Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
LABS
Glossary

Credential Offer

A Credential Offer is a standardized message or URI sent by an issuer to a potential holder, containing the metadata required to initiate the issuance of a Verifiable Credential.
Chainscore © 2026
definition
VERIFIABLE CREDENTIALS

What is a Credential Offer?

A Credential Offer is a structured data object that initiates the issuance of a Verifiable Credential by an issuer to a holder.

A Credential Offer is a machine-readable message, often formatted as a JSON object, that an issuer sends to a prospective holder. It serves as a formal invitation for the holder to request and receive a specific Verifiable Credential (VC). The offer contains essential metadata, such as the credential type, the issuer's identity, and the cryptographic mechanisms that will be used for issuance. This structured proposal is a foundational step in the W3C Verifiable Credentials data model, enabling a standardized, interoperable flow for credential exchange.

The core purpose of a Credential Offer is to establish a secure and consent-based issuance protocol. It allows the holder to review the terms of the credential—what data will be attested, by whom, and under which cryptographic proofs—before proceeding. This process typically involves the holder's wallet or agent software receiving the offer, parsing its contents, and presenting the details to the user for approval. Only after the holder accepts the offer and provides any necessary proofs (like a DID or cryptographic challenge) does the issuer generate and transmit the final, signed Verifiable Credential.

In practical implementations, such as those using OpenID for Verifiable Credential Issuance (OID4VCI), the Credential Offer often contains a unique pre-authorized code or a URL. This code is exchanged with the issuer's credential endpoint to fetch the actual credential data. This mechanism ensures that the credential is issued only to the intended recipient who received the offer, enhancing security and preventing credential interception. The offer acts as the secure handshake that bridges the initial intent to issue with the final cryptographic act of signing and delivering the credential.

how-it-works
DECENTRALIZED IDENTITY

How a Credential Offer Works

A Credential Offer is the initial step in the W3C Verifiable Credentials data model, where an issuer proposes to issue a digital attestation to a holder.

A Credential Offer is a structured message, often formatted as a JSON object, sent from an issuer to a prospective holder. It contains the essential metadata required for the holder to understand and potentially accept the credential. This includes the credential type (e.g., UniversityDegreeCredential), the issuer's DID (Decentralized Identifier), a preview of the claims (like name or issuance date), and the specific protocols and endpoints the issuer supports for the subsequent issuance flow. The offer acts as a formal, machine-readable invitation to begin the credential issuance process.

Upon receiving the offer, the holder's wallet or agent software presents the details to the user. The holder reviews the proposed credential's contents, verifies the issuer's identity by resolving their DID, and decides whether to accept. If accepted, the holder typically responds by sending a Credential Request back to the issuer. This request proves the holder controls the DID specified in the offer and formally asks for the credential to be issued. This request-response pattern ensures both parties are in agreement before any sensitive data is transmitted.

The technical foundation for this exchange is often defined by specifications like OpenID for Verifiable Credential Issuance (OIDC4VCI) or W3C Verifiable Credentials API. These standards ensure interoperability between different issuers and wallets. For example, in OIDC4VCI, the Credential Offer can be conveyed via a QR code, a deep link, or a direct message. The offer contains a unique grant that the holder uses to fetch the actual credential from the issuer's server, completing the issuance ceremony. This mechanism is fundamental to user-centric identity, giving individuals agency over which credentials they collect and store.

key-features
DECENTRALIZED IDENTITY

Key Features of a Credential Offer

A Credential Offer is a structured data object, often a JSON Web Token (JWT), issued by a verifier to a holder, enabling the holder to request a Verifiable Credential. It defines the terms of issuance.

01

Issuer Identification

The offer contains the DID (Decentralized Identifier) of the issuing party, cryptographically proving the source of the offer. This prevents spoofing and establishes trust in the credential's origin. The issuer's public key, resolvable from their DID, is used to verify the offer's signature.

02

Credential Manifest

This is a machine-readable specification of the credential being offered. It details:

  • Format (e.g., W3C Verifiable Credential, AnonCreds).
  • Claims/Attributes required from the holder.
  • Input Descriptors defining how the holder should present data.
  • The schema or data model the issued credential will conform to.
03

Presentation Definition

Specifies the proof the holder must provide to receive the credential. This often requires a Verifiable Presentation of existing credentials to satisfy the issuer's policies. It defines constraints like:

  • Required credential types.
  • Trusted issuers for those credentials.
  • Specific attribute values that must be matched.
04

Expiration & Nonce

The offer includes security mechanisms to prevent replay attacks and ensure timeliness.

  • Expiration Timestamp: A ttl (time-to-live) after which the offer is invalid.
  • Nonce: A unique, single-use cryptographic challenge that binds the holder's subsequent credential request to this specific offer, preventing request forgery.
05

Callback Endpoints

Contains the network locations for completing the issuance flow.

  • Transaction Endpoint: The URL where the holder submits the final credential request (e.g., a signed JWT).
  • Status Endpoint: (Optional) A URL the holder can poll to check the status of the credential issuance process after submission.
06

Format & Protocol Binding

The offer is bound to a specific issuance protocol, such as OpenID for Verifiable Credentials (OID4VCI) or CHAPI. This determines the exact serialization (e.g., a signed JWT or a JSON object) and the sequence of API calls required for the holder to interact with the issuer and complete the issuance.

PROTOCOL MESSAGE COMPARISON

Credential Offer vs. Related Messages

A comparison of the Credential Offer message with other key messages in the credential issuance and presentation flow, highlighting their distinct roles and technical characteristics.

Feature / PurposeCredential OfferCredential RequestCredentialPresentation Request

Initiating Actor

Issuer

Holder

Issuer

Verifier

Primary Purpose

Proposes issuance of a specific credential

Requests issuance of a credential from an offer

Contains the issued, signed credential data

Requests proof of credential attributes

Message Flow Direction

Issuer → Holder

Holder → Issuer

Issuer → Holder

Verifier → Holder

Contains Credential Data

Binds to a Specific DIDComm Thread

Governed by Aries RFC

Aries RFC 0451

Aries RFC 0451

Aries RFC 0453

Aries RFC 0454

Preceded By

Connection established

Credential Offer

Credential Request

Connection established

Followed By

Credential Request

Credential

Presentation Request (optional)

Presentation

examples
TYPES & APPLICATIONS

Examples of Credential Offers

A Credential Offer is a structured data object that proposes the issuance of a Verifiable Credential. These examples illustrate common formats and real-world use cases across different ecosystems.

technical-details
DATA MODEL

Credential Offer

A Credential Offer is a structured data object that initiates the issuance of a Verifiable Credential, containing the essential metadata and cryptographic parameters required for the holder to request and receive the credential.

A Credential Offer is a machine-readable message, typically formatted as a JSON object, sent by an issuer to a prospective holder. Its primary function is to communicate the intent to issue a specific credential and provide the holder with the necessary information to begin the issuance protocol, such as the credential type, the issuer's public DID, and a unique pre-authorized code. This object acts as the formal invitation in issuance flows defined by standards like OpenID for Verifiable Credential Issuance (OID4VCI).

The core components of a Credential Offer include the credential_issuer identifier (the issuer's DID), the credential_configuration_ids specifying which credential types are being offered, and often a grants object detailing the authorization method, such as a pre-authorized code. This code is a one-time token that allows the holder to subsequently request the credential without further interactive authentication, streamlining the user experience. The offer may also contain human-readable metadata like display properties for wallets.

Upon receiving a Credential Offer, a wallet or holder agent parses the object to understand what is being offered and how to proceed. The holder then typically uses the information within the offer to construct a Credential Request, which is sent back to the issuer's endpoint. This request-response pattern ensures that the issuance process is consent-based and that the holder is in control of initiating the final data transfer, a key principle of Self-Sovereign Identity (SSI) architectures.

In practical deployment, Credential Offers can be delivered through various channels: embedded as deep links in QR codes, transmitted via secure messaging protocols, or presented within web applications. For example, a university's student portal might generate a QR code containing a Credential Offer for a digital diploma, which a graduate can then scan with their wallet to begin the issuance process. This flexibility makes the Credential Offer a versatile and user-centric entry point for credential acquisition.

security-considerations
CREDENTIAL OFFER

Security & Privacy Considerations

A Credential Offer is a structured data object that initiates the issuance of a Verifiable Credential, containing the metadata and claims a holder can request. Its security and privacy properties are foundational to trust in decentralized identity systems.

01

Data Minimization in the Offer

A secure Credential Offer should adhere to the principle of data minimization, disclosing only the essential metadata required for the holder to make an informed decision. This prevents unnecessary data leakage about the issuer's internal systems or the specific credential schema before the holder consents. For example, an offer for a KYC credential should not pre-disclose the user's specific address or date of birth.

02

Tamper-Evidence & Integrity

The integrity of the offer must be verifiable to prevent tampering during transmission. This is typically achieved by having the issuer cryptographically sign the Credential Offer object. The holder's wallet verifies this signature against the issuer's known Decentralized Identifier (DID) to ensure the offer's contents (like the credential type, issuer DID, and terms) have not been altered by a man-in-the-middle attacker.

03

Phishing & Origin Authentication

A critical threat is phishing, where a malicious actor presents a fake offer mimicking a legitimate issuer. Security relies on strong origin authentication. The holder's agent must verify that the offer:

  • Comes from a trusted DID the user has a prior relationship with.
  • Is presented over a secure, authenticated channel (e.g., a QR code with a cryptographic nonce, or a deep link from a verified app).
  • Clearly displays the issuer's identifiable information for user confirmation.
04

Privacy-Preserving Delivery Channels

The method of transmitting the offer can impact privacy. Push-based offers (e.g., via a direct, encrypted DIDComm message) are more private than pull-based offers (e.g., a publicly accessible URL). A public URL, if guessable, could allow correlation or reveal that a specific offer was made. Best practice is to use single-use, authenticated channels that do not leak the offer's existence or contents to unauthorized parties.

05

Selective Disclosure & Consent

The offer should enable holder sovereignty by clearly stating what claims will be issued and allowing for selective disclosure requests. The holder must be able to review the proposed claims and consent to the issuance explicitly. A secure system ensures the holder can refuse or negotiate the offer without penalty and that their consent is an auditable part of the subsequent issuance protocol flow.

06

Replay & Reuse Attacks

A Credential Offer should be single-use or time-bound to prevent replay attacks. An attacker who intercepts an offer could attempt to replay it to trick another holder or the same holder at a later time. Mitigations include embedding a unique nonce and an expiration timestamp (expires) within the signed offer. The issuer must reject any issuance request referencing a consumed or expired offer.

CREDENTIAL OFFER

Frequently Asked Questions (FAQ)

A Credential Offer is a structured data object that initiates the issuance of a Verifiable Credential. This section answers common technical questions about its components, flow, and role in decentralized identity systems.

A Credential Offer is a machine-readable message, typically formatted as a JSON object, that an issuer sends to a holder to propose the issuance of one or more Verifiable Credentials (VCs). It acts as the initial step in the credential issuance flow defined by standards like the W3C Verifiable Credentials Data Model and protocols such as OpenID for Verifiable Credential Issuance (OID4VCI). The offer contains metadata that allows the holder's wallet to understand what is being offered and how to proceed with the issuance request. It is not the credential itself but a promise or invitation to issue one, containing essential identifiers and endpoint information.

ENQUIRY

Get In Touch
today.

Our experts will offer a free quote and a 30min call to discuss your project.

NDA Protected
24h Response
Directly to Engineering Team
10+
Protocols Shipped
$20M+
TVL Overall
NDA Protected Directly to Engineering Team
Credential Offer: Definition & Role in SSI | ChainScore Glossary