Skip to main content

Recently Updated Pages

Configuration update

v5 -> v6 migration guide

When updating your node from V5 to V6, you can choose to disable/enable certain parts depending o...

Updated 9 months ago by Wout Slakhorst

V6 configuration without V5 features

Cookbook

The configuration below show a minimal nuts.json config file: did:nuts disabled, did:web enable...

Updated 9 months ago by Gerard Snaauw

Service Discovery

Designing a Nuts Use Case

A party often exchanges data through its API endpoints. If a client only has the party's name or ...

Updated 9 months ago by Wout Slakhorst

Autorisatie en toestemmingen

Autorisatie

Op de vorige pagina is te lezen wat een autorisatie volgens Nuts precies is. Toch zien we dat er ...

Updated 9 months ago by Wout Slakhorst

Autorisaties volgens Nuts

Autorisatie

Om gegevens te kunnen uitwisselen zullen twee (computer) systemen moeten samenwerken. Het bronsys...

Updated 9 months ago by Wout Slakhorst

Agenda's en verslagen

Actiz architectuurwerkgroep

Google doc

Updated 9 months ago by Jorrit Spee

Referentie & solution architectuur (WIP)

SSIBAC

Nuts SSIBAC Een solution architectuur voor het implementeren van ABAC gebasseerd op attributen ve...

Updated 10 months ago by Wout Slakhorst

Authentication & authorization

Basics

When a request comes in at your resource endpoint, an access token should be available in the HTT...

Updated 10 months ago by Wout Slakhorst

Access tokens

Basics

After finding a service endpoint to interact with, it's time to request an access token. You can ...

Updated 10 months ago by Wout Slakhorst

Service search

Basics

You can find participants of a use case via their registered services. A use case defines the ser...

Updated 10 months ago by Wout Slakhorst

Service activation

Basics

Before another party can interact with you, they will first need to find your endpoints. The disc...

Updated 10 months ago by Wout Slakhorst

Subject registration

Basics

The first thing you need to do is create some public/private key material for your subjects. We u...

Updated 10 months ago by Wout Slakhorst

Obtaining credentials

Basics

After you created a subject with some DID documents, it's time to give meaning to these identifie...

Updated 10 months ago by Wout Slakhorst

Use Case Activation / Discoverability

Implementing a Nuts Use Case

After configuring the Nuts node with the required artifacts, the use case can be activated for a ...

Updated 10 months ago by Wout Slakhorst

AuthN using Verifiable Credentials

Designing a Nuts Use Case Authorization

To successfully negotiate an OAuth2 access token, the token issuer (OAuth2 Authorization Server) ...

Updated 10 months ago by Wout Slakhorst

OAuth2 Scopes and Presentation Definition Mapping

Designing a Nuts Use Case Authorization

Scope design When designing a system that uses OAuth2, you have to decide how scopes map to resou...

Updated 10 months ago by Wout Slakhorst

Credential Trust

Designing a Nuts Use Case Authorization

Authentication on Nuts heavily depends on trusted credential issuers: any attribute, revelant to ...

Updated 10 months ago by Rein Krul

OAuth2 Flows and Wallets

Designing a Nuts Use Case Authorization

Nuts supports a custom OAuth2 flows for acquiring an access token: the service-to-service flow. S...

Updated 10 months ago by Wout Slakhorst

Nuts Node Configuration

Implementing a Nuts Use Case

A use case writer supplements you with a number of artifacts, that need to be configured: Servic...

Updated 11 months ago by Rein Krul

Access Policy (TODO)

Designing a Nuts Use Case Authorization

Anti-patterns Bad: "Clients can access /Observation, but the FHIR server has to limit it to /Ob...

Updated 11 months ago by Rein Krul