Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
LABS
Glossary

OIDC4VCI

OIDC4VCI (OpenID Connect for Verifiable Credential Issuance) is a protocol specification that extends OAuth 2.0 and OpenID Connect to enable the issuance of W3C Verifiable Credentials.
Chainscore © 2026
definition
DECENTRALIZED IDENTITY PROTOCOL

What is OIDC4VCI?

OIDC4VCI is an open standard that enables the issuance of cryptographically secure digital credentials, such as Verifiable Credentials (VCs), using the familiar OAuth 2.0 and OpenID Connect (OIDC) authorization framework.

OIDC4VCI (OpenID Connect for Verifiable Credential Issuance) is an IETF standard specification that defines how an issuer can provide a Verifiable Credential to a holder's digital wallet. It extends the widely adopted OAuth 2.0 and OpenID Connect protocols, which are used for authentication and API authorization, to support the secure, machine-readable issuance of credentials. This allows existing identity providers and authorization servers to become credential issuers without rebuilding their entire infrastructure, leveraging established patterns like authorization codes and token exchange.

The protocol defines two primary roles: the Issuer, which creates and signs the credentials, and the Wallet (or Holder), which requests, stores, and presents them. Communication occurs through a well-defined Credential Offer, initiated by the issuer, which contains a URL or QR code the wallet uses to start the issuance flow. The wallet then authenticates with the issuer (often using OIDC), obtains an access token, and requests a specific credential type from the issuer's Credential Endpoint. The credential is typically returned in a format like W3C Verifiable Credentials encoded as a JSON Web Token (JWT) or as SD-JWT.

A core technical component is the Credential Issuer Metadata, a discoverable configuration document that advertises the issuer's supported credential types, cryptographic formats, and endpoint locations. This enables wallet software to dynamically interact with any compliant issuer. The protocol supports selective disclosure, allowing holders to prove only specific claims from a credential without revealing the entire document, enhancing privacy. Common use cases include issuing digital driver's licenses, educational diplomas, professional certifications, and KYC/AML attestations that can be verified across different organizations and platforms.

For developers, implementing OIDC4VCI involves exposing standard OAuth 2.0 endpoints (/authorize, /token) alongside the new /credential endpoint. The issuer must also publish its metadata and support the defined credential formats. Wallets must be able to process credential offers, manage user consent, and store the received VCs securely. The standard is a cornerstone of the SSI (Self-Sovereign Identity) ecosystem, enabling interoperability between different vendors and forming the issuance counterpart to the OIDC4VP (Verifiable Presentation) standard used for credential verification.

etymology
STANDARDIZATION

Etymology and Origin

The term OIDC4VCI is a technical acronym that reveals its dual heritage in identity and credential management standards.

OIDC4VCI is an acronym for OpenID Connect for Verifiable Credential Issuance. Its etymology directly reflects its purpose: it is an extension of the widely adopted OpenID Connect (OIDC) protocol, specifically designed to standardize the issuance of W3C Verifiable Credentials (VCs). The name signals a convergence of two major technological lineages: the web-centric, user-centric identity framework of OIDC and the decentralized, cryptographically secure data model of VCs.

The origin of OIDC4VCI lies within the OpenID Foundation, the standards body responsible for OIDC. It was developed by the OpenID Connect Working Group to address a critical gap: while OIDC excels at authentication (proving "who you are") and OAuth 2.0 handles authorization (granting access), there was no standardized way for an OpenID Provider (OP) to also act as a Verifiable Credential Issuer. The specification, formally known as OpenID for Verifiable Credential Issuance, was created to define a secure, interoperable API for this function.

The development was heavily influenced by the growing ecosystem of Self-Sovereign Identity (SSI) and the need for credentials that are portable and user-controlled, unlike traditional identity tokens bound to a single service. By building upon OIDC's established flows and security profiles, OIDC4VCI allows existing identity providers to seamlessly become credential issuers, leveraging familiar concepts like access tokens and authorization codes to govern the issuance process. This strategic reuse of proven web infrastructure is a key part of its design philosophy.

The "4" in the acronym is a common shorthand in technical specifications meaning "for," mirroring patterns like SAML 2.0 or OAuth 2.0. The term Verifiable Credential Issuance precisely denotes its scope: it covers the protocol for issuing a credential from an issuer to a holder (often via a wallet), but not the subsequent presentation of that credential, which is covered by a companion specification, OIDC4VP (OpenID Connect for Verifiable Presentations). This bifurcation mirrors the natural lifecycle of a credential.

In practice, OIDC4VCI enables use cases where a user authenticates via their bank's OIDC provider and then, in the same session, receives a verifiable credential attesting to their account status, or where a university's identity system issues a cryptographically signed digital diploma. Its origin as a formal extension of a major internet standard is central to its goal of enabling widespread, interoperable adoption of verifiable credentials across the web.

key-features
OIDC4VCI

Key Features

OpenID for Verifiable Credential Issuance (OIDC4VCI) is a protocol that enables the issuance of W3C Verifiable Credentials (VCs) using the established OAuth 2.0 and OpenID Connect framework.

02

Credential Offer Object

The protocol introduces a machine-readable Credential Offer object, typically a URI or QR code. This object contains the metadata needed for the wallet to initiate the credential issuance process, including:

  • The Issuer's credential endpoint URL.
  • The unique identifiers (credential_configuration_ids) for the offered credentials.
  • Optional Grants specifying the authorization mechanisms (e.g., a pre-authorized code). This decouples the offer from the issuance flow.
03

Credential Metadata & Format Negotiation

Issuers publish a Credential Issuer Metadata document (similar to OIDC Discovery). This allows Wallets to dynamically discover:

  • Supported credential formats (e.g., JWT-VC, SD-JWT, or JSON-LD).
  • The cryptographic proof types required.
  • The specific claims available in each credential type. The Holder's wallet requests a credential in its preferred format, and the Issuer responds with a credential in one of the mutually supported formats.
04

Pre-Authorized & Authorized Code Flows

OIDC4VCI supports two primary issuance flows:

  • Pre-Authorized Code Flow: The Issuer generates a short-lived, single-use code before user interaction. The wallet uses this code directly at the token endpoint, ideal for QR-based onboarding where the user is physically present.
  • Authorized Code Flow: The user completes a full OAuth/OpenID Connect authorization with the Issuer, which returns a standard authorization code. This is used for online services where the user logs in via a web browser.
05

Binding to Holder's Identity

A core security feature is cryptographic binding of the issued credential to the Holder. This is achieved through a Proof-of-Possession (PoP) mechanism. When requesting the credential, the Holder must sign the request with a key they control (e.g., from their wallet's Decentralized Identifier - DID). This key proof ensures that only the intended recipient, who holds the corresponding private key, can receive the credential, preventing interception and replay attacks.

06

Interoperability & Ecosystem Role

OIDC4VCI is designed for interoperability, acting as a bridge between the traditional federated identity world (OIDC) and the emerging SSI (Self-Sovereign Identity) ecosystem. It allows existing identity providers (e.g., government portals, universities, corporations) to become VC Issuers without overhauling their infrastructure. Wallets that support the protocol can receive credentials from any compliant issuer, promoting a unified credential market.

how-it-works
PROTOCOL MECHANICS

How OIDC4VCI Works

OIDC4VCI is a standardized protocol that enables the issuance of cryptographically secure digital credentials, such as Verifiable Credentials (VCs), over the OpenID Connect (OIDC) framework.

OIDC4VCI (OpenID Connect for Verifiable Credential Issuance) is a specification that defines how an issuer provides a holder (like a user's digital wallet) with a W3C Verifiable Credential. It extends the familiar OAuth 2.0 and OpenID Connect flows, which are widely used for authentication and API access, to support credential issuance. The protocol operates through a series of well-defined HTTP endpoints and JSON data structures, allowing a wallet to request a specific credential type, prove the user's identity, and receive a signed, machine-verifiable credential in return.

The workflow typically begins with the holder's wallet discovering the issuer's capabilities via a credential issuer metadata document. The wallet then initiates an authorization request, often resulting in the user authenticating with the issuer. Upon successful authentication, the wallet requests the credential by presenting an access token and specifying the desired credential format (e.g., JSON-LD or JWT). A critical step is the proof-of-possession, where the wallet cryptographically proves control of the Decentralized Identifier (DID) or key that will be bound to the issued credential, ensuring it cannot be delivered to an unauthorized party.

Finally, the issuer constructs the Verifiable Credential, embedding the user's claims and signing it with its own cryptographic key. The credential is then transmitted to the wallet, usually within a credential response object. This entire exchange is designed for interoperability, allowing wallets from different vendors to receive credentials from various issuers without custom integrations. The protocol supports batch issuance, deferred issuance, and error handling, making it suitable for complex real-world scenarios like digital driver's licenses or professional certifications.

examples
OIDC4VCI

Examples and Use Cases

OpenID for Verifiable Credential Issuance (OIDC4VCI) is a protocol that enables the issuance of W3C Verifiable Credentials over standard OAuth 2.0 and OpenID Connect flows. These examples illustrate its practical applications across industries.

02

KYC/AML Compliance

Financial institutions can use OIDC4VCI to streamline Know Your Customer (KYC) processes. After a user completes verification with a trusted provider, that provider issues a Verifiable Credential attesting to their verified identity. The user can then present this credential to multiple banks or exchanges, eliminating redundant checks. Key benefits include:

  • Reduced friction for customer onboarding.
  • Enhanced privacy as users share only necessary proof, not raw documents.
  • Auditable compliance through cryptographically verifiable attestations.
03

Academic Credentialing

Universities and certification bodies can issue tamper-proof digital diplomas and certificates. A graduate authenticates, and the institution's OIDC4VCI-compliant service issues a Verifiable Credential representing their degree. This credential can be instantly verified by employers or other institutions without contacting the original issuer. This application provides:

  • Instant verification eliminating manual transcript requests.
  • Reduced fraud via cryptographic signatures.
  • Lifelong portability for the credential holder.
05

Healthcare Data Portability

Healthcare providers or insurance companies can issue Verifiable Credentials for vaccination records, lab results, or insurance eligibility. A patient controls these credentials in their digital wallet and can present them as needed. This enables:

  • Patient-controlled data sharing with clinics, pharmacies, or travel authorities.
  • Privacy-preserving verification (e.g., proving you are vaccinated without revealing your birth date).
  • Interoperability across different healthcare IT systems using a common standard.
06

Decentralized Finance (DeFi) & DAOs

In Web3, OIDC4VCI can bridge off-chain identity with on-chain activity. A DAO might issue a Verifiable Credential attesting to a member's reputation or contribution level. A DeFi protocol could require a credential proving jurisdiction or accredited investor status for compliance (DeFi compliance). This allows for:

  • Sybil-resistance by linking unique identity to on-chain addresses.
  • Gated access to financial products based on verified attributes.
  • Reputation-based governance where voting power is linked to verified credentials.
PROTOCOL COMPARISON

OIDC4VCI vs. Other Issuance Methods

A technical comparison of credential issuance protocols based on core architectural features and capabilities.

Feature / MetricOIDC4VCIW3C Verifiable Credentials (Direct)SAML 2.0 AssertionsProprietary API

Underlying Protocol Standard

OAuth 2.0 / OpenID Connect

W3C VC Data Model

SAML 2.0 XML Schema

Custom REST/GraphQL

Credential Format Agnostic

Native Wallet Binding (DPoP)

Authorization Flow (User-Centric)

Machine-Readable Metadata (Credential Offer)

Standardized Credential Endpoint

Typical Issuance Latency

< 1 sec

< 2 sec

2-5 sec

Varies

Primary Use Case

User-Held Digital Wallets

System-to-System Data Exchange

Enterprise Single Sign-On (SSO)

Closed Ecosystem Applications

ecosystem-usage
OIDC4VCI

Ecosystem and Adoption

OIDC4VCI (OpenID Connect for Verifiable Credential Issuance) is a protocol that enables the issuance of W3C Verifiable Credentials over standard OAuth 2.0 and OpenID Connect flows. It bridges the worlds of decentralized identity and traditional web authentication.

01

Core Protocol Flow

OIDC4VCI defines a standardized API for issuing credentials. The flow typically involves:

  • Credential Offer: An issuer presents a machine-readable offer (e.g., via a QR code or deep link).
  • Authorization: The holder authenticates using OIDC to obtain an access token.
  • Credential Request & Issuance: The holder presents the token and a proof of key possession to a credential endpoint, which returns the signed Verifiable Credential. This decouples authentication from issuance, enabling scalable, user-controlled credential distribution.
02

Key Use Cases

The protocol is foundational for portable digital identity ecosystems:

  • Self-Sovereign Identity (SSI): Issuing Decentralized Identifiers (DIDs) and verifiable credentials to users' digital wallets.
  • Know Your Customer (KYC): Financial institutions can issue reusable, privacy-preserving KYC attestations.
  • Academic & Professional Credentials: Universities issuing diplomas or employers issuing proof-of-employment credentials.
  • Access Credentials: Issuing verifiable membership or access passes for physical or digital services.
03

Relationship to SIOP & OIDC4VP

OIDC4VCI is part of a suite of OpenID specifications for verifiable credentials:

  • OIDC4VCI (Issuance): This protocol, for issuing credentials.
  • OIDC4VP (Presentation): For presenting and verifying credentials. A holder uses it to share a VC with a verifier.
  • SIOP (Self-Issued OP): Allows a user to act as their own OpenID Provider using a Decentralized Identifier, enabling authentication without a central IDP. Together, they form a complete stack for credential lifecycle management.
04

Technical Components

The specification defines several critical data structures and endpoints:

  • Credential Offer Object: A JSON object containing the issuer, credentials offered, and grants.
  • Credential Endpoint: The API where authorized holders request credentials.
  • Credential Response: Contains the issued credential, often in JSON-LD or JWT-VC format.
  • Metadata: Issuers publish metadata (.well-known endpoint) describing supported credential types, cryptographic suites, and endpoints, enabling wallet discovery.
05

Adoption & Implementations

OIDC4VCI is seeing rapid adoption as the standard for interoperable credential issuance:

  • European Digital Identity (EUDI) Wallet: The EU's framework for digital identity wallets mandates its use for issuing Person Identification Data (PID) and Attestations of Attributes (AA).
  • OpenID Foundation: The OpenID Connect Working Group maintains the specification, ensuring broad industry alignment.
  • Wallet & Issuer Ecosystem: Major SSI wallet providers (e.g., those supporting W3C Verifiable Credentials) and trust framework operators are implementing the protocol to ensure interoperability.
06

Benefits Over Ad-Hoc Issuance

Standardizing on OIDC4VCI provides significant advantages:

  • Interoperability: Any compliant wallet can receive credentials from any compliant issuer, breaking vendor lock-in.
  • Security: Leverages battle-tested OAuth 2.0 authorization flows and requires Proof of Possession (PoP) binding for key security.
  • User Experience: Enables familiar, streamlined UX patterns (QR scans, deep links) for acquiring credentials.
  • Discoverability: Standardized metadata allows wallets to automatically configure connections to issuers.
security-considerations
OIDC4VCI

Security and Trust Considerations

OpenID for Verifiable Credential Issuance (OIDC4VCI) extends the OAuth 2.0 and OpenID Connect framework to issue Verifiable Credentials, introducing specific security models and trust mechanisms for decentralized identity.

01

Authorization Server Trust

The Authorization Server is the central trust anchor in OIDC4VCI. It authenticates the holder, manages authorization, and issues the Authorization Code or Access Token required to request a credential. Security relies on:

  • TLS-secured communication for all endpoints.
  • Strong client authentication methods (e.g., private_key_jwt).
  • Strict validation of redirect URIs and client metadata to prevent phishing and code injection attacks.
02

Credential Issuer Integrity

The Credential Issuer is responsible for the cryptographic signing and issuance of the Verifiable Credential. Trust is established through:

  • Issuer Identifiers: A cryptographically verifiable DID or a HTTPS URL that serves the issuer's metadata.
  • Credential Signing Keys: The issuer's private keys used for signing credentials, published in a DID Document or a .well-known configuration.
  • Credential Schemas: The structure and semantic meaning of the credential data, often referenced by a URI to ensure interoperability and prevent misinterpretation.
03

Holder Wallet Security

The Wallet (Holder) must securely manage sensitive artifacts. Key security responsibilities include:

  • Private Key Custody: Safeguarding the Decentralized Identifier (DID) keys used to receive and prove control of credentials.
  • Token Storage: Securely storing the Access Token and Credential Response.
  • User Consent & UI Integrity: Providing a clear, tamper-resistant interface for the user to review and consent to the credential being issued, as mandated by the authorization_details parameter.
04

Deferred Issuance & Token Replay

OIDC4VCI supports Deferred Credential Issuance, where a credential is prepared asynchronously. This introduces the Deferred Credential Endpoint, secured by a unique Transaction ID. Critical considerations are:

  • Transaction ID Binding: The ID must be strongly bound to the original authorization request and the holder's session.
  • Token Replay Prevention: The Access Token used to poll the deferred endpoint must be single-use or scoped exclusively to that transaction to prevent credential theft.
  • Expiration & Cleanup: Deferred transactions must have strict timeouts to prevent resource exhaustion attacks.
05

Metadata Discovery & Trust Chains

Automated discovery of issuer capabilities via OpenID Provider Metadata or Credential Issuer Metadata reduces configuration errors but requires secure retrieval. Key practices:

  • HTTPS Enforcement: All metadata URLs must use TLS.
  • Signed Metadata: Use of Signed JWT Metadata (signed_metadata) allows issuers to cryptographically sign their configuration, creating a verifiable trust chain from the issuer identifier to their endpoints and supported credential formats.
06

Credential Format-Specific Risks

Security properties depend on the Credential Format (e.g., W3C Verifiable Credentials, ISO mDL). Each format has distinct considerations:

  • Proof Mechanisms: JWT vs. Linked Data Proofs (LD-Proofs) have different cryptographic suites and key management requirements.
  • Selective Disclosure: Formats like SD-JWT enable disclosure of specific claims; the wallet must correctly implement the complex Key Binding process to prevent claim re-use.
  • Cryptographic Agility: The protocol must support deprecation of weak cryptographic algorithms across the entire stack, from TLS to credential signatures.
OIDC4VCI

Common Misconceptions

OpenID for Verifiable Credential Issuance (OIDC4VCI) is a standardized protocol for issuing digital credentials, often conflated with other identity and wallet technologies. This section clarifies its distinct role and addresses frequent misunderstandings.

No, OIDC4VCI is not a wallet; it is a protocol for issuing credentials. It defines the communication flow between an issuer (like a university or government) and a holder's wallet (like a mobile app). The wallet is the software that stores and manages credentials, while OIDC4VCI is the standardized method for securely delivering those credentials to the wallet. Think of it as the secure delivery service, not the mailbox.

Key Clarifications:

  • Wallet Agnostic: It works with any compliant wallet, promoting interoperability.
  • Issuer-Focused: The specification primarily standardizes the issuer's API and the credential format (often W3C Verifiable Credentials).
  • Complementary: It is designed to work with other protocols like OIDC4VP (for presentation) to form a complete credential lifecycle.
OIDC4VCI

Frequently Asked Questions (FAQ)

OpenID for Verifiable Credential Issuance (OIDC4VCI) is a protocol for issuing digital credentials using the familiar OAuth 2.0 and OpenID Connect flows. These questions address its core mechanisms, use cases, and how it differs from other standards.

OIDC4VCI (OpenID for Verifiable Credential Issuance) is a protocol specification that extends OAuth 2.0 and OpenID Connect to enable the issuance of W3C Verifiable Credentials (VCs) in a standardized, interoperable way. It works by defining a credential endpoint at the Authorization Server (Issuer). After a user authenticates via OIDC, they can present an access token to this endpoint to request a specific credential type. The protocol specifies the request/response format, supported credential types, and optional features like deferred issuance and batch issuance. It leverages existing, well-understood web security patterns to issue cryptographically secure, machine-verifiable credentials.

further-reading
OIDC4VCI

Further Reading

OpenID for Verifiable Credential Issuance (OIDC4VCI) is an IETF standard that extends the OAuth 2.0 and OpenID Connect framework to support the issuance of W3C Verifiable Credentials and other credential formats. Explore its core components and related protocols.

03

Credential Metadata & Formats

OIDC4VCI defines a standardized way for an issuer to advertise supported credential types. This includes:

  • Credential configurations (.well-known endpoint)
  • Supported credential formats (e.g., jwt_vc_json, ldp_vc)
  • Required claims or fields for issuance This metadata enables wallets to discover what credentials are available and how to request them.
04

Credential Offer & Authorization

The initiation flow for credential issuance. A Credential Offer is a machine-readable message (often a QR code or deep link) containing a pre-authorized offer for a specific credential. The wallet uses the information in this offer to start the OIDC4VCI flow, exchanging the offer for an access token to authorize the issuance request.

ENQUIRY

Get In Touch
today.

Our experts will offer a free quote and a 30min call to discuss your project.

NDA Protected
24h Response
Directly to Engineering Team
10+
Protocols Shipped
$20M+
TVL Overall
NDA Protected Directly to Engineering Team