Skip to main content

Access Flow

The following flowchart illustrates the high-level gated access process: Key Steps:
  1. User Request: User attempts to access a protected resource
  2. Authentication: User authenticates with UAE Pass (off-chain)
  3. Proof Generation: System generates zero-knowledge proof of verified identity
  4. Verification: Proof is verified against access policies
  5. Authorization: Access is granted or denied based on verification