| Internet-Draft | FideX AS5 Protocol | March 2026 |
| Munoz | Expires 17 September 2026 | [Page] |
This document specifies the FideX Protocol (AS5), a modern application-layer protocol for secure Business-to-Business (B2B) message exchange. FideX provides cryptographic non-repudiation, data integrity, and confidentiality using JOSE (JSON Object Signing and Encryption) over HTTPS, replacing legacy AS2 and AS4 standards with a REST-oriented approach accessible to modern web developers.¶
FideX adopts the "AS" naming lineage: AS2 ([RFC4130]) used S/MIME over HTTP; AS4 ([OASIS-ebMS]) used SOAP/WS-Security; AS5 (FideX) uses REST/JSON/JOSE over HTTPS. This document defines the message format, cryptographic operations, partner discovery, state management, acknowledgment receipts (J-MDN), and error handling.¶
This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79. This document is a work in progress and represents the current thinking of the FideX Protocol Working Group at Greicodex Software.¶
This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.¶
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.¶
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."¶
This Internet-Draft will expire on 17 September 2026.¶
Copyright (c) 2026 IETF Trust and the persons identified as the document authors. All rights reserved.¶
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document.¶
FideX (Fast Integration for Digital Enterprises eXchange) defines a secure, reliable message exchange protocol for B2B electronic data interchange. The protocol ensures:¶
This specification defines:¶
This specification does NOT define:¶
FideX adopts the "AS" (Application Statement) naming lineage from established B2B interchange standards:¶
The designation signals evolutionary continuity while marking a generational leap to modern web-native architecture. AS5 is implementable by any developer with knowledge of REST APIs and standard JOSE libraries, without requiring specialized B2B middleware.¶
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here.¶
Additional terms used in this document:¶
Nodes MUST support HTTP/1.1 over TLS 1.3 as defined in [RFC8446]. TLS 1.2 ([RFC5246]) MAY be supported with Perfect Forward Secrecy (ECDHE key exchange) as fallback for backward compatibility.¶
Transport requirements:¶
Nodes MAY additionally support:¶
All FideX message transmissions MUST use the HTTP POST method to the receiving endpoint specified in the partner's AS5 configuration (see Section 6).¶
FideX message envelopes MUST use Content-Type: application/json.
Registration requests MUST use Content-Type: application/jose
(see Section 6.3).¶
Implementations MUST accept messages up to 10 megabytes (complete HTTP request body).
Implementations MAY accept larger messages by prior bilateral agreement.
Senders MUST NOT assume support above 10 MB without prior explicit agreement.
Implementations SHOULD reject oversized messages with HTTP 413 and the error
code PAYLOAD_TOO_LARGE (see Section 8.3).¶
A FideX message envelope consists of exactly two top-level JSON fields:¶
{
"routing_header": { ... },
"encrypted_payload": "eyJhbGc..."
}
¶
The routing_header is cleartext JSON containing message metadata
readable by intermediate infrastructure without decryption. The
encrypted_payload is a JWE compact serialization that wraps the
signed business document. These two fields are the ONLY top-level fields
in a FideX message envelope.¶
The routing header is a cleartext JSON object conveying message routing metadata. It MUST contain the following fields:¶
^[A-Z0-9_]+$. See Section 3.3.¶
YYYY-MM-DDTHH:mm:ss.SSSZ. The UTC designator "Z" MUST
be used; no local timezone offsets are permitted.¶
receive_receipt endpoint from the
sender's AS5 configuration (see Section 7.3.5).¶
encrypted_payload field
value. Computed as "sha256:" followed by the lowercase hexadecimal encoding
of SHA-256 applied to the UTF-8 byte representation of the
encrypted_payload string as it appears in the JSON envelope.
Enables routing-layer integrity checks without decryption.¶
Extension fields MAY be included and MUST use the prefix "x-" to avoid collision with future standard fields. Implementations MUST ignore unknown extension fields without error.¶
The sender_id and receiver_id fields MUST use URN format.
The following URN namespaces are recognized:¶
The document_type field uses a two-tier naming system to accommodate
both standardized inter-organization document types and organization-specific
custom types.¶
The following standard document types are defined by the FideX Working Group.
Standard types use uppercase alphanumeric characters and underscores, matching
the pattern ^[A-Z0-9_]+$. GS1 document types are defined in
[GS1-JSON].¶
| Type Identifier | Standard | Description |
|---|---|---|
| GS1_ORDER_JSON | GS1 | Purchase order (JSON binding) |
| GS1_INVOICE_JSON | GS1 | Commercial invoice (JSON binding) |
| GS1_DESADV_JSON | GS1 | Despatch advice (JSON binding) |
| GS1_RECADV_JSON | GS1 | Receiving advice (JSON binding) |
| GS1_CATALOG_JSON | GS1 | Product catalog (JSON binding) |
| X12_850 | ANSI X12 | Purchase order |
| X12_810 | ANSI X12 | Invoice |
| X12_856 | ANSI X12 | Advance ship notice |
| EDIFACT_ORDERS | UN/EDIFACT | Purchase order message |
| EDIFACT_INVOIC | UN/EDIFACT | Invoice message |
| EDIFACT_DESADV | UN/EDIFACT | Despatch advice message |
| UBL_ORDER_21 | OASIS UBL 2.1 | Order document |
| UBL_INVOICE_21 | OASIS UBL 2.1 | Invoice document |
Organizations MAY define custom document types using reverse domain notation to avoid collision with standard types and with other organizations' custom types.¶
Custom types MUST follow the pattern: {TLD}_{ORG}_{DOCTYPE}_{VERSION},
for example: COM_ACME_WAREHOUSE_RECEIPT_V2.¶
Custom types MUST NOT use the reserved prefixes: GS1_,
X12_, EDIFACT_, or UBL_.¶
Receiver nodes:¶
The encrypted_payload field contains a JWE (JSON Web Encryption)
token in compact serialization as defined in [RFC7516]. The
JWE encrypts a JWS (JSON Web Signature) token as defined in
[RFC7515], creating a nested "sign-then-encrypt" structure:¶
JWE( JWS( business_document ) )¶
This pattern ensures both authenticity (the signature is inside the encryption envelope, protecting it from substitution) and confidentiality (the business content is encrypted end-to-end).¶
Messages MUST be signed using the sender's private key before encryption.¶
The REQUIRED signing algorithm is RS256 (RSASSA-PKCS1-v1_5 with SHA-256) as defined in [RFC7518].¶
The following signing algorithms are OPTIONAL:¶
Minimum key sizes: 2048 bits for RSA (4096 bits RECOMMENDED); P-256 minimum for ECDSA (P-384 RECOMMENDED).¶
The JWS Protected Header MUST include:¶
{
"alg": "RS256",
"kid": "{sender-key-id}"
}
¶
Signed messages MUST be encrypted using the receiver's public key.¶
The REQUIRED algorithms are:¶
The JWE Protected Header MUST include:¶
{
"alg": "RSA-OAEP",
"enc": "A256GCM",
"cty": "JWT",
"kid": "{receiver-key-id}"
}
¶
The cty (content type) header parameter MUST be set to "JWT" to indicate
the JWE payload contains a nested JWS/JWT token, per [RFC7516]
Section 4.1.12. This is required for correct processing of nested tokens.¶
The JWS payload MUST be the UTF-8 encoding of the JSON-serialized business document. Binary payloads (images, PDFs, etc.) MUST be base64-encoded before JWS signing.¶
Receivers MUST verify that the JWS signing key identified by kid in the
JWS header belongs to the partner identified by sender_id in the routing
header. Specifically:¶
kid MUST resolve to a public key in the sender's JWKS.¶
public_domain associated
with the sender_id in the local partner registry.¶
This prevents cross-partner key substitution attacks where an attacker uses a valid key from one partner to impersonate another.¶
Nodes MUST publish their public keys via a JWKS endpoint at the well-known URI:¶
https://{public_domain}/.well-known/jwks.json
¶
This endpoint:¶
Per [RFC7517], keys MUST include at minimum the following fields. An RSA signing key example:¶
{
"keys": [
{
"kty": "RSA",
"use": "sig",
"kid": "acme-sign-rsa-2026-01",
"alg": "RS256",
"n": "{base64url-encoded-modulus}",
"e": "AQAB"
}
]
}
¶
An EC signing key example:¶
{
"keys": [
{
"kty": "EC",
"use": "sig",
"kid": "acme-sign-ec-2026-01",
"alg": "ES256",
"crv": "P-256",
"x": "{base64url-x-coordinate}",
"y": "{base64url-y-coordinate}"
}
]
}
¶
Field semantics:¶
Implementations SHOULD rotate keys annually. During rotation, the following procedure MUST be followed to ensure uninterrupted partner communication:¶
The kid value SHOULD encode the purpose and date to aid key management,
e.g., "org-sign-rsa-2026-01".¶
Partner discovery enables automated trading partner onboarding without manual certificate exchange. The process consists of four phases:¶
The AS5 configuration URL MAY be distributed via QR code, email, or a trading partner portal. The protocol is designed so that scanning a QR code initiates fully automated mutual trust establishment.¶
Nodes MUST expose an AS5 configuration document at an HTTPS URL. This URL:¶
The AS5 configuration document structure:¶
{
"fidex_version": "1.0",
"supported_versions": ["1.0"],
"conformance_profile": "core",
"node_id": "urn:gln:1234567890123",
"organization_name": "Example Corp",
"public_domain": "fidex.example.com",
"supported_document_types": ["GS1_ORDER_JSON", "GS1_INVOICE_JSON"],
"endpoints": {
"receive_message": "https://fidex.example.com/api/v1/receive",
"receive_receipt": "https://fidex.example.com/api/v1/receipt",
"register": "https://fidex.example.com/api/v1/register",
"jwks": "https://fidex.example.com/.well-known/jwks.json"
},
"security": {
"signature_algorithm": "RS256",
"encryption_algorithm": "RSA-OAEP",
"content_encryption": "A256GCM",
"minimum_key_size": 2048
}
}
¶
Required fields in the AS5 configuration:¶
When two nodes with different supported versions communicate, the sender MUST:¶
supported_versions from their AS5 configuration.¶
supported_versions arrays.¶
fidex_version in the routing header to the negotiated version.¶
The receiver MUST reject messages with a fidex_version not present in its
supported_versions.¶
If no common version exists, the sender MUST NOT transmit and SHOULD report an incompatibility error to the local system.¶
The four-phase discovery handshake proceeds as follows:¶
Phase 1 -- Initiator Discovers Responder:¶
Phase 2 -- Initiator Registers:¶
The initiator constructs and submits a signed registration payload:¶
{
"fidex_version": "1.0",
"initiator_node_id": "urn:gln:...",
"initiator_as5_config_url": "https://...",
"security_token": "...",
"timestamp": "2026-03-09T19:00:00.000Z"
}
¶
register endpoint with
Content-Type: application/jose.¶
Phase 3 -- Responder Validates:¶
Phase 4 -- Completion:¶
Registration requests MUST:¶
Content-Type: application/jose.¶
Security tokens MUST contain at least 128 bits of entropy, generated using a cryptographically secure pseudo-random number generator (CSPRNG). Examples: UUID v4, 32 hexadecimal characters, or 22 base64url characters.¶
Responders MUST:¶
De-registration is a local, unilateral operation. There is no protocol-level de-registration handshake.¶
Partner states:¶
| State | Description |
|---|---|
| ACTIVE | Normal operation -- messages accepted |
| SUSPENDED | Temporarily paused -- messages rejected with HTTP 503 |
| INACTIVE | De-registered -- messages rejected with HTTP 401 |
De-registration procedure:¶
Messages transition through the following states:¶
| State | Description |
|---|---|
| QUEUED | Created locally, awaiting transmission |
| SENT | Transmitted to receiver, awaiting J-MDN receipt |
| DELIVERED | J-MDN received and cryptographically verified |
| FAILED | Permanent failure or maximum retries exceeded |
Upon receiving a message, nodes MUST perform structural validation and return:¶
HTTP 202 indicates structural acceptance only. It does NOT indicate successful decryption, business document processing, or J-MDN generation.¶
Idempotency: Receivers MUST handle duplicate message_id
values idempotently. If a receiver encounters a message_id it has already
accepted, it MUST return HTTP 202 again and MUST NOT process the message a second
time. This ensures safe sender retries when HTTP responses are lost.¶
The J-MDN (JSON Message Disposition Notification) is the legally most significant artifact in the FideX protocol. It provides cryptographic proof that a specific message was received, decrypted, and accepted or rejected by the trading partner.¶
After processing a message, the receiver MUST send a J-MDN to the sender. The delivery target is determined as follows:¶
receipt_webhook is present in the routing header, deliver to that URL.¶
receive_receipt endpoint from the sender's AS5 configuration.¶
The J-MDN JSON object contains the following fields:¶
message_id from the original message's routing_header.¶
receiver_id in the original routing_header.¶
Positive J-MDN example (DELIVERED):¶
{
"original_message_id": "fdx-a1b2c3d4-e5f6-7890-abcd-ef1234567890",
"status": "DELIVERED",
"receiver_id": "urn:gln:9876543210987",
"hash_verification": "sha256:9f86d08...b0f00a08",
"timestamp": "2026-03-09T19:30:02.000Z",
"error_log": null,
"signature": "eyJhbGciOiJSUzI1NiIs..."
}
¶
Negative J-MDN example (FAILED):¶
{
"original_message_id": "fdx-a1b2c3d4-e5f6-7890-abcd-ef1234567890",
"status": "FAILED",
"receiver_id": "urn:gln:9876543210987",
"hash_verification": "sha256:0000...0000",
"timestamp": "2026-03-09T19:30:02.000Z",
"error_log": {
"error_code": "DECRYPTION_FAILED",
"error_message": "Unable to decrypt payload",
"details": "Key ID mismatch"
},
"signature": "eyJhbGciOiJSUzI1NiIs..."
}
¶
The hash_verification field proves that the receiver decrypted exactly
the payload the sender signed.¶
Definition:¶
hash_verification =
"sha256:" || hex( SHA-256( raw_business_payload_bytes ) )
¶
Where raw_business_payload_bytes is the UTF-8 encoded bytes of the
business JSON payload BEFORE JWS signing (i.e., the exact cleartext that was
the input to the JWS sign operation).¶
When status is "FAILED" and the receiver could NOT decrypt the
payload, hash_verification MUST be set to a string of 64 zero
hex digits: "sha256:" followed by 64 ASCII "0" characters.¶
The signature field MUST contain a JWS compact serialization covering
all other J-MDN fields (i.e., all fields except signature itself).¶
JWS Protected Header for J-MDN signing:¶
{
"alg": "RS256",
"kid": "{receiver-signing-key-id}"
}
¶
Signing procedure:¶
signature.¶
signature to the resulting JWS compact serialization.¶
Verification procedure (sender side):¶
When status is "FAILED", the error_log object MUST contain:¶
| Code | Description |
|---|---|
| DECRYPTION_FAILED | Cannot decrypt JWE (wrong key or corrupted ciphertext) |
| SIGNATURE_INVALID | JWS signature verification failed |
| UNKNOWN_DOCUMENT_TYPE | The document_type is not supported by the receiver |
| PAYLOAD_TOO_LARGE | Message exceeds receiver's processing limits |
| INTERNAL_ERROR | Receiver encountered an internal processing error |
The J-MDN is delivered via HTTP POST:¶
POST {receipt_webhook} HTTP/1.1
Host: {sender_host}
Content-Type: application/json
X-FideX-Original-Message-ID: {original_message_id}
{J-MDN JSON body}
¶
Expected response:¶
{
"receipt_acknowledged": true
}
¶
Timing requirements:¶
If the J-MDN delivery endpoint is unreachable, the receiver SHOULD retry according to the following schedule:¶
After 5 failed attempts, the receiver SHOULD log the failure and store the J-MDN for manual retrieval. The J-MDN MUST NOT be discarded.¶
Senders SHOULD retry failed transmissions with exponential backoff:¶
After 5-6 failed attempts, the message SHOULD transition to FAILED state requiring manual operator intervention.¶
| Code | Meaning | Sender Action |
|---|---|---|
| 202 | Accepted for processing | Wait for J-MDN |
| 400 | Invalid message structure | Do not retry (permanent error) |
| 401 | Authentication failed or partner INACTIVE | Do not retry (permanent error) |
| 413 | Payload too large | Do not retry (permanent error) |
| 429 | Rate limit exceeded | Retry with backoff; honor Retry-After header |
| 500 | Server internal error | Retry with backoff |
| 503 | Service unavailable or partner SUSPENDED | Retry with backoff |
Implementations SHOULD include a Retry-After header on HTTP 429 responses,
per [RFC9110] Section 10.2.3.¶
All error responses MUST use the following JSON structure:¶
{
"error": {
"code": "INVALID_ROUTING_HEADER",
"message": "Missing required field: message_id",
"timestamp": "2026-03-09T19:00:00.000Z"
}
}
¶
Message transmission errors:¶
INVALID_ROUTING_HEADER -- Missing or malformed routing header¶
UNKNOWN_RECEIVER -- receiver_id not recognized in partner registry¶
UNKNOWN_DOCUMENT_TYPE -- document_type not supported¶
PAYLOAD_TOO_LARGE -- Message exceeds the 10 MB size limit¶
Cryptographic errors:¶
DECRYPTION_FAILED -- Cannot decrypt JWE¶
SIGNATURE_INVALID -- JWS signature verification failed¶
UNKNOWN_KEY_ID -- Key ID not found in JWKS¶
Discovery errors:¶
FideX addresses the following threats:¶
Implementations MUST:¶
Implementations SHOULD:¶
use values).¶
Private keys:¶
Public keys:¶
FideX is designed to support compliance with:¶
Recommended audit trail retention periods:¶
FideX is designed to operate on standard web infrastructure. A conforming node can be implemented as a standard HTTPS web application behind any reverse proxy (Nginx, Apache, Caddy, cloud load balancers). No specialized B2B middleware, message broker, or gateway software is required. This is a key differentiator from AS2 (which required dedicated gateway software) and AS4 (which required SOAP stacks and ebMS processing engines).¶
This document has no IANA actions.¶
The following illustrates a complete FideX message exchange.¶
HTTP request (sender to receiver):¶
POST /api/v1/receive HTTP/1.1
Host: partner.example.com
Content-Type: application/json
{
"routing_header": {
"fidex_version": "1.0",
"message_id": "fdx-a1b2c3d4-e5f6-7890-abcd-ef1234567890",
"sender_id": "urn:gln:1234567890123",
"receiver_id": "urn:gln:9876543210987",
"document_type": "GS1_ORDER_JSON",
"timestamp": "2026-03-09T19:30:00.000Z",
"receipt_webhook": "https://sender.example.com/api/v1/receipt"
},
"encrypted_payload": "eyJhbGciOiJSU0EtT0FFUCIs..."
}
¶
HTTP 202 response (receiver accepts):¶
{
"status": "accepted",
"message_id": "fdx-a1b2c3d4-e5f6-7890-abcd-ef1234567890",
"timestamp": "2026-03-09T19:30:00.500Z"
}
¶
J-MDN receipt (receiver delivers to sender's webhook):¶
POST /api/v1/receipt HTTP/1.1
Host: sender.example.com
Content-Type: application/json
X-FideX-Original-Message-ID: fdx-a1b2c3d4-e5f6-7890-abcd-ef1234567890
{
"original_message_id": "fdx-a1b2c3d4-e5f6-7890-abcd-ef1234567890",
"status": "DELIVERED",
"receiver_id": "urn:gln:9876543210987",
"hash_verification": "sha256:9f86d08...b0f00a08",
"timestamp": "2026-03-09T19:30:02.000Z",
"error_log": null,
"signature": "eyJhbGciOiJSUzI1NiIs..."
}
¶
FideX defines three conformance profiles to enable progressive adoption.
Implementations MUST declare which profile(s) they conform to via the
conformance_profile field in their AS5 configuration.¶
An implementation claiming FideX Core conformance MUST support all requirements listed in Sections 2 through 8 of this specification, including:¶
An implementation claiming FideX Enhanced conformance MUST satisfy FideX Core AND additionally support:¶
An implementation claiming FideX Edge conformance MUST satisfy FideX Enhanced AND additionally support:¶
This appendix provides known-answer test vectors to allow implementers to verify their JOSE cryptographic operations produce correct output.¶
WARNING: The key material in this appendix is public and MUST NOT be used for any production traffic.¶
Test payload (UTF-8 bytes):¶
{"order_id":"PO-TEST-001","amount":100.00,"currency":"USD"}
¶
SHA-256 hash of test payload:¶
sha256: bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f9a69e4c98b7b0f09cb281e71¶
Expected JWS header for signing:¶
{"alg":"RS256","kid":"test-sign-2026-01"}
¶
Expected JWE header for encryption:¶
{
"alg": "RSA-OAEP",
"enc": "A256GCM",
"cty": "JWT",
"kid": "test-enc-2026-01"
}
¶
Test routing header:¶
{
"fidex_version": "1.0",
"message_id": "fdx-00000000-0000-0000-0000-000000000001",
"sender_id": "urn:gln:0000000000001",
"receiver_id": "urn:gln:0000000000002",
"document_type": "GS1_ORDER_JSON",
"timestamp": "2026-01-01T00:00:00.000Z",
"receipt_webhook": "https://test.sender.example.com/receipt"
}
¶
Verification procedure:¶
The following JSON Schema (Draft-07) definitions provide machine-readable validation rules for FideX structures.¶
{
"$schema": "http://json-schema.org/draft-07/schema#",
"$id": "https://fidex-protocol.org/schemas/v1/routing-header.json",
"title": "FideX Routing Header",
"type": "object",
"required": [
"fidex_version", "message_id", "sender_id",
"receiver_id", "document_type", "timestamp"
],
"additionalProperties": true,
"properties": {
"fidex_version": {
"type": "string", "pattern": "^\\d+\\.\\d+$"
},
"message_id": {
"type": "string", "minLength": 1, "maxLength": 256
},
"sender_id": {
"type": "string",
"pattern": "^urn:(gln|duns|lei|tin|custom):.+$"
},
"receiver_id": {
"type": "string",
"pattern": "^urn:(gln|duns|lei|tin|custom):.+$"
},
"document_type": {
"type": "string", "pattern": "^[A-Z0-9_]+$",
"minLength": 1, "maxLength": 128
},
"timestamp": { "type": "string", "format": "date-time" },
"receipt_webhook": {
"type": "string", "format": "uri",
"pattern": "^https://"
},
"payload_digest": {
"type": "string",
"pattern": "^sha256:[a-f0-9]{64}$"
}
},
"patternProperties": { "^x-": {} }
}
¶
{
"$schema": "http://json-schema.org/draft-07/schema#",
"$id": "https://fidex-protocol.org/schemas/v1/jmdn.json",
"title": "FideX J-MDN",
"type": "object",
"required": [
"original_message_id", "status", "receiver_id",
"hash_verification", "timestamp", "error_log", "signature"
],
"additionalProperties": false,
"properties": {
"original_message_id": { "type": "string", "minLength": 1 },
"status": {
"type": "string", "enum": ["DELIVERED", "FAILED"]
},
"receiver_id": {
"type": "string",
"pattern": "^urn:(gln|duns|lei|tin|custom):.+$"
},
"hash_verification": {
"type": "string",
"pattern": "^sha256:[a-f0-9]{64}$"
},
"timestamp": { "type": "string", "format": "date-time" },
"error_log": {
"oneOf": [
{ "type": "null" },
{
"type": "object",
"required": ["error_code", "error_message"],
"properties": {
"error_code": {
"type": "string",
"enum": [
"DECRYPTION_FAILED",
"SIGNATURE_INVALID",
"UNKNOWN_DOCUMENT_TYPE",
"PAYLOAD_TOO_LARGE",
"INTERNAL_ERROR"
]
},
"error_message": { "type": "string" },
"details": { "type": "string" }
}
}
]
},
"signature": { "type": "string", "minLength": 1 }
}
}
¶
{
"$schema": "http://json-schema.org/draft-07/schema#",
"$id": "https://fidex-protocol.org/schemas/v1/as5-config.json",
"title": "FideX AS5 Configuration",
"type": "object",
"required": [
"fidex_version", "supported_versions", "node_id",
"organization_name", "public_domain",
"endpoints", "security"
],
"properties": {
"fidex_version": {
"type": "string", "pattern": "^\\d+\\.\\d+$"
},
"supported_versions": {
"type": "array",
"items": { "type": "string" },
"minItems": 1
},
"conformance_profile": {
"type": "string",
"enum": ["core", "enhanced", "edge"]
},
"node_id": { "type": "string", "pattern": "^urn:" },
"organization_name": { "type": "string", "minLength": 1 },
"public_domain": { "type": "string" },
"supported_document_types": {
"type": "array",
"items": {
"type": "string", "pattern": "^[A-Z0-9_]+$"
}
},
"endpoints": {
"type": "object",
"required": [
"receive_message", "receive_receipt",
"register", "jwks"
],
"properties": {
"receive_message": { "type": "string", "format": "uri" },
"receive_receipt": { "type": "string", "format": "uri" },
"register": { "type": "string", "format": "uri" },
"jwks": { "type": "string", "format": "uri" }
}
},
"security": {
"type": "object",
"required": [
"signature_algorithm", "encryption_algorithm",
"content_encryption", "minimum_key_size"
],
"properties": {
"signature_algorithm": { "type": "string" },
"encryption_algorithm": { "type": "string" },
"content_encryption": { "type": "string" },
"minimum_key_size": {
"type": "integer", "minimum": 2048
}
}
}
}
}
¶