/
Key functionality

Key functionality

Content has been moved

This content has been moved. Please find the content here.


Related content

Governance
Read with this
Enable data exchange based on delegations - even between unknown parties
Enable data exchange based on delegations - even between unknown parties
Read with this
Facilitate flexible authorizations, applicable in any context
Facilitate flexible authorizations, applicable in any context
Read with this
Use case: M2M interaction (with fine-grained authorization)
Use case: M2M interaction (with fine-grained authorization)
Read with this
Support Machine to Machine (M2M) interaction
Support Machine to Machine (M2M) interaction
Read with this
Use case: portable identity
Use case: portable identity
Read with this