How Do Verifiable Credentials and Decentralized Identities Work?

In the current landscape, users’ identities and interactions are owned and controlled by other parties. Decentralized identity (DID) is a way for users to own their identity, using specific credentials to verify their identity to applications. These credentials, called Verifiable Credentials, enable you to do this. Verifiable Credentials are identity attestations that come from a trusted issuer, like proof of a workplace, student IDs, or official memberships.

For individuals, DID can increase peace of mind and privacy by giving them control over their own digital identity. For organizations, DID reduces risk, simplifies audits, and improves digital interactions with their users.

View the Recording

In this webinar recording, Oxford Computer Group Principal Consultant Randy Robb covers:

  • What is decentralized identity?
  • What is a verifiable credential?
  • How do they work?
  • Examples for using verifiable credentials
  • How do they relate to the recently announced new family of products, Microsoft Entra?

Randy also demos a working application that demonstrates usage of decentralized identity with verifiable credentials using Azure AD and Azure AD B2C.

How do Verifiable Credentials and  Decentralized Identity Work? View the recording