Grafik

Verifiable Credentials in Identity and Access Management. Already real today.

New possibilities for Identity and Access Management.

With eIDAS 2.0, a unified European framework for digital identity is emerging for the first time. At its core is the European Digital Identity Wallet. It allows individuals to securely store digital credentials, present them when needed, and have them verified automatically.

For organizations, this changes how identities are managed. Identities no longer need to be captured or verified manually. Applications can use verified data directly to make access decisions.

DIGITAL IDENTITIES ARE BECOMING PART OF MODERN IT ARCHITECTURES. 

Digital identity credentials enable new forms of interaction between individuals, businesses, and organizations. Applications can use verified data directly from digital wallets to drive automated decisions.

This is reshaping core Identity and Access Management processes:

  • Registration
  • Authentication
  • Authorization

A European solution for digital identities.

Several European technology companies are combining their expertise to demonstrate how digital sovereignty and interoperable digital identity solutions can be put into practice.

Grafik

A demonstrator brings this solution to life.

esatus

esatus

Identity infrastructure of the demonstrator, powered by SOWL for Verifiable Credentials.

OpenCloud

OpenCloud

Sovereign open-source business application within the demonstrator.

Better Edge

BetterEdge

Cloud infrastructure of the demonstrator, built on a platform for sovereign computing.

Bare.ID

Identity and Access Management of the demonstrator, based on Keycloak.

The European technology partners.

From manual identity processes to Verifiable Credentials.

Identity processes are still often handled manually today.

Forms
Document verification
Account creation
Access management

Processes that create effort, introduce errors, and increase compliance risks.

Verifiable Credentials enable automated identity processes.

Digital credentials are provided directly from wallets and verified cryptographically. Applications can use this data instantly for login and access decisions.

Identity verification becomes faster, more secure, and more scalable.

Who benefits most from Verifiable Credentials.

Digital platforms and ecosystems

Platforms with many partners or users need to manage identities across organizational boundaries. Verifiable Credentials enable secure, automated identity processes across systems.

Regulated industries

Financial institutions, insurers, and other regulated organizations need to verify and document identities reliably. Digital credentials can significantly simplify and automate these processes.

Operators of critical infrastructure

Organizations in KRITIS and NIS2 environments require secure and auditable identity processes. Verifiable Credentials provide a robust foundation for trusted digital identities.

Organizations with complex IAM

Companies with many applications and identities need to manage access rights efficiently. Verifiable Credentials can make Identity and Access Management significantly more scalable.

Grafik

European sovereignty

Open standards and modular architectures enable interoperable identity solutions. They reduce dependencies on individual platforms.

Verifiable Credentials in IAM

Digital credentials can be used directly from wallets and verified cryptographically. Applications can use this data immediately to make login and access decisions.

EUDI Wallet integration

Identity data from the EUDI Wallet can be integrated directly into existing applications. Applications can automatically verify these credentials and use them in digital processes.

Real systems, not concepts

Digital identity solutions can be integrated into existing IT systems. This shows how digital identities work in real-world applications.

An open architecture for digital identities.

To use Verifiable Credentials in real systems, a supporting technical infrastructure is required.

With SOWL, esatus provides the identity infrastructure that connects digital wallets, Verifiable Credentials, and existing IAM systems.

Applications can automatically verify identity credentials and use them directly for login and access decisions. 

Our initiative demonstrates this architecture through a working demonstrator.

An EUDI Wallet is connected to the open business application OpenCloud. A user logs in using a digital identity credential. The application automatically uses the verified identity data to make access decisions.

The demonstrator shows how Verifiable Credentials can be applied in real-world systems.

We show how digital credentials can be integrated into existing systems.

Andre

Dr. Andre Kudra

Questions about: Verifiable Credentials and digital identities

Write email
Sebastian

Sebastian Weidenbach

Questions about: Integration into existing IAM systems

Write email
Grafik