In this post, we'll look at how FlowNames works. Along the way, we'll learn how authentication works, what DIDs are, and how you can create your own app to authenticate using FlowNames!

Example: Signing In to your Bank

Decentralized IDs can be used wherever you need to prove your identity. Passports, emails, bank accounts are all great use cases for strong, encrypted identities. But how can these systems be implemented?

Let's consider what we must do to verify some identity. In the following scenario, let's say you are trying to sign into a bank as "Alice Aisel".

A generic authentication workflow, powered by DID's. From https://github.com/WebOfTrustInfo/rwot6-santabarbara/blob/master/final-documents/did-auth.md

A generic authentication workflow, powered by DID's. From https://github.com/WebOfTrustInfo/rwot6-santabarbara/blob/master/final-documents/did-auth.md

Core components of DIDs

What are fundamental components of a decentralized identity system?

According to the design goals of the W3C, they are: