How are Decentralized Identifiers (DIDs) used for sign-in.

10 Mar 2023, 16:20
How are Decentralized Identifiers (DIDs) used for sign-in? Each DID can have one (or many) public-private cryptographic key pairs. Users who click the Sign-In button on a website will see a QR Code to scan with their Digital Identity Wallet app. The user selects what DID to use, and the DID's private key digitally signs a VC, proving the user controls the DID. The VC is sent to the website, which verifies that the credential was indeed cryptographically signed by the correct user and grants the user website access. This Verifiable Credential contains: šŸ“š Data requested from user during sign-in šŸ” A challenge (a unique, one-time use identifier provided by the auth server to prevent replay attacks) šŸ“± Credential expiration šŸ•µļø Cryptographic hash for data integrity Dock is a launch partner of @Auth0ā€™s Web3 Category šŸŽ‰ Auth0ā€™s clients can now easily implement DIDs in their sign-in flows. Learn more: