Archipels Documentation
  • 🫂Welcome!
    • 🏢Who are we?
    • 🆔What is SSI?
    • 👨‍🏫Glossary of terms
  • 👩‍🔧Product Overview
    • Wallet
    • Electronic Attestations
    • DIDs
    • Trust Registry
  • ⚒️Set up
    • Create an individual wallet and request an attestation
    • Configure an access token
    • Create a Webhook
    • Create your test environment
    • Get your DID wallet
  • 🏗️Create attestation request
    • 🧩Get and Accept Attestation
      • API call : get attestations in my wallet
      • Accept attestation
    • 🏗️Create an Onboarding attestation request against Archipels
      • Attestation request
      • Accept attestation
    • 🏗️Create an email attestation request against Archipels
      • Attestation request
      • Accept attestation
  • 📃Issue attestation
    • Create a second wallet and configure this new environment
    • Create a schema attestation
    • Create a connection: Create an invitation
    • Create a connection: Accept an invitation
    • Attestation send offer
    • Accept attestation
  • 🔀Send presentation request
    • 🪪Send a Presentation
      • Create a third wallet and configure this new environment
      • Create a connection
      • Send Presentation request
      • Get the list of presentation requests (not available currently)
      • Get the presentation requests
      • Get the list of valid attestations
      • Send/Show presentation
      • Get the presentation
    • 📑Send several Presentations
      • Send Presentations request
      • Get the presentation requests
  • ➕Other features
    • 📩Messages
      • Send a message
    • 📃Delete an attestation
      • Delete attestation
  • 🏁API: COLLECTIONS
  • List of schemes
  • 🔗Links
    • Website
    • Recruitement
    • Doc for Archipels Certify
    • Trust Registry
Propulsé par GitBook
Sur cette page
  • Verifiable Credentials issuing
  • Verifiable Presentations

Cet article vous a-t-il été utile ?

  1. Product Overview

Electronic Attestations

All the explanation needed to understand Electronic Attestations and how they work is available in the "What is SSI?" section.

Verifiable Credentials share strong similarities with identity assertions such as ID Tokens in OpenID Connect. They enable a Credential Issuer to make assertions about End-User claims. A Verifiable Credential adheres to a predefined schema and may be associated with a specific holder, for instance, through Cryptographic Holder Binding. These credentials can be securely presented to the Verifier by the End-User without requiring the involvement of the Credential Issuer.

Verifiable Credentials issuing

The Wallet transmits a single Credential Request for each individual Credential to the Credential Endpoint.

For requesting issuance of multiple Credentials, whether of the same or different types/doctypes, and bound to similar or different proofs, the Wallet uses the same Access Token to dispatch multiple Credential Requests to the Credential Endpoint.

During the authorization process, the Credential Issuer may also seek Credential presentation as a means to authenticate or identify the End-User throughout the issuance process.

Fundamentally, this specification remains agnostic to Credential formats, enabling implementers to capitalize on the specific capabilities of their chosen Credential formats. Multiple Credential formats can be seamlessly incorporated within a single transaction.

Verifiable Presentations

Verifiable credential holders can create verifiable presentations, which they can then share with verifiers to prove ownership of specific attributes within their verifiable credentials.

Each verifiable credential is signed cryptographically by an issuer. This signature, along with the issuer's identifier, serves as a robust method for identifying the issuer, ensuring that the data source within the credential can be authenticated by anyone.

When a verifier receives a verifiable credential, they can use the issuer's public key to verify the signature, thus ensuring the credential's integrity and confirming that it hasn't been altered. This process enables secure and reliable information exchange between parties.

Verifications provide privacy-preserving proofs of the data contained within a verifiable credential.

Relying party should define precisely the requirements for verification of the VP validity

PrécédentWalletSuivantDIDs

Dernière mise à jour il y a 1 an

Cet article vous a-t-il été utile ?

👩‍🔧