All Projects → OriginProtocol → Origin Playground

OriginProtocol / Origin Playground

Licence: mit
Playground for us to try out new ideas, specifically around Identity (ERC 725) & the Origin Marketplace

Programming Languages

javascript
184084 projects - #8 most used programming language

Labels

Projects that are alternatives of or similar to Origin Playground

Aspnetcoreid4external
external OpenID Connect Login to IdentityServer4 with AAD
Stars: ✭ 63 (-50.39%)
Mutual labels:  identity
Ethr Did
Create ethr DIDs
Stars: ✭ 90 (-29.13%)
Mutual labels:  identity
Identitybase
IdentityBase is a Universal Identity Platform for web, mobile and IoT built on top of IdentityServer.
Stars: ✭ 112 (-11.81%)
Mutual labels:  identity
Ueberauth identity
A username/password Strategy for Überauth
Stars: ✭ 69 (-45.67%)
Mutual labels:  identity
Aspnetcore Ddd
Full ASP.NET Core 3.1 LTS application with DDD, CQRS and Event Sourcing
Stars: ✭ 88 (-30.71%)
Mutual labels:  identity
Ipfs Social Proof
IPFS Social Proof: A decentralized identity and social proof system
Stars: ✭ 96 (-24.41%)
Mutual labels:  identity
Auth0 Socketio Jwt
Authenticate socket.io incoming connections with JWTs
Stars: ✭ 1,093 (+760.63%)
Mutual labels:  identity
Cipheridaas
CipherIDaaS —— Open-source IDaaS/IAM product by CipherChina , Hangzhou .
Stars: ✭ 121 (-4.72%)
Mutual labels:  identity
Greatwall
Util应用框架配套的权限管理系统
Stars: ✭ 88 (-30.71%)
Mutual labels:  identity
Zitadel
ZITADEL - Cloud Native Identity and Access Management
Stars: ✭ 105 (-17.32%)
Mutual labels:  identity
Hyperidentity
🌏 🆔 Decentralized Identity
Stars: ✭ 72 (-43.31%)
Mutual labels:  identity
Active Directory B2c Javascript Nodejs Webapi
A small Node.js Web API for Azure AD B2C that shows how to protect your web api and accept B2C access tokens using Passport.js.
Stars: ✭ 85 (-33.07%)
Mutual labels:  identity
Brightid
Reference mobile app for BrightID
Stars: ✭ 101 (-20.47%)
Mutual labels:  identity
Aspnetcore.identity.documentdb
A Cosmos DB / DocumentDB Storage Provider for ASP.NET Core Identity
Stars: ✭ 64 (-49.61%)
Mutual labels:  identity
Aspnetcore.identity.mongodbcore
A MongoDb UserStore and RoleStore adapter for Microsoft.AspNetCore.Identity 2.2. Allows you to use MongoDb instead of SQL server with Microsoft.AspNetCore.Identity 2.2. (not Identity 3.0)
Stars: ✭ 118 (-7.09%)
Mutual labels:  identity
Blockstack Browser
The Blockstack Browser
Stars: ✭ 1,119 (+781.1%)
Mutual labels:  identity
Active Directory B2c Xamarin Native
This is a simple Xamarin Forms app showcasing how to use MSAL to authenticate users via Azure Active Directory B2C, and access a Web API with the resulting tokens.
Stars: ✭ 91 (-28.35%)
Mutual labels:  identity
Hydra
OpenID Certified™ OpenID Connect and OAuth Provider written in Go - cloud native, security-first, open source API security for your infrastructure. SDKs for any language. Compatible with MITREid.
Stars: ✭ 11,884 (+9257.48%)
Mutual labels:  identity
Tobab
tobab: the poor mans identity aware proxy, easy to use setup for beyondcorp in your homelab
Stars: ✭ 122 (-3.94%)
Mutual labels:  identity
Microsoft Authentication Library For Android
Microsoft Authentication Library (MSAL) for Android
Stars: ✭ 103 (-18.9%)
Mutual labels:  identity

Origin Protocol

Head to https://www.originprotocol.com/developers to learn more about what we're building and how to get involved.

Origin Identity Playground


Warning! This repo contains only our protoyping work around ERC 725. It is now out of date and should not be used. Our current identity contracts are here.


This app is a working implementation of the ERC 725 and ERC 735 proposals for managing a unique identity on the blockchain.

Using ERC 725, a smart contract can protect function calls from being executed unless the sender has a verified claim from a trusted issuer.

Live Demo

You can try a deployed version of this app at http://erc725.originprotocol.com/#/

It has several Certifiers pre-populated that are not present when running the demo locally.

The screenshot walkthrough below shows an example of verifying a claims of a person's identity.

Explanation

Imagine we want to deploy a Listing contract to sell a concert ticket, but only allow interactions from users with a verified email address. How can we accomplish this with ERC 725?

First, lets define the entities that will be interacting:

  • The Consumer is an identity who wants to buy the ticket.
  • The Issuer is an identity which issues claims of type 'EMAIL_VERIFIED'.
  • The Listing will only allow Consumers with an EMAIL_VERIFIED claim from an Issuer they trust.

This leaves us with a few questions...

  1. How does the trusted Issuer verify an email address?
  2. How does the Consumer get an EMAIL_VERIFIED claim onto their Identity?
  3. How can the Listing verify that the Consumer has an EMAIL_VERIFIED claim from a trusted Issuer?

To answer these questions, lets go through the process of setting up all the required contracts and services, starting with the Issuer.

The job of the Issuer is to act as a trusted third party. In the future, trusted organizations may deploy their own Issuer identity contracts onto the blockchain, which third parties can then trust. Origin plan to offer their own basic Issuer contracts for verifying email addresses, phone numbers, Facebook accounts, Twitter accounts, etc. Third parties will then be able to trust that these Origin Issuer contracts only issue claims if they are, in fact, true.

How will an email verifier work? A typical verification service may involve an application, for example http://example.com/verify-email. This application will have a standard interface for verifying an email address, whereby a user is sent an email with a special code which they then submit back to the application. Now that the email address has been verified, it can be signed with a private key known only to the email verifier app. The corresponding public key is on the issuer's identity. This is how a claim is verified.

More explanation to follow...

Walkthrough

  1. Screen upon loading

image

  1. Confirm that the first wallet ID is active. (0x313AaD in our screenshot) We are playing the role of a person who desires a blockchain identity.

  2. Click "Add an Identity" and deploy an identity contract with name "Alice".

image

You can see the address of the contract, as well as the wallet ID of the owner.

  1. Switch the active wallet to the second. (0x56BEaa in our screenshot) We are now playing the role of a service that can verify a GitHub account.

  2. Click "Add a Certifier" and deploy a certifier contract called "Github". For now we'll use an example URL for our service.

image

Again, you should see the address of this contract, and the walled ID of the owner of this contract.

  1. Switch the active wallet to the third. (0xCd5e74 in our screenshot) We are now playing the role of an eBay-like application that wants to restrict access to only people with verified Github accounts. (A marketplace for developers, perhaps!)

  2. Click "Add a Protected Contract" and deploy a contract called "Listing" with certifier of "Github". This is the contract which will be limited to interacting to people with verified Github accounts.

image

  1. The screen should now look like this.

image

  1. Switch to the first wallet, belonging to "Alice".
  2. Click on the "Listing" contract.
  3. Click on "Run Protected Method", and switch the desired Claim Type to "Has GitHub",

image

  1. After clicking on "Check Claim", you should see that the claim is returned as ClaimInvalid. At this point, Alice has no proof that she has a GitHub account.

image

  1. Switch to the second wallet, and click on "GitHub" under "Certifiers".

  2. On right column, click on the "+" next to "Claims" to add a claim.

  3. Switch the "Claim Type" to "Has Github" and click "Add Claim".

image

  1. Switch to the first wallet, and click on the "Alice" identity.

  2. In right column, you should see the claim by our "Github" Certifier (from pervious step) that she has a GitHub account. Click "Approve" to accept this claim to Alice's identity.

image

  1. Alice now has on-chain proof of her GitHub!

image

  1. Now click the "Listing" under "Protected Contracts", and then click on "Run Protected Method". Change the "Claim Type" to "Has Github"

  2. You should see that this claim is returned as ClaimValid*.

image

Alice is ready to start shopping!

Installation

npm install
npm start

Tests

npm run test

Related

Credits

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].