Skip to main content

Recently Updated Pages

Applicatie architectuur

Samenwerken Huisarts en Thuiszorg

In het volgende diagram zien we de benodigde applicatie-rollen voor Attributen Based Access Contr...

Updated 11 months ago by Steven van der Vegt

Use case migration

v5 -> v6 migration guide

Together with V6 comes a new understanding of how data exchange should be secured across organiza...

Updated 1 year ago by Wout Slakhorst

UZI Certificate Credential

Authenticatie

Abstract This proposal describes a method for issuing Verifiable Credentials by leveraging the ex...

Updated 1 year ago by Steven van der Vegt

Downgrade

v5 -> v6 migration guide

It's possible to downgrade an v6.0.0 node back to v5.4.x. You'll also need to reset your configur...

Updated 1 year ago by Wout Slakhorst

Configuration update

v5 -> v6 migration guide

When updating your node from V5 to V6, you can choose to disable/enable certain parts depending o...

Updated 1 year ago by Wout Slakhorst

V6 configuration without V5 features

Cookbook

The configuration below show a minimal nuts.json config file: did:nuts disabled, did:web enable...

Updated 1 year ago by Gerard Snaauw

Service Discovery

Designing a Nuts Use Case

A party often exchanges data through its API endpoints. If a client only has the party's name or ...

Updated 1 year ago by Wout Slakhorst

Autorisatie en toestemmingen

Autorisatie

Op de vorige pagina is te lezen wat een autorisatie volgens Nuts precies is. Toch zien we dat er ...

Updated 1 year ago by Wout Slakhorst

Autorisaties volgens Nuts

Autorisatie

Om gegevens te kunnen uitwisselen zullen twee (computer) systemen moeten samenwerken. Het bronsys...

Updated 1 year ago by Wout Slakhorst

Agenda's en verslagen

Actiz architectuurwerkgroep

Google doc

Updated 1 year ago by Jorrit Spee

Referentie & solution architectuur (WIP)

SSIBAC

Nuts SSIBAC Een solution architectuur voor het implementeren van ABAC gebasseerd op attributen ve...

Updated 1 year ago by Wout Slakhorst

Authentication & authorization

Basics

When a request comes in at your resource endpoint, an access token should be available in the HTT...

Updated 1 year ago by Wout Slakhorst

Access tokens

Basics

After finding a service endpoint to interact with, it's time to request an access token. You can ...

Updated 1 year ago by Wout Slakhorst

Service search

Basics

You can find participants of a use case via their registered services. A use case defines the ser...

Updated 1 year ago by Wout Slakhorst

Service activation

Basics

Before another party can interact with you, they will first need to find your endpoints. The disc...

Updated 1 year ago by Wout Slakhorst

Subject registration

Basics

The first thing you need to do is create some public/private key material for your subjects. We u...

Updated 1 year ago by Wout Slakhorst

Obtaining credentials

Basics

After you created a subject with some DID documents, it's time to give meaning to these identifie...

Updated 1 year ago by Wout Slakhorst

Use Case Activation / Discoverability

Implementing a Nuts Use Case (OLD)

After configuring the Nuts node with the required artifacts, the use case can be activated for a ...

Updated 1 year ago by Wout Slakhorst

AuthN using Verifiable Credentials

Designing a Nuts Use Case Authorization

To successfully negotiate an OAuth2 access token, the token issuer (OAuth2 Authorization Server) ...

Updated 1 year ago by Wout Slakhorst

OAuth2 Scopes and Presentation Definition Mapping

Designing a Nuts Use Case Authorization

Scope design When designing a system that uses OAuth2, you have to decide how scopes map to resou...

Updated 1 year ago by Wout Slakhorst