diff --git a/src/main/java/core/ResponseContainer.java b/src/main/java/core/ResponseContainer.java
index cd35c20abddc8aac9d794e856f384171af5ef34c..f35fdc5b59b2acd343f853f20183246fa774b677 100644
--- a/src/main/java/core/ResponseContainer.java
+++ b/src/main/java/core/ResponseContainer.java
@@ -17,8 +17,6 @@ along with this program. If not, see <http://www.gnu.org/licenses/>.
 
 package core;
 
-import core.*;
-
 import java.util.ArrayList;
 import java.util.List;
 
diff --git a/src/main/resources/REST/json/Presentation.json b/src/main/resources/REST/json/Presentation.json
index d4678bd4a90860d58fca50bb6376a65ee3134ddc..59434ed31a9ce50d9af36da2bb5b40c0c9bf8afc 100644
--- a/src/main/resources/REST/json/Presentation.json
+++ b/src/main/resources/REST/json/Presentation.json
@@ -1,25 +1,363 @@
 {
-  "@context": [
-    "https://www.w3.org/2018/credentials/v1",
-    "https://w3id.org/security/suites/jws-2020/v1",
-    "https://www.w3.org/2018/credentials/examples/v1"
-  ],
-  "id": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation",
-  "type": "VerifiablePresentation",
-  "verifiableCredential": [
-    {
-      "@context": [
-        "https://www.w3.org/2018/credentials/v1",
-        "https://w3id.org/security/suites/jws-2020/v1",
-        "https://www.w3.org/2018/credentials/examples/v1"
-      ],
-      "credentialSubject": {
-        "allow": true,
-        "id": "example/examplePolicy/1.0"
-      },
-      "issuanceDate": "2022-07-01T11:07:57.975459274Z",
-      "issuer": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation",
-      "type": "VerifiableCredential"
-    }
-  ]
+  "for_proof": {
+    "@context": [
+      "https://www.w3.org/2018/credentials/v1",
+      "https://w3id.org/security/suites/jws-2020/v1",
+      "https://www.w3.org/2018/credentials/examples/v1"
+    ],
+    "id": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation",
+    "type": "VerifiablePresentation",
+    "verifiableCredential": [
+      {
+        "@context": [
+          "https://www.w3.org/2018/credentials/v1",
+          "https://w3id.org/security/suites/jws-2020/v1",
+          "https://www.w3.org/2018/credentials/examples/v1"
+        ],
+        "credentialSubject": {
+          "allow": true,
+          "id": "example/examplePolicy/1.0"
+        },
+        "issuanceDate": "2022-07-21T10:24:36.203848291Z",
+        "issuer": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation",
+        "type": "VerifiableCredential"
+      },
+      {
+        "@context": [
+          "https://www.w3.org/2018/credentials/v1",
+          "https://w3id.org/security/suites/jws-2020/v1",
+          "https://www.w3.org/2018/credentials/examples/v1"
+        ],
+        "credentialSubject": {
+          "allow": true,
+          "id": "example/ProofRequestResponse/1.0"
+        },
+        "issuanceDate": "2022-07-21T10:24:36.203861194Z",
+        "issuer": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation",
+        "type": "VerifiableCredential"
+      }
+    ]
+  },
+  "modified_issuanceDate": {
+    "@context": [
+      "https://www.w3.org/2018/credentials/v1",
+      "https://w3id.org/security/suites/jws-2020/v1",
+      "https://www.w3.org/2018/credentials/examples/v1"
+    ],
+    "id": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation",
+    "proof": {
+      "created": "2022-07-21T14:28:09.071187173Z",
+      "jws": "eyJhbGciOiJKc29uV2ViU2lnbmF0dXJlMjAyMCIsImI2NCI6ZmFsc2UsImNyaXQiOlsiYjY0Il19..MEQCIFkavr6XpAYbdurBmQXNei-hI8WHAcnEYkZ6J3i4d3FKAiA4BtVCAixsAypaJ5dcBxn96Ju1OGfi7Kw1QRZMlMumhg",
+      "proofPurpose": "assertionMethod",
+      "type": "JsonWebSignature2020",
+      "verificationMethod": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation#key1"
+    },
+    "type": "VerifiablePresentation",
+    "verifiableCredential": [
+      {
+        "@context": [
+          "https://www.w3.org/2018/credentials/v1",
+          "https://w3id.org/security/suites/jws-2020/v1",
+          "https://www.w3.org/2018/credentials/examples/v1"
+        ],
+        "credentialSubject": {
+          "allow": true,
+          "id": "example/examplePolicy/1.0"
+        },
+        "issuanceDate": "2022-07-21T10:24:36.203848291Z",
+        "issuer": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation",
+        "type": "VerifiableCredential"
+      },
+      {
+        "@context": [
+          "https://www.w3.org/2018/credentials/v1",
+          "https://w3id.org/security/suites/jws-2020/v1",
+          "https://www.w3.org/2018/credentials/examples/v1"
+        ],
+        "credentialSubject": {
+          "allow": true,
+          "id": "example/ProofRequestResponse/1.0"
+        },
+        "issuanceDate": "2023-07-21T10:24:36.203861194Z",
+        "issuer": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation",
+        "type": "VerifiableCredential"
+      }
+    ]
+  },
+  "modified_credentialSubject_1_allow": {
+    "@context": [
+      "https://www.w3.org/2018/credentials/v1",
+      "https://w3id.org/security/suites/jws-2020/v1",
+      "https://www.w3.org/2018/credentials/examples/v1"
+    ],
+    "id": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation",
+    "proof": {
+      "created": "2022-07-21T14:28:09.071187173Z",
+      "jws": "eyJhbGciOiJKc29uV2ViU2lnbmF0dXJlMjAyMCIsImI2NCI6ZmFsc2UsImNyaXQiOlsiYjY0Il19..MEQCIFkavr6XpAYbdurBmQXNei-hI8WHAcnEYkZ6J3i4d3FKAiA4BtVCAixsAypaJ5dcBxn96Ju1OGfi7Kw1QRZMlMumhg",
+      "proofPurpose": "assertionMethod",
+      "type": "JsonWebSignature2020",
+      "verificationMethod": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation#key1"
+    },
+    "type": "VerifiablePresentation",
+    "verifiableCredential": [
+      {
+        "@context": [
+          "https://www.w3.org/2018/credentials/v1",
+          "https://w3id.org/security/suites/jws-2020/v1",
+          "https://www.w3.org/2018/credentials/examples/v1"
+        ],
+        "credentialSubject": {
+          "allow": false,
+          "id": "example/examplePolicy/1.0"
+        },
+        "issuanceDate": "2022-07-21T10:24:36.203848291Z",
+        "issuer": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation",
+        "type": "VerifiableCredential"
+      },
+      {
+        "@context": [
+          "https://www.w3.org/2018/credentials/v1",
+          "https://w3id.org/security/suites/jws-2020/v1",
+          "https://www.w3.org/2018/credentials/examples/v1"
+        ],
+        "credentialSubject": {
+          "allow": true,
+          "id": "example/ProofRequestResponse/1.0"
+        },
+        "issuanceDate": "2022-07-21T10:24:36.203861194Z",
+        "issuer": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation",
+        "type": "VerifiableCredential"
+      }
+    ]
+  },
+  "modified_credentialSubject_2_allow": {
+    "@context": [
+      "https://www.w3.org/2018/credentials/v1",
+      "https://w3id.org/security/suites/jws-2020/v1",
+      "https://www.w3.org/2018/credentials/examples/v1"
+    ],
+    "id": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation",
+    "proof": {
+      "created": "2022-07-21T14:28:09.071187173Z",
+      "jws": "eyJhbGciOiJKc29uV2ViU2lnbmF0dXJlMjAyMCIsImI2NCI6ZmFsc2UsImNyaXQiOlsiYjY0Il19..MEQCIFkavr6XpAYbdurBmQXNei-hI8WHAcnEYkZ6J3i4d3FKAiA4BtVCAixsAypaJ5dcBxn96Ju1OGfi7Kw1QRZMlMumhg",
+      "proofPurpose": "assertionMethod",
+      "type": "JsonWebSignature2020",
+      "verificationMethod": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation#key1"
+    },
+    "type": "VerifiablePresentation",
+    "verifiableCredential": [
+      {
+        "@context": [
+          "https://www.w3.org/2018/credentials/v1",
+          "https://w3id.org/security/suites/jws-2020/v1",
+          "https://www.w3.org/2018/credentials/examples/v1"
+        ],
+        "credentialSubject": {
+          "allow": true,
+          "id": "example/examplePolicy/1.0"
+        },
+        "issuanceDate": "2022-07-21T10:24:36.203848291Z",
+        "issuer": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation",
+        "type": "VerifiableCredential"
+      },
+      {
+        "@context": [
+          "https://www.w3.org/2018/credentials/v1",
+          "https://w3id.org/security/suites/jws-2020/v1",
+          "https://www.w3.org/2018/credentials/examples/v1"
+        ],
+        "credentialSubject": {
+          "allow": false,
+          "id": "example/ProofRequestResponse/1.0"
+        },
+        "issuanceDate": "2022-07-21T10:24:36.203861194Z",
+        "issuer": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation",
+        "type": "VerifiableCredential"
+      }
+    ]
+  },
+  "modified_credentialSubject_1_ID": {
+    "@context": [
+      "https://www.w3.org/2018/credentials/v1",
+      "https://w3id.org/security/suites/jws-2020/v1",
+      "https://www.w3.org/2018/credentials/examples/v1"
+    ],
+    "id": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation",
+    "proof": {
+      "created": "2022-07-21T14:28:09.071187173Z",
+      "jws": "eyJhbGciOiJKc29uV2ViU2lnbmF0dXJlMjAyMCIsImI2NCI6ZmFsc2UsImNyaXQiOlsiYjY0Il19..MEQCIFkavr6XpAYbdurBmQXNei-hI8WHAcnEYkZ6J3i4d3FKAiA4BtVCAixsAypaJ5dcBxn96Ju1OGfi7Kw1QRZMlMumhg",
+      "proofPurpose": "assertionMethod",
+      "type": "JsonWebSignature2020",
+      "verificationMethod": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation#key1"
+    },
+    "type": "VerifiablePresentation",
+    "verifiableCredential": [
+      {
+        "@context": [
+          "https://www.w3.org/2018/credentials/v1",
+          "https://w3id.org/security/suites/jws-2020/v1",
+          "https://www.w3.org/2018/credentials/examples/v1"
+        ],
+        "credentialSubject": {
+          "allow": true,
+          "id": "example/examplePolicy/2.0"
+        },
+        "issuanceDate": "2022-07-21T10:24:36.203848291Z",
+        "issuer": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation",
+        "type": "VerifiableCredential"
+      },
+      {
+        "@context": [
+          "https://www.w3.org/2018/credentials/v1",
+          "https://w3id.org/security/suites/jws-2020/v1",
+          "https://www.w3.org/2018/credentials/examples/v1"
+        ],
+        "credentialSubject": {
+          "allow": true,
+          "id": "example/ProofRequestResponse/1.0"
+        },
+        "issuanceDate": "2022-07-21T10:24:36.203861194Z",
+        "issuer": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation",
+        "type": "VerifiableCredential"
+      }
+    ]
+  },
+  "modified_credentialSubject_2_ID": {
+    "@context": [
+      "https://www.w3.org/2018/credentials/v1",
+      "https://w3id.org/security/suites/jws-2020/v1",
+      "https://www.w3.org/2018/credentials/examples/v1"
+    ],
+    "id": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation",
+    "proof": {
+      "created": "2022-07-21T14:28:09.071187173Z",
+      "jws": "eyJhbGciOiJKc29uV2ViU2lnbmF0dXJlMjAyMCIsImI2NCI6ZmFsc2UsImNyaXQiOlsiYjY0Il19..MEQCIFkavr6XpAYbdurBmQXNei-hI8WHAcnEYkZ6J3i4d3FKAiA4BtVCAixsAypaJ5dcBxn96Ju1OGfi7Kw1QRZMlMumhg",
+      "proofPurpose": "assertionMethod",
+      "type": "JsonWebSignature2020",
+      "verificationMethod": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation#key1"
+    },
+    "type": "VerifiablePresentation",
+    "verifiableCredential": [
+      {
+        "@context": [
+          "https://www.w3.org/2018/credentials/v1",
+          "https://w3id.org/security/suites/jws-2020/v1",
+          "https://www.w3.org/2018/credentials/examples/v1"
+        ],
+        "credentialSubject": {
+          "allow": true,
+          "id": "example/examplePolicy/1.0"
+        },
+        "issuanceDate": "2022-07-21T10:24:36.203848291Z",
+        "issuer": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation",
+        "type": "VerifiableCredential"
+      },
+      {
+        "@context": [
+          "https://www.w3.org/2018/credentials/v1",
+          "https://w3id.org/security/suites/jws-2020/v1",
+          "https://www.w3.org/2018/credentials/examples/v1"
+        ],
+        "credentialSubject": {
+          "allow": true,
+          "id": "example/ProofRequestResponse/2.0"
+        },
+        "issuanceDate": "2022-07-21T10:24:36.203861194Z",
+        "issuer": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation",
+        "type": "VerifiableCredential"
+      }
+    ]
+  },
+  "modified_ID": {
+    "@context": [
+      "https://www.w3.org/2018/credentials/v1",
+      "https://w3id.org/security/suites/jws-2020/v1",
+      "https://www.w3.org/2018/credentials/examples/v1"
+    ],
+    "id": "did:web:XXX.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation",
+    "proof": {
+      "created": "2022-07-21T14:28:09.071187173Z",
+      "jws": "eyJhbGciOiJKc29uV2ViU2lnbmF0dXJlMjAyMCIsImI2NCI6ZmFsc2UsImNyaXQiOlsiYjY0Il19..MEQCIFkavr6XpAYbdurBmQXNei-hI8WHAcnEYkZ6J3i4d3FKAiA4BtVCAixsAypaJ5dcBxn96Ju1OGfi7Kw1QRZMlMumhg",
+      "proofPurpose": "assertionMethod",
+      "type": "JsonWebSignature2020",
+      "verificationMethod": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation#key1"
+    },
+    "type": "VerifiablePresentation",
+    "verifiableCredential": [
+      {
+        "@context": [
+          "https://www.w3.org/2018/credentials/v1",
+          "https://w3id.org/security/suites/jws-2020/v1",
+          "https://www.w3.org/2018/credentials/examples/v1"
+        ],
+        "credentialSubject": {
+          "allow": true,
+          "id": "example/examplePolicy/1.0"
+        },
+        "issuanceDate": "2022-07-21T10:24:36.203848291Z",
+        "issuer": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation",
+        "type": "VerifiableCredential"
+      },
+      {
+        "@context": [
+          "https://www.w3.org/2018/credentials/v1",
+          "https://w3id.org/security/suites/jws-2020/v1",
+          "https://www.w3.org/2018/credentials/examples/v1"
+        ],
+        "credentialSubject": {
+          "allow": true,
+          "id": "example/ProofRequestResponse/1.0"
+        },
+        "issuanceDate": "2022-07-21T10:24:36.203861194Z",
+        "issuer": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation",
+        "type": "VerifiableCredential"
+      }
+    ]
+  },
+  "modified_proof_created": {
+    "@context": [
+      "https://www.w3.org/2018/credentials/v1",
+      "https://w3id.org/security/suites/jws-2020/v1",
+      "https://www.w3.org/2018/credentials/examples/v1"
+    ],
+    "id": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation",
+    "proof": {
+      "created": "2023-07-21T14:28:09.071187173Z",
+      "jws": "eyJhbGciOiJKc29uV2ViU2lnbmF0dXJlMjAyMCIsImI2NCI6ZmFsc2UsImNyaXQiOlsiYjY0Il19..MEQCIFkavr6XpAYbdurBmQXNei-hI8WHAcnEYkZ6J3i4d3FKAiA4BtVCAixsAypaJ5dcBxn96Ju1OGfi7Kw1QRZMlMumhg",
+      "proofPurpose": "assertionMethod",
+      "type": "JsonWebSignature2020",
+      "verificationMethod": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation#key1"
+    },
+    "type": "VerifiablePresentation",
+    "verifiableCredential": [
+      {
+        "@context": [
+          "https://www.w3.org/2018/credentials/v1",
+          "https://w3id.org/security/suites/jws-2020/v1",
+          "https://www.w3.org/2018/credentials/examples/v1"
+        ],
+        "credentialSubject": {
+          "allow": true,
+          "id": "example/examplePolicy/1.0"
+        },
+        "issuanceDate": "2022-07-21T10:24:36.203848291Z",
+        "issuer": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation",
+        "type": "VerifiableCredential"
+      },
+      {
+        "@context": [
+          "https://www.w3.org/2018/credentials/v1",
+          "https://w3id.org/security/suites/jws-2020/v1",
+          "https://www.w3.org/2018/credentials/examples/v1"
+        ],
+        "credentialSubject": {
+          "allow": true,
+          "id": "example/ProofRequestResponse/1.0"
+        },
+        "issuanceDate": "2022-07-21T10:24:36.203861194Z",
+        "issuer": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation",
+        "type": "VerifiableCredential"
+      }
+    ]
+  }
 }
\ No newline at end of file
diff --git a/src/test/java/api/test/core/GeneralStepDefinitions.java b/src/test/java/api/test/core/GeneralStepDefinitions.java
index 3ace023c3f4bf6e4ab37c670de6b61fa3e5eaa10..2d0e310133cd5e6f50ba6f0dc21c2cfe555fb826 100644
--- a/src/test/java/api/test/core/GeneralStepDefinitions.java
+++ b/src/test/java/api/test/core/GeneralStepDefinitions.java
@@ -27,7 +27,6 @@ import cucumber.api.java.After;
 import cucumber.api.java.Before;
 import cucumber.api.java.en.*;
 import exceptions.RAFException;
-import org.apache.commons.collections.FactoryUtils;
 import org.apache.commons.lang3.RandomStringUtils;
 import org.apache.commons.lang3.StringUtils;
 import org.apache.logging.log4j.LogManager;
@@ -1464,4 +1463,8 @@ public class GeneralStepDefinitions extends BaseStepDefinitions {
         assertEquals("Expected values doesn't match actual: ", expectedResultAsList, actualResultAsString);
     }
 
+    @Then("I get the last response body and load it to the current request body")
+    public void iGetTheLastResponseBodyAndLoadItToTheCurrentRequestBody() {
+        currentRequest.setBody(getLastResponse().getBody());
+    }
 }
\ No newline at end of file
diff --git a/src/test/java/api/test/rest/tsa/signer/SignerStepDefinitions.java b/src/test/java/api/test/rest/tsa/signer/SignerStepDefinitions.java
index 0bdf245d21e958361db839be618e3e4a85194aea..2f1235917de27e787d68687d6922823f9e4ad95b 100644
--- a/src/test/java/api/test/rest/tsa/signer/SignerStepDefinitions.java
+++ b/src/test/java/api/test/rest/tsa/signer/SignerStepDefinitions.java
@@ -4,7 +4,6 @@ import api.test.core.BaseStepDefinitions;
 import api.test.rest.RestGeneralStepDefinitions;
 import api.test.rest.RestSessionContainer;
 import core.*;
-import cucumber.api.java.en.Given;
 import cucumber.api.java.en.When;
 import org.apache.logging.log4j.LogManager;
 import org.apache.logging.log4j.Logger;
@@ -13,6 +12,7 @@ public class SignerStepDefinitions  extends BaseStepDefinitions {
     private static final Logger logger = LogManager.getLogger(RestGeneralStepDefinitions.class.getSimpleName());
     RestSessionContainer restSessionContainer;
     Request currentRequest;
+    private String body;
 
     public SignerStepDefinitions(RestSessionContainer restSessionContainer, Request currentRequest, DataContainer dataContainer) {
         super(dataContainer);
@@ -59,4 +59,12 @@ public class SignerStepDefinitions  extends BaseStepDefinitions {
         addRequest(currentRequest);
         addResponse(response);
     }
+
+    @When("I verify presentation proof via TSA Signer API")
+    public void iVerifyPresentationProofViaTSASignerAPI() {
+        currentRequest.setPath("/v1/presentation/verify");
+        Response response = RestClient.post(currentRequest);
+        addRequest(currentRequest);
+        addResponse(response);
+    }
 }
diff --git a/src/test/java/api/test/rest/tsa/task/TaskStepDefinitions.java b/src/test/java/api/test/rest/tsa/task/TaskStepDefinitions.java
index f86a00ba1580ff449410bbf7e53ecaefd79bd174..0ba5b009e972db8dd9b496cd3dfca0aacd8388b0 100644
--- a/src/test/java/api/test/rest/tsa/task/TaskStepDefinitions.java
+++ b/src/test/java/api/test/rest/tsa/task/TaskStepDefinitions.java
@@ -3,21 +3,14 @@ package api.test.rest.tsa.task;
 import api.test.core.BaseStepDefinitions;
 import api.test.rest.RestGeneralStepDefinitions;
 import api.test.rest.RestSessionContainer;
-import com.jayway.jsonpath.Configuration;
 import com.jayway.jsonpath.JsonPath;
-import com.jayway.jsonpath.Option;
-import com.jayway.jsonpath.ReadContext;
 import core.*;
 import cucumber.api.java.en.And;
-import cucumber.api.java.en.Given;
 import org.apache.logging.log4j.LogManager;
 import org.apache.logging.log4j.Logger;
 
 import java.util.List;
 
-import static org.junit.Assert.assertEquals;
-import static org.junit.Assert.assertTrue;
-
 public class TaskStepDefinitions extends BaseStepDefinitions{
     private static final Logger logger = LogManager.getLogger(RestGeneralStepDefinitions.class.getSimpleName());
     RestSessionContainer restSessionContainer;
diff --git a/src/test/resources/features/tsa/signer/v1/presentation/proof/POST.feature b/src/test/resources/features/tsa/signer/v1/presentation/proof/POST.feature
index 94b03ca3ae119ad86c6c3bdb6109ec7b673f0fea..31ed9b5c37c7ae5c27493b277f435cc943ff4a66 100644
--- a/src/test/resources/features/tsa/signer/v1/presentation/proof/POST.feature
+++ b/src/test/resources/features/tsa/signer/v1/presentation/proof/POST.feature
@@ -26,7 +26,7 @@ Feature: API - TSA - Signer presentation proof - v1/presentation/proof POST
     Given we are testing the TSA Signer Api
 
   Scenario: TSA - create presentation proof - Positive
-    When I load the request from json {/REST/json/Presentation.json}
+    When I load the REST request {Presentation.json} with profile {for_proof}
     When I create presentation proof via TSA Signer API
     And the status code should be {200}
     And the response is valid according to the {Signer_PresentationProof_schema.json} REST schema
diff --git a/src/test/resources/features/tsa/signer/v1/presentation/verify/POST.feature b/src/test/resources/features/tsa/signer/v1/presentation/verify/POST.feature
new file mode 100644
index 0000000000000000000000000000000000000000..674b870ce55337101725e195e9d5c5d612e49ba5
--- /dev/null
+++ b/src/test/resources/features/tsa/signer/v1/presentation/verify/POST.feature
@@ -0,0 +1,115 @@
+#Copyright (c) 2018 Vereign AG [https://www.vereign.com]
+#
+#This is free software: you can redistribute it and/or modify
+#it under the terms of the GNU Affero General Public License as
+#published by the Free Software Foundation, either version 3 of the
+#License, or (at your option) any later version.
+#
+#This program is distributed in the hope that it will be useful,
+#but WITHOUT ANY WARRANTY; without even the implied warranty of
+#MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+#GNU Affero General Public License for more details.
+#
+#You should have received a copy of the GNU Affero General Public License
+#along with this program. If not, see <http://www.gnu.org/licenses/>.
+
+#https://gaiax.vereign.com/tsa/signer/v1/presentation/verify
+#Author: Georgi Michev georgi.michev@vereign.com
+
+@rest @all @tsa @signer
+Feature: API - TSA - Signer presentation verify - v1/presentation/verify POST
+  As user
+  I want to verify a presentation
+  So I know it is valid
+
+  Background:
+    Given we are testing the TSA Signer Api
+
+  Scenario: TSA - verify presentation proof - Positive
+    When I load the REST request {Presentation.json} with profile {for_proof}
+    When I create presentation proof via TSA Signer API
+    And the status code should be {200}
+    And the response is valid according to the {Signer_PresentationProof_schema.json} REST schema
+    And the field {proof.verificationMethod} has the value {did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation#key1}
+    Then I get the last response body and load it to the current request body
+    And I verify presentation proof via TSA Signer API
+    And the status code should be {200}
+    And the field {valid} has the value {true}
+
+  @negative
+  Scenario: TSA - verify presentation proof with modified ID field - Negative
+    When I load the REST request {Presentation.json} with profile {for_proof}
+    When I create presentation proof via TSA Signer API
+    And the status code should be {200}
+    And the response is valid according to the {Signer_PresentationProof_schema.json} REST schema
+    And the field {proof.verificationMethod} has the value {did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation#key1}
+    Then I get the last response body and load it to the current request body
+    When I load the REST request {Presentation.json} with profile {modified_ID}
+    And I verify presentation proof via TSA Signer API
+    And the status code should be {400}
+    And the field {message} has the value {check embedded proof: check linked data proof: ecdsa: invalid signature}
+
+  @negative
+  Scenario: TSA - verify presentation proof with modified issuanceDate field - Negative
+    When I load the REST request {Presentation.json} with profile {for_proof}
+    When I create presentation proof via TSA Signer API
+    And the status code should be {200}
+    And the response is valid according to the {Signer_PresentationProof_schema.json} REST schema
+    And the field {proof.verificationMethod} has the value {did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation#key1}
+    Then I get the last response body and load it to the current request body
+    When I load the REST request {Presentation.json} with profile {modified_issuanceDate}
+    And I verify presentation proof via TSA Signer API
+    And the status code should be {400}
+    And the field {message} has the value {check embedded proof: check linked data proof: ecdsa: invalid signature}
+
+  @wip @bug-issue-signer#16 @negative
+  Scenario: TSA - verify presentation proof with modified credentialSubject.allow field - Negative
+    When I load the REST request {Presentation.json} with profile {for_proof}
+    When I create presentation proof via TSA Signer API
+    And the status code should be {200}
+    And the response is valid according to the {Signer_PresentationProof_schema.json} REST schema
+    And the field {proof.verificationMethod} has the value {did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation#key1}
+    Then I get the last response body and load it to the current request body
+    When I load the REST request {Presentation.json} with profile {modified_credentialSubject_1_allow}
+    And I verify presentation proof via TSA Signer API
+#    And the status code should be {400}
+#    And the field {message} has the value {check embedded proof: check linked data proof: ecdsa: invalid signature}
+
+  @wip @bug-issue-signer#16 @negative
+  Scenario: TSA - verify presentation proof with modified credentialSubject.allow field - Negative
+    When I load the REST request {Presentation.json} with profile {for_proof}
+    When I create presentation proof via TSA Signer API
+    And the status code should be {200}
+    And the response is valid according to the {Signer_PresentationProof_schema.json} REST schema
+    And the field {proof.verificationMethod} has the value {did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation#key1}
+    Then I get the last response body and load it to the current request body
+    When I load the REST request {Presentation.json} with profile {modified_credentialSubject_2_allow}
+    And I verify presentation proof via TSA Signer API
+#    And the status code should be {400}
+#    And the field {message} has the value {check embedded proof: check linked data proof: ecdsa: invalid signature}
+
+  @wip @bug-issue-signer#16 @negative
+  Scenario: TSA - verify presentation proof with modified credentialSubject.ID field - Negative
+    When I load the REST request {Presentation.json} with profile {for_proof}
+    When I create presentation proof via TSA Signer API
+    And the status code should be {200}
+    And the response is valid according to the {Signer_PresentationProof_schema.json} REST schema
+    And the field {proof.verificationMethod} has the value {did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation#key1}
+    Then I get the last response body and load it to the current request body
+    When I load the REST request {Presentation.json} with profile {modified_credentialSubject_1_ID}
+    And I verify presentation proof via TSA Signer API
+#    And the status code should be {400}
+#    And the field {message} has the value {check embedded proof: check linked data proof: ecdsa: invalid signature}
+
+  @wip @bug-issue-signer#16 @negative
+  Scenario: TSA - verify presentation proof with modified credentialSubject.ID field - Negative
+    When I load the REST request {Presentation.json} with profile {for_proof}
+    When I create presentation proof via TSA Signer API
+    And the status code should be {200}
+    And the response is valid according to the {Signer_PresentationProof_schema.json} REST schema
+    And the field {proof.verificationMethod} has the value {did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation#key1}
+    Then I get the last response body and load it to the current request body
+    When I load the REST request {Presentation.json} with profile {modified_credentialSubject_2_ID}
+    And I verify presentation proof via TSA Signer API
+#    And the status code should be {400}
+#    And the field {message} has the value {check embedded proof: check linked data proof: ecdsa: invalid signature}