YoVDO

Understanding and Using Verifiable Credentials

Offered By: John Savill's Technical Training via YouTube

Tags

Decentralized Identity Courses Identity Management Courses Public Key Cryptography Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Dive into a comprehensive video lecture on decentralized identity and verifiable credentials. Explore the evolution of identity from real-world to centralized digital systems, and understand the challenges faced today. Learn about becoming your own identity provider, the concept of attestations, and the importance of trust and proof in digital identities. Discover the intricacies of decentralized identifiers (DIDs), including their requirements, association with public keys, and the role of DID documents. Examine various DID methods and their significance. Delve into verifiable credentials, understanding the interactions between issuers, holders, and verifiers. Witness practical demonstrations, including the use of Microsoft Entra for issuing and verifying credentials. Gain insights into wallet backup and recovery, the importance of this technology, and considerations as responsibilities shift in the digital identity landscape. Benefit from detailed explanations, real-world examples, and closing thoughts on the future of decentralized identity.

Syllabus

- Introduction
- Identity in the real world
- Identity with centralized identity
- Challenges today
- Me as my own identity provider
- Attestations from an issuer
- Trusts
- The need for proof
- How we prove things with computers
- How to know it’s the right public key for an entity
- Decentralized identifier DID
- Requirements for a DID
- Associating DID to public key
- Solution
- How do I rotate keys? DID document
- What is a DID and how is it working
- Methods
- What really matters!
- Why is the DID so ugly
- Verifiable credentials at last
- Issuer, holder and verifier all together
- Lets see this in action
- Using Microsoft Entra to issue and verify
- How to backup and recover if lose wallet
- Why do we care?
- Some considerations as responsibilities shift
- Closing thoughts


Taught by

John Savill's Technical Training

Related Courses

Office 365: Managing Identities and Services
Microsoft via edX
Windows 10 Features for a Mobile Workforce: Identity Management and Data Access
Microsoft via edX
Windows 10 pour l'entreprise
Microsoft Virtual Academy via OpenClassrooms
Introduction to Microsoft Azure
Microsoft via edX
Manage Office 365 Identities
Microsoft via edX