...
Gliffy Diagram | ||||||||
---|---|---|---|---|---|---|---|---|
|
With this method the Verifier no longer trusts an IdP (something that is exposed on the public internet) but trusts the authentication and the possession to the wallet. Arguably, this provides the opportunity to a stronger level of assurance (i.e. two factors to the wallet+possession of the device).
Issuer: SAML attributes into IRMA tokens
...