When using Instnt to verify users on your applications, you can leverage the Multipass token to present them with either a deep link or a QR code to download the verified credentials directly into their Instnt wallet.
Ultimately, users can simply download the Instnt wallet app, scan a QR code to accept verified credentials, and follow the onscreen instructions to get started.
- In the Instnt Wallet app, tap the Scan button .
- To scan the QR code, position the phone so that the QR code appears on the screen to scan and receive a credential offer.
- Create a security code—six digits—to secure wallet and personal biometrics.
- Instnt wallet will preview the credential offer, to accept the credential offer, tap the Accept button.
- Once you accept, the credential is stored in the Instnt wallet. To access it, tap the Credentials button and select the credential offer.
Scan a QR code to use verified credentials
When using Instnt to verify users on your applications, you can leverage the Instnt access token to present them with either a deep link or a QR code to download the verified credentials directly into their Instnt wallet.
- In the Instnt Wallet app, tap the Scan button.
- To scan the QR code in an app that accepts verifiable credentials, position the phone so that the QR code appears on the screen to scan and receive a proof request.
- Instnt wallet will receive a proof request and automatically preview the stored wallet details with the proof request, map the attributes from the stored credential to the proof request.
- Tap the Share button to send the proof request. Review and agree to share credentials with other sites.
- Once the digital identity is verified by the application and you are the verified owner of the certificate—you will be granted access.
About Instnt verified credential
Instnt issued verified credentials contain attributes such as name, email, and phone number submitted by the user during the registration process. Rigorous checks are done by Instnt for verification and authentication. Instnt access protocol guards from changes after submission as it is locked down by protocols.