Главная
Study mode:
on
1
- Introduction
2
- Identity in the real world
3
- Identity with centralized identity
4
- Challenges today
5
- Me as my own identity provider
6
- Attestations from an issuer
7
- Trusts
8
- The need for proof
9
- How we prove things with computers
10
- How to know it’s the right public key for an entity
11
- Decentralized identifier DID
12
- Requirements for a DID
13
- Associating DID to public key
14
- Solution
15
- How do I rotate keys? DID document
16
- What is a DID and how is it working
17
- Methods
18
- What really matters!
19
- Why is the DID so ugly
20
- Verifiable credentials at last
21
- Issuer, holder and verifier all together
22
- Lets see this in action
23
- Using Microsoft Entra to issue and verify
24
- How to backup and recover if lose wallet
25
- Why do we care?
26
- Some considerations as responsibilities shift
27
- Closing thoughts
Description:
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only! Grab it Dive into a comprehensive video lecture on decentralized identity and verifiable credentials. Explore the evolution of identity from real-world to centralized digital systems, and understand the challenges faced today. Learn about becoming your own identity provider, the concept of attestations, and the importance of trust and proof in digital identities. Discover the intricacies of decentralized identifiers (DIDs), including their requirements, association with public keys, and the role of DID documents. Examine various DID methods and their significance. Delve into verifiable credentials, understanding the interactions between issuers, holders, and verifiers. Witness practical demonstrations, including the use of Microsoft Entra for issuing and verifying credentials. Gain insights into wallet backup and recovery, the importance of this technology, and considerations as responsibilities shift in the digital identity landscape. Benefit from detailed explanations, real-world examples, and closing thoughts on the future of decentralized identity. Read more

Understanding and Using Verifiable Credentials

John Savill's Technical Training
Add to list
0:00 / 0:00