Skip to content

Commit 9cc2a75

Browse files
committed
Add fixes
1 parent 0663982 commit 9cc2a75

File tree

1 file changed

+5
-6
lines changed

1 file changed

+5
-6
lines changed

README.md

Lines changed: 5 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -69,7 +69,7 @@ With Verifiable credentials, a check for the validity of the document can be mad
6969
each separated by a colon. They start with the namespace `did` , followed by a decentralised identifier method (such as `web` or `ethr`, `key`). The method defines how the rest of the identifier can be decoded and resolved. For example the term [`did:web`](https://w3c-ccg.github.io/did-method-web/) refers to a method for creating decentralized identifiers that are hosted on a publicly accessible web domain, `did:ethr` is used by [Etherium-based identities](https://github.com/uport-project/ethr-did-registry) and a [`did:key`](https://w3c-ccg.github.io/did-key-spec/) holds an encoded public key. the remaining sections of the URN will resolve to allow a verifier to check if the identity has been used correctly.
7070

7171
For example `did:web:fiware.github.io:tutorials.Step-by-Step:alice` is referring to a document found at
72-
[`https://fiware.github.io/tutorials.Step-by-Step/alice/did.json`]
72+
[`https://fiware.github.io/tutorials.Step-by-Step/alice/did.json`](https://fiware.github.io/tutorials.Step-by-Step/alice/did.json)
7373

7474
```json
7575
{
@@ -118,13 +118,11 @@ respectively.
118118

119119
Within the data space, the **Vet** wishes to restrict access to her data to legitmate users only:
120120

121-
- Those who have bought access to her data, who are accredited users of **Vets Mart*
121+
- Those who have bought access to her data, who are accredited users of **Vets Mart**
122122
- Animal welfare officers who are legally alloweed access who are accredited by the national **Government**
123123

124124
This tutorial will not complete the enforcement of access rules, but will show how accredited users would be
125-
able to demonstrate that they are legitimately from those organisations.
126-
127-
125+
able to demonstrate that they are legitimately from those organisations and hold a specific role.
128126

129127
Therefore the overall architecture will consist of the following elements:
130128

@@ -154,7 +152,8 @@ Therefore the overall architecture will consist of the following elements:
154152
protocol running over HTTP.
155153
- Displays a running Farm Management Information System (FMIS)
156154

157-
In additionl, our **Vet** will be using a dummy data space connector, it includes:
155+
In addition, our **Vet** will be protected via a dummy data space connector, the data space connector is spoofing the role of a
156+
[VC Verifier ](https://github.com/FIWARE/VCVerifier). it in turn connects to some other FIWARE Data Space components:
158157

159158
- A FIWARE [Credentials Configuration Service](https://github.com/FIWARE/credentials-config-service) to hold the location of services it should trust
160159
- A FIWARE [trusted-issuers-list]https://github.com/FIWARE/trusted-issuers-list/) which returns the list of trusted roles for each issuer's credentials

0 commit comments

Comments
 (0)