/Legal/PetitionPeerReview

Allows the client to petition a peer to review an ID application.

JSON

Request
{
	"keyId": Required(Str(PKeyId)),
	"legalId": Required(Str(PLegalId)),
	"remoteId": Required(Str(PRemoteId)),
	"petitionId": Required(Str(PPetitionId)),
	"purpose": Required(Str(PPurpose)),
	"keySignature": Required(Str(PKeySignature)),
	"requestSignature": Required(Str(PRequestSignature))
}
Response (if successful)
{
}

XML

Request
<PetitionPeerReview xmlns="https://waher.se/Schema/BrokerAgent.xsd"
                    keyId=(Required(Str(PKeyId)))
                    legalId=(Required(Str(PLegalId)))
                    remoteId=(Required(Str(PRemoteId)))
                    petitionId=(Required(Str(PPetitionId)))
                    purpose=(Required(Str(PPurpose)))
                    keySignature=(Required(Str(PKeySignature)))
                    requestSignature=(Required(Str(PRequestSignature)))/>
Response (if successful)
<AckResponse xmlns="https://waher.se/Schema/BrokerAgent.xsd" />

Input Parameters

Parameter Description
PKeyId Identity of key to use for signing the petition. It must correspond to the key used when signing the Legal Identity application that will be used to sign the petition.
PLegalId Identifier of the Legal Identity that will be used to sign the petition, and that will be reviewed by the peer.
PRemoteId Identifier of the remote legal identity the client requests review the identity application.
PPetitionId An identifier of the request, the client can use to correlate asynchronous responses with the corresponding petition request.
PPurpose A human readable text that will be presented to the remote user, describing the purpose of the petition.
PKeySignature Cryptographic signature of the key ID, using the key password.
PRequestSignature Cryptographic signature of the requesut, using the account password.

Calculating the Key Signature

The signature in PKeySignature is calculated as follows.

  1. Concatenate the strings PUserName ":" Host ":" PLocalName ":" PNamespace ":" PKeyId and call it s1, where Host is the host/domain name of the server. It is taken from the HTTP Host request header, so it must be the same as is used in the URL of the request. PUserName is the name of the account, used when creating the current account or logging in to the current account. PLocalName and PNamespace are the local name and namespace corresponding to the algorithm used for the key.

  2. UTF-8 encode the secret corresponding to the key, and call it Key1.

  3. UTF-8 encode the string s1, and call it Data1.

  4. Calculate the HMAC-SHA256 signature using Key1 and Data1, and call it H1.

  5. Base64-encode H1. The result is the key signature of the request.

Calculating the Request Signature

The signature in PRequestSignature is calculated as follows.

  1. Concatenate the strings s1 ":" PKeySignature ":" PPetitionId ":" PPurpose ":" PLegalId ":" PRemoteId, and call it s2. s1 is the intermediate result of computing the key signature in the previous step.

  2. UTF-8 encode the secret corresponding to the account, and call it Key2.

  3. UTF-8 encode the string s2, and call it Data2.

  4. Calculate the HMAC-SHA256 signature using Key2 and Data2, and call it H2.

  5. Base64-encode H2. The result is the signature of the request.

Javascript Library

Use the following asynchronous method in the Javascript Library, to call this resource. It computes the signatures according to the above specification.

var Response = await AgentAPI.Legal.PetitionPeerReview(LocalName,Namespace,KeyId,KeyPassword,AccountPassword,LegalId,RemoteId,PetitionId,Purpose);
Test










Request Payload:

   

Response Payload: