Description
Inside the eNotary software, a notary must be able to sign a newly generated key binding certificate. This allows a fresh cryptographic key to be officially bound and attested by the notary, establishing trust for downstream consumers of the certificate (e.g. eID wallets, eVault access).
Reference
- Related to the eID Wallet passphrase-free recovery flow (see companion issue).
Acceptance Criteria
Desired Output (may vary)
A notary successfully signs a new key binding certificate within eNotary, producing a verifiable artefact that can be used to bind a new key to an identity.
Description
Inside the eNotary software, a notary must be able to sign a newly generated key binding certificate. This allows a fresh cryptographic key to be officially bound and attested by the notary, establishing trust for downstream consumers of the certificate (e.g. eID wallets, eVault access).
Reference
Acceptance Criteria
Desired Output (may vary)
A notary successfully signs a new key binding certificate within eNotary, producing a verifiable artefact that can be used to bind a new key to an identity.