View Zero Trust Service Catalogue 1 Match IdentityVerifiable Credentials

Zero Trust Service Catalogue

UNIFY's identity-first catalogue spanning the core Zero Trust pillars.

IDENTITY

Capabilities that establish, migrate, and assure digital identities.

  • Trusted Sign-in
  • Streamlined Identity Lifecycle
  • Verifiable Credentials
  • Identity Protection
  • Migration to Entra
  • Identity Verification and Proofing
  • Application Provisioning
  • Identity SOC
ACCESS

Controls that govern how users, customers, and partners gain the right access.

  • Secure External Access
  • Organisational Identity Access Management
  • Controlled Delegation
  • Partner Identity Access Management
  • Just-In-Time Privilege
  • Adaptive Access
  • Multifactor Identification
  • Risk-Based Authentication
GOVERNANCE

Oversight capabilities that enforce policy, compliance, and least privilege.

  • Enterprise Governance
  • Controlled Delegation
  • Access Lifecycle
  • Entitlement Management
  • Data Protected
  • Access Reviews
  • Just-In-Time Privilege
  • Adaptive Access
SECURITY

Security operations services that protect, detect, and respond across identities.

  • Intelligent Threat Detection
  • Dark Web & Supply Chain Insight
  • Information Protection and Governance
  • Endpoint & Cloud Protection
  • Vulnerability Management
  • Security Operations Centre as a Service (SOCaaS)
  • Risk Management

Overview

Government and large enterprises can give partner organisations controlled access to shared services using Verifiable Credentials that prove role, scope, and authority.

Why it matters

Partner access is often negotiated manually and stitched into systems one by one. Credentials allow reusable, auditable access without bespoke integrations for every partner.

Ecosystem roles

  • Issuer: The host agency or enterprise issuing partner authority credentials.
  • Holder: Partner staff who need access.
  • Verifier: The service or platform granting access.

Assurance and lifecycle

Access should be time‑bound and revocable. Verifiers must confirm issuer trust, scope, and status at each access request.

Objective Allow approved partners to access shared services.
Description Issue role and scope credentials to partner staff and verify them at access time.
Actors Host agency; Partner organisation; Partner staff
Dependencies Trust registry and accreditation rules exist.
Preconditions Partner organisation is accredited and staff are onboarded.
Postconditions Access is granted within defined scope and time.
flowchart LR
    HOST@{icon: "fa:landmark", label: "Host agency", pos: "b"} -->|Issues partner VC| WAL@{icon: "fa:wallet", label: "Wallet", pos: "b"}
    REG@{icon: "fa:book", label: "Trust registry", pos: "b"} -->|Publishes issuer trust| VER@{icon: "fa:id-badge", label: "Access service", pos: "b"}
    WAL -->|Present VC| VER
    VER -->|Grant scoped access| SYS@{icon: "fa:server", label: "Shared service", pos: "b"}
sequenceDiagram
    participant Host as Host agency
    participant Wallet
    participant Partner as Partner staff
    participant Verifier as Access service
    participant Registry as Trust registry

    Host-->>Wallet: Issue partner authority VC
    Partner->>Verifier: Present VC
    Verifier->>Registry: Validate issuer, scope, status
    Registry-->>Verifier: Valid
    Verifier-->>Partner: Access granted

You may also be interested in:

A practical, standards-aligned view of Verifiable Credentials for organisations building trusted ecosystems.