diff --git a/.env-issuer.sample b/.env-issuer.sample
index 6a37e7ce8..fc921fe13 100644
--- a/.env-issuer.sample
+++ b/.env-issuer.sample
@@ -17,18 +17,13 @@ ISSUER_ENVIRONMENT=local
 # --------------------------------------------------------------------------------
 # KMS configuration
 # --------------------------------------------------------------------------------
-# Could be either [localstorage | vault] (BJJ) and [localstorage | vault | aws ] (ETH)
+# Could be either [localstorage | vault] (BJJ) and [localstorage | vault ] (ETH)
 ISSUER_KMS_BJJ_PROVIDER=localstorage
 ISSUER_KMS_ETH_PROVIDER=localstorage
 
 # if the plugin is localstorage, you can specify the folder path
 ISSUER_KMS_PROVIDER_LOCAL_STORAGE_FILE_PATH=./localstoragekeys
 
-# If the provider is AWS for ETH keys you need to specify the key id and secret key
-ISSUER_KMS_ETH_PLUGIN_AWS_ACCESS_KEY=XXX
-ISSUER_KMS_ETH_PLUGIN_AWS_SECRET_KEY=YYY
-ISSUER_KMS_ETH_PLUGIN_AWS_REGION=eu-west-1
-
 # if one of the plugins is vault, you have to specify the vault address and token
 ISSUER_KEY_STORE_ADDRESS=http://vault:8200
 ISSUER_KEY_STORE_PLUGIN_IDEN3_MOUNT_PATH=iden3
@@ -66,3 +61,5 @@ ISSUER_RESOLVER_PATH=./resolvers_settings.yaml
 
 # if you want, you can specify the content of the resolvers encoded in base64. In this case ISSUER_RESOLVER_PATH have to be empty
 ISSUER_RESOLVER_FILE=
+
+ISSUER_UNIVERSAL_LINKS_BASE_URL=https://wallet.privado.id
\ No newline at end of file
diff --git a/README.md b/README.md
index 94a93be1f..87e91b749 100644
--- a/README.md
+++ b/README.md
@@ -178,23 +178,6 @@ ISSUER_KMS_ETH_PROVIDER=localstorage
 
 To import the private key necessary to transition onchain states, the command is the same as [explained before](#install-and-run-issuer-node-api-and-ui).
 
-#### Running issuer node with AWS KMS Service instead of Vault for ETH Keys
-Another alternative for eth keys associated with the identities created in the issuer node is to use the AWS KMS service. 
-In this case you have to change some variables in the .env-issuer file:
-
-```bash
-ISSUER_KMS_BJJ_PROVIDER=<localstorage or vault>
-ISSUER_KMS_ETH_PROVIDER=aws
-ISSUER_KMS_ETH_PLUGIN_AWS_ACCESS_KEY=<AWS-ACCESS-KEY>
-ISSUER_KMS_ETH_PLUGIN_AWS_SECRET_KEY=<AWS-SECRET-KEY>
-ISSUER_KMS_ETH_PLUGIN_AWS_REGION=<AWS-REGION>
-```
-
-In this case, to import the private key in AWS KMS run:
-```shell
-make private_key=XXX aws_access_key=YYY aws_secret_key=ZZZ aws_region=your-region import-private-key-to-kms
-```
-
 ## Quick Start Demo
 
 This [Quick Start Demo](https://devs.polygonid.com/docs/quick-start-demo/) will walk you through the process of **issuing** and **verifying** your **first credential**.