Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  •  g. Demo full cycle of generating security keys at client, registering and enrolling users, and invoking and querying on Fabric chain code.
  •  h. Documentation of  identity solutions to access Fabric application with third party key management toolsEstablish authentication protocol to connect client application (e.g., mobile app and cyrpto wallet) to Fabric application.

...