Overview
The Gaia-X Digital Clearing House provides registry services for verifying Gaia-X ecosystem participants. VCVerifier integrates with these services to validate that credential issuers are compliant Gaia-X participants.Gaia-X Participant Requirements
To be verified through a Gaia-X Registry, issuers must:- Use
did:webmethod only - Other DID methods are not supported - Provide valid
x5ulocation - The DID document must include anx5u(X.509 URL) field in thepublicKeyJwk - Maintain accessible certificate chain - The certificate chain must be available at the
x5uURL - Meet Gaia-X compliance requirements - The participant must fulfill Gaia-X ecosystem standards
Configuration
Basic Configuration
Configure Gaia-X Registry verification for your credential types:Multiple Credential Types
Apply Gaia-X verification to different credential types:Verification Process
The Gaia-X verification process is more complex than EBSI TIR verification due to certificate chain validation:Extract Verification Method
VCVerifier extracts the verification method from the DID document and retrieves the JSON Web Key (JWK)
DID Document Requirements
A valid Gaia-X-compatible DID document must include:The
x5u field is required for Gaia-X verification. Without it, the verification will fail as VCVerifier cannot locate the certificate chain.API Endpoint
The Gaia-X Registry exposes the following endpoint for certificate chain verification:Request Format
Response
- 200 OK: Certificate chain is valid and rooted in a Gaia-X trust anchor
- 400 Bad Request: Invalid request format
- 404 Not Found: Certificate chain cannot be verified
- 500 Internal Server Error: Registry service error
Implementation Details
VCVerifier’s Gaia-X client implements the following logic:Testing Your Configuration
Verify DID Resolution
Test that yourdid:web can be resolved:
Verify Certificate Chain
Test the certificate chain verification:Common Issues
DID Resolution Fails
DID Resolution Fails
Problem: Cannot resolve
did:webSolutions:- Ensure
.well-known/did.jsonis accessible at the correct URL - Check CORS headers if accessing from a browser
- Verify the DID document is valid JSON
- Confirm the server supports HTTPS (required for production
did:web)
Missing x5u Field
Missing x5u Field
Problem: Verification fails with “x5u not found”Solutions:
- Add
x5ufield to thepublicKeyJwkin your DID document - Ensure the certificate chain is accessible at the
x5uURL - Use proper PEM format for certificate chains
Certificate Chain Not Trusted
Certificate Chain Not Trusted
Problem: Registry returns non-200 responseSolutions:
- Verify your certificate chain is rooted in a Gaia-X trust anchor
- Check certificate validity periods
- Ensure proper certificate chain order (leaf → intermediate → root)
- Contact Gaia-X support to register your certificates
Wrong DID Method
Wrong DID Method
Problem: Using
did:key, did:ethr, or other methodsSolution:- Gaia-X Registry only supports
did:web - Convert your issuer to use
did:webmethod - Publish a proper DID document at the web location
Production Considerations
Certificate Management
Obtain Gaia-X Certificates
Work with Gaia-X-approved certificate authorities to obtain compliant certificates
High Availability
- Multiple Certificate Locations: Host certificate chains redundantly
- Registry Fallback: Consider configuring multiple Gaia-X Registry instances
- Error Handling: Implement graceful degradation if registry is unavailable
Registry Endpoints
Use the lab environment for development and testing. Only move to production endpoints after thorough testing and certification.
Comparison: Gaia-X vs EBSI TIR
| Feature | Gaia-X Registry | EBSI TIR |
|---|---|---|
| DID Methods | Only did:web | All methods |
| Verification Method | Certificate chain | DID registry lookup |
| Additional Requirements | x5u in JWK | None |
| Certificate Management | Required | Not required |
| Setup Complexity | Higher | Lower |
| Use Case | Gaia-X ecosystem | General SSI |
Next Steps
Mixed Usage
Combine Gaia-X with EBSI TIR
Overview
Back to trust anchors overview