Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

20 total results found

Issuance of a Credential with a Signer Account

DOME Credential Issuer User Guide

1. "New Credential as Signer" Form To create a Verifiable Credential, click the "New credential as Signer" button, at the top right corner of the dashboard page, which will take you to the creation form.  2. Complete the "New Credential as Signer" form Fi...

Introduction - Verifiable Credentials in the DOME Ecosystem

Verifiable Credentials overview

Verifiable Credentials are used in the DOME ecosystem as a trusted mechanism for identity, authentication, and authorization.They ensure that both individuals and services can interact securely across the different DOME components — such as the Issuer, the Mar...

Verifiable Credential types

Verifiable Credentials overview

Currently, 2 different types of Verifiable Credentials are used in the DOME ecosystem: LEARCredentialEmployee, LEARCredentialMachine and Gx:LabelCredential. LEAR Credentials are used to identify either an individual or a machine/service. Each LEAR Credential ...

LEAR Credential powers

Verifiable Credentials overview

LEAR Credentials (LEAR Credential Employee and LEAR Credential Machine credentials) grant specific permissions known as “powers.”Each power combines a function (the logical area of capability) with one or more actions (the specific operations permitted within ...

eIDAS Trust Framework and digital signatures

Verifiable Credentials overview

At the top of the Trust Framework we have the EU Trusted Lists. Member States have the obligation to establish, maintain and publish trusted lists with each qualified trust service provider under their control and the services provided by them. In order to al...

Signing the LEAR Credential

Verifiable Credentials overview

We start describing at a high level a typical local signature process when the legal representative signs a PDF document, because it is very familiar and will serve as the base to describe the signature of a Verifiable Credential to generate the LEAR Credentia...

Obtaining the Verifiable Credentials: step by step

Obtaining the Verifiable Credentials

Introduction After a Verifiable Credential is issued, you will receive an email with a Credential Offer.This offer must be processed using the DOME Digital Wallet, which will activate and securely store your credential so it can be used within the DOME enviro...

Logging in with LEAR Credential Employees: step by step

Logging in with Verifiable Credentials

Introduction LEAR Credential Employees are Verifiable Credentials that enable access to various systems and features within the DOME environment.Each credential grants specific permissions, referred to as its “power.” For example: To log in to the DOME ...

Deployment of the LEAR Credential Issuer

Identity Management - Developer guides Deployment scenarios

The LEAR Credential Issuer is a web application consisting of a server part, HTML interface, the APIs implementing the OpenIDVCI protocol, and the APIs required by the LEAR Credential Signer program. The LEAR Credential Issuer does not require integration wit...

Deployment of the LEAR Credential Signer

Identity Management - Developer guides Deployment scenarios

This is a simple program that is installed in the PC of the legal representative. It is intended for self-installation without requiring technical knowledge, though it is expected to be installed by the IT personnel taking care of the personal computer infrast...

LEAR Credential Issuer

Identity Management - Developer guides Infrastructure supporting the access to...

Description The LEAR Credential Issuer is the main application that manages the credential flow. We assume here that it is specialised in creating LEAR Credentials, though it could be used for other types of credentials. In this context, we will use the term ...

LEAR Credential Signer

Identity Management - Developer guides Infrastructure supporting the access to...

Description This is a simple program provided by DOME that should be installed locally in the PC of the legal representative and that performs the actual signing of the LEAR Credential (there are versions for Windows, Mac and Linux). Alternatively, any organi...

1. Introduction

Identity Management - Developer guides Verifier M2M Integration Guide

Purpose and scope This runbook explains how a backend service or component can integrate with the Verifier as an Authorization Server (AS) in M2M mode. It provides the end-to-end steps needed by developers: from preparing configuration and credentials, to cal...

2. Integration Steps

Identity Management - Developer guides Verifier M2M Integration Guide

Prerequisites Legal entity has completed onboarding in the ecosystem. LEAR can access the Issuer service and issue a LEARCredentialMachine to its machine(s). DID method supported: did:key. Access to developer documentation and test environm...

1. Introduction

Identity Management - Developer guides Verifier Public Client Integration: Aut...

Purpose and scope This runbook explains how a public client, such as a web or mobile application, can integrate with the Verifier acting as an Authorization Server (AS) using the Authorization Code Flow with PKCE. It provides developers with the end-to-end st...

2. Integration Steps

Identity Management - Developer guides Verifier Public Client Integration: Aut...

Prerequisites The legal entity has completed onboarding in the DOME ecosystem. The LEAR has obtained a valid LEAR Credential through the Issuer service. The end user (employee, contractor, etc.) has received a Verifiable Credential issued by the...

Introduction

Identity Management - Developer guides Verifier Confidential Client Integratio...

Purpose and scope This runbook explains how a confidential client, such as a backend component or secure web application, can integrate with the Verifier acting as an Authorization Server (AS) using the Authorization Code Flow with client_secret_jwt client au...

Integration Steps

Identity Management - Developer guides Verifier Confidential Client Integratio...

Prerequisites The legal entity has completed onboarding in the DOME ecosystem. The LEAR has obtained a valid LEARCredentialMachine through the Issuer service. DID method supported: did:key. The confidential client (backend service or secure...

QR Scan: credential obtention and presentation (login)

DOME Digital Wallet User Guide

QR Scan Functionality General Use: The QR Scan function is used to scan QR codes provided by a third party, which can trigger processes for obtaining or presenting credentials (see below). To initiate a scan, press the 'Scan QR' button to deploy the camer...

Wallet Settings

DOME Digital Wallet User Guide

You can access the "Settings" tab by clicking or tapping on the "Settings" button below: Select camera You can choose which camera the Wallet should use. If prompted, make sure to grant the necessary permissions. By deploying the selector you will see a...