Verification / Presentations
Last updated
Last updated
Pre-Readings: Verifiable Attestations
Putting it all together, you now need to present the attestation to a verifier when it is needed to be checked.
Presentations
Presentations are done with the proof interface which should give the verifier everything they need to check everything. We recommend leveraging our authentication flow (Sign In with BitBadges) and claims (BitBadges Claims) to be used in conjunction with proof verification / presentation.
Sign In with BitBadges: Proofs / attestations that are stored in the user's BitBadges account can be revealed / passed along to the authentication provider (the verifier) within the sign-in flow.
BitBadges Claims: Create a custom plugin or webhook that accepts and verifies attestation(s) from the claiming user when they attempt to claim.
These flows natively have protective measures against replay attacks, time windows for verification, and more.
All attestations should be verified on your end as well. Treat BitBadges as an untrusted middleman. Don't trust, verify!
For any non-BitBadges schemes, we do not maintain any message schemas, verifying integrity, etc. This should all be handled on your end.
Verification
Once received, the verifier can then check whatever is needed according to the agreed approach:
Verifying signatures
Verifying on-chain anchors / timestamps
Content is well-formed
Additionally, you should consider:
If a malicious party gets a cryptographic signature, the signature will still be the same and valid. Thus, it is important to protect against replay attacks, man in the middle attacks, and verify any address ownership as needed. Thus, verification is typically a two-step approach, 1) verify the credential and 2) verify the address of the recipient.
While the attestation / proof itself can prove the issuer signed the data, it has nothing natively about the holder or presenter. This also needs to be verified.
The verifier also needs to check the content of the attestation messages and any other app-specific criteria. A valid signature means nothing if the mesage content is not as expected.