119 602/612 XML for the Trust List is regenerated to include your entry.
  • You receive an email notification confirming your successful onboarding.

If rejected:

  • You receive an email notification with the reason for rejection.
  • You may correct the information and re-submit.

onboarding-notification-accepted.png


After approval

Once approved, your organisation's did:web identifier is publicly resolvable and your X.509 certificate is listed in the ETSI XML of the Trust List. Verifiers can now confirm your membership on the trusted list automatically by resolving your DID or querying the Trusted List XML.

You can view your Trusted List Record at any time by logging in to the web console and opening the dashboard.

onboarding-done.png