Skip to content

Latest commit

 

History

History
43 lines (24 loc) · 1.68 KB

use-cases-and-flow-diagrams.md

File metadata and controls

43 lines (24 loc) · 1.68 KB

Use Cases & Flow Diagrams

{% hint style="danger" %} Note, that EBSI/ESSIF specifications are evolving, which means that some flows are not available in their final version. Modifications are to be expected. {% endhint %}

ESSIF DID Registration

Creation and anchoring of a new DID on the EBSI ledger (incl. use of "Verifiable Authorizations" and EBSI access tokens).

ESSIF DID registration

For SSIKit usage examples, refer to: EBSI DID registration

ESSIF Onboarding

Onboarding of a legal entity to the EBSI/ESSIF ecosystem (incl. combined VC request and DID registration).

ESSIF Onboarding

EBSI Auth API

Gaining access to protected EBSI/ESSIF services (incl. presentation of "Verifiable Authorization").

EBSI Auth API

Issuance of Verifiable Credentials

The ESSIF protocol for issuance of verifiable credentials aims to being compliant with the OIDC for credential issuance specification. Refer to the respective section for details:

OIDC for credential issuance

Exchange of Verifiable Presentations

The ESSIF protocol for presentation of verifiable credentials to a Verifier or Relying Party, aims to being compliant with the OIDC/SIOPv2 specification. Refer to this section for details:

OIDC/SIOPv2 for verifiable presentations

Code examples

{% hint style="success" %} Several code-examples how to use the ESSIF functionality of the SSI Kit are shown on GitHub {% endhint %}