You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+5-6Lines changed: 5 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -69,7 +69,7 @@ With Verifiable credentials, a check for the validity of the document can be mad
69
69
each separated by a colon. They start with the namespace `did` , followed by a decentralised identifier method (such as `web` or `ethr`, `key`). The method defines how the rest of the identifier can be decoded and resolved. For example the term [`did:web`](https://w3c-ccg.github.io/did-method-web/) refers to a method for creating decentralized identifiers that are hosted on a publicly accessible web domain, `did:ethr` is used by [Etherium-based identities](https://github.com/uport-project/ethr-did-registry) and a [`did:key`](https://w3c-ccg.github.io/did-key-spec/) holds an encoded public key. the remaining sections of the URN will resolve to allow a verifier to check if the identity has been used correctly.
70
70
71
71
For example `did:web:fiware.github.io:tutorials.Step-by-Step:alice` is referring to a document found at
Within the data space, the **Vet** wishes to restrict access to her data to legitmate users only:
120
120
121
-
- Those who have bought access to her data, who are accredited users of **Vets Mart*
121
+
- Those who have bought access to her data, who are accredited users of **Vets Mart**
122
122
- Animal welfare officers who are legally alloweed access who are accredited by the national **Government**
123
123
124
124
This tutorial will not complete the enforcement of access rules, but will show how accredited users would be
125
-
able to demonstrate that they are legitimately from those organisations.
126
-
127
-
125
+
able to demonstrate that they are legitimately from those organisations and hold a specific role.
128
126
129
127
Therefore the overall architecture will consist of the following elements:
130
128
@@ -154,7 +152,8 @@ Therefore the overall architecture will consist of the following elements:
154
152
protocol running over HTTP.
155
153
- Displays a running Farm Management Information System (FMIS)
156
154
157
-
In additionl, our **Vet** will be using a dummy data space connector, it includes:
155
+
In addition, our **Vet** will be protected via a dummy data space connector, the data space connector is spoofing the role of a
156
+
[VC Verifier ](https://github.com/FIWARE/VCVerifier). it in turn connects to some other FIWARE Data Space components:
158
157
159
158
- A FIWARE [Credentials Configuration Service](https://github.com/FIWARE/credentials-config-service) to hold the location of services it should trust
160
159
- A FIWARE [trusted-issuers-list]https://github.com/FIWARE/trusted-issuers-list/) which returns the list of trusted roles for each issuer's credentials
0 commit comments