Use Cases & Flow Diagrams
Note, that EBSI/ESSIF specifications are evolving, which means that some flows are not available in their final version. Modifications are to be expected.
ESSIF DID Registration
Creation and anchoring of a new DID on the EBSI ledger (incl. use of "Verifiable Authorizations" and EBSI access tokens).
For SSIKit usage examples, refer to: EBSI DID registration
ESSIF Onboarding
Onboarding of a legal entity to the EBSI/ESSIF ecosystem (incl. combined VC request and DID registration).
EBSI Auth API
Gaining access to protected EBSI/ESSIF services (incl. presentation of "Verifiable Authorization").
Issuance of Verifiable Credentials
The ESSIF protocol for issuance of verifiable credentials aims to being compliant with the OIDC for credential issuance specification. Refer to the respective section for details:
Exchange of Verifiable Presentations
The ESSIF protocol for presentation of verifiable credentials to a Verifier or Relying Party, aims to being compliant with the OIDC/SIOPv2 specification. Refer to this section for details:
OIDC/SIOPv2 for verifiable presentations
Code examples
Several code-examples how to use the ESSIF functionality of the SSI Kit are shown on GitHub
Last updated