You make and manage your identity locally
Derive your own identity object from a password... we'll do the rest
Make it as strong as much you value your identity! We suggest using an open-source password manager like pass to generate secure passwords.
First your computer derived main key from your password:
Then the first cryptographic keypair suitable for signing was derived from your main key:
Your computer fetched the root invite of an open-to-register DoAuth server:
Signing key was used to make "a verifiable presentation", to prove that we're requesting the invite to be fulfilled on our own behalf:
Finally, this presentation was sent over to the server and your computer received a certificate of fulfillment, which is also a verifiable credential.
That's it! Subscribe to our newsletter to find out what you can do with your DoAuth identity object!