Verifiable Credentials in Identity and Access Management. Already real today.
New possibilities for Identity and Access Management.
With eIDAS 2.0, a unified European framework for digital identity is emerging for the first time. At its core is the European Digital Identity Wallet. It allows individuals to securely store digital credentials, present them when needed, and have them verified automatically.
For organizations, this changes how identities are managed. Identities no longer need to be captured or verified manually. Applications can use verified data directly to make access decisions.
DIGITAL IDENTITIES ARE BECOMING PART OF MODERN IT ARCHITECTURES.
Digital identity credentials enable new forms of interaction between individuals, businesses, and organizations. Applications can use verified data directly from digital wallets to drive automated decisions.
This is reshaping core Identity and Access Management processes:
- Registration
- Authentication
- Authorization
A European solution for digital identities.
Several European technology companies are combining their expertise to demonstrate how digital sovereignty and interoperable digital identity solutions can be put into practice.
The European technology partners.
From manual identity processes to Verifiable Credentials.
Identity processes are still often handled manually today.
Forms
Document verification
Account creation
Access management
Processes that create effort, introduce errors, and increase compliance risks.
Verifiable Credentials enable automated identity processes.
Digital credentials are provided directly from wallets and verified cryptographically. Applications can use this data instantly for login and access decisions.
Identity verification becomes faster, more secure, and more scalable.
European sovereignty
Open standards and modular architectures enable interoperable identity solutions. They reduce dependencies on individual platforms.
Verifiable Credentials in IAM
Digital credentials can be used directly from wallets and verified cryptographically. Applications can use this data immediately to make login and access decisions.
EUDI Wallet integration
Identity data from the EUDI Wallet can be integrated directly into existing applications. Applications can automatically verify these credentials and use them in digital processes.
Real systems, not concepts
Digital identity solutions can be integrated into existing IT systems. This shows how digital identities work in real-world applications.
An open architecture for digital identities.
To use Verifiable Credentials in real systems, a supporting technical infrastructure is required.
With SOWL, esatus provides the identity infrastructure that connects digital wallets, Verifiable Credentials, and existing IAM systems.
Applications can automatically verify identity credentials and use them directly for login and access decisions.
Our initiative demonstrates this architecture through a working demonstrator.
An EUDI Wallet is connected to the open business application OpenCloud. A user logs in using a digital identity credential. The application automatically uses the verified identity data to make access decisions.
The demonstrator shows how Verifiable Credentials can be applied in real-world systems.