This example explains how an application can verify all of a user's available data.
Choose one of the presentation options to continue.