File tree Expand file tree Collapse file tree 2 files changed +15
-0
lines changed Expand file tree Collapse file tree 2 files changed +15
-0
lines changed Original file line number Diff line number Diff line change @@ -76,3 +76,16 @@ Both implementations leverage the concept of Hyperledger Fabric MSP ([https://hy
76
76
77
77
* ** MSP X.509:** This implementation retrieves long-term identities from local folders adhering to the X.509-based MSP format.
78
78
* ** MSP Idemix:** This implementation loads long-term identities from local folders that follow the Idemix-based MSP format.
79
+
80
+ ## Using the Identity Service in a Token Driver
81
+
82
+ If you want to use the Identity Service in your Token Driver, then here is what you need to do.
83
+
84
+ First, instantiate your roles. The identity service come equipped with two ` Role ` implementation.
85
+ One is based on X.509 certificates, the other one is based on Idemix.
86
+ Both requires the identities to be stored following the Hyperledger Fabric MSP prescriptions.
87
+
88
+ High level, these are the steps to follow:
89
+ 1 . Instantiate the roles your driver will support.
90
+ 2 . Instantiate the Identity Provider passing the constructed roles.
91
+ 3 . Instantiate the Wallet Registries for each role.
Original file line number Diff line number Diff line change @@ -44,6 +44,8 @@ type IdentityProvider interface {
44
44
// RegisterAuditInfo binds the audit information to the passed identity
45
45
RegisterAuditInfo (id view.Identity , auditInfo []byte ) error
46
46
47
+ WalletIDs (role IdentityRole ) ([]string , error )
48
+
47
49
// GetAuditInfo returns the audit information associated to the passed identity, nil otherwise
48
50
GetAuditInfo (identity view.Identity ) ([]byte , error )
49
51
You can’t perform that action at this time.
0 commit comments