In immediately’s panorama, the momentum behind Web3 is obvious throughout varied industries. As we transfer into this new period, it is necessary to replace our instruments and strategies to match the altering setting. Throughout Web1, one of many key adjustments concerned utilizing authentication strategies to confirm customers on particular web sites for the primary time.
Web2 launched id suppliers, permitting customers to authenticate themselves utilizing their social accounts. Nevertheless, will this mannequin endure in a Web3 setting? Not fairly.
Enter Decentralized Identification, an indicator of Web3. This paradigm shift eliminates the reliance on central authorities for credential verification. As an alternative, customers have direct management over their credentials, deciding what data to share when proving their id. This elementary change empowers people, reworking the idea of digital id within the Web3 period.
The World Huge Internet Consortium (W3C) units the usual for these identities, offering detailed details about Decentralized Identifiers (DID), Verifiable Credentials (VC), and Verifiable Shows (VP). For additional insights, readers can consult with our earlier articles on Decentralized Identification:
This text goes past principle to discover the sensible facet, demonstrating how Decentralized Identification might be seamlessly built-in into present initiatives for efficient use.
We’ll showcase the method with the next steps:
Making a did:ethr DID.
Querying its standing on the Identification Registry inside the community.
Producing a Verifiable Credential.
Lastly, revoking the DID.
By these sensible examples, readers will achieve a deeper understanding of implementing Decentralized Identification in real-world eventualities.
Getting began
With the intention to simply obtain the Decentralized Identification in your software it’s essential be sure to have the next:
An Identification generator library for particular DID strategies, DID paperwork, Verifiable Credentials, Verifiable Shows, and on the similar time present the verification mechanism.
A registry that holds the Identities in a blockchain community.
A device that may generate the required key pairs for encryption to create the identifiers talked about earlier. This device must also allow interplay with the blockchain community talked about above.
For demonstrating this we are going to use the next tech stack:
SpruceID library for producing decentralized credentials.
The Ethereum Sepolia check community with ERC-1056 good contract which is able to signify the Identification Registry within the community.
Hyperledger Web3J to work together with the Identification Registry good contract and generate the Elliptic Curve SECP-256k1 key pair. SpruceID to create the credentials.
Setting Up the Surroundings
Generate a brand new Java venture. You possibly can accomplish this utilizing any well-liked IDE or generate it as a brand new HelloWorld software utilizing the Web3j-CLI. We advocate utilizing Gradle as a construct device for added duties, though Maven can be appropriate.
Combine SpruceID:
This library is written in Rust. To make use of it in our Java software, we’ll must construct it regionally. For this use the next tutorial for Java on the documentation web site.
The steps are:
git clone https://github.com/spruceid/ssi –recurse-submodules
git clone https://github.com/spruceid/didkit
cd didkit/
cargo construct
From DIDKit root listing generate the Java Native Interfaces for to can work together from Java with SpruceID Rust library
make -C lib ../goal/didkit.jar
6. From DIDKit root listing generate the entry level to the SpruceID Library which was constructed on the native machine.
Word: Please consult with the venture’s documentation to construct the library to your platform, libdidkit.so on UNIX-like methods, didkit.dll on Home windows, libdidkit.dylib on MacOS.
make -C lib ../goal/launch/libdidkit.so
Add the generated libs from 5 and 6 to the classpath.
Combine Web3J:
If the Java software was created utilizing Web3J-CLI, the Web3J Gradle plugin is mechanically included. If not, you will want so as to add it manually to the construct.gradle file, as described under:
plugins {
id(“org.web3j”) model “4.9.8”
}
Word: SpruceID will run solely on Java 11, as a consequence of this Web3J is specified with model 4.9.8.
Combine with Ethereum check community:
For this we are going to use the Ethereum Sepolia check community to deploy and work together with the good contract ERC-1056. As talked about above, we are going to use Web3J for the deployment and interplay with the good contract.
First Generate the contract wrapper:
Add the solidity file within the solidity folder beneath the primary module.
Run generateContractWrappers gradle process
Deploy the good contract to the Sepolia check community by executing the tutorial steps right here. Now every little thing is in place.
did:ethr
The did:ethr refers primarily to an Ethereum public tackle, which might be resolved to a DID doc utilizing a resolver entity. On this case, SpruceId gives a resolveDID methodology that can be utilized for this function.
For producing a brand new did:ethr we are going to execute the next code:
//the Sepolia community ID 11155111 in hex
String EVM_CHAIN_ID = 0xaa36a7
public String createEthrIdentity(Machine gadget) throws Exception {
ECKeyPair ecKeyPair = Keys.createEcKeyPair();
String privateKey = Numeric.toHexStringWithPrefix(ecKeyPair.getPrivateKey());
String tackle = Numeric.prependHexPrefix(Keys.getAddress(ecKeyPair));
String did = “did:ethr:” + EVM_CHAIN_ID + “:” + tackle;
return did;
}
The code above demonstrates how the Keys class from the Web3J utility module is used to generate the SECP-256k1 key pair for the brand new tackle. As soon as created, the brand new DID is shaped by combining the prefix with the brand new key.
Word: EVM_CHAIN_ID specifies which community the resolver ought to test to resolve the DID.
The ensuing DID ought to have the next format:
did:ethr:0xaa36a7:0x19e03255f667bdfd50a32722df860b1eeaf4d635
If we had generated the DID for Ethereum Mainnet, it could be:
did:ethr:0xaa36a7:0x19e03255f667bdfd50a32722df860b1eeaf4d635
Word: Bear in mind to retailer the personal key generated above for later use. You will have it when producing Verifiable credentials. As a finest follow, encrypt it with an RSA key and retailer it in a personal database till it’s wanted once more.
Examine possession
Even when the DID was created off-chain utilizing Hyperledger Web3J, it features on the community like every other SECP-256k1 tackle by default. Subsequently, there isn’t any must take any further steps so as to add it to the Identification Registry. The registry mechanically resolves all queries for newly generated did:ethr addresses as a result of they’re already related to their respective house owners.
public String checkOwner(String did) throws Exception {
Web3j web3j = Web3j.construct(new HttpService(NETWORK_RPC));
FastRawTransactionManager transactionManager = new FastRawTransactionManager(web3j, Credentials.create(id.getKeyUsed()), Numeric.toBigInt(DIDConstants.EVM_CHAIN_ID).longValue());
EthereumDIDRegistry registry = new EthereumDIDRegistry(REGISTRY_ADDRESS, web3j, transactionManager, new DefaultGasProvider());
String identityAddress = did.substring();
return registry.identityOwner(identityAddress).ship();
}
Within the above code, Hyperledger Web3J is querying the registry good contract to retrieve the proprietor of the present DID.
Word: the identityAddress is obtained by eradicating the DID prefix (did:ethr:EVM_CHAIN_ID), which represents the beforehand generated public tackle. If the proprietor was not beforehand set, the strategy ought to return the saved tackle worth as identityAddress by default. Which means that each account is the proprietor of its personal DID.
Generate Verifiable Credentials
As soon as the DID is generated and the proprietor’s personal secret is out there, entry to the Decentralized Identification House turns into potential. Verifiable Credentials (VCs) function digital representations of bodily IDs within the Web3 area. For additional understanding of their use case, please consult with the articles talked about within the introduction part.
To generate VCs, we are going to make the most of SpruceID and Hyperledger Web3J together with the personal key generated earlier.
public String issueVerifiableCredential(String did, KeyPair keys, DataObject knowledge){
last CredentialObject credential = new CredentialObject(did, did, knowledge);
last DIDKitOptions choices = new DIDKitOptions(PROOF_ASSERTION, id.getVerificationMethod(), null, null);
last String credentialJson = MAPPER.writeValueAsString(credential);
last String optionsJson = MAPPER.writeValueAsString(choices);
String jwk = generatePrivateJwk(keys);
last String verifiableCredential = DIDKit.issueCredential(credentialJson, optionsJson, jwk);
return verifiableCredential;
}
Within the above code, DIDKit is the JNI interface situated within the jar file that we added to the category path. It exposes the issueCredential methodology which receives the next arguments:
credentialJson = is the physique of the VC. Created from the CredentialObject, it contains the specified knowledge that should conform to the VC schema. Confer with the SpruceId instance for steering.
optionsJson = this refers to the kind of assertions that Verifiable Credential might want to help throughout verification requests;
jwk = is the Json Internet Key format of the did:ethr’s key pair. Technique generatePrivateJwk ought to include the Web3J code which returns the personal JWK, documentation right here.
As soon as SpruceID receives the issueCredential request it should begin to do the next:
Examine if credentialJson respects the VC schema talked about in @context;
Resolve the did:ethr with the intention to get the DID Doc to test the JWK that was despatched. Relying on the check community 2 choices can happen:
If the SpruceId library resolve methodology is suitable with the community, the DID shall be resolved.
If the library shouldn’t be suitable, the resolver must be overridden with this customized resolver.
You possibly can obtain this by cloning the repository and executing the npm command to start out the resolver occasion. After occasion begins, redirect the SpruceId calls by overriding the DIDKit resolve actions to the brand new resolver.
3. After finishing the primary two steps, the system returns the verifiable credential.
From right here, you should use it in verification calls, issuing new Verifiable Shows, and extra.
Revoke DID
A DID is revoked when its DID Doc can not be retrieved. For many DID strategies, this may be achieved by eradicating entry to it. Within the case of did:net, the entry URL to the DID doc is revoked. However what about did:ethrs when there’s an Identification Registry on the community?
On this case, revocation of the DID will consist of adjusting the proprietor tackle to 0x0. By doing this, we point out that solely the tackle 0x0 can use it. Nevertheless, as 0x0 shouldn’t be a sound tackle that can be utilized, the DID is successfully revoked.
registry.changeOwner(identityAddress,”0x0″).ship();
Hyperledger Web3J connects Decentralized Identification (DID) methods with Ethereum Digital Machine networks, offering important help for creating decentralized identities. Its interfaces make it simpler to work together with the EVM community and generate mandatory JWK keys for id creation processes, equivalent to these utilized in Spruce ID.