Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

253 total results found

Signing the LEAR Credential

Verifiable Credentials overview

We start describing at a high level a typical local signature process when the legal representative signs a PDF document, because it is very familiar and will serve as the base to describe the signature of a Verifiable Credential to generate the LEAR Credentia...

Credential Management

DOME Digital Wallet User Guide

See your credentials In the "Credentials" tab you can see all the credentials that have been added to your wallet account. Access it by clicking or tapping on the "Credentials" button below. To learn more about credentials and their different types, ...

Wallet Settings

DOME Digital Wallet User Guide

You can access the "Settings" tab by clicking or tapping on the "Settings" button below: Select camera You can choose which camera the Wallet should use. If prompted, make sure to grant the necessary permissions. By deploying the selector you will see a...

3. Data validation: DLT

Access Node Instantiation and Complianc...

Once we have the issued credential, we need to generate our machine's addresses using this tool: Dome Access Node  Keys Generator  To do that, we need our machine's DID key, obtained previously.   The generated addresses will be as follows:   

4. AN Configuration: Secrets

Access Node Instantiation and Complianc...

Check this guide if you will work with secrets: Github sealed secrets guide

5. AN Configuration: Chart.yaml

Access Node Instantiation and Complianc...

This is how your chart.yaml should look. All necessary dependencies are included in the AN configuration.  Check the last version here:  apiVersion: v2name: access-nodedescription: Chart holder for ArgoCDtype: applicationversion: 0.7.31appVersion: ...

6. AN Configuration: Values.yaml

Access Node Instantiation and Complianc...

First, we need to consider whether we've decided to work with secrets (remember rename the file to values.yaml), or not, as the file format may vary slightly.  Values with secrets.yaml Values without secrets.yaml   First of all, we will check that the file...

7. Registering the node in the Trusted Lists

Access Node Instantiation and Complianc...

In order for your AN node to communicate and connect with ours, it must be registered on the following two lists.  Trusted Access node list  Trusted Access Node list file  The format to follow is as follows:    - name: <your company name>      dl...

8. AN preparing the synchronization tests

Access Node Instantiation and Complianc...

These are the steps that will be taken before the tests:  8.1. Backup before testing  Perform a dump backup of the Scorpio data so we can restore it afterwards and delete the data of your DB. Remember to put it out of your docker or it will disappear if yo...

Tests to Perform

Access Node Instantiation and Complianc...

We will perform two tests: Synchronization with the blockchain  P2P verification We will create a temporary entity, one on your node and another on ours, and see if it synchronizes via the blockchain.  We can do it using Postman or using the curl com...