Commit 828b253f authored by Nikos Fotiou's avatar Nikos Fotiou
Browse files

Add structure to 'Solution Overview'

parent 08c6e44e
......@@ -26,5 +26,17 @@ capabilities-based access control, supports efficient VC revocation, and enables
access over public, untrusted networks, aka Zero -Trust Architectures (ZTAs).
## Solution overview
The following figure illustrates the modules of our solution
![ZeroTurstVC architecture](architecture.png "ZeroTurstVC architecture")
\ No newline at end of file
The following figure illustrates the modules of the ZeroTrustVC component.
![ZeroTurstVC architecture](architecture.png "ZeroTurstVC architecture")
A typical authorization flow in ZeroTrustVC includes the following steps
### Issuer configuration
with this step, a resource owner configures the authorization server with policies
that specify the access rights that correspond to a client. Clients are identified
using a public key (latter on this project we will consider cases where clients are
identified by a Decentralized Identifier).
### VC request and issuance
### Resource request
\ No newline at end of file
Markdown is supported
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment