Use Cases & Flow Diagrams
Last updated
Last updated
Note, that EBSI/ESSIF specifications are evolving, which means that some flows are not available in their final version. Modifications are to be expected.
Creation and anchoring of a new DID on the EBSI ledger (incl. use of "Verifiable Authorizations" and EBSI access tokens).
For SSIKit usage examples, refer to: EBSI DID registration
Onboarding of a legal entity to the EBSI/ESSIF ecosystem (incl. combined VC request and DID registration).
Gaining access to protected EBSI/ESSIF services (incl. presentation of "Verifiable Authorization").
The ESSIF protocol for issuance of verifiable credentials aims to being compliant with the OIDC for credential issuance specification. Refer to the respective section for details:
The ESSIF protocol for presentation of verifiable credentials to a Verifier or Relying Party, aims to being compliant with the OIDC/SIOPv2 specification. Refer to this section for details:
OIDC/SIOPv2 for verifiable presentations
Several code-examples how to use the ESSIF functionality of the SSI Kit are shown on GitHub