Compliance & standards

Every specification Tessaliq implements, with a link to its public version, along with the external test results that are publicly verifiable.

Architectural rationale — verify, never store

Tessaliq is built on one invariant: the verifier never stores personal identity data. Not a hashed copy, not a derivative, not a « just in case » cache. The verifier receives a cryptographic presentation from the wallet, checks it against the policy, issues a signed receipt, and discards the presentation contents.

This is a deliberate design choice, not a feature. A single server-side database containing identifying information is, by construction, a single point of breach. When it is compromised, every record held in it is exposed at once — the operator did not need to misuse the data, the attacker did it for them. Every quarter brings a new example. The architectural response is to not build the database in the first place.

An EUDI-wallet-based verifier eliminates that vector. There is no central identity database to breach at Tessaliq. The user's credential stays in their wallet; only the derived attribute required by the Relying Party (for example age_over_18: true) crosses the network; the signed receipt seals the verification fact without the identifying payload. A compromise of the verifier leaks at most the policy catalog and session metadata (IDs, timestamps) — none of which identify a user.

The same property enables offline receipt verification: any third party can audit a receipt via the public JWKS, without access to a centralized identity store. See the interactive verifier to try it.

Protocols

Credential formats

Cryptography

OpenID Foundation conformance

All plans are immutable and publicly accessible on the OpenID Foundation certification site. Clicking a plan opens the full module list with pass/fail status per module.

Plan Variant Modules Date Result
5aFYJit3kprXb SD-JWT-VC · x509_san_dns · direct_post.jwt 9 / 9 2026-05-08 PASSED (0 warning)
rz4Ujw1pW3xqr SD-JWT-VC · x509_hash · HAIP 1.0 Final 9 / 9 2026-05-08 PASSED (0 warning)
nZ7MhdlPtgGZB mdoc · x509_san_dns · direct_post.jwt 3 / 3 2026-05-08 PASSED (0 warning)
1ZwKwsWTb9Ed6 mdoc · x509_hash · HAIP 1.0 Final 3 / 3 2026-05-14 PASSED (0 warning)

Total: 24/24 modules passed, zero warning, covering the 2×2 matrix SD-JWT-VC + mdoc × standard + HAIP.

Self-certification statement

The OpenID Foundation launched self-certification for OpenID4VP 1.0, OpenID4VCI 1.0 and HAIP 1.0 on 26 February 2026. Tessaliq self-certifies conformance against the four plans listed above. The plans are immutable and independently verifiable on the OpenID Foundation test platform — anyone can click a plan link, read the module list, and confirm pass/fail status without contacting us.

Tessaliq has not submitted the plans for Foundation review yet (that step involves a per-specification fee and is planned post-SASU incorporation). The self-certification claim stands on the publicly verifiable immutable plans themselves.

Receipt verification

Every verification returns a signed JWT receipt that can be checked cryptographically by any third party — an auditor, a Relying Party, a regulator — using only the public JWKS endpoint. No need to call the Tessaliq API.

Purpose & legal basis declarations (DPV)

Every Tessaliq verification policy carries a machine-readable W3C Data Privacy Vocabulary declaration: purpose, legal basis, retention. The declaration is exposed on GET /v1/policies so auditors can discover the privacy posture of every policy without running the verifier, and embedded as JSON-LD in every signed receipt so the posture is cryptographically attested per verification — not a free-text promise on a privacy page.

Tessaliq defaults: retention P0D (zero retention by design), legal basis LegalObligation (the relying party tells the verifier which obligation it acts under — typically ARCOM SREN for age verification, or AMLR Art. 24 for identity). Relying parties can override by configuring the policy.

Regulatory frameworks

External contributions

ENISA public consultation on the EUDIW Cybersecurity Certification Scheme — position paper submitted 2026-04-17 on the draft scheme v0.4.614 and the security requirements v0.5.614 (deadline 30 April 2026). Three recommendations around the scope exclusion of relying parties (Annex X, Note X.2.1, p. 91) and the collusion threat (TR84).