From ac3a03f95e921042b56a59dfcbccd56af50553aa Mon Sep 17 00:00:00 2001
From: Coralie Mercier The centralized identity model is the typical scenario when the user logs in to a social network to use it, and the credentials here are used to authenticate. Here is the Data Flow: Authentication: The user authenticates themselves with the centralizdd system using their credentials. Access Granting: This system grants access to the resource. Access granting: This system grants access to the resource. Perspectives:<
@@ -672,18 +672,18 @@
Here is the simplified Data Flow:
Authentication: The user sends their credentials to the IdP to authenticate.
Obtaining Identity Assertions: The IdP then creates an identity assertion, a verifiable confirmation of the user’s identity.
+Obtaining identity assertions: The IdP then creates an identity assertion, a verifiable confirmation of the user’s identity.
Sending Identity Assertions: The user sends their identity assertion to the SP or RP.
+Sending identity assertions: The user sends their identity assertion to the SP or RP.
Trust and Access: The SP or the RP, trusting the IdP, accepts the Identity Assertion sent by the user and grants access.
+Trust and access: The SP or the RP, trusting the IdP, accepts the Identity Assertion sent by the user and grants access.
Perspectives:
Instead, it involves a new set of actors and dynamics, described in the W3C Verifiable Credentials Data Model (VCDM) [vc-data-model-2.0]:
The VCDM defines two basic concepts: the Verifiable Credentials and the Verifiable Presentation.