View Zero Trust Service Catalogue 1 Match IdentityVerifiable Credentials

Zero Trust Service Catalogue

UNIFY's identity-first catalogue spanning the core Zero Trust pillars.

IDENTITY

Capabilities that establish, migrate, and assure digital identities.

  • Trusted Sign-in
  • Streamlined Identity Lifecycle
  • Verifiable Credentials
  • Identity Protection
  • Migration to Entra
  • Identity Verification and Proofing
  • Application Provisioning
  • Identity SOC
ACCESS

Controls that govern how users, customers, and partners gain the right access.

  • Secure External Access
  • Organisational Identity Access Management
  • Controlled Delegation
  • Partner Identity Access Management
  • Just-In-Time Privilege
  • Adaptive Access
  • Multifactor Identification
  • Risk-Based Authentication
GOVERNANCE

Oversight capabilities that enforce policy, compliance, and least privilege.

  • Enterprise Governance
  • Controlled Delegation
  • Access Lifecycle
  • Entitlement Management
  • Data Protected
  • Access Reviews
  • Just-In-Time Privilege
  • Adaptive Access
SECURITY

Security operations services that protect, detect, and respond across identities.

  • Intelligent Threat Detection
  • Dark Web & Supply Chain Insight
  • Information Protection and Governance
  • Endpoint & Cloud Protection
  • Vulnerability Management
  • Security Operations Centre as a Service (SOCaaS)
  • Risk Management

Overview

Organisations can issue temporary workforce credentials that prove role, training, and site clearance, then verify them at entry or system access points.

Why it matters

Short‑term staff create high onboarding overhead and risk. Credentials allow fast onboarding with clear expiry and revocation rules.

Ecosystem roles

  • Issuer: The employer or accredited training provider.
  • Holder: The contractor or temporary worker.
  • Verifier: Physical access systems and application services.

Assurance and lifecycle

Credentials should expire automatically at contract end and be revocable if training or clearance changes.

Objective Provide safe, time‑bound access for temporary staff.
Description Issue workforce credentials tied to role, site, and expiry.
Actors Employer; Contractor; Site operator
Dependencies Training and clearance data sources.
Preconditions Contractor is engaged and required training is completed.
Postconditions Access is granted within scope and duration.
flowchart LR
    EMP@{icon: "fa:building", label: "Employer", pos: "b"} -->|Issues workforce VC| WAL@{icon: "fa:wallet", label: "Wallet", pos: "b"}
    TRAIN@{icon: "fa:certificate", label: "Training provider", pos: "b"} -->|Issues training VC| WAL
    WAL -->|Present VCs| VER@{icon: "fa:id-badge", label: "Access control", pos: "b"}
    VER -->|Grant access| SITE@{icon: "fa:helmet-safety", label: "Site / system", pos: "b"}
sequenceDiagram
    participant Employer
    participant Trainer as Training provider
    participant Wallet
    participant Worker
    participant Access as Access control

    Employer-->>Wallet: Issue workforce VC
    Trainer-->>Wallet: Issue training VC
    Worker->>Access: Present credentials
    Access-->>Worker: Access granted or denied

You may also be interested in:

A practical, standards-aligned view of Verifiable Credentials for organisations building trusted ecosystems.