Skip links

React Config

{
“localStorageKeys”: {
“authenticatedKey”: “authenticated”,
“authenticatedUserKey”: “authenticatedUser”,
“authenticatedCredentialKey”: “authenticatedCredential”
},
“voConfigs”: {
“presentationTypes”: “VerifiableCredential”,
“contractIds”: “23D0311D-C1A4-4824-8921-FB53F1E4FC5C,8CF50CC2-2CE9-4D7E-90CA-BD1C2BA0C982”,
“voApiUrl”: “https://partner.api.verifiedorchestration.com/graphql”,
“secureBackendUrl”: “https://www.verifiedorchestration.com/api/”,
“guestContractId”: “8CF50CC2-2CE9-4D7E-90CA-BD1C2BA0C982”
},
“pageRoutes”: {
“issuance”: “/issuance”,
“verify”: “/verify”,
“presentation”: “/presentation”,
“registration”: “/registration”,
“apps”: “/apps”
},
“plugins”: {
“gravityForms”: {
“consumerKey”: “ck_113386a9cd701bf08e1fb4d088bd83c08c69546b”,
“consumerSecret”: “cs_ab1203fc13aee44911b49c1a0275f6ea986d4516”,
“verifyEmailFieldID”: 6,
“emailFieldID”: 2,
“firstNameFieldID”: 1.3,
“lastNameFieldID”: 1.6
}
},
“issuanceView”: [
{
“key”: “whitepaper”,
“isPublished”: true,
“order”: 1,
“content”: {
“main”: {
“title”: “Whitepaper”,
“subtitle”: “Get the techincal documentation about Verified Orchestration here.”
},
“sub”: {
“title”: “Unlock the best of Microsoft”,
“description”: “Built on Microsoft and enabling Microsoft Entra Verified ID Verified Orchestration is modern, supported, and enterprise grade software. We unlock the full benefits of your Microsoft technology stack; no bespoke code required.”
},
“primaryAction”: {
“title”: “Download”,
“href”: “https://www.verifiedorchestration.com/wp-content/uploads/2024/08/Back-to-the-future_Verified-Orchestration-White-Paper_June-2024.pdf”,
“extra”: {
“filename”: “Back-to-the-future_Verified-Orchestration-White-Paper_June-2024.pdf”
}
}
}
}
],
“appsView”: [
{
“key”: “whitepaper”,
“isPublished”: true,
“order”: 1,
“content”: {
“main”: {
“title”: “Back to the future”,
“subtitle”: “”
},
“sub”: {
“title”: “Revolutionising Digital ID with new technology and centuries old governance”,
“description”: “At last, the many nuanced ways in which we prove things about ourselves online can mirror the familiar processes that have organised and governed real world credentials for hundreds of years. In the age of AI, this technological advancement is more important than ever. Download our White Paper to find out how we can secure your organisation, employees, students and members. “
},
“primaryAction”: {
“title”: “Download”,
“href”: “https://www.verifiedorchestration.com/wp-content/uploads/2024/08/Back-to-the-future_Verified-Orchestration-White-Paper_June-2024.pdf”,
“extra”: {
“filename”: “Back-to-the-future_Verified-Orchestration-White-Paper_June-2024.pdf”
}
}
}
},
{
“key”: “issueOnce”,
“isPublished”: true,
“order”: 2,
“content”: {
“main”: {
“title”: “Issue once, use everywhere”,
“subtitle”: “Experience our technology by self-issuing a verifiable credential, customised to your context”,
“description”: [
“We believe technology should be experienced by users and technologists. In this spirit, we have enabled self-serve issuance of verifiable credentials to your Microsoft Authenticator application”,
“We enable verifiable credential technology with you. Our technology enables your organisation to issue, manage, revoke and integrate this technology natively, contextualised to your specific stakeholder and organisational needs”
]
},
“credentialItems”: [
{
“key”: “customer_id”,
“credentialId”: “CDC60AF8-CF7A-4540-80D7-97D4B4D405DE”
},
{
“key”: “student_id”,
“credentialId”: “18E5EE45-9ECE-4A63-A008-BA3E27719634”
},
{
“key”: “qualification”,
“credentialId”: “55754482-8987-446D-834A-5C8A63F83D05”
},
{
“key”: “worker_id”,
“credentialId”: “DA84F31E-47BE-4F15-857C-29CB20831EA3”
},
{
“key”: “membership”,
“credentialId”: “C9D8E3C6-1820-44B1-BCED-5392DE21168B”
},
{
“key”: “gov_id”,
“credentialId”: “0C92DDEE-3D34-4E9D-A5B9-2994FAEB7D39”
}
]
}
},
{
“key”: “presentationDemo”,
“isPublished”: true,
“order”: 3,
“content”: {
“main”: {
“title”: “Authorise any workflow”,
“subtitle”: “Transform how you verify identity within any context”,
“description”: [
“By allowing individuals to use secure, tamper-proof credentials, verifiable credentials can reduce both reduce fraud, enhance privacy and improve workflow efficiency”,
“In this demo, experience how verifiable credentials are used, contextualised to your users, organisation or industry. You can select one or more credentials to be presented. We can integrate to whichever context you require, from authentication to authorisation”
]
},
“credentialItems”: [
{
“key”: “customer_id”,
“credentialId”: “CDC60AF8-CF7A-4540-80D7-97D4B4D405DE”
},
{
“key”: “student_id”,
“credentialId”: “18E5EE45-9ECE-4A63-A008-BA3E27719634”
},
{
“key”: “qualification”,
“credentialId”: “55754482-8987-446D-834A-5C8A63F83D05”
},
{
“key”: “worker_id”,
“credentialId”: “DA84F31E-47BE-4F15-857C-29CB20831EA3”
},
{
“key”: “membership”,
“credentialId”: “C9D8E3C6-1820-44B1-BCED-5392DE21168B”
},
{
“key”: “gov_id”,
“credentialId”: “0C92DDEE-3D34-4E9D-A5B9-2994FAEB7D39”
}
]
}
},
{
“key”: “impersonation”,
“isPublished”: true,
“order”: 4,
“content”: {
“main”: {
“title”: “Using verifiable credentials in common use cases”,
“subtitle”: “Eliminate impersonation fraud in banking”,
“description”: [
“The advance of generative AI is shaking our sense of what’s true and what’s not, now that so much of our time is spent online. Convincing deep fakes of targeted individuals are being used to misappropriate creative works and to spoof biometric security systems. Verifiable Credentials are part of the solution. As the former head of the U.S. National Strategy for Trusted Identities in Cyberspace, Jeremy Grant recently said, ‘one thing AI does not know how to defeat is public key cryptography’.”
],
“backgroundImage”: “https://www.verifiedorchestration.com/wp-content/uploads/2024/08/retailbankvodemo.png”
},
“sub”: {
“title”: “”,
“description”: “”
}
}
}
]
}

Leave a comment