View Zero Trust Service Catalogue 1 Match IdentityVerifiable Credentials

Zero Trust Service Catalogue

UNIFY's identity-first catalogue spanning the core Zero Trust pillars.

IDENTITY

Capabilities that establish, migrate, and assure digital identities.

  • Trusted Sign-in
  • Streamlined Identity Lifecycle
  • Verifiable Credentials
  • Identity Protection
  • Migration to Entra
  • Identity Verification and Proofing
  • Application Provisioning
  • Identity SOC
ACCESS

Controls that govern how users, customers, and partners gain the right access.

  • Secure External Access
  • Organisational Identity Access Management
  • Controlled Delegation
  • Partner Identity Access Management
  • Just-In-Time Privilege
  • Adaptive Access
  • Multifactor Identification
  • Risk-Based Authentication
GOVERNANCE

Oversight capabilities that enforce policy, compliance, and least privilege.

  • Enterprise Governance
  • Controlled Delegation
  • Access Lifecycle
  • Entitlement Management
  • Data Protected
  • Access Reviews
  • Just-In-Time Privilege
  • Adaptive Access
SECURITY

Security operations services that protect, detect, and respond across identities.

  • Intelligent Threat Detection
  • Dark Web & Supply Chain Insight
  • Information Protection and Governance
  • Endpoint & Cloud Protection
  • Vulnerability Management
  • Security Operations Centre as a Service (SOCaaS)
  • Risk Management

Overview

Tradespeople can prove safety and compliance training at the point of site access using verifiable credentials.

Why it matters

Mining sites operate under strict safety and compliance requirements. Manual checks slow onboarding and increase risk if records are outdated.

Ecosystem roles

  • Issuer: Training providers or regulators issuing certifications.
  • Holder: The tradesperson.
  • Verifier: Site access control or safety compliance teams.

Operational considerations

Credentials should be time-bound with clear revocation or expiry policies to reflect ongoing training requirements.

Objective Enables a mining site to validate the training qualifications of a tradesperson required to work on-site
Description Use verifiable credentials to allow a tradesperson to show they have the relevant training qualifications.
Actors Tradesperson
Dependencies Tradesperson has training certifications already in their wallet
Preconditions The tradesperson is engaged to work on mining site, and needs to present training qualifications in order to access the site.
Postconditions The tradesperson is permitted to enter the work site.
flowchart LR
    TRAIN@{icon: "fa:certificate", label: "Training provider", pos: "b"} -->|Issues training VC| WAL@{icon: "fa:wallet", label: "Wallet", pos: "b"}
    WAL -->|Presents credential| VER@{icon: "fa:hard-hat", label: "Site access / verifier", pos: "b"}
    VER -->|Status check| REG@{icon: "fa:book", label: "Credential registry", pos: "b"}
sequenceDiagram
    participant Trainer as Training provider
    participant Wallet
    participant Worker as Tradesperson
    participant Verifier as Site access / verifier
    participant Registry as Credential registry

    Trainer-->>Wallet: Issue training VC
    Worker->>Wallet: Stores credential
    Worker->>Verifier: Present training VC
    Verifier->>Registry: Check status
    Registry-->>Verifier: Valid
    Verifier-->>Worker: Site access granted

You may also be interested in:

A practical, standards-aligned view of Verifiable Credentials for organisations building trusted ecosystems.