Self-Sovereign Identity – or SSI in brief – is now a major thing. Benefits and practical applicability are evident to many. Business and political decision takers have grasped its value. A lot of use cases are being implemented, even some driven by the German Federal Chancellery. In this workshop, participants will experience how SSI can be deployed and integrated in enterprise IT environments. A very prominent use case is logging in to web applications only with facts a user presents, completely password-less. Authentication and authorization with standard protocols and methods – e.g. SAML, OpenID Connect, LDAP – can be easily linked to SSI and applied in production scenarios.
Agenda / Contents
Introduction – SSI Basics
SSI Trust Triangle – Holder, Issuer, Verifier
Installing an SSI Wallet App
Creating a Public DID
Defining a Data Schema
Instantiating a Credential Definition with Revocation Registry
Issuing a Credential
Verifying a Credential
Making a web application SSI-ready
Creating an Credential-based Access Rule
Logging in to the web application with SSI