...
- g. Demo full cycle of generating security keys at client, registering and enrolling users, and invoking and querying on Fabric chain code.
- Establish authentication protocol to connect client application (e.g., mobile app and cyrpto wallet) to Fabric application. h. Documentation of identity solutions to access Fabric application with third party key management tools
...