# Parties \[POST]

The `POST` request to the `/parties` can be used to create a new party in the Participant Registry. The Participant Registry is expected to allow this method only for selected parties.

## Create new party

> Used to programatically create a participant.

```json
{"openapi":"3.0.0","info":{"title":"iSHARE API specifications","version":"2.2"},"tags":[{"name":"Participant Registry","description":"Endpoints that form the iSHARE Participant Registry API specification."}],"servers":[{"description":"iSHARE UAT network base domain","url":"https://isharetest.net"},{"description":"iSHARE TEST network base domain","url":"https://test.ishareworks.nl"}],"security":[{"BearerAuth":[]}],"components":{"securitySchemes":{"BearerAuth":{"type":"http","scheme":"bearer","description":"OAuth 2.0 authorization based on bearer token. MUST contain “Bearer “ + access token value. Must be provided if restricted endpoints are needed."}},"schemas":{"party_creation_request":{"title":"Party Creation/update Request","required":["id","party_name","registrar_id","adherence","agreements","roles"],"type":"object","properties":{"id":{"description":"Identifier of the participant. Usually it is an `did:ishare` id. MUST be provided when spor does not contain a JWT with organisationIdentifier claim in it.","type":"string"},"alsoKnownAs":{"description":"Array of registered party ids of the party.","type":"array","items":{"type":"string"}},"schemaVersion":{"description":"Version of the this request/response model corresponding to iSHARE version. MUST be 'v2.2' for current version.","type":"string"},"party_name":{"description":"Name of the party.","type":"string"},"capability_url":{"description":"Capabilities endpoint of the party.","pattern":"","type":"string"},"registrar_id":{"description":"Identifier of the party who registered the participant, identified by one of the id registered","type":"string"},"adherence":{"allOf":[{"$ref":"#/components/schemas/Adherence"},{}]},"additional_info":{"allOf":[{"$ref":"#/components/schemas/AdditionalInfo"},{}]},"agreements":{"description":"Object which contains details about contracts including data space contracts that party has agreed and signed to.","type":"array","items":{"$ref":"#/components/schemas/Agreement"}},"certificates":{"description":"Object which contains the details of the PKI/x509 certificates of the party. Either certificates or SPOR must be present.","type":"array","items":{"$ref":"#/components/schemas/Certificate"}},"spor":{"description":"The signed proof received from recognised issuer of information about the organisation and the authorised representative of that organisation being authenticated with \"High\" level of assurance","allOf":[{"$ref":"#/components/schemas/Spor"},{}]},"roles":{"description":"Object which contains details about the iSHARE roles of the party.","type":"array","items":{"$ref":"#/components/schemas/Role_definition"}},"auth_registries":{"description":"Object which contains details about the authorisation registers that the party uses.","type":"array","items":{"$ref":"#/components/schemas/auth_registry"}}}},"Adherence":{"title":"Adherence","description":"Adherence details of a party. Object which contains status and validity timestamps of the party.","required":["status","start_date","end_date"],"type":"object","properties":{"status":{"description":"Status of the party. Available values are Active, Pending, NotActive and Revoked.","type":"string"},"start_date":{"format":"date-time","description":"UTC timestamp which states since when adherence status has established.","type":"string"},"end_date":{"format":"date-time","description":"UTC timestamp which states till when adherence status has established.","type":"string"}}},"AdditionalInfo":{"title":"AdditionalInfo","description":"Object which contains additional general contact information of the party.","required":["publicly_publishable"],"type":"object","properties":{"description":{"description":"A brief description of the party","type":"string"},"logo":{"description":"URL pointing to the endpoint where company logo can be found.","type":"string"},"website":{"description":"Website address of the party","type":"string"},"company_phone":{"description":"General company phone number of the party","type":"string"},"company_email":{"description":"General company email id of the party","type":"string"},"publicly_publishable":{"description":"Consent to publicly publish the information contained in this object","type":"boolean"},"countries_operation":{"description":"An array of ISO names of the countries where the party operates","type":"array","items":{"type":"string"}},"sector_industry":{"description":"An array of GICS based sectors/industry that party serves in","type":"array","items":{"type":"string"}},"tags":{"description":"An free text field containing keywords relevant for party","type":"string"}}},"Agreement":{"title":"Agreement","description":"Object which contains details about contracts including data space contracts that party has agreed and signed to.","required":["type","title","status","sign_date","expiry_date","framework","compliancy_verified"],"type":"object","properties":{"type":{"description":"Type of agreement. Refers to the official type of agreement. For iSHARE following types are available Terms of Use, Accession Agreement, Certified Party Agreement, Participant Registry Agreement  (former name Satellite Agreement will be deprecated).  Additionally, each data space can define their own type and it can be listed here when appropriate dataspace is chosen","type":"string"},"title":{"description":"The name of the agreement or agreement file","type":"string"},"status":{"description":"Status of the agreement. Available values are Draft, Signed, Accepted, Obsolete.","type":"string"},"sign_date":{"format":"date-time","description":"Date of signature of the agreement.","type":"string"},"expiry_date":{"format":"date-time","description":"Expiry date of the agreement. For non expiring agreements the end date is far in future","type":"string"},"agreement_file":{"description":"`Base64` of the agreement file that proves the party has signed the agreement. It can be PDF or any other format as agreed between parties or in dataspace rulebook. Note agreements are not stored in ledger, but only their calculated `SHA-256` hash, so this attribute is only for create/update requests. If hash_file is provided, agreement_file MUST not be provided. Either agreement_file or hash_file MUST be provided.","type":"string"},"hash_file":{"description":"The calculated `SHA-256` hash of the agreement file that proves the party has signed the agreement. It can be PDF or any other format as agreed between parties or in dataspace rulebook. If hash_file is provided, agreement_file MUST not be provided. Either agreement_file or hash_file MUST be provided.","type":"string"},"framework":{"description":"The trust framework to which this agreement complies to. Currently, only iSHARE is available.","type":"string"},"dataspace_id":{"description":"The ID of the data space. If specified, party is onboarded in accordance to this data space's terms and conditions","type":"string"},"dataspace_title":{"description":"The name of the selected dataspace","type":"string","readOnly":true},"compliancy_verified":{"description":"Legal compliance to this agreement has been verified in accordance with the process set in trust framework as we as data space governance. Possible values are Yes, No, Not Applicable","type":"string"}}},"Certificate":{"title":"Certificate","description":"Object which contains the details of the PKI/x509 certificates of the party.","required":["subject_name","certificate_type","enabled_from","x5c","x5t#s256"],"type":"object","properties":{"subject_name":{"description":"subjectName as encoded in the X.509 certificate which corresponds with the party that is being requested from the Participant Registry. Used by the Participant Registry to match the certificate identifier.","type":"string"},"certificate_type":{"description":"type of certificate","type":"string"},"enabled_from":{"format":"date-time","description":"UTC timestamp which states since when certificate is valid.","type":"string"},"x5c":{"description":"The base64 encoded pem format value of the certificate identified by its subject name and fingerprint","type":"string"},"x5t#s256":{"description":"The SHA256 fingerprint of the certificate","type":"string"}}},"Spor":{"title":"Spor","description":"The signed proof received from recognised issuer of information  about the organisation and the authorised representative of that organisation being authenticated with \"High\" level of assurance","required":["signed_request"],"type":"object","properties":{"signed_request":{"description":"Credentials of the participant signed by a trusted authority vouching for its authenticity.\nValue MUST be a JWT or a base64 string.\n- If JWT, it MUST be an “id_token” as defined in Open ID Connect, issued to the user, with an additional “organisationIdentifier” attribute contained within, being the identifier of the organisation the authenticated user is representing. OrganizationIdentifier (issued by a Trust Service Provider (TSP)), SHOULD be in the format of this field described in ETSI EN 319 412-1 V1.5.1, paragraph 5.1.4.\n- If the base64 encoded value, it MUST be a proof demonstrating that the authenticated user is validated by the Identity Provider and that the user is agreeing to sign up to become a participant. This can have similar information to id_token or verifiable credential above, but in a different format.","type":"string"}}},"Role_definition":{"title":"Role_definition","description":"Object which contains details about the iSHARE roles of the party. The details include the level of assurance as well as compliance status for each role.","required":["role","start_date","end_date","loa","compliancy_verified","legal_adherence"],"type":"object","properties":{"role":{"description":"Name of the role as defined in iSHARE role framework. Possible roles  are ServiceConsumer, ServiceProvider, EntitledParty,  AuthorisationRegistry, IdentityProvider, IdentityBroker and  IdentityBroker and ParticipantRegistry, iShareSatellite (deprecated,  will be removed in future releases, use ParticipantRegistry instead).","type":"string"},"start_date":{"format":"date-time","description":"UTC timestamp which states since when this role for the party is valid.","type":"string"},"end_date":{"format":"date-time","description":"UTC timestamp which states till when this role for the party is valid.","type":"string"},"loa":{"description":"Party's level of assurance. Available values are low, substantial and high.","type":"string"},"compliancy_verified":{"description":"Compliance requirements of this role has been met by party","type":"boolean"},"legal_adherence":{"description":"Legal requirements of this role has been met by party including signing of appropriate agreements","type":"boolean"}}},"auth_registry":{"title":"auth_registry","description":"Object which contains details about the authorisation registers that the party uses.","required":["name","id","url"],"type":"object","properties":{"name":{"description":"The name of the authorisation registry provider","type":"string"},"id":{"description":"The Id of the authorisation registry provider","type":"string"},"url":{"description":"The URL pointer specific to the party where authorisations can be queried/checked from","type":"string"},"dataspace_id":{"description":"The id of the data space where the party uses this authorisation registry provider","type":"string"},"dataspace_name":{"description":"The name of the data space corresponding to the data space id","type":"string","readOnly":true}}},"PartyResponse":{"title":"PartyResponse","type":"object","properties":{"party_token":{"type":"string","format":"application/jwt"}}}}},"paths":{"/[v2.2]/parties":{"post":{"requestBody":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/party_creation_request"}}},"required":true},"tags":["Participant Registry"],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/PartyResponse"}}},"description":""}},"deprecated":false,"operationId":"/parties-new","summary":"Create new party","description":"Used to programatically create a participant."}}}}
```

### Request model

The request is passed as plain JSON, so no JWT token is used. The `POST` method uses the exact same input as the `PUT` method. The JSON model is as follows.

* `id`\
  **String**. Contained in `party_info`. <mark style="color:red;">(Required)</mark>\
  iSHARE Identifier of the party derived from original party identifiers.
* `alsoKnownAs`\
  **Array of Strings**. Contained in `party_info`.\
  Identifiers of the party.
* `party_name`\
  **String**. Root level. Contained in `party_info`. <mark style="color:red;">(Required)</mark>\
  Name of the party.
* `capability_url`

  **String**. Root level. Contained in `party_info`.

  [Capabilities endpoint](/version-2.2/all-roles-common-endpoints/capabilities.md) of the party.
* `registrar_id`

  **String**. Root level. Contained in `party_info`. <mark style="color:red;">(Required)</mark>

  Identifier of the party who registered the participant identified by the `id` attribute above.
* `adherence`\
  **Object**. Root level. Contained in `party_info`. <mark style="color:red;">(Required)</mark>\
  Object which contains status and validity timestamps of the party.
  * `status`\
    **String**. Contained in `adherence`. <mark style="color:red;">(Required)</mark>\
    Status of the party. Available values are *Active*, *Pending*, *NotActive* and *Revoked*.
  * `start_date`\
    **Timestamp (ISO 8601)**. Contained in `adherence`. <mark style="color:red;">(Required)</mark>\
    UTC timestamp which states since when adherence status has established.
  * `end_date`\
    **Timestamp (ISO 8601)**. Contained in `adherence`. <mark style="color:red;">(Required)</mark>\
    UTC timestamp which states till when adherence status has established.
* `additional_info`

  **Object**. Root level.Contained in `party_info`.

  Object which contains additional general contact information of the party.

  * `description`

    **String**. Contained in `additional_info`.

    A brief description of the party.
  * `logo`

    **String**. Contained in `additional_info`.

    URL pointing to the endpoint where company logo can be found.
  * `website`

    **String**. Contained in `additional_info`.

    URL pointing to the endpoint where company logo can be found.
  * `company_phone`

    **String**. Contained in `additional_info`.

    General company phone number of the party.
  * `company_email`

    **String**. Contained in `additional_info`.

    General company email id of the party.
  * `publicly_publishable`

    **Boolean**. Contained in `additional_info`.

    Consent to publicly publish the information contained in this object.
  * `countries_operation`

    **Array of Objects**. Contained in `additional_info`.

    An array of ISO names of the countries where the party operates.
  * `sector_industry`

    **Array of Objects**. Contained in `additional_info`.

    An array of GICS based sectors/industry that party serves in.
  * `tags`

    **String**. Contained in `additional_info`.

    An free text field containing keywords relevant for party.
* `agreements`\
  **Array of Objects**. Root level. Contained in `party_info`.\
  Object which contains details about contracts including data space contracts that party has agreed and signed to.
  * `type`

    **String**. Contained in the object of `agreements`. <mark style="color:red;">(Required)</mark>

    Type of agreement. Refers to the official type of agreement. For iSHARE following types are available Terms of Use, Accession Agreement, Certified Party Agreement, Participant Registry Agreement (former name Satellite Agreement will be deprecated). Additionally, each data space can define their own type and it can be listed here when appropriate data space is chosen.
  * `title`

    **String**. Contained in the object of `agreements`. <mark style="color:red;">(Required)</mark>

    The name of the agreement or agreement file.
  * `status`

    **String**. Contained in the object of `agreements`. <mark style="color:red;">(Required)</mark>

    Status of the agreement. Available values are *Draft*, *Signed*, *Accepted*, *Obsolete*.
  * `sign_date`

    **Timestamp (ISO 8601)**. Contained in the object of `agreements`. <mark style="color:red;">(Required)</mark>

    Date of signature of the agreement.
  * `expiry_date`

    **Timestamp (ISO 8601)**. Contained in the object of `agreements`. <mark style="color:red;">(Required)</mark>

    Expiry date of the agreement. For non expiring agreements the end date is far in future.
  * `agreement_file`

    **String**. Contained in the object of `agreements`.

    Base64 of the agreement file that proves the party has signed the agreement. Note agreements are not stored in ledger, but only their calculated `SHA-256` hash, so this attribute is only for create/update requests.
  * `hash_file`

    **String**. Contained in the object of `agreements`.

    The calculated hash of the agreement file that has been uploaded. If `hash_file` is provided, `agreement_file` MUST not be provided. Either `agreement_file` or `hash_file` MUST be provided.
  * `framework`

    **String**. Contained in the object of `agreements`. <mark style="color:red;">(Required)</mark>

    The trust framework to which this agreement complies to. Currently, only iSHARE is available.
  * `dataspace_id`

    **String**. Contained in the object of `agreements`.

    The ID of the data space. If specified, party is onboarded in accordance to this data space’s terms and conditions.
  * `compliancy_verified`

    **String**. Contained in the object of `agreements`. <mark style="color:red;">(Required)</mark>

    Legal compliance to this agreement has been verified in accordance with the process set in trust framework as we as data space governance. Possible values are *Yes*, *No*, *Not Applicable*.
* `certificates`

  **Array of Objects**. Root level. Contained in `party_info`.

  Object which contains the details of the PKI/x509 certificates of the party. Either certificates or SPOR must be present.

  * `subject_name`

    **String**. Contained in the object of `certificates`.

    subjectName as encoded in the X.509 certificate which corresponds with the party that is being requested from the Participant Registry.
  * `certificate_type`

    **String**. Contained in the object of `certificates`.

    Contains the type of certificate. Since only eIDAS eSEAL certificates are accepted as certificates, the value of this field must always be eSEAL.
  * `enabled_from`

    **Timestamp (ISO 8601)**. Contained in the object of `certificates`.

    UTC timestamp which states since when certificate is valid.
  * `x5c`

    **String**. Contained in the object of `certificates`.

    The base64 encoded pem format value of the certificate identified by its subject name and fingerprint.
  * `x5t#s256`

    **String**. Contained in the object of `certificates`.

    The SHA256 fingerprint of the certificate.
* `spor`

  **Array of Objects**. Root level. Contained in `party_info`.

  The signed proof received from recognised issuer (currently eID identity providers) of information about the organisation and the authorised representative of that organisation being authenticated with “High” level of assurance.

  * `signed_request`

    **String**. Contained in the object of `certifications`.

    verifiable credentials of the participant signed by a trusted authority vouching for its authenticity.

    * Value MUST be a JWT or a base64 string.
    * If JWT, it MUST be an “id\_token” as defined in Open ID Connect, issued to the user, with an additional “organisationIdentifier” attribute contained within, being the identifier of the organisation the authenticated user is representing. *OrganizationIdentifier* (issued by a Trust Service Provider (TSP)), SHOULD be in the format of this field described in [ETSI EN 319 412-1 V1.5.1, paragraph 5.1.4](https://www.etsi.org/deliver/etsi_en/319400_319499/31941201/01.05.01_60/en_31941201v010501p.pdf).
    * If the base64 encoded value, it MUST be a proof demonstrating that the authenticated user is validated by the Identity Provider and that the user is agreeing to sign up to become a participant. This can have similar information to id\_token or verifiable credential above, but in a different format.
* `roles`

  **Array of Objects**. Root level. Contained in `party_info`. <mark style="color:red;">(Required)</mark>

  Object which contains details about the iSHARE roles of the party. The details include the level of assurance as well as compliance status for each role.

  * `role`

    **String**. Contained in the object of `roles`. <mark style="color:red;">(Required)</mark>

    Role name. Possible roles are *ServiceConsumer*, *ServiceProvider*, *EntitledParty*, *AuthorisationRegistry*, *IdentityProvider*, *IdentityBroker* and *IdentityBroker* and *ParticipantRegistry*, *iShareSatellite* (deprecated, will be removed in future releases, use *ParticipantRegistry* instead).
  * `start_date`

    **Timestamp (ISO 8601)**. Contained in the object of `roles`. <mark style="color:red;">(Required)</mark>

    UTC timestamp which states since when certification is valid.
  * `end_date`

    **Timestamp (ISO 8601)**. Contained in the object of `roles`. <mark style="color:red;">(Required)</mark>

    UTC timestamp which states till when certification is valid.
  * `loa`

    **Integer**. Contained in the object of `roles`. <mark style="color:red;">(Required)</mark>

    Certificate’s level of assurance. Available values are *1* (low), *2* (substantial) and *3* (high).
  * `compliancy_verified`

    **Boolean**. Contained in the object of `roles`. <mark style="color:red;">(Required)</mark>

    Compliance requirements of this role has been met by party.
  * `legal_adherence`

    **Boolean**. Contained in the object of `roles`. <mark style="color:red;">(Required)</mark>

    Legal requirements of this role has been met by party including signing of appropriate agreements.
* `auth_registries`

  **Array of Objects**. Root level. Contained in `party_info`.

  Object which contains details about the authorisation registers that the party uses.*Please be aware that the current reference implementation of the iSHARE Satellite returns this information in an attribute "authregistery" instead of "auth\_registries". This will be updated in a future release.*

  * `name`

    **String**. Contained in the object of `auth_registries`.

    The name of the authorisation registry provider.
  * `id`

    **String**. Contained in the object of `auth_registries`.

    The Id of the authorisation registry provider.
  * `url`

    **String**. Contained in the object of `auth_registries`.

    The URL pointer specific to the party where authorisations can be queried/checked from.
  * `dataspace_id`

    **String**. Contained in the object of `auth_registries`.

    The id of the data space where the party uses this authorisation registry provider.
  * `dataspace_name`

    **String**. Contained in the object of `auth_registries`.

    The name of the data space where the party uses this authorisation registry provider.

### Example request

```json
{
  "id": "did:ishare:EU.NL.NTRNL-12345678",
  "alsoKnownAs": [
    "did:ishare:EU.NL.NTRNL-12345678",
    "did:elsi:LEIXG-724500AZSGBRY55MNS59",
    "did:web:example.com",
    "CoC:123456789"
  ],
  "schemaVersion": "v2.2",
  "party_name": "Example Corporation",
  "capability_url": "https://www.example.com/capabilities",
  "registrar_id": "did:ishare:EU.NL.NTRNL-12345678",
  "adherence": {
    "status": "Active",
    "start_date": "2023-01-31T00:00:00.000Z",
    "end_date": "2024-02-01T00:00:00.000Z"
  },
  "additional_info": {
    "description": "Example is a corporation providing example services to its customers in example regions",
    "logo": "https://www.example.com/logo.png",
    "website": "https://www.example.com/",
    "company_phone": "text",
    "company_email": "John.doe@example.com",
    "publicly_publishable": false,
    "countries_operation": [],
    "sector_industry": [],
    "tags": "mobility transport_operator"
  },
  "agreements": [
    {
      "type": "TermsOfUse",
      "title": "TOU",
      "status": "Accepted",
      "sign_date": "2023-01-31T00:00:00.000Z",
      "expiry_date": "2024-01-31T00:00:00.000Z",
      "agreement_file": "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",
      "framework": "iSHARE",
      "dataspace_id": "",
      "dataspace_title": "",
      "compliancy_verified": "yes"
    },
    {
      "type": "AccessionAgreement",
      "title": "AA",
      "status": "Accepted",
      "sign_date": "2023-01-31T00:00:00.000Z",
      "expiry_date": "2024-01-31T00:00:00.000Z",
      "agreement_file": "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",
      "framework": "iSHARE",
      "dataspace_id": "",
      "dataspace_title": "",
      "compliancy_verified": "yes"
    }
  ],
  "certificates": [
    {
      "subject_name": "CN=Test Service Consumer,organizationIdentifier=NTRNL-10000001,O=Test Service Consumer,C=NL",
      "certificate_type": "eSEAL",
      "enabled_from": "2023-01-31T00:00:00.000Z",
      "x5c": "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",
      "x5t#s256": "893AAD639BF8B0958EDBCF7D719023077D15828701A0A6FCC6D54A0684CE940D"
    }
  ],
  "spor": {
    "signed_request": "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.eyJpc3MiOiJkaWQ6aXNoYXJlOkVVLk5MLk5UUk5MLTEwMDAwMDA2Iiwic3ViIjoiNDE5NDA0ZTEtMDdjZS00ZDgwLTllOGEtZWNhOTR2ZGUwMDAzZGUiLCJhdWQiOiJkaWQ6aXNoYXJlOkVVLk5MLk5UUk5MLTEwMDAwMDAxIiwianRpIjoiNzgyYmIzOWUtMjQ4YS00NzA4LWI2MmUtZWZiMDVmYzM2MDQyIiwiZXhwIjoxNzY3MTc5ODY5LCJpYXQiOjE3NjcxNzk4MzksImF1dGhfdGltZSI6IjE1ODg5MjY3MDIiLCJub25jZSI6ImM0MjgyMjRjYTVhIiwiYWNyIjoidXJuOmh0dHA6Ly9laWRhcy5ldXJvcGEuZXUvTG9BL05vdE5vdGlmaWVkL2xvdyIsImF6cCI6ImRpZDppc2hhcmU6RVUuTkwuTlRSTkwtMTAwMDAwMDEiLCJvcmdhbmlzYXRpb25JZGVudGlmaWVyIjoiZGlkOmlzaGFyZTpFVS5OTC5OVFJOTC0xMDAwMDAwMiIsIm5iZiI6MTc2NzE3OTgzOX0.si963X3hhlpjMK67yyVt1Jo6ZGVCat3d4SeWMiYmx5Gp4FdvPFrEh6dNwew2_tUW41mzxZ4fRmD_AnWGa4_CmEVcmQMApncrtlm7hm43bMfuEcrQtfzaRZXAe_g2NmWnI20-IlPIHFPrsfqOs_BcJTWUezdT8yHD-SuVHxK0phDsYUMYG1JHeT3Hp6A4Ssz47EpmDBEAYCuyo5vyHiGjT0xE4OaDhic5fdUJacliNKYdEpj8ZYYQKJfGCO8onLJaGvl0F6MCjimbSq06FBiJUPyHiTjbSx_t-IdRVovsYkXFQkIKxF6eCBfl90zp_8SooxBc91uB_gFNy6nl3V6edL6tGuO0ddMTusD6xbB7h2znwF3rDcC-pFtT3oosd_Eu3lgSwGfBL8bVX8tu5XgW4gpNd-Oza3QHaKJb1AtArrVOT9dm7ha-ysOeNXfXhDIK5K98y2us9M2NhD1_E6ghS3SsyS4DDKx34T7fJGWfhp5CspY3_TnyYpjbBrpIzcVKdoa7lZChOUMdDk6krabyAtelR-4db9ftshbNZbUuDnT_6HyU1osjagDWtDjXdpLQPeBv2uIicimF5ABe7riJsHKgCAoSZxfp4l4DqecA_zKeo4thBB0nLg94zv8r1NU0jc00zC-iqE8fARKVub8HjfMe5VMyj0eKgkFsDhu8WcY"
  },
  "roles": [
    {
      "role": "EntitledParty",
      "start_date": "2023-01-31T00:00:00.000Z",
      "end_date": "2024-01-31T00:00:00.000Z",
      "loa": "High",
      "compliancy_verified": true,
      "legal_adherence": true
    }
  ],
  "auth_registries": [
    {
      "name": "iSHARE Test Authorization Registry",
      "id": "did:ishare:EU.NL.NTRNL-12345678",
      "url": "https://ar.isharetest.net/",
      "dataspace_id": "EU.DS.GND.NL.NGDDS",
      "dataspace_name": "Netherlands Green Deal Dataspace"
    }
  ]
}
```

### Response model

The response will be equal to the response of the GET request for retrieving a single party. Please refer to the [response model as defined here](/version-2.2/participant-registry-role/single-party.md#response-model).

### Example response

Please also refer to the [example response](/version-2.2/participant-registry-role/single-party.md#example-response) under the GET request definition.


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://dev.ishare.eu/version-2.2/participant-registry-role/parties-post.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
