Interacting with Wallets
Wallets are integral to the SSI ecosystem, enabling end-users to:
Authenticate and Retrieve Credentials: Wallets scan QR codes or follow secure links to claim credentials. For targeted offerings, wallets must present cryptographic proofs (Verifiable Presentations) to prove DID ownership.
Authorization Code Flow: The Issuer Service uses an OAuth2-like pattern:
Creates an authorization request.
Verifies the submitted Verifiable Presentation.
On success, a code is issued and exchanged at:
Retrieving the Credential: With a valid access token, wallets call:
to obtain the Verifiable Credential.
Storage and Presentation: Once obtained, the wallet stores the credential locally and can present it to verifiers as needed.
Example Token Exchange:
Response:
Retrieving Credential:
Example Response:
This sequence provides a secure, user-friendly experience aligned with SSI standards, preserving user privacy and control.
Last updated