verified_id

Verified ID

Return to Decentralized Identity, IAM

https://identity.foundation

Join us in developing the foundational components of an open, standards-based, decentralized identity ecosystem for people, organizations, apps, and devices.

Using the Microsoft Authenticator with Verified ID: https://learn.microsoft.com/en-us/entra/verified-id/using-authenticator

https://learn.microsoft.com/en-us/entra/verified-id/how-to-opt-out?source=recommendations

https://learn.microsoft.com/en-us/entra/verified-id/decentralized-identifier-overview?source=recommendations

Microsoft is actively collaborating with members of the Decentralized Identity Foundation (DIF), the W3C Credentials Community Group, and the wider identity community. We’ve worked with these groups to identify and develop critical standards, and the following standards have been implemented in our services.

  • DIF Presentation Exchange

Terminology Term Description DID Decentralized Identifier as per DID DID Document DID Document as per DID SIOP DID Self-Issued OpenID Connect Provider DID profile. Refers to a specific flavor of DID AuthN used in the OIDC SIOP flow. JWT JSON Web Token as per RFC7797 JWE JSON Web Encryption as per RFC7516 JWS JSON Web Signature as per RFC7515 JWK JSON Web Key as per RFC7517 JWKS JWK Set as per RFC7517 OIDC OpenID Connect as per verified_id OIDC client Used synonymously with Relying Party (see RP) OP OpenID Provider as per verified_id SIOP Self-Issued OpenID Provider as per verified_id RP Relying Party, as used in verified_id Identity Wallet An Identity Wallet refers to a application that is under the control and acts on behalf of the DID holder. This Also known as an identity agent. The Identity Wallet can have different form factors such as a mobile app, browser extension/ plugin etc. DID AuthN Refers to a method of proofing control over a DID for the purpose of authentication.

Source: https://identity.foundation/did-siop

Terminology

Term Description

Source: https://identity.foundation/specs/did-configuration

Terminology

This section is non-normative.

The following terms are used to describe concepts in this specification.

claim An assertion made about a subject. credential A set of one or more claims made by an issuer. A verifiable credential is a tamper-evident credential that has authorship that can be cryptographically verified. Verifiable credentials can be used to build verifiable presentations, which can also be cryptographically verified. The claims in a credential can be about different subjects. data minimization The act of limiting the amount of shared data strictly to the minimum necessary to successfully accomplish a task or goal. decentralized identifier A portable URL-based identifier, also known as a DID, associated with an entity. These identifiers are most often used in a verifiable credential and are associated with subjects such that a verifiable credential itself can be easily ported from one repository to another without the need to reissue the credential. An example of a DID is did:example:123456abcdef. decentralized identifier document Also referred to as a DID document, this is a document that is accessible using a verifiable data registry and contains information related to a specific decentralized identifier, such as the associated repository and public key information. derived predicate A verifiable, boolean assertion about the value of another attribute in a verifiable credential. These are useful in zero-knowledge-proof-style verifiable presentations because they can limit information disclosure. For example, if a verifiable credential contains an attribute for expressing a specific height in centimeters, a derived predicate might reference the height attribute in the verifiable credential demonstrating that the issuer attests to a height value meeting the minimum height requirement, without actually disclosing the specific height value. For example, the subject is taller than 150 centimeters. entity A thing with distinct and independent existence, such as a person, organization, or device that performs one or more roles in the ecosystem. graph A network of information composed of subjects and their relationship to other subjects or data. holder A role an entity might perform by possessing one or more verifiable credentials and generating presentations from them. A holder is usually, but not always, a subject of the verifiable credentials they are holding. Holders store their credentials in credential repositories. identity provider An identity provider, sometimes abbreviated as IdP, is a system for creating, maintaining, and managing identity information for holders, while providing authentication services to relying party applications within a federation or distributed network. In this case the holder is always the subject. Even if the verifiable credentials are bearer credentials, it is assumed the verifiable credentials remain with the subject, and if they are not, they were stolen by an attacker. This specification does not use this term unless comparing or mapping the concepts in this document to other specifications. This specification decouples the identity provider concept into two distinct concepts: the issuer and the holder. issuer A role an entity can perform by asserting claims about one or more subjects, creating a verifiable credential from these claims, and transmitting the verifiable credential to a holder. presentation Data derived from one or more verifiable credentials, issued by one or more issuers, that is shared with a specific verifier. A verifiable presentation is a tamper-evident presentation encoded in such a way that authorship of the data can be trusted after a process of cryptographic verification. Certain types of verifiable presentations might contain data that is synthesized from, but do not contain, the original verifiable credentials (for example, zero-knowledge proofs). repository A program, such as a storage vault or personal verifiable credential wallet, that stores and protects access to holders' verifiable credentials. selective disclosure The ability of a holder to make fine-grained decisions about what information to share. subject A thing about which claims are made. validation The assurance that a verifiable credential or a verifiable presentation meets the needs of a verifier and other dependent stakeholders. This specification is constrained to verifying verifiable credentials and verifiable presentations regardless of their usage. Validating verifiable credentials or verifiable presentations is outside the scope of this specification. verifiable data registry A role a system might perform by mediating the creation and verification of identifiers, keys, and other relevant data, such as verifiable credential schemas, revocation registries, issuer public keys, and so on, which might be required to use verifiable credentials. Some configurations might require correlatable identifiers for subjects. Some registries, such as ones for UUIDs and public keys, might just act as namespaces for identifiers. verification The evaluation of whether a verifiable credential or verifiable presentation is an authentic and timely statement of the issuer or presenter, respectively. This includes checking that: the credential (or presentation) conforms to the specification; the proof method is satisfied; and, if present, the status check succeeds. Verification of a credential does not imply evaluation of the truth of claims encoded in the credential.. verifier A role an entity performs by receiving one or more verifiable credentials, optionally inside a verifiable presentation for processing. Other specifications might refer to this concept as a relying party. URI A Uniform Resource Identifier, as defined by [RFC3986].

https://www.w3.org/TR/vc-data-model

Identity and Access Management (IAM): IAM, Verified ID, Identity, Access Management. AWS Identity and Access Management (IAM), AWS Single Sign-On (SSO), Azure Active Directory (Azure AD) (Microsoft Certified Identity and Access Administrator Associate), Azure Role-Based Access Control (RBAC), Microsoft 365 Identity Management, Google Cloud Identity and Access Management (IAM), Google Cloud Directory Sync (GCDS), IBM Cloud IAM, IBM Cloud Directory Service, Oracle Cloud Infrastructure Identity and Access Management (IAM), Oracle Identity Cloud Service.

User Provisioning and Deprovisioning, Single Sign-On (SSO), Multi-Factor Authentication (MFA), Identity Federation, Access Control Policies, Role-Based Access Control (RBAC), Attribute-Based Access Control (ABAC), Identity Governance, Identity Providers (IdP), Service Providers (SP), Security Assertion Markup Language (SAML), OpenID Connect (OIDC), JSON Web Tokens (JWT), Directory Services, Active Directory (AD), LDAP Integration, Privileged Access Management (PAM), Identity as a Service (IDaaS), User Behavior Analytics (UBA), Access Review and Certification, Password Management, Identity Synchronization, Cloud IAM, Federated Identity Management, Biometric Authentication, Smart Cards and Tokens, OAuth 2.0, API Security and IAM, Mobile Identity Management, Social Identity Integration, Compliance and IAM, IAM Audit and Reporting, User Experience in IAM, Risk-Based Authentication, Identity Analytics, IAM for IoT, Blockchain and IAM, Zero Trust Security Model, IAM Policy Enforcement, Credential Stuffing Prevention, Self-Service Identity Management, IAM in Hybrid Environments, Cross-Domain Identity Management, Identity Theft Protection, Data Privacy and IAM, IAM and Endpoint Security, Delegated Administration, IAM and Cybersecurity Frameworks, IAM Best Practices

OAuth, Cloud IAM (AWS IAM, Azure IAM - Active Directory, Azure Active Directory, GCP IAM, IBM Cloud IAM, IBM Mainframe IAM - IBM RACF), OS IAM (Windows IAM - Active Directory, Group Policy, Linux IAM - PAM, macOS IAM), Passkeys, IAM Bibliography, Awesome IAM, GitHub IAM. (navbar_iam - See also navbar_passwords, navbar_passkeys, navbar_mfa, navbar_security, navbar_firewalls, navbar_encryption, navbar_pentesting, navbar_cloud_providers)


Cloud Monk is Retired ( for now). Buddha with you. © 2025 and Beginningless Time - Present Moment - Three Times: The Buddhas or Fair Use. Disclaimers

SYI LU SENG E MU CHYWE YE. NAN. WEI LA YE. WEI LA YE. SA WA HE.


verified_id.txt · Last modified: 2025/02/01 06:23 by 127.0.0.1

Donate Powered by PHP Valid HTML5 Valid CSS Driven by DokuWiki