{"version":1,"pages":[{"id":"rgOjY6xFKU4zLxsRn2Ko","title":"About the DPI Wiki","pathname":"/","siteSpaceId":"sitesp_uyb1B","emoji":"1f389","description":"","breadcrumbs":[{"label":"THE DPI WIKI"}]},{"id":"k9qB3bqlGYiCegmWOydL","title":"What is DPI?","pathname":"/the-dpi-wiki/what-is-dpi","siteSpaceId":"sitesp_uyb1B","emoji":"1f506","breadcrumbs":[{"label":"THE DPI WIKI"}]},{"id":"zBOsU5brNqmIwnYFAjkd","title":"DPI Overview","pathname":"/the-dpi-wiki/dpi-overview","siteSpaceId":"sitesp_uyb1B","emoji":"2728","description":"An approach that works to transform nations at scale","breadcrumbs":[{"label":"THE DPI WIKI"}]},{"id":"GRoiM8P8EmCpqmJnWRqB","title":"DPI Tech Architecture Principles","pathname":"/the-dpi-wiki/dpi-tech-architecture-principles","siteSpaceId":"sitesp_uyb1B","emoji":"1f4dd","description":"How do we distinguish regular digitisation efforts from DPI?","breadcrumbs":[{"label":"THE DPI WIKI"}]},{"id":"GpLAZX8LRY2xi7jUgNXJ","title":"Interoperability","pathname":"/the-dpi-wiki/dpi-tech-architecture-principles/interoperability","siteSpaceId":"sitesp_uyb1B","emoji":"1f517","description":"Driven by Open Specifications","breadcrumbs":[{"label":"THE DPI WIKI"},{"label":"DPI Tech Architecture Principles","emoji":"1f4dd"}]},{"id":"XOEmzGtBexsQcOEdYqR4","title":"Minimalist & Reusable Building Blocks","pathname":"/the-dpi-wiki/dpi-tech-architecture-principles/minimalist-and-reusable-building-blocks","siteSpaceId":"sitesp_uyb1B","emoji":"1f9f1","description":"Not full solutions!","breadcrumbs":[{"label":"THE DPI WIKI"},{"label":"DPI Tech Architecture Principles","emoji":"1f4dd"}]},{"id":"S58U1dtc7GEFWbVuXeVH","title":"Diverse, Inclusive Innovation","pathname":"/the-dpi-wiki/dpi-tech-architecture-principles/diverse-inclusive-innovation","siteSpaceId":"sitesp_uyb1B","emoji":"1f4a1","description":"by the ecosystem, via open and multi-modal access","breadcrumbs":[{"label":"THE DPI WIKI"},{"label":"DPI Tech Architecture Principles","emoji":"1f4dd"}]},{"id":"8ek3Wcm6iWz3Ec32wlZW","title":"Federated & Decentralised by Design","pathname":"/the-dpi-wiki/dpi-tech-architecture-principles/federated-and-decentralised-by-design","siteSpaceId":"sitesp_uyb1B","emoji":"1f4a0","description":"","breadcrumbs":[{"label":"THE DPI WIKI"},{"label":"DPI Tech Architecture Principles","emoji":"1f4dd"}]},{"id":"9EiJSeqtXu6ry7qFPkxe","title":"Security & Privacy By Design","pathname":"/the-dpi-wiki/dpi-tech-architecture-principles/security-and-privacy-by-design","siteSpaceId":"sitesp_uyb1B","emoji":"1f510","description":"","breadcrumbs":[{"label":"THE DPI WIKI"},{"label":"DPI Tech Architecture Principles","emoji":"1f4dd"}]},{"id":"cZWWT7uETrwEqHK0ryQl","title":"DPI Implementation & Execution Guidance","pathname":"/the-dpi-wiki/dpi-implementation-and-execution-guidance","siteSpaceId":"sitesp_uyb1B","emoji":"1f3af","description":"21 implementation suggestions to bring digital infrastructure in your country to life","breadcrumbs":[{"label":"THE DPI WIKI"}]},{"id":"LH7Mt2YLLZdqTfJtoUmi","title":"DPG and DPI","pathname":"/the-dpi-wiki/dpg-and-dpi","siteSpaceId":"sitesp_uyb1B","emoji":"1f19a","description":"Are DPGs and DPI the same thing? Are DPGs necessary to build DPI? Read on to know more!","breadcrumbs":[{"label":"THE DPI WIKI"}]},{"id":"a9lHYMLgEKKCEkWny2DC","title":"What DPI can I build?","pathname":"/the-dpi-wiki/what-dpi-can-i-build","siteSpaceId":"sitesp_uyb1B","emoji":"2753","description":"Ideas to drive exponential socio-economic growth in your country based on your role","breadcrumbs":[{"label":"THE DPI WIKI"}]},{"id":"RwDohUJyXAvolxxtNTbH","title":"First use case for DPI","pathname":"/the-dpi-wiki/first-use-case-for-dpi","siteSpaceId":"sitesp_uyb1B","emoji":"1f947","description":"How should a country choose a killer use-case to get exponential scale up for a DPI building block?","breadcrumbs":[{"label":"THE DPI WIKI"}]},{"id":"PXIunvzXIWI0xH9uWAOV","title":"Inputs for designing a DPI informed digital transformation strategy","pathname":"/the-dpi-wiki/inputs-for-designing-a-dpi-informed-digital-transformation-strategy","siteSpaceId":"sitesp_uyb1B","emoji":"1f4d8","breadcrumbs":[{"label":"THE DPI WIKI"}]},{"id":"GC4i5J8hqoQFIYApmu0T","title":"How much does it cost to build DPI?","pathname":"/the-dpi-wiki/how-much-does-it-cost-to-build-dpi","siteSpaceId":"sitesp_uyb1B","emoji":"1f4b0","description":"DPI does not have to be expensive to build!","breadcrumbs":[{"label":"THE DPI WIKI"}]},{"id":"rYd03uCDdnkSTwFprkV4","title":"Is my system a DPI?","pathname":"/the-dpi-wiki/is-my-system-a-dpi","siteSpaceId":"sitesp_uyb1B","emoji":"1f4e2","breadcrumbs":[{"label":"THE DPI WIKI"}]},{"id":"f0djeJxg5JEYuUHFKPQM","title":"TL; DR - Is my system a DPI?","pathname":"/the-dpi-wiki/is-my-system-a-dpi/tl-dr-is-my-system-a-dpi","siteSpaceId":"sitesp_uyb1B","description":"A crisp, easy to consume summary of the previous article","breadcrumbs":[{"label":"THE DPI WIKI"},{"label":"Is my system a DPI?","emoji":"1f4e2"}]},{"id":"VxdGaCqjBeVGIQHYnfcJ","title":"Building a SuperApp: A three step guide to apply DPI thinking","pathname":"/the-dpi-wiki/building-a-superapp-a-three-step-guide-to-apply-dpi-thinking","siteSpaceId":"sitesp_uyb1B","emoji":"1f4f1","breadcrumbs":[{"label":"THE DPI WIKI"}]},{"id":"qYBaufKNZqH4KcE6EP7A","title":"DPI and Mandating Adoption","pathname":"/mythbusters-and-faqs/dpi-and-mandating-adoption","siteSpaceId":"sitesp_uyb1B","emoji":"1f52f","breadcrumbs":[{"label":"Mythbusters and FAQs"}]},{"id":"2ZaOEp2cOLMRD6U7wu7z","title":"DPI and Private Competition","pathname":"/mythbusters-and-faqs/dpi-and-private-competition","siteSpaceId":"sitesp_uyb1B","emoji":"1f52f","breadcrumbs":[{"label":"Mythbusters and FAQs"}]},{"id":"KLudDdLOKjUlOo8vYSBT","title":"DPI and Privacy/Security","pathname":"/mythbusters-and-faqs/dpi-and-privacy-security","siteSpaceId":"sitesp_uyb1B","emoji":"1f52f","breadcrumbs":[{"label":"Mythbusters and FAQs"}]},{"id":"wKktcaPZrFVZbwmq5ASx","title":"DPI and the Digital Divide","pathname":"/mythbusters-and-faqs/readme","siteSpaceId":"sitesp_uyb1B","emoji":"1f52f","description":"","breadcrumbs":[{"label":"Mythbusters and FAQs"}]},{"id":"TfQ3WN98z8pi3gq8ACUg","title":"Identifiers & Registries","pathname":"/technical-notes/digital-ids-and-electronic-registries","siteSpaceId":"sitesp_uyb1B","emoji":"1f194","description":"Who is the counterparty? Can I trust them?","breadcrumbs":[{"label":"Technical Notes"}]},{"id":"ARIrFV3rYcms6j9qoeAC","title":"Digital ID","pathname":"/technical-notes/digital-ids-and-electronic-registries/digital-id","siteSpaceId":"sitesp_uyb1B","description":"Many countries have built Digital IDs, including Singapore (Singpass), Rwanda’s national ID with eKYC, Chile’s national ID and India's Digital ID (Aadhaar).","breadcrumbs":[{"label":"Technical Notes"},{"label":"Identifiers & Registries","emoji":"1f194"}]},{"id":"uPQsKJbW3sqLLvhG1inp","title":"Capabilities on ID system","pathname":"/technical-notes/digital-ids-and-electronic-registries/digital-id/capabilities-on-id-system","siteSpaceId":"sitesp_uyb1B","description":"How to convert any ID system into a DPI","breadcrumbs":[{"label":"Technical Notes"},{"label":"Identifiers & Registries","emoji":"1f194"},{"label":"Digital ID"}]},{"id":"j2kQHicWZMfAgWaSvlMo","title":"ID-Auth","pathname":"/technical-notes/digital-ids-and-electronic-registries/digital-id/id-auth","siteSpaceId":"sitesp_uyb1B","breadcrumbs":[{"label":"Technical Notes"},{"label":"Identifiers & Registries","emoji":"1f194"},{"label":"Digital ID"}]},{"id":"gypEHm4qfhXWCYLCyg6c","title":"Face Authentication","pathname":"/technical-notes/digital-ids-and-electronic-registries/digital-id/face-authentication","siteSpaceId":"sitesp_uyb1B","description":"Approach to enabling inclusion in onboarding individuals for use cases such as social protection","breadcrumbs":[{"label":"Technical Notes"},{"label":"Identifiers & Registries","emoji":"1f194"},{"label":"Digital ID"}]},{"id":"7dhVHxvjOUVe0REoFwmb","title":"eKYC/ Identity profile sharing","pathname":"/technical-notes/digital-ids-and-electronic-registries/digital-id/ekyc-identity-profile-sharing","siteSpaceId":"sitesp_uyb1B","breadcrumbs":[{"label":"Technical Notes"},{"label":"Identifiers & Registries","emoji":"1f194"},{"label":"Digital ID"}]},{"id":"OsS8lMUVhNyo1Pn9w46K","title":"Single Sign On (SSO)","pathname":"/technical-notes/digital-ids-and-electronic-registries/digital-id/single-sign-on-sso","siteSpaceId":"sitesp_uyb1B","breadcrumbs":[{"label":"Technical Notes"},{"label":"Identifiers & Registries","emoji":"1f194"},{"label":"Digital ID"}]},{"id":"xqC40vFjYtnhgujbkQpN","title":"QR Code for Offline ID","pathname":"/technical-notes/digital-ids-and-electronic-registries/digital-id/qr-code-for-offline-id","siteSpaceId":"sitesp_uyb1B","description":"Best practices design and implementation guide","breadcrumbs":[{"label":"Technical Notes"},{"label":"Identifiers & Registries","emoji":"1f194"},{"label":"Digital ID"}]},{"id":"EZT4LcXtKL08eD3qWDWX","title":"Data Sharing, Credentials and Models","pathname":"/technical-notes/data-and-credentialing-infra","siteSpaceId":"sitesp_uyb1B","emoji":"1f4c2","description":"Can an individual/entity/society use its data for empowerment and improved services?","breadcrumbs":[{"label":"Technical Notes"}]},{"id":"HtmHGQVm5Bxnie5s9YxD","title":"A primer to personal data sharing","pathname":"/technical-notes/data-and-credentialing-infra/a-primer-to-personal-data-sharing","siteSpaceId":"sitesp_uyb1B","breadcrumbs":[{"label":"Technical Notes"},{"label":"Data Sharing, Credentials and Models","emoji":"1f4c2"}]},{"id":"F3JF6n2h2kYiHhFFYUQm","title":"Data standards","pathname":"/technical-notes/data-and-credentialing-infra/data-standards","siteSpaceId":"sitesp_uyb1B","description":"A key technology enabler in data exchange","breadcrumbs":[{"label":"Technical Notes"},{"label":"Data Sharing, Credentials and Models","emoji":"1f4c2"}]},{"id":"dljgjoI8HC93sPoSW2Gg","title":"Verifiable Credentials","pathname":"/technical-notes/data-and-credentialing-infra/verifiable-credentials","siteSpaceId":"sitesp_uyb1B","breadcrumbs":[{"label":"Technical Notes"},{"label":"Data Sharing, Credentials and Models","emoji":"1f4c2"}]},{"id":"OnlNG8U54dZD3p2Mj4W0","title":"Building Data Analytics Pipelines","pathname":"/technical-notes/data-and-credentialing-infra/building-data-analytics-pipelines","siteSpaceId":"sitesp_uyb1B","breadcrumbs":[{"label":"Technical Notes"},{"label":"Data Sharing, Credentials and Models","emoji":"1f4c2"}]},{"id":"mXOL62jT8sXj8dRvpFQ2","title":"eLockers","pathname":"/technical-notes/data-and-credentialing-infra/elockers","siteSpaceId":"sitesp_uyb1B","description":"A powerful intervention to scale up trusted digital credentials across the ecosystem","breadcrumbs":[{"label":"Technical Notes"},{"label":"Data Sharing, Credentials and Models","emoji":"1f4c2"}]},{"id":"AgKAQwUZOHoFIe2RYV2A","title":"Non-personal Anonymised Datasets","pathname":"/technical-notes/data-and-credentialing-infra/non-personal-anonymised-datasets","siteSpaceId":"sitesp_uyb1B","description":"Guidelines for for Decision Making & Research","breadcrumbs":[{"label":"Technical Notes"},{"label":"Data Sharing, Credentials and Models","emoji":"1f4c2"}]},{"id":"DI9XR8Kkbp9lAGyTqvNz","title":"Decision Framework for Verifiable Credentials","pathname":"/technical-notes/data-and-credentialing-infra/decision-framework-for-verifiable-credentials","siteSpaceId":"sitesp_uyb1B","breadcrumbs":[{"label":"Technical Notes"},{"label":"Data Sharing, Credentials and Models","emoji":"1f4c2"}]},{"id":"9LBWIKY3rqRN4ZkuBFxH","title":"Trust Infra","pathname":"/technical-notes/electronic-signature-pki-and-trust-infra","siteSpaceId":"sitesp_uyb1B","emoji":"1f50f","description":"Can I assert in a tamper-proof manner that X item was agreed upon by and/or came from source Y?","breadcrumbs":[{"label":"Technical Notes"}]},{"id":"GDOqF95ktUVFShRqpPb8","title":"Digital Signatures and PKI","pathname":"/technical-notes/electronic-signature-pki-and-trust-infra/digital-signatures-and-pki","siteSpaceId":"sitesp_uyb1B","breadcrumbs":[{"label":"Technical Notes"},{"label":"Trust Infra","emoji":"1f50f"}]},{"id":"X3kUE991fnHJSciqiGKi","title":"eConsent","pathname":"/technical-notes/electronic-signature-pki-and-trust-infra/econsent","siteSpaceId":"sitesp_uyb1B","breadcrumbs":[{"label":"Technical Notes"},{"label":"Trust Infra","emoji":"1f50f"}]},{"id":"c0MPilk4QmrZXGbLGhvU","title":"eSign","pathname":"/technical-notes/electronic-signature-pki-and-trust-infra/esign","siteSpaceId":"sitesp_uyb1B","breadcrumbs":[{"label":"Technical Notes"},{"label":"Trust Infra","emoji":"1f50f"}]},{"id":"IgUUVLQNdsclvE6rmQyw","title":"Discovery & Fulfilment","pathname":"/technical-notes/discovery-and-fulfillment-networks","siteSpaceId":"sitesp_uyb1B","emoji":"1f6d2","description":"Accessing any goods or services interoperably via any app or interface","breadcrumbs":[{"label":"Technical Notes"}]},{"id":"I0XcPU7au2yQJDAARDJd","title":"Platforms to Protocols","pathname":"/technical-notes/discovery-and-fulfillment-networks/platforms-to-protocols","siteSpaceId":"sitesp_uyb1B","description":"Why do we need open networks?","breadcrumbs":[{"label":"Technical Notes"},{"label":"Discovery & Fulfilment","emoji":"1f6d2"}]},{"id":"ZApozyZvAESlCJiCEOFj","title":"Payments","pathname":"/technical-notes/digital-payment-networks","siteSpaceId":"sitesp_uyb1B","emoji":"1f4b8","description":"P2P, P2M, B2B, G2P, and P2G.","breadcrumbs":[{"label":"Technical Notes"}]},{"id":"bDBYsWYvk80QGsPixwTB","title":"Financial Address","pathname":"/technical-notes/digital-payment-networks/financial-address","siteSpaceId":"sitesp_uyb1B","description":"Normalised financial address for payments","breadcrumbs":[{"label":"Technical Notes"},{"label":"Payments","emoji":"1f4b8"}]},{"id":"btKUDhIjHRgM9MQPxZRj","title":"Interoperable QR Code","pathname":"/technical-notes/digital-payment-networks/interoperable-qr-code","siteSpaceId":"sitesp_uyb1B","description":"P2P, P2M, Recurring/Bill Payments, etc.,","breadcrumbs":[{"label":"Technical Notes"},{"label":"Payments","emoji":"1f4b8"}]},{"id":"XwNqAzMRw3MxIh2kJpmy","title":"Interoperable Authentication","pathname":"/technical-notes/digital-payment-networks/interoperable-authentication-p2p-p2m","siteSpaceId":"sitesp_uyb1B","description":"P2P, P2M","breadcrumbs":[{"label":"Technical Notes"},{"label":"Payments","emoji":"1f4b8"}]},{"id":"98cug7ikxVhPF6y0EbWq","title":"Interoperable Bill Payments","pathname":"/technical-notes/digital-payment-networks/interoperable-bill-payments","siteSpaceId":"sitesp_uyb1B","description":"Streamlining the process of bill payments across authorities and departments","breadcrumbs":[{"label":"Technical Notes"},{"label":"Payments","emoji":"1f4b8"}]},{"id":"hroePStYpL383SN5KCNG","title":"Cash-in Cash-Out (CICO)","pathname":"/technical-notes/digital-payment-networks/cash-in-cash-out-cico","siteSpaceId":"sitesp_uyb1B","description":"Interoperable banking agents and devices for last-mile CICO transactions","breadcrumbs":[{"label":"Technical Notes"},{"label":"Payments","emoji":"1f4b8"}]},{"id":"xtajmro6w9dkITBC69kE","title":"G2P Payments","pathname":"/technical-notes/digital-payment-networks/g2p-payments","siteSpaceId":"sitesp_uyb1B","description":"Increasing Efficiency of Government-to-Person Payments","breadcrumbs":[{"label":"Technical Notes"},{"label":"Payments","emoji":"1f4b8"}]},{"id":"IT6Dl1bsteZWeaPnh0wO","title":"Cloud-Agnostic Deployment of DPI and Data Portability","pathname":"/technical-notes/cloud-agnostic-deployment-of-dpi-and-data-portability","siteSpaceId":"sitesp_uyb1B","icon":"cloud-binary","breadcrumbs":[{"label":"Technical Notes"}]},{"id":"u04WRM0jtKH6y5tUUMD0","title":"Architectural Principles for Cloud-Agnostic DPI","pathname":"/technical-notes/cloud-agnostic-deployment-of-dpi-and-data-portability/architectural-principles-for-cloud-agnostic-dpi","siteSpaceId":"sitesp_uyb1B","breadcrumbs":[{"label":"Technical Notes"},{"label":"Cloud-Agnostic Deployment of DPI and Data Portability","icon":"cloud-binary"}]},{"id":"ZmjAxTOzSJMhhC18mjEa","title":"Design deep dive","pathname":"/technical-notes/cloud-agnostic-deployment-of-dpi-and-data-portability/design-deep-dive","siteSpaceId":"sitesp_uyb1B","breadcrumbs":[{"label":"Technical Notes"},{"label":"Cloud-Agnostic Deployment of DPI and Data Portability","icon":"cloud-binary"}]},{"id":"DfINiqnXnkFp0GeS7YPA","title":"Data Portability as Core Principle","pathname":"/technical-notes/cloud-agnostic-deployment-of-dpi-and-data-portability/data-portability-as-core-principle","siteSpaceId":"sitesp_uyb1B","breadcrumbs":[{"label":"Technical Notes"},{"label":"Cloud-Agnostic Deployment of DPI and Data Portability","icon":"cloud-binary"}]},{"id":"Roh88KX3p6WJZwQDcKaz","title":"Implementation Patterns","pathname":"/technical-notes/cloud-agnostic-deployment-of-dpi-and-data-portability/implementation-patterns","siteSpaceId":"sitesp_uyb1B","breadcrumbs":[{"label":"Technical Notes"},{"label":"Cloud-Agnostic Deployment of DPI and Data Portability","icon":"cloud-binary"}]},{"id":"ATnBmPyU72eXyeEhew07","title":"The Role of One-Click Deployment","pathname":"/technical-notes/cloud-agnostic-deployment-of-dpi-and-data-portability/the-role-of-one-click-deployment","siteSpaceId":"sitesp_uyb1B","breadcrumbs":[{"label":"Technical Notes"},{"label":"Cloud-Agnostic Deployment of DPI and Data Portability","icon":"cloud-binary"}]},{"id":"boojfiXJOH9ICGoqZezP","title":"Governance and Decision Frameworks","pathname":"/technical-notes/cloud-agnostic-deployment-of-dpi-and-data-portability/governance-and-decision-frameworks","siteSpaceId":"sitesp_uyb1B","breadcrumbs":[{"label":"Technical Notes"},{"label":"Cloud-Agnostic Deployment of DPI and Data Portability","icon":"cloud-binary"}]},{"id":"pfFSVB25mqBv2qE58gUY","title":"Challenges and Trade-offs","pathname":"/technical-notes/cloud-agnostic-deployment-of-dpi-and-data-portability/challenges-and-trade-offs","siteSpaceId":"sitesp_uyb1B","breadcrumbs":[{"label":"Technical Notes"},{"label":"Cloud-Agnostic Deployment of DPI and Data Portability","icon":"cloud-binary"}]},{"id":"3a7jsXP97qUVkR505GYB","title":"Recommendations for DPI Implementations by System Maturity","pathname":"/technical-notes/cloud-agnostic-deployment-of-dpi-and-data-portability/recommendations-for-dpi-implementations-by-system-maturity","siteSpaceId":"sitesp_uyb1B","breadcrumbs":[{"label":"Technical Notes"},{"label":"Cloud-Agnostic Deployment of DPI and Data Portability","icon":"cloud-binary"}]},{"id":"4XccbmX5EAJQKqaEShX7","title":"Future Directions","pathname":"/technical-notes/cloud-agnostic-deployment-of-dpi-and-data-portability/future-directions","siteSpaceId":"sitesp_uyb1B","breadcrumbs":[{"label":"Technical Notes"},{"label":"Cloud-Agnostic Deployment of DPI and Data Portability","icon":"cloud-binary"}]},{"id":"JhLgRg3TsPWe8dvTqfNi","title":"DPI advisory","pathname":"/initiatives/dpi-advisory","siteSpaceId":"sitesp_uyb1B","emoji":"1f310","description":"CDPI's individual, customised engagement with countries!","breadcrumbs":[{"label":"Initiatives"}]},{"id":"wvAOGbuxgGXZBinr9PD6","title":"DPI as a Packaged Solution (DaaS)","pathname":"/initiatives/dpi-as-a-packaged-solution-daas","siteSpaceId":"sitesp_uyb1B","emoji":"1f680","description":"A Transformative but Simple Innovation to Implement DPI with Speed","breadcrumbs":[{"label":"Initiatives"}]},{"id":"NuKHYWsxTWHCIa4zOwqc","title":"Why do we need DaaS?","pathname":"/initiatives/dpi-as-a-packaged-solution-daas/why-do-we-need-daas","siteSpaceId":"sitesp_uyb1B","emoji":"1f4a1","breadcrumbs":[{"label":"Initiatives"},{"label":"DPI as a Packaged Solution (DaaS)","emoji":"1f680"}]},{"id":"M9DnkECyFn8Nt7PvbcOe","title":"DaaS in a nutshell","pathname":"/initiatives/dpi-as-a-packaged-solution-daas/daas-in-a-nutshell","siteSpaceId":"sitesp_uyb1B","emoji":"1f3af","breadcrumbs":[{"label":"Initiatives"},{"label":"DPI as a Packaged Solution (DaaS)","emoji":"1f680"}]},{"id":"6yGetmCzMks6xHW42mLm","title":"Pre-packaged DaaS kits","pathname":"/initiatives/dpi-as-a-packaged-solution-daas/pre-packaged-daas-kits","siteSpaceId":"sitesp_uyb1B","emoji":"1f4e6","breadcrumbs":[{"label":"Initiatives"},{"label":"DPI as a Packaged Solution (DaaS)","emoji":"1f680"}]},{"id":"A2Aiw5nihI7GmrGAZMIB","title":"Reusable DaaS Artefacts","pathname":"/initiatives/dpi-as-a-packaged-solution-daas/reusable-daas-artefacts","siteSpaceId":"sitesp_uyb1B","emoji":"267b","breadcrumbs":[{"label":"Initiatives"},{"label":"DPI as a Packaged Solution (DaaS)","emoji":"1f680"}]},{"id":"TZmmlRIrEdMJwwOu4clx","title":"A 3-step process from idea to implementation!","pathname":"/initiatives/dpi-as-a-packaged-solution-daas/a-3-step-process-from-idea-to-implementation","siteSpaceId":"sitesp_uyb1B","emoji":"0033-20e3","breadcrumbs":[{"label":"Initiatives"},{"label":"DPI as a Packaged Solution (DaaS)","emoji":"1f680"}]},{"id":"ymy19OPEitXpGQDkOLOV","title":"Funded DaaS Program overview","pathname":"/initiatives/dpi-as-a-packaged-solution-daas/funded-daas-program-overview","siteSpaceId":"sitesp_uyb1B","emoji":"1f4c8","description":"Deploy DPI in your country by competitively applying for the Funded DaaS Program","breadcrumbs":[{"label":"Initiatives"},{"label":"DPI as a Packaged Solution (DaaS)","emoji":"1f680"}]},{"id":"7xUDV8jTutxt12n3hBVG","title":"Cohort 1: DaaS Offerings","pathname":"/initiatives/dpi-as-a-packaged-solution-daas/cohort-1-daas-offerings","siteSpaceId":"sitesp_uyb1B","emoji":"1f469-1f4bb","breadcrumbs":[{"label":"Initiatives"},{"label":"DPI as a Packaged Solution (DaaS)","emoji":"1f680"}]},{"id":"bKxUk0oRQOgNzRYfCxL1","title":"Digital authentication","pathname":"/initiatives/dpi-as-a-packaged-solution-daas/cohort-1-daas-offerings/digital-authentication","siteSpaceId":"sitesp_uyb1B","breadcrumbs":[{"label":"Initiatives"},{"label":"DPI as a Packaged Solution (DaaS)","emoji":"1f680"},{"label":"Cohort 1: DaaS Offerings","emoji":"1f469-1f4bb"}]},{"id":"JDRxhjQePLiJR9Hhn4Do","title":"Digital credentials","pathname":"/initiatives/dpi-as-a-packaged-solution-daas/cohort-1-daas-offerings/digital-credentials","siteSpaceId":"sitesp_uyb1B","breadcrumbs":[{"label":"Initiatives"},{"label":"DPI as a Packaged Solution (DaaS)","emoji":"1f680"},{"label":"Cohort 1: DaaS Offerings","emoji":"1f469-1f4bb"}]},{"id":"n6ifvQGHgMCiRPP5hqyP","title":"ID Account Mapper","pathname":"/initiatives/dpi-as-a-packaged-solution-daas/cohort-1-daas-offerings/id-account-mapper","siteSpaceId":"sitesp_uyb1B","breadcrumbs":[{"label":"Initiatives"},{"label":"DPI as a Packaged Solution (DaaS)","emoji":"1f680"},{"label":"Cohort 1: DaaS Offerings","emoji":"1f469-1f4bb"}]},{"id":"EVS6CYr3I5mc94tEIx99","title":"Co-create with us!","pathname":"/initiatives/dpi-as-a-packaged-solution-daas/co-create-with-us","siteSpaceId":"sitesp_uyb1B","emoji":"1f5a5","description":"If you are a DPG, SP or ISV looking to scale DPI implementations - partner with us!","breadcrumbs":[{"label":"Initiatives"},{"label":"DPI as a Packaged Solution (DaaS)","emoji":"1f680"}]},{"id":"T4GsheauGFVNXUkOWH5B","title":"Upcoming DaaS cohorts","pathname":"/initiatives/dpi-as-a-packaged-solution-daas/upcoming-daas-cohorts","siteSpaceId":"sitesp_uyb1B","emoji":"1f4ac","breadcrumbs":[{"label":"Initiatives"},{"label":"DPI as a Packaged Solution (DaaS)","emoji":"1f680"}]},{"id":"EGhSexJuWBYkkLfOwwDW","title":"Functional Registries","pathname":"/initiatives/dpi-as-a-packaged-solution-daas/upcoming-daas-cohorts/functional-registries","siteSpaceId":"sitesp_uyb1B","breadcrumbs":[{"label":"Initiatives"},{"label":"DPI as a Packaged Solution (DaaS)","emoji":"1f680"},{"label":"Upcoming DaaS cohorts","emoji":"1f4ac"}]},{"id":"43BnKIspMVCWDLnVIqwh","title":"AI Assistant","pathname":"/initiatives/dpi-as-a-packaged-solution-daas/upcoming-daas-cohorts/ai-assistant","siteSpaceId":"sitesp_uyb1B","breadcrumbs":[{"label":"Initiatives"},{"label":"DPI as a Packaged Solution (DaaS)","emoji":"1f680"},{"label":"Upcoming DaaS cohorts","emoji":"1f4ac"}]},{"id":"65T4hNlXh23TwTMgWcSO","title":"FAQs on DaaS","pathname":"/initiatives/dpi-as-a-packaged-solution-daas/faqs-on-daas","siteSpaceId":"sitesp_uyb1B","emoji":"2753","breadcrumbs":[{"label":"Initiatives"},{"label":"DPI as a Packaged Solution (DaaS)","emoji":"1f680"}]},{"id":"2mMZZdD9dKTi2S6elCyP","title":"Country x DPG MOU /LoI FAQs","pathname":"/initiatives/dpi-as-a-packaged-solution-daas/faqs-on-daas/country-x-dpg-mou-loi-faqs","siteSpaceId":"sitesp_uyb1B","description":"","breadcrumbs":[{"label":"Initiatives"},{"label":"DPI as a Packaged Solution (DaaS)","emoji":"1f680"},{"label":"FAQs on DaaS","emoji":"2753"}]},{"id":"IyT4y2UN0pOZDTAquyzz","title":"Ecosystem Participation Terms FAQs","pathname":"/initiatives/dpi-as-a-packaged-solution-daas/faqs-on-daas/ecosystem-participation-terms-faqs","siteSpaceId":"sitesp_uyb1B","breadcrumbs":[{"label":"Initiatives"},{"label":"DPI as a Packaged Solution (DaaS)","emoji":"1f680"},{"label":"FAQs on DaaS","emoji":"2753"}]},{"id":"c6msEMgL82qgh178RcvY","title":"DPI Residents Program","pathname":"/initiatives/dpi-residents-program","siteSpaceId":"sitesp_uyb1B","emoji":"1f4d1","breadcrumbs":[{"label":"Initiatives"}]},{"id":"kgKwTQ7oW7vPyyrBrYlj","title":"Agri Connect (forthcoming)","pathname":"/initiatives/agri-connect-forthcoming","siteSpaceId":"sitesp_uyb1B","emoji":"1f30d","description":"","breadcrumbs":[{"label":"Initiatives"}]},{"id":"hUgEUOkwZ0VzoE6zDutO","title":"Glossary","pathname":"/references/glossary","siteSpaceId":"sitesp_uyb1B","description":"","breadcrumbs":[{"label":"References"}]},{"id":"bcqKP1squ2rUBxGUoNIc","title":"Curated Specifications","pathname":"/references/home","siteSpaceId":"sitesp_uyb1B","description":"Reference Links","breadcrumbs":[{"label":"References"}]},{"id":"Q6bAeiqCZ6QlYkQsXyDI","title":"Licensing","pathname":"/additional-info/licensing","siteSpaceId":"sitesp_uyb1B","emoji":"1f91d","description":"","breadcrumbs":[{"label":"Additional Info"}]},{"id":"xSWrM1tX9FBOGq3FWuTT","title":"Contact Us","pathname":"/additional-info/contact-us","siteSpaceId":"sitesp_uyb1B","emoji":"270d","description":"","breadcrumbs":[{"label":"Additional Info"}]},{"id":"9ST2aOXAk4qViAA7cNPM","title":"Acerca de la Wiki sobre DPI","pathname":"/es","siteSpaceId":"sitesp_Ix3wB","emoji":"1f389","breadcrumbs":[{"label":"LA WIKI IPD "}]},{"id":"zBOsU5brNqmIwnYFAjkd","title":"DPI: Un resumen","pathname":"/es/la-wiki-ipd/dpi-un-resumen","siteSpaceId":"sitesp_Ix3wB","emoji":"2728","description":"Una metodología comprobada para transformar naciones a escala","breadcrumbs":[{"label":"LA WIKI IPD "}]},{"id":"b8fnanCkGoNM9t1pE7e6","title":"Los Principios DPI de Arquitectura Tecnológica","pathname":"/es/la-wiki-ipd/los-principios-dpi-de-arquitectura-tecnologica","siteSpaceId":"sitesp_Ix3wB","emoji":"1f4dd","description":"¿Cómo distinguimos los proyectos de digitalización regulares de la DPI?","breadcrumbs":[{"label":"LA WIKI IPD "}]},{"id":"eXRctXTq1mEytxpsX7wz","title":"Interoperabilidad","pathname":"/es/la-wiki-ipd/los-principios-dpi-de-arquitectura-tecnologica/interoperabilidad","siteSpaceId":"sitesp_Ix3wB","emoji":"1f517","description":"Impulsada por Especificaciones Abiertas","breadcrumbs":[{"label":"LA WIKI IPD "},{"label":"Los Principios DPI de Arquitectura Tecnológica","emoji":"1f4dd"}]},{"id":"ga34lezfISQKTNd0Kcgo","title":"Componentes base minimalistas y reutilizables","pathname":"/es/la-wiki-ipd/los-principios-dpi-de-arquitectura-tecnologica/componentes-base-minimalistas-y-reutilizables","siteSpaceId":"sitesp_Ix3wB","emoji":"1f9f1","description":"¡No son soluciones completas!","breadcrumbs":[{"label":"LA WIKI IPD "},{"label":"Los Principios DPI de Arquitectura Tecnológica","emoji":"1f4dd"}]},{"id":"YIL08JflwRTocYnIDCXn","title":"Innovación Diversa e Inclusiva","pathname":"/es/la-wiki-ipd/los-principios-dpi-de-arquitectura-tecnologica/innovacion-diversa-e-inclusiva","siteSpaceId":"sitesp_Ix3wB","emoji":"1f4a1","description":"del ecosistema, mediante accesos multimodales y abiertos","breadcrumbs":[{"label":"LA WIKI IPD "},{"label":"Los Principios DPI de Arquitectura Tecnológica","emoji":"1f4dd"}]},{"id":"8OMxXr2Bfcuc4lD8xdrV","title":"Federados y Descentralizados por Naturaleza","pathname":"/es/la-wiki-ipd/los-principios-dpi-de-arquitectura-tecnologica/federados-y-descentralizados-por-naturaleza","siteSpaceId":"sitesp_Ix3wB","emoji":"1f4a0","breadcrumbs":[{"label":"LA WIKI IPD "},{"label":"Los Principios DPI de Arquitectura Tecnológica","emoji":"1f4dd"}]},{"id":"bHchv6y2OiQQUrp7FFBL","title":"Seguridad y Privacidad por Naturaleza","pathname":"/es/la-wiki-ipd/los-principios-dpi-de-arquitectura-tecnologica/seguridad-y-privacidad-por-naturaleza","siteSpaceId":"sitesp_Ix3wB","emoji":"1f510","breadcrumbs":[{"label":"LA WIKI IPD "},{"label":"Los Principios DPI de Arquitectura Tecnológica","emoji":"1f4dd"}]},{"id":"cZWWT7uETrwEqHK0ryQl","title":"Guía de Implementación y Ejecución de DPI","pathname":"/es/la-wiki-ipd/dpi-implementation-and-execution-guidance","siteSpaceId":"sitesp_Ix3wB","emoji":"1f3af","description":"14 sugerencias de implementación para hacer realidad la infraestructura digital en su país","breadcrumbs":[{"label":"LA WIKI IPD "}]},{"id":"McySzENpOiAMpS4H3sR7","title":"DPG y DPI","pathname":"/es/la-wiki-ipd/dpg-y-dpi","siteSpaceId":"sitesp_Ix3wB","emoji":"1f19a","breadcrumbs":[{"label":"LA WIKI IPD "}]},{"id":"XiuhpMovmoF17pnnCHpm","title":"¿Cuál DPI puedo construir?","pathname":"/es/la-wiki-ipd/cual-dpi-puedo-construir","siteSpaceId":"sitesp_Ix3wB","emoji":"2753","description":"Ideas para impulsar un crecimiento socioeconómico exponencial en su país de acuerdo a su rol","breadcrumbs":[{"label":"LA WIKI IPD "}]},{"id":"hbrvQRiZpXIuzWuWeXK1","title":"DPI y su adopción obligatoria","pathname":"/es/mythbusters-and-faqs/dpi-y-su-adopcion-obligatoria","siteSpaceId":"sitesp_Ix3wB","emoji":"1f52f","breadcrumbs":[{"label":"Mythbusters and FAQs"}]},{"id":"gf0JXZ16w155CZJjYUOP","title":"DPI y la Competencia Privada","pathname":"/es/mythbusters-and-faqs/dpi-y-la-competencia-privada","siteSpaceId":"sitesp_Ix3wB","emoji":"1f52f","breadcrumbs":[{"label":"Mythbusters and FAQs"}]},{"id":"VHoLADSP4DRCuCSQHCyy","title":"DPI y la Privacidad / Seguridad","pathname":"/es/mythbusters-and-faqs/dpi-y-la-privacidad-seguridad","siteSpaceId":"sitesp_Ix3wB","emoji":"1f52f","breadcrumbs":[{"label":"Mythbusters and FAQs"}]},{"id":"wKktcaPZrFVZbwmq5ASx","title":"DPI y la Brecha Digital","pathname":"/es/mythbusters-and-faqs/readme","siteSpaceId":"sitesp_Ix3wB","emoji":"1f52f","breadcrumbs":[{"label":"Mythbusters and FAQs"}]},{"id":"TfQ3WN98z8pi3gq8ACUg","title":"Identificadores y Registros Electrónicos","pathname":"/es/technical-notes/digital-ids-and-electronic-registries","siteSpaceId":"sitesp_Ix3wB","emoji":"1f194","description":"¿Quién es la contraparte? ¿Es de confianza?","breadcrumbs":[{"label":"Technical Notes"}]},{"id":"ARIrFV3rYcms6j9qoeAC","title":"Identidad digital","pathname":"/es/technical-notes/digital-ids-and-electronic-registries/digital-id","siteSpaceId":"sitesp_Ix3wB","breadcrumbs":[{"label":"Technical Notes"},{"label":"Identificadores y Registros Electrónicos","emoji":"1f194"}]},{"id":"uPQsKJbW3sqLLvhG1inp","title":"Construir Capacidades de Uso en un Sistema de Identificación","pathname":"/es/technical-notes/digital-ids-and-electronic-registries/digital-id/construir-capacidades-de-uso-en-un-sistema-de-identificacion","siteSpaceId":"sitesp_Ix3wB","description":"Cómo convertir un sistema de identificación en un DPI más eficaz","breadcrumbs":[{"label":"Technical Notes"},{"label":"Identificadores y Registros Electrónicos","emoji":"1f194"},{"label":"Identidad digital"}]},{"id":"j2kQHicWZMfAgWaSvlMo","title":"Autenticación de Identidad","pathname":"/es/technical-notes/digital-ids-and-electronic-registries/digital-id/autenticacion-de-identidad","siteSpaceId":"sitesp_Ix3wB","breadcrumbs":[{"label":"Technical Notes"},{"label":"Identificadores y Registros Electrónicos","emoji":"1f194"},{"label":"Identidad digital"}]},{"id":"gypEHm4qfhXWCYLCyg6c","title":"Autenticación Facial","pathname":"/es/technical-notes/digital-ids-and-electronic-registries/digital-id/face-authentication","siteSpaceId":"sitesp_Ix3wB","description":"Enfoque para facilitar la inclusión en la incorporación de personas para casos de uso como la protección","breadcrumbs":[{"label":"Technical Notes"},{"label":"Identificadores y Registros Electrónicos","emoji":"1f194"},{"label":"Identidad digital"}]},{"id":"ijiOWfGxBU0ZaeA84OsA","title":"eKYC/ Intercambio de Perfil de Identidad","pathname":"/es/technical-notes/digital-ids-and-electronic-registries/digital-id/ekyc-intercambio-de-perfil-de-identidad","siteSpaceId":"sitesp_Ix3wB","breadcrumbs":[{"label":"Technical Notes"},{"label":"Identificadores y Registros Electrónicos","emoji":"1f194"},{"label":"Identidad digital"}]},{"id":"d9BkgJsxuaA0okHVyq3h","title":"Inicio de Sesión Único (SSO)","pathname":"/es/technical-notes/digital-ids-and-electronic-registries/digital-id/inicio-de-sesion-unico-sso","siteSpaceId":"sitesp_Ix3wB","breadcrumbs":[{"label":"Technical Notes"},{"label":"Identificadores y Registros Electrónicos","emoji":"1f194"},{"label":"Identidad digital"}]},{"id":"G9P4tXds5Q7fvYvlLZG2","title":"Intercambio de Datos, Credenciales y Modelos","pathname":"/es/technical-notes/intercambio-de-datos-credenciales-y-modelos","siteSpaceId":"sitesp_Ix3wB","emoji":"1f4c2","description":"¿Puede una persona/entidad/sociedad utilizar sus datos para potenciar y mejorar sus servicios?","breadcrumbs":[{"label":"Technical Notes"}]},{"id":"xQsj4LmwrDt6BAgxS1Xe","title":"Una intro al intercambio de datos personales","pathname":"/es/technical-notes/intercambio-de-datos-credenciales-y-modelos/una-intro-al-intercambio-de-datos-personales","siteSpaceId":"sitesp_Ix3wB","breadcrumbs":[{"label":"Technical Notes"},{"label":"Intercambio de Datos, Credenciales y Modelos","emoji":"1f4c2"}]},{"id":"YGiY6bbQac2RK6kIYcu3","title":"Estándares de Datos","pathname":"/es/technical-notes/intercambio-de-datos-credenciales-y-modelos/estandares-de-datos","siteSpaceId":"sitesp_Ix3wB","description":"Una herramienta tecnológica clave para el intercambio de datos","breadcrumbs":[{"label":"Technical Notes"},{"label":"Intercambio de Datos, Credenciales y Modelos","emoji":"1f4c2"}]},{"id":"cw7hJLHXHUIUSMFJn0vy","title":"Credenciales Verificables","pathname":"/es/technical-notes/intercambio-de-datos-credenciales-y-modelos/credenciales-verificables","siteSpaceId":"sitesp_Ix3wB","description":"Contexto","breadcrumbs":[{"label":"Technical Notes"},{"label":"Intercambio de Datos, Credenciales y Modelos","emoji":"1f4c2"}]},{"id":"UmId8wjs2pjLc9l2rMwC","title":"eLockers","pathname":"/es/technical-notes/intercambio-de-datos-credenciales-y-modelos/elockers","siteSpaceId":"sitesp_Ix3wB","description":"Una intervención eficaz para ampliar las credenciales digitales de confianza en todo el ecosistema","breadcrumbs":[{"label":"Technical Notes"},{"label":"Intercambio de Datos, Credenciales y Modelos","emoji":"1f4c2"}]},{"id":"XJYZvRPQTjCxKArW2oZ1","title":"Infraestructura de Confianza","pathname":"/es/technical-notes/infraestructura-de-confianza","siteSpaceId":"sitesp_Ix3wB","emoji":"1f510","description":"¿Puedo afirmar de manera fehaciente que el ítem X fue acordado por y/o provenía de la fuente Y?","breadcrumbs":[{"label":"Technical Notes"}]},{"id":"UGSIcukqwDQtoQb1GDAG","title":"Firmas Digitales y PKIs","pathname":"/es/technical-notes/infraestructura-de-confianza/firmas-digitales-y-pkis","siteSpaceId":"sitesp_Ix3wB","breadcrumbs":[{"label":"Technical Notes"},{"label":"Infraestructura de Confianza","emoji":"1f510"}]},{"id":"kpOk0LuLZmhO3M6D3ntg","title":"Discovery & Fulfillment","pathname":"/es/technical-notes/discovery-and-fulfillment","siteSpaceId":"sitesp_Ix3wB","emoji":"1f6d2","description":"Acceder a cualquier bien o servicio de forma interoperable a través de cualquier app o interfaz","breadcrumbs":[{"label":"Technical Notes"}]},{"id":"C3iy0vtgsX8Ae9cO8k5o","title":"De Plataformas a Protocolos","pathname":"/es/technical-notes/discovery-and-fulfillment/de-plataformas-a-protocolos","siteSpaceId":"sitesp_Ix3wB","description":"¿Por qué necesitamos redes abiertas?","breadcrumbs":[{"label":"Technical Notes"},{"label":"Discovery & Fulfillment","emoji":"1f6d2"}]},{"id":"h9QV60LvPbzfUeJigsRo","title":"Pagos","pathname":"/es/technical-notes/pagos","siteSpaceId":"sitesp_Ix3wB","emoji":"1f4b8","description":"P2P, P2M, B2B, G2P, y P2G.","breadcrumbs":[{"label":"Technical Notes"}]},{"id":"hWDfV480tTuULHln2hs2","title":"Dirección Financiera","pathname":"/es/technical-notes/pagos/direccion-financiera","siteSpaceId":"sitesp_Ix3wB","description":"Dirección financiera normalizada para pagos","breadcrumbs":[{"label":"Technical Notes"},{"label":"Pagos","emoji":"1f4b8"}]},{"id":"17Asd3tiX5asVmbaY7We","title":"Código QR Interoperable","pathname":"/es/technical-notes/pagos/codigo-qr-interoperable","siteSpaceId":"sitesp_Ix3wB","description":"P2P, P2M, Pagos periódicos y de facturas, etc,","breadcrumbs":[{"label":"Technical Notes"},{"label":"Pagos","emoji":"1f4b8"}]},{"id":"t8xG01XQ5wKz4T1PTuiz","title":"Autenticación Interoperable","pathname":"/es/technical-notes/pagos/autenticacion-interoperable","siteSpaceId":"sitesp_Ix3wB","description":"P2P, P2M","breadcrumbs":[{"label":"Technical Notes"},{"label":"Pagos","emoji":"1f4b8"}]},{"id":"XKJifvn0MQUflDf0kLlm","title":"Pago Interoperable de Facturas","pathname":"/es/technical-notes/pagos/pago-interoperable-de-facturas","siteSpaceId":"sitesp_Ix3wB","description":"Simplificando el proceso de pago de facturas entre autoridades y departamentos","breadcrumbs":[{"label":"Technical Notes"},{"label":"Pagos","emoji":"1f4b8"}]},{"id":"O5CJwIozkvSdc5qJUZ2w","title":"Cash in Cash Out (CICO)","pathname":"/es/technical-notes/pagos/cash-in-cash-out-cico","siteSpaceId":"sitesp_Ix3wB","description":"Agentes bancarios interoperables, dispositivos para transacciones CICO de última milla","breadcrumbs":[{"label":"Technical Notes"},{"label":"Pagos","emoji":"1f4b8"}]},{"id":"2nwPE9P0piWTbF5iJUMP","title":"Pagos G2P","pathname":"/es/technical-notes/pagos/pagos-g2p","siteSpaceId":"sitesp_Ix3wB","description":"Aumentar la eficiencia de los pagos del Estado a las Personas","breadcrumbs":[{"label":"Technical Notes"},{"label":"Pagos","emoji":"1f4b8"}]},{"id":"yFFOu0mgE73qFrjug5lc","title":"LE WIKI DPI","pathname":"/fr","siteSpaceId":"sitesp_5mLXn"},{"id":"LEsUC22PcQHfxDYcM9E3","title":"À propos du Wiki DPI","pathname":"/fr/le-wiki-dpi/a-propos-du-wiki-dpi","siteSpaceId":"sitesp_5mLXn","emoji":"1f389","breadcrumbs":[{"label":"LE WIKI DPI"}]},{"id":"9A38dr4dupUsVLf6BXKQ","title":"Vue d'ensemble des DPI","pathname":"/fr/le-wiki-dpi/vue-densemble-des-dpi","siteSpaceId":"sitesp_5mLXn","emoji":"2728","description":"Une approche qui fonctionne pour transformer les nations à grande échelle","breadcrumbs":[{"label":"LE WIKI DPI"}]},{"id":"7CJinRprHVAsCt70JVOX","title":"Principes de l'architecture technique DPI","pathname":"/fr/le-wiki-dpi/principes-de-larchitecture-technique-dpi","siteSpaceId":"sitesp_5mLXn","emoji":"1f4dd","description":"Comment distinguer les efforts de numérisation ordinaires de ceux de DPI?","breadcrumbs":[{"label":"LE WIKI DPI"}]},{"id":"eQCPoQUsTZyqd9Zp1Ydh","title":"Interopérabilité","pathname":"/fr/le-wiki-dpi/principes-de-larchitecture-technique-dpi/interoperabilite","siteSpaceId":"sitesp_5mLXn","emoji":"1f517","description":"Guidée par des spécifications ouvertes","breadcrumbs":[{"label":"LE WIKI DPI"},{"label":"Principes de l'architecture technique DPI","emoji":"1f4dd"}]},{"id":"MNyq0BlRukFpBCf2HeTH","title":"Composants de base minimalistes et réutilisables","pathname":"/fr/le-wiki-dpi/principes-de-larchitecture-technique-dpi/composants-de-base-minimalistes-et-reutilisables","siteSpaceId":"sitesp_5mLXn","emoji":"1f9f1","description":"Pas de solutions complètes !","breadcrumbs":[{"label":"LE WIKI DPI"},{"label":"Principes de l'architecture technique DPI","emoji":"1f4dd"}]},{"id":"dS86DQET9FXIXtpwErw5","title":"Innovation diversifiée et inclusive","pathname":"/fr/le-wiki-dpi/principes-de-larchitecture-technique-dpi/innovation-diversifiee-et-inclusive","siteSpaceId":"sitesp_5mLXn","emoji":"1f4a1","description":"...de l'écosystème, grâce à un accès multimodal et ouvert.","breadcrumbs":[{"label":"LE WIKI DPI"},{"label":"Principes de l'architecture technique DPI","emoji":"1f4dd"}]},{"id":"Mw9eQxCLX0AUNOKraehc","title":"Fédéré et décentralisé par nature","pathname":"/fr/le-wiki-dpi/principes-de-larchitecture-technique-dpi/federe-et-decentralise-par-nature","siteSpaceId":"sitesp_5mLXn","emoji":"1f536","breadcrumbs":[{"label":"LE WIKI DPI"},{"label":"Principes de l'architecture technique DPI","emoji":"1f4dd"}]},{"id":"588yUsmBfzcGHuQovYD8","title":"Sécurité et protection des données par nature","pathname":"/fr/le-wiki-dpi/principes-de-larchitecture-technique-dpi/securite-et-protection-des-donnees-par-nature","siteSpaceId":"sitesp_5mLXn","emoji":"1f510","breadcrumbs":[{"label":"LE WIKI DPI"},{"label":"Principes de l'architecture technique DPI","emoji":"1f4dd"}]},{"id":"h8UlAGJN64wSxZCYdZ03","title":"Orientations pour la mise en œuvre et l'application des DPI","pathname":"/fr/le-wiki-dpi/orientations-pour-la-mise-en-oeuvre-et-lapplication-des-dpi","siteSpaceId":"sitesp_5mLXn","emoji":"1f3af","description":"21 conseils de mise en œuvre pour faire de l'infrastructure numérique une réalité dans votre pays","breadcrumbs":[{"label":"LE WIKI DPI"}]},{"id":"P25c8Bm8BF2ldpozD9F4","title":"DPG et DPI","pathname":"/fr/le-wiki-dpi/dpg-et-dpi","siteSpaceId":"sitesp_5mLXn","emoji":"1f19a","breadcrumbs":[{"label":"LE WIKI DPI"}]},{"id":"TW2muDBDeLD8NW1yrR4j","title":"Quelle(s) DPI puis-je créer ?","pathname":"/fr/le-wiki-dpi/quelle-s-dpi-puis-je-creer","siteSpaceId":"sitesp_5mLXn","emoji":"2753","description":"Des idées pour stimuler une croissance socio-économique exponentielle dans votre pays en fonction de votre rôle","breadcrumbs":[{"label":"LE WIKI DPI"}]},{"id":"8uDCkSSjHpf0GAb9CJjt","title":"Premier cas d'utilisation des DPI","pathname":"/fr/le-wiki-dpi/premier-cas-dutilisation-des-dpi","siteSpaceId":"sitesp_5mLXn","emoji":"1f3c5","description":"Comment un pays doit-il choisir un cas d'utilisation déterminant pour obtenir une mise à l'échelle exponentielle d'une composante DPI ?","breadcrumbs":[{"label":"LE WIKI DPI"}]},{"id":"roC4oFMiQKh0c2yhsTkq","title":"Eléments pour concevoir une stratégie de transformation numérique fondée sur la DPI","pathname":"/fr/le-wiki-dpi/elements-pour-concevoir-une-strategie-de-transformation-numerique-fondee-sur-la-dpi","siteSpaceId":"sitesp_5mLXn","emoji":"1f4d8","description":"1 minute de lecture : +1s pour transformer votre stratégie digitale en stratégie DPI","breadcrumbs":[{"label":"LE WIKI DPI"}]},{"id":"7lFrWzOSHAEXvUFCzoTn","title":"Combien coûte la construction d'une DPI ?","pathname":"/fr/le-wiki-dpi/combien-coute-la-construction-dune-dpi","siteSpaceId":"sitesp_5mLXn","emoji":"1f4b0","description":"Les DPI ne doivent pas nécessairement être coûteuses à mettre en place !","breadcrumbs":[{"label":"LE WIKI DPI"}]},{"id":"kwJZPKVJayk2OnWWTPkg","title":"Mon système est-il une DPI?","pathname":"/fr/le-wiki-dpi/mon-systeme-est-il-une-dpi","siteSpaceId":"sitesp_5mLXn","emoji":"1f4e2","breadcrumbs":[{"label":"LE WIKI DPI"}]},{"id":"NWBNB26jFufYyUlMMTt4","title":"IDÉES REÇUES ET FAQ","pathname":"/fr/idees-recues-et-faq","siteSpaceId":"sitesp_5mLXn"},{"id":"aaehw0TZPZW2bCNvgByc","title":"DPI et adoption obligatoire","pathname":"/fr/idees-recues-et-faq/dpi-et-adoption-obligatoire","siteSpaceId":"sitesp_5mLXn","emoji":"1f52f","breadcrumbs":[{"label":"IDÉES REÇUES ET FAQ"}]},{"id":"9bKeLSPczK3KsgfHOe7j","title":"DPI et concurrence privée","pathname":"/fr/idees-recues-et-faq/dpi-et-concurrence-privee","siteSpaceId":"sitesp_5mLXn","emoji":"1f52f","breadcrumbs":[{"label":"IDÉES REÇUES ET FAQ"}]},{"id":"OMU0zLqgipydGc8GM8ro","title":"DPI et confidentialité / sécurité","pathname":"/fr/idees-recues-et-faq/dpi-et-confidentialite-securite","siteSpaceId":"sitesp_5mLXn","emoji":"1f52f","breadcrumbs":[{"label":"IDÉES REÇUES ET FAQ"}]},{"id":"xLEvIct3152HXEhsrccE","title":"DPI et fracture numérique","pathname":"/fr/idees-recues-et-faq/dpi-et-fracture-numerique","siteSpaceId":"sitesp_5mLXn","emoji":"1f52f","breadcrumbs":[{"label":"IDÉES REÇUES ET FAQ"}]},{"id":"7R7IN6qDveqJsJvty62d","title":"NOTES TECHNIQUES","pathname":"/fr/notes-techniques","siteSpaceId":"sitesp_5mLXn"},{"id":"IPCHtv0O2Wmdx9ZxCLcc","title":"Identifiants et registres","pathname":"/fr/notes-techniques/identifiants-et-registres","siteSpaceId":"sitesp_5mLXn","emoji":"1f194","description":"Qui est la contrepartie ? Puis-je lui faire confiance ?","breadcrumbs":[{"label":"NOTES TECHNIQUES"}]},{"id":"O2wlyn0nOakBwHJUUTj5","title":"Identité numérique","pathname":"/fr/notes-techniques/identifiants-et-registres/identite-numerique","siteSpaceId":"sitesp_5mLXn","description":"","breadcrumbs":[{"label":"NOTES TECHNIQUES"},{"label":"Identifiants et registres","emoji":"1f194"}]},{"id":"QECkjriEbuXK1UuJYQ8F","title":"Capacités du système d'identification","pathname":"/fr/notes-techniques/identifiants-et-registres/identite-numerique/capacites-du-systeme-didentification","siteSpaceId":"sitesp_5mLXn","description":"Comment convertir n'importe quel système d'identification en une DPI ?","breadcrumbs":[{"label":"NOTES TECHNIQUES"},{"label":"Identifiants et registres","emoji":"1f194"},{"label":"Identité numérique"}]},{"id":"MNFf12KKDb85ayVdYV6W","title":"Authentification de l'identité","pathname":"/fr/notes-techniques/identifiants-et-registres/identite-numerique/authentification-de-lidentite","siteSpaceId":"sitesp_5mLXn","breadcrumbs":[{"label":"NOTES TECHNIQUES"},{"label":"Identifiants et registres","emoji":"1f194"},{"label":"Identité numérique"}]},{"id":"Xyzk0IaHvvF5J2N9L0Ai","title":"Authentification faciale","pathname":"/fr/notes-techniques/identifiants-et-registres/identite-numerique/authentification-faciale","siteSpaceId":"sitesp_5mLXn","description":"Approche visant à permettre l'inclusion lors de l'intégration des personnes dans des cas d'utilisation tels que la protection sociale","breadcrumbs":[{"label":"NOTES TECHNIQUES"},{"label":"Identifiants et registres","emoji":"1f194"},{"label":"Identité numérique"}]},{"id":"3YDMro8mgUDcl8aN76vs","title":"eKYC/ Partage du profil d'identité","pathname":"/fr/notes-techniques/identifiants-et-registres/identite-numerique/ekyc-partage-du-profil-didentite","siteSpaceId":"sitesp_5mLXn","breadcrumbs":[{"label":"NOTES TECHNIQUES"},{"label":"Identifiants et registres","emoji":"1f194"},{"label":"Identité numérique"}]},{"id":"w0DqA17RlYRh3yJ6yKpW","title":"Connexion unique (SSO, ou Single Sign-On)","pathname":"/fr/notes-techniques/identifiants-et-registres/identite-numerique/connexion-unique-sso-ou-single-sign-on","siteSpaceId":"sitesp_5mLXn","breadcrumbs":[{"label":"NOTES TECHNIQUES"},{"label":"Identifiants et registres","emoji":"1f194"},{"label":"Identité numérique"}]},{"id":"jVUttW4jY1gnEaYvnqng","title":"Code QR pour l'identification hors ligne","pathname":"/fr/notes-techniques/identifiants-et-registres/identite-numerique/code-qr-pour-lidentification-hors-ligne","siteSpaceId":"sitesp_5mLXn","description":"Guide de conception et de mise en œuvre des meilleures pratiques","breadcrumbs":[{"label":"NOTES TECHNIQUES"},{"label":"Identifiants et registres","emoji":"1f194"},{"label":"Identité numérique"}]},{"id":"Bd9B7M9GLcPqDUCz1Zu1","title":"Page 1","pathname":"/fr/notes-techniques/identifiants-et-registres/page-1","siteSpaceId":"sitesp_5mLXn","breadcrumbs":[{"label":"NOTES TECHNIQUES"},{"label":"Identifiants et registres","emoji":"1f194"}]},{"id":"eLvzJVrr5N2rGwix4D8E","title":"Partage des données, justificatifs et modèles","pathname":"/fr/notes-techniques/partage-des-donnees-justificatifs-et-modeles","siteSpaceId":"sitesp_5mLXn","emoji":"1f4c2","breadcrumbs":[{"label":"NOTES TECHNIQUES"}]},{"id":"VLBLJd5JQ1fvbl7eIOev","title":"Introduction au partage des données personnelles","pathname":"/fr/notes-techniques/partage-des-donnees-justificatifs-et-modeles/introduction-au-partage-des-donnees-personnelles","siteSpaceId":"sitesp_5mLXn","breadcrumbs":[{"label":"NOTES TECHNIQUES"},{"label":"Partage des données, justificatifs et modèles","emoji":"1f4c2"}]},{"id":"Izg73sXDOxVXeTV5Bblj","title":"Normes de données","pathname":"/fr/notes-techniques/partage-des-donnees-justificatifs-et-modeles/normes-de-donnees","siteSpaceId":"sitesp_5mLXn","description":"Un outil technologique clé pour l'échange de données","breadcrumbs":[{"label":"NOTES TECHNIQUES"},{"label":"Partage des données, justificatifs et modèles","emoji":"1f4c2"}]},{"id":"S3LrLJigFQLVxgFy8VM7","title":"Jutificatifs vérifiables","pathname":"/fr/notes-techniques/partage-des-donnees-justificatifs-et-modeles/jutificatifs-verifiables","siteSpaceId":"sitesp_5mLXn","breadcrumbs":[{"label":"NOTES TECHNIQUES"},{"label":"Partage des données, justificatifs et modèles","emoji":"1f4c2"}]},{"id":"LoCwf8oJCG91BzXCHdaR","title":"Construire des pipelines d'analyse de données","pathname":"/fr/notes-techniques/partage-des-donnees-justificatifs-et-modeles/construire-des-pipelines-danalyse-de-donnees","siteSpaceId":"sitesp_5mLXn","breadcrumbs":[{"label":"NOTES TECHNIQUES"},{"label":"Partage des données, justificatifs et modèles","emoji":"1f4c2"}]},{"id":"1OuP9b3PJclT6IJq3kcm","title":"eLockers","pathname":"/fr/notes-techniques/partage-des-donnees-justificatifs-et-modeles/elockers","siteSpaceId":"sitesp_5mLXn","breadcrumbs":[{"label":"NOTES TECHNIQUES"},{"label":"Partage des données, justificatifs et modèles","emoji":"1f4c2"}]},{"id":"K399BVcWB7PQcGYOb2ow","title":"Ensembles de données anonymes non personnelles","pathname":"/fr/notes-techniques/partage-des-donnees-justificatifs-et-modeles/ensembles-de-donnees-anonymes-non-personnelles","siteSpaceId":"sitesp_5mLXn","description":"Lignes directrices pour la prise de décision et la recherche","breadcrumbs":[{"label":"NOTES TECHNIQUES"},{"label":"Partage des données, justificatifs et modèles","emoji":"1f4c2"}]},{"id":"8WTZEq7Hzop9Ad2UqZ6P","title":"Infrastructure de Confiance","pathname":"/fr/notes-techniques/infrastructure-de-confiance","siteSpaceId":"sitesp_5mLXn","emoji":"1f50f","breadcrumbs":[{"label":"NOTES TECHNIQUES"}]},{"id":"QGZrOuMi2jEz8h61Bf3a","title":"Signatures numériques et PKI","pathname":"/fr/notes-techniques/infrastructure-de-confiance/signatures-numeriques-et-pki","siteSpaceId":"sitesp_5mLXn","breadcrumbs":[{"label":"NOTES TECHNIQUES"},{"label":"Infrastructure de Confiance","emoji":"1f50f"}]},{"id":"jQvB6PACK0QSM9QwSiLE","title":"eConsentement","pathname":"/fr/notes-techniques/infrastructure-de-confiance/econsentement","siteSpaceId":"sitesp_5mLXn","breadcrumbs":[{"label":"NOTES TECHNIQUES"},{"label":"Infrastructure de Confiance","emoji":"1f50f"}]},{"id":"lePV42m14izd665Aetas","title":"eSignature","pathname":"/fr/notes-techniques/infrastructure-de-confiance/esignature","siteSpaceId":"sitesp_5mLXn","breadcrumbs":[{"label":"NOTES TECHNIQUES"},{"label":"Infrastructure de Confiance","emoji":"1f50f"}]},{"id":"WUrGQWjINL0UR2nKWFJo","title":"Recherche et fourniture ouvertes de services","pathname":"/fr/notes-techniques/recherche-et-fourniture-ouvertes-de-services","siteSpaceId":"sitesp_5mLXn","emoji":"1f6d2","description":"Accéder à n'importe quel bien ou service de manière interopérable via n'importe quelle application/interface","breadcrumbs":[{"label":"NOTES TECHNIQUES"}]},{"id":"OEmfzjvmsvEZORI6r0Jr","title":"Des plateformes aux protocoles","pathname":"/fr/notes-techniques/recherche-et-fourniture-ouvertes-de-services/des-plateformes-aux-protocoles","siteSpaceId":"sitesp_5mLXn","breadcrumbs":[{"label":"NOTES TECHNIQUES"},{"label":"Recherche et fourniture ouvertes de services","emoji":"1f6d2"}]},{"id":"cCS9iFpKXBCGS6WfmlfE","title":"Payments","pathname":"/fr/notes-techniques/payments","siteSpaceId":"sitesp_5mLXn","emoji":"1f4b8","description":"P2P, P2M, B2B, G2P et P2G.","breadcrumbs":[{"label":"NOTES TECHNIQUES"}]},{"id":"znP37Sz9ZnIvQhQQ7qOq","title":"Adresse financière","pathname":"/fr/notes-techniques/payments/adresse-financiere","siteSpaceId":"sitesp_5mLXn","description":"Adresse financière normalisée pour les paiements","breadcrumbs":[{"label":"NOTES TECHNIQUES"},{"label":"Payments","emoji":"1f4b8"}]},{"id":"k82ucpqq0DcMv9FQsDOp","title":"Code QR interopérable","pathname":"/fr/notes-techniques/payments/code-qr-interoperable","siteSpaceId":"sitesp_5mLXn","description":"P2P, P2M, paiements récurrents/factures, etc,","breadcrumbs":[{"label":"NOTES TECHNIQUES"},{"label":"Payments","emoji":"1f4b8"}]},{"id":"9vTdFDbF99qZ4Ni1YrcV","title":"Authentification interopérable","pathname":"/fr/notes-techniques/payments/authentification-interoperable","siteSpaceId":"sitesp_5mLXn","description":"P2P, P2M","breadcrumbs":[{"label":"NOTES TECHNIQUES"},{"label":"Payments","emoji":"1f4b8"}]},{"id":"wCbx8lIgzilNftHYMeDQ","title":"Paiements de factures interopérables","pathname":"/fr/notes-techniques/payments/paiements-de-factures-interoperables","siteSpaceId":"sitesp_5mLXn","description":"Rationalisation du processus de paiement des factures entre les autorités et les départements","breadcrumbs":[{"label":"NOTES TECHNIQUES"},{"label":"Payments","emoji":"1f4b8"}]},{"id":"pvP8TwaQZFqThsTXrO7q","title":"Cash in Cash Out  (CICO)","pathname":"/fr/notes-techniques/payments/cash-in-cash-out-cico","siteSpaceId":"sitesp_5mLXn","description":"Agents bancaires interopérables, dispositifs pour les transactions CICO du dernier kilomètre","breadcrumbs":[{"label":"NOTES TECHNIQUES"},{"label":"Payments","emoji":"1f4b8"}]},{"id":"2MyWhRYHGIlSlPito6Kw","title":"Paiements G2P","pathname":"/fr/notes-techniques/payments/paiements-g2p","siteSpaceId":"sitesp_5mLXn","breadcrumbs":[{"label":"NOTES TECHNIQUES"},{"label":"Payments","emoji":"1f4b8"}]},{"id":"0QFGpgBuNl0uOLBxbDUl","title":"INITIATIVES","pathname":"/fr/initiatives","siteSpaceId":"sitesp_5mLXn"},{"id":"fCg0QQa4bQjMsLOVcIJw","title":"Conseil technique sur les DPI","pathname":"/fr/initiatives/conseil-technique-sur-les-dpi","siteSpaceId":"sitesp_5mLXn","emoji":"1f310","breadcrumbs":[{"label":"INITIATIVES"}]},{"id":"9U3Yikj0lPLEG5YA77jD","title":"DPI sous forme de solution packagée (DaaS)","pathname":"/fr/initiatives/dpi-sous-forme-de-solution-packagee-daas","siteSpaceId":"sitesp_5mLXn","emoji":"1f680","breadcrumbs":[{"label":"INITIATIVES"}]},{"id":"f6r8GtI9sf4iWLnkxIK7","title":"Pourquoi avons nous besoin de DaaS?","pathname":"/fr/initiatives/dpi-sous-forme-de-solution-packagee-daas/pourquoi-avons-nous-besoin-de-daas","siteSpaceId":"sitesp_5mLXn","emoji":"1f4a1","breadcrumbs":[{"label":"INITIATIVES"},{"label":"DPI sous forme de solution packagée (DaaS)","emoji":"1f680"}]},{"id":"YPCHCiJCGrrawHHtqn4Y","title":"🎯 DaaS en bref","pathname":"/fr/initiatives/dpi-sous-forme-de-solution-packagee-daas/daas-en-bref","siteSpaceId":"sitesp_5mLXn","breadcrumbs":[{"label":"INITIATIVES"},{"label":"DPI sous forme de solution packagée (DaaS)","emoji":"1f680"}]},{"id":"yxAygcYKUdINaWpVnVzc","title":"Kits DaaS prêts à l’emploi","pathname":"/fr/initiatives/dpi-sous-forme-de-solution-packagee-daas/kits-daas-prets-a-lemploi","siteSpaceId":"sitesp_5mLXn","emoji":"1f4e6","breadcrumbs":[{"label":"INITIATIVES"},{"label":"DPI sous forme de solution packagée (DaaS)","emoji":"1f680"}]},{"id":"dlxPO36n7CFcyNKKY9mJ","title":"♻️ Artefacts DaaS réutilisables","pathname":"/fr/initiatives/dpi-sous-forme-de-solution-packagee-daas/artefacts-daas-reutilisables","siteSpaceId":"sitesp_5mLXn","breadcrumbs":[{"label":"INITIATIVES"},{"label":"DPI sous forme de solution packagée (DaaS)","emoji":"1f680"}]},{"id":"VnEPOAXSxhM41VMjpcDl","title":"3️⃣ Un processus en 3 étapes, de l’idée à la mise en œuvre !","pathname":"/fr/initiatives/dpi-sous-forme-de-solution-packagee-daas/3-un-processus-en-3-etapes-de-lidee-a-la-mise-en-oeuvre","siteSpaceId":"sitesp_5mLXn","breadcrumbs":[{"label":"INITIATIVES"},{"label":"DPI sous forme de solution packagée (DaaS)","emoji":"1f680"}]},{"id":"0PLSwDqcbtOH1o1J5pHj","title":"📈 Aperçu du programme DaaS financé","pathname":"/fr/initiatives/dpi-sous-forme-de-solution-packagee-daas/apercu-du-programme-daas-finance","siteSpaceId":"sitesp_5mLXn","description":"Déployez la DPI dans votre pays en postulant de manière compétitive au programme DaaS financé.","breadcrumbs":[{"label":"INITIATIVES"},{"label":"DPI sous forme de solution packagée (DaaS)","emoji":"1f680"}]},{"id":"ojGXAOaI5nLfAYhjTnEV","title":"👩‍💻 Cohorte 1 : Offres DaaS","pathname":"/fr/initiatives/dpi-sous-forme-de-solution-packagee-daas/cohorte-1-offres-daas","siteSpaceId":"sitesp_5mLXn","breadcrumbs":[{"label":"INITIATIVES"},{"label":"DPI sous forme de solution packagée (DaaS)","emoji":"1f680"}]},{"id":"Fy0EZSzuU1Owip5u9Der","title":"Authentification numérique","pathname":"/fr/initiatives/dpi-sous-forme-de-solution-packagee-daas/cohorte-1-offres-daas/authentification-numerique","siteSpaceId":"sitesp_5mLXn","breadcrumbs":[{"label":"INITIATIVES"},{"label":"DPI sous forme de solution packagée (DaaS)","emoji":"1f680"},{"label":"👩‍💻 Cohorte 1 : Offres DaaS"}]},{"id":"GgslpxEQkva3QYTf6NNk","title":"Justificatifs numériques","pathname":"/fr/initiatives/dpi-sous-forme-de-solution-packagee-daas/cohorte-1-offres-daas/justificatifs-numeriques","siteSpaceId":"sitesp_5mLXn","breadcrumbs":[{"label":"INITIATIVES"},{"label":"DPI sous forme de solution packagée (DaaS)","emoji":"1f680"},{"label":"👩‍💻 Cohorte 1 : Offres DaaS"}]},{"id":"ZAjhi1QDWZEh4W9gR2SM","title":"ID Account Mapper","pathname":"/fr/initiatives/dpi-sous-forme-de-solution-packagee-daas/cohorte-1-offres-daas/id-account-mapper","siteSpaceId":"sitesp_5mLXn","breadcrumbs":[{"label":"INITIATIVES"},{"label":"DPI sous forme de solution packagée (DaaS)","emoji":"1f680"},{"label":"👩‍💻 Cohorte 1 : Offres DaaS"}]},{"id":"ZZnZBt0hUUXYK8FwG5jt","title":"🖥️ Co-créez avec nous !","pathname":"/fr/initiatives/dpi-sous-forme-de-solution-packagee-daas/co-creez-avec-nous","siteSpaceId":"sitesp_5mLXn","description":"Si vous êtes un BPN (Digital Public Good), un prestataire de services (Service Provider) ou un éditeur de logiciels indépendant (Independent Software Vendor) souhaitant étendre la mise en œuvre de la","breadcrumbs":[{"label":"INITIATIVES"},{"label":"DPI sous forme de solution packagée (DaaS)","emoji":"1f680"}]},{"id":"hnlDQCGhqD1zVS2TTpsQ","title":"💬 Prochaines cohortes DaaS","pathname":"/fr/initiatives/dpi-sous-forme-de-solution-packagee-daas/prochaines-cohortes-daas","siteSpaceId":"sitesp_5mLXn","breadcrumbs":[{"label":"INITIATIVES"},{"label":"DPI sous forme de solution packagée (DaaS)","emoji":"1f680"}]},{"id":"sU4QjirkxKO0gs6ovHgv","title":"❓ FAQ sur DaaS","pathname":"/fr/initiatives/dpi-sous-forme-de-solution-packagee-daas/faq-sur-daas","siteSpaceId":"sitesp_5mLXn","breadcrumbs":[{"label":"INITIATIVES"},{"label":"DPI sous forme de solution packagée (DaaS)","emoji":"1f680"}]},{"id":"JVB4DJ0E6nVImhqKV6yZ","title":"FAQ – Protocole d’entente (MoU) / Lettre d’intention (LoI) entre un pays et un BPN - DaaS","pathname":"/fr/initiatives/dpi-sous-forme-de-solution-packagee-daas/faq-sur-daas/faq-protocole-dentente-mou-lettre-dintention-loi-entre-un-pays-et-un-bpn-daas","siteSpaceId":"sitesp_5mLXn","breadcrumbs":[{"label":"INITIATIVES"},{"label":"DPI sous forme de solution packagée (DaaS)","emoji":"1f680"},{"label":"❓ FAQ sur DaaS"}]},{"id":"43EymjLwRComKcchVyhq","title":"FAQ – Termes de participation à l’écosystème (EPT)","pathname":"/fr/initiatives/dpi-sous-forme-de-solution-packagee-daas/faq-sur-daas/faq-termes-de-participation-a-lecosysteme-ept","siteSpaceId":"sitesp_5mLXn","breadcrumbs":[{"label":"INITIATIVES"},{"label":"DPI sous forme de solution packagée (DaaS)","emoji":"1f680"},{"label":"❓ FAQ sur DaaS"}]},{"id":"MyC7O5ohyCVKyrGXx4MQ","title":"RÉFÉRENCES","pathname":"/fr/references","siteSpaceId":"sitesp_5mLXn"},{"id":"hPH31ieMPpAoJ9p19Ouw","title":"Caractéristiques techniques","pathname":"/fr/references/caracteristiques-techniques","siteSpaceId":"sitesp_5mLXn","breadcrumbs":[{"label":"RÉFÉRENCES"}]},{"id":"onuwGDtCDIabvpJHg7bA","title":"INFORMATIONS SUPPLÉMENTAIRES","pathname":"/fr/informations-supplementaires","siteSpaceId":"sitesp_5mLXn"},{"id":"FRpt1Dx1FN3HFkwaXsuB","title":"Licences","pathname":"/fr/informations-supplementaires/licences","siteSpaceId":"sitesp_5mLXn","emoji":"1f91d","breadcrumbs":[{"label":"INFORMATIONS SUPPLÉMENTAIRES"}]},{"id":"ww4FBahSq6LnvgqgzBEg","title":"Contactez nous","pathname":"/fr/informations-supplementaires/contactez-nous","siteSpaceId":"sitesp_5mLXn","emoji":"270d","breadcrumbs":[{"label":"INFORMATIONS SUPPLÉMENTAIRES"}]}]}