# Parties

{% hint style="info" %}
***This page must be considered part of the iSHARE Framework***

*This page is considered normative and is therefore compliant with RFC 2119.*
{% endhint %}

## Lists and searches parties

> Search for participant information from your Participant Registry. Various search parameters are supported as shown below. When results are more then 10 participants, pagination is used in response and each page contains up to 10 participants.\
> Server response is an iSHARE signed JSON Web Token. Please refer to the models 'jwt\_header' and 'jwt\_payload\_party\_token' which indicate what the decoded response will look like.

```json
{"openapi":"3.0.0","info":{"title":"generic iSHARE API specifications","version":"2.1.1"},"tags":[{"name":"Participant Registry","description":"Endpoints that form the iSHARE Participant Registry API specification."}],"servers":[{"description":"iSHARE UAT network base domain","url":"https://isharetest.net"},{"description":"iSHARE TEST network base domain","url":"https://test.ishareworks.nl"}],"security":[{"BearerAuth":[]}],"components":{"securitySchemes":{"BearerAuth":{"type":"http","scheme":"bearer","description":"OAuth 2.0 authorization based on bearer token. MUST contain “Bearer “ + access token value. Must be provided if restricted endpoints are needed."}},"schemas":{"PartiesResponse":{"title":"PartiesResponse","type":"object","properties":{"parties_token":{"type":"string","format":"application/jwt"}}}}},"paths":{"/[v2.1.1]/parties":{"get":{"tags":["Participant Registry"],"parameters":[{"style":"form","explode":true,"name":"active_only","description":"Optional parameter used to search by party's  \"Active\" status.","schema":{"type":"boolean"},"in":"query"},{"style":"form","explode":true,"name":"name","description":"Optional parameter used to search by party's name. Can contain a single * as wildcard.","schema":{"type":"string"},"in":"query"},{"style":"form","explode":true,"name":"id","description":"Optional parameter used to search a party by party's id. Can contain a single * as wildcard. It searches through the id and alsoKnownAs array  for matching id. ","schema":{"type":"string"},"in":"query"},{"style":"form","explode":true,"name":"eori","description":"Optional parameter used to search by party's EORI. Can contain a single * as wildcard. It searches through the id and alsoKnownAs array  for matching eori. This parameter must be considered deprecated and will be removed in future releases.","schema":{"type":"string"},"in":"query"},{"style":"form","explode":true,"name":"certified_only","description":"Search for parties that play one of the certified roles as defined in iSHARE role framework.","schema":{"type":"boolean"},"in":"query"},{"style":"form","explode":true,"name":"date_time","description":"Search parties with specific adherence date","schema":{"format":"date-time","type":"string"},"in":"query"},{"style":"form","explode":true,"name":"adherenceStatus","description":"Search for parties with adherence status like \"Active\", \"Revoked\",\"Not Active\", \"Pending\"","schema":{"type":"string"},"in":"query"},{"style":"form","explode":true,"name":"adherenceStartdate","description":"Search parties with specific adherence start date","schema":{"format":"date-time","type":"string"},"in":"query"},{"style":"form","explode":true,"name":"adherenceEnddate","description":"Search parties with specific adherence end date","schema":{"format":"date-time","type":"string"},"in":"query"},{"style":"form","explode":true,"name":"registrarPartyId","description":"Search parties by their registrar Participant Registry's ID number","schema":{"type":"string"},"in":"query"},{"style":"form","explode":true,"name":"webSiteUrl","description":"Search a party by their website URL","schema":{"type":"string"},"in":"query"},{"style":"form","explode":true,"name":"companyEmail","description":"Search a party by their email ID","schema":{"type":"string"},"in":"query"},{"style":"form","explode":true,"name":"companyPhone","description":"Search a party by their company phone number","schema":{"format":"int32","type":"integer"},"in":"query"},{"style":"form","explode":true,"name":"publiclyPublishable","description":"Search parties whose general company contact information is allowed to be published","schema":{"type":"boolean"},"in":"query"},{"style":"form","explode":true,"name":"tags","description":"Search parties who match any of the keywords that they have added in their participant information under tags. It is a free text field and can contain any value","schema":{"type":"string"},"in":"query"},{"style":"form","explode":true,"name":"framework","description":"Search parties based on which framework they were onboarded with. Currently parties can only be registered with \"iSHARE\" framework","schema":{"type":"string"},"in":"query"},{"style":"form","explode":true,"name":"subjectName","description":"Search parties based on the subject name of their PKI (x509) certificates. Usually to find a party who is requesting tokens","schema":{"type":"string"},"in":"query"},{"style":"form","explode":true,"name":"role","description":"Search parties based on their roles as defined in iSHARE role framework. Possible roles are ServiceConsumer, ServiceProvider,  EntitledParty, AuthorisationRegistry, IdentityProvider,  IdentityBroker and IdentityBroker and ParticipantRegistry,  iShareSatellite (deprecated, will be removed in future releases,  use ParticipantRegistry instead).","schema":{"type":"string"},"in":"query"},{"style":"form","explode":true,"name":"loA","description":"Search parties based on their level of assurance which is registered in the participant list. Possible values are Low/Substantial/High","schema":{"type":"string"},"in":"query"},{"style":"form","explode":true,"name":"compliancyVerified","description":"Search parties that have their compliance to framework verified or not.","schema":{"type":"boolean"},"in":"query"},{"style":"form","explode":true,"name":"legalAdherence","description":"Search parties that have signed the appropriate legal agreements and that have been verified during or after onboarding. Parties adhering to legal agreements are legally obliged to adhere to terms of use of data.","schema":{"type":"boolean"},"in":"query"},{"style":"form","explode":true,"name":"authorizationRegistryID","description":"Search parties based on their authorisation registry provider. The ID of the authorisation registry must be provided in search parameter and this must be listed as authorisation registry in the participant record","schema":{"type":"string"},"in":"query"},{"style":"form","explode":true,"name":"authorizationRegistryName","description":"Search parties based on their authorisation registry provider. The name of the authorisation registry must be provided in search parameter and this must be listed as authorisation registry in the participant record","schema":{"type":"string"},"in":"query"},{"style":"form","explode":true,"name":"dataSpaceID","description":"Search parties based on data-spaces they participate in. The ID of the data-space must be provided","schema":{"type":"string"},"in":"query"},{"style":"form","explode":true,"name":"dataSpaceTitle","description":"Search parties based on data-spaces they participate in. The name of the data-space must be provided","schema":{"type":"string"},"in":"query"},{"style":"form","explode":true,"name":"countriesOfOperation","description":"Search parties by name of country they list as their country of operation","schema":{"type":"string"},"in":"query"},{"style":"form","explode":true,"name":"sectorIndustry","description":"Search parties by name of sector they list as their sector/industry","schema":{"type":"string"},"in":"query"},{"style":"form","explode":true,"name":"page","description":"The parties API by default uses pagination. Each page size is fixed at 10 parties per page. When search results into more then 10 parties, the page parameter must be added for next pages","schema":{"format":"int32","type":"integer"},"in":"query"},{"style":"form","explode":true,"name":"certificate_subject_name","description":"Search parties based on the subject name of their PKI (x509) certificates. Usually to find a party who is requesting tokens","schema":{"type":"string"},"in":"query"}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/PartiesResponse"}}},"description":""}},"deprecated":false,"operationId":"/parties","summary":"Lists and searches parties","description":"Search for participant information from your Participant Registry. Various search parameters are supported as shown below. When results are more then 10 participants, pagination is used in response and each page contains up to 10 participants.\nServer response is an iSHARE signed JSON Web Token. Please refer to the models 'jwt_header' and 'jwt_payload_party_token' which indicate what the decoded response will look like."}}}}
```

## The jwt\_payload\_parties\_token object

```json
{"openapi":"3.0.0","info":{"title":"generic iSHARE API specifications","version":"2.1.1"},"components":{"schemas":{"jwt_payload_parties_token":{"title":"jwt_payload_parties_token","required":["iss","sub","aud","jti","exp","iat","parties_info"],"type":"object","properties":{"iss":{"description":"The id of the issuer of this JWT.","type":"string"},"sub":{"description":"The id of the subject of this JWT.","type":"string"},"aud":{"description":"The id of the audience of this JWT.","type":"string"},"jti":{"description":"jti value of JWT.","type":"string"},"exp":{"format":"int32","description":"UNIX timestamp in seconds until when this JWT is valid.","type":"integer"},"iat":{"format":"int32","description":"UNIX timestamp in seconds when this JWT was issued.","type":"integer"},"parties_info":{"allOf":[{"$ref":"#/components/schemas/PartiesInfo"},{}]}}},"PartiesInfo":{"title":"PartiesInfo","required":["data"],"type":"object","properties":{"count":{"format":"int32","description":"Count of parties returned based on search","type":"integer"},"total_count":{"format":"int32","description":"Total count of parties available based on search","type":"integer"},"pageCount":{"format":"int32","description":"Current page count","type":"integer"},"data":{"description":"Object containing parties information","type":"array","items":{"$ref":"#/components/schemas/Party"}}}},"Party":{"title":"Party","required":["id","party_name","registrar_id","adherence","agreements","roles"],"type":"object","properties":{"id":{"description":"Identifier of the participant. Usually it is an `did:ishare` id.","type":"string"},"alsoKnownAs":{"description":"Array of registered party ids of the party.","type":"array","items":{"type":"string"}},"party_name":{"description":"Name of the party.","type":"string"},"capability_url":{"description":"Capabilities endpoint of the party.","pattern":"","type":"string"},"registrar_id":{"description":"Identifier of the party who registered the participant, identified by one of the id registered","type":"string"},"adherence":{"allOf":[{"$ref":"#/components/schemas/Adherence"},{}]},"additional_info":{"allOf":[{"$ref":"#/components/schemas/AdditionalInfo"},{}]},"agreements":{"description":"Object which contains details about contracts including data space contracts that party has agreed and signed to.","type":"array","items":{"$ref":"#/components/schemas/Agreement"}},"certificates":{"description":"Object which contains the details of the PKI/x509 certificates of the party. Either certificates or SPOR must be present.","type":"array","items":{"$ref":"#/components/schemas/Certificate"}},"spor":{"allOf":[{"$ref":"#/components/schemas/Spor"},{}]},"roles":{"description":"Object which contains details about the iSHARE roles of the party. The details include the level of assurance as well as compliance status for each role.","type":"array","items":{"$ref":"#/components/schemas/Role_definition"}},"auth_registries":{"description":"Object which contains details about the authorisation registers that the party uses.","type":"array","items":{"$ref":"#/components/schemas/auth_registry"}}}},"Adherence":{"title":"Adherence","description":"Adherence details of a party. Object which contains status and validity timestamps of the party.","required":["status","start_date","end_date"],"type":"object","properties":{"status":{"description":"Status of the party. Available values are Active, Pending, NotActive and Revoked.","type":"string"},"start_date":{"format":"date-time","description":"UTC timestamp which states since when adherence status has established.","type":"string"},"end_date":{"format":"date-time","description":"UTC timestamp which states till when adherence status has established.","type":"string"}}},"AdditionalInfo":{"title":"AdditionalInfo","description":"Object which contains additional general contact information of the party.","required":["publicly_publishable"],"type":"object","properties":{"description":{"description":"A brief description of the party","type":"string"},"logo":{"description":"URL pointing to the endpoint where company logo can be found.","type":"string"},"website":{"description":"Website address of the party","type":"string"},"company_phone":{"description":"General company phone number of the party","type":"string"},"company_email":{"description":"General company email id of the party","type":"string"},"publicly_publishable":{"description":"Consent to publicly publish the information contained in this object","type":"boolean"},"countries_operation":{"description":"An array of ISO names of the countries where the party operates","type":"array","items":{"type":"string"}},"sector_industry":{"description":"An array of GICS based sectors/industry that party serves in","type":"array","items":{"type":"string"}},"tags":{"description":"An free text field containing keywords relevant for party","type":"string"}}},"Agreement":{"title":"Agreement","description":"Object which contains details about contracts including data space contracts that party has agreed and signed to.","required":["type","title","status","sign_date","expiry_date","framework","compliancy_verified"],"type":"object","properties":{"type":{"description":"Type of agreement. Refers to the official type of agreement. For iSHARE following types are available Terms of Use, Accession Agreement, Certified Party Agreement, Participant Registry Agreement  (former name Satellite Agreement will be deprecated).  Additionally, each data space can define their own type and it can be listed here when appropriate dataspace is chosen","type":"string"},"title":{"description":"The name of the agreement or agreement file","type":"string"},"status":{"description":"Status of the agreement. Available values are Draft, Signed, Accepted, Obsolete.","type":"string"},"sign_date":{"format":"date-time","description":"Date of signature of the agreement.","type":"string"},"expiry_date":{"format":"date-time","description":"Expiry date of the agreement. For non expiring agreements the end date is far in future","type":"string"},"agreement_file":{"description":"`Base64` of the agreement file that proves the party has signed the agreement. It can be PDF or any other format as agreed between parties or in dataspace rulebook. Note agreements are not stored in ledger, but only their calculated `SHA-256` hash, so this attribute is only for create/update requests. If hash_file is provided, agreement_file MUST not be provided. Either agreement_file or hash_file MUST be provided.","type":"string"},"hash_file":{"description":"The calculated `SHA-256` hash of the agreement file that proves the party has signed the agreement. It can be PDF or any other format as agreed between parties or in dataspace rulebook. If hash_file is provided, agreement_file MUST not be provided. Either agreement_file or hash_file MUST be provided.","type":"string"},"framework":{"description":"The trust framework to which this agreement complies to. Currently, only iSHARE is available.","type":"string"},"dataspace_id":{"description":"The ID of the data space. If specified, party is onboarded in accordance to this data space's terms and conditions","type":"string"},"dataspace_title":{"description":"The name of the selected dataspace","type":"string"},"compliancy_verified":{"description":"Legal compliance to this agreement has been verified in accordance with the process set in trust framework as we as data space governance. Possible values are Yes, No, Not Applicable","type":"string"}}},"Certificate":{"title":"Certificate","description":"Object which contains the details of the PKI/x509 certificates of the party.","required":["subject_name","certificate_type","enabled_from","x5c","x5t#s256"],"type":"object","properties":{"subject_name":{"description":"subjectName as encoded in the X.509 certificate which corresponds with the party that is being requested from the Participant Registry.","type":"string"},"certificate_type":{"description":"type of certificate","type":"string"},"enabled_from":{"format":"date-time","description":"UTC timestamp which states since when certificate is valid.","type":"string"},"x5c":{"description":"The base64 encoded pem format value of the certificate identified by its subject name and fingerprint","type":"string"},"x5t#s256":{"description":"The SHA256 fingerprint of the certificate","type":"string"}}},"Spor":{"title":"Spor","description":"The signed proof received from recognised issuer of information  about the organisation and the authorised representative of that organisation being authenticated with \"High\" level of assurance","required":["signed_request"],"type":"object","properties":{"signed_request":{"description":"Credentials of the participant signed by a trusted authority vouching for its authenticity.\nValue MUST be a JWT or a base64 string.\n- If JWT, it MUST be an “id_token” as defined in Open ID Connect, issued to the user, with an additional “organisationIdentifier” attribute contained within, being the identifier of the organisation the authenticated user is representing. OrganizationIdentifier (issued by a Trust Service Provider (TSP)), SHOULD be in the format of this field described in ETSI EN 319 412-1 V1.5.1, paragraph 5.1.4.\n- If the base64 encoded value, it MUST be a proof demonstrating that the authenticated user is validated by the Identity Provider and that the user is agreeing to sign up to become a participant. This can have similar information to id_token or verifiable credential above, but in a different format.","type":"string"}}},"Role_definition":{"title":"Role_definition","description":"Object which contains details about the iSHARE roles of the party. The details include the level of assurance as well as compliance status for each role.","required":["role","start_date","end_date","loa","compliancy_verified","legal_adherence"],"type":"object","properties":{"role":{"description":"Name of the role as defined in iSHARE role framework. Possible roles  are ServiceConsumer, ServiceProvider, EntitledParty,  AuthorisationRegistry, IdentityProvider, IdentityBroker and  IdentityBroker and ParticipantRegistry, iShareSatellite (deprecated,  will be removed in future releases, use ParticipantRegistry instead).","type":"string"},"start_date":{"format":"date-time","description":"UTC timestamp which states since when this role for the party is valid.","type":"string"},"end_date":{"format":"date-time","description":"UTC timestamp which states till when this role for the party is valid.","type":"string"},"loa":{"description":"Party's level of assurance. Available values are low, substantial and high.","type":"string"},"compliancy_verified":{"description":"Compliance requirements of this role has been met by party","type":"boolean"},"legal_adherence":{"description":"Legal requirements of this role has been met by party including signing of appropriate agreements","type":"boolean"}}},"auth_registry":{"title":"auth_registry","description":"Object which contains details about the authorisation registers that the party uses.","required":["name","id","url"],"type":"object","properties":{"name":{"description":"The name of the authorisation registry provider","type":"string"},"id":{"description":"The Id of the authorisation registry provider","type":"string"},"url":{"description":"The URL pointer specific to the party where authorisations can be queried/checked from","type":"string"},"dataspace_id":{"description":"The id of the data space where the party uses this authorisation registry provider","type":"string"},"dataspace_name":{"description":"The name of the data space corresponding to the data space id","type":"string"}}}}}}
```

## The PartiesResponse object

```json
{"openapi":"3.0.0","info":{"title":"generic iSHARE API specifications","version":"2.1.1"},"components":{"schemas":{"PartiesResponse":{"title":"PartiesResponse","type":"object","properties":{"parties_token":{"type":"string","format":"application/jwt"}}}}}}
```

## The PartiesInfo object

```json
{"openapi":"3.0.0","info":{"title":"generic iSHARE API specifications","version":"2.1.1"},"components":{"schemas":{"PartiesInfo":{"title":"PartiesInfo","required":["data"],"type":"object","properties":{"count":{"format":"int32","description":"Count of parties returned based on search","type":"integer"},"total_count":{"format":"int32","description":"Total count of parties available based on search","type":"integer"},"pageCount":{"format":"int32","description":"Current page count","type":"integer"},"data":{"description":"Object containing parties information","type":"array","items":{"$ref":"#/components/schemas/Party"}}}},"Party":{"title":"Party","required":["id","party_name","registrar_id","adherence","agreements","roles"],"type":"object","properties":{"id":{"description":"Identifier of the participant. Usually it is an `did:ishare` id.","type":"string"},"alsoKnownAs":{"description":"Array of registered party ids of the party.","type":"array","items":{"type":"string"}},"party_name":{"description":"Name of the party.","type":"string"},"capability_url":{"description":"Capabilities endpoint of the party.","pattern":"","type":"string"},"registrar_id":{"description":"Identifier of the party who registered the participant, identified by one of the id registered","type":"string"},"adherence":{"allOf":[{"$ref":"#/components/schemas/Adherence"},{}]},"additional_info":{"allOf":[{"$ref":"#/components/schemas/AdditionalInfo"},{}]},"agreements":{"description":"Object which contains details about contracts including data space contracts that party has agreed and signed to.","type":"array","items":{"$ref":"#/components/schemas/Agreement"}},"certificates":{"description":"Object which contains the details of the PKI/x509 certificates of the party. Either certificates or SPOR must be present.","type":"array","items":{"$ref":"#/components/schemas/Certificate"}},"spor":{"allOf":[{"$ref":"#/components/schemas/Spor"},{}]},"roles":{"description":"Object which contains details about the iSHARE roles of the party. The details include the level of assurance as well as compliance status for each role.","type":"array","items":{"$ref":"#/components/schemas/Role_definition"}},"auth_registries":{"description":"Object which contains details about the authorisation registers that the party uses.","type":"array","items":{"$ref":"#/components/schemas/auth_registry"}}}},"Adherence":{"title":"Adherence","description":"Adherence details of a party. Object which contains status and validity timestamps of the party.","required":["status","start_date","end_date"],"type":"object","properties":{"status":{"description":"Status of the party. Available values are Active, Pending, NotActive and Revoked.","type":"string"},"start_date":{"format":"date-time","description":"UTC timestamp which states since when adherence status has established.","type":"string"},"end_date":{"format":"date-time","description":"UTC timestamp which states till when adherence status has established.","type":"string"}}},"AdditionalInfo":{"title":"AdditionalInfo","description":"Object which contains additional general contact information of the party.","required":["publicly_publishable"],"type":"object","properties":{"description":{"description":"A brief description of the party","type":"string"},"logo":{"description":"URL pointing to the endpoint where company logo can be found.","type":"string"},"website":{"description":"Website address of the party","type":"string"},"company_phone":{"description":"General company phone number of the party","type":"string"},"company_email":{"description":"General company email id of the party","type":"string"},"publicly_publishable":{"description":"Consent to publicly publish the information contained in this object","type":"boolean"},"countries_operation":{"description":"An array of ISO names of the countries where the party operates","type":"array","items":{"type":"string"}},"sector_industry":{"description":"An array of GICS based sectors/industry that party serves in","type":"array","items":{"type":"string"}},"tags":{"description":"An free text field containing keywords relevant for party","type":"string"}}},"Agreement":{"title":"Agreement","description":"Object which contains details about contracts including data space contracts that party has agreed and signed to.","required":["type","title","status","sign_date","expiry_date","framework","compliancy_verified"],"type":"object","properties":{"type":{"description":"Type of agreement. Refers to the official type of agreement. For iSHARE following types are available Terms of Use, Accession Agreement, Certified Party Agreement, Participant Registry Agreement  (former name Satellite Agreement will be deprecated).  Additionally, each data space can define their own type and it can be listed here when appropriate dataspace is chosen","type":"string"},"title":{"description":"The name of the agreement or agreement file","type":"string"},"status":{"description":"Status of the agreement. Available values are Draft, Signed, Accepted, Obsolete.","type":"string"},"sign_date":{"format":"date-time","description":"Date of signature of the agreement.","type":"string"},"expiry_date":{"format":"date-time","description":"Expiry date of the agreement. For non expiring agreements the end date is far in future","type":"string"},"agreement_file":{"description":"`Base64` of the agreement file that proves the party has signed the agreement. It can be PDF or any other format as agreed between parties or in dataspace rulebook. Note agreements are not stored in ledger, but only their calculated `SHA-256` hash, so this attribute is only for create/update requests. If hash_file is provided, agreement_file MUST not be provided. Either agreement_file or hash_file MUST be provided.","type":"string"},"hash_file":{"description":"The calculated `SHA-256` hash of the agreement file that proves the party has signed the agreement. It can be PDF or any other format as agreed between parties or in dataspace rulebook. If hash_file is provided, agreement_file MUST not be provided. Either agreement_file or hash_file MUST be provided.","type":"string"},"framework":{"description":"The trust framework to which this agreement complies to. Currently, only iSHARE is available.","type":"string"},"dataspace_id":{"description":"The ID of the data space. If specified, party is onboarded in accordance to this data space's terms and conditions","type":"string"},"dataspace_title":{"description":"The name of the selected dataspace","type":"string"},"compliancy_verified":{"description":"Legal compliance to this agreement has been verified in accordance with the process set in trust framework as we as data space governance. Possible values are Yes, No, Not Applicable","type":"string"}}},"Certificate":{"title":"Certificate","description":"Object which contains the details of the PKI/x509 certificates of the party.","required":["subject_name","certificate_type","enabled_from","x5c","x5t#s256"],"type":"object","properties":{"subject_name":{"description":"subjectName as encoded in the X.509 certificate which corresponds with the party that is being requested from the Participant Registry.","type":"string"},"certificate_type":{"description":"type of certificate","type":"string"},"enabled_from":{"format":"date-time","description":"UTC timestamp which states since when certificate is valid.","type":"string"},"x5c":{"description":"The base64 encoded pem format value of the certificate identified by its subject name and fingerprint","type":"string"},"x5t#s256":{"description":"The SHA256 fingerprint of the certificate","type":"string"}}},"Spor":{"title":"Spor","description":"The signed proof received from recognised issuer of information  about the organisation and the authorised representative of that organisation being authenticated with \"High\" level of assurance","required":["signed_request"],"type":"object","properties":{"signed_request":{"description":"Credentials of the participant signed by a trusted authority vouching for its authenticity.\nValue MUST be a JWT or a base64 string.\n- If JWT, it MUST be an “id_token” as defined in Open ID Connect, issued to the user, with an additional “organisationIdentifier” attribute contained within, being the identifier of the organisation the authenticated user is representing. OrganizationIdentifier (issued by a Trust Service Provider (TSP)), SHOULD be in the format of this field described in ETSI EN 319 412-1 V1.5.1, paragraph 5.1.4.\n- If the base64 encoded value, it MUST be a proof demonstrating that the authenticated user is validated by the Identity Provider and that the user is agreeing to sign up to become a participant. This can have similar information to id_token or verifiable credential above, but in a different format.","type":"string"}}},"Role_definition":{"title":"Role_definition","description":"Object which contains details about the iSHARE roles of the party. The details include the level of assurance as well as compliance status for each role.","required":["role","start_date","end_date","loa","compliancy_verified","legal_adherence"],"type":"object","properties":{"role":{"description":"Name of the role as defined in iSHARE role framework. Possible roles  are ServiceConsumer, ServiceProvider, EntitledParty,  AuthorisationRegistry, IdentityProvider, IdentityBroker and  IdentityBroker and ParticipantRegistry, iShareSatellite (deprecated,  will be removed in future releases, use ParticipantRegistry instead).","type":"string"},"start_date":{"format":"date-time","description":"UTC timestamp which states since when this role for the party is valid.","type":"string"},"end_date":{"format":"date-time","description":"UTC timestamp which states till when this role for the party is valid.","type":"string"},"loa":{"description":"Party's level of assurance. Available values are low, substantial and high.","type":"string"},"compliancy_verified":{"description":"Compliance requirements of this role has been met by party","type":"boolean"},"legal_adherence":{"description":"Legal requirements of this role has been met by party including signing of appropriate agreements","type":"boolean"}}},"auth_registry":{"title":"auth_registry","description":"Object which contains details about the authorisation registers that the party uses.","required":["name","id","url"],"type":"object","properties":{"name":{"description":"The name of the authorisation registry provider","type":"string"},"id":{"description":"The Id of the authorisation registry provider","type":"string"},"url":{"description":"The URL pointer specific to the party where authorisations can be queried/checked from","type":"string"},"dataspace_id":{"description":"The id of the data space where the party uses this authorisation registry provider","type":"string"},"dataspace_name":{"description":"The name of the data space corresponding to the data space id","type":"string"}}}}}}
```

{% hint style="info" %}
Even though all request parameters are optional, at least one parameter should be provided. E.x. if you would like to retrieve all parties, you could use `name=*` or `party_id=*`.
{% endhint %}

### Response model

**Decoded parties\_token parameters:**

The model of the `parties_token` JWT response is [available on the iSHARE OpenAPI documentation](https://openapi.ishare.eu/?version=2.1#/jwt_payload_parties_token). For convenience the model of the parties\_info object, contained within the token, is described below:

* `parties_info`\
  **Object**. Root level.\
  Contains results count and information about the parties.
  * `total_count`\
    **String**. Contained in the object of `party_info`.\
    Total count of found parties.
  * `pageCount`\
    **String**. Contained in the object of `party_info`.\
    Number of pages (10 per page).
  * `count`\
    **String**. Contained in the object of `party_info`.\
    Total count of found parties. Since one request returns up to 10 parties, the value helps to understand if more than one page exists.
  * `data`\
    **Array of Objects**. Contained in the object of `party_info`.\
    Array containing a collection of parties objects.
    * `id`\
      **String**. Contained in `data`.\
      iSHARE Identifier of the party derived from original party identifiers.
    * `alsoKnownAs`\
      **Array of Strings**. Contained in `data`.\
      Identifiers of the party.
    * `party_name`\
      **String**. Contained in `data`.\
      Name of the party.
    * `capability_url`

      **String**. Contained in `data`.

      [Capabilities endpoint](https://dev.ishare.eu/version-2.1.1/all-roles-common-endpoints/capabilities) of the party.
    * `registrar_id`

      **String**. Contained in `data`.

      Identifier of the party who registered the participant identified by the `id` attribute above.
    * `adherence`\
      **Object**. Contained in `data`.\
      Object which contains status and validity timestamps of the party.
      * `status`\
        **String**. Contained in `adherence`.\
        Status of the party. Available values are *Active*, *Pending*, *NotActive* and *Revoked*.
      * `start_date`\
        **Timestamp (ISO 8601)**. Contained in `adherence`.\
        UTC timestamp which states since when adherence status has established.
      * `end_date`\
        **Timestamp (ISO 8601)**. Contained in `adherence`.\
        UTC timestamp which states till when adherence status has established.
  * `additional_info`

    **Object**. Contained in `party_info`.

    Object which contains additional general contact information of the party.

    * `description`

      **String**. Contained in `additional_info`.

      A brief description of the party.
    * `logo`

      **String**. Contained in `additional_info`.

      URL pointing to the endpoint where company logo can be found.
    * `website`

      **String**. Contained in `additional_info`.

      URL pointing to the endpoint where company logo can be found.
    * `company_phone`

      **String**. Contained in `additional_info`.

      General company phone number of the party.
    * `company_email`

      **String**. Contained in `additional_info`.

      General company email id of the party.
    * `publicly_publishable`

      **Boolean**. Contained in `additional_info`.

      Consent to publicly publish the information contained in this object.
    * `countriesOfOperation`

      **Array of Objects**. Contained in `additional_info`.

      An array of ISO names of the countries where the party operates.
    * `sectorIndustry`

      **Array of Objects**. Contained in `additional_info`.

      An array of GICS based sectors/industry that party serves in.
    * `tags`

      **String**. Contained in `additional_info`.

      An free text field containing keywords relevant for party.
  * `agreements`**Array of Objects**. Contained in `data`.Object which contains details about contracts including data space contracts that party has agreed and signed to.
    * `type`

      **String**. Contained in the object of `agreements`.

      Type of agreement. Refers to the official type of agreement. For iSHARE following types are available Terms of Use, Accession Agreement, Certified Party Agreement, Participant Registry Agreement (former name Satellite Agreement will be deprecated). Additionally, each data space can define their own type and it can be listed here when appropriate data space is chosen.
    * `title`

      **String**. Contained in the object of `agreements`.

      The name of the agreement or agreement file.
    * `status`

      **String**. Contained in the object of `agreements`.

      Status of the agreement. Available values are *Draft*, *Signed*, *Accepted*, *Obsolete*.
    * `sign_date`

      **Timestamp (ISO 8601)**. Contained in the object of `agreements`.

      Date of signature of the agreement.
    * `expiry_date`

      **Timestamp (ISO 8601)**. Contained in the object of `agreements`.

      Expiry date of the agreement. For non expiring agreements the end date is far in future.
    * `hash_file`

      **String**. Contained in the object of `agreements`.

      The calculated hash of the agreement file that has been uploaded. Note agreements are not stored in ledger, but only their hash.
    * `framework`

      **String**. Contained in the object of `agreements`.

      The trust framework to which this agreement complies to. Currently, only iSHARE is available.
    * `dataspace_id`

      **String**. Contained in the object of `agreements`.

      The ID of the data space. If specified, party is onboarded in accordance to this data space’s terms and conditions.
    * `dataspace_title`

      **String**. Contained in the object of `agreements`.

      The name of the selected dataspace.
    * `compliancy_verified`

      **String**. Contained in the object of `agreements`.

      Legal compliance to this agreement has been verified in accordance with the process set in trust framework as we as data space governance. Possible values are *Yes*, *No*, *Not Applicable*.
  * `certificates`

    **Array of Objects**. Contained in `data`.

    Object which contains the details of the PKI/x509 certificates of the party. Either certificates or SPOR must be present.

    * `subject_name`

      **String**. Contained in the object of `certificates`.

      subjectName as encoded in the X.509 certificate which corresponds with the party that is being requested from the Participant Registry.
    * `certificate_type`

      **String**. Contained in the object of `certificates`.

      Contains the type of certificate. For example: eIDAS certificates of type eSEAL are trusted, hence the value of the field will be eSEAL.
    * `enabled_from`

      **Timestamp (ISO 8601)**. Contained in the object of `certificates`.

      UTC timestamp which states since when certificate is valid.
    * `x5c`

      **String**. Contained in the object of `certificates`.

      The base64 encoded pem format value of the certificate identified by its subject name and fingerprint.
    * `x5t#s256`

      **String**. Contained in the object of `certificates`.

      The SHA256 fingerprint of the certificate.
  * `spor`

    **Array of Objects**. Contained in `data`.

    The signed proof received from recognised issuer (currently eID identity providers) of information about the organisation and the authorised representative of that organisation being authenticated with “High” level of assurance.

    * `signed_request`

      **String**. Contained in the object of `certifications`.

      verifiable credentials of the participant signed by a trusted authority vouching for its authenticity.

      * Value MUST be a JWT or a base64 string.
      * If JWT, it MUST be an “id\_token” as defined in Open ID Connect, issued to the user, with an additional “organisationIdentifier” attribute contained within, being the identifier of the organisation the authenticated user is representing. *OrganizationIdentifier* (issued by a Trust Service Provider (TSP)), SHOULD be in the format of this field described in [ETSI EN 319 412-1 V1.5.1, paragraph 5.1.4](https://www.etsi.org/deliver/etsi_en/319400_319499/31941201/01.05.01_60/en_31941201v010501p.pdf).
      * If the base64 encoded value, it MUST be a proof demonstrating that the authenticated user is validated by the Identity Provider and that the user is agreeing to sign up to become a participant. This can have similar information to id\_token or verifiable credential above, but in a different format.
  * `roles`

    **Array of Objects**. Contained in `data`.

    Object which contains details about the iSHARE roles of the party. The details include the level of assurance as well as compliance status for each role.

    * `role`

      **String**. Contained in the object of `roles`.

      Role name. Possible roles are *ServiceConsumer*, *ServiceProvider*, *EntitledParty*, *AuthorisationRegistry*, *IdentityProvider*, *IdentityBroker* and *ParticipantRegistry*, *iShareSatellite* (deprecated, will be removed in future releases, use *ParticipantRegistry* instead).
    * `start_date`

      **Timestamp (ISO 8601)**. Contained in the object of `roles`.

      UTC timestamp which states since when certification is valid.
    * `end_date`

      **Timestamp (ISO 8601)**. Contained in the object of `roles`.

      UTC timestamp which states till when certification is valid.
    * `loa`

      **Integer**. Contained in the object of `roles`.

      Certificate’s level of assurance. Available values are *1* (low), *2* (substantial) and *3* (high).
    * `compliancy_verified`

      **Boolean**. Contained in the object of `roles`.

      Compliance requirements of this role has been met by party.
    * `legal_adherence`

      **Boolean**. Contained in the object of `roles`.

      Legal requirements of this role has been met by party including signing of appropriate agreements.
  * `auth_registries`

    **Array of Objects**. Contained in `data`.

    Object which contains details about the authorisation registers that the party uses. *Please be aware that the current reference implementation of the iSHARE Satellite returns this information in an attribute "authregistery" instead of "auth\_registries". This will be updated in a future release.*

    * `name`

      **String**. Contained in the object of `auth_registries`.

      The name of the authorisation registry provider.
    * `id`

      **String**. Contained in the object of `auth_registries`.

      The Id of the authorisation registry provider.
    * `url`

      **String**. Contained in the object of `auth_registries`.

      The URL pointer specific to the party where authorisations can be queried/checked from.
    * `dataspace_id`

      **String**. Contained in the object of `auth_registries`.

      The id of the data space where the party uses this authorisation registry provider.

      * `dataspace_name`

        **String**. Contained in the object of `auth_registries`.

        The name of the data space corresponding to the data space id.

### Example request

```
> Authorization: Bearer IIeDIrdnYo2ngwDQYJKoZIhvcNAQELBQAwSDEZMBcGA1UEAwwQaVNIQ

GET /v2.1/parties?name=ABC Tr*
    certificate_subject_name=C%3DNL%2CO%3DTest%20Service%20Consumer%2CCN%3DTest%20Service%20Consumer%2C2.5.4.97%3DNTRNL-10000001
    &active_only=true
```

### Example response

The response contains an encoded JWT, which looks like this:

```json
{
  "parties_token": "eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCIsIng1YyI6WyJNSUlFNlRDQ0E5R2dBd0lCQWdJSVUrVkNVWmo1dCtBd0RRWUpLb1pJaHZjTkFRRUxCUUF3UERFNk1EZ0dBMVVFQXd3eFZFVlRWQ0JwVTBoQlVrVWdSVlVnU1hOemRXbHVaeUJEWlhKMGFXWnBZMkYwYVc5dUlFRjFkR2h2Y21sMGVTQkhOVEFlRncweU16QTVNRGt4TWpBMk16RmFGdzB6TXpBNU1EWXhNakEyTXpCYU1IVXhHakFZQmdOVkJBTU1FV2xUU0VGU1JTQlVaWE4wSUZCSlVpQXhNUnd3R2dZRFZRUUZFeE5GVlM1RlQxSkpMazVNTURBd01EQXdNREF3TVJRd0VnWURWUVFMREF0VVpYTjBJR0Z1WkNCUlFURVdNQlFHQTFVRUNnd05hVk5JUVZKRlZHVnpkRkJKVWpFTE1Ba0dBMVVFQmhNQ1Rrd3dnZ0lpTUEwR0NTcUdTSWIzRFFFQkFRVUFBNElDRHdBd2dnSUtBb0lDQVFEQ1puQlVCM2s1R05sa0piVThIbFFhY2IxdnVScTN5UkRVZlQyUzFaSFBJVEJuWUFSQTZvMDdLNmxKZWpyRnQ1YWRsSzRsK3ZxTDFvaWlTeWdTREFLdCtXYkxpUzZFakFocFlIeTFBNWtkNVFONnFmUUpUNnI4cVZvUXdrNnM5bmdldkc2SGRIQW5qMlcvR1d1UGNicU9JaHYxSEdaYVhIUDZrNGo3QzBuT042U1NRSXhQQko4bnUvdTloaDJzS0JpN0ZzRkNnZFpxL29OQzBaZjR3R3pJbVRlc3hQMUJrTXlETmdXVVIzK1JpZUlNTXNNQlJXcEhLRFE0aTI0blJZaGhqUjJGU3NQcitiTE85YXRKWFVKc3I4bElhVDNDaDRVOUE5MnNYY1A4V3lvVjJ1Ti9hOEJBTjVJWkw1bVRBZXA4NDJROXQrS1ltcXEzY1J2a21zUUN3WmxUZm1ZNUMzbDhKOHpHYTNETTZxUTViOFlCalZoUUljcEFISDJqQ3RpRmQ2Vk9XMjl3MVg2MHhKRU14dHB1dmhVNGQzZXlveFRiLzVYU05vRVJOUERRZzRRN0NHQWQvR3ZsbFFka2wrdGJPQW9EclYwY01PZFJ4eVpqa25UZUpzcWNaOHJYZWVDQkFkOVFYZEd0cGl0SUFsNnRyRFYxbEd4TmpZVldSN3o1MEJRUEUvaGpFOFZBb3ZuemMvOWlSenQ1ZmhFQkljclVJRVpzcmdKVUg1NXY0SVA2T2JjRisxVjNFdHNqMkJMZFI4cEdTNjdtL0t5TWdNcnVHN3IrTXZ0QUhaTHlLemZrWjBXdnczWFBsb1ZPWU1ha0NOaWNXTHNSUHR1clhEMEtyKy8xeWtrekllOFIxQWllVUVKbDBnR3ltWk04OXlPSDhuakNHd1psUHdJREFRQUJvNEcxTUlHeU1COEdBMVVkSXdRWU1CYUFGRzNGWlluTDM1RlUwV3M4dHdLbExzMkthSkFkTUNjR0ExVWRKUVFnTUI0R0NDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREJBWUlLd1lCQlFVSEF3RXdOd1lJS3dZQkJRVUhBUU1FS3pBcE1BZ0dCZ1FBamtZQkFUQUlCZ1lFQUk1R0FRUXdFd1lHQkFDT1JnRUdNQWtHQndRQWprWUJCZ0l3SFFZRFZSME9CQllFRkhIdlM2VXVCMUhIL0NtZmlvSDkzOWMxSndCR01BNEdBMVVkRHdFQi93UUVBd0lHd0RBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQVNyYjZPLzVWbVJzTkNiazZzRHo1V1FYb1oxZG84MnhxZ1NibDIzK3hXekFHV2xNeEd5elJJdTZOSDQxbFNSeGcxNzRPU1EzS0orYXVTUlB1Si82NG9HUEp4MkVmekMyckZiOU5ZeWhGT2pqcnlSZVJBVUsxZzFBbkEzQVBpMUdLVkxTZ3hnTXBYTnhwNXo0Yk5pNGpzTG92ZW85Z2IxNzR3UWVZSVFzOXdUc3JOcU43eGpkc2UwcjNqTDdhdEJCK1ZOanR5bEYvOXBqaVBWeGR3a0o2MFFXeVg4ZFBobDZ3SWh4STdtVTVMclJZZk9TSEx4V1FhbzIvZWhXUURJeHFYOWQ1bVpEYlUrd0tFc3BiNWhSNmMvOEo1SFhyYy8yMXhvcTNxNjNPNkRoNFh5WEUxSEMzZ0hUeGxmTmtzRm5aOHpNeFlPVlZMc0hleHAwbGRITzhaUT09IiwiTUlJRFNEQ0NBakNnQXdJQkFnSUlTeFIzSW16RzFCY3dEUVlKS29aSWh2Y05BUUVMQlFBd0p6RWxNQ01HQTFVRUF3d2NWRVZUVkNCcFUwaEJVa1VnUm05MWJtUmhkR2x2YmlCbFNVUkJVekFlRncweE9UQXlNakl4TURBME16RmFGdzB6T1RBeU1UY3hNREF5TkRsYU1Ed3hPakE0QmdOVkJBTU1NVlJGVTFRZ2FWTklRVkpGSUVWVklFbHpjM1ZwYm1jZ1EyVnlkR2xtYVdOaGRHbHZiaUJCZFhSb2IzSnBkSGtnUnpVd2dnRWlNQTBHQ1NxR1NJYjNEUUVCQVFVQUE0SUJEd0F3Z2dFS0FvSUJBUURIQjJBQlFMN3p3bWkxeElrTzBhMnE2aklKZG4zUUFtMHMxbFNlUWV2OUYyRjNNNVo4cWlxUUphdXJNWnl3WmZkTnZnOStJcUdIT2pEZTZoSWh1Unp6b0FvMEFiTzROOU9kZjJSRERVOTVON3RvSm1BeUNpWUdnWmZadDdCc0tGSWVRNnA2Q3NnS2NSWFBpMGZkWGRWU0hwNGJaZlFPUWRjbE1idElUaXJuRnRVMDZOUEFob1k2NzZZejk2eEZBRTB6b202ZU1WUFBPSW0wRzhnZDQ0WGxuYkwwdzBtY2NDaTJWVVpqdkNJTDU5TzYxTzh2bFZ5THNCcU5OVEN2ZjlDMkNNWWFFYXRYWnl6L2x3Z0g2SllIdEQwdXNYdC8rTTBxS1llMW9lb0xrMFppY0ZaWGNrMWlTMDlrRmRnZ0s1QmxOb2RvV0phREJScm81MVdoWTJXbkFnTUJBQUdqWXpCaE1BOEdBMVVkRXdFQi93UUZNQU1CQWY4d0h3WURWUjBqQkJnd0ZvQVVsWk1reWJ5aEN6SzVIT0JGSEtSTytNTFNSLzR3SFFZRFZSME9CQllFRkczRlpZbkwzNUZVMFdzOHR3S2xMczJLYUpBZE1BNEdBMVVkRHdFQi93UUVBd0lCaGpBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQVpINVFqdXErTzlGcHY2MzdnMGNGNm4xSUxZQkx6MWVOWmpFQjNkb0FleHZpNUN6U3czb3N3SkNTZWRHVzNoaDBxSE9USzJnSTgzamgwVzJFQW4yaXNGZ3doTW9HMmpkMllTRlNrbThRLzJlT2ZjNk1nR1NDNXNPVEw3NUo3YnlMQ29yZHFkL040ZWFqM0VxS0xhV3E3cjd1c3RQODFQOEVJbHowRDhhN2xmZjFGU28yM0hXWFRXWDIrbTJ2b0xBRTVsOTdhR1RHUlMxVWJ4aFAyakZLWUo5WHppS2U5TVFKU1pFbFRROGpxZzJrUEZrRXgvWHFBV3FsRzFkbDF5d0xKcTVpZVB2SzFSNEFZTkkvWWJaUWs5c2xqOHYrUC82TTdFdEVyc2YydUlTZ2V3TFRjV2wyNHgzbkc1eGJRWnhyUDhsMmpTR1ltT1RJbmdLT1FTbmJmZz09IiwiTUlJRE16Q0NBaHVnQXdJQkFnSUlCTFUyY1pBWnFMRXdEUVlKS29aSWh2Y05BUUVMQlFBd0p6RWxNQ01HQTFVRUF3d2NWRVZUVkNCcFUwaEJVa1VnUm05MWJtUmhkR2x2YmlCbFNVUkJVekFlRncweE9UQXlNakl4TURBeU5EbGFGdzB6T1RBeU1UY3hNREF5TkRsYU1DY3hKVEFqQmdOVkJBTU1IRlJGVTFRZ2FWTklRVkpGSUVadmRXNWtZWFJwYjI0Z1pVbEVRVk13Z2dFaU1BMEdDU3FHU0liM0RRRUJBUVVBQTRJQkR3QXdnZ0VLQW9JQkFRQ3JEUDJEV1gzL2I4dU1hcHpFQkFUU2E2aVpmdmdneklCVUV4a1dFYkc5ZTFuVnkvalFrMjBuZlNGTVVtUlQ2TmhZY2RrU1lPL1dya2k5WTRFcEN5MXh2WkhxTCs0WTZTOUpMWndKNzYwTHBZbGUrTmFWdTdtaW5NVVFjdW9qNW5LekNsdmF6YjAwQXg1Z2tKVWZSM3YzWDVHWHFRcmtXYXpNdCtrNVROTTZUV3VKMzBxT2Z3ckh4NXZUTG1UVVVpaCtCc0dMM2Y1R09zMVZUWUlDTmhpVGpONzRuMldxcDJrVUxXSWUrL1g2UlovaEtzcGFIR1puS0RWVHdJKzhabVdGZWp1eEE2RE9YN1JzWUxLdlFPMjFGbWJJQm9TczlBenY1OS9SeFdVSlZNTzBXaERoS3BRZ0NHandnVjMyb2ZOZGtGZ21kVnVsek5QSUQyUk5iVFRMQWdNQkFBR2pZekJoTUE4R0ExVWRFd0VCL3dRRk1BTUJBZjh3SHdZRFZSMGpCQmd3Rm9BVWxaTWt5YnloQ3pLNUhPQkZIS1JPK01MU1IvNHdIUVlEVlIwT0JCWUVGSldUSk1tOG9Rc3l1UnpnUlJ5a1R2akMwa2YrTUE0R0ExVWREd0VCL3dRRUF3SUJoakFOQmdrcWhraUc5dzBCQVFzRkFBT0NBUUVBbHphQlZhRmhabUg5dXhzTFN2M0Zra3hXVndCUjFHaEF4d2NKbFY0eCtrcVg4dGNoSjRTRExFdVdSckY0RE50dlNSM3I2OUt6OGVZSTVYdVcxZUcxMllqR0dWbFlpamR4ckcxQU56R24ydmRvOXZMN2RFRlVFTUsxQUt4UnN0YlRkRTd5d3pJVi9DNjF3OEpyeHdMdHQ5T2pkVUVVUEh1R1RqdXY1bkZCUGRGek9jdnUrRFRNbDczQ0pQMnplWlVGZ3VqNTVNc1hZNDVNclhyYmd0K0xKcVV1NHBrQjJiTHU5RmJlUkxXWkp1a25ZU3JXNGZ5UUJaMmkrTXNHZGlCS1FjZjNmTFhqcGNoNDgvcDdTaVRrNHVmbG9CYXFUQ2x0L0V0V1hEU21GY3Y0UWpCazFtVVB1OXZ4aWtjSERrQXZKck9YR2cwYiszZUk0YTdPVGZBYjFnPT0iXX0.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.ooht9YVFyTIOs86Y450H_M3EyXiDAeCPcgOGVpHNnJ6BEP_-yxEAjCLv5SbEK8XDtdKvtpYLQSIZRc9ItN1gi7V3QRTFAFkMF-p-AtEku-hjLxzITgzrcfAXYhbpH3pa_s9BDOx5-Thiiz_XeFalkq_eX06Ily1sVoPUl9qYR1Zx6RTkftkOo2tHZpuY33586Zd5NXdiilCKAV4bTFMs_WhSx08sVN-8-1lovQUbksOtS4zFpODTI_pTyQgsSP09ep0P7ugToVGI_ciQmaF7UdTmHviFpOQDb0kFLUqvUhk5VwIS-_Ge6Vd6Xs__Hms2wAi_M6jMPrCF4KimBT-gnDj3vHC7IRr494Kp_MAwEVG9MvjbbfhPGpGhvZMcyv0BILwA35ZIaNyvGa55N1Vz_Qyt0EIW191867DUAFsO82WW7HpZP4m9W9OtQTbswyZq_LjpeqZpl4S9ODon7PSMApedPq4d6id4Zv0Ya6ZLFFAgaawF4vX0kCpEfHvoKuZxWZ9CtyWflDkHKU6ud_eIDliDylqvPH_NFopEX8042PffaA27YFCThKYJiBU4AuIWFf2MUG2LEErZwlqXIVK504rf78EKo2nuhZrXrHGdpow3uNwPtfZumN7So5eoyrs2Z9lsfvrvgjiR06mqCu5jn3F4XT95j9ciY6pBVFT4yi4"
}
```

After decoding, the example content of the JWT looks like this:

```json
{
  "aud": "EU.EORI.NL000000001",
  "exp": 1767028632,
  "iat": 1767028602,
  "iss": "EU.EORI.NLTESTPIRSAT1",
  "jti": "83ecb75975c84dae9eb1ea3d006e421d",
  "nbf": 1767028602,
  "parties_info": {
    "total_count": 1,
    "pageCount": 1,
    "count": 1,
    "data": [
      {
        "id": "did:ishare:EU.NL.NTRNL-000000001",
        "alsoKnownAs": [
          "eori:EU.EORI.NL000000001"
        ],
        "party_name": "ABC Trucking",
        "capability_url": "",
        "registrar_id": "EU.EORI.NL000000000",
        "adherence": {
          "status": "Active",
          "start_date": "2024-02-12T00:00:00.000Z",
          "end_date": "2025-02-13T00:00:00.000Z"
        },
        "additional_info": {
          "description": "Test",
          "logo": "",
          "website": "",
          "company_phone": "",
          "company_email": "",
          "publicly_publishable": "false",
          "countriesOfOperation": [
            "Afghanistan",
            "Albania",
            "Algeria"
          ],
          "sectorIndustry": [],
          "tags": "NTRNL-00000001"
        },
        "agreements": [
          {
            "type": "TermsOfUse",
            "title": "tu",
            "status": "Accepted",
            "sign_date": "2024-02-12T00:00:00.000Z",
            "expiry_date": "2025-02-13T00:00:00.000Z",
            "hash_file": "ae1d7d30f5db9497f21a7984a8a6f359",
            "framework": "iSHARE",
            "dataspace_id": "",
            "dataspace_title": "",
            "complaiancy_verified": "no"
          },
          {
            "type": "AccessionAgreement",
            "title": "aa",
            "status": "Accepted",
            "sign_date": "2024-02-12T00:00:00.000Z",
            "expiry_date": "2025-02-13T00:00:00.000Z",
            "hash_file": "ae1d7d30f5db9497f21a7984a8a6f359",
            "framework": "iSHARE",
            "dataspace_id": "",
            "dataspace_title": "",
            "complaiancy_verified": "no"
          }
        ],
        "certificates": [
          {
            "subject_name": "CN=ABC Trucking,SERIALNUMBER=EU.EORI.NL000000001,OU=Test,O=iSHARETest,C=NL",
            "certificate_type": "Pkio",
            "enabled_from": "2024-02-12T00:00:00.000Z",
            "x5c": "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",
            "x5t#s256": "778e88582bc15a1a11393f17db5e86898a8455e3e38762b63101f8e3b892c683"
          }
        ],
        "roles": [
          {
            "role": "ServiceConsumer",
            "start_date": "2024-02-12T00:00:00.000Z",
            "end_date": "2025-02-12T00:00:00.000Z",
            "loa": "",
            "complaiancy_verified": "no",
            "legal_adherence": "no"
          }
        ],
        "authregistery": []
      }
    ]
  },
  "sub": "EU.EORI.NLTESTPIRSAT1"
}
```
