.. | ||
companies.md | ||
microsoft.md | ||
README.md | ||
winners.md |
Companies
- Microsoft - Azure / Entra
- EU SSI Startups
- GATTCA
- MyDex
- MeeCo
- JoloCom
- ValidatedID
- Bloqzone
- Procivis
- US SSI Startups
- DocK
- Anonoyome
- GlboalID
- Hyland
- Magic
- IDRamp
- Indicio
- UNUM
- Animo
- Liquid Avatar
- Hedera
- IOTA
- Trinsic
- Transmute
- Spruce
- Disco.xyz
- Asia SSI Startups
- Afinidi
- ZADA
- Mattr
- Dihway
- Ayanworks
- NewLogic
- Africa SSI Startups
- FlexID
- Diwala
- Acquisitions
- Avast-Evernym-SecureKey
- Analyst Firms
- KuppingerCole
- Forrester
- Gartner
- Apple
- IAM Industry
- Ping
- Okta
- Auth0
- ForgeRock
- IDENTOS
Bloom
- Bloom Attestation Service migrating to Verifiable Credentials Bloom
To transition fully to the W3C VC standard, Bloom decided to deprecate the proprietary attestation format and adopt the new open VC standard. The transition will fulfill the vision of giving Bloom users complete, secure control of their private data, while allowing interoperability with the rest of the VC ecosystem.
Applied Recognition
Exostar
- Exostar Receives Kantara Initiative’s Identity Assurance Trust Framework Certification - Latest Recognition Further Demonstrates Company Protects Customers’ Identity and Personal Data by Complying with NIST 800-63 Standard
“This is a significant achievement and market differentiator for Exostar. The Kantara assessment and review process is rigorous and approval demonstrates a company’s care and respect for its customers.”
Mattr
If you’re already using a secure mechanism to authenticate your users, then setting up OIDC capability isn’t necessary. As we’ve explored, sending credentials using secure DID messaging directly or via a QR code or deep-link is safe, convenient and allows users to obtain their credentials directly.
Northern Block
- How to Create New Verifiable Credentials with Customizable Schemas
In this video, we will demonstrate how to create new Verifiable Credentials with custom schemas using the NB Orbit enterprise app.
Once the credential schema is created and the attribute fields specified, the enterprise user can then publish a credential definition to whatever root of trust they are using, in our case a Hyperledger Indy network.