diff --git a/index.html b/index.html index a40e140..f5b26cd 100644 --- a/index.html +++ b/index.html @@ -644,14 +644,14 @@
The centralized identity model is the typical scenario when the user logs in to a social network to use it, and the credentials here are used to authenticate.
Here is the Data Flow:
Authentication: The user authenticates themselves with the centralizdd system using their credentials.
Access Granting: This system grants access to the resource.
+Access granting: This system grants access to the resource.
Perspectives:
Here is the simplified Data Flow:
Authentication: The user sends their credentials to the IdP to authenticate.
Obtaining Identity Assertions: The IdP then creates an identity assertion, a verifiable confirmation of the user’s identity.
+Obtaining identity assertions: The IdP then creates an identity assertion, a verifiable confirmation of the user’s identity.
Sending Identity Assertions: The user sends their identity assertion to the SP or RP.
+Sending identity assertions: The user sends their identity assertion to the SP or RP.
Trust and Access: The SP or the RP, trusting the IdP, accepts the Identity Assertion sent by the user and grants access.
+Trust and access: The SP or the RP, trusting the IdP, accepts the Identity Assertion sent by the user and grants access.
Perspectives:
Instead, it involves a new set of actors and dynamics, described in the W3C Verifiable Credentials Data Model (VCDM) [vc-data-model-2.0]:
The VCDM defines two basic concepts: the Verifiable Credentials and the Verifiable Presentation.