Overview
Verifiable Credentials (VCs) are cryptographically signed digital credentials that enable tamper-evident representation of identity information. Unlike traditional credentials stored in centralized databases, VCs are issued directly to holders who store them in digital wallets and selectively share them with verifiers. The issuer's digital signature (verifiable via their DID Document) proves authenticity without requiring real-time contact with the issuer. VCs are the data format that makes Self-Sovereign Identity (SSI) practical—enabling portable, privacy-preserving credentials for education, employment, healthcare, and government services. Standards like OpenID for Verifiable Credentials (OID4VC) bridge VCs with existing OAuth/OIDC infrastructure for enterprise adoption. Good looks like credentials verified in seconds without contacting issuers, users sharing only necessary information through selective disclosure, and reduced fraud through cryptographic verification.
Architecture & Reference Patterns
Pattern 1: VC Trust Triangle
The fundamental VC architecture involves three roles:
Issuer (University, Government, Employer)
/ \
/ \
Creates & Signs Trusts Issuer
Credential (via DID/Registry)
↓ ↑
Holder (User) ──── Presents Credential ────→ Verifier
(Wallet) (Relying Party)
Verification flow:
- Verifier requests credential presentation
- Holder selects credentials and consent to share
- Holder creates Verifiable Presentation (VP)
- Verifier resolves issuer's DID, retrieves public key
- Verifier validates signature and claims
Pattern 2: OID4VC Integration
Use OpenID for Verifiable Credentials to integrate VCs with existing identity infrastructure:
OID4VCI (Issuance):
Authorization Server → Token → Credential Endpoint → VC to Wallet
OID4VP (Presentation):
Verifier Request → Wallet Selection → VP Creation → Verification
Benefits:
- Familiar OAuth 2.0 / OIDC patterns
- Works with existing IdP infrastructure
- Standardized interoperability
Pattern 3: Enterprise VC Ecosystem
Deploy VCs for enterprise use cases:
- Issue employee credentials for portable professional identity
- Accept partner/vendor credentials for streamlined B2B onboarding
- Issue customer credentials for privacy-preserving verification
- Integrate with existing IGA for credential lifecycle management
Key Decisions
| Decision | Options | Recommendation | Notes / Gotchas |
|---|---|---|---|
| Credential format | JSON-LD, JWT, SD-JWT, mDOC | SD-JWT for enterprise | Selective disclosure, familiar format, good tooling |
| Issuance protocol | OID4VCI, DIDComm, Custom | OID4VCI | Leverages existing OAuth infrastructure |
| Presentation protocol | OID4VP, DIDComm, Custom | OID4VP | Standards-based, interoperable |
| Wallet approach | Recommend specific, Accept any, Build custom | Accept standards-compliant | Avoid lock-in; focus on interoperability |
| Revocation method | Status List, Accumulator, Short-lived credentials | Status List 2021 | Balance privacy with revocation needs |
| Schema governance | Custom schemas, Established schemas, Schema registry | Established + registry | Use existing schemas where possible |
Implementation Approach
Phase 0: Discovery
Inputs: Use case analysis, credential requirements, existing infrastructure, regulatory landscape Outputs: VC opportunity assessment, credential schema requirements, integration points, pilot use case selection
Phase 1: Design
Inputs: Use cases, technical requirements, trust framework participation Outputs: VC architecture design, credential schemas, issuance/verification flows, wallet integration specifications, UX design
Phase 2: Build & Integrate
Inputs: Architecture design, selected tools/libraries, integration specifications Outputs: Issuer infrastructure deployed, verifier integration completed, wallet connectivity tested, operational procedures documented
Phase 3: Rollout
Inputs: Built infrastructure, pilot plan, user onboarding Outputs: Pilot with selected users, credential issuance live, verification flows operational, feedback collection, iterative improvements
Phase 4: Operate
Inputs: Production infrastructure, operational procedures Outputs: Ongoing issuance and verification, schema updates, revocation management, adoption metrics, ecosystem expansion
Deliverables
- Verifiable Credentials strategy and use case prioritization
- Credential schema definitions (aligned with standards)
- Issuance and verification flow documentation
- Wallet integration specifications
- Trust framework participation plan
- Revocation strategy and procedures
- User experience design for credential flows
- Operational runbooks
Risks & Failure Modes
| Risk | Likelihood | Impact | Early Signals | Mitigation |
|---|---|---|---|---|
| User adoption challenges (wallet complexity) | H | H | Low credential acceptance, onboarding abandonment | UX investment, progressive disclosure, familiar analogies |
| Interoperability failures | M | H | Credentials rejected by verifiers, format mismatches | Standards compliance, testing with ecosystem partners |
| Revocation latency exposes invalid credentials | M | M | Revoked credentials accepted | Appropriate revocation mechanism, short credential lifetimes |
| Issuer key compromise | L | H | Fraudulent credentials issued | HSM protection, key rotation, monitoring |
| Schema evolution breaks existing credentials | M | M | Verification failures after updates | Schema versioning, backward compatibility |
KPIs / Outcomes
- Credential issuance volume (track adoption)
- Verification success rate (target: greater than 99%)
- User wallet activation rate (adoption metric)
- Time to verify vs. traditional methods (value demonstration)
- Revocation effectiveness (revoked credentials not accepted)
- Ecosystem interoperability (credentials accepted across verifiers)
