Skip to main content

Recently Updated Pages

Login into the Credential Issuer

DOME Credential Issuer User Guide

Please be aware that, in order to log in to the Issuer, you need a Wallet account with a LEAR Cre...

Updated 4 weeks ago by Roger Miret

Obtaining the Verifiable Credentials: step by step

Obtaining the Verifiable Credentials

Introduction After a Verifiable Credential is issued, you will receive an email with a Credentia...

Updated 4 weeks ago by Roger Miret

Verifiable Credential types

Verifiable Credentials overview

Currently, 3 different types of Verifiable Credentials are used in the DOME ecosystem: LEARCreden...

Updated 4 weeks ago by Roger Miret

Logging in with LEAR Credential Employees: step by step

Logging in with Verifiable Credentials

Introduction LEAR Credential Employees are Verifiable Credentials that enable access to various ...

Updated 4 weeks ago by Roger Miret

Integration Steps

Identity Management - Developer guides Verifier Confidential Client Integratio...

Prerequisites The legal entity has completed onboarding in the DOME ecosystem. The LEAR...

Updated 1 month ago by Roger Miret

2. Integration Steps

Identity Management - Developer guides Verifier Public Client Integration: Aut...

Prerequisites The legal entity has completed onboarding in the DOME ecosystem. The LEAR...

Updated 1 month ago by Roger Miret

Verifier integration: main OIDC endpoints

Identity Management - Developer guides Verifier integration: main OIDC endpoints

Well-known:https://verifier.dome-marketplace.eu/.well-known/openid-configuration Issuer:https://...

Updated 1 month ago by Roger Miret

Verifier Integration: choosing the right integration mode

Identity Management - Developer guides Verifier Integration: choosing the righ...

When integrating with the Verifier, pick the mode based on where your app runs, whether you can s...

Updated 1 month ago by Roger Miret

Introduction

Identity Management - Developer guides Verifier Confidential Client Integratio...

Purpose and scope This runbook explains how a confidential client, such as a backend component o...

Updated 1 month ago by Roger Miret

1. Introduction

Identity Management - Developer guides Verifier Public Client Integration: Aut...

Purpose and scope This runbook explains how a public client, such as a web or mobile application...

Updated 1 month ago by Roger Miret

2. Integration Steps

Identity Management - Developer guides Verifier M2M Integration Guide

Prerequisites Legal entity has completed onboarding in the ecosystem. LEAR can access t...

Updated 1 month ago by Roger Miret

1. Introduction

Identity Management - Developer guides Verifier M2M Integration Guide

Purpose and scope This runbook explains how a backend service or component can integrate with th...

Updated 1 month ago by Roger Miret

LEAR Credential Signer

Identity Management - Developer guides Infrastructure supporting the access to...

Description This is a simple program provided by DOME that should be installed locally in the PC...

Updated 1 month ago by Roger Miret

LEAR Credential Issuer

Identity Management - Developer guides Infrastructure supporting the access to...

Description The LEAR Credential Issuer is the main application that manages the credential flow....

Updated 1 month ago by Roger Miret

Deployment of the LEAR Credential Signer

Identity Management - Developer guides Deployment scenarios

This is a simple program that is installed in the PC of the legal representative. It is intended ...

Updated 1 month ago by Roger Miret

Deployment of the LEAR Credential Issuer

Identity Management - Developer guides Deployment scenarios

The LEAR Credential Issuer is a web application consisting of a server part, HTML interface, the ...

Updated 1 month ago by Roger Miret

1. Registration validation: DOME

Access Node Instantiation and Complianc...

The first step in the setup process is to confirm that our company is registered in DOME and ther...

Updated 1 month ago by Roberto Balzano

2. Issuance Validation: LEAR Credential Machine

Access Node Instantiation and Complianc...

The second step is to validate that we currently have a LEAR Credential Machine at our disposal. ...

Updated 1 month ago by Roberto Balzano

3. Data Validation: DLT

Access Node Instantiation and Complianc...

Once we have the issued credential, we need to generate our machine's addresses using this tool: ...

Updated 1 month ago by Roberto Balzano

4. AN Configuration: Secrets

Access Node Instantiation and Complianc...

Check this guide if you will work with secrets: Github sealed secrets guide.

Updated 1 month ago by Roberto Balzano