View Zero Trust Service Catalogue 1 Match IdentityVerifiable Credentials

Zero Trust Service Catalogue

UNIFY's identity-first catalogue spanning the core Zero Trust pillars.

IDENTITY

Capabilities that establish, migrate, and assure digital identities.

  • Trusted Sign-in
  • Streamlined Identity Lifecycle
  • Verifiable Credentials
  • Identity Protection
  • Migration to Entra
  • Identity Verification and Proofing
  • Application Provisioning
  • Identity SOC
ACCESS

Controls that govern how users, customers, and partners gain the right access.

  • Secure External Access
  • Organisational Identity Access Management
  • Controlled Delegation
  • Partner Identity Access Management
  • Just-In-Time Privilege
  • Adaptive Access
  • Multifactor Identification
  • Risk-Based Authentication
GOVERNANCE

Oversight capabilities that enforce policy, compliance, and least privilege.

  • Enterprise Governance
  • Controlled Delegation
  • Access Lifecycle
  • Entitlement Management
  • Data Protected
  • Access Reviews
  • Just-In-Time Privilege
  • Adaptive Access
SECURITY

Security operations services that protect, detect, and respond across identities.

  • Intelligent Threat Detection
  • Dark Web & Supply Chain Insight
  • Information Protection and Governance
  • Endpoint & Cloud Protection
  • Vulnerability Management
  • Security Operations Centre as a Service (SOCaaS)
  • Risk Management

Overview

Students can borrow physical or digital assets (books, lab equipment, lockers) by presenting a Student ID Verifiable Credential at the point of access.

Why it matters

Traditional borrowing requires kiosks, staff intervention, or physical ID cards. A wallet-based credential streamlines the experience while keeping identity assurance consistent.

Ecosystem roles

  • Issuer: The education institution issuing student identity credentials.
  • Holder: The student storing the credential in a wallet.
  • Verifier: Library or asset management system validating the credential at checkout.

Implementation notes

QR codes or NFC prompts can initiate presentation. The verifier records the transaction in the asset management system without storing unnecessary personal data.

Objective To enable a student to borrow a book from the library using their Digital ID as verification of identity
Description Use the Digital ID to perform book issuance for students. The solution will enable a student to verify their identity by linking their student credentials from the verifiable Digital ID when borrowing a book from the library.
Actors Student; Library
Dependencies Student verifiable digital identity is stored in the student’s wallet
Preconditions Verifiable identity service can produce a barcode or QR code to verify student ID
Postconditions Student has successfully verified their identity to borrow a book; The book is registered as borrowed by that student in the library management system.
flowchart LR
    STU@{icon: "fa:user-graduate", label: "Student", pos: "b"} -->|Presents student ID VC| VER@{icon: "fa:book", label: "Library / verifier", pos: "b"}
    VER -->|Verify issuer, status| REG@{icon: "fa:building-columns", label: "Institution registry", pos: "b"}
    VER -->|Record loan| SYS@{icon: "fa:database", label: "Library system", pos: "b"}
sequenceDiagram
    participant Student
    participant Wallet
    participant Verifier as Library / verifier
    participant Registry as Institution registry
    participant LibrarySystem as Library system

    Student->>Wallet: Approve presentation
    Wallet->>Verifier: Present student ID VC
    Verifier->>Registry: Check issuer and status
    Registry-->>Verifier: Valid
    Verifier->>LibrarySystem: Record loan
    LibrarySystem-->>Student: Loan confirmed

You may also be interested in:

A practical, standards-aligned view of Verifiable Credentials for organisations building trusted ecosystems.