Skip to main content

Recently Updated Pages

Downgrade

v5 -> v6 migration guide

It's possible to downgrade an v6.0.0 node back to v5.4.x. You'll also need to reset your configur...

Updated 11 months ago by Wout Slakhorst

Configuration update

v5 -> v6 migration guide

When updating your node from V5 to V6, you can choose to disable/enable certain parts depending o...

Updated 11 months ago by Wout Slakhorst

V6 configuration without V5 features

Cookbook

The configuration below show a minimal nuts.json config file: did:nuts disabled, did:web enable...

Updated 11 months ago by Gerard Snaauw

Service Discovery

Designing a Nuts Use Case

A party often exchanges data through its API endpoints. If a client only has the party's name or ...

Updated 11 months ago by Wout Slakhorst

Autorisatie en toestemmingen

Autorisatie

Op de vorige pagina is te lezen wat een autorisatie volgens Nuts precies is. Toch zien we dat er ...

Updated 11 months ago by Wout Slakhorst

Autorisaties volgens Nuts

Autorisatie

Om gegevens te kunnen uitwisselen zullen twee (computer) systemen moeten samenwerken. Het bronsys...

Updated 11 months ago by Wout Slakhorst

Agenda's en verslagen

Actiz architectuurwerkgroep

Google doc

Updated 11 months ago by Jorrit Spee

Referentie & solution architectuur (WIP)

SSIBAC

Nuts SSIBAC Een solution architectuur voor het implementeren van ABAC gebasseerd op attributen ve...

Updated 1 year ago by Wout Slakhorst

Authentication & authorization

Basics

When a request comes in at your resource endpoint, an access token should be available in the HTT...

Updated 1 year ago by Wout Slakhorst

Access tokens

Basics

After finding a service endpoint to interact with, it's time to request an access token. You can ...

Updated 1 year ago by Wout Slakhorst

Service search

Basics

You can find participants of a use case via their registered services. A use case defines the ser...

Updated 1 year ago by Wout Slakhorst

Service activation

Basics

Before another party can interact with you, they will first need to find your endpoints. The disc...

Updated 1 year ago by Wout Slakhorst

Subject registration

Basics

The first thing you need to do is create some public/private key material for your subjects. We u...

Updated 1 year ago by Wout Slakhorst

Obtaining credentials

Basics

After you created a subject with some DID documents, it's time to give meaning to these identifie...

Updated 1 year ago by Wout Slakhorst

Use Case Activation / Discoverability

Implementing a Nuts Use Case (OLD)

After configuring the Nuts node with the required artifacts, the use case can be activated for a ...

Updated 1 year ago by Wout Slakhorst

AuthN using Verifiable Credentials

Designing a Nuts Use Case Authorization

To successfully negotiate an OAuth2 access token, the token issuer (OAuth2 Authorization Server) ...

Updated 1 year ago by Wout Slakhorst

OAuth2 Scopes and Presentation Definition Mapping

Designing a Nuts Use Case Authorization

Scope design When designing a system that uses OAuth2, you have to decide how scopes map to resou...

Updated 1 year ago by Wout Slakhorst

Credential Trust

Designing a Nuts Use Case Authorization

Authentication on Nuts heavily depends on trusted credential issuers: any attribute, revelant to ...

Updated 1 year ago by Rein Krul

OAuth2 Flows and Wallets

Designing a Nuts Use Case Authorization

Nuts supports a custom OAuth2 flows for acquiring an access token: the service-to-service flow. S...

Updated 1 year ago by Wout Slakhorst

Nuts Node Configuration

Implementing a Nuts Use Case (OLD)

A use case writer supplements you with a number of artifacts, that need to be configured: Servic...

Updated 1 year ago by Rein Krul