A dedicated “Login with Sumvin” product surface is not covered in this release. The building blocks below — s, JWT verification, scopes, and attestation claims — are available today and can be composed into an identity-anchored login flow against the SIS API.
What the flow looks like
- Your app prompts the user to sign a carrying an identity scope — for example
sr:us:pint:identity:proof_of_personhoodor a KYC attestation scope. - Your app exchanges the signed PINT with SIS for a JWT.
- The JWT travels to your login endpoint as
x-sumvin-pint-token. - Your backend verifies the JWT against the SIS JWKS, reads the
subclaim (the user’s SRI), and inherits the verified attestations from the token body. - You associate the Sumvin SRI with your local account record and issue your own session token.
Which primitives back it
- SRIs are the durable, URI-style identifier for a Sumvin user (for example
sr:us:person:safe:0x...). See the SRI format. - JWT verification is the same primitive as for checkout — verify against SIS JWKS, check
audandexp. See Verify a JWT. - Attestation claims carry verified facts — age, KYC status, proof of personhood — inside the JWT body. See attestation claims.
- Identity scopes describe which verified facts the user is consenting to share. See the scopes reference.