Onboarding Guide
About
Manual
Solutions
Apps
Success Stories
Onboarding Guide for Organizations
A step-by-step guide to help your organization start using ZADA for secure,
verifiable, and user-controlled data exchange.
✅
Step 1: ZADA's Mission
ZADA exists to build trust in a digital world by enabling secure and verifiable data exchange through a decentralized identity network.
Our mission is to ensure that individuals are in control of their data while organizations can issue and verify tamperproof credentials.
This reduces fraud, improves efficiency, and fosters trusted relationships across borders and sectors. Learn more about the
ZADA Ecosystem
🧰
Step 2: ZADA's Products
ZADA's platform is built on key components that enable secure, verifiable, and user-controlled data exchange.
Secure Credentials
Issue and verify tamper-proof digital credentials on the ZADA network, ensuring data integrity.
Trusted Governance
Our governance framework establishes trust in data issuers and maintains network reliability.
User Empowerment
The ZADA Credential Wallet empowers users with full control over their personal data.
Ecosystem Solutions
A range of integrated solutions and apps drive value across the ZADA ecosystem.
To dive deeper into peer-to-peer connections, verifiable credentials, schemas, and verification policies, consult the
ZADA manual.
ðŸ§
Step 3: Map ZADA to Your Organizational Needs
ZADA supports four key goals. Assess how ZADA aligns with your internal objectives:
💡
Step 4: Identify Potential Use Cases
Choose which ZADA use cases best fit your operations:
Identity Credentials
Issue verifiable Employee ID, Customer ID, Membership Cards, Access Passes
Passwordless Authentication
Allow users to register or log in without passwords to your app or online service.
Access Management
Use credentials to manage physical access to offices, events, or secure areas
Document Issuance
Provide tamperproof e-receipts, statements, medical records, or proof of employment
Document Verifications
Instantly verify documents from different issuers, online and across borders.
Authenticate Actions
Verify who signed a contract, approved a transaction, or submitted a request
See
more examples
of how ZADA is being applied for these use cases
🔌
Step 5: Choose Integration Options
5.a – Issuance
Manual via ZADA Portal
Issue one-by-one or in bulk via web dashboard
Recommended For:
Pilots, education, NGOs
AutoIssuer on Request
Automated issuance triggered by user requests
Recommended For:
Mid-to-large scale programs
See demo here.
System Integration (API)
Direct issuance from your internal systems
Recommended For:
Enterprises, SaaS
5.b – Verification
Connection-Based
Requires a secure connection with the ZADA Wallet.
Recommended For:
High-trust, Remote identification.
Connection-Less
Instant QR or Deeplink-based verification. No connection needed.
Recommended For:
Mobile Apps, Websites, Retail
See documentation and demo here
QR Scanner (Cold Credentials)
Scan a QR code in-person, on paper or in PDF.
Recommended For:
Offline, Checkins, Access Management
0Auth / OIDC Adapter
Enable a flow aligned with OIDC standards for easy integration.
Recommended For:
Events, counters, forms, public systems
See documentation and demo here
See our developer guides for how to implement ZADA Core API
🚀
Step 6: Get Started
Define Your Use Cases
Choose which credentials to issue
Choose verification flow and channels
Select Tools
Decide on Portal, AutoIssuer, or API
Assign admin users
Go Through the ZADA Network Onboarding
Fill in the ZADA Network onboarding flow at www.zada.network
Assign Admins
Onboard & Issue
Upload data or connect systems
Start issuing an verifyiong credentials to users
Ready to Transform Your Operations?
Ready to explore how ZADA can transform your organization's operations by enabling digital trust? Our team is here to help you every step of the way.
Have questions or need a personalized consultation?
Reach out to our experts and discover the full potential of ZADA for your organization:
Email:
info@zada.network
Website:
www.zada.network