How are Decentralized Identifiers (DIDs) used for sign-in.
10 Mar 2023, 16:20
How are Decentralized Identifiers (DIDs) used for sign-in?
Each DID can have one (or many) public-private cryptographic key pairs.
Users who click the Sign-In button on a website will see a QR Code to scan with their Digital Identity Wallet app.
The user selects what DID to use, and the DID's private key digitally signs a VC, proving the user controls the DID.
The VC is sent to the website, which verifies that the credential was indeed cryptographically signed by the correct user and grants the user website access.
This Verifiable Credential contains:
š Data requested from user during sign-in
š A challenge (a unique, one-time use identifier provided by the auth server to prevent replay attacks)
š± Credential expiration
šµļø Cryptographic hash for data integrity
Dock is a launch partner of @Auth0ās Web3 Category š
Auth0ās clients can now easily implement DIDs in their sign-in flows.
Learn more: