Replaces the full payload of an existing access record. The record identified
by ak must have been registered by the authenticated Data User.
This is a full replacement — the entire AccessRecord body must be supplied.
The ak, duid, created-at, and record-metadata.record-identifier are
preserved from the original; all other fields are replaced with the submitted
payload.
Use this to:
expiry
or notice-version). To update identity verification evidence, update
the linked Identity Record via POST /identity-records and update
record-metadata.identity-record-ref to the new ir key.processing.purpose or data-types after a scope changeState constraint: Only ACTIVE records may be replaced. Attempting to
replace a REVOKED or EXPIRED record returns 409.
JWT from GET /auth/token. Pass as Authorization: Bearer <token>. Expires after 7200s.
The access key of the record to replace. Unique opaque identifier for an access record, issued by the register on creation. Treat as a secret — possession enables access verification.
^ak_[0-9a-f]{24}$"ak_691df0c788ca043403b7fa90"
Full AccessRecord replacement payload.
A data access record covering all lawful bases. The same schema is used
regardless of processing.legal-basis. The notice field and
access-event.consent sub-object are null for non-consent records and
populated for consent records.
ISO 27560 Section 1 — Record Metadata
record-identifier and created-at are assigned by the register on creation
and returned in responses; they must not be supplied in request bodies.
identity-record-ref links this access record to the Identity Record that
holds the person-property relationship (PII principal, move-in date, address,
and identity verification evidence). Supply the ir key returned when the
Identity Record was created. The linked Identity Record must have been
registered by the same authenticated Data User.
identity-record-ref is required when registering a new Access Record in the standard flow. It may be omitted when a reidentification-token is supplied in the POST /access-records request body — the register resolves the ir internally from the validated token.
Populated for consent-based records; null for all other legal bases.
ISO 27560 Section 3 — Processing Fields
Defines the shared scope and legal basis of data access. These fields apply to the access registration as a whole regardless of how many controllers are involved.
Per-controller compliance fields — privacy-rights-url, lia-reference,
statutory-reference, and storage-conditions — are held on each
Controller entry within record-metadata.controller-arrangement, where
each controller bears individual accountability.
legal-basis applies to all controllers in the arrangement. For joint
arrangements, all controllers must share the same legal basis — if purposes
or bases differ, separate Access Records are required.
ISO 27560 Section 4 — Access Event Fields
Records when access was registered, its lifecycle state and duration, and (for consent records) the specific details of how consent was expressed.
registered-at serves as the canonical event timestamp for all record types —
for consent records it is the date the customer gave consent; for non-consent
records it is the date the Controller registered their access.
revoked-at is set by the register on revocation and must not be supplied
in request bodies.
consent is required when legal-basis is uk-consent or uk-explicit-consent. It must be omitted or null for all other legal bases (uk-public-task, uk-legitimate-interests, uk-legal-obligation, uk-contract).
Cross-DUID only. A confirmed token-ref obtained via POST /identity-records/reidentify. When supplied, identity-record-ref in record-metadata must be omitted — the register resolves the ir internally. The token is single-use, scoped to the initiating Data User, and expires one hour after issuance.