KuppingerCole's Advisory stands out due to our regular communication with vendors and key clients, providing us with in-depth insight into the issues and knowledge required to address real-world challenges.
Unlock the power of industry-leading insights and expertise. Gain access to our extensive knowledge base, vibrant community, and tailored analyst sessions—all designed to keep you at the forefront of identity security.
Get instant access to our complete research library.
Access essential knowledge at your fingertips with KuppingerCole's extensive resources. From in-depth reports to concise one-pagers, leverage our complete security library to inform strategy and drive innovation.
Get instant access to our complete research library.
Gain access to comprehensive resources, personalized analyst consultations, and exclusive events – all designed to enhance your decision-making capabilities and industry connections.
Get instant access to our complete research library.
Gain a true partner to drive transformative initiatives. Access comprehensive resources, tailored expert guidance, and networking opportunities.
Get instant access to our complete research library.
Optimize your decision-making process with the most comprehensive and up-to-date market data available.
Compare solution offerings and follow predefined best practices or adapt them to the individual requirements of your company.
Configure your individual requirements to discover the ideal solution for your business.
Meet our team of analysts and advisors who are highly skilled and experienced professionals dedicated to helping you make informed decisions and achieve your goals.
Meet our business team committed to helping you achieve success. We understand that running a business can be challenging, but with the right team in your corner, anything is possible.
Identity management has moved beyond just identity for the standard personas of employees or customers. Digital identity is about everything – partners, suppliers, devices, services, and even "things". Each needs an identity, and to mesh with the modern organization, their user journey must be flexible, privacy-forward, secure, interoperable, and increasingly user-centric. While KuppingerCole’s Identity Fabric illustrates the ways other IAM tools and capabilities help organizations meet these needs, there is one specific capability to address the rising user-centric need: verifiable credentials.
A verifiable credential is a digital, tamper-evident claim about a subject. Verifiable credentials are typically held by the subject (the holder), and can be digitally presented by the holder to other parties (verifiers) without having to involve the credential issuer. Verifiable credentials place the user in control of the information shared with other parties.
The user-controlled digital identity model allows an individual – be it consumer, employee, or other persona – to hold digital credentials and present them to another party, even if that party did not issue the credentials, meaning that issuing and presenting verifiable credentials do not require a pre-existing relationship between issuer and verifier or relying party. When verifiable credentials are issued according to best practice specifications like OpenID for Verifiable Credential Issuance (OID4VCI), they are secure, verifiable, privacy-protecting, and portable. An organization doesn’t need to start from scratch every time it interacts with a new persona or organization.
When verifiable credentials are issued according to best practice specifications like OpenID for Verifiable Credential Issuance (OID4VCI), they are secure, verifiable, privacy-protecting, and portable.
There is quite a bit of hype around verifiable credentials and user-centric digital identity, including technology solutions with unproven track records. But there are tangible projects and initiatives that lay out the architectures for common use cases, agree on and test open standards, ecosystem requirements, and integrations between the issuer, holder, and verifiers. This is a dynamic market where – unusually – regulation and technology development are propelling each other forward; user-controlled, verifiable credential technology is developing to realize forward-thinking regulation like the European Digital Identity (EUDI) Regulation, which came to be because of advances in user-controlled digital identity technology. The EUDI regulation mandates that Member States offer digital wallets for holding verifiable credentials to residents for public and private sector use, creating an entirely new user-controlled market for digital identity issuance and exchange.
For organizations that see the potential in issuing verifiable credentials, tapping into the benefits of cost savings, efficiency gains, privacy-enhancements, and improved user experiences, OID4VCI is the place to get started.
For organizations that see the potential in issuing verifiable credentials for the emerging user-centric ecosystem, tapping into the benefits of cost savings, efficiency gains, privacy-enhancements, and improved user experiences, OID4VCI is the place to get started. It is an open standard designed for organizations that already use OpenID to easily issue verifiable credentials based on IETF SD-JWT VC, W3C VC, ISO/IEC 18013-5 for mobile driving licenses, and other formats. It bridges the gap between a new model of digital identity interaction and the known and often already implemented standards.
For guidance, look to those working on the front lines of user-centric digital identity. Organizations like Authlete have actively contributed to key specifications like OpenID for Verifiable Credential Issuance (OID4VCI), and have built support for OID4VCI into their API authorization solutions, and tested it with the numerous wallet providers participating in the EUDI Wallet large-scale project Potential and others around the world.