LogoLogo
Back to All
  • TNG Identity user documentation
  • 📑INTRODUCTION
    • Introduction to TNG Identity
    • Why choose TNG Identity?
      • DID differentiators
    • How does TNG Identity work?
      • Data flows
      • Use cases and applications
    • Standards and regulations
    • Portal API
      • Overview
      • Getting Started
      • API Documentation
        • App
        • Auth
        • Mail
        • Organisation Profiles
        • User Profiles
        • PSP > Product Manager > Customer User Api Key
        • PSP > Product Manager > User Manager
  • 📄TNG Identity Issuers
    • What is an issuer?
    • How to become an issuer?
    • Operating an issuer
    • What do issuers do?
    • Issuer API
      • Overview
      • Getting Started
      • Examples
        • Issue an email credential
        • Revoke a claimed email credential
      • API Documentation
        • Info
        • Auth
        • Media
        • Credential Offer Claims
        • Credential Offer Collections
        • Credential Offers
        • Credential Templates
        • Claim
        • Agent
  • 📑TNG IDENTITY VERIFIER
    • What is a Verifier?
    • Operating a verifier
    • How to become a verifier?
    • Verifier API
      • Overview
      • Getting Started
      • Examples
        • Verify an email credential
      • API Documentation
        • Info
        • Auth
        • Verifiable Presentation
        • Agent
        • SIOP
        • Templates
  • 📄TNG IDENTITY WALLET
    • What is the wallet for?
    • How to receive a Verifiable Credential?
    • How to share a Verifiable Credential?
  • 📑Privacy and Security
    • Privacy and Security Measures: TNG Identity Services
    • Revocation and data deletion
  • 🗃️SELF-SOVEREIGN IDENTITY KNOWLEDGE
    • Self-Sovereign Identity
    • Actors
    • Decentralized vs Self-Sovereign Identity
    • Key Principles of Self-Sovereign Identity
    • Self-Sovereign Identity – Use Cases
    • Digital Trust
    • Some of the critical components of Self Sovereign Identity
      • Trust over IP
    • Some of the critical components of Decentralise ID
      • A Blockchain Tailored for Decentralized Identity
      • Decentralise Identifiers (DID)
      • Verifiable Credentials
      • Verifiable Presentations
  • 📑GLOSSARY
    • Glossary
  • 📄FAQs / HELP
    • Help & FAQs
      • What is a digital identity?
      • What is TNG Identity, and how does it work?
      • How is blockchain used in TNG Identity?
      • Compatible Blockchains for TNG Identity.
      • How can my business sign up for TNG Identity?
      • How is TNG Identity different to other identity solutions in the market?
      • Can TNG Identity communicate with other identity solutions?
      • What is TNG Identity doing with my data, and does it act as a data processor or controller?
      • What measures does TNG Identity take to protect user data?
      • What support is available for TNG Identity?
      • Can TNG Identity be integrated into our existing systems?
      • How can I get started with TNG Identity?
      • What countries is TNG Identity available in?
Powered by GitBook

Copyright © nChain Licensing AG 2024

On this page
  • Introduction
  • Key Features
  • When to use Verifier API
  1. TNG IDENTITY VERIFIER
  2. Verifier API

Overview

Introduction

The Verifier API is a REST API designed to validate the authenticity and integrity of verifiable credentials (VCs) issued by trusted entities. It plays a critical role in ecosystems where secure and efficient verification of credentials is required, such as identity management, digital certification, and secure access control.

A core concept in the relationship between the Issuer and Verifier APIs is the trust that must exist between these roles. While the information within a Verifiable Credential (VC) is cryptographically verifiable, this alone does not guarantee its accuracy. The Verifier relies on the Issuer being a trusted and reputable entity to confidently accept and validate the VCs it produces.

Key Features

  • Credential Validation: Confirm that credentials are cryptographically signed and adhere to established standards.

  • Revocation Status Checks: Ensure that credentials are valid and have not been revoked by the trusted issuer.

  • Real-Time Verification: Enable seamless, instant checks in time-sensitive workflows.

  • Integration Flexibility: Designed to work with wallets, credential management systems, or custom verification pipelines.

When to use Verifier API

  • Secure Identity Verification: Integrate real-time credential verification into your system to confirm the identity of users, ensuring the credentials presented are genuine and unaltered.

  • Fraud Detection and Prevention: Leverage the API to detect tampered or revoked credentials, preventing the use of invalid or fraudulent claims in your application.

  • Compliance and Audit: Ensure that credentials meet regulatory and organizational requirements by validating their structure, claims, and signatures.

PreviousVerifier APINextGetting Started

Last updated 6 months ago

📑