|
| 1 | +<h1 align="center"> |
| 2 | + <img src="https://fiware.github.io/tutorials.Step-by-Step/img/fiware-farm.png" /> |
| 3 | + <img src="https://img.shields.io/badge/NGSI-LD-d6604d.svg" width="90"/> |
| 4 | + <br/> |
| 5 | + 👨🌾 👩🌾 🐄 🐐 🐑 🐖 🐓 🌻 🥕 🌽 |
| 6 | +</h1> |
| 7 | + |
| 8 | +## Understanding Verifiable Credentials |
| 9 | + |
| 10 | +[](https://github.com/FIWARE/catalogue/blob/master/security/README.md) |
| 11 | +[](https://opensource.org/licenses/MIT) |
| 12 | +[](https://stackoverflow.com/questions/tagged/fiware) |
| 13 | +[](https://w3c.github.io/json-ld-syntax/) <br/> |
| 14 | +[](https://ngsi-ld-tutorials.rtfd.io) |
| 15 | + |
| 16 | +This tutorial introduces the concept of Verifiable Credentials and Distributed Identifiers, and how to apply them to Data Spaces. |
| 17 | +The tutorial explains how issuers generate credentials for their |
| 18 | +recipients and how the holder of a credential can in turn issue a |
| 19 | +verifiable presentation supporting their claims. These practical examples |
| 20 | +will help to explain the roles of the various components of a data space connector as defined in a later tutorial. |
| 21 | + |
| 22 | +The tutorial demonstrates examples of interactions using a GUI, as well [cUrl](https://ec.haxx.se/) |
| 23 | +commands used to generate credentials using a REST API |
| 24 | + |
| 25 | + |
| 26 | +## Contents |
| 27 | + |
| 28 | +<details> |
| 29 | +<summary><strong>Details</strong></summary> |
| 30 | + |
| 31 | + |
| 32 | + |
| 33 | +</details> |
| 34 | + |
| 35 | +# Verifiable Credentials |
| 36 | + |
| 37 | +> Reagan: “But the importance of this treaty transcends numbers. We have listened to the wisdom in an old Russian maxim. |
| 38 | +> And I'm sure you're familiar with it, Mr. General Secretary, though my pronunciation may give you difficulty. |
| 39 | +> The maxim is: доверяй, но проверяй - trust, but verify.” |
| 40 | +> |
| 41 | +> Gorbachev: “You repeat that at every meeting.“ |
| 42 | +> |
| 43 | +> Reagan: “I like it.” |
| 44 | +> |
| 45 | +> ― Remarks on Signing the Intermediate-Range Nuclear Forces Treaty |
| 46 | +
|
| 47 | + |
| 48 | +## What are Verifiable Credentials |
| 49 | + |
| 50 | +## What are Distributed Identifiers |
| 51 | + |
| 52 | + |
| 53 | +# Architecture |
| 54 | + |
| 55 | + |
| 56 | +# Start Up |
| 57 | + |
| 58 | + |
| 59 | +# Verifiable Credentials |
| 60 | + |
| 61 | +## Using Verifiable Credentials |
| 62 | + |
| 63 | +### Generating a Verifiable Credential |
| 64 | + |
| 65 | +#### 3️⃣ Request: |
| 66 | + |
| 67 | +```console |
| 68 | + |
| 69 | +``` |
| 70 | + |
| 71 | +#### Response: |
| 72 | + |
| 73 | +### Generating Verifiable Presentation |
| 74 | + |
| 75 | +#### 3️⃣ Request: |
| 76 | + |
| 77 | +```console |
| 78 | + |
| 79 | +``` |
| 80 | + |
| 81 | +#### Response: |
| 82 | + |
| 83 | + |
| 84 | +### Verifying a Verifiable Presentation |
| 85 | + |
| 86 | +#### 3️⃣ Request: |
| 87 | + |
| 88 | +```console |
| 89 | + |
| 90 | +``` |
| 91 | + |
| 92 | +#### Response: |
| 93 | + |
| 94 | +### Verifying a Verifiable Credential |
| 95 | + |
| 96 | +#### 3️⃣ Request: |
| 97 | + |
| 98 | +```console |
| 99 | + |
| 100 | +``` |
| 101 | + |
| 102 | +#### Response: |
| 103 | + |
| 104 | + |
| 105 | + |
| 106 | +# Next Steps |
| 107 | + |
| 108 | +Want to learn how to add more complexity to your application by adding advanced features? You can find out by reading |
| 109 | +the other [tutorials in this series](https://ngsi-ld-tutorials.rtfd.io) |
| 110 | + |
| 111 | +## License |
| 112 | + |
| 113 | +[MIT](LICENSE) © 2025 FIWARE Foundation e.V. |
0 commit comments