Skip to main content

1. Introduction

1. Purpose and scope

This runbook explains how a backend service or component can integrate with the Verifier as an Authorization Server (AS) in M2M mode. It provides the end-to-end steps needed by developers: from preparing configuration and credentials, to calling the Token Endpoint with a LEARCredentialMachine, to using access tokens to consume protected APIs.

  • Integration of backend services with the Verifier using M2M authentication.

  • Use of LEARCredential inside a Verifiable Presentation (VP) as the client assertion.

  • OAuth 2.1 client_credentials profile with Private Key JWT.

  • Token acquisition and usage for accessing Verifier-protected resources.

  • Security, error handling, observability.

2. Intended audience

  • Developers building components/services in the ecosystem.

  • Technical integrators responsible for connecting a system to the Verifier.

  • SRE and security engineers validating compliance.