Discovery
ESS uses /.well-known URIs to provide metadata about its services.
/.well-known URIs
/.well-known URIs/.well-known/openid-configuration
/.well-known/openid-configurationESS provides Solid OIDC Broker Service metadata at the following /.well-known/openid-configuration URI:
https://openid.<ESS DOMAIN>/.well-known/openid-configurationThe endpoint returns the current deployment’s Solid OIDC Broker Service metadata.
/.well-known/solid
/.well-known/solidESS provides Pod Storage Service (and related) metadata at the following .well-known/solid URI:
https://storage.{ESS Domain}/.well-known/solidIts Response.body returns Resource Description Framework (RDF) statements. Depending on your configuration, the response can include information about:
- List of applications that can perform read and write operations the Access Control Resources with the following caveat: 
Disambiguation
The list displays the value of Pod Storage Service‘s INRUPT_AUTHORIZATION_CLIENT_ID_ALLOW_LIST configuration value, which is for discoverability purposes only.
The actual configuration that determines which applications can access the ACR is the Authorization Service‘s INRUPT_AUTHORIZATION_CLIENT_ID_ALLOW_LIST.
As such, if the two lists are not in sync, the returned list from Pod Storage Service may not accurately reflect the trusted apps.
- Maximum number of Pods allowed per Agent. 
- Notification Gateway endpoint. 
- Provision service endpoint. 
- QPF service endpoint. 
@prefix solid: <http://www.w3.org/ns/solid/terms#> .
[ a                          solid:DiscoveryDocument ;
  <http://www.w3.org/ns/auth/acl#trustedApp>
          <https://inrupt.com> ;
  solid:maxPodsPerOwner      10 ;
  solid:notificationGateway  <https://notification.{ESS DOMAIN}.com/> ;
  solid:provision            <https://provision.{ESS DOMAIN}.com/>;
  solid:qpf                  <https://fragments.{ESS DOMAIN}.com/
] ./.well-known/uma2-configuration
/.well-known/uma2-configurationESS provides UMA service metadata resource at the following /.well-known/uma2-configuration URI:
https://uma.<ESS DOMAIN>/.well-known/uma2-configurationThe endpoint returns the current deployment’s UMA service configuration:
{
  "dpop_signing_alg_values_supported": [
    "ES256",
    "RS256"
  ],
  "grant_types_supported": [
    "urn:ietf:params:oauth:grant-type:uma-ticket"
  ],
  "issuer": "https://uma.<ESS DOMAIN>",
  "jwks_uri": "https://uma.<ESS DOMAIN>/jwks",
  "token_endpoint": "https://uma.<ESS DOMAIN>/token",
  "uma_profiles_supported": [
    "https://www.w3.org/TR/vc-data-model/#json-ld",
    "http://openid.net/specs/openid-connect-core-1_0.html#IDToken"
  ],
  "verifiable_credential_issuer": "https://vc.<ESS DOMAIN>"
}/.well-known/vc-configuration
/.well-known/vc-configurationESS provides a Access Grant Service metadata resource at the following /.well-known/vc-configuration URI:
https://vc.<ESS Domain>/.well-known/vc-configurationThe endpoint returns a JSON-LD document that includes the locations for the Access Grant Service endpoints:
{
  "@context": [
    "https://www.w3.org/2018/credentials/v1",
    "https://vc.<ESS Domain>/credentials/v1"
  ],
  "derivationService": "https://vc.<ESS Domain>/derive",
  "issuerService": "https://vc.<ESS Domain>/issue",
  "queryService": "https://vc.<ESS Domain>/query",
  "statusService": "https://vc.<ESS Domain>/status",
  "supportedSignatureTypes": [
    "Ed25519Signature2020"
  ],
  "verifierService": "https://vc.<ESS Domain>/verify"
}Last updated