Public Key Algorithms
The list of preferred algorithms is provided to an authenticator when you are creating a credential, and an authenticator makes a best-effort to create the most preferred credential that it can.
There are several cryptographic algorithms for which a Relying Party might specify a preference. The following algorithms are currently supported in IBM Security Verify Access:
Description COSE Identifier SHA256 with ECDSA -7 SHA384 with ECDSA -35 SHA512 with ECDSA -36 SHA1 with RSA -65535 SHA256 with RSA -257 SHA384 with RSA -258 SHA512 with RSA -259
Parent topic: Concepts