diff --git a/internal/service/signer/service_test.go b/internal/service/signer/service_test.go
index 0d954e4e63ff2a4c17dfccd4c3c9947e4bb08156..6ca0667c8089b8e78214f7fce9394559a72f4883 100644
--- a/internal/service/signer/service_test.go
+++ b/internal/service/signer/service_test.go
@@ -8,6 +8,7 @@ import (
 	"encoding/json"
 	"net/http"
 	"testing"
+	"time"
 
 	"github.com/hyperledger/aries-framework-go/pkg/doc/verifiable"
 	"github.com/square/go-jose/v3"
@@ -322,19 +323,6 @@ func TestService_CredentialProof(t *testing.T) {
 			errkind: errors.Internal,
 			errtext: "error getting signing key",
 		},
-		{
-			name:       "valid credential but signer returns internal error",
-			namespace:  "transit",
-			keyname:    "key2",
-			credential: []byte(validCredential),
-			signer: &signerfakes.FakeVault{
-				KeyStub: func(ctx context.Context, namespace, key string) (*signer.VaultKey, error) {
-					return nil, errors.New(errors.Internal)
-				},
-			},
-			errkind: errors.Internal,
-			errtext: "error getting signing key",
-		},
 		{
 			name:       "valid credential but signer returns unsupported key type",
 			namespace:  "transit",
@@ -452,6 +440,12 @@ func TestService_CredentialProof(t *testing.T) {
 				assert.NotEmpty(t, vc.Proofs[0]["jws"])
 			}
 		})
+
+		// Wait after each test case, because W3C domain has
+		// rate limiter, and resolving of VC base JSONLD contexts
+		// (i.e. https://www.w3.org/2018/credentials/v1)
+		// fails, which makes the tests fail.
+		time.Sleep(2 * time.Second)
 	}
 }