This section describes guidelines for implementing/integrating Encrypted Identities and Pseudonyms within your application environment.
2a. BSNk Decryptiecomponent integration |
---|
The section outlines considerations regarding integration of the BSNk Decryptiecomponent. |
→ 2a. BSNk Decryptiecomponent integration
2b. Working with pseudonyms |
---|
This section contains information about pseudonyms and implementation recommendations for processing pseudonyms. |
This section contains testscenario's, testdata, sourcecode and documentation for BSNk Decryptiecomponent. |
→ 2c. Source-code and Documentation