Recently Updated Pages
Identifying professionals
Version 2025-07-04 Status draft Introduction This techincal agreements descibes how...
Identifying vendor organizations
Version 2025-07-04 Status draft Introduction This techincal agreements descibes how...
Identifying health organizations
Version 2025-07-04 Status draft Introduction This techincal agreements descibes how...
GF Adressering
GF Lokalisatie
Een beschrijving van de GF lokalisatie
Nuts-application eOverdracht 2.0
Introduction This articles specifies version 2 of the Nuts-application-specification "eOverdracht...
Example Presentation Definitions
This page lists examples of Presentation Definitions using the X509Credential. Shared Care Planni...
UZI server certificates with RFC023
PKI overheid & UZI server certificates The Dutch government has a Public Key Infrastructure (PKI)...
Requesting Access
To access APIs secured through Nuts, callers need an access token issued by the OAuth2 Authorizat...
Project document
Samenwerking Slack kanaal Functionele beschrijving omnichannel chat Technische doccumentati...
DID management
When you upgrade from V5 to V6, your DID documents will be migrated to a SQL database. A new VDR ...
Notulen bijeenkomsten
Google doc
Functionele uitwerking Huisartsinzage
Hieronder volgt de uitwerking van Huisartsinzage (plateau 1: Huisarts inzicht geven in het VVT do...
Zorginzage V6 hackathon spec
This document is in DRAFT Purpose The purpose of the hackathon is to demonstrate a simple impleme...
Authenticatie risicoanalyse
Situatie Fictieve case: huisartsen inzage geven in cliƫntdossiers van cliƫnten wijkverpleging van...
Zorgtoepassingsprofiel inzage huisartsgegevens door VVT
Zorgtoepassingsprofiel taakuitwisseling
Applicatie architectuur
In het volgende diagram zien we de benodigde applicatie-rollen voor Attributen Based Access Contr...
Use case migration
Together with V6 comes a new understanding of how data exchange should be secured across organiza...
UZI Certificate Credential
Abstract This proposal describes a method for issuing Verifiable Credentials by leveraging the ex...