Proof schemas
A proof schema defines which attributes a verifier requests from a credential holder. It specifies what information will be requested.
Proof schemas are built from attributes defined in credential schemas. Each requested attribute must first exist in a credential schema within the system. A proof schema can pull attributes from multiple credential schemas and is not restricted by credential formatβit can combine any number of attributes from any number of credential schemas within the organization.
Proof schemas cannot combine hardware- and software-based credentials.
Retrieve proof schemas
<strong>Permissions:</strong> <code>PROOF_SCHEMA_LIST</code>
Create proof schema
<strong>Permissions:</strong> <code>PROOF_SCHEMA_CREATE</code>
Retrieve proof schema
<strong>Permissions:</strong> <code>PROOF_SCHEMA_DETAIL</code>
Delete a proof schema
<strong>Permissions:</strong> <code>PROOF_SCHEMA_DELETE</code>
Share proof schema
<strong>Permissions:</strong> <code>PROOF_SCHEMA_SHARE</code>
Import proof schema
<strong>Permissions:</strong> <code>PROOF_SCHEMA_CREATE</code>