between Organizations, Customers and Workforces
This is a mobile application that is available on both Apple iOS and Android mobile devices. It includes a mobile agent that can connect to cloud agents, and a user interface to allow the wallet holder to make connections, accept credentials, and present credentials for proof requests.
Store personal credentials using our edge mobile wallet solutions.
- Store organization-related credentials in our organizational cloud wallet solutions.
- Maintain high-levels of assurance around identities through integrated ID proofing solutions.
This is an Aries cloud agent and controller that can create and issue verifiable credentials. It has the ability to create invitations to holders to connect and to track the status of connection invites and credential offers. The issuer has a web interface to provide users with the controls for handling connections and credentials.
Enable your organization to become an issuer of portable & re-usable W3C-standard Verifiable Credentials.
- Build governance rules around the issuance of credentials.
- Leverage existing workflows to issue KYC & KYB credentials to your network.
This is an Aries cloud agent and controller that can create proof templates and initiate proof requests. It has the ability to create invitations to holders to connect and to track the status of connection invites and proof requests. The verifier has a web interface to provide users with the controls to handle connections and credential verification.
Enable your organization to start consuming verifiable credentials within existing business processes.
- Provision custom authentication, access or verification workflows.
- Quickly embed credential proof requests into your existing IT infrastructure.
This server application is used to provision new issuer and verifiers. It handles the process to invite, authorize and orchestrate the cloud containers for each issuer and verifier on the platform.
Become a trust network operator by using our provisioning system to deploy your network.
- Design your network governance rules.
- Onboard organizations and authorized identity attesters.
Our Self-Sovereign Identity solutions are built using emerging data standards, Government approved technologies and worldclass governance frameworks and tools.
Check out our Accelerated Development Program.
Quickly and cost effectively go-to-market with your Self-Sovereign Identity strategy.
Use proven SSI solutions to quickly enable your ecosystem to begin issuing and consuming authentic data.
Looking to control your user experience but still leverage proven SSI capabilities? Contact us to discuss how we can provide you with API access.