Today, your digital identity is fragmented across Google, Facebook, Apple, and hundreds of individual accounts. Each platform owns a piece of your identity. Decentralized identity flips this: you own your credentials, and you present them to services as needed.
How It Works
Decentralized Identifiers (DIDs)
A DID is a globally unique identifier that you control, not owned by any company.
did:web:example.com:user:alice
did:key:z6MkhaX...
did:ethr:0x1234...
Unlike an email address (owned by your email provider), a DID is self-sovereign.
Verifiable Credentials (VCs)
Digital versions of physical credentials (driver's license, diploma, membership card) issued by trusted organizations and held in your digital wallet.
{
"@context": ["https://www.w3.org/2018/credentials/v1"],
"type": ["VerifiableCredential", "UniversityDegreeCredential"],
"issuer": "did:web:university.edu",
"credentialSubject": {
"id": "did:key:z6MkhaX...",
"degree": {
"type": "BachelorDegree",
"name": "Computer Science"
}
},
"proof": { ... }
}
Verifiable Presentations
Share specific credentials without revealing everything. Prove you are over 21 without sharing your birthdate. Prove you have a degree without revealing your GPA.
Current State (2026)
Adoption
- Government ID programs: EU Digital Identity Wallet (eIDAS 2.0) launching
- Corporate: Microsoft Entra Verified ID in production
- Education: Digital diplomas and transcripts gaining traction
- Healthcare: Patient identity verification pilots
Standards
- W3C DID specification: Recommendation status
- W3C Verifiable Credentials: Widely implemented
- OpenID Connect for Verifiable Presentations (OID4VP)
- ISO mDL (mobile driver's license): Deployed in multiple US states
Wallet Apps
- Apple Wallet: Supports mDL in several states
- Google Wallet: Digital ID support expanding
- Microsoft Authenticator: Verifiable credentials
- Specialized wallets: SpruceID, Walt.id, Dock
Practical Business Applications
Customer Onboarding
Instead of collecting and storing sensitive documents, verify credentials presented from the user's wallet:
- Age verification without storing birth dates
- Address verification without storing addresses
- Identity verification without storing ID copies
Reduced Liability
If you never store sensitive identity data, you cannot lose it in a breach. Verification happens via cryptographic proofs.
Passwordless Authentication
Users sign in with their DID, eliminating password management entirely.
B2B Trust
Verify business credentials (licenses, certifications, insurance) without manual document review.
Loyalty and Membership
Issue portable membership credentials that work across platforms and services.
Challenges
- User adoption: Most people do not have digital wallet identity apps yet
- Chicken and egg: Issuers need verifiers, verifiers need issuers
- Key management: Users must not lose their private keys
- Recovery: No central authority to reset lost credentials
- Interoperability: Multiple competing standards and implementations
- Regulation: Legal frameworks are still catching up
What This Means for Web Developers
Short Term (2026-2027)
- Support "Sign in with Wallet" alongside traditional methods
- Accept Verifiable Credentials for identity verification
- Implement the OpenID4VP standard for credential verification
Medium Term (2028-2030)
- Passwordless authentication via DIDs may become mainstream
- Reduced PII storage (verify, do not collect)
- Government-backed digital IDs as primary identification
Long Term
- Decentralized identity as the default authentication method
- Portable reputation across platforms
- Minimal data collection by design
Implementation Approach
// Verify a Verifiable Credential presented by a user
import { verifyCredential } from '@spruceid/didkit';
const result = await verifyCredential(credential, {
proofPurpose: 'assertionMethod',
verificationMethod: credential.proof.verificationMethod,
});
if (result.verified) {
// Credential is valid and issued by a trusted party
const claims = credential.credentialSubject;
// Use claims without storing the original credential
}
Our Position
Decentralized identity is still early for most business applications. We monitor the standards and tooling closely. When the ecosystem matures β particularly with EU Digital Identity Wallet and Apple/Google integration β we will be ready to implement DID-based authentication for clients. For now, we recommend passkeys and modern OAuth as the immediate authentication upgrade.