Movatterモバイル変換


[0]ホーム

URL:


Telegram passport

Telegram Passport is a unified authorization method for services that require personal identification. Users can upload their documents once, then instantly share their data with services that require real-world ID (finance, ICOs, etc.). Telegram doesn't have access to the users' personal information thanks to end-to-end encryption.

This page describes the request flow that client apps must used to send the requested data to the service.

Overview

From the perspective of a service that requires real-world ID, the process looks like this:

  • A user presses “Log in with Telegram” on your website or in your app.
  • You request the data you need.
  • The user accepts your privacy policy and agrees to share their data.
  • The user's Telegram app downloads and decrypts the data you requested from the end-to-end encrypted storage on Telegram.
  • If some of the data you requested is missing, the user can add it to their Telegram Passport at this point.
  • The user's app encrypts the data with your public key and sends it to you.
  • You decrypt the data, check it for errors and re-request any missing or invalid information.
  • You sign the user up for your service. Tada!

SeeAs a bot to see how to request passport data using a bot, through the MTProto API.Look at thePassport Manual to see how to request passport data using a bot, through the simplified bot API.

From the perspective of a user, the process looks something like this:

  • Your appreceives an event/intent from one of theSDKs, or from a custom source.
  • The user accepts your privacy policy and agrees to share their data.
  • The user's Telegram appdownloads the data you requested from the end-to-end encrypted storage on Telegram.
  • If some of the data you requested is missing, the user canadd it to their Telegram Passport at this point.
  • The user's app encrypts the data with your public key and sends it to the service.
  • You sign the user up for your service. Tada!

SeeAs a user to see how user client apps should send passport data to a service, through the MTProto API.

As a bot

A simplified version of this process can be used using the bot API, for more info see thePassport Manual.

Using the MTProto API, the process is pretty much the same, up until the actual API calls.

Note that all binary fields are in raw binary format, unlike in the bot API where they are base64-encoded

Setting Up Telegram Passport

As per the bot API.

Requesting Information

As per the bot API.

Receiving information

Schema:

secureData#8aeabec3 data:bytes data_hash:bytes secret:bytes =SecureData;securePlainPhone#7d6099dd phone:string =SecurePlainData;securePlainEmail#21ec5a5f email:string =SecurePlainData;secureFile#7d09c27e id:long access_hash:long size:long dc_id:int date:int file_hash:bytes secret:bytes =SecureFile;secureValueTypePersonalDetails#9d2a81e3 =SecureValueType;secureValueTypePassport#3dac6a00 =SecureValueType;secureValueTypeDriverLicense#6e425c4 =SecureValueType;secureValueTypeIdentityCard#a0d0744b =SecureValueType;secureValueTypeInternalPassport#99a48f23 =SecureValueType;secureValueTypeAddress#cbe31e26 =SecureValueType;secureValueTypeUtilityBill#fc36954e =SecureValueType;secureValueTypeBankStatement#89137c0d =SecureValueType;secureValueTypeRentalAgreement#8b883488 =SecureValueType;secureValueTypePassportRegistration#99e3806a =SecureValueType;secureValueTypeTemporaryRegistration#ea02ec33 =SecureValueType;secureValueTypePhone#b320aadb =SecureValueType;secureValueTypeEmail#8e3ca7ee =SecureValueType;secureValue#187fa0ca flags:# type:SecureValueType data:flags.0?SecureData front_side:flags.1?SecureFile reverse_side:flags.2?SecureFile selfie:flags.3?SecureFile translation:flags.6?Vector<SecureFile> files:flags.4?Vector<SecureFile> plain_data:flags.5?SecurePlainData hash:bytes =SecureValue;secureCredentialsEncrypted#33f0ea47 data:bytes hash:bytes secret:bytes =SecureCredentialsEncrypted;messageActionSecureValuesSentMe#1b287353 values:Vector<SecureValue> credentials:SecureCredentialsEncrypted =MessageAction;messageService#2b085862 flags:# out:flags.1?true mentioned:flags.4?true media_unread:flags.5?true silent:flags.13?true post:flags.14?true legacy:flags.19?true id:int from_id:flags.8?Peer peer_id:Peer reply_to:flags.3?MessageReplyHeader date:int action:MessageAction ttl_period:flags.25?int =Message;updateNewMessage#1f2b0afd message:Message pts:int pts_count:int =Update;

When the user confirms your request by pressing the "Authorize" button, the MTProto API sends anupdateNewMessage from the user, with amessageService constructor, containing amessageActionSecureValuesSentMe constructor that contains the encrypted Telegram Passport data.

Decrypting data

secureCredentialsEncrypted#33f0ea47 data:bytes hash:bytes secret:bytes =SecureCredentialsEncrypted;messageActionSecureValuesSentMe#1b287353 values:Vector<SecureValue> credentials:SecureCredentialsEncrypted =MessageAction;

To decrypt the received data, first, decrypt the credentials contained insecureCredentialsEncrypted.

  1. Decrypt the credentials secret (secret field insecureCredentialsEncrypted) using yourprivate key (set OAEP padding option, e.g.OPENSSL_PKCS1_OAEP_PADDING in PHP)

  2. Use this secret and the credentials hash (hash field insecureCredentialsEncrypted) to calculatecredentials_key andcredentials_iv as described below:

     credentials_secret_hash = SHA512( credentials_secret + credentials_hash ) credentials_key = slice( credentials_secret_hash, 0, 32 ) credentials_iv = slice( credentials_secret_hash, 32, 16 )
  3. Decrypt the credentials data (data field insecureCredentialsEncrypted) by AES256-CBC using thesecredentials_key andcredentials_iv.IMPORTANT: At this step, make sure that the credentials hash is equal toSHA256( credentials_data )

  4. Credentials data is padded with 32 to 255 random padding bytes to make its length divisible by 16 bytes. The first byte contains the length of this padding (including this byte). Remove the padding to get the data.

Note that all hashes are raw binary data, not hexits

Credentials

The credentials are a JSON-serialized object, structured exactly as in thebot API ».Since decryption credentials are E2E encrypted, apps have to store the decryption credentials as JSON and not TL payloads.

The credentials are used as described in thePassport Manual to decrypt the files attached to thesecureValue.In this case, the container for the E2E encrypted data is in TL, while the encrypted data itself is in JSON.

secureValue
secureValue#187fa0ca flags:# type:SecureValueType data:flags.0?SecureData front_side:flags.1?SecureFile reverse_side:flags.2?SecureFile selfie:flags.3?SecureFile translation:flags.6?Vector<SecureFile> files:flags.4?Vector<SecureFile> plain_data:flags.5?SecurePlainData hash:bytes =SecureValue;messageActionSecureValuesSentMe#1b287353 values:Vector<SecureValue> credentials:SecureCredentialsEncrypted =MessageAction;

The schema for thesecureValue constructor defines the constructor that can be found in each field.

NameTypeDescription
typeSecureValueTypeSecurepassport value type
dataflags.0?SecureDataEncryptedTelegram Passport element data
front_sideflags.1?SecureFileEncryptedpassport file with the front side of the document
reverse_sideflags.2?SecureFileEncryptedpassport file with the reverse side of the document
selfieflags.3?SecureFileEncryptedpassport file with a selfie of the user holding the document
translationflags.6?Vector<SecureFile>Array of encryptedpassport files with translated versions of the provided documents
filesflags.4?Vector<SecureFile>Array of encryptedpassport files with photos the of the documents
plain_dataflags.5?SecurePlainDataPlaintext verifiedpassport data
hashbytesData hash

Here's a list of possibleSecureValueTypes, and the parameters that can be set/requested when using each type.

TypeAllowed fields
secureValueTypeEmailplain_data
secureValueTypePhoneplain_data
secureValueTypePersonalDetailsdata
secureValueTypePassportdata,front_side,selfie,translation
secureValueTypeDriverLicensedata,front_side,reverse_side,selfie,translation
secureValueTypeIdentityCarddata,front_side,reverse_side,selfie,translation
secureValueTypeInternalPassportdata,front_side,selfie,translation
secureValueTypeAddressdata
secureValueTypeUtilityBillfiles,translation
secureValueTypeBankStatementfiles,translation
secureValueTypeRentalAgreementfiles,translation
secureValueTypePassportRegistrationfiles,translation
secureValueTypeTemporaryRegistrationfiles,translation
SecureData
secureData#8aeabec3 data:bytes data_hash:bytes secret:bytes =SecureData;

Data is an encrypted and padded JSON-serialized object of one of the specified JSON types, depending on the chosentype.

Chosen typeJSON object
secureValueTypePersonalDetailsPersonalDetails
secureValueTypePassportIdDocumentData
secureValueTypeDriverLicenseIdDocumentData
secureValueTypeIdentityCardIdDocumentData
secureValueTypeInternalPassportIdDocumentData
secureValueTypeAddressResidentialAddress

DataCredentials extractedfrom the credentials can then be used to decrypt encrypted data from thedata field insecureData.For more info on how to decrypt thedata field, see thepassport manual.

SecureFile
secureFile#7d09c27e id:long access_hash:long size:long dc_id:int date:int file_hash:bytes secret:bytes =SecureFile;inputSecureFileLocation#cbc7ee28 id:long access_hash:long =InputFileLocation;---functions---upload.getFile#be5335be flags:# precise:flags.0?true cdn_supported:flags.1?true location:InputFileLocation offset:long limit:int =upload.File;

Files (JPG format when decrypted, max. 10 MB) are downloaded chunk by chunk as described infiles », except that instead of generating aninputFileLocation, aninputFileLocation should be generated, instead.

FileCredentials extractedfrom the credentials can then be used to decrypt downloaded encrypted data.For more info on how to decrypt passport files, see thepassport manual.

SecurePlainData
securePlainPhone#7d6099dd phone:string =SecurePlainData;securePlainEmail#21ec5a5f email:string =SecurePlainData;

The email/phone is passed in plaintext using the respectiveSecurePlainData constructor.Emails and phone numbers sent using telegram passport arealready verified as described in thepassport manual.

Fixing errors

secureValueErrorData#e8a40bd9 type:SecureValueType data_hash:bytes field:string text:string =SecureValueError;secureValueErrorFrontSide#be3dfa type:SecureValueType file_hash:bytes text:string =SecureValueError;secureValueErrorReverseSide#868a2aa5 type:SecureValueType file_hash:bytes text:string =SecureValueError;secureValueErrorSelfie#e537ced6 type:SecureValueType file_hash:bytes text:string =SecureValueError;secureValueErrorFile#7a700873 type:SecureValueType file_hash:bytes text:string =SecureValueError;secureValueErrorFiles#666220e9 type:SecureValueType file_hash:Vector<bytes> text:string =SecureValueError;secureValueError#869d758f type:SecureValueType hash:bytes text:string =SecureValueError;secureValueErrorTranslationFile#a1144770 type:SecureValueType file_hash:bytes text:string =SecureValueError;secureValueErrorTranslationFiles#34636dd8 type:SecureValueType file_hash:Vector<bytes> text:string =SecureValueError;inputUser#f21158c6 user_id:long access_hash:long =InputUser;---functions---users.setSecureValueErrors#90c894b5 id:InputUser errors:Vector<SecureValueError> =Bool;

If the data you received contains errors, the bot can use theusers.setSecureValueErrors method to inform the user andrequest information again. The user will not be able to resend the data, until all errors are fixed.

Descriptions of the method parameters can be found in the method'sdocumentation page ».

As a user

Receiving requests

The process starts when your app receives an event from one of theSDKs, or from a custom source.

URI format

The SDKs trigger a passport authorization request by opening the followingdeep links »:

tg: syntax:

tg://passport?bot_id=<bot_user_id>&scope=<scope>&public_key=<public_key>&nonce=<nonce>tg://resolve?domain=telegrampassport&bot_id=<bot_user_id>&scope=<scope>&public_key=<public_key>&nonce=<nonce>

With the following query string parameters:

ParametersTypeRequiredDescription
domainStringRequired only forresolve versions of the passport URIAlwaystelegrampassport for Passport authorization requests.
bot_idIntegerYesUnique identifier for the bot. You can get it from bot token. For example, for the bot token1234567:4TT8bAc8GHUspu3ERYn-KGcvsvGB9u_n4ddy, the bot id is1234567.
scopeUriPassportScopeYesA more compact JSON-serialized object describing the data you want to request
public_keyStringYesPublic key of the bot
nonceStringYesBot-specified nonce.Important: For security purposes it should be a cryptographically secure unique identifier of the request. In particular, it should be long enough and it should be generated using a cryptographically secure pseudorandom number generator. You should never accept credentials with the same nonce twice.
callback_urlStringOptionalSupported by some Telegram clients, specifies a callback URL to open once the process is finished or canceled.
payloadStringOptionalDeprecated parameter from Telegram Passport 1.0 that had the same function of thenonce parameter.
Services that still use a legacy version of the SDK may provide this parameter instead of thenonce.
In some cases, both thenonce and thepayload parameters may be found in a URI, for backwards compatibility: in this case, thenonce parameter should always be used instead ofpayload.

Example URI, generated by theTelegram Passport Example page:

tg://resolve?domain=telegrampassport&bot_id=543260180&scope=%7B%22v%22%3A1%2C%22d%22%3A%5B%7B%22_%22%3A%22pd%22%2C%22n%22%3A1%7D%2C%22ad%22%2C%22pn%22%2C%22em%22%2C%7B%22_%22%3A%5B%7B%22_%22%3A%22pp%22%2C%22s%22%3A1%2C%22t%22%3A1%7D%2C%22ip%22%2C%22dl%22%2C%22ic%22%5D%7D%2C%7B%22_%22%3A%5B%22ub%22%2C%22bs%22%2C%22ra%22%2C%22pr%22%2C%22tr%22%5D%7D%5D%7D&public_key=-----BEGIN%20PUBLIC%20KEY-----%0AMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAv6m1zBF8lZOCqcxf8hnj%0AkvHwuWdU8s4rBWaxKXH%2FvDDUklcCS5uhSnmjhxWca9suubaG3lW4HxlCilkeJPVf%0Ajimg5Q8ZqWrR3OoOihEpcG9iJZTOEpsEk7VtEiabgacBG3Quv9JslTrDe95Fn801%0At9d21HXwgMrHeHpWDOn31Dr%2BwoEH%2BkwySUWa6L%2FZbnGwSNP7eeDTE7Amz1RMDk3t%0A8EWGq58u0IQatPcEH09aUQlKzk6MIiALkZ9ILBKCBk6d2WCokKnsdBctovNbxwSx%0AhP1qst1r%2BYc8iPBZozsDC0ZsC5jXCkcODI3OC0tkNtYzN2XKalW5R0DjDRUDmGhT%0AzQIDAQAB%0A-----END%20PUBLIC%20KEY-----%0A&nonce=b8e892dc2e0afe63424d101b964f1256_32858210_708614a4585b84872e&callback_url=https%3A%2F%2Fcore.telegram.org%2Fpassport%2Fexample%3Fpassport_ssid%3Db8e892dc2e0afe63424d101b964f1256_32858210_db259b427f200751ce&payload=b8e892dc2e0afe63424d101b964f1256_32858210_708614a4585b84872e

UriPassportScope

This object represents the data to be requested.

FieldTypeDescription
dArray ofUriPassportScopeElementList of requested elements, each type may be used only once in the entire array of UriPassportScopeElement objects
vIntegerScope version, must be1
UriPassportScopeElement

This object represents a requested element, should be one of:

Passport document type identifiers are aliased with the following reduced type identifiers:

FullAlias
personal_detailspd
passportpp
driver_licensedl
identity_cardic
internal_passportip
id_documentidd
addressad
utility_billub
bank_statementbs
rental_agreementra
passport_registrationpr
temporary_registrationtr
address_documentadd
phone_numberpn
emailem

You can use the special type "idd" as an alias for one of "pp", "dl", "ic" and the special type "add" as an alias for one of "ub", "bs", "ra".

UriPassportScopeElementOneOfSeveral

This object represents several elements one of which must be provided.

FieldTypeDescription
_Array ofUriPassportScopeElementOneList of elements one of which must be provided; must contain either several of “pp”, “dl”, “ic”, “ip”or several of “ub”, “bs”, “ra”, “pr”, “tr”
sBooleanOptional. Use this parameter if you want to request a selfie with the document from this list that the user chooses to upload.
tBooleanOptional. Use this parameter if you want to request a translation of the document from this list that the user chooses to upload.Note: We suggest to only request translationsafter you have received a valid document that requires one.

UriPassportScopeElementOne

This object represents one particular element that must be provided. If no options are needed,String can be used instead of this object to specify the type of the element.

FieldTypeDescription
_StringElement type. One of "pd", "pp", "dl", "ic", "ip", "ad", "ub", "bs", "ra", "pr", "tr", "pn", "em"
sBooleanOptional. Use this parameter if you want to request a selfie with the document as well. Available for "pp", "dl", "ic" and "ip"
tBooleanOptional. Use this parameter if you want to request a translation of the document as well. Available for "pp", "dl", "ic", "ip", "ub", "bs", "ra", "pr" and "tr".Note: We suggest to only request translationsafter you have received a valid document that requires one.
nBooleanOptional. Use this parameter to request the first, last and middle name of the user in the language of the user's country of residence. Available for "pd"

You can also use the special type "idd" as an alias for one of "pp", "dl", "ic" and the special type "add" as an alias for one of "ub", "bs", "ra".

Setting up Telegram Passport

The next step for the client app is to request the user's 2FA passport, and configure Telegram Passport/fetch and decrypt remotely saved Telegram Passport parameters as described in theEncryption article ».

Fetching the passport form

account.authorizationForm#ad2e1cd8 flags:# required_types:Vector<SecureRequiredType> values:Vector<SecureValue> errors:Vector<SecureValueError> users:Vector<User> privacy_policy_url:flags.0?string =account.AuthorizationForm;---functions---account.getAuthorizationForm#a929597a bot_id:long scope:string public_key:string =account.AuthorizationForm;

Then, the client app passes the bot ID, scope and public key from thepassport authorization request to the Telegram servers using theaccount.getAuthorizationForm method.

The response will be anaccount.authorizationForm constructor, with info about the required document types, the URL of the service's privacy policy, as well as info about the bot to which the form should be sent.If the form was already submitted at least once, the constructor will also contain a list of already submitted data, along with eventual errors.

The user should accept the privacy policy and proceed to fill in the required data, and the client should encrypt and upload it as described in theEncryption article ».

Submitting the passport form

secureCredentialsEncrypted#33f0ea47 data:bytes hash:bytes secret:bytes =SecureCredentialsEncrypted;secureValueHash#ed1ecdb0 type:SecureValueType hash:bytes =SecureValueHash;---functions---account.acceptAuthorization#f3ed4c73 bot_id:long scope:string public_key:string value_hashes:Vector<SecureValueHash> credentials:SecureCredentialsEncrypted =Bool;

Once the user finishes uploading the required documents and clicks on the submit button, the client callsaccount.acceptAuthorization, submitting the documents to the bot associated to the service.

  • As before,bot_id,scope andpublic_key are taken from the authorization request URI.
  • value_hashes is used by the server to choose which document of which type to send to the bot: thetype field should be set to the document type, and thehash field should be set to thedata_hash/file_hash generated whenuploading encrypting the data ».
  • credentials contains the encrypted credentials required by the service to decrypt the sent E2E encrypted secure values: it is generated as described inPassport Credentials ».

Finally, the client opens the callback URL (if present).

Handling invalid forms

secureValueErrorData#e8a40bd9 type:SecureValueType data_hash:bytes field:string text:string =SecureValueError;secureValueErrorFrontSide#be3dfa type:SecureValueType file_hash:bytes text:string =SecureValueError;secureValueErrorReverseSide#868a2aa5 type:SecureValueType file_hash:bytes text:string =SecureValueError;secureValueErrorSelfie#e537ced6 type:SecureValueType file_hash:bytes text:string =SecureValueError;secureValueErrorFile#7a700873 type:SecureValueType file_hash:bytes text:string =SecureValueError;secureValueErrorFiles#666220e9 type:SecureValueType file_hash:Vector<bytes> text:string =SecureValueError;secureValueError#869d758f type:SecureValueType hash:bytes text:string =SecureValueError;secureValueErrorTranslationFile#a1144770 type:SecureValueType file_hash:bytes text:string =SecureValueError;secureValueErrorTranslationFiles#34636dd8 type:SecureValueType file_hash:Vector<bytes> text:string =SecureValueError;account.authorizationForm#ad2e1cd8 flags:# required_types:Vector<SecureRequiredType> values:Vector<SecureValue> errors:Vector<SecureValueError> users:Vector<User> privacy_policy_url:flags.0?string =account.AuthorizationForm;---functions---account.getAuthorizationForm#a929597a bot_id:long scope:string public_key:string =account.AuthorizationForm;

If any of the values of the submitted form are rejected by the service, the botcalls the appropriate method to set information about errors.

The user can find out about these errors directly from the service, or, if they decide torestart the process and resend the corrected data, directly from the authorization form (errors field).

Telegram
Telegram is a cloud-based mobile and desktop messaging app with a focus on security and speed.
About
Mobile Apps
Desktop Apps
Platform
About
Blog
Press
Moderation

[8]ページ先頭

©2009-2025 Movatter.jp