Skip to content

Commit 37adc0c

Browse files
committed
fix: Readme images/cleanups
1 parent 96ab8bb commit 37adc0c

2 files changed

Lines changed: 43 additions & 25 deletions

File tree

README.md

Lines changed: 37 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -1,33 +1,36 @@
11
<h2 style="text-align: center; vertical-align: middle">
22
<center><a href="https://www.sphereon.com"><img src="https://sphereon.com/content/themes/sphereon/assets/img/logo.svg" alt="Sphereon" width="320" style="vertical-align: middle" ></a></center>
33

4-
<br>OID4VC Issuer and Verifier Demo
4+
<br>Configurable OID4VC Issuer and Verifier Demo with branding support
55
<br>
66
<br>
77
</h2>
88

9-
#### This is a demo to showcase our OpenID for Verifiable Credentials libraries and components.
9+
#### This is a fully configurable demo to showcase our OpenID for Verifiable Credentials libraries and components.
1010

11-
**Please note that this is not intended as production code. It is a relative simple implementation to show how the
12-
OID4VC technologies, SIOPv2 (peer to peer authentication), OID4VP (Verification), OID4VCI (Issuance) end Presentation
13-
Exchange (requirements by verifiers) work.**
11+
It shows how OID4VC technologies, like SIOPv2 (peer to peer authentication), OID4VP (Verification), OID4VCI (Issuance)
12+
end Presentation
13+
Exchange (requirements by verifiers) work. You can create your own screen sequences, branding and credential types.
14+
15+
**Please note that this is a demo and not intended as production code.**
16+
17+
<img src="resources/issuer-demo-intro.png" width="500"/>
1418

1519
## Overview
1620

17-
In this document we're going to show you step by step what you have to do to set your own VCI demo up.
21+
In this document we're going to show you step by step what you have to do to setup your own VCI demo.
1822

19-
The demo consists of 3 components, which can be found in the packages folder.
23+
The demo consists of 2 components, which can be found in the packages folder.
2024

2125
- The agent using our [SSI-SDK](https://github.com/Sphereon-OpenSource/SSI-SDK), responsible for key-management, DIDs,
2226
Presentation Exchange storage, Issuer Metadata Storage, as well as
2327
actual issuance and verification of Credentials. It can handle multiple issuer configurations as well as
2428
Verifiers/Presentation definitions at the same time, although the frontends only will use one
25-
- A Demo Issuer frontend, allowing you to fill out a simple form, or using a wallet, to supply some information, which
26-
then will be used to issue a credential containing that information. This code can be exported and run on a regular
29+
- A Demo frontend, allowing you to fill out simple form(s), or using a wallet, to supply some information, which
30+
then will be used to issue a credential containing that information. The screens are configurable and you can create
31+
your own sequences. You can also change the look and feel and thus apply branding. This code can be exported and run
32+
on a regular
2733
webserver if you want. It is a frontend communicating with the agent, using some of our OID4VC SSI-SDK plugins.
28-
- A Demo Verifier frontend, allowing you to verify the Credential issued by the agent (the demo issuer, also contains
29-
similar functionality if you would follow the wallet flow btw). Be aware that we will replace this demo frontend with
30-
something a bit more appealing soon.
3134

3235
The Demo is using code from our [SSI-SDK](https://github.com/Sphereon-OpenSource/SSI-SDK), providing 11 modules for
3336
OID4VC, QR code generation, as well as Issuance branding. Integrating these technologies with a Key Management System,
@@ -45,20 +48,24 @@ The most prominent low-level libraries are:
4548
## Wallet Prerequisites
4649

4750
You will need an OID4VC capable wallet, that supports SIOPv2, OID4VP, OID4VCI and Presentation Exchange. You can use our
48-
Open-Source wallet from the stores. You can see our [Wallet demo instructions](https://sphereon.com/sphereon-products/sphereon-wallet/sphereon-wallet-demo-instructions/)
51+
Open-Source wallet from the stores. You can see
52+
our [Wallet demo instructions](https://sphereon.com/sphereon-products/sphereon-wallet/sphereon-wallet-demo-instructions/)
4953
Here is a list of wallet's with above-mentioned capabilities:
54+
5055
- [Sphereon](https://github.com/Sphereon-Opensource/ssi-mobile-wallet)
51-
- [Animo](https://github.com/animo/paradym-wallet)
56+
- [Animo (Paradym)](https://github.com/animo/paradym-wallet)
5257

53-
A scenario for fetching a credential. Note that since the process is dynamic, your setup might be a little different, but the main parts will stay the same.
58+
A scenario for fetching a credential. Note that since the process is dynamic, your setup might be a little different,
59+
but the main parts will stay the same.
5460

55-
//TODO: when merged, change the address
56-
![To fetch a credential](./documents/vci-flow.puml)
61+
![To fetch a credential](http://www.plantuml.com/plantuml/proxy?cache=no&src=https://raw.githubusercontent.com/Sphereon-Opensource/OID4VC-demo/develop/documents/vci-flow.puml)
5762

5863
And a scenario for using Verifiable Credential(s) For OID4VP flow:
59-
![OID4VP flow](./documents/oid4vp-flow.puml)
64+
![OID4VP flow](http://www.plantuml.com/plantuml/proxy?cache=no&src=https://raw.githubusercontent.com/Sphereon-Opensource/OID4VC-demo/develop/documents/oid4vp-flow.puml)
6065

61-
In the next chapters we're going to show you how to setup the `agent` module, oid4vci-demo-front-end and a brief introduction on how credential branding actually works.
66+
# Step by Step instructions
67+
In the next chapters we're going to show you how to setup the `agent` module, oid4vci-demo-front-end and a brief
68+
introduction on how credential branding actually works.
6269

6370
- [Setting up the agent](./documents/agent-setup.md)
6471
- [Setting up VCI frontend](./documents/vci-front-end.md)
@@ -73,15 +80,21 @@ docker-compose build
7380
docker-compose up
7481
```
7582

76-
The build phase might take a few minutes. If you run the docker-compose up command 3 services will be running. The ssi-agent, oid4vci-demo-frontend and oid4vp-frontend.
83+
The build phase might take a few minutes. If you run the docker-compose up command 3 services will be running. The
84+
ssi-agent, oid4vci-demo-frontend and oid4vp-frontend.
7785

78-
You should now be able to go to http://host.docker.internal:5001 and http://host.docker.internal:5002 respectively to test the issuer and verifier demo's.
86+
You should now be able to go to http://host.docker.internal:5001 and http://host.docker.internal:5002 respectively to
87+
test the issuer and verifier demo's.
7988

80-
Please note that you might have to configure your docker environment to expose the host.docker.internal like the image below. If you cannot make that work you could adjust the config/docker and docker/*.env files to suit your needs
89+
Please note that you might have to configure your docker environment to expose the host.docker.internal like the image
90+
below. If you cannot make that work you could adjust the config/docker and docker/*.env files to suit your needs
8191

8292
<img src="resources/docker_settings.png" width="500" />
8393

8494
#### Environment variables and configuration for docker.
85-
Please note that the environment variables for the 3 images come from the ./docker folder. You will have to copy the 3 example files and remove the .example suffix.
8695

87-
The configuration files are copied over to the agent image. So the above explained configuration options also apply when running in docker.
96+
Please note that the environment variables for the 3 images come from the ./docker folder. You will have to copy the 3
97+
example files and remove the .example suffix.
98+
99+
The configuration files are copied over to the agent image. So the above explained configuration options also apply when
100+
running in docker.

documents/credential-branding.md

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,11 @@
1919

2020
Credential branding is an essential aspect of Verifiable Credentials (VCs) that helps define how a credential is displayed and identified to end-users. It plays a crucial role in creating a user-friendly and consistent experience for individuals who interact with verifiable credentials. In this explanation, we give you a detailed account of the concept of credential branding as defined in the [Verifiable Credentials Issuance (VCI) spec](https://openid.net/specs/openid-4-verifiable-credential-issuance-1_0.html) specification.
2121

22+
An example of a branded credential in the Sphereon wallet:
23+
24+
<img src="../resources/Wallet_Credential_offer.jpg" alt="Wallet credential offer" width="300px"/>
25+
26+
2227
## Definition and Purpose
2328

2429
In the context of VCs, "Credential Branding" refers to the visual and descriptive attributes associated with a credential, including its name, logo, background color, and more. These attributes are defined in the metadata of the credential issuer and are used to present the credential in a consistent and nice way to the credential holder or verifier.
@@ -86,4 +91,4 @@ Beyond names and claim labels, other optional branding elements can be locale-ad
8691
- `description`: Offer a localized description of the credential.
8792
- `background_color` and `text_color`: Set locale-specific colors for the credential's background and text, ensuring that the visual presentation aligns with the language and regional norms.
8893

89-
By utilizing these customizable display options, you can enhance the user experience with a display that is both visually and linguistically tailored to requirements of your user. Read more details in the [OID4VCI specification](https://openid.net/specs/openid-4-verifiable-credential-issuance-1_0.html#section-10.2.3.1-2.5.1).
94+
By utilizing these customizable display options, you can enhance the user experience with a display that is both visually and linguistically tailored to requirements of your user. Read more details in the [OID4VCI specification](https://openid.net/specs/openid-4-verifiable-credential-issuance-1_0.html#section-10.2.3.1-2.5.1).

0 commit comments

Comments
 (0)