1. Introduction
1. Purpose and scope
This runbook explains how a backend service or component can integrate with the Verifier as an Authorization Server (AS) in M2M mode. It provides the end-to-end steps needed by developers: from preparing configuration and credentials, to calling the Token Endpoint with a LEARCredentialMachine, to using access tokens to consume protected APIs.
-
Integration of backend services with the Verifier using M2M authentication.
-
Use of LEARCredential inside a Verifiable Presentation (VP) as the client assertion.
-
OAuth 2.1 client_credentials profile with Private Key JWT.
-
Token acquisition and usage for accessing Verifier-protected resources.
-
Security, error handling, observability.
2. Intended audience
-
Developers building components/services in the ecosystem.
-
Technical integrators responsible for connecting a system to the Verifier.
-
SRE and security engineers validating compliance.