System design
Components and Flows of the idOS Network
The Core: Private Decentralized Storage Network
idOS is composed of a dStorage Network of Nodes, secured by the building partners as the initial node providers, and designed specifically to manage identity data compliance and security needs, and an Access Management Protocol, giving self-sovereign control to users of their own data, and allowing them to interact with applications across the whole web3 space.
The Integrations: SDKs, Enclave and the idOS Isle
In order to efficiently integrate idOS into existing applications, we are providing targeted SDKs that are targeted for each given use-case. In addition to a base SDK, the idOS provides both an Issuer and Consumer SDKs that enable a seamless integration for entities writing new data into the idOS or consuming existing data via access grants.
The idOS Enclave is an standardized interface that facilitates the encryption and decryption of user credentials. idOS provides a default web-based enclave that allows for the cryptographic integration via user-secret (e.g. passwords), passkeys or secure MPC protected network persistence and restoration. Furthermore, the Enclave can be implemented directly in 3rd party wallets that would like to support encryption and decryption natively.
The idOS Isle is a hosted iFrame component that enables an efficient default UI/UX integration of user-flows into existing web-based applications. It allows for an "one-line" integration to enable idOS user-flows within any 3rd-party application. However, if required, applications can always implement their own custom user journeys directly on top of our SDKs.
The Apps: Dashboard, Network Explorer
Lastly, the idOS Ecosystem consists of several applications, specifically:
The idOS Dashboard for Users, Issuers and Consumers
Technical Network Explorers (Coming soon)
The idOS Dashboard enable specific roles in the ecosystem to directly visualize and interact with core idOS funtionalities. For example, users are able to add additional wallets across chains to their profile, issuers are able to inspect and revoke issued credentials while data consumers get an overview of their existing Access Grants to user data.
Last updated