Use cases
This chapter builds on the iSHARE Trust Framework to showcase the key functionalities in four use cases and their Verifiable Credentials (VC) variant.
Both versions describe the same business goals; they differ only in the technical evidence used for authentication and authorisation:
[Classic]: JWT artefacts and registry lookups
[VC variant]: Verifiable Credentials (VCs) and Verifiable Presentations (VPs) (Refer to Glossary)
Use case: portable identity showcases:
Structure
Each use case includes:
A description and depiction of the roles and relations;
A description of the prerequisites, and a depiction of prerequisite registration;
A description and depiction of the use case;
A sequence diagram;
A reference to what needs to be technically implemented for this use case.
The depicted use cases are only a selection of the iSHARE Trust Framework's use case scope. For the full scope, please refer to the detailed Functional descriptions.
Last updated