Abstract digital pattern representing the EUDI Wallet connecting to KYC processes

How digital identity is put to productive use.

Selected projects show how digital identity is integrated into existing systems and used in real-world processes.

Digital Credentials & EUDI Wallet

Verify corporate identity

Who is acting is known. Whether they are authorized to act has rarely been clear. esatus developed the vLEI Authenticator together with GLEIF — corporate identity and authorization to act become cryptographically verifiable, integrated into Keycloak.

CIAM migration with eIDAS 2.0

A European financial institution is introducing Bare.ID as its central identity provider — across four stages, embedded in a regulated security architecture, prepared for the EUDI Wallet from the start.

GaiaX Personal Credentialmanager

Digital sovereignty needs infrastructure, not just frameworks. esatus supported T-Systems on the Gaia-X Federation Services and developed the Personal Credential Manager as a reference implementation.

Use credentials across systems

Credentials that are not interoperable have no value. esatus contributed the technical connection layer to IDunion with SOWL — issuance, verification, and revocation across system boundaries.

Compliance digitized

More than 1,000 paper documents, up to ten minutes of verification time per person. With inGo, esatus solved the credential problem for the Lindner Group — under five seconds, fully logged, GDPR-compliant.

ID Wallet Federal Chancellery

esatus developed the core technical component of the ID Wallet Initiative with SOWL — a live system for government-issued Verifiable Credentials that directly influenced the development of eIDAS 2.0.

Base access on credentials

In the Siemens showcase, esatus explored how access decisions can be based on verified credentials from a wallet — without replacing or rebuilding existing IAM systems.

How Verifiable Credentials work in practice.

The EUDI Wallet creates a new infrastructure for digital identities. Users bring their own credentials and applications can verify and use them directly. This fundamentally changes core workflows in identity and access management. Registration, login, and access decisions are no longer based on manually collected data but on verified digital credentials.

The demonstrator shows how these processes work in real systems. A wallet is connected to an application and identity credentials are used directly for login and access. This makes it concretely visible how Verifiable Credentials extend existing systems and how identity processes can run in an automated way.

Bringing digital identity into your processes.

Every organization has different requirements when it comes to identity, access, and compliance. What matters is how existing systems, regulatory requirements, and new identity models are brought together. We show you exactly how identity processes can be implemented in your environment and what steps make sense to get there.

esatus AG contact person for SOWL integration and digital credentials