Understanding and Using Verifiable Credentials

Understanding and Using Verifiable Credentials

John Savill's Technical Training via YouTube Direct link

- What really matters!

18 of 27

18 of 27

- What really matters!

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Understanding and Using Verifiable Credentials

Automatically move to the next video in the Classroom when playback concludes

  1. 1 - Introduction
  2. 2 - Identity in the real world
  3. 3 - Identity with centralized identity
  4. 4 - Challenges today
  5. 5 - Me as my own identity provider
  6. 6 - Attestations from an issuer
  7. 7 - Trusts
  8. 8 - The need for proof
  9. 9 - How we prove things with computers
  10. 10 - How to know it’s the right public key for an entity
  11. 11 - Decentralized identifier DID
  12. 12 - Requirements for a DID
  13. 13 - Associating DID to public key
  14. 14 - Solution
  15. 15 - How do I rotate keys? DID document
  16. 16 - What is a DID and how is it working
  17. 17 - Methods
  18. 18 - What really matters!
  19. 19 - Why is the DID so ugly
  20. 20 - Verifiable credentials at last
  21. 21 - Issuer, holder and verifier all together
  22. 22 - Lets see this in action
  23. 23 - Using Microsoft Entra to issue and verify
  24. 24 - How to backup and recover if lose wallet
  25. 25 - Why do we care?
  26. 26 - Some considerations as responsibilities shift
  27. 27 - Closing thoughts

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.