Advanced Search
Search Results
161 total results found
Deployment of the LEAR Credential Signer
This is a simple program that is installed in the PC of the legal representative. It is intended for self-installation without requiring technical knowledge, though it is expected to be installed by the IT personnel taking care of the personal computer infrast...
LEAR Credential Issuer
Description The LEAR Credential Issuer is the main application that manages the credential flow. We assume here that it is specialised in creating LEAR Credentials, though it could be used for other types of credentials. In this context, we will use the term ...
LEAR Credential Signer
Description This is a simple program provided by DOME that should be installed locally in the PC of the legal representative and that performs the actual signing of the LEAR Credential (there are versions for Windows, Mac and Linux). Alternatively, any organi...
1. Introduction
Purpose and scope This runbook explains how a backend service or component can integrate with the Verifier as an Authorization Server (AS) in M2M mode. It provides the end-to-end steps needed by developers: from preparing configuration and credentials, to cal...
2. Integration Steps
Prerequisites Legal entity has completed onboarding in the ecosystem. LEAR can access the Issuer service and issue a LEARCredentialMachine to its machine(s). DID method supported: did:key. Access to developer documentation and test environm...
1. Introduction
Purpose and scope This runbook explains how a public client, such as a web or mobile application, can integrate with the Verifier acting as an Authorization Server (AS) using the Authorization Code Flow with PKCE. It provides developers with the end-to-end st...
2. Integration Steps
Prerequisites The legal entity has completed onboarding in the DOME ecosystem. The LEAR has obtained a valid LEAR Credential through the Issuer service. The end user (employee, contractor, etc.) has received a Verifiable Credential issued by the...
Introduction
Purpose and scope This runbook explains how a confidential client, such as a backend component or secure web application, can integrate with the Verifier acting as an Authorization Server (AS) using the Authorization Code Flow with client_secret_jwt client au...
Integration Steps
Prerequisites The legal entity has completed onboarding in the DOME ecosystem. The LEAR has obtained a valid LEARCredentialMachine through the Issuer service. DID method supported: did:key. The confidential client (backend service or secure...
QR Scan: credential obtention and presentation (login)
QR Scan Functionality General Use: The QR Scan function is used to scan QR codes provided by a third party, which can trigger processes for obtaining or presenting credentials (see below). To initiate a scan, press the 'Scan QR' button to deploy the camer...
Wallet Settings
You can access the "Settings" tab by clicking or tapping on the "Settings" button below: Select camera You can choose which camera the Wallet should use. If prompted, make sure to grant the necessary permissions. By deploying the selector you will see a...
test page
PAGE TO BE MOVEDE
STUFF