►
Description
The second call on the IDM project. IDM stands for identity manager and André Cruz gives us an update on the project.
Check out the github repo:
https://github.com/ipfs-shipyard/pm-idm/blob/master/docs/idm-concept.md
A
Hi
everyone
and
welcome
for
the
second
progress
report
of
the
IBM
project,
so
heading
on
to
the
agenda,
so
I
already
started.
Recording
and
I
will
ask
for
anyone
and
these
lists
of
Anthony's
to
be
the
note,
taker
and
I
think
Jill
I
already
I
already
put
put
his
name.
Are
you
gonna?
Take
the
notes
you?
Yes
all
right.
Thank
you.
Thank
you
very
much.
I'm
really
appreciated
so
heading
on.
Please.
A
B
A
Cool
so
my
round
of
interest
and
updates,
oh
by
the
way
we
put
this
bar
here
so
in
terms
of
what
I
concluded
so
I,
helped
and
finish
renaming
the
ID.
My
two
nominees,
so
no
miios
will
be
the
name
for
the
actual
application,
a
web
application
that
we
are
building
and
we
decided
to
not
use
the
IDM.
Why
name?
Because
we
want
other
people
to
implement
other
applications
based
on
the
the
IDM
spec.
So
no
news
will
be
the
reference
world,
but
people
can
connect
xual
implement
their
own
applications
based
on
the
same
spec.
A
So
these
these
took
a
while
because
there
was
a
lot
of
documentation
and
papers
and
designs
as
well
to
be
using
the
old
old
name.
It
requires
us
to
taste
all
of
those.
You
know
files
also
I've
helped
making
all
the
designs
assets
public.
So
we
were
using
the
first
approach.
We
were
using
video,
but
github
is
not
really
made
to
start
and
share
a
binary
data,
so
we
ended
up
using
an
open,
Google,
Drive
folder.
A
If
you
go
to
that
link,
you
have
the
link
of
the
Google
folder,
so
you
can
explore
our
assets
and
design
material
and
all
of
that
and
also
I
helped
Paulo
be
Markus
or
follow
in
defining
the
GSI
PID
module
in
terms
of
the
interfaces.
The
methods
and
arguments
return.
Bellas
I
think
it's
quite
nice
at
the
moment,
and
perhaps
I
will
talk
a
bit
a
bit
of
that
later.
In
terms
of
what
I'm
doing
right
now,
I
am
implementing
two
modules.
A
Two
five,
six
camera
and
recording
the
and
by
the
way,
I
have
a
demo
for
this
for
this
library
and
he
still
work
in
progress.
But
I
had
some
thing
to
show
in
terms
of
it.
Working
with
with
RSA
and
regarding
the
other
model,
is
basically
a
byproduct
of
the
first
one,
because
the
first
one
also
actually
export
keys
themselves
in
various
or
ideally
in
various
formats.
We
started
with
M
the
Pam
format.
A
So
there
was
a
bit
of
you
know,
research
around
this
and
actually
the
lead,
p2p,
a
crypto,
repo
or
library
only
supports
RSA,
encrypted
keys
and
the
human
crypto
keys.
You
know
it
doesn't
make
any
sense
to
export
encrypted
keys
with
a
password
because
they
are
already.
You
know
the
minimum
is
your
passphrase
basically,
so
we
needed
a
way
to
generate
M
keys
without
a
password
and
Lippi
to
be
crypto,
nor
note
for
supports
exporting
them
via
PCCs
pkcs
eight.
A
So
I
decide
to
implement
a
module
that
will
you
know,
leverage
not
fortune
and
also
some
other
libraries
to
actually
be
able
to
parse
at
the
moment,
I'm
aiming
to
support
just
three
types:
RSA
and
the
two
elliptic
words
that
I've
already
mentioned
before
and
and
basically
also
it
will
be
able
to
export
or
generate
an
actual
key
natural
temp
file
based
on
what
you
parsed.
That's,
basically
it
in
terms
of
what
I'm
building
next.
A
So
all
of
these
all
of
these
work,
like
these
two
libraries
will
be
used
inside
the
deed
scope
of
the
IDM
wallets.
We
really
need
to
implement
those
two
libraries
in
order
to
complete
the
IDM
award
scope.
So
as
soon
as
I
finish
them,
I
will
be
able
to
implement
it.
It
that's
it.
If
you
have
any
questions,
please
ask
ask
them
if
you
want.
C
A
Right
so
basically
there's
there
are
two
issues:
I
can
actually
open
them,
but
the
first
one
is
that
basically
p2p
crypto
doesn't
explicitly
allow
you
to
import
keys
unencrypted.
Basically,
you
can't
import
a
BAM
file
without
a
password.
That's
the
first
issue.
The
second
issue
is
that
it
doesn't
yet
support
importing
elliptic
elliptic
curve,
a
keys.
A
So,
to
give
you
some
context,
context,
I
don't
need
a
little
kiss.
I
just
need
unencrypted,
Pam
files,
but
a
moment
it
doesn't
support.
Neither
of
those
so
I
decided
to
try
with
that
will
hopefully
else
who's
a
sleepy
to
be
crypto
to
use
it.
In
order
to
to
change
this
code
over
here,
I've
actually
created
an
issue.
If
you
want
to
go
there,
there
are
some.
There
is
some
context
there
for
you
to
read
any
more
questions
or
any
more
if
you
need
any
more
next.
C
D
A
D
The
renovated
the
animation
for
the
structure
of
the
model
layout,
it
is
divided
on
three
use
cases
which
is
of
outl,
ordered
and
white.
They
adjust,
according
any
use
case
already
concluded
the
lodi
CDA
and
all
scenarios
on
the
style
guide.
It's
already
implemented
and
I
made
a
great
official
prototype
and
draft
for
the
profile.
Slash
I,
didn't
to
page
just
looking
for
the
look
and
feel
twice
just
for
now,
currently
I'm
working
on
the
three
variants
for
the
model.
D
This
variant,
it
always
starts
with
a
layout
and
finishes
with
a
full
layout.
This
will
be
mostly
used
for
basic
flows
where
it's
needed
a
final
final
confirmation
or
feedback.
The
content
should
be
animated
as
the
same
way
as
preferred.
On
the
other
example,
the
other
one,
which
is
a
white,
starts
with
a
half
layout
with
vertical
margins,
and
it's
followed
by
a
wider
layout,
which
has
at
least
two
steps.
The
final
feedback
feedback
is
treated
as
the
one
above
as
well,
using
the
full
layout
and
it's
animations.
D
This
is
used
mostly
for
complex
flows,
since
it
will
expect
more
content
in
progress.
Given
my
multiple
types,
okay,
let
me
see
what
I
have
next
the
concept
and
and
the
a
new
version
for
the
normally
Cymbeline
brain-
it's
already
predicted,
but
it's
not
finished.
So
it's
still
in
progress
and
the
same
same
with
the
app
shell.
For
now,
the
vlog
I
had
just
this
use
case,
which
is
the
purchase
of
the
font
but
yeah.
Hopefully
we
will
have
that
so
as
soon
as
possible,
and
next
steps
for
me
will
be
the
brainstorm.
D
E
So
I
also
did
repo
set
up
the
the
no
Muse
repo
set
up
where
the
app
will
be
will
be
will
live,
and
you
have
the
link
here
to
check
it
out
if
you
want
I,
also
refactored
some
some
components
regarding
the
code
review
for
for
the
PR.
That
was
open
for
the
initial
components.
What
I
am
doing
right
now
is
implementing
the
model
slow
in
the
UI
kit
and
I
will
not
explain
it
because
and
Essos
already
did
it.
E
And
but
as
you
know,
we
we
had
a
model
layout
component
and
now
he
had
the
model
flow
and
the
layout
will
be
within
the
model
slow
and
but
you
already
know
that
the
variations
that
this
is
component
can
have
and
and
the
next
steps
will
be
implementing
the
lockscreen
user
journey.
And
it's
that's
it
for
me.
Any
question.
A
D
D
A
F
F
Some
changes
like
where
to
place
the
probe
types
if
we
use
staplers
and
stateful
components,
etc
and
I
implemented
the
loading
feedback
on
the
body
components
other
than
that,
but
yeah
that
was
pretty
much
it
in
the
next
print
I
will
be
implementing
the
word
screen
user
journey.
So
that's
right.
If
anyone
has
any
questions
right,
any.
G
Guys
so,
basically,
during
this
print,
my
main
focus
was
developing
the
JSI
PID
mod
for
anyone
that
doesn't
know
what
it
is
is
by
IP
IP
is
basically
the
implementation
of
the
idea
specification
over
IP
FS,
and
we
needed
to
create
a
module
to
interact
with
the
ID
documents
over
the
over
IP
FS
and
manage
it.
Manage
them
create
an
end
result.
G
So
this
is
basically
what
I
did
currently
I'm
just
testing
it
I'm
trying
to
be
as
thorough
as
possible,
because
the
specification
has
a
lot
of
details
and
a
lot
of
musts
insurance.
So
we
need
to
make
sure
that
everything
is
okay
and
the
next
print
I
will
research
a
bit
about
very
foul
vocalizations
and
social
props.
C
C
C
A
Were
talking,
yeah,
I,
think
I.
Think
Paul
is
not
aware
of
what
it
what
this
that
is
because,
while
John
Johnny
has
been
talking
about
it,
I
think
it
doesn't.
Yet
they
didn't
hear
to
plated
the
the
idea,
pacification,
meaning
that
is
still
a
work
in
progress.
So
perhaps
when,
when
he
finished
that
part
and
actually
includes
in
the
spec,
we
might
might
actually
located
that.
But
as
far
as
I
know,
that
stuff
is
optional
in
the
the
idea.
A
A
Yeah,
basically
Johnny
crunch
is
being
I
know,
you
know,
he's
being
pretty
cautious
against
or
regarding
a
penis
and
also
IPO
D.
So,
instead
of
relying
only
on
I
pianist
and
I
PL
d,
he
also
wants
to
anchor
the
seeds
in
the
action
like
it
Union
in
order
to
serve
as
a
confirmation
that
anyone
can
can
check
inside
a
blockchain.
A
A
G
Sorry,
okay,
okay,
I
think
that
just
one
more
thing
quickly.
Basically,
we
have
an
open
issue
on
the
IP
IV
spec
about
multi
writer
scenarios
so
currently
I
also
on
the
ji
PIB
module.
We
are
making
some
trade-offs
like
we
are
going
to
implement
what
we
actually
need
to
interact
with
the
documents
and
we
will
improve
it
as
we
go.
G
A
Yeah,
basically
the
thing
about
multi
rights
and
also
the
thing
about
layer,
1
and
layer.
2
need
to
go
first
into
the
PID
spec
itself
before
we
actually
implement
implemented
in
the
module.
Otherwise,
we'll
be,
you
know,
being
kind
of
a
fork
of
the
ideas
back
which
you
don't
want,
so
we
will
try
to
make
it
make
it
make
it
into
the
IBD
spec
before
actually
implementing
implement
implementing
it
and,
as
a
matter
of
fact,
is
not
it's
not
blocking.
A
C
Just
a
brief
thing
that
I'm
going
to
be
meeting
with
some
people
who
are
working
on
the
social
proof
stuff
from
the
rebooting
love
with
trust
conference
later
this
week,
I
don't
know
how
much
useful
things
are
going
to
come
out
of
it
and
like
the
next
week
or
two,
but
I
will
I
will
looped
you
in
if
they
do.
Okay.
A
H
B
Everyone,
so
during
this
last
two
two
weeks,
I
have
been
like
part-time
working
on
a
small
module
to
be
added
to
the
idea,
which
is
having
a
having
a
service
worker
using
the
the
web
off
an
API
for
us
to
be
able
to
store
a
secret
using
like
the
hardware.
Module
in
this
case
is
English
ready,
so
they've
always
to
use
the
web
as
an
API
to
store
a
secret
controlled
by
the
user,
which
can
then
be
used
to
unlock
the
vault
at
the
end.
B
So
my
approach
is
that
yay,
there's
like
there
are
two
libraries
and
for
service
work
using
one
color
to
clients,
both
in
the
function
to
use
the
web
of
an
API,
to
store
secrets
and
to
recover
secrets.
You
think
that
I've
eaten
this
bag.
So
it's
like
really
nicely
to
experience.
We
can
store
64
bytes
every
using.
A
C
Yeah
I,
mostly
just
been
doing
IPs
things.
I
have
a
single
router,
IP
NS,
let's
gossip
sub,
that
will
have
persistence,
which
should
help
with
republishing
issues,
because
your
stuff
won't
have
to
expire,
which
happens
with
the
DHT.
The
problem
is
you
can't
republish
because
they
check
that
you're,
the
actual
person
publishing
but
now
you're
offline
and
if
you're
offline
for
more
than
a
day,
then.
C
C
So
hopefully
that
should
work
and
I've
been
doing
some
work
on
the
the
multi
writer
stuff,
but
that
mostly
involves
adding
in
specific
sub
topic
or
topic
features
right
now
all
topics
are
sort
of
treated
the
same,
so
you
have
to
choose
between
you
have
to
choose
between.
Like
do,
I
want
to
use
gossip
sub,
or
this
new
thing
or
flood
stuff
you
have
to
like
choose.
A
C
C
C
A
C
So
I
think
Jamie's
been
working
on
some
stuff
with
basically
IP
NS
pinning
or
some
right
now
he's
working,
mostly
on
pear
pad
pinning
but
I
think
at
some
point.
This
is
gonna
graduate
into
setting
up
IP
NS,
pinning
that
you
could
do
in
addition
to
using
cluster
4
for
data
ipfs
pinning,
and
that
should
be
useful.
C
I,
don't
know
how
soon
that's
that
stuff
is
really
gonna
be
available,
because
it's
based
on
stuff
that
I'm
working
on
and
Jim's
working
on
and
also
there's
no,
the
persistence
is
not
has
not
been
implemented
in
the
Jas
pub/sub
stuff,
mostly
because
gossip
sub
hasn't
landed
hasn't
like
officially
landed.
Yet
you.
A
C
A
Okay
departing
geo,
which
is
the
note
taker
Joe,
can
you
take
note
about
creating
an
issue
to
lift
all
the
requirements
that
we
have
in
terms
of
infrastructure
like
pinning
the
seeds
and
and
regarding
a
penis
and
time
to
leave
and
I?
Think
that's,
adding
missioned
so
that
we
can
have
a
list
of
requirements
for
you
know
for
I.
Think
it's
not
not
to
be,
must
basically
it'll
be
to
be.
You
know
bad
for
for
the
MVP.
If
that
happened,
that's
it
basically
any
more
questions
for
a
team.
A
Questions
alright,
so
the
next
two
attendees
are
just
observing.
So
let's
move
on
to
the
second
part
of
the
meeting,
which
is
the
demos
and
the
questions.
So
if
you
have
any
further
questions
or
questions
that
you
see
or
want
to
ask
in
the
in
the
end
of
this
meeting,
please
list
them
here
in
the
in
the
document
and
we'll
have
five
minutes,
questions
and
answers.
But
right
now,
let's
do
the
demos,
and
so
the
first
one
is
actually
me
already
I'm
already
sharing
my
screen.
A
I
have
here
a
quick
demo
for
you
to
see
so
the
first
one
is
the
human
cryptokeys
module
that
I'm
working
on
and
what
I'm
going
to
show.
You
is
just
very
minded.
This
is
just
a
test
file
that
I
created
for
this
demo.
So
basically,
what
I'm
doing
here
is
to
import
the
library-
and
we
have
the
here
TWiT
functions,
which
are
the
main
ones,
which
is
the
generate
key
pair
trick,
repair
from
mnemonic
and
sorry
gatekeeper
for
mana
Manik
and
get
keeper
from
seed.
So
what
work
should
we
do?
A
First
is
to
generate
a
key
afterwards
we
generate
or
get
the
same
key
based
on
its
mana
monic,
because
this
object
here
is
composed
of
not
only
the
key
but
also
the
mnemonic
and
the
seed.
So
in
this
case,
I'm
passing
the
same
algorithm
and
the
minim
onic
that
I
get
from
the
first
step
and
also
in
the
third
step,
I'm
going
to
recreate
the
sing
key
but
from
the
seed
and
what
what
do
you
will
see
printed
in
the
screen?
A
Is
there
the
first
result
object
and
then
you
should
see
a
true,
pier
and
a
true
here,
because
the
gears
will
be.
That
should
be
the
same.
Basically
so
I'm
gonna
run
this
file
and
don't
know
if
you
should
ever
should
increment
the
font
size.
So
what
do
you
see
now
is
that
it
will.
It
will
be
actually
slow.
That,
in
terms
of
you
know,
is
their
experience
having
to
wait
like
three
four
seconds
just
to
generate
a
key
is
not
very
nice.
A
That's
why
I'm
looking
to
using
elliptic
curves,
because
that's
you
know,
generating
elliptic
curve
from
a
sieve.
It's
pretty
straightforward!
You
don't
need
to
actually
do
anything,
you
just
take
the
bikes
and,
and
that's
it
so
thing.
The
output,
the
output
of
the
generate
key
pair,
was
an
object
with
algorithmic
property,
which
contains
all
the
algorithm
parameters
so
that
we
can
replicate
the
key
later
on,
like
one
year
from
now
or
two
years
from
now.
In
this
case,
the
the
type
of
the
keys
are
a
site
has
2048
bits.
It
has
this.
A
A
A
So
in
this
case
this
key,
if
you,
if
you
open
here,
is
pkcs1
PEM
key
with
four
primes,
and
it
has
four
4096
bits,
so
we
should
be
able
to
parse
any
type
of
key
and
I'm
gonna
demo
disk
in
particular.
So
if
we
want
it
run
this,
what
we
get
from
the
output
is
saying:
hey,
the
format
is
pkcs1
in
the
BAM
format
and
the
key
is
an
RSA
and,
as
you
know,
all
these
parameters,
like
the
modules
private
exponent,
prime
1,
Prime,
2
and
all
of
that
stuff,
and
also
it
contains
encryption.
A
B
So
this
is
just
like
a
very,
very
basic
demo,
a
very
basic
demo
of
using
a
10
Service
Worker.
So
if
you
can
just
think
of
situation
where
we
are
either
registering
a
user
or
a
lot
of
setting
up
the
fault
Virgilia,
the
only
thing
the
user
would
need
to
do.
Is
you
come
here
set
its
user
name,
Danny
Woodcrest
at
the
register
button,
and
now
here
I'm
asking
first,
you
put
that
we
want
to
sort.
So
this
is
not
all
necessary.
B
Just
think
of
this
is
the
secret
that
we
want
to
restore
the
hardware
much
of
the
disguise
device
either.
It
would
be
probably
the
best
race
of
emoticons.
So,
like
speaker,
strong
and
specific
aspects,
then
this
will
prompt
me
for
my
little
shiny
credentials.
I
put
in
my
fingers.
I
will
allow
it
Here.
I
am
now
information
of
the
public
key
I
just
registered
using
what
offender
is
stored
by
Isis
by
the
service
worker
in
next
image.
B
That
I
fit
in
in
the
prompt
is
not
sort
that
secrecy
store
directly
on
the
hardware
module
in
this
case
examples
to
chat
with
and
then
when
I
come
back,
I
bring
my
username.
So
here's
well
then
I
press
login.
It
knows
which
public
people
checked
against
based
on
my
username,
then
I
just
confirm
it
with
my
finger.
I
am
logged
and
the
secret
right
sure,
so
this
secret
here
is
basically
four
encoded
sha-256
of
the
first
secret
activated
in
the
beginning
and
now
I'm
getting
it
back
here
again
so
yeah.
B
So
we
can
just
think
the
possibilities
of
using
this
secret
for
anything.
Now
like
there
are
some
caveats
about
like
we
are
using
a
field
of
level
and
two
sources
which
really
should
be
used
to
sort
it.
This
is
the
user
handle.
This
is
supposed
to
be
just
a
pointer
for
the
server
to
connect
a
user
to
a
public
key,
it's
essentially
the
user
LD,
but
it
is
securely
stored
on
the
side
of
the
clients
device.
So
I
know
other
website
connexes.
So
we
are
like.
B
E
B
Like
just
one
by
saying
very
fast,
this
is
a
library
right
now,
so
we
have
the
library
for
the
client.
So
we
just
need
to
import
the
way
about
hmmm
blur
and
then
just
make
it
handled
login
and
registration
where
he
takes
the
username,
the
secret
and
the
name
of
the
user,
and
then
we
also
have
the
library
for
the
service
worker,
which
is
just
like
the
routes
to
handle
the
register,
the
login
and
the
response
to
the
response
being
a
challenge
which
is
sent
by
the
service
worker
to
the
clients.
So
it's
very
simple.
B
A
B
B
So
the
way
it
works
is
the
user
registers
itself
with
a
username,
and
then
the
server
sends
a
challenge
to
be
signed
by
the
users
and
the
user
is
signing
that
challenge
with
a
private
key
that
was
generated
in
its
device.
Hi
browser,
essentially
using
the
hardware
device,
can
be
like
a
USB
token.
You
can
do
touch
ID
like
any
any
other
type
of
sensor
that
can
identify
a
person.
The
problem
here
is,
since
we
are
like
all
about
to
the
centralized
web
servers,
do
not
exist,
they
are
persona
non
grata.
B
So
we
have
to
find
like
something
else
to
make
a
look
and
learn
so
we
want
to
use
by
about
and
because
of
the
features
in
users
to
screen
and
verify
signatures,
but
without
the
server.
So
what
we
can
do
is
between
the
service
partner,
then
intercepts
all
the
communications
between
the
client
and
the
alleged
server.
B
So
it
can
still
do
the
challenge
and
everything,
although
that
has
very
valuable
value,
is
the
challenge
that
exists
only
on
the
client
side.
What
you're
doing
is
just
leverage
that
piece
of
information
which
is
storing
treatment,
which
is
the
user
handle,
so
only
one
from
way
above
and
at
this
point
is
to
store
the
user
handle
in
the
hardware
device,
hopefully
in
the
future.
Web
of
them
will
expose
primitives
to
encrypt
and
decrypt
messages.
That
should
be
like
the
best
way
to
be.
B
C
B
C
A
No,
you
can't
so
basically
this
this
API
is
offered
by
the
browser,
and
it
must
be.
You
know,
the
different
types
must
be
approved
by
the
Fido
foundation.
I
think,
if
I'm
not
mistaken,
so
you
are
basically,
you
have
to
use
what
they
define
and
they
offer
you
can't
just
plug
in
what
your
other
types
of
authentication
there.
So
we
just
stuck
with
touch
ID
and
Westby
drives
and
later
on
later
on
on
Android
also
work.
B
A
Let
it
on
perhaps
micro
vessel
will
also
implement
face.
Id
I
would
imagine
when
I
said
he
becomes
available
to
my
question
of
that,
but
you
can
just
plug
in
what
what
you
know
any
custom
type
of
authentication.
You
have
to
use
what
they
offer
and
this
way
that's
why
we
have
in
IBM.
We
have
the
bosphorus,
you
know
just
just
because
you
can
always
use
the
web
hot
end
API.
A
A
A
G
Yet
yeah
it's
it's:
okay,
no
yeah!
So
basically
I'll
just
present
it
as
quick
as
possible.
So
the
IP
IP
API
is
pretty
simple.
So
basically
you
use
a
factory
to
create
her
nieces
of
IP
ID.
You
pass
it.
You
pass
a
note
of
ipfs
and
it's
the
software
ipfs
and
you
can
do
three
things
resolved
by
passing
the
ID.
So
basically,
this
will
resolve
the
ID
and
get
you
the
document
associated
to
that
the
ID
create
a
new,
the
ID.
We
it's
document
and
I
played
it.
G
So
basically
we
are
using
the
pam
private
key
to
do
this
to
be
consistent
with
ipfs
inside
when
we
import
keys
in
ipfs,
it's
currently
being
done
with
a
Pam,
so
we
are
keeping
that
consistent
and,
as
you
can
see
here,
the
second
argument
of
the
create
and
the
update.
It's
the
the
document.
What
is
the
document?
So?
Basically
you
get
the
document
and
you
can
do
some
stuff
with
the
document
so,
like
you
can
add
all
the
keys
and
this
public
key.
G
You
pass
an
object
to
it.
Basically,
this
object.
You
can
see
its
specification
in
the
lead
spec.
You
can
revoke
a
public
key
by
specifying
its
ID.
You
can
add
a
notification.
Currently,
we
are
just
using
ember
reference
out
indication
because
I'm
about
authentication
in
the
VI,
this
bike
is
currently
a
little
bit
sistent
and
not
really
well-defined.
We
are
hoping
to
see
it
go
forward
a
little
bit
until
we
actually
implement
it.
G
Also
we
can
add
service
and
the
spec
is
also
defined
in
the
VIP
spec
and
to
revoke
it.
You
just
pass
the
PID.
So
as
a
quick
example.
Here
we
are
creating
an
oath,
an
ipfs
note
and
to
create
VIP
ID.
We
just
pass
it
to
the
IP
ID.
So,
let's,
let's
create
a
div
with
its
documents
and
what
we
are
doing
here
is
we
are
going
to
create
the
ID.
G
We
are
going
to
pass
the
private
key
as
a
Pam
and
we
we
get
the
documents
and
when
we
get
the
document,
we
get
it
templated
with
what
it's
actually
required
in
the
document
and
after
that,
you
just
play
with
it
a
little
bit
as
your
liking
and
you
wait,
for
example,
a
Palicki.
You
have
authentication
method
anyway,
a
service.
So,
let's
run
this
see
what
it
will
return.
G
You
can
see.
I
can't
see.
Okay,
sorry,
so
this
is
basically
the
document
that
gets
created
after
we
run
this
little
bit
of
code.
What
if
we
try
to
resolve
this?
So
basically
this
is
our
D
ID.
This
is
our
method
might
be
ID,
and
this
is
our
live
n
t5.
The
identifier
is
actually
an
IP
NS
ash,
so
we
can
get
the
the
document
by
using
this
ash.
So
just
instead
of
this,
let's
just
resolve
this.
So,
as
you
can
see
here,
this
is
the
D
ID
that
was
already
created.
G
So
let's
run
this
and
it
will
resolve
the
document.
So
actually
we
get,
as
you
can
see
here,
it's
exactly
the
same
document
that
we
created
and
we
can
update
it.
So,
let's
update,
let's
add
a
new
authentication
method
with
different
Palicki.
Currently
we
only
have
one,
as
you
can
see
here,
ek,
one.
Let's
have
any
one.
So
we
run
this
and.