diff --git a/Gopkg.toml b/Gopkg.toml
index 7e752095a137fa69907fe401e8baa8072079573a..349b503370d11addf17bca0a46703d4e5aa98825 100644
--- a/Gopkg.toml
+++ b/Gopkg.toml
@@ -25,7 +25,7 @@
 #   unused-packages = true
 
 [[constraint]]
-  branch = "390-device-management-ability-to-remove-device"
+  branch = "master"
   name = "code.vereign.com/code/restful-api"
 
 [prune]
diff --git a/javascript/package.json b/javascript/package.json
index 1cc608b267fb1be5d7df4e7551dca5cb29716d6b..bab32fc9af6cad2dda7cab5aa4307bebd8a0a301 100644
--- a/javascript/package.json
+++ b/javascript/package.json
@@ -28,6 +28,7 @@
     "data-uri-to-blob": "^0.0.4",
     "libmime": "^4.0.1",
     "libqp": "^1.1.0",
+    "lodash": "^4.17.11",
     "penpal": "^3.0.3",
     "pkijs": "^2.1.69",
     "pvutils": "^1.0.16",
diff --git a/javascript/src/iframe/viamapi-iframe.js b/javascript/src/iframe/viamapi-iframe.js
index a05fdd085cebcf19c55a28ce31b5dc512f451caf..7e363315bc4206db21018877603467aae71b98d6 100644
--- a/javascript/src/iframe/viamapi-iframe.js
+++ b/javascript/src/iframe/viamapi-iframe.js
@@ -98,7 +98,7 @@ function setIdentityInLocalStorage(identityToStore, extendKey = true) {
 function getProfileData(identity) {
   return new Penpal.Promise(executeResultUpper => {
     executeRestfulFunction("private", viamApi,
-      viamApi.identityGetIdentityProfileData).then(executeResult => {
+      viamApi.identityGetIdentityProfileData, null).then(executeResult => {
       if(executeResult.code === "200") {
         var listItem = {};
 
@@ -246,11 +246,11 @@ const handleIdentityLogin = (identity, uuid, token) => {
   setKeyForUUID(uuid, publicKey);
 };
 
-function executeRestfulFunction(type, that, fn, ...args) {
+function executeRestfulFunction(type, that, fn, config, ...args) {
   const { currentlyAuthenticatedIdentity, viamApi, currentlyLoadedIdentity } = window;
 
   return new Penpal.Promise(executeResult => {
-    fn.apply(that, args).then(async (response) => {
+    fn.apply(that, [config, ...args]).then(async (response) => {
       const identity = currentlyAuthenticatedIdentity || currentlyLoadedIdentity;
 
       const { code, status } = response.data;
@@ -266,14 +266,13 @@ function executeRestfulFunction(type, that, fn, ...args) {
       }
 
       if (type === "private" && identity && code === "400" && status === "Bad session") {
-        viamApi.identityLogin("previousaddeddevice")
+        viamApi.identityLogin(null, "previousaddeddevice")
           .then((response) => {
             if (response.data.code === "200") {
               const uuid = response.data.data["Uuid"];
               const token = response.data.data["Session"];
               handleIdentityLogin(identity, uuid, token);
-              // TODO: Previously there was fn.apply(null, args) where null is probably wrong context for fn.apply()
-              fn.apply(that, args).then(({data}) => executeResult(data));
+              fn.apply(that, [config, ...args]).then(({data}) => executeResult(data));
             } else {
               executeResult(response.data);
             }
@@ -387,7 +386,7 @@ function getCertificateForPassport(passportUUID, internal) {
         var certificate = keys["certificatePEM"];
         //download("passportCertificateBeforeSigning.crt", "text/plain", certificate)
         //cryptoData.setx509Certificate(keys["certificate"])
-        executeRestfulFunction("private", viamApi, viamApi.signSignCertificate, btoa(certificate), passportUUID).then(executeResult => {
+        executeRestfulFunction("private", viamApi, viamApi.signSignCertificate, null, btoa(certificate), passportUUID).then(executeResult => {
           if(executeResult.code === "200") {
             var signedCertificate = atob(executeResult.data["SignedCertificate"]);
             //download("passportCertificateAfterSigning.crt", "text/plain", signedCertificate)
@@ -474,6 +473,7 @@ const connection = Penpal.connectToParent({
       window.WOPI_URL = wopiUrl.charAt(wopiUrl.length - 1) === "/" ? wopiUrl : wopiUrl + "/";
       window.COLLABORA_URL = collaboraUrl.charAt(collaboraUrl.length - 1) === "/" ? collaboraUrl : collaboraUrl + "/";
     },
+    ...penpalMethods,
     createIdentity(pinCode) {
       return new Penpal.Promise(result => {
         createPassportCertificate(makeid()).then(function(keys){
@@ -546,7 +546,7 @@ const connection = Penpal.connectToParent({
       return new Penpal.Promise(result => {
         viamApi.setIdentity(identity.authentication.publicKey);
 
-        executeRestfulFunction("public", viamApi, viamApi.identityConfirmIdentificator,confirmationCodeArg).then(executeResult => {
+        executeRestfulFunction("public", viamApi, viamApi.identityConfirmIdentificator, null, confirmationCodeArg).then(executeResult => {
           result(executeResult);
         });
       });
@@ -555,7 +555,7 @@ const connection = Penpal.connectToParent({
       return new Penpal.Promise(result => {
         viamApi.setIdentity(identity.authentication.publicKey);
 
-        executeRestfulFunction("public", viamApi, viamApi.identityGetIdentificatorByRegisterToken,tokenArg).then(executeResult => {
+        executeRestfulFunction("public", viamApi, viamApi.identityGetIdentificatorByRegisterToken, null, tokenArg).then(executeResult => {
           result(executeResult);
         });
       });
@@ -564,7 +564,7 @@ const connection = Penpal.connectToParent({
       return new Penpal.Promise(result => {
         viamApi.setIdentity(identity.authentication.publicKey);
 
-        executeRestfulFunction("public", viamApi, viamApi.identitySubmitIdentificator,identificatorArg, registerToken).then(executeResult => {
+        executeRestfulFunction("public", viamApi, viamApi.identitySubmitIdentificator, null, identificatorArg, registerToken).then(executeResult => {
           result(executeResult);
         });
       });
@@ -573,7 +573,7 @@ const connection = Penpal.connectToParent({
       return new Penpal.Promise(result => {
         viamApi.setIdentity(identity.authentication.publicKey);
 
-        executeRestfulFunction("public", viamApi, viamApi.identitySubmitRegisterClaims,givennameArg,familynameArg,emailArg,phonenumberArg).then(executeResult => {
+        executeRestfulFunction("public", viamApi, viamApi.identitySubmitRegisterClaims, null, givennameArg,familynameArg,emailArg,phonenumberArg).then(executeResult => {
           result(executeResult);
         });
       });
@@ -582,7 +582,7 @@ const connection = Penpal.connectToParent({
       return new Penpal.Promise(result => {
         viamApi.setIdentity(registerIdentity.authentication.publicKey);
 
-        executeRestfulFunction("public", viamApi, viamApi.identityAgreeOnRegistration).then(executeResult => {
+        executeRestfulFunction("public", viamApi, viamApi.identityAgreeOnRegistration, null).then(executeResult => {
           let sequence = Promise.resolve();
           if (executeResult.code === "200") {
             sequence = sequence.then(() => {
@@ -606,7 +606,7 @@ const connection = Penpal.connectToParent({
       return new Penpal.Promise(result => {
         viamApi.setIdentity(identity.authentication.publicKey);
 
-        executeRestfulFunction("public", viamApi, viamApi.identityResendConfirmationCode,identificatorArg).then(executeResult => {
+        executeRestfulFunction("public", viamApi, viamApi.identityResendConfirmationCode, null, identificatorArg).then(executeResult => {
           result(executeResult);
         });
       });
@@ -629,6 +629,7 @@ const connection = Penpal.connectToParent({
           "public",
           window.viamApi,
           window.viamApi.identityLogin,
+          null,
           mode, requestCode,
           requestActionID
         );
@@ -679,7 +680,7 @@ const connection = Penpal.connectToParent({
           })
         }
 
-        executeRestfulFunction("private", viamApi, viamApi.identityAddNewDevice).then(executeResult => {
+        executeRestfulFunction("private", viamApi, viamApi.identityAddNewDevice, null).then(executeResult => {
           if (executeResult.code === "200") {
             var actionID = executeResult.data["ActionID"];
             var QrCode = executeResult.data["QrCode"];
@@ -718,7 +719,7 @@ const connection = Penpal.connectToParent({
           })
         }
 
-        executeRestfulFunction("private", viamApi, viamApi.identityDestroyKeysForDevice, btoa(authenticationPublicKeyArg)).then(executeResult => {
+        executeRestfulFunction("private", viamApi, viamApi.identityDestroyKeysForDevice, null, btoa(authenticationPublicKeyArg)).then(executeResult => {
           result(executeResult);
         });
       });
@@ -736,7 +737,8 @@ const connection = Penpal.connectToParent({
       const identityLogoutResponse = await executeRestfulFunction(
         "private",
         window.viamApi,
-        window.viamApi.identityLogout
+        window.viamApi.identityLogout,
+        null
       );
 
       destroyAuthentication();
@@ -747,7 +749,7 @@ const connection = Penpal.connectToParent({
       return new Penpal.Promise(result => {
         viamApi.setIdentity(restoreAccessIdentity.authentication.publicKey);
 
-        executeRestfulFunction("public", viamApi, viamApi.identityRestoreAccess, identificator).then(executeResult => {
+        executeRestfulFunction("public", viamApi, viamApi.identityRestoreAccess, null, identificator).then(executeResult => {
             result(executeResult);
         });
       });
@@ -912,7 +914,7 @@ const connection = Penpal.connectToParent({
       passportChain.push(passportCertificate);
 
       response = await executeRestfulFunction(
-        "private", window.viamApi, window.viamApi.passportGetEmailWithHeaderByPassport, passportUUID, emailMessage);
+        "private", window.viamApi, window.viamApi.passportGetEmailWithHeaderByPassport, null, passportUUID, emailMessage);
 
       if (response.code !== "200") {
         return encodeResponse("400", "", response.status);
@@ -921,7 +923,7 @@ const connection = Penpal.connectToParent({
       const signedEmail = await signEmail(response.data, certificateOneTime, passportChain, privateKeyOneTime);
 
       response = await executeRestfulFunction(
-        "private", window.viamApi, window.viamApi.signResignEmail, passportUUID, signedEmail);
+        "private", window.viamApi, window.viamApi.signResignEmail, null, passportUUID, signedEmail);
 
       if (response.code !== "200") {
         return encodeResponse("400", "", response.status);
@@ -929,6 +931,51 @@ const connection = Penpal.connectToParent({
 
       return encodeResponse("200", response.data, "Email signed");
     },
+    documentCreateDocument: async (path, passportUUID, contenttype) => {
+      const authenticationPublicKey = localStorage.getItem("authenticatedIdentity");
+      if (
+        !authenticationPublicKey ||
+        !window.loadedIdentities[authenticationPublicKey] ||
+        !extendPinCodeTtl(authenticationPublicKey)
+      ) {
+        return encodeResponse("400", "", "Identity not authenticated");
+      }
+
+      const config = {
+        headers: {
+          path,
+          passportuuid: passportUUID,
+          contenttype
+        }
+      };
+      const response = await executeRestfulFunction("private", window.viamApi, window.viamApi.documentCreateDocument,
+        config);
+
+      return encodeResponse("200", response.data, "Document created");
+    },
+    documentPutDocument: async (passportUUID, resourceid, file) => {
+      const authenticationPublicKey = localStorage.getItem("authenticatedIdentity");
+      if (
+        !authenticationPublicKey ||
+        !window.loadedIdentities[authenticationPublicKey] ||
+        !extendPinCodeTtl(authenticationPublicKey)
+      ) {
+        return encodeResponse("400", "", "Identity not authenticated");
+      }
+
+      const config = {
+        headers: {
+          'Content-Type': 'multipart/form-data',
+          passportuuid: passportUUID,
+          resourceid
+        }
+      };
+
+      const response = await executeRestfulFunction(
+        "private", window.viamApi, window.viamApi.documentPutDocument, config, file);
+
+      return encodeResponse("200", response.data, "Document created");
+    },
     hasSession() {
       return new Penpal.Promise(result => {
         const authenticationPublicKey = localStorage.getItem("authenticatedIdentity");
@@ -954,7 +1001,7 @@ const connection = Penpal.connectToParent({
           })
         }
 
-        executeRestfulFunction("private", viamApi, viamApi.identityHasSession).then(executeResult => {
+        executeRestfulFunction("private", viamApi, viamApi.identityHasSession, null).then(executeResult => {
           result(executeResult);
         });
       });
@@ -963,7 +1010,7 @@ const connection = Penpal.connectToParent({
       return new Penpal.Promise(result => {
         viamApi.setIdentity("marketingapppublickey");
 
-        executeRestfulFunction("public", viamApi, viamApi.marketingSignUpIdentificator, identificator, reference).then(executeResult => {
+        executeRestfulFunction("public", viamApi, viamApi.marketingSignUpIdentificator, null, identificator, reference).then(executeResult => {
           viamApi.setIdentity("");
           viamApi.setSessionData("", "");
           result(executeResult);
@@ -974,7 +1021,7 @@ const connection = Penpal.connectToParent({
       return new Penpal.Promise(result => {
         viamApi.setIdentity("marketingapppublickey");
 
-        executeRestfulFunction("public", viamApi, viamApi.marketingGetIdentificatorProfile, identificator, pincode).then(executeResult => {
+        executeRestfulFunction("public", viamApi, viamApi.marketingGetIdentificatorProfile, null, identificator, pincode).then(executeResult => {
           viamApi.setIdentity("");
           viamApi.setSessionData("", "");
           result(executeResult);
@@ -985,7 +1032,7 @@ const connection = Penpal.connectToParent({
       return new Penpal.Promise(result => {
         viamApi.setIdentity("marketingapppublickey");
 
-        executeRestfulFunction("public", viamApi, viamApi.marketingExecuteEventForIdentificator, identificator, pincode, event).then(executeResult => {
+        executeRestfulFunction("public", viamApi, viamApi.marketingExecuteEventForIdentificator, null, identificator, pincode, event).then(executeResult => {
           viamApi.setIdentity("");
           viamApi.setSessionData("", "");
           result(executeResult);
@@ -1066,10 +1113,42 @@ const connection = Penpal.connectToParent({
         result(res)
       })
     },
+
+    // Collabora APIs
     collaboraDiscovery() {
       return collaboraApi.discovery().then(apps => apps);
     },
-    ...penpalMethods
+
+    // WOPI
+    getPassports: async fileId => {
+      const authenticationPublicKey = localStorage.getItem("authenticatedIdentity");
+
+      if (
+        !authenticationPublicKey ||
+        !window.loadedIdentities[authenticationPublicKey] ||
+        !extendPinCodeTtl(authenticationPublicKey)
+      ) {
+        return encodeResponse("400", "", "Identity not authenticated");
+      }
+
+      const response = await wopiAPI.getPassports(fileId);
+      return response.data;
+    },
+
+    wopiPutFile: async (path, accessToken, file) => {
+      const authenticationPublicKey = localStorage.getItem("authenticatedIdentity");
+
+      if (
+        !authenticationPublicKey ||
+        !window.loadedIdentities[authenticationPublicKey] ||
+        !extendPinCodeTtl(authenticationPublicKey)
+      ) {
+        return encodeResponse("400", "", "Identity not authenticated");
+      }
+
+      const response = await wopiAPI.putDocument(path, accessToken, file);
+      return response.data;
+    }
   }
 });
 
@@ -1208,7 +1287,7 @@ connection.promise.then(parent => {
   setInterval(function() {
     if (window.currentlyLoadedIdentity && !anynomousDeviceKeyEventsProcessing && !window.currentlyAuthenticatedIdentity) {
       anynomousDeviceKeyEventsProcessing = true;
-      executeRestfulFunction("public", viamAnonymousApi, viamAnonymousApi.eventGetNewEventsWithoutSession, "devicekey").then(async executeResult => {
+      executeRestfulFunction("public", viamAnonymousApi, viamAnonymousApi.eventGetNewEventsWithoutSession, null, "devicekey").then(async executeResult => {
         if(executeResult.code === "200") {
           var eventsLen = executeResult.data.length;
           let changedMaxDeviceKeyAnonymousEventTime = false;
@@ -1267,7 +1346,7 @@ connection.promise.then(parent => {
 
           if(changedMaxDeviceKeyAnonymousEventTime) {
             executeRestfulFunction("public", viamAnonymousApi, viamAnonymousApi.eventUpdateLastViewedWithoutSession,
-              "devicekey", maxDeviceKeyAnonymousEventTime.toString()).then(() => {
+                null, "devicekey", maxDeviceKeyAnonymousEventTime.toString()).then(() => {
               anynomousDeviceKeyEventsProcessing = false;
             });
           } else {
@@ -1281,7 +1360,7 @@ connection.promise.then(parent => {
 
     if (window.currentlyAuthenticatedIdentity != null && eventsDeviceEventsProcessing === false) {
       eventsDeviceEventsProcessing = true;
-      executeRestfulFunction("private", viamApi, viamApi.eventGetNewEvents, "devicekey").then(executeResult => {
+      executeRestfulFunction("private", viamApi, viamApi.eventGetNewEvents, null, "devicekey").then(executeResult => {
         if(executeResult.code === "200") {
           var eventsLen = executeResult.data.length;
           const changedMaxDeviceKeyEventTime = false;
@@ -1303,7 +1382,7 @@ connection.promise.then(parent => {
             maxDeviceKeyEventTime = Math.max(maxDeviceKeyEventTime, event.stamp)
           }
           if(changedMaxDeviceKeyEventTime) {
-            executeRestfulFunction("private", viamApi, viamApi.eventUpdateLastViewed, "devicekey",
+            executeRestfulFunction("private", viamApi, viamApi.eventUpdateLastViewed, null, "devicekey",
               maxDeviceKeyEventTime.toString()).then(executeResult1 => {
               eventsDeviceEventsProcessing = false
             })
@@ -1318,7 +1397,7 @@ connection.promise.then(parent => {
 
     if (window.currentlyAuthenticatedIdentity != null && eventsEntityEventsProcessing === false) {
       eventsEntityEventsProcessing = true;
-      executeRestfulFunction("private", viamApi, viamApi.eventGetNewEvents, "entity").then(executeResult => {
+      executeRestfulFunction("private", viamApi, viamApi.eventGetNewEvents, null, "entity").then(executeResult => {
         if(executeResult.code === "200") {
           var eventsLen = executeResult.data.length;
           let changedMaxEntityEventTime = false;
@@ -1343,7 +1422,7 @@ connection.promise.then(parent => {
             maxEntityEventTime = Math.max(maxEntityEventTime, event.stamp)
           }
           if(changedMaxEntityEventTime) {
-            executeRestfulFunction("private", viamApi, viamApi.eventUpdateLastViewed, "entity",
+            executeRestfulFunction("private", viamApi, viamApi.eventUpdateLastViewed, null, "entity",
               maxEntityEventTime.toString()).then(executeResult1 => {
               eventsEntityEventsProcessing = false
             })
diff --git a/javascript/src/iframe/wopiapi-iframe.js b/javascript/src/iframe/wopiapi-iframe.js
index 8d5b72aaab4722fc51f4167f93859253fa2901d1..c009f9ed020171a5bafc2a4ff4b97c60aff11f9f 100644
--- a/javascript/src/iframe/wopiapi-iframe.js
+++ b/javascript/src/iframe/wopiapi-iframe.js
@@ -19,4 +19,25 @@ WopiAPI.prototype.getPassports = function (fileID) {
   return axios(requestConfig);
 };
 
+WopiAPI.prototype.putDocument = function (path, accessToken, file) {
+  const { publicKey, uuid, token, deviceHash } = window.viamApi.getConfig().headers;
+  path = path[0] === "/" ? path : `/${path}`;
+  const requestConfig = {
+    url: `${window.WOPI_URL}files${path}/contents`,
+    method: 'POST',
+    headers: {
+      publicKey,
+      uuid,
+      token,
+      deviceHash
+    },
+    params: {
+      access_token: accessToken
+    },
+    data: file
+  };
+
+  return axios(requestConfig);
+};
+
 module.exports = WopiAPI;
diff --git a/main.go b/main.go
index f688ea9944a2a2475ec20e9ca8bb7fe7334b6ff5..b75d0361dd79a16a57b148a044dabdf46e483c9d 100644
--- a/main.go
+++ b/main.go
@@ -43,7 +43,6 @@ func buildPenpalMethods() string {
 			"export default {\n"
 
 	methods := generatePenpalRemoteMethods(endPoints)
-	methods += getWopiAPIPenpalMethods()
 
 	result += methods
 
@@ -57,6 +56,7 @@ func buildViamAPI() string {
 	endPoints := server.GetEndPoints(prefixes)
 
 	result := "const axios = require('axios');\n"
+	result += "const merge = require('lodash/merge');\n"
 
 	var keys []string
 	for k := range endPoints {
@@ -78,7 +78,6 @@ func buildViamAPI() string {
 		"    }\n" +
 		"}\n\n"
 
-
 	result += "ViamAPI.prototype.setSessionData = function(uuid, token) {\n" +
 		"    this.config.headers.uuid = uuid;\n" +
 		"    this.config.headers.token = token;\n" +
@@ -103,11 +102,6 @@ func buildViamAPI() string {
 
 			packageStr := splits[len(splits)-2]
 
-			/*if !packageCreated[packageStr] {
-				result += "ViamAPI.prototype.\"" + packageStr + "\" = {}\n\n"
-				packageCreated[packageStr] = true
-			}*/
-
 			methodStr := splits[len(splits)-1]
 
 			form := endPoints[url].Form
@@ -129,7 +123,7 @@ func buildViamAPI() string {
 				}
 			}
 
-			result += "ViamAPI.prototype." + packageStr + strings.Title(methodStr) + " = function(" + args + ") {\n" +
+			result += "ViamAPI.prototype." + packageStr + strings.Title(methodStr) + " = function(config, " + args + ") {\n" +
 				"    return axios.post(window.API_HOST + '" + packageStr + "/" + methodStr + "', {\n"
 
 			for i := 0; i < lenFields; i++ {
@@ -140,7 +134,7 @@ func buildViamAPI() string {
 				result += "\n"
 			}
 
-			result += "    }, this.config);\n" +
+			result += "    }, merge({}, this.config, config));\n" +
 				"};\n\n"
 		} else {
 			splits := strings.Split(url, "/")
@@ -154,8 +148,8 @@ func buildViamAPI() string {
 
 			methodStr := splits[len(splits)-1]
 
-			result += "ViamAPI.prototype." + packageStr + strings.Title(methodStr) + " = function() {\n" +
-				"    return axios.post(window.API_HOST + '" + packageStr + "/" + methodStr + "', {}, this.config);\n" +
+			result += "ViamAPI.prototype." + packageStr + strings.Title(methodStr) + " = function(config, data) {\n" +
+				"    return axios.post(window.API_HOST + '" + packageStr + "/" + methodStr + "', data, merge({}, this.config, config));\n" +
 				"};\n\n"
 		}
 	}
@@ -589,7 +583,7 @@ func generatePenpalRemoteMethods(endPoints map[string]*server.EndPoint) string {
 
 	privateCheckSnippet := `
         const authenticationPublicKey = localStorage.getItem("authenticatedIdentity");
-	
+
 	    if (authenticationPublicKey === null) {
 		    result({
 			    "data" : "",
@@ -597,15 +591,15 @@ func generatePenpalRemoteMethods(endPoints map[string]*server.EndPoint) string {
 			    "status" : "Identity not authenticated"
 		    });
 	    }
-	
+
 	    if (loadedIdentities[authenticationPublicKey] === null) {
 		    result({
 			    "data" : "",
 			    "code" : "400",
 			    "status" : "Identity not authenticated"
 		    });
- 	    } 
-	
+ 	    }
+
 	    const success = extendPinCodeTtl(authenticationPublicKey);
 
 	    if(success === false) {
@@ -614,7 +608,7 @@ func generatePenpalRemoteMethods(endPoints map[string]*server.EndPoint) string {
 			    "status" : "Identity not authenticated"
 		    })
 		}
-		
+
 	`
 
 	for i := 0; i < keysLen; i++ {
@@ -627,7 +621,7 @@ func generatePenpalRemoteMethods(endPoints map[string]*server.EndPoint) string {
 		if url == "/identity/getIdentityProfileData" {
 			privateCheckSnippet = `
 				const authenticationPublicKey = localStorage.getItem("authenticatedIdentity");
-			
+
 				if (authenticationPublicKey === null) {
 					result({
 						"data" : "",
@@ -635,15 +629,15 @@ func generatePenpalRemoteMethods(endPoints map[string]*server.EndPoint) string {
 						"status" : "Identity not authenticated"
 					});
 				}
-			
+
 				if (loadedIdentities[authenticationPublicKey] === null) {
 					result({
 						"data" : "",
 						"code" : "400",
 						"status" : "Identity not authenticated"
 					});
-				} 
-							
+				}
+
 			`
 		}
 
@@ -652,11 +646,6 @@ func generatePenpalRemoteMethods(endPoints map[string]*server.EndPoint) string {
 
 			packageStr := splits[len(splits)-2]
 
-			/*if !packageCreated[packageStr] {
-				result += "ViamAPI.prototype.\"" + packageStr + "\" = {}\n\n"
-				packageCreated[packageStr] = true
-			}*/
-
 			methodStr := splits[len(splits)-1]
 
 			form := endPoints[url].Form
@@ -678,12 +667,6 @@ func generatePenpalRemoteMethods(endPoints map[string]*server.EndPoint) string {
 				}
 			}
 
-			/*identity_login(modeArg,codeArg,actionIDArg) {
-					return new Penpal.Promise(result => {
-						viamApi.identity_login(modeArg,codeArg,actionIDArg).then((response) => { result(response.data);});
-					});
-			}*/
-
 			snippet := ""
 
 			if endPoints[url].HandlerType == "private" {
@@ -698,7 +681,7 @@ func generatePenpalRemoteMethods(endPoints map[string]*server.EndPoint) string {
 
 			method := packageStr + strings.Title(methodStr) + ": function(" + args + ") {\n" +
 				"    return new Penpal.Promise(function(result) {\n" + snippet +
-				"    executeRestfulFunction(\"" + endPoints[url].HandlerType + "\", viamApi, viamApi." + packageStr + strings.Title(methodStr) + lastComma + args + ").then(function(executeResult) {\n" +
+				"    executeRestfulFunction(\"" + endPoints[url].HandlerType + "\", viamApi, viamApi." + packageStr + strings.Title(methodStr) + ", null" + lastComma + args + ").then(function(executeResult) {\n" +
 				"            result(executeResult);\n" +
 				"        });\n" +
 				"    });\n" +
@@ -716,11 +699,6 @@ func generatePenpalRemoteMethods(endPoints map[string]*server.EndPoint) string {
 
 			packageStr := splits[len(splits)-2]
 
-			/*if !packageCreated[packageStr] {
-				result += "ViamAPI.prototype.\"" + packageStr + "\" = {}\n\n"
-				packageCreated[packageStr] = true
-			}*/
-
 			methodStr := splits[len(splits)-1]
 
 			snippet := ""
@@ -731,7 +709,7 @@ func generatePenpalRemoteMethods(endPoints map[string]*server.EndPoint) string {
 
 			method := packageStr + strings.Title(methodStr) + ": function() {\n" +
 				"    return new Penpal.Promise(function(result) {\n" + snippet +
-				"    executeRestfulFunction(\"" + endPoints[url].HandlerType + "\", viamApi, viamApi." + packageStr + strings.Title(methodStr) + ").then(function(executeResult) {\n" +
+				"    executeRestfulFunction(\"" + endPoints[url].HandlerType + "\", viamApi, viamApi." + packageStr + strings.Title(methodStr) + ", null).then(function(executeResult) {\n" +
 				"            result(executeResult);\n" +
 				"        });\n" +
 				"    });\n" +
@@ -750,39 +728,3 @@ func generatePenpalRemoteMethods(endPoints map[string]*server.EndPoint) string {
 
 	return methods
 }
-
-func getWopiAPIPenpalMethods() string {
-	return `getPassports: function(fileID) {
-		return new Penpal.Promise(function(result) {
-			const authenticationPublicKey = localStorage.getItem("authenticatedIdentity");
-			if (authenticationPublicKey === null) {
-				result({
-					"data" : "",
-					"code" : "400",
-					"status" : "Identity not authenticated"
-				});
-			}
-			
-			if (loadedIdentities[authenticationPublicKey] === null) {
-				result({
-					"data" : "",
-					"code" : "400",
-					"status" : "Identity not authenticated"
-				});
-			}
-			
-			const success = extendPinCodeTtl(authenticationPublicKey);
-
-			if (success === false) {
-				result({"data" : "",
-					"code" : "400",
-					"status" : "Identity not authenticated"
-				});
-			}
-
-			wopiAPI.getPassports(fileID).then(function(response) {
-				result(response.data);
-			});
-		});
-	}`
-}