Enterprise
11 min read

Digital Credentials Are the Next Identity Primitive

Digital identity still relies on photographed documents and reused passwords, two systems now failing under AI-generated fraud and compounding regulation. Cryptographically signed credentials replace both with a single mechanism, and the EU has mandated the transition by 2027.
Published on
March 23, 2026

Two moments most people recognise

I remember the first time I received that notification: my email address had appeared in a data breach. The passwords were old, the accounts half-forgotten. I changed what I could and moved on, slightly unsettled but assuming it was someone else's problem to fix.

The second moment is more familiar by now. I was opening an account with a new financial service and the site asked me to hold my passport up to my phone camera, tilt it to catch the hologram, wait for the glare to pass, and then take a selfie so the system could compare my face against the photo. Several minutes later, I was still waiting for the check to complete. In 2026, proving your identity still looks like this.

Both moments are common enough to feel mundane. They also feel unrelated: one is about stolen credentials circulating on the dark web, the other about a clunky onboarding form on a Tuesday afternoon. In reality, they are two sides of the same structural problem, and understanding that connection changes how you think about identity in digital services.

Digital credentials are the next identity primitive.

Identity is the starting point

Ribbit Capital's 2024 identity letter put it plainly: "The starting point of finance is not transactions, but identity." The observation extends well beyond financial services. Every digital interaction, whether it involves opening a bank account, logging into a government portal, or verifying age for an online purchase, begins with the same underlying question: who is this person, and should they be allowed to do what they are asking to do?

The infrastructure answering that question was built decades ago. It now handles orders of magnitude more interactions than it was designed for, against threats its architects could not have anticipated, and it is failing on two fronts at once.

Two systems, both failing

Identity verification: documents without proof

When you onboard with a new service, you are typically asked to photograph an identity document and take a selfie. The service then tries to match the two. There is a structural problem: these documents carry no cryptographic proof of origin. A scanned passport is a JPEG, and a JPEG can be edited. Generative AI has made this cheaper and faster than ever before.

AI-generated identity document fraud rose 281% in the past twelve months across Europe, and digital document forgeries now account for 57% of all detected fraud in Europe, overtaking physical counterfeits for the first time. Meanwhile, the friction of document-heavy processes is pushing users away: 68% of consumers have abandoned digital sign-up processes because they were too slow or too intrusive, costing European financial services an estimated EUR 5.7 billion annually in lost onboarding. The system is simultaneously too easy to fool and too difficult to use.

Ongoing access: passwords at breaking point

Once onboarded, users rely on passwords for every subsequent interaction. The average employee now manages 190+ username and password combinations, while 24 billion compromised credential pairs sit on the dark web, ready to be tested against login pages at scale. Account takeover attacks in fintech saw an 800%+ year-on-year increase during 2023 alone, according to industry research. Passwords were designed for a smaller, simpler internet, and the gap between the threat and the defence grows wider every year.

The invisible force

These two systems feel separate in daily life. One governs the front door (the onboarding check); the other manages every room inside (the daily login). Both serve the same function: proving who someone is and whether they should be allowed to act. The onboarding scan and the password prompt are two expressions of the same underlying problem, built on infrastructure that predates the threats it now faces.

Once you see it, identity is the invisible force enabling or preventing almost everything in digital services.

The credential shift

Digital credentials replace both systems with a single mechanism. A credential is a digitally signed claim, issued by a trusted authority (a government, a bank, an employer, or a professional body), stored on the user's device, and presented when the user chooses to share it. Because the credential is cryptographically signed at the point of issuance, the receiving organisation can verify its authenticity in milliseconds without contacting the issuer and without needing to store the user's personal data.

A single credential can prove identity during onboarding. The same credential, or others held in the user's wallet, can authenticate the user for every interaction that follows. A person proving they are over 18 can do so without revealing their date of birth or any other personal detail, because the credential model builds selective disclosure in from the start, giving users control over exactly what they share and with whom.

The European Union has legislated for this transition. Regulation (EU) 2024/1183 requires every Member State to make at least one digital identity wallet available to citizens by the end of 2026, and mandates that banks, insurers, telecoms, and major online platforms accept wallet credentials by December 2027. Over 273,000 EU organisations fall within the regulation's scope, with penalties reaching EUR 5 million or 1% of global turnover for non-compliance.

Every interaction a user has with a digital service begins as an intent: open this account, log me in, transfer this payment, verify my age. Each intent requires authorisation to complete. Today, that authorisation is fragmented across documents, passwords, and one-time codes. Credentials unify this: a user holds credentials, presents them to fulfil an intent, and the receiving system verifies the credential and authorises the action.

Why we built for the acceptance side

We saw the acceptance gap early. Wallets are being built and credentials are being issued, with governments, standards bodies, and technology providers investing heavily in the issuance and storage layers. The infrastructure to reliably accept and verify those credentials has received far less attention. Every wallet being deployed and every credential being issued ultimately depends on reliable verification infrastructure at the receiving end. The transition succeeds or fails at that point.

That is the problem we chose to solve at Vidos. When an organisation receives a credential, it needs to determine whether the credential is authentic, whether it meets the requirements of the specific interaction, and whether to authorise the user to proceed. We built verification infrastructure for that moment, because we believe it is where this shift is won or lost.

The next identity primitive

Digital credentials are the next identity primitive.

The two systems that have carried digital identity for the past two decades, document-based verification for onboarding and passwords for ongoing access, are reaching their limits at the same time. Credentials unify both functions with cryptographic assurance, user control, and the weight of regulation that has already been enacted.

This is the first post in a four-part series exploring why this shift is happening and what it means for organisations preparing for it. Each post goes deeper on one part of the argument: the systems that are failing, the model that replaces them, and the infrastructure required to make the transition work.

Read the full analysis:

  • Two Broken Systems: Why Documents and Passwords Are Failing Together (coming soon)
  • Every Interaction Is an Intent: How Credentials Unify Identity (coming soon)
  • Building for the Acceptance Side (coming soon)

Author: Tim Boeckmann, CEO and co-founder of Vidos

Receive our newsletter
Sign up for our monthly round up of industry updates, regulatory developments across the EU & UK, and news from Vidos.

Want to learn more?
Download our guide:

The Evolution of Digital Identity

As we delve into the history, milestones, case studies, and future directions of digital identity, this guide aims to provide a comprehensive overview of its evolution. Through this exploration, we hope to shed light on the importance of digital identity in shaping our digital futures, preparing us for the next chapter in this ever-evolving narrative.
Dashboard mockup