The Developer Dashboard is a self-service platform for partners of the Moca Network. It provides the tools for both developers of AIR Account and AIR Credential and has the following key sections:Documentation Index
Fetch the complete documentation index at: https://docs.moca.network/llms.txt
Use this file to discover all available pages before exploring further.
- Account
- Issuer
- Verifiers
Account
The account section contains your partner configuration.1. General Settings
This is where you can get a generated set of IDs that is used for your implementation. Partner ID, Issuer DID or Verifier DID, and JWKS URL are all mandatory fields for any partner that issues or verifies credentials — configure all four before integrating the SDK. Below is an example of what your generated settings might look like, which you can easily copy from the dashboard.| Field | Description |
|---|---|
| Partner ID | Your AIR Kit partner ID, used to identify you across the AIR Kit ecosystem. |
| Issuer DID | Your Issuer DID, used to let users and verifiers know who is the issuer of the credentials. |
| Verifier DID | Your Verifier DID, used to let users and issuers know who requested usage of the credentials. |
| Name | Your App’s name, which may be shown to users during various operations such as wallet transactions, credential issuance, or credential verification. |
| Logo URL | Your App’s logo, which may be shown to users during various operations such as wallet transactions, credential issuance, or credential verification. |
| Website URL | Your App’s website, which may be shown to users if they want to learn more about your application. |
| JWKS URL | Blocking for SDK issueCredential and verifyCredential as well as Issue on Behalf. Must be a public HTTPS URL reachable from AIR servers. Also required if you use the bring your own auth feature. See JWKS endpoint setup. |
2. Allowed Domains
As a security setting, we require partners to set the app domains that are allowed to load AIR Kit. Wildcards are supported (e.g. *.myapp.example.com) You can add up to 3 domains or subdomains as you need. But do note that some domains may be blocked for security purposes and if you require these domains to be supported please reach out to our team to further discuss your requirements.localhost is whitelisted for following ports: 3000, 5173 and 8200. We do not support adding localhost to the allowed domains list.
In addition, our production environment requires all domains to use HTTPS.Issuer
The Issuer section is designed for any entity that needs to create and distribute verifiable credentials. Its functionalities are organized into three main areas: Schemas, Credentials, and a monitoring Dashboard.1. Schema Builder
This is the starting point for creating any new credential. A Schema acts as a blueprint, defining the structure, data type, and rules for a specific type of credential.- Create Schemas: Issuers can build custom schemas by defining a title, version, and description.
- Define Attributes: Within each schema, issuers add specific data fields (attributes). For each attribute, they define a name, data type (e.g., string, number, boolean), a descriptive title, and can mark it as required.
- Publish and Store: Once defined, schemas are published and stored on either a centralized server (OSS) or decentralized storage (dStorage) on Moca Chain to be used for issuing credentials.
2. Issuance Program
Once a schema is in place, issuers can create and configure the actual credentials that will be distributed to users.- Select a Schema: The process begins by selecting the appropriate schema, which loads its predefined attributes.
- Set Issuance Rules: Issuers can configure key parameters for the credential, such as:
- Accessible Until: An optional date range during which the credential is valid.
- Maximum Issuance: An optional cap on the total number of credentials that can be claimed.
- Expiration Duration: The lifespan of the credential after it has been issued to a user (e.g., 90 days, 1 year, permanent).
- Issue Credential: After confirming the details, the credential is issued and becomes available for users to claim.
3. Issuer Dashboard Monitoring
This section provides a high-level overview and detailed logs of all issuance activity.- Key Metrics: View statistics like the Total Issued Number (the total number of credentials claimed by users) and the Total Credential Number (the number of different credential types created).
- Claim Records: See a detailed list of every credential that has been claimed by a user, including the Holder ID, Credential ID, and the Claimed Time. Issuers can also revoke a claimed credential directly from this interface.
Verifier
The Verifier section is for any application or service that needs to confirm the validity of a user’s AIR Credential. It is centered around creating Verification Programs and monitoring their usage.1. Verification Program Management
A Verification Program is a set of rules created by a verifier to check a user’s credential for specific attributes.- Create Programs: Verifiers build programs by defining a name and selecting the credential schema they intend to verify.
- Define Verification Logic: The core of the program is its logic. Verifiers add specific Operators (e.g., “equals,” “greater than,” “is a member of”) and Attribute Values to create precise verification conditions. For example, a program could verify if a “Country” attribute equals “USA” or if an “Age” attribute is greater than “18”.
- Data Recovery Options: Programs can be configured to allow verifiers to request access to the underlying data from the user, subject to their explicit consent.
2. Verifier Dashboard Monitoring
This dashboard provides a comprehensive record of all verification activities.- Key Metrics: View the Total Verified Number of credentials and other relevant statistics.
- Verification Records: Access a detailed log of all verification attempts, including the Holder ID, the Program Name used, the Verified Time, and the Current Status (e.g., Passed, Verification Failed).