Decentralized Identity, Decentralized Identifiers, and Verifiable Credentials

Get ready for the paradigm shift that this new technology will bring.

Identity Management the Decentralized Way

Identity Management the Decentralized Way

Identity management is on the verge of a paradigm shift. It is moving from centralized, federated methods to decentralized ones of providing, proving, and sharing identity data between trusted parties. This brings benefits such as:

Users being in control of their data and identity

Users being in control of their data and identity

Organizations don't need to store and manage vast amounts of PII

Organizations don't need to store and manage vast amounts of PII

A universal approach to handling identifiers

A universal approach to handling identifiers

Experimental Verifiable Credential Issuance Support

Experimental Support in The Curity Identity Server

The Curity Identity Server version 8.2 introduced the ability to issue verifiable credentials using the OpenID for Verifiable Credential Issuance draft specification. The feature is available when enabled with a feature flag and allows users to experiment with credentials and plan how to prepare for this new identity paradigm.

Decentralized Identity Explained

What Are Decentralized Identifiers?

Decentralized identifiers are a type of Uniform Resource Identifier (URI). They are identified via the DID scheme, followed by a method name and a method-specific identifier. They are resolved to keys that can be used to verify an identity.

Myths and Truths About Decentralized Identifiers
Identity Management the Decentralized Way
What are Verifiable Credentials?

What are Verifiable Credentials?

Compared to Decentralized Identifiers (DID) documents and publicly available keys, verifiable credentials are personal and securely stored by the credential holder (e.g., in a wallet). By keeping verifiable credentials private, the holder can control the timing and context in which to share a credential and can do so without involving the authority. Novelly, when the holder chooses to present them to a relying party, the issuer has no knowledge of the transaction or the relying party. These characteristics enable self-controlled identities, also called self-sovereign identities.

Read more

Gartner®️ report: Innovation Insight for Decentralized Identity and Verifiable Claims

According to Gartner, “The privacy and security of decentralized identity can mitigate risk associated with centralized identity stores, which continue to expose identity data in breaches. SRM leaders must assess timing and find appropriate use cases that can create value between now and the fully decentralized future.

Read report
Innovation Insight for Decentralized Identity and Verifiable Claims

Next steps

Start Today

Ready to modernize IAM? Build security and improve ease of use to stay ahead of the competition.