SlideShare a Scribd company logo
How to Build Interoperable Decentralized
Identity Systems with OpenID for Verifiable
Credentials
Kristina Yasuda, Microsoft
Dr. Torsten Lodderstedt, yes
What is Decentralized Identity?
Issuer
(Website)
Verifier
(Website)
Wallet
(user’s device,
cloud or hybrid)
Credential
Issuance
Credential
Presentation
User Interactions
● The User presenting the Identity data directly to the Verifier from the Wallet
○ <> In the federated model where Identity data is sent directly from the IdP to the Verifier
● Usually expressed with the flow below:
Verifiable Credentials: Benefits
● End-Users gain more privacy, and portability over their identity
information.
● Cheaper, faster, and more secure identity verification, when transforming
physical credentials into digital ones.
● Universal approach to handle identification, authentication, and
authorization in digital and physical space
Why Protocol Layer Interoperability is Crucial.
Issuer
(Website)
Credential
Issuance
Credential
Presentation
● One entity needs to talk to the large the number of entities, to increase the value of “Decentralized
Identity”.
Issuer
(Website)
Issuer
(Website)
Issuer
(Website)
Issuer
(Website)
Issuer
(Website)
Issuer
(Website)
Issuer
(Website)
Issuer
(Website)
Issuer
(Website)
Issuer
(Website)
Issuer
(Website)
Issuer
(Website)
Issuer
(Website)
Issuer
(Website)
Issuer
(Website)
Issuer
(Website)
Wallet
(user’s device,
cloud or
hybrid)
Issuer
(Website)
Issuer
(Website)
Issuer
(Website)
Issuer
(Website)
Issuer
(Website)
Issuer
(Website)
Issuer
(Website)
Issuer
(Website)
Verifier
(Website)
User Interactions
Problems we identified and how we solved them
Problem Solution
A lot of entirely new Protocols. (Hard to get
security right, steep learning curve) ⇒
Building upon currently widely used protocols:
OAuth 2.0 and OpenID Connect. (Secure, already
understood)
No clear winner among Credential Formats ⇒ Designing a Credential Format agnostic protocol
Reluctance to use only DIDs.
No clear winner among DID methods
⇒ Designing a protocol agnostic to the Key
Resolution mechanism. (No need to use DIDs)
Participating entities cannot typically
establish trust upfront, using traditional
mechanisms.
⇒ Flexibility in Trust Management. Third Party
Trust.
OpenID for Verifiable
Credential Issuance
...so here comes OpenID for Verifiable Credentials!
Issuer
(Website)
Verifier
(Website)
Wallet
(user’s device,
cloud or hybrid)
Credential
Issuance
Credential
Presentation
User Interactions
OpenID for Verifiable
Presentations
Self-Issued OP v2
Adoption (selected use-cases)
- The European Digital Identity Wallet Architecture and Reference Framework (eIDAS ARF/EUDIW) requires
OID4VCI, OID4VP and SIOPv2 for online use-cases
- DIF JWT VC Presentation Profile uses OID4VP for request and presentation of W3C JWT VCs and SIOPv2 for
user authentication. Implementers: Ping Identity, Microsoft, IBM, Spruce, Auth0, Gen Digital
- NIST National Cybersecurity Center of Excellence plans to implement reference implementation for OID4VP to
present mdocs/mDL (Landing page, Project description (draft) )
● Walt.id
○ https://github.com/walt-id/waltid-ssikit (Kotlin)
● Sphereon
○ https://github.com/Sphereon-Opensource/SIOP-OpenID4VP (Typescript)
○ https://github.com/Sphereon-Opensource/OpenID4VCI-client (Typescript)
○ https://github.com/Sphereon-Opensource/ssi-sdk (Typescript)
● Microsoft
○ https://github.com/microsoft/VerifiableCredential-SDK-Android (Kotlin)
○ https://github.com/microsoft/VerifiableCredential-SDK-iOS (Swift)
● Spruce
○ https://github.com/spruceid/oidc4vci-rs (Rust)
○ https://github.com/spruceid/oidc4vci-issuer (Rust)
● EBSI
Open Source projects
Let us tell you more about the protocol
OpenID for Verifiable Credential Issuance (Highlights)
- It’s an OAuth-protected API (Credential Endpoint at the Resource Server)
- Supports various Security levels (including high security with hardware bound keys)
- Various business requirements supported
- remote and in-person provisioning
- deferred and batch provisioning
- Different user-experiences can be achieved
- multiple ways to initiate the flow
- Issuer can check Wallet’s capabilities & Wallet can discover Issuer metadata
Wallet
Alice
⓪ Wallet requests & User authorizes
credential issuance
③ Credential is issued
① access token(, refresh token)
② Wallet requests credential issuance
Protocol Flow
Credential
Issuer
Authorization Code Flow
Pre-Authorized Code Flow
OpenID for Verifiable Presentations (Highlights)
- Designed for high degree of privacy
- Supports various Security levels (e.g. mutual authentication among the parties)
- Different user-experience can be achieved (same-device and cross-device)
- Presentation of multiple Credentials supported
- Various Wallet deployment models supported
- All local to a native app
- Cloud Wallet with a backend
- Browser wallet
Same Device Presentation
Cross Device Presentation
Features of OpenID for Verifiable Credentials
1) It is NOT only about W3C Verifiable Credentials.
2) Does not require the usage of DLT (or Blockchain).
3) We are an open standardization community. Implementer’s feedback is incorporated in
an agile and transparent manner.
4) It is modular and flexible to cater for the needs of different legislations and use-cases.
5) Complemented by active work on profiles to help the developers interoperate is ongoing.
OpenID for Verifiable Credential Issuance
New additions to the family coming!
Self-Issued OP v2
OpenID for Verifiable Presentations
OpenID for Verifiable Presentations over
BLE
Security and Trust in OpenID for Verifiable Credentials
Core specs
additional specs
Certification Suite
High-Assurance Profile
Issuer
(Website)
Verifier
(Website)
Wallet
(user’s device,
cloud or hybrid)
Issue Credentials Present Credentials
User Interactions
Call to Action: Implement, Implement, Implement
- Implement the specifications to unlock your use cases and provide us feedback!
- The information can be found at https://openid.net/openid4vc/

More Related Content

PDF
OpenID for Verifiable Credentials @ IIW 36
PDF
OpenID for SSI
PDF
OpenID Connect 4 SSI (DIFCon F2F)
PDF
OpenID for Verifiable Credentials
PPTX
Verifiable Credentials, Self Sovereign Identity and DLTs
PDF
OpenID 4 Verifiable Credentials + HAIP (Update)
PPTX
OpenID for Verifiable Credentials
PDF
Demystifying OAuth 2.0
OpenID for Verifiable Credentials @ IIW 36
OpenID for SSI
OpenID Connect 4 SSI (DIFCon F2F)
OpenID for Verifiable Credentials
Verifiable Credentials, Self Sovereign Identity and DLTs
OpenID 4 Verifiable Credentials + HAIP (Update)
OpenID for Verifiable Credentials
Demystifying OAuth 2.0

What's hot (20)

PDF
OpenID Connect 4 SSI
PPTX
Hashicorp Vault ppt
PDF
Stateless Auth using OAUTH2 & JWT
ODP
Overview of Decentralized Identity
PDF
Vault 101
PPTX
An introduction to OAuth 2
PDF
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
PDF
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...
PDF
Decentralized applications 101: How and why to build a DApp
PPTX
Deep Dive into Keystone Tokens and Lessons Learned
PPTX
Introduction to Containers and Docker
PPTX
OpenId Connect Protocol
PPTX
OAuth 2
PPTX
Blockchain Interview Questions And Answers | Blockchain Technology Interview ...
PDF
OpenID for Verifiable Credentials (IIW 35)
PDF
What is Docker Architecture | Edureka
PPTX
DCC17 - Identity Server 4
PDF
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
PDF
Hyperledger Indy tutorial
PDF
Spring security oauth2
OpenID Connect 4 SSI
Hashicorp Vault ppt
Stateless Auth using OAUTH2 & JWT
Overview of Decentralized Identity
Vault 101
An introduction to OAuth 2
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...
Decentralized applications 101: How and why to build a DApp
Deep Dive into Keystone Tokens and Lessons Learned
Introduction to Containers and Docker
OpenId Connect Protocol
OAuth 2
Blockchain Interview Questions And Answers | Blockchain Technology Interview ...
OpenID for Verifiable Credentials (IIW 35)
What is Docker Architecture | Edureka
DCC17 - Identity Server 4
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
Hyperledger Indy tutorial
Spring security oauth2
Ad

Similar to How to Build Interoperable Decentralized Identity Systems with OpenID for Verifiable Credentials (20)

PDF
OpenID Connect 4 SSI (at EIC 2021)
PDF
Cloud Identity Webinar
PDF
EUDI wallets with OpenID for verifiable credentials (OID4VCI/OID4VP)
PDF
Value proposition of SSI tech providers - Self-Sovereign Identity
PDF
OSCON 2018 Getting Started with Hyperledger Indy
PDF
WSO2 ITALIA SMART TALK #3 WSO2 IS NEW FEATURE
DOC
Authentication Models
PDF
Decentralized Identifiers
PPT
Cartes Asia Dem 2010 V2
PDF
PingYOU Future of Wallets_Darrell Geusz.pdf
PDF
Seamless OAuth2.0 and OpenID Connect in VAST
PDF
OpenID Connect Explained
PDF
Smart OpenID & Mobile Network Security
PPTX
Kerberos-PKI-Federated identity
PPTX
SWXG 2010.6.9 v2
PDF
Mobile Cloud Identity
PPT
ISS SA le presenta IdentityGuard de Entrust
PDF
FOSSASIA 2018 Self-Sovereign Identity with Hyperledger Indy/Sovrin
PPTX
Configuring Single Sign-On (SSO) via Identity Management | MuleSoft Mysore Me...
PDF
apidays LIVE India 2022_Standardizing Biometric Device Integration for Identi...
OpenID Connect 4 SSI (at EIC 2021)
Cloud Identity Webinar
EUDI wallets with OpenID for verifiable credentials (OID4VCI/OID4VP)
Value proposition of SSI tech providers - Self-Sovereign Identity
OSCON 2018 Getting Started with Hyperledger Indy
WSO2 ITALIA SMART TALK #3 WSO2 IS NEW FEATURE
Authentication Models
Decentralized Identifiers
Cartes Asia Dem 2010 V2
PingYOU Future of Wallets_Darrell Geusz.pdf
Seamless OAuth2.0 and OpenID Connect in VAST
OpenID Connect Explained
Smart OpenID & Mobile Network Security
Kerberos-PKI-Federated identity
SWXG 2010.6.9 v2
Mobile Cloud Identity
ISS SA le presenta IdentityGuard de Entrust
FOSSASIA 2018 Self-Sovereign Identity with Hyperledger Indy/Sovrin
Configuring Single Sign-On (SSO) via Identity Management | MuleSoft Mysore Me...
apidays LIVE India 2022_Standardizing Biometric Device Integration for Identi...
Ad

More from Torsten Lodderstedt (17)

PDF
The European Union goes Decentralized
PPTX
GAIN Presentation.pptx
PPTX
Comprehensive overview FAPI 1 and FAPI 2
PDF
Comprehensive overview FAPI 1 and 2
PDF
OIDC4VP for AB/C WG
PDF
OpenID Connect 4 Identity Assurance at IIW #32
PPTX
OpenID Connect for W3C Verifiable Credential Objects
PPTX
Identity Assurance with OpenID Connect
PPTX
NextGenPSD2 OAuth SCA Mode Security Recommendations
PDF
Rich Authorization Requests
PDF
Pushed Authorization Requests
PDF
OpenID Connect for Identity Assurance
PPTX
NextGenPSD2 OAuth SCA Mode Security Recommendations
PPTX
Identiverse: PSD2, Open Banking, and Technical Interoperability
PDF
OAuth 2.0 Security Reinforced
PDF
OAuth Security 4 Dummies iiw#27
PDF
Identity Proofing with OpenID Connect
The European Union goes Decentralized
GAIN Presentation.pptx
Comprehensive overview FAPI 1 and FAPI 2
Comprehensive overview FAPI 1 and 2
OIDC4VP for AB/C WG
OpenID Connect 4 Identity Assurance at IIW #32
OpenID Connect for W3C Verifiable Credential Objects
Identity Assurance with OpenID Connect
NextGenPSD2 OAuth SCA Mode Security Recommendations
Rich Authorization Requests
Pushed Authorization Requests
OpenID Connect for Identity Assurance
NextGenPSD2 OAuth SCA Mode Security Recommendations
Identiverse: PSD2, Open Banking, and Technical Interoperability
OAuth 2.0 Security Reinforced
OAuth Security 4 Dummies iiw#27
Identity Proofing with OpenID Connect

Recently uploaded (20)

PPTX
presentation_pfe-universite-molay-seltan.pptx
PDF
FINAL CALL-6th International Conference on Networks & IOT (NeTIOT 2025)
PDF
How to Ensure Data Integrity During Shopify Migration_ Best Practices for Sec...
PPTX
Digital Literacy And Online Safety on internet
PPTX
Introduction to Information and Communication Technology
PPTX
Introuction about ICD -10 and ICD-11 PPT.pptx
PDF
The New Creative Director: How AI Tools for Social Media Content Creation Are...
PDF
The Internet -By the Numbers, Sri Lanka Edition
PPTX
Power Point - Lesson 3_2.pptx grad school presentation
PPTX
Funds Management Learning Material for Beg
PDF
Introduction to the IoT system, how the IoT system works
PPTX
PptxGenJS_Demo_Chart_20250317130215833.pptx
PPT
tcp ip networks nd ip layering assotred slides
PPTX
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
PPTX
E -tech empowerment technologies PowerPoint
PPTX
Introuction about WHO-FIC in ICD-10.pptx
PDF
Testing WebRTC applications at scale.pdf
PPT
Design_with_Watersergyerge45hrbgre4top (1).ppt
PPTX
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
PDF
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
presentation_pfe-universite-molay-seltan.pptx
FINAL CALL-6th International Conference on Networks & IOT (NeTIOT 2025)
How to Ensure Data Integrity During Shopify Migration_ Best Practices for Sec...
Digital Literacy And Online Safety on internet
Introduction to Information and Communication Technology
Introuction about ICD -10 and ICD-11 PPT.pptx
The New Creative Director: How AI Tools for Social Media Content Creation Are...
The Internet -By the Numbers, Sri Lanka Edition
Power Point - Lesson 3_2.pptx grad school presentation
Funds Management Learning Material for Beg
Introduction to the IoT system, how the IoT system works
PptxGenJS_Demo_Chart_20250317130215833.pptx
tcp ip networks nd ip layering assotred slides
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
E -tech empowerment technologies PowerPoint
Introuction about WHO-FIC in ICD-10.pptx
Testing WebRTC applications at scale.pdf
Design_with_Watersergyerge45hrbgre4top (1).ppt
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...

How to Build Interoperable Decentralized Identity Systems with OpenID for Verifiable Credentials

  • 1. How to Build Interoperable Decentralized Identity Systems with OpenID for Verifiable Credentials Kristina Yasuda, Microsoft Dr. Torsten Lodderstedt, yes
  • 2. What is Decentralized Identity? Issuer (Website) Verifier (Website) Wallet (user’s device, cloud or hybrid) Credential Issuance Credential Presentation User Interactions ● The User presenting the Identity data directly to the Verifier from the Wallet ○ <> In the federated model where Identity data is sent directly from the IdP to the Verifier ● Usually expressed with the flow below:
  • 3. Verifiable Credentials: Benefits ● End-Users gain more privacy, and portability over their identity information. ● Cheaper, faster, and more secure identity verification, when transforming physical credentials into digital ones. ● Universal approach to handle identification, authentication, and authorization in digital and physical space
  • 4. Why Protocol Layer Interoperability is Crucial. Issuer (Website) Credential Issuance Credential Presentation ● One entity needs to talk to the large the number of entities, to increase the value of “Decentralized Identity”. Issuer (Website) Issuer (Website) Issuer (Website) Issuer (Website) Issuer (Website) Issuer (Website) Issuer (Website) Issuer (Website) Issuer (Website) Issuer (Website) Issuer (Website) Issuer (Website) Issuer (Website) Issuer (Website) Issuer (Website) Issuer (Website) Wallet (user’s device, cloud or hybrid) Issuer (Website) Issuer (Website) Issuer (Website) Issuer (Website) Issuer (Website) Issuer (Website) Issuer (Website) Issuer (Website) Verifier (Website) User Interactions
  • 5. Problems we identified and how we solved them Problem Solution A lot of entirely new Protocols. (Hard to get security right, steep learning curve) ⇒ Building upon currently widely used protocols: OAuth 2.0 and OpenID Connect. (Secure, already understood) No clear winner among Credential Formats ⇒ Designing a Credential Format agnostic protocol Reluctance to use only DIDs. No clear winner among DID methods ⇒ Designing a protocol agnostic to the Key Resolution mechanism. (No need to use DIDs) Participating entities cannot typically establish trust upfront, using traditional mechanisms. ⇒ Flexibility in Trust Management. Third Party Trust.
  • 6. OpenID for Verifiable Credential Issuance ...so here comes OpenID for Verifiable Credentials! Issuer (Website) Verifier (Website) Wallet (user’s device, cloud or hybrid) Credential Issuance Credential Presentation User Interactions OpenID for Verifiable Presentations Self-Issued OP v2
  • 7. Adoption (selected use-cases) - The European Digital Identity Wallet Architecture and Reference Framework (eIDAS ARF/EUDIW) requires OID4VCI, OID4VP and SIOPv2 for online use-cases - DIF JWT VC Presentation Profile uses OID4VP for request and presentation of W3C JWT VCs and SIOPv2 for user authentication. Implementers: Ping Identity, Microsoft, IBM, Spruce, Auth0, Gen Digital - NIST National Cybersecurity Center of Excellence plans to implement reference implementation for OID4VP to present mdocs/mDL (Landing page, Project description (draft) )
  • 8. ● Walt.id ○ https://github.com/walt-id/waltid-ssikit (Kotlin) ● Sphereon ○ https://github.com/Sphereon-Opensource/SIOP-OpenID4VP (Typescript) ○ https://github.com/Sphereon-Opensource/OpenID4VCI-client (Typescript) ○ https://github.com/Sphereon-Opensource/ssi-sdk (Typescript) ● Microsoft ○ https://github.com/microsoft/VerifiableCredential-SDK-Android (Kotlin) ○ https://github.com/microsoft/VerifiableCredential-SDK-iOS (Swift) ● Spruce ○ https://github.com/spruceid/oidc4vci-rs (Rust) ○ https://github.com/spruceid/oidc4vci-issuer (Rust) ● EBSI Open Source projects
  • 9. Let us tell you more about the protocol
  • 10. OpenID for Verifiable Credential Issuance (Highlights) - It’s an OAuth-protected API (Credential Endpoint at the Resource Server) - Supports various Security levels (including high security with hardware bound keys) - Various business requirements supported - remote and in-person provisioning - deferred and batch provisioning - Different user-experiences can be achieved - multiple ways to initiate the flow - Issuer can check Wallet’s capabilities & Wallet can discover Issuer metadata
  • 11. Wallet Alice ⓪ Wallet requests & User authorizes credential issuance ③ Credential is issued ① access token(, refresh token) ② Wallet requests credential issuance Protocol Flow Credential Issuer
  • 14. OpenID for Verifiable Presentations (Highlights) - Designed for high degree of privacy - Supports various Security levels (e.g. mutual authentication among the parties) - Different user-experience can be achieved (same-device and cross-device) - Presentation of multiple Credentials supported - Various Wallet deployment models supported - All local to a native app - Cloud Wallet with a backend - Browser wallet
  • 17. Features of OpenID for Verifiable Credentials 1) It is NOT only about W3C Verifiable Credentials. 2) Does not require the usage of DLT (or Blockchain). 3) We are an open standardization community. Implementer’s feedback is incorporated in an agile and transparent manner. 4) It is modular and flexible to cater for the needs of different legislations and use-cases. 5) Complemented by active work on profiles to help the developers interoperate is ongoing.
  • 18. OpenID for Verifiable Credential Issuance New additions to the family coming! Self-Issued OP v2 OpenID for Verifiable Presentations OpenID for Verifiable Presentations over BLE Security and Trust in OpenID for Verifiable Credentials Core specs additional specs Certification Suite High-Assurance Profile Issuer (Website) Verifier (Website) Wallet (user’s device, cloud or hybrid) Issue Credentials Present Credentials User Interactions
  • 19. Call to Action: Implement, Implement, Implement - Implement the specifications to unlock your use cases and provide us feedback! - The information can be found at https://openid.net/openid4vc/

Editor's Notes

  • #12: Option 1: The Issuer is an IdP and can authenticate the user at the Authorization Endpoint => Authorization Code flow Option 2: The Issuer authenticates the user using mechanisms other than OAuth idP (upload a pdf remotely, present documents in-person, etc.) => Pre-authorized Code flow
  • #13: three ways how to begin the issuance wallet already has information about which issuer can issue which credential wallet does not know, so the issuer needs to send “credential offer” with that information (can be communicated via QR code, SMS, etc.) Issuance during presentation
  • #14: Issuer can issue right away: Credential endpoint. Issues one credential per request Issuer cannot issuer right away: Deferring possible Requirement is to issue multiple Credentials at the same time: Batch Credential endpoin.
  • #15: Device where the Credentials are stored and where the user is interacting with the Verifier can be same or different leaned always towards a more privacy preserving design. (direct_post over code which requires backend)