Abstract digital data pattern representing the SOWL Verifiable Credentials platform

Integrate digital credentials into existing systems via standards with SOWL.

SOWL is integrated into existing systems via defined interfaces. A business process remains in the source system and is extended with digital credentials. This page shows how the integration is implemented technically and where an entry point is possible.

Where SOWL fits into your architecture.

IAM Integration

Digital credentials extend existing authentication and authorization processes. Roles, attributes, and access rules remain in the authoritative IAM. SOWL adds an additional credential layer.

Backend Integration

Business systems provide decisions that are reused as digital credentials. This turns an internal verification result into a credential that can be used across systems. The business logic remains in the source system.

Wallet Integration

Wallets are connected via standardized protocols. This allows the EUDI Wallet to be integrated, as well as other compatible wallets. The wallet becomes the interface between user and system.

Verifikation

Target systems receive verified results without their own verification logic. Signature, status, and trust basis are verified centrally. The target system processes only the result.

Integration flow at a glance.

SOWL connects business systems, wallets, and target systems through a clear technical workflow. A decision is made in the source system, issued as a credential, and made available in the wallet. When used, a target system requests the credential, has it verified, and processes the result directly.

SOWL integration flow showing connections between IAM, KYC, wallet and backend systems

HOW THE INTEGRATION WORKS TECHNICALLY. 

The integration does not involve replacing existing systems. SOWL connects existing components via defined interfaces and standardized workflows. The following modules address the typical technical entry-point questions. 

APIs and protocols

SOWL provides REST APIs for the core integration points and uses OpenID4VCI for the issuance of credentials and OpenID4VP for their presentation and verification. Workflows such as credential offers, presentation requests, and status checks follow clearly defined protocols. This allows existing processes to be extended without implementing custom protocols. 

Existing IAM structures 

SOWL does not replace existing IAM systems but extends them. OpenID Connect, OAuth2, and SAML remain in place and can continue to be used unchanged. Digital credentials extend existing authentication and authorization decisions without changing the underlying control mechanisms. 

Issuance from business systems

 Business systems remain authoritative for business decisions and provide the basis for digital credentials. These decisions are passed to the issuer via defined interfaces and converted into signed credentials. This turns an internal verification result into a portable credential that can be used in other systems. 

Verification as a service 

Verification does not take place in the target system but via the verifier. Signature, integrity, status, and the requirements of the target system are checked automatically in the context of the request. The result is a verified statement that can be processed directly without any verification logic in the target system. 

Trust and status verification

The validity of a credential is determined by its signature, current status, and the underlying trust basis. SOWL takes trusted lists, revocation information, and credential versioning into account with every use. This ensures that only valid and trustworthy credentials are accepted. 

Operations in existing landscapes

SOWL is designed to operate within existing infrastructures and fits into established operating models. Structured logs with a consistent transaction ID, consistent error behavior, and transactional rollback enable integration into monitoring and logging systems. Versioned APIs ensure that existing integrations remain stable even as the platform continues to evolve.

Typical integration scenarios.

KYC to credentials

Identity verifications are carried out in the KYC system and issued as digital credentials. These credentials can be used in further processes without repeating the verification. This turns a one-time verification process into a reusable foundation.

IAM to access

Digital credentials are integrated into existing authorization logic. They complement roles, attributes, and existing decision mechanisms. Access is therefore based not only on master data but on verifiable credentials.

Partner Onboarding

External parties are integrated via digital credentials. Additional accounts and manual verification processes can thereby be reduced. This is especially relevant when organizations collaborate across system boundaries.

Compliance

Credentials are verified automatically and integrated directly into existing approval processes. This reduces manual effort in compliance-relevant workflows. Existing processes are preserved but made more resilient.

How the integration gets started.

The integration starts with a clearly defined entry point. Typically this is a single process, such as a KYC flow or an access decision. This process is connected to SOWL via defined interfaces and implemented technically.

On this basis, the integration is extended step by step. Additional systems are connected, further credentials integrated, and existing processes enhanced. SOWL is not introduced in isolation but grows into the existing system landscape.

Integration without disrupting the architecture.

The integration does not require replacing existing systems. The effort depends on the entry point. A first use case can often be implemented within a few weeks. SOWL grows with your system landscape.

Architecture diagram showing SOWL integration without system replacement

Positioning SOWL in your architecture.

In the first conversation, we look at your existing system landscape, the relevant interfaces, and a suitable entry point. You get a technical assessment, not a general product pitch.

esatus AG contact person for SOWL architecture and technical integration