Similar to the approach outlined above, but instead of using a simple JSON-LD document containing a proof section, a JWT is used. An example as given by the spec (example 30):
The Verifiable presentation is represented as a linked data document, associated with the vp key of the JWT
Keys one would normally find in the JSON-LD document are replaced (where possible) with JWT keys, e.g. iss (issuer), jti (id), exp (expirationDate). The full list of claim names that MUST be used is listed in the specification.
The header section of the JWT would look as follows:
Similar to the approach outlined above, but instead of using a simple JSON-LD document containing a proof section, a JWT is used. An example as given by the spec (example 30):
The Verifiable presentation is represented as a linked data document, associated with the
vp
key of the JWTKeys one would normally find in the JSON-LD document are replaced (where possible) with JWT keys, e.g.
iss
(issuer),jti
(id),exp
(expirationDate). The full list of claim names that MUST be used is listed in the specification.The header section of the JWT would look as follows: