You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Similar to the approach outlined above, but instead of using a simple JSON-LD document containing a proof section, a JWT is used. An example as given by the spec (example 30):
The Verifiable presentation is represented as a linked data document, associated with the vp key of the JWT
Keys one would normally find in the JSON-LD document are replaced (where possible) with JWT keys, e.g. iss (issuer), jti (id), exp (expirationDate). The full list of claim names that MUST be used is listed in the specification.
The header section of the JWT would look as follows:
Similar to the approach outlined above, but instead of using a simple JSON-LD document containing a proof section, a JWT is used. An example as given by the spec (example 30):
The Verifiable presentation is represented as a linked data document, associated with the
vp
key of the JWTKeys one would normally find in the JSON-LD document are replaced (where possible) with JWT keys, e.g.
iss
(issuer),jti
(id),exp
(expirationDate). The full list of claim names that MUST be used is listed in the specification.The header section of the JWT would look as follows:
The text was updated successfully, but these errors were encountered: