Decentralized Identity and Self-Sovereign Identity (SSI)

Decentralized identity and Self-Sovereign Identity (SSI) represent a structural departure from the centralized identity models that underpin most enterprise and consumer authentication systems. Rather than relying on a single authority — such as an identity provider, government registry, or platform operator — to issue and control identity credentials, SSI frameworks distribute that control to the individual or entity being identified. This page covers the technical architecture, standards landscape, applicable regulatory framing, deployment scenarios, and the decision boundaries that separate SSI from adjacent federated identity management and identity and access management (IAM) approaches.


Definition and scope

Self-Sovereign Identity is an identity model in which individuals hold and present verifiable credentials without requiring a central intermediary to authenticate or disclose personal data on their behalf. The term "self-sovereign" denotes control, not sovereignty in a legal sense: the individual controls when, to whom, and to what extent credential data is shared.

Decentralized identity is the broader technical category that encompasses SSI. It also includes organizational and device identities managed outside centralized directories. The World Wide Web Consortium (W3C) formalized the foundational data model through the Decentralized Identifiers (DIDs) v1.0 specification, which became an official W3C Recommendation in July 2022. A DID is a globally unique identifier that resolves to a DID Document — a structured JSON-LD object containing public keys, authentication methods, and service endpoints — without reference to any central registry.

Three architectural layers define the SSI stack:

  1. Verifiable Data Registry — A ledger, blockchain, or distributed storage layer where DID Documents are anchored. Examples include peer-based DID methods (did:peer), Web-based methods (did:web), and public ledger methods (did:ion, did:cheqd).
  2. Verifiable Credentials (VCs) — Tamper-evident, cryptographically signed assertions conforming to the W3C Verifiable Credentials Data Model, issued by a named Issuer to a Holder.
  3. Wallets and Agents — Software components held by the Holder that store credentials and respond to presentation requests without exposing raw data to the verifier unnecessarily.

The regulatory framing for SSI in the United States does not yet include a single governing statute. The National Institute of Standards and Technology (NIST) addresses decentralized identity within NIST SP 800-63-3, which defines Identity Assurance Levels (IAL 1–3) applicable to both centralized and decentralized credential systems. The Department of Homeland Security Science and Technology Directorate has funded SSI pilots through its Silicon Valley Innovation Program (SVIP), including efforts to issue W3C-conformant VCs for customs and travel documents.


How it works

The SSI trust model operates through three named roles defined in the W3C VC specification: Issuer, Holder, and Verifier — collectively referred to as the Trust Triangle.

  1. Issuance — An Issuer (a university, government agency, employer, or credentialing body) digitally signs a Verifiable Credential using its DID-linked private key and delivers it to the Holder's wallet.
  2. Storage — The Holder stores the credential in a digital wallet (mobile application or cloud agent) that the Holder controls. The credential is not stored on a blockchain; only the Issuer's DID Document anchor resides on the verifiable data registry.
  3. Presentation — When the Holder initiates a transaction, the Verifier issues a Presentation Request specifying which credential attributes are required.
  4. Selective Disclosure — The Holder responds with a Verifiable Presentation containing only the requested attributes, optionally using zero-knowledge proofs (ZKPs) to prove a claim (e.g., "age ≥ 21") without revealing the underlying value.
  5. Verification — The Verifier resolves the Issuer's DID Document from the registry, retrieves the public key, and cryptographically verifies the credential signature — without contacting the Issuer at runtime.

This architecture eliminates the "phone home" pattern present in SAML and OAuth/OpenID Connect flows, where an identity provider is queried at each authentication event. The Issuer has no visibility into when or to whom the Holder presents credentials after issuance — a property known as issuer unlinkability.

The OpenID Foundation's OpenID for Verifiable Credentials (OID4VC) specification family — comprising OID4VCI (credential issuance) and OID4VP (credential presentation) — extends OpenID Connect protocols to carry W3C VCs, providing a bridge between SSI architecture and existing OAuth 2.0 infrastructure. This interoperability layer is significant for enterprise adoption because it allows zero-trust identity model deployments to incorporate VC-based authentication without replacing existing identity infrastructure wholesale.


Common scenarios

SSI and decentralized identity apply across four primary deployment contexts:

Government-issued digital credentials — State motor vehicle agencies and federal programs exploring mobile driver's licenses (mDLs) under ISO/IEC 18013-5:2021 represent the largest near-term deployment category in the United States. The Transportation Security Administration (TSA) accepted mDLs at select airport checkpoints beginning in 2023. mDLs share structural properties with W3C VCs but use a distinct CBOR-based encoding defined by ISO rather than JSON-LD.

Healthcare credential verification — Healthcare workforce credentialing, including nursing licenses and board certifications, involves verification against state licensing boards. SSI-based approaches allow practitioners to carry verifiable digital credentials issued by licensing authorities, reducing manual verification overhead for staffing agencies and health systems subject to 45 C.F.R. Part 164 (HIPAA Security Rule) requirements for access control.

Supply chain and trade compliance — The DHS SVIP funded decentralized identity pilots for customs documentation, where W3C VCs can carry verifiable assertions about shipment provenance, exporter identity, and regulatory approvals without requiring customs authorities to query foreign registries in real time.

Enterprise workforce and B2B identity — Organizations with large contractor populations or cross-organizational partnerships use SSI to enable identity lifecycle management without provisioning external parties into internal directories. A contractor presents employer-issued VCs directly to the Verifier system, bypassing the need for guest accounts in Active Directory or a cloud IDP.

SSI diverges from single sign-on (SSO) in a structurally important way: SSO centralizes session management at an identity provider that brokers trust between applications, while SSI distributes credential custody to the Holder and removes the IDP from the verification path entirely.


Decision boundaries

Deploying SSI architecture is appropriate under specific structural conditions and misapplied in others. The following boundaries define where decentralized identity fits within the broader identity security fundamentals landscape.

SSI is architecturally appropriate when:

SSI is less appropriate or operationally immature when:

The contrast between SSI and federated identity is not binary. Hybrid deployments increasingly use W3C VCs as a portable credential layer carried over OpenID Connect transport, preserving federation for session management while decentralizing credential custody for sensitive attributes. This pattern is documented in the OpenID Foundation's OID4VC working group materials and aligns with NIST's identity framework guidance.


References

📜 1 regulatory citation referenced  ·  🔍 Monitored by ANA Regulatory Watch  ·  View update log

Explore This Site