Skip to main content
Version: Next

Digital Twins & Storage

Data Trust & Security KIT Icon

Connecting with Your Digital Twins

Using Certificates as Digital Twin Components

One of the most powerful features of the Data Trust & Security KIT is that you can attach verifiable credentials directly to your digital twins. This means when someone looks up a product or component in your Digital Twin Registry (DTR), they can immediately see the trust certificates associated with it.

Think of it like attaching a quality certificate to a physical product, except this is digital and cryptographically secured. The implementation follows Digital Twin KIT specification for registry integration and W3C Verifiable Credentials format for the credential structure.

How It Works in Practice

When you register a digital twin, you can include submodels as verifiable credentials. Here's what this looks like technically:

Data Attestation Certificate as Submodel Example

Here’s an example of how a data attestation credential might look as a submodel:

{
"endpoints": [
{
"interface": "SUBMODEL-3.0",
"protocolInformation": {
"href": "https://<edc.dataplane>/api/public/data/urn:uuid:a377ff49-6bde-4215-8d38-b8f02c991a35/credential",
"endpointProtocol": "HTTP",
"endpointProtocolVersion": ["1.1"],
"subprotocol": "DSP",
"subprotocolBody": "id=urn:uuid:3e4a5957-f226-478a-ab18-79ced49d6195;dspEndpoint=https://edc.controlplane/api/v1/dsp",
"subprotocolBodyEncoding": "plain",
"securityAttributes": [
{
"type": "NONE",
"key": "NONE",
"value": "NONE"
}
]
}
}
],
"idShort": "pcfDataAttestation",
"id": "urn:uuid:a377ff49-6bde-4215-8d38-b8f02c991a35",
"semanticId": {
"type": "ExternalReference",
"keys": [
{
"type": "Entity",
"value": "https://www.w3.org/ns/credentials/v2"
},
{
"type": "DataElement",
"value": "https://raw.githubusercontent.com/eclipse-tractusx/tractusx-profiles/refs/heads/main/tx/credentials/schema/context/dac/v1/DataAttestationCredential.jsonld"
},
{
"type": "Submodel",
"value": "urn:samm:io.catenax.pcf:7.0.0#Pcf"
},
{
"type": "Operation",
"value": "https://w3c.github.io/vc-jws-2020/contexts/v1/"
}
]
},
"description": [
{
"language": "en",
"text": "Verifiable Data Attestation Submodel"
}
],
"displayName": []
}
caution

At the moment, this is technically supported but is not fully compliant with the Submodel Service Specification V3.0 READ Profile SSP-003 API specification standard from the IDTA. Verifiable Credentials submodels are currently not compatible with the AASX format, therefore is specified in the href endpoint the path /credential to avoid conflicts. This path needs to be supported by a special submodel service, for example a blob storage or a wallet.

The only requirements is that it must be correctly referenced as an asset at the Connector, and then being linked, via the assetid in the subprotocolBody attribute at the submodel descriptor as described above.

For semantic identification, in order for an application to know that this is a verifiable credential submodel or not, the semanticId must specify from top to down the different metadata abstraction levels. Which describe the type of data which will be retrieved via the Connector dataplane:

  • Which version of verifiable credential in the Entity key.
  • Which type of verifiable credential in the DataElement key.
  • Which aspect model is fully or partially embedded in the verifiable credential using the standard Submodel key
  • Which signature type is used on this verifiable credential in the Operation Key

Below more details can be found.

Semantic ID Configuration

For different submodels, different semantic ID structures are used to identify various aspects and content types:

TypeDescriptionExample
EntityHighest abstraction level indicating credential formathttps://www.w3.org/ns/credentials/v2
DataElementType of verifiable credential/presentation indicated with the urihttps://raw.githubusercontent.com/eclipse-tractusx/tractusx-profiles/refs/heads/main/tx/credentials/schema/context/dac/v1/DataAttestationCredential.jsonld
SubmodelAspect model type and structure referenceurn:samm:io.catenax.pcf:7.0.0#Pcf
OperationSignature type context for verificationhttps://w3c.github.io/vc-jws-2020/contexts/v1/
info

Currently is not defined where to do the hosting JSON-LD @context for the base credentials and the semantic models.

For the moment the base credentials are available at this location eclipse-tractusx/tractusx-profiles/tx/dac/v1/DataAttestationCredential and eclipse-tractusx/tractusx-profiles/tx/aac/v1/AttributeAttestationCredential.

For the semantic models JSON-LD @contexts are currently stored in sldt-semantic-models repository at the gen folder of the PCF v7.0.0, DPP v6.0.0 and CCM 3.1.0 models.

More models JSON-LD @contexts can be generated in the future, and also self-hosted. The only condition is that they MUST be available for the public internet and reachable by data consumers.

Future Work

In the target state it should be resolved with some type of W3C redirection uri like https://w3id.org/tractusx/dac/v1/ and https://w3id.org/tractusx/aac/v1/ for the base credentials

And for the semantic models it could look like this for example (for Catena-X models): https://w3id.org/catenax/vocab/io.catenax.pcf/7.0.0/.

Attestation Processes

Let's analyze what role is the Digital Twin playing in the attestation and verifiable credential creation process:

Attribute Attestation Creation Process

The attribute certification process enables third-party auditors to verify specific attributes within aspect models:

Self-Issued Data Attestation Credential Creation Process

Data providers can self-issue their data by embedding their data into verifiable credentials, and providing this data, at a Digital Twin as any aspect model.

Third Party Data Attestation Credential Creation Process

In this case the verifiable credential would not be issued by the Data Provider but it would be done by the Attestation Provider.

This process is similar to the Attribute Credential Creation, the difference is that the "certification" is done for the complete aspect model payload:

NOTICE

This work is licensed under the CC-BY-4.0.

  • SPDX-License-Identifier: CC-BY-4.0
  • SPDX-FileCopyrightText: 2025 Contributors to the Eclipse Foundation
  • SPDX-FileCopyrightText: 2025 Fujitsu Limited
  • SPDX-FileCopyrightText: 2025 Robert Bosch GmbH
  • SPDX-FileCopyrightText: 2025 Spherity GmbH
  • SPDX-FileCopyrightText: 2025 Schaeffler AG
  • SPDX-FileCopyrightText: 2025 SIEMENS AG
  • SPDX-FileCopyrightText: 2025 Fraunhofer-Gesellschaft zur Foerderung der angewandten Forschung e.V. (represented by Fraunhofer IPK)
  • SPDX-FileCopyrightText: 2025 CGI Deutschland B.V. & Co. KG
  • SPDX-FileCopyrightText: 2025 TÜV SÜD Auto Service GmbH
  • SPDX-FileCopyrightText: 2025 BASF SE
  • SPDX-FileCopyrightText: 2025 BMW AG
  • SPDX-FileCopyrightText: 2025 Cofinity-X GmbH
  • SPDX-FileCopyrightText: 2025 Henkel AG & Co. KGaA
  • Source URL: https://github.com/eclipse-tractusx/eclipse-tractusx.github.io