Stay Tuned and Subscribe For Updates

Enter your email to subscribe:


Decentralized Identity Is Based on Traditional Identity

Everyone has an identity. Or rather, identifiers and attributes that describe their identity. 

Things like your name, your date of birth (DOB), your passport number, your address, your email address, and much more are all identifiers. 

These are typically assigned or verified by an authority: the government issues your passport and assigns the number, while a Utility Bill or Bank Statement verifies that you live at your address. 

Traditional IAM

Sometimes these are chosen by yourself, like your email address. 

You can also have an identity assigned to you by your employer. This is the identity that is used for all things related to IAM. 


Why Decentralized Identity Came On the Scene

Our world is changing, with many services shifting online or to digital formats.

This changes the way we apply our identity to access services, or to interact in our places of work.

It’s now quite common to create an account to access a service: social media, to purchase train or plane tickets more quickly, to manage your bank accounts, access health services… the list goes on. 

For some of these services, we only need to present a few identifiers, like your name, DOB, and email.

For others, identifiers must be verified to a certain level of assurance to make sure you are who you say you are: your driver’s license, passport, tax ID number, etc. 

The question is, how do we share an identity document like a passport or driver’s license digitally?

Scanning a picture of your passport and sending it as an email attachment is a terrible idea – both for your privacy, and for whoever is on the other end processing it.

You have just replicated information that should be kept out of the public eye, and now it sits in multiple places: on your desktop, in the email server, and in the files of whoever you’ve sent it to.


And the receiver now has to figure out if what you’ve sent them is really valid. Is it fraudulent? Has it been tampered with? Is that document even of you?

They have none of the benefits of examining the passport in person to check the holograms, or have it in a digital-friendly format to check any embedded biometric information.

There certainly are better ways of shifting to using and sharing digital identities, which is the reason a digital identity is really necessary.

A digital identity is a set of attributes, identifiers, and credentials that have been captured in an electronic format.

Some are good for certain aspects of your life: your employment credentials, for example, are probably already digital.

But can you use those credentials to onboard or interact with your business partners’ system? Unless it’s a federated ID, probably not. 

Other digital identities that are getting some traction are digital citizen IDs.

A few countries have launched digital identity cards for accessing government services. But you probably access those services once or twice a year. 

What about all the other times you have to present your identity online? Opening an account, logging in, doing a KYC check? Why do you have to create an account by entering your same identity information a million times?

Now each service you’ve made an account with holds your identity information… definitely not ideal.

How do we get to the digital equivalent of an individual presenting their identity (which they hold in their wallet) to access the services that they need? 


What Is a Decentralized Identity?

This is where decentralized identity comes in.

A decentralized identity is a type of digital identity: a set of attributes, identifiers, and credentials that describe a person (or a thing), captured in a specific electronic format.

What’s so specific? The way it’s stored and validated.

Decentralized Identity

A decentralized identity is one that is stored in a decentralized architecture, decoupling the existence of your ID (maybe a driver’s license) from the issuer (the DMV), and the service you are trying to access (the car rental agency).

It is many other things as well. A decentralized identity is cryptographically secure, so that even though your ID is stored in a digital format, it cannot be tampered with, duplicated, or stolen. 

A decentralized identity is also often associated with Self-Sovereign Identity (SSI).

This is the concept of owning your own identity data. Decentralized identity often enables you to be the sole holder of your identity data, and creates a pathway to share that data (you showing your driver’s license to buy alcohol, proving you’re over 21) that doesn’t give the service provider too much information, or let them keep the data in their systems unless really necessary. 

Frontier Talk

Frontier Talk
The World's First Podcast on Decentralized Identity

Bi-weekly Episodes
Join Industry's Finest Experts

Back to top


The Players

You: Hopefully you know who you are. You are a person (or a device, that’s okay too) with unique attributes that make up your identity. 

As soon as the decentralized identity scheme kicks off, you are the holder of your identity credentials, which you typically keep in your digital wallet on a smart device. 

An issuer:  Comparable to an identity provider (IdP), which issues a credential describing you.

It could be your employment credential, your driver’s license credential, or an academic credential like a master’s degree.

The issuer is the entity that is responsible for that credential, thus would be your employer, a DMV, or your academic institution. 

A Credential: This is a claim that an issuer makes about you (the DMV claims that you have earned your driver’s license). 

Players in Decentralized Identity

You’ll often hear about verifiable credentials, which are tamper-evident claims that can be cryptographically verified, and include proof of who issued it. 

These can contain a decentralized identifier (DID), which is globally unique, cryptographically verifiable, and resolvable with high availability.

These cryptographic pieces are what are anchored to a blockchain, or other decentralized ledger. 

Both Verifiable Credentials and DIDs are important standards that are shaping decentralized identity. 

A Verifier: This entity is one that verifies that an issued credential is valid. But it makes more sense when it’s put into a scenario. 

You present your employment credential to access an app you use every day for work. 

That service provider verifies that the credential is valid, and you are granted access.

That service provider is the verifier, like a car rental agency is the verifier when you present your driver’s license credential to rent a car, etc. 


Decentralized Ledgers

Decentralized ledgers are critical to delivering decentralized identity. 

Blockchains are part of that, but so are blockchain variants like consortiums or sidechains, and “blockchain-like” architectures like directed acyclic graphs. 

It helps to know a bit about why blockchains can be trusted to fully appreciate why decentralized identity can work. If you want to read more, go here

Back to top


Centralized Identity Management

Creation, storage, and management was originally handled centrally by service providers or identity providers (IdPs), the organization issuing credentials to employees. 

This means that a company’s servers holds the identity information, while each individual employee is issued a key to access the resources they need. 

The storage is centralized and control is centralized, with the user being dependent on the decisions of the IdP. 

Servers hold Identity Data

One of the downsides is that each IdP becomes a “silo”, an isolated, unconnected storage of information that cannot be efficiently used anywhere else. 

It’s also a security hazard, since a data breach here would compromise all of the identities it contains. 


Federated Identity Management

There are challenges in a centralized model in using one organization’s credential in another context (for example, if you the employee are hired as a contractor in another organization).

To ease the processes of checking the identity credentials issued by another organization, the federated identity model came on the scene.

This is where trusted partners establish a pathway for identity credentials to be accepted. This is centralization, but with a hub and spoke model.

Here, identities are stored and managed by the IdP, but multiple organizations and service providers can accept it. 


CIAM and the Push for User Experience

Challenges still remain with federated identity models. 

As CIAM enters the picture and identities are created for customers as well as employees, ease of use sometimes outweighs security. 

Logging into an account with your social media or email account is an example of federation, intensifying the impact of a data breach on such a data silo; if your email is compromised, countless other accounts are also compromised because they are all connected. 

There are of course other challenges, and if you want to read more about the privacy, security, and interoperability challenges, go here. 


The Alternative? Decentralized Identity

Decentralized identities are using a different model entirely.

Instead of placing the organization in the center, the individual is the one holding their own identity credentials. 

Decentralized Identity as Alternative

There is no data silo, meaning no location where all identities for all users and employees are stored. Instead, when the user wants to access a service, they present the credentials which they own and hold to the organization to approve.

Information is shared on a need-to-know basis, eliminating the problem of your personal information being held by all service providers that you come in contact with. 

A key architectural piece here is the user wallet.

This is the digital app that holds the private keys to control the digital identities being stored there.

If you want to know more about these, go here. 

So in short, traditional identity management models but the organization at the center – they hold all identity data.

Decentralized identity models put the user at the center. 

Back to top


Some Challenges to Overcome

First, the roadblocks. Organizations trust in order to shift from a traditional identity management to a decentralized identity solution. 

They need to trust the identities that individuals and employees bring with them are valid, to be willing to test and explore solutions using DIDs and Verifiable Credentials. 

Roadblocks for Decentralized Identity

Watch the recoding of Annie Bailey's presentation from the KCLive Event Unlocking Decentralized Identity to learn more about future requirements of identity.

And most importantly, they need a way to make these external, decentralized identities interoperable with their current systems, and to enable access management polices to work with them. 

Revocation of credentials is a challenge, but is one that is being solved. 

Scalability is an ongoing conversation, and each vendor is addressing this challenge differently. 

A large challenge for organizations is that because decentralized identities are user-centric, adoption may also be driven by individual user choices to manage their identity differently. 

That leads to a slow transition from traditional identity management to decentralized, and the need to balance differing systems.

Vendors are designing solutions that interoperate with directories and authentication sources, so to find out more about removing this roadblock go here. 

Other roadblocks that are being solved include using the decentralized identity offline, synchronizing an identity wallet across a user’s many devices, and options for data recovery if a user’s device is lost or stolen.

Most vendors have addressed these challenges in some way, so go here to see how these roadblocks are being addressed. 


How Does Privacy Fit In?

Early in the blockchain days there were severe privacy concerns about PII and private information being written to the blockchain.

Because as you know, anything written to the blockchain cannot be removed and PII data stored there would be a severe breach of the GDPR and other privacy regulations. 

This is being addressed through a series of privacy-protecting steps. 

Decentralized Identifiers (DIDs), often written to a blockchain or decentralized ledger, become a mediating step between the private identity information and private keys stored on the user’s device.

The public key is stored in the DID document to facilitate the exchange of information in peer-to-peer communications channels.

No private information should be stored in the DID document, since this is one of the aspects that is stored on the blockchain/decentralized ledger.

In this way, a foundational piece of the private information is stored on the immutable, tamper-proof ledger (the public key), ensuring and proving that the private data it corresponds to has not been changed without ever writing the identity information itself to the blockchain.

Verifiable Credentials support this in a similar way, proving that the identity information has been verified by an authoritative entity without storing that particular identity information in the blockchain. 

This is standard now for most decentralized identity solutions, in proving GDPR compliance, such as who the data controller is. 

Anne Bailey and Matthias Reinwarth take on Verified Digital Identity in an episode of the Analyst Chat podcast. Listen in and explore what these are, why they are becoming increasingly important and where they add new aspects to the concept of digital identity.

See all episodes of the Analyst Chat here.

The advancement of technology means that solutions that are currently available – like decentralized identity – are a few steps ahead of the current legal conversation surrounding data privacy, and are thus misaligned with the requirements of some privacy regulations. 


Consider the Uses

Ethical concerns exist as well. In the early blockchain days, mining bitcoin was and still is a huge environmental cost, using massive amounts of electricity. 

Decentralized identity typically uses different consensus mechanisms and ledgers to sidestep this problem.

More closely related to decentralized identity are immunization passports, or Verifiable Credentials that prove and individual’s COVID-19 immunization status to access services, such as international travel, entrance to conferences, and much more.

There are concerns that this can create preference for those how are immunized, and may unethically par individuals from accessing services that they are entitled to. 

This question does not have decentralized identity at its foundation, but rather social equality and is a question of governing the tools that we do have. 

Listen to Anne Bailey and Matthias Reinwarth discussing how decentralized identities and verifiable credentials help respond to the pandemic by powering contact tracing applications, immunity passports and other important use cases in their episode of the Analyst Chat Podcast.

Back to top


Enabling Employee-Owned Identities

Employee Onboarding, Authentication, Access Management: Verifiable Credentials for identification documents, diplomas, and more can be accepted by enterprises for new employee onboarding, making remote onboarding possible.

The enterprise can then issue Verifiable Credentials to the new hire for use within the company: an employee ID, as belonging to a particular department, etc. 

These can be used as a form of authentication and as credential-based access control.

Integrations with systems like SAML and LDAP enable decentralized identity to become part of the traditional IAM structure.  

Employee Mobility: During the height of the COVID-19 crisis, hospitals were hard-pressed to have enough staff in the right locations to keep up with spikes in COVID cases. 

Decentralized identity solutions enabled health staff to carry their employment credentials, qualifications, and access rights with them on their smartphone in the form of Verifiable Credentials. This allowed a nurse to be quickly transferred to another hospital in another city, and for that nurse to prove that she was not an imposter without brining mountains of paperwork and sloughing through bureaucratic processes when time was of the essence. 


Identities Held and Managed by the Individual

Digital Citizenship and Access to Government Services: Decentralized identity solutions are being used by governments to issue citizens Verifiable Credentials that allow them to present and prove their identity, citizenship, tax-ID number, and more in order to access government services and exchange these credentials in the private sector quickly, privately, and digitally. 

Car Rental

New User Onboarding: At the moment, most users have far more accounts with many different service providers than they can securely manage. 

Decentralized identity brings so many security and privacy advantages to the user in opening and managing accounts with the many service providers that they interact with, but also for the organization to offer a great user experience (no more filling out registration forms) and relieves the pressure of enterprises storing user data. 

Selectively sharing identity attributes: This is data minimization in action. 

A user can share only the identity attributes that are needed for a transaction.

If a user must be over a certain age to rent a car, the user doesn’t have to share their birth date.

They can show a “zero-knowledge proof” that they are above the required age. 

Users no longer have to overshare their data, and service providers no longer have to hold data that may not be compliant with data minimization requirements. 

Back to top


Where the Action Is

The approach to delivering decentralized identity has changed in the years since. 

Rather than leading with the buzzword concepts of self-sovereign identity and blockchain, vendors have put significant effort towards interoperability between decentralized identity solutions (becoming blockchain agnostic, accepting credentials from other decentralized ecosystems) and for use in enterprise systems (support for standard authentication sources such as OpenID Connect and SAML, and for use in standard directory systems like Azure AD, Active Directory, LDAP, and more). 

Thus the aim is centered on fulfilling the use case of delivering a verifiable, portable identity.

The fact that the solution uses blockchain or other decentralized ledger technology, and supports self-sovereign concepts becomes a side story. 

These vendors are a combination of startups and of more familiar players like 1KosmosesatusMicrosoft, and Ping Identity.

To read about these vendors, you can check out this Market Compass

Back to top


Hybrid Security Buyers’ Guide

Hybrid Security Buyers’ Guide

We have a few recommendations on how to get started with decentralized identity. 

  1. Determine your use case: Let all decisions be guided by what you need, not by what technology or solution you want to adopt. Once it is clear what is needed in your organization, be it authentication solutions, onboarding procedures, verification, or any of the other compelling use cases, then you can really start to consider if a decentralized identity solution is a good fit. 
  2. Inform yourself on the market segment: Privacy, security, interoperability and usability are ever-changing dynamics in the decentralized identity space. Stay current on these topics and critically ask how they impact your use case. 
  3. Participate in decentralized identity working groups: When you’re interested in getting up close and personal with decentralized identity, join one of the many working groups as an observer or participant in developing open standards and shaping the conversation surrounding decentralized identity.  
  4. Conduct a Tools Choice: When you’re really ready to pursue a decentralized identity solution, follow a structured process to determine a longlist, shortlist, request for information, proof of concept, and eventually decide on the vendor and solution that best fits your use case. You can find more information about that here.  

 Looking for Decision-Support in the Field of Decentralized Identity?