Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
LABS
Glossary

Credential Metadata

Credential metadata is the structured data that describes the properties, context, and technical specifications of a verifiable credential (VC).
Chainscore © 2026
definition
DECENTRALIZED IDENTITY

What is Credential Metadata?

Credential metadata is the structured data that describes the properties, issuer, and validity of a verifiable credential, enabling automated trust and interoperability in decentralized identity systems.

Credential metadata is the contextual and administrative information attached to a verifiable credential (VC) that describes its core attributes, such as the issuer's identity (issuer), the subject it pertains to (credentialSubject.id), the issuance date (issuanceDate), the expiration date (expirationDate), and the proof type used for cryptographic verification. This metadata is essential for credential parsers and verifiers to understand the credential's context, validity period, and trust framework without inspecting the specific claims about the subject. It acts as the machine-readable header for the credential, defined by standards like the W3C Verifiable Credentials Data Model.

The structure of credential metadata is critical for interoperability across different decentralized identity platforms and wallets. Key standardized properties include the credential's unique identifier (id), its type (type—e.g., VerifiableCredential, UniversityDegreeCredential), and the cryptographic proof mechanism (proof). This structured data allows systems to automatically check a credential's status—whether it has been revoked, suspended, or has expired—by referencing a status list or registry. In essence, metadata provides the 'who, when, and how' of a credential, separating the administrative trust layer from the personal data in the claims themselves.

In practical use, credential metadata enables scalable trust. For example, an employer's verification system can instantly reject an expired diploma by checking the expirationDate or confirm the credential was issued by an accredited university via the issuer field before proceeding to validate the cryptographic signature. Advanced metadata can also include terms of use and privacy policies, governing how the credential can be processed. By standardizing this descriptive layer, credential metadata forms the backbone of portable, user-centric digital identities that work across organizational and national boundaries.

key-features
CREDENTIAL METADATA

Key Features of Credential Metadata

Credential metadata is the structured data attached to a verifiable credential that describes its properties, issuer, subject, and usage constraints. These features enable interoperability, trust, and programmability in decentralized identity systems.

01

Decentralized Identifiers (DIDs)

The issuer and subject of a credential are identified using Decentralized Identifiers (DIDs), a W3C standard. A DID is a cryptographically verifiable identifier that is controlled by its owner, not a central registry.

  • Example: did:ethr:0xabc123...
  • Enables self-sovereign identity by removing reliance on centralized authorities.
  • DIDs resolve to a DID Document containing public keys and service endpoints for verification.
02

Verifiable Credential Data Model

The core structure is defined by the W3C Verifiable Credentials Data Model. This model standardizes the JSON-LD or JWT format for credentials, ensuring interoperability across different systems.

Key components include:

  • @context: Defines the vocabulary and data types.
  • type: Specifies the credential schema (e.g., VerifiableCredential, UniversityDegreeCredential).
  • credentialSubject: The claims about the subject (e.g., "degree": "Bachelor of Science").
  • issuanceDate & expirationDate: Timestamps for credential validity.
03

Cryptographic Proofs & Signatures

Credential metadata includes a cryptographic proof, typically a digital signature, that binds the credential data to the issuer's DID. This proof enables cryptographic verifiability.

  • Common proof types include EdDSA, ES256K, and BBS+ signatures.
  • The proof is verified against the public keys in the issuer's DID Document.
  • This mechanism provides tamper-evidence and guarantees the credential's authenticity and integrity without contacting the issuer.
04

Selective Disclosure & Zero-Knowledge Proofs

Advanced credential systems support selective disclosure, allowing a holder to prove specific claims from a credential without revealing the entire document. This is enabled by zero-knowledge proof (ZKP) cryptography.

  • Example: Proving you are over 21 without revealing your exact birth date or name.
  • Protocols like BBS+ signatures or zk-SNARKs enable this privacy-preserving feature.
  • Critical for minimizing data exposure and complying with privacy regulations like GDPR.
05

Credential Status & Revocation

Metadata can include mechanisms to check the status of a credential, such as whether it has been suspended or revoked by the issuer. This is essential for maintaining trust over the credential's lifecycle.

Common status mechanisms:

  • Status List 2021: A W3C standard using bitstrings for compact revocation lists.
  • Revocation Registries: Used in Hyperledger Indy and Aries frameworks.
  • Smart Contract Registries: On-chain registries, often used by Ethereum Attestation Service (EAS) or Verax.
06

Schema & Ontology References

To ensure the semantic meaning of claims is universally understood, credential metadata references a schema. A schema defines the structure, data types, and allowed values for the claims in the credentialSubject.

  • Schemas are often published on decentralized registries or public ledgers.
  • Example: A DriversLicenseCredential schema defines fields for licenseNumber, issueState, and expiryDate.
  • Using shared schemas enables semantic interoperability, allowing verifiers from different organizations to process credentials correctly.
how-it-works
TECHNICAL DEEP DIVE

How Credential Metadata Works

An exploration of the structured data that defines, describes, and governs digital credentials in decentralized identity systems.

Credential metadata is the structured, machine-readable information that describes the properties, validity, and issuance context of a verifiable credential (VC) or attestation, enabling automated processing and trust assessment by verifiers. This data is distinct from the credential's core claims about a subject and instead provides the framework for interpreting those claims. Key components typically include the credential's unique identifier (id), the issuer's Decentralized Identifier (DID), the issuance and expiration dates, the credential schema defining the claim structure, and a cryptographic proof type. This metadata is essential for establishing provenance, checking revocation status via a revocation registry, and ensuring interoperability across different systems and verifiable data registries.

The metadata operates within a layered trust model, where each element serves a specific verification function. The issuer's DID allows a verifier to resolve their public key material from a blockchain or other decentralized network to validate the credential's digital signature. The credential schema, often referenced by a URI, specifies the expected data types and properties for the claims, enabling parsers to understand the credential's content. Timestamps establish temporal validity, while a credentialStatus field may point to a revocation list or a smart contract to check if the credential has been revoked. This structured approach allows verifiers to programmatically assess a credential's integrity, authenticity, and current validity without manual inspection.

In practice, credential metadata is serialized into a standard data format, most commonly JSON-LD or plain JSON, as part of the W3C Verifiable Credentials Data Model. For example, a university diploma VC would contain metadata specifying the issuing university's DID, the schema for academic credentials, the issuance date, and a proof section with a Linked Data Signature. When a potential employer verifies this credential, their software uses the metadata to: fetch the university's public key, confirm the signature, check that the diploma hasn't been revoked, and validate that the claim data conforms to the expected schema. This process transforms raw signed data into a trusted, actionable assertion.

Advanced implementations leverage metadata to enable selective disclosure and zero-knowledge proofs through technologies like BBS+ signatures. Here, the metadata can define the cryptographic suite used, allowing a holder to generate a verifiable presentation that cryptographically proves a subset of claims (e.g., being over 21) without revealing the entire credential (like the exact birth date or issuer). The metadata ensures the verifier can still validate the proof's origin and validity against the original issuance parameters. This functionality is critical for privacy-preserving interactions and is governed by the proofPurpose and verificationMethod fields within the metadata structure.

Ultimately, credential metadata is the operational backbone of trust in decentralized identity ecosystems. It provides the necessary context for DID resolvers, schema registries, and verification algorithms to function autonomously. By standardizing this descriptive layer, systems ensure that credentials issued in one domain can be understood and trusted in another, facilitating portability and user-centric data control. The robustness of this metadata directly determines the security, privacy, and scalability of credential-based interactions across the web.

common-metadata-fields
CREDENTIAL METADATA

Common Metadata Fields

Credential metadata is a structured data format that describes the properties and context of a verifiable credential, enabling interoperability and machine-readability across different systems.

01

@context

The @context field defines the data model and vocabulary for the credential, typically pointing to a JSON-LD context file. It ensures terms like 'issuer' and 'credentialSubject' are interpreted consistently.

  • Purpose: Enables semantic interoperability.
  • Example: https://www.w3.org/2018/credentials/v1
02

type

The type field specifies the credential's class, defining its schema and intended use. It is an array of strings, with 'VerifiableCredential' as a mandatory base type.

  • Base Type: Always includes VerifiableCredential.
  • Specific Types: Additional types like DiplomaCredential or ProofOfKYC define the credential's specific purpose.
03

issuer

The issuer field contains a URI identifying the entity that created and signed the credential, establishing its provenance and authority.

  • Format: Often a Decentralized Identifier (DID) like did:ethr:0xabc....
  • Critical Role: Essential for verification, as the verifier checks the signature against this issuer's public key.
04

issuanceDate

The issuanceDate is an ISO 8601 timestamp indicating when the credential was formally issued and became valid.

  • Format: YYYY-MM-DDTHH:MM:SSZ
  • Immutability: This date is signed and cannot be changed, providing a permanent record of issuance.
05

credentialSubject

The credentialSubject field is an object containing the core claims or attributes being asserted about the holder. The subject is typically identified by an id property.

  • Structure: Contains claims like "degree": {"type": "Bachelor"}.
  • Subject ID: Often the holder's DID, e.g., "id": "did:key:z6Mk...".
06

credentialStatus

An optional credentialStatus field points to a mechanism, like a revocation registry, for checking if the credential is still valid (e.g., not revoked or suspended).

  • Common Types: RevocationList2020Status or CredentialStatusList2017.
  • Purpose: Enables real-time status checks without contacting the issuer directly.
VERIFIABLE CREDENTIALS

Credential Metadata vs. Credential Claim

A structural comparison of the descriptive wrapper and the core assertion within a Verifiable Credential (VC).

FeatureCredential MetadataCredential Claim

Primary Purpose

Describes the credential's issuance, format, and verification method.

Contains the core subject-predicate-object assertion about the holder.

Core Components

Issuer DID, issuance date, expiration, proof type, credential schema ID.

Subject DID, claim property (e.g., 'degreeType'), claim value (e.g., 'Bachelor').

Data Structure

Defined by the W3C Verifiable Credentials Data Model (e.g., @context, id, type).

A set of one or more statements within the credentialSubject property.

Mutability

Immutable after issuance; changes invalidate the cryptographic proof.

Immutable after issuance; the attested facts cannot be altered.

Verification Focus

Authenticates the issuer and checks credential integrity/validity period.

Evaluated for truthfulness and relevance by the verifier for a specific use case.

Example W3C VC Property

"issuer", "issuanceDate", "proof"

"credentialSubject.id", "credentialSubject.alumniOf"

Role in Selective Disclosure

Typically disclosed in full to provide verification context.

Can be cryptographically disclosed in part (e.g., only proving age > 21).

ecosystem-usage
CREDENTIAL METADATA

Ecosystem Usage & Standards

Credential metadata provides the structured data and attestations that define a user's on-chain identity, enabling trustless verification of reputation, achievements, and compliance across decentralized applications.

03

Attestation Schemas & Registries

Schemas define the structure of credential metadata, specifying required fields (e.g., issuanceDate, credentialSubject.id, credentialSchema). On-chain registries, like Ethereum Attestation Service (EAS) Schema Registry or Verax, store these schemas to ensure consistency and discoverability. Using a registered schema allows any verifier to interpret the attestation's data format correctly.

04

Revocation & Expiry Mechanisms

Credential validity is managed through explicit revocation or expiry.

  • Revocation Registries: Maintain a list of revoked credential IDs (e.g., using a smart contract or a verifiable data registry).
  • Timestamp Expiry: Credentials include a validUntil field in their metadata.
  • Status List 2021: A W3C standard for compact, privacy-preserving revocation status lists. These mechanisms ensure issuers can invalidate credentials without compromising user privacy.
05

Selective Disclosure & Zero-Knowledge Proofs

These privacy techniques allow users to prove specific claims from a credential without revealing the entire document.

  • Selective Disclosure: Revealing only certain fields from a signed credential.
  • Zero-Knowledge Proofs (ZKPs): Generating a cryptographic proof that a claim (e.g., 'age > 18') is true without revealing the underlying data. This is critical for privacy-preserving DeFi, voting, and access control.
06

Use Cases & Ecosystem Integration

Credential metadata enables trustless interactions across web3:

  • Sybil Resistance: Prove unique humanity or reputation for airdrops and governance.
  • Under-collateralized Lending: Use credit score or income attestations.
  • Compliance: Share KYC/AML status with DeFi protocols.
  • Skill Verification: Prove completion of courses or contribution history (e.g., Gitcoin Passport).
  • Access Control: Gate NFT communities or events based on verified traits.
CREDENTIAL METADATA

Technical Details

Credential metadata is the structured data that defines the properties, constraints, and context of a verifiable credential. This section explains its core components, standards, and technical implementation.

Credential metadata is the descriptive and administrative data that accompanies the core claims of a verifiable credential, providing essential context for its issuance, verification, and lifecycle management. It is defined by standards like the W3C Verifiable Credentials Data Model and typically includes:

  • Issuer: The decentralized identifier (DID) or identifier of the entity that issued the credential.
  • Issuance Date: The timestamp when the credential was created.
  • Expiration Date: An optional timestamp after which the credential is no longer considered valid.
  • Credential Schema: A reference (often a URI) to the schema that defines the structure of the credential's claims.
  • Credential Status: Information for checking revocation, such as a link to a revocation registry or status list.
  • Proof: The cryptographic signature or zero-knowledge proof that binds the metadata to the credential subject and ensures tamper-evidence.
CREDENTIAL METADATA

Common Misconceptions

Credential metadata is a critical component of decentralized identity and verifiable credentials, but it is often misunderstood. This section clarifies frequent points of confusion regarding its purpose, security, and technical implementation.

No, credential metadata is distinct from the credential's core claims. A Verifiable Credential (VC) consists of the credential subject (the claims about the holder), the issuer, and the proof (e.g., a digital signature). Credential metadata is supplementary data that describes the credential's properties, such as its type (@context, type), issuance/expiration dates, status mechanism, and display information. It provides the context and framework needed to correctly interpret and process the credential's claims, but it does not contain the personal data of the holder.

CREDENTIAL METADATA

Frequently Asked Questions (FAQ)

Essential questions and answers about credential metadata, the structured data that defines the properties, usage, and verification rules for digital credentials.

Credential metadata is the structured data that describes the properties, intended use, and verification rules of a digital credential, such as a Verifiable Credential (VC). It is crucial because it provides the context needed for systems to automatically understand, process, and trust the credential without manual interpretation. This includes defining the credential's type, the issuer, the schema it conforms to, its validity period, and the cryptographic proof method. Without standardized metadata, credentials are just opaque data blobs, making automated verification and interoperability between different systems impossible. It forms the foundation for trust in decentralized identity ecosystems.

ENQUIRY

Get In Touch
today.

Our experts will offer a free quote and a 30min call to discuss your project.

NDA Protected
24h Response
Directly to Engineering Team
10+
Protocols Shipped
$20M+
TVL Overall
NDA Protected Directly to Engineering Team
Credential Metadata: Definition & Key Features | ChainScore Glossary