You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+2Lines changed: 2 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -149,3 +149,5 @@ GitHub may be utilized for version control; however, code should be treated as a
149
149
In accordance with the [deployEMDS Information Security Policy](https://acatechev.sharepoint.de/:b:/r/sites/EuropeanMobilityDataSpaceDeploymentConsortiumspace/Freigegebene%20Dokumente/General/07_Security%20Policy/2024-02-16%20Information%20security%20policy_DeployEMDS_V1.5_CLEAN.pdf?csf=1&web=1&e=SwIPb1), section 7.1 "Information asset protection responsibility," we are required to evaluate all information assets used or created during the project. This evaluation should adhere to the checklist provided in the risk assessment template (Annex 1, pp. 15) . The Security Advisory Board (SAB) and Project Security Officer (PSO) should only be consulted if information security concerns arise, such as when any question on the checklist is answered affirmatively.
150
150
151
151
This process ensures compliance with our security protocols and safeguards the intellectual property and sensitive information.
152
+
153
+
Please note: secret keys have been redacted in this repository and must be replaced with user-provided keys to ensure functionality.
Copy file name to clipboardExpand all lines: tests/README.md
+2Lines changed: 2 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,3 +19,5 @@ Definitions and deliverables and are organized in a tree that reflects the proje
19
19
```
20
20
21
21
The structure will be used to implement comparative reviews to align the results of testing facilities. For this reason, it is advisable to follow the publication guidelines, although improvements are always welcome, and they can be requested via issues.
22
+
23
+
Please notice: any secret keys have been intentionally redacted and will need to be replaced by user-provided keys to ensure functionality
│ {"level":"info","msg":"First Value is [http://tir-ta.fiwareconnector.de]","time":"2024-08-14T10:51:39Z"} │
83
-
│ {"level":"debug","msg":"Check if a participant did:key:zDnaehyDsm7rkbt3t1wqYZm7vAyaEt83EZtnSF35tpXuGNgQu is trusted through http://tir-ta.fiwareconnector.de.","time":"2024-08-14T10:51:39Z"} │
│ {"level":"debug","msg":"Issuer did:key:zDnaehyDsm7rkbt3t1wqYZm7vAyaEt83EZtnSF35tpXuGNgQu response from http://tir-ta.fiwareconnector.de is 200","time":"2024-08-14T10:51:39Z"} │
86
-
│ {"level":"debug","msg":"Issuer did:key:zDnaehyDsm7rkbt3t1wqYZm7vAyaEt83EZtnSF35tpXuGNgQu is a trusted participant via http://tir-ta.fiwareconnector.de.","time":"2024-08-14T10:51:39Z"} │
83
+
│ {"level":"debug","msg":"Check if a participant did:key:REDACTED is trusted through http://tir-ta.fiwareconnector.de.","time":"2024-08-14T10:51:39Z"} │
│ {"level":"debug","msg":"No forbidden claim found for subject {}. Checked config was {\"validFor\":{\"from\":\"\",\"to\":\"\"},\"credentialsType\":\"\",\"claims\":null}.","time":"2024-08 │
│ {"level":"info","msg":"Generated and signed token: {Bearer 1800 eyJhbGciOiJSUzI1NiIsImtpZCI6Ik1pdWlSS1VrU3VVcTc2QzVXQTZNTTdITDN6WWl4b04zeEZSOXNTcHljenciLCJ0eXAiOiJKV1QifQ.eyJhdWQiOlsiZG │
Copy file name to clipboardExpand all lines: tests/participant_onboarding/certification/identity_and_credentials_issuance/test_1_3_1_1a/result_edc_vc.md
0 commit comments