Skip to main content

Recently Updated Pages

V6 configuration without V5 features

Cookbook

The configuration below show a minimal nuts.json config file: did:nuts disabled, did:web enable...

Updated 8 months ago by Gerard Snaauw

Service Discovery

Designing a Nuts Use Case

A party often exchanges data through its API endpoints. If a client only has the party's name or ...

Updated 8 months ago by Wout Slakhorst

Autorisatie en toestemmingen

Autorisatie

Op de vorige pagina is te lezen wat een autorisatie volgens Nuts precies is. Toch zien we dat er ...

Updated 8 months ago by Wout Slakhorst

Autorisaties volgens Nuts

Autorisatie

Om gegevens te kunnen uitwisselen zullen twee (computer) systemen moeten samenwerken. Het bronsys...

Updated 8 months ago by Wout Slakhorst

Agenda's en verslagen

Actiz architectuurwerkgroep

Google doc

Updated 8 months ago by Jorrit Spee

Referentie & solution architectuur (WIP)

SSIBAC

Nuts SSIBAC Een solution architectuur voor het implementeren van ABAC gebasseerd op attributen ve...

Updated 9 months ago by Wout Slakhorst

Authentication & authorization

Basics

When a request comes in at your resource endpoint, an access token should be available in the HTT...

Updated 9 months ago by Wout Slakhorst

Access tokens

Basics

After finding a service endpoint to interact with, it's time to request an access token. You can ...

Updated 9 months ago by Wout Slakhorst

Service search

Basics

You can find participants of a use case via their registered services. A use case defines the ser...

Updated 9 months ago by Wout Slakhorst

Service activation

Basics

Before another party can interact with you, they will first need to find your endpoints. The disc...

Updated 9 months ago by Wout Slakhorst

Subject registration

Basics

The first thing you need to do is create some public/private key material for your subjects. We u...

Updated 9 months ago by Wout Slakhorst

Obtaining credentials

Basics

After you created a subject with some DID documents, it's time to give meaning to these identifie...

Updated 9 months ago by Wout Slakhorst

Use Case Activation / Discoverability

Implementing a Nuts Use Case

After configuring the Nuts node with the required artifacts, the use case can be activated for a ...

Updated 9 months ago by Wout Slakhorst

AuthN using Verifiable Credentials

Designing a Nuts Use Case Authorization

To successfully negotiate an OAuth2 access token, the token issuer (OAuth2 Authorization Server) ...

Updated 9 months ago by Wout Slakhorst

OAuth2 Scopes and Presentation Definition Mapping

Designing a Nuts Use Case Authorization

Scope design When designing a system that uses OAuth2, you have to decide how scopes map to resou...

Updated 9 months ago by Wout Slakhorst

Credential Trust

Designing a Nuts Use Case Authorization

Authentication on Nuts heavily depends on trusted credential issuers: any attribute, revelant to ...

Updated 9 months ago by Rein Krul

OAuth2 Flows and Wallets

Designing a Nuts Use Case Authorization

Nuts supports a custom OAuth2 flows for acquiring an access token: the service-to-service flow. S...

Updated 9 months ago by Wout Slakhorst

Nuts Node Configuration

Implementing a Nuts Use Case

A use case writer supplements you with a number of artifacts, that need to be configured: Servic...

Updated 9 months ago by Rein Krul

Access Policy (TODO)

Designing a Nuts Use Case Authorization

Anti-patterns Bad: "Clients can access /Observation, but the FHIR server has to limit it to /Ob...

Updated 9 months ago by Rein Krul

Local v5 Nuts node with Ngrok

Cookbook

This documentation only applies to use cases requiring the Nuts gRPC network (did:nuts DIDs). ...

Updated 9 months ago by Rein Krul