Introduction
Identity management and self-sovereignty
Security, control, and portability
Overview of public, permissioned blockchains.
Creating an Indy based identity management system
Controlling permissions.
Decentralizing permissionsa.
Testing and deploying
Closing remarks |