diff --git a/features/proof/findProofByPresentationId.feature b/features/proof/findProofByPresentationId.feature
new file mode 100644
index 0000000000000000000000000000000000000000..3f79e64fd13c201d7770d7cb9ffc43c4b7d539bb
--- /dev/null
+++ b/features/proof/findProofByPresentationId.feature
@@ -0,0 +1,29 @@
+Feature: Get Proof Presentation By Id
+        Return the single proof presentation details
+
+Scenario: Provide valid presentation id
+    Given The presentation id is available on agent database.
+    When  provide valid presentation id.
+    Then  should return proof presentation details.
+
+Scenario: Provide invalid presentation id
+    Given The presentation id available.
+    When  provide invalid presentation id.
+    Then  should return no data found with status code 404.
+
+Scenario: Provide validated page and pageSize
+    Given proof presentation data available on OCM database. 
+    When  passed valid page.
+    And   passed valid pageSize.
+    Then  should get proof presentation list.
+
+Scenario: Provide validated page and pageSize
+    Given proof presentation data is not available on OCM database.
+    When  passed valid page.
+    And   passed valid pageSize.
+    Then  should get http status 404.
+    
+Scenario: Not provide a presentation id
+    Given The presentation id available.
+    When  not provide presentation id.
+    Then  should return presentation request required following attributes ( presentation_id ) with status code 400.
\ No newline at end of file
diff --git a/features/proof/sendOutOfBandPresentationRequest.feature b/features/proof/sendOutOfBandPresentationRequest.feature
new file mode 100644
index 0000000000000000000000000000000000000000..b8c631cd566f1c2ef4bdd0cd413f428a57dd7fa9
--- /dev/null
+++ b/features/proof/sendOutOfBandPresentationRequest.feature
@@ -0,0 +1,14 @@
+As a OCM Admin 
+    I want to verify credentials without connection.
+
+Scenario: OCM admin verify credentials
+    Given PCM user should hold credentials in there wallet.
+    When  OCM verifer orgnization sends a proof presentation request with following fields ( schemaId or credentialDefId, attributes ) to PCM user.
+    And   PCM user share the attributes from requested credentials to OCM verifer.
+    And   OCM verifer verify the presentation acknowledgement.    
+    Then  Presentation request should be in 'verified' state.
+
+Scenario: OCM admin verify credentials
+    Given PCM user should hold credentials in there wallet.
+    When  OCM admin send a credential request to PCM user.
+    And   PCM user decline the credential request witch will requested from OCM admin.   
diff --git a/features/proof/sendPresentationRequest.feature b/features/proof/sendPresentationRequest.feature
new file mode 100644
index 0000000000000000000000000000000000000000..ad11156844ffbd25faba9d8ac50ae257d7dfc80b
--- /dev/null
+++ b/features/proof/sendPresentationRequest.feature
@@ -0,0 +1,18 @@
+As a OCM Admin 
+    I want to verify credentials.
+
+Scenario: OCM admin verify credentials
+    Given PCM user should hold credentials in there wallet.
+    And   PCM user connection must be in trusted state with verifer.
+    When  OCM verifer orgnization sends a proof presentation request with following fields ( connectionId, schemaId or credentialDefId, attributes ) to PCM user.
+    And   PCM user share the attributes from requested credentials to OCM verifer.
+    And   OCM verifer verify the presentation acknowledgement.    
+    Then  Presentation request should be in 'verified' state.
+
+Scenario: PCM user decline proof request
+    Given PCM user should hold credentials in there wallet.
+    And   PCM user connection must be in trusted state with verifer.
+    When  OCM verifer orgnization sends a proof presentation request with following fields ( connectionId, schemaId or credentialDefId, attributes ) to PCM user.
+    And   PCM user declines the presentation request.
+    Then  Presentation request is not 'verified'.  
+
diff --git a/features/proof/sendPrincipalCredentialPresentationRequest.feature b/features/proof/sendPrincipalCredentialPresentationRequest.feature
new file mode 100644
index 0000000000000000000000000000000000000000..fd68ed18adb523db49393e5dd4e4ba386c9c4ddc
--- /dev/null
+++ b/features/proof/sendPrincipalCredentialPresentationRequest.feature
@@ -0,0 +1,10 @@
+Feature: I am able to prove as GAIA-X ecosystem member.
+         To make the existing connection trusted.
+
+Scenario: Make the existing connection trusted
+    Given PCM user should hold principal membership credentials in there wallet.
+    And   PCM user connection must be in complete state with verifer.
+    When  OCM verifer orgnization sends a proof presentation request with following fields ( schemaId, attributes ) to PCM user.
+    And   PCM user share the attributes from requested credentials to OCM verifer.
+    And   OCM verifer verify the presentation acknowledgement.    
+    Then  Presentation request should be in 'trusted' state.