Access control

Physical or logical

This use case scenario enables an organization to issue a claim to the identity of an individual defining the privileges or kind of accesses that are provided.

The recipient identity is able to generate a proof that he owns this specific claim and send to the validator party which will be able to see that the claim was issued. It's necessary that the validator knows in advance the identity of the expected issuer of the claim so it's a trusted identity.

 

Access Control