Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
LABS
Glossary

OpenID for Verifiable Credentials (OID4VC)

A suite of OpenID Connect extensions that standardizes the issuance and presentation of Verifiable Credentials over existing OAuth 2.0 and OpenID Connect flows.
Chainscore © 2026
definition
PROTOCOL STANDARD

What is OpenID for Verifiable Credentials (OID4VC)?

OID4VC is a suite of specifications that extends the widely-used OpenID Connect (OIDC) protocol to enable the issuance, presentation, and verification of W3C Verifiable Credentials (VCs) over standard web and mobile channels.

OpenID for Verifiable Credentials (OID4VC) is a set of open standards developed by the OpenID Foundation that defines how Verifiable Credentials (VCs) and Decentralized Identifiers (DIDs) can be integrated into existing OpenID Connect (OIDC) and OAuth 2.0 flows. It enables a holder (like a user's mobile wallet) to receive credentials from an issuer and later present proofs derived from those credentials to a verifier, all using familiar, scalable web protocols. This bridges the world of decentralized, user-centric identity with the established infrastructure of the modern internet.

The core of OID4VC is built upon two main specifications: OpenID for Verifiable Credential Issuance (OID4VCI) and OpenID for Verifiable Presentations (OID4VP). OID4VCI standardizes the process where an issuer, such as a government agency or university, pushes a signed Verifiable Credential to a user's digital wallet. OID4VP defines how a user can selectively disclose claims from their credentials—for example, proving they are over 21 without revealing their exact birthdate—to a relying party, such as a financial service or online platform, during an authentication or authorization request.

A key technical mechanism in OID4VP is the Presentation Definition, a machine-readable template sent by the verifier that specifies the exact type, format, and constraints of the credentials required for access. The holder's wallet uses this definition to locate matching credentials in its storage and construct a Verifiable Presentation, which is then returned to the verifier. This process enables selective disclosure and cryptographic verification, moving beyond simple username/password logins to credential-based trust.

OID4VC is designed for interoperability, supporting multiple credential formats like W3C Verifiable Credentials (JSON-LD) and ISO mDL (Mobile Driver's License), as well as various cryptographic signature suites. By leveraging OAuth's existing framework for API security and user consent, it allows organizations to adopt verifiable credentials without completely overhauling their current identity systems. This makes it a pivotal standard for implementing Self-Sovereign Identity (SSI) principles in real-world applications.

Practical use cases for OID4VC are extensive. They include Know Your Customer (KYC) processes where banks can issue reusable credentials, age verification for age-gated services, professional license checks, and secure employee access to corporate resources. For developers, implementing OID4VC typically involves integrating libraries that handle the protocol's complex cryptographic exchanges, allowing them to focus on building user experiences around verifiable data.

etymology
STANDARDS EVOLUTION

Etymology & Origin

The development of OpenID for Verifiable Credentials (OID4VC) represents a pivotal convergence of two major identity standards ecosystems, born from the need to bridge the gap between traditional web authentication and decentralized, user-centric identity.

OpenID for Verifiable Credentials (OID4VC) is a suite of specifications that extends the widely adopted OpenID Connect (OIDC) protocol to support the issuance, holding, and presentation of W3C Verifiable Credentials (VCs). Its name is a direct portmanteau of its parent standards: OpenID, the foundational framework for federated authentication on the web, and Verifiable Credentials, the W3C standard for cryptographically secure, privacy-preserving digital attestations. This fusion was engineered to provide a standardized, interoperable bridge between the existing OAuth 2.0/OIDC infrastructure used by billions and the emerging decentralized identity (SSI) paradigm.

The origin of OID4VC lies in the practical challenges of adopting decentralized identity. While VCs offered a powerful new data model, there was no widely agreed-upon method for a holder to request a credential from an issuer or to present it to a verifier over the internet. The OpenID Foundation and the Decentralized Identity Foundation (DIF) collaborated to solve this, leveraging OIDC's robust flows for secure communication and consent. Key specifications like OpenID for Verifiable Credential Issuance (OID4VCI) and OpenID for Verifiable Presentations (OID4VP) were developed, formally defining how OIDC authorization requests, tokens, and endpoints are repurposed for credential interactions.

This evolutionary step was critical for adoption. By building upon OIDC, OID4VC allows existing Relying Parties and Identity Providers to incrementally support VCs without discarding their current security and integration investments. It provides a familiar RESTful API and JSON-based data format ecosystem, making it accessible to mainstream developers. The client_id, scopes, and redirect URIs of OAuth2 become the mechanisms for negotiating credential types and delivery, creating a seamless hybrid architecture where traditional ID tokens and verifiable presentations can coexist and be requested within a single, standardized framework.

key-features
OID4VC

Key Features & Design Principles

OpenID for Verifiable Credentials (OID4VC) is a suite of specifications that extends the OAuth 2.0 and OpenID Connect framework to enable the issuance, presentation, and verification of W3C Verifiable Credentials. It provides a standardized, interoperable bridge between the identity and credential ecosystems.

01

Architectural Separation

OID4VC cleanly separates the roles defined in the W3C Verifiable Credentials Data Model (VCDM). It uses OpenID Connect for authentication and OAuth 2.0 for authorization, while the actual credential payload is a W3C Verifiable Credential or Verifiable Presentation. This allows existing OIDC Relying Parties to become Verifiers with minimal changes.

02

Credential Issuance (OID4VCI)

The OpenID for Verifiable Credential Issuance (OID4VCI) protocol defines how a Holder (user) can request and receive a Verifiable Credential from an Issuer. Key flows include:

  • Pre-Authorized Code Flow: For scenarios where the user's eligibility is pre-determined.
  • Authorization Code Flow: For interactive, consent-based issuance. It ensures credentials are delivered securely to the correct user's wallet.
03

Credential Presentation (OID4VP)

The OpenID for Verifiable Presentations (OID4VP) protocol enables a Verifier to request specific credentials from a Holder. The Holder's wallet presents a Verifiable Presentation containing the requested claims. It supports:

  • Selective Disclosure: Revealing only necessary attributes from a credential.
  • Presentation Submission: Sending the presentation via a direct POST or using a Presentation Exchange (PEX) descriptor.
04

Wallet & Agent Interoperability

OID4VC specifications are designed for wallet and agent interoperability. They define standard API endpoints (e.g., credential offer endpoint, authorization server) and message formats (like credential_offer URIs) that any compliant wallet can understand. This prevents vendor lock-in and allows users to choose their preferred digital identity wallet.

05

Cryptographic Agility & Proof Formats

OID4VC is cryptographically agile. It does not mandate a specific proof format (e.g., JWT, JSON-LD with Data Integrity Proofs, SD-JWT). The protocol carries the credential in a vc claim, allowing the Issuer and Verifier to agree on supported formats via metadata. This future-proofs the protocol against advances in cryptography.

06

Relationship to SIOPv2 & DIDComm

OID4VC often works in conjunction with other standards:

  • Self-Issued OpenID Provider v2 (SIOPv2): Allows a user to authenticate using a Decentralized Identifier (DID) instead of a traditional IDP.
  • DIDComm: An alternative, message-based protocol for credentials. OID4VC provides a RESTful, web-native alternative, with OID4VCI and DIDComm Issuance being parallel tracks for the same goal.
how-it-works
ARCHITECTURE

How OID4VC Works: Core Flows

OpenID for Verifiable Credentials (OID4VC) defines a set of interoperable protocols that enable the issuance, presentation, and verification of cryptographically secure credentials over standard web channels.

The OID4VC framework is built upon two core specifications that define distinct but complementary flows. OpenID for Verifiable Credential Issuance (OID4VCI) governs the process where an issuer grants a Verifiable Credential (VC) to a holder. This flow typically uses an authorization code or pre-authorized code to securely bootstrap the credential issuance transaction. OpenID for Verifiable Presentations (OID4VP) governs the process where a holder presents one or more VCs to a verifier to satisfy an authorization request. This flow is initiated when a verifier sends a Presentation Request, often encoded as a QR code or deep link, specifying the required credential types and constraints.

A foundational concept across both flows is the Wallet-Provider API. This defines a standardized RESTful interface that a wallet (the holder's software agent) must implement. Issuers and verifiers interact with this well-known API endpoint to discover supported features, submit requests, and receive responses. This decouples the wallet's internal logic from the external parties, ensuring interoperability. The communication is secured using OAuth 2.0 and JSON Web Tokens (JWTs), with DPoP (Demonstrating Proof-of-Possession) bindings commonly used to cryptographically link requests to a specific client key, preventing replay attacks.

The actual credential data is exchanged using the W3C Verifiable Credentials Data Model standard. In OID4VCI, the issuer's Credential Offer points to a credential manifest, and the final credential is delivered in a JWT or SD-JWT (Selective Disclosure JWT) format. In OID4VP, the holder constructs a Verifiable Presentation—a signed wrapper containing the relevant VCs—which is sent to the verifier. The verifier then validates the presentation's signatures, checks the status of the credentials (e.g., against a revocation registry), and evaluates the disclosed claims against its policy before granting access.

core-specifications
ARCHITECTURE

Core OID4VC Specifications

OpenID for Verifiable Credentials (OID4VC) is a suite of specifications that extend the OAuth 2.0 and OpenID Connect framework to enable the issuance, presentation, and verification of cryptographically secure Verifiable Credentials (VCs).

01

OpenID for Verifiable Credentials (OID4VC)

OID4VC is the overarching term for a set of specifications that integrate Verifiable Credentials (VCs) with the widely adopted OAuth 2.0 and OpenID Connect (OIDC) authorization framework. It enables standardized, secure, and privacy-preserving credential flows, allowing users to present proofs derived from their credentials without relying on centralized identity providers for every transaction.

04

Self-Issued OpenID Provider v2 (SIOPv2)

SIOPv2 is a core dependency of OID4VP that enables decentralized authentication. It allows an end-user to act as their own OpenID Provider (OP) using a Decentralized Identifier (DID). Instead of logging in via Google or Facebook, the user authenticates directly from their wallet by signing a challenge with their DID's cryptographic keys, establishing a holder-binding between the credential subject and the presenter.

05

Credential Formats: JWT-VC & SD-JWT-VC

OID4VC specifies interoperable formats for encoding credentials:

  • JWT Verifiable Credential (JWT-VC): A W3C VC encoded as a JSON Web Token (JWT). It provides integrity and proof of issuance but discloses all claims at once.
  • Selective Disclosure JWT (SD-JWT-VC): An advanced format enabling selective disclosure. The issuer provides a signed JWT with hashed claims, allowing the holder to reveal only specific claims to a verifier, enhancing data minimization and privacy.
06

Authorization Details & Grant Types

OID4VC flows use OAuth 2.0's Authorization Details extension to communicate credential-specific requirements. Key grant types include:

  • Pre-Authorized Code Flow: For issuance, where a user is pre-authorized and uses a one-time code (often from a QR scan).
  • Authorization Code Flow: The standard OAuth flow adapted for credential issuance or presentation, where the wallet exchanges an authorization code for an access token and then the credential or presentation.
examples
OID4VC IN ACTION

Real-World Examples & Implementations

OpenID for Verifiable Credentials (OID4VC) enables secure, user-centric identity verification across various sectors. These examples showcase its practical applications and the protocols that power them.

04

Banking & KYC/AML Compliance

Financial institutions are piloting OID4VC to streamline Know Your Customer (KYC) processes.

  • Reusable KYC: A user obtains a verified credential from one bank (e.g., proof of identity and address) and can re-present it to another institution, avoiding repetitive document submission.
  • Enhanced Privacy: Banks receive only the necessary, verified data, reducing data liability.
  • Regulatory Alignment: Supports Travel Rule compliance by verifiably linking transaction origins to credentialed identities.
70%+
Estimated KYC cost reduction potential
05

Academic Credential Verification

Universities and employers use OID4VC to issue and verify tamper-proof digital diplomas and transcripts.

  • Issuer: University signs a VC containing the graduate's degree data.
  • Holder: Graduate stores it in their digital wallet.
  • Verifier: Potential employer requests a presentation via OID4VP, instantly verifying the credential's authenticity and issuer without contacting the university.
  • Global Standard: Aligns with W3C Verifiable Credentials Data Model.
PROTOCOL COMPARISON

OID4VC vs. Other Credential Protocols

A technical comparison of OpenID for Verifiable Credentials (OID4VC) against other prominent credential issuance and presentation protocols.

Feature / DimensionOID4VCW3C Verifiable Credentials (VC-DATA)ISO mDL / mDOC

Core Architectural Model

OpenID Connect extension for credential flows

Generic data model and proof formats

ISO-standardized mobile driver's license

Primary Use Case

Federated identity & selective disclosure for web/mobile

Broad interoperability for any verifiable claim

Physical credential digitization (e.g., driver's license)

Credential Format Agnostic

Relies on OAuth 2.0 / OIDC Framework

Standardized Credential Offer Endpoint

Typical Issuance Flow

Pre-authorized code grant (RFC 9126)

Direct issuance or CHAPI-style request

Proximity-based (BLE, NFC) or QR code

Presentation Flow

SIOPv2 & OID4VP for wallet interaction

VP-Request & CHAPI

ISO 18013-5 mDL presentation

Cryptographic Proof Flexibility

Supports JWT-VC, SD-JWT, LDP-VC

Supports LDP-VC, JWT-VC, custom proofs

Primarily ISO 18013-5 MSO with ECDSA

ecosystem-usage
STANDARDS & PROTOCOLS

Ecosystem & Adoption

OpenID for Verifiable Credentials (OID4VC) is a suite of specifications that extends the OAuth 2.0 and OpenID Connect (OIDC) frameworks to enable the issuance, presentation, and verification of W3C Verifiable Credentials (VCs) in a standardized, interoperable way.

01

Core Components

OID4VC is built on three key specifications:

  • OID4VCI (Issuance): Defines how a Credential Issuer (like a government or university) can issue VCs to a Wallet using an OAuth 2.0 authorization flow.
  • OID4VP (Presentation): Defines how a Verifier (like a website) can request and receive VCs from a Wallet, enabling selective disclosure of claims.
  • SIOPv2 (Self-Issued OpenID Provider): Allows a user's Wallet to act as its own OpenID Provider, enabling decentralized authentication without a traditional Identity Provider.
02

Architecture & Roles

The protocol defines clear roles for interoperability:

  • Holder/Wallet: The user's software that stores VCs and interacts with Issuers and Verifiers.
  • Issuer: The entity that creates and cryptographically signs VCs (e.g., a diploma issuer).
  • Verifier: The relying party that requests and validates VCs to grant access or services.
  • Authorization Server: Manages the OAuth 2.0 flows for secure credential exchange. This separation ensures data minimization and user control over their digital identity.
03

Key Technical Mechanisms

OID4VC leverages and extends existing web standards:

  • OAuth 2.0 Authorization: Uses grant types and scopes to securely authorize credential issuance and presentation requests.
  • Decentralized Identifiers (DIDs): Often used as the subject identifier in VCs, enabling issuer and holder control without centralized registries.
  • Selective Disclosure: Allows the Holder to prove specific claims from a VC (e.g., "over 21") without revealing the entire document.
  • JSON Web Tokens (JWTs): A common format for representing VCs and presentation requests within the protocol.
04

Use Cases & Adoption Drivers

OID4VC enables portable, user-centric identity across sectors:

  • Digital Driver's Licenses & mDL: Aligns with the ISO 18013-5 standard for mobile driver's licenses.
  • Educational Credentials: For verifiable diplomas and certificates (e.g., EBSI, Open Badges).
  • Know Your Customer (KYC): Streamlines reusable identity verification for financial services.
  • Healthcare: Secure sharing of vaccination records or medical credentials. Adoption is driven by the need for interoperability between different wallet and issuer implementations.
05

Relationship to W3C Standards

OID4VC is a transport and authorization layer for the W3C's Verifiable Credentials Data Model. It does not define the credential format itself. Think of it this way:

  • W3C VC Data Model: Defines the data structure (the 'what')—the JSON-LD or JWT VC itself.
  • OID4VC: Defines the protocol (the 'how') for getting that VC from an Issuer to a Holder and from a Holder to a Verifier over the web. This separation allows OID4VC to be agnostic to the specific VC format or cryptographic proof type used.
security-considerations
OID4VC

Security & Privacy Considerations

OpenID for Verifiable Credentials (OID4VC) is a suite of specifications that extends OAuth 2.0 and OpenID Connect to enable the issuance and presentation of cryptographically verifiable credentials. This section details the core security and privacy mechanisms that define the protocol.

01

Selective Disclosure

A core privacy feature allowing a holder to reveal only specific attributes from a verifiable credential, rather than the entire document. This is enabled by cryptographic techniques like BBS+ signatures or CL signatures.

  • Example: Proving you are over 21 from a driver's license credential without revealing your exact birth date or address.
  • Benefit: Minimizes data exposure and supports the principle of data minimization.
02

Holder Binding & Proof-of-Possession

Mechanisms that cryptographically bind a credential to its legitimate holder and prove they control the associated Decentralized Identifier (DID) during presentation.

  • Holder Binding: Ensures a credential issued to Alice cannot be presented by Bob.
  • Proof-of-Possession (PoP): Requires the holder to sign the presentation request with a private key linked to their DID, proving they are the subject of the credential.
03

Presentation Integrity & Non-Repudiation

Guarantees that the data presented by a holder cannot be tampered with and that the presentation act is auditable.

  • Integrity: The verifiable presentation is cryptographically signed, allowing the verifier to detect any alteration of the disclosed claims.
  • Non-Repudiation: The holder's signature on the presentation serves as cryptographic proof that they authorized the disclosure, preventing them from later denying it.
04

Verifier & Issuer Authentication

Protocol flows ensure all parties are properly authenticated to prevent impersonation and man-in-the-middle attacks.

  • Issuer Authentication: The holder must authenticate the issuer (e.g., via their DID and public key) before trusting and storing a credential.
  • Verifier Authentication: The holder's wallet authenticates the verifier's identity (via its DID or OAuth client ID) before releasing any credentials, preventing credential phishing.
05

Unlinkability & Correlation Resistance

Privacy-preserving properties designed to prevent different interactions from being linked back to the same user.

  • Unlinkable Presentations: Using different presentation tokens or zero-knowledge proofs for each verifier prevents them from colluding to track a user.
  • Correlation Resistance: Techniques like using pairwise pseudonymous DIDs for different relationships make it difficult for issuers and verifiers to correlate a user's activities across contexts.
06

Credential Revocation & Status

Methods for an issuer to invalidate a credential before its expiration, a critical security control.

  • Status List 2021: A privacy-preserving method where revocation status is encoded in a bitstring, allowing the holder to prove non-revocation without revealing the credential's unique identifier.
  • Trade-offs: Balances issuer control with holder privacy, avoiding centralized query endpoints that leak user activity.
FAQ

Common Misconceptions About OID4VC

OpenID for Verifiable Credentials (OID4VC) is a suite of specifications for issuing, holding, and presenting verifiable credentials. This section clarifies frequent misunderstandings about its architecture, capabilities, and relationship to other standards.

No, OID4VC is not a single protocol but a suite of modular specifications built on OpenID Connect. The core components are OpenID for Verifiable Credential Issuance (OID4VCI) for issuing credentials and OpenID for Verifiable Presentations (OID4VP) for presenting them. These specifications can be used independently or together, allowing for flexible implementation of credential ecosystems without being locked into a monolithic standard.

OID4VC

Frequently Asked Questions (FAQ)

OpenID for Verifiable Credentials (OID4VC) is a suite of specifications that extends the OAuth 2.0 and OpenID Connect (OIDC) framework to support the issuance and presentation of W3C Verifiable Credentials. This FAQ addresses common technical questions for developers and architects.

OpenID for Verifiable Credentials (OID4VC) is a set of protocols that extends the OpenID Connect (OIDC) framework to enable the issuance and presentation of cryptographically secure, privacy-preserving W3C Verifiable Credentials (VCs). While standard OIDC issues simple identity tokens (JWTs) that are statements about a user from an OpenID Provider, OID4VC allows for the transfer of credentials that are self-contained, independently verifiable proofs held by the user. The key difference is architectural: OID4VC facilitates a holder-mediated model where the user's wallet controls the credential, versus OIDC's relying party-mediated model where the RP directly queries the provider.

ENQUIRY

Get In Touch
today.

Our experts will offer a free quote and a 30min call to discuss your project.

NDA Protected
24h Response
Directly to Engineering Team
10+
Protocols Shipped
$20M+
TVL Overall
NDA Protected Directly to Engineering Team