Frequently Asked Questions

Welcome to our FAQ

Here, you'll find answers to frequently asked questions about DWebCRM.

Our aim is to provide valuable insights and practical guidance about DWebCRM.

If you have any questions or feedback, please don't hesitate to contact us. We're here to help you build the future of decentralized identifiers.

A decentralized web CRM is a customer relationship management system that utilizes decentralized web technology to store and manage customer data. The data is stored on a distributed network rather than a centralized database, which offers increased security and privacy.

Composable architecture is an approach to system design where software applications are constructed from small, independent building blocks called services or microservices. Each microservice is responsible for a specific business function or capability and communicates with others through well-defined APIs.

Decentralized Web Nodes (DWN) are a key component of a distributed network in a decentralized web ecosystem. It provides data storage, message relaying, and other functions for entities to locate public or private permissioned data related to Decentralized Identifiers (DIDs). The decentralized nature of DWNs provides improved security, privacy, and data ownership for businesses and individuals in a decentralized web ecosystem.

Identification is the process of verifying that a entity is what it claim to be.

A headless CRM decouples the presentation layer from data repositories. A headless CRM allows you to access and manage data in one place and distribute its data over several places.

By leveraging data protection through our technology by design, we effectively implement data protection principles of our state-of-the-art software architecture.

P2P-DIDs are based on decentralized web nodes without relying on a centralized authority. P2P-DIDs are not based on blockchain technology.

DID-Authentication is a protocol that enables the controller of an DID to sign an encrypted random message. In other words, giving a DID subject proof of ownership of a DID.

It's an exact definition of how a specific DID method scheme is implemented.