Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
LABS
Glossary

OIDC4VC

OIDC4VC is an OpenID Connect extension that enables the issuance and presentation of W3C Verifiable Credentials using standardized OAuth 2.0 authorization flows.
Chainscore © 2026
definition
IDENTITY STANDARD

What is OIDC4VC?

OIDC4VC is a technical specification that combines OpenID Connect with Verifiable Credentials to enable secure, user-centric identity verification on the web.

OIDC4VC (OpenID Connect for Verifiable Credentials) is a suite of specifications that extends the widely adopted OpenID Connect (OIDC) protocol to support the issuance, presentation, and verification of W3C Verifiable Credentials. It enables a decentralized identity model where users can obtain digital credentials from issuers (like governments or universities) and selectively present cryptographically signed claims to verifiers (like websites or services) without relying on a central authority. This bridges the mature, web-scale OIDC authentication flow with the emerging, privacy-preserving paradigm of verifiable data.

The core innovation of OIDC4VC is its use of OAuth 2.0 grant types and JSON Web Tokens (JWTs) to transport Verifiable Credentials. Instead of a simple ID token containing user attributes, an issuer can provide a Verifiable Presentation or a special Authorization Code that can be exchanged for one. Key protocols within the suite include the Credential Offer, which initiates the flow; the Authorization Code Grant for VC Issuance; and the Pre-Authorized Code Grant, which allows for streamlined credential issuance without user interaction during the initial request.

For developers, implementing OIDC4VC typically involves integrating libraries that support the Self-Issued OpenID Provider v2 (SIOPv2) and OIDC4VCI (Issuance) and OIDC4VP (Presentation) protocols. A common use case is a user logging into a financial service (verifier) by presenting a verifiable credential from their digital wallet (holder) that proves their age or residency, which was originally issued by a government agency (issuer). This eliminates the need for the service to store sensitive personal data, shifting the burden of proof and custody to the user's wallet.

The standard is foundational for ecosystems like the European Digital Identity Wallet (EUDI Wallet) and is designed for interoperability. It ensures that verifiable credentials can be used across different vendors and platforms by building upon established web standards. By leveraging OIDC, it provides a familiar integration path for existing Relying Parties while enabling them to request and verify credentials that are more secure, privacy-respecting, and machine-verifiable than traditional attribute sharing.

etymology
TERM EVOLUTION

Etymology and Origin

The development of the OIDC4VC standard represents a pivotal convergence of two major identity paradigms, merging the user-centric, web-scale authentication of OAuth 2.0 with the cryptographic portability of Verifiable Credentials.

OIDC4VC is a compound acronym that stands for OpenID Connect for Verifiable Credentials. Its etymology directly reflects its technical composition: it is an extension of the widely adopted OpenID Connect (OIDC) protocol, specifically designed to issue, present, and verify W3C Verifiable Credentials (VCs). This naming convention follows the common industry pattern of appending a suffix to a core protocol to denote its application to a new domain, signaling that it builds upon OIDC's robust OAuth 2.0 foundation for authorization.

The origin of OIDC4VC is rooted in the need to bridge the gap between the federated, account-based world of traditional web authentication and the decentralized, credential-based model of Self-Sovereign Identity (SSI). Prior to its development, Verifiable Credentials often relied on bespoke or nascent protocols for presentation, lacking the interoperability and developer familiarity of established web standards. The OpenID Foundation and the Decentralized Identity Foundation (DIF) initiated the work to create a standardized profile that would allow OIDC's id_token and userinfo endpoints to carry cryptographically secure, privacy-preserving credentials.

Key to its design was the introduction of new OAuth 2.0 grant types and token formats. The most significant is the Pre-Authorized Code Flow, which enables a holder to retrieve a credential without prior interaction, and the use of a Verifiable Presentation as a secure, signed container for credentials during presentation. This evolution transformed OIDC from a protocol primarily for logging into websites into a framework for portable, machine-verifiable digital identity attributes.

The standardization process involved harmonizing concepts from the W3C Verifiable Credentials Data Model with OIDC's existing flows. For instance, the OIDC issuer became an entity that issues VCs, the client became a verifier requesting credentials, and the subject became the holder of the credential. This mapping allowed developers to leverage familiar OAuth constructs while working with the richer data model and cryptographic proofs of VCs.

Today, OIDC4VC is governed as a formal specification by the OpenID Foundation's OpenID Connect Working Group. Its development continues to be influenced by real-world implementations and the broader ecosystem's push towards digital wallets and trust frameworks. As such, it stands as a canonical example of how legacy web infrastructure can be extended to support next-generation decentralized identity principles without requiring a complete architectural overhaul.

how-it-works
TECHNICAL PRIMER

How OIDC4VC Works

OIDC4VC is a set of specifications that enables the issuance and presentation of cryptographically verifiable credentials using the familiar OAuth 2.0 and OpenID Connect framework.

OIDC4VC (OpenID Connect for Verifiable Credentials) is a protocol suite that extends the widely adopted OAuth 2.0 and OpenID Connect (OIDC) standards to support the exchange of Verifiable Credentials (VCs). It provides a standardized, interoperable bridge between the world of identity federation and the decentralized trust model of W3C Verifiable Credentials. The core innovation is the use of OIDC's authorization flow to securely request and transmit VCs, which are signed JSON Web Tokens (JWTs) or other formats containing claims about a subject, such as a user's name, age, or professional accreditation.

The workflow involves three primary roles: the Holder (the end-user), the Issuer (the entity that creates and signs the credential), and the Verifier (the service requesting proof). A typical credential presentation flow begins when a Verifier, acting as an OIDC Relying Party, requests specific claims. Instead of redirecting the Holder to a traditional Identity Provider, the protocol directs them to a Wallet that holds their VCs. The Holder's wallet selects the appropriate credential, creates a Verifiable Presentation, and returns it within the OIDC token response. This presentation contains the VC and cryptographic proof, allowing the Verifier to authenticate the Holder and verify the credential's integrity and issuer without contacting the Issuer directly.

A key technical component is the Authorization Details object, a JSON structure defined in RFC 9396, which specifies the type of credential being requested (e.g., a VerifiableCredential), the format (e.g., jwt_vc_json), and the specific claims required. This allows for rich, machine-readable authorization requests. Furthermore, OIDC4VC leverages Decentralized Identifiers (DIDs) for the cryptographic identities of Issuers and Holders, enabling verification based on public keys resolvable from a decentralized ledger or other DID method, thus ensuring portability and preventing vendor lock-in.

For issuance, the protocol defines a similar flow where the Holder initiates a request to an Issuer. The Issuer's authorization server returns an Authorization Code that the Holder exchanges at the Issuer's Credential Endpoint for the actual signed Verifiable Credential, which is then stored in their digital wallet. This dual flow for Issuance and Presentation creates a complete, standards-based lifecycle for credentials, supporting use cases like KYC verification, educational diplomas, employment credentials, and selective disclosure of attributes, where a user can prove they are over 21 without revealing their exact birth date.

By building on OIDC, OIDC4VC offers significant practical advantages: it reuses existing, battle-tested security patterns, leverages a vast ecosystem of libraries and identity providers, and simplifies integration for enterprises. It represents a crucial step towards interoperable digital identity, allowing users to carry their verifiable credentials across different sectors and jurisdictions using wallets that comply with the same open standards, reducing friction and enhancing user control over personal data.

key-features
OIDC4VC

Key Features

OpenID for Verifiable Credentials (OIDC4VC) is a set of specifications that extend the widely adopted OAuth 2.0 and OpenID Connect (OIDC) framework to support the issuance and presentation of cryptographically verifiable credentials (VCs).

01

Leverages Existing Infrastructure

OIDC4VC builds on the ubiquitous OAuth 2.0 and OpenID Connect protocols, allowing developers to integrate verifiable credentials into existing authentication flows and identity systems with minimal disruption. This provides a familiar, standards-based bridge between the web2 and web3 identity worlds.

02

Credential Issuance Flow

The specification defines a Credential Offer endpoint where an issuer can provide a user with a pre-authorized token to request a specific credential. The user's wallet then exchanges this token for the actual W3C Verifiable Credential via a secure, token-based API call, separating the offer from the issuance.

03

Selective Disclosure & Presentation

A core feature is the ability for a holder to present only specific, required claims from a credential without revealing the entire document. This is achieved through Verifiable Presentations and Presentation Definitions, enabling privacy-preserving proofs like proving you are over 21 without revealing your exact birth date.

04

Wallet & Issuer Interoperability

By standardizing the API endpoints and data formats, OIDC4VC ensures that any compliant issuer (e.g., a university, government, or DAO) can issue credentials to any compliant wallet (a holder's digital identity app), and that any compliant verifier (e.g., a dApp or website) can request and validate presentations from any wallet.

05

Cryptographic Flexibility

The protocol is cryptography-agnostic. It can support credentials and presentations secured by JSON Web Tokens (JWT) or JSON-LD with Data Integrity Proofs (like BBS+ signatures). This allows implementations to choose the proof format that best suits their needs for selective disclosure, quantum resistance, or ecosystem compatibility.

core-components
OIDC4VC

Core Protocol Components

OpenID for Verifiable Credentials (OIDC4VC) is a suite of specifications that extends the widely adopted OAuth 2.0 and OpenID Connect framework to enable the issuance, presentation, and verification of cryptographically secure Verifiable Credentials (VCs).

01

The Credential Issuer

The entity that creates and cryptographically signs Verifiable Credentials. In OIDC4VC, this role is often mapped to an OpenID Provider (OP). It exposes a Credential Endpoint from which a Wallet can request specific credentials after successful user authentication and authorization.

  • Issues credentials in formats like W3C Verifiable Credentials or ISO mDL.
  • Uses Decentralized Identifiers (DIDs) or other cryptographic keys for signing.
  • Provides metadata about supported credential types via a Credential Issuer Metadata document.
02

The Verifier / Relying Party

The service that requests and validates Verifiable Credentials from a user to grant access or fulfill a transaction. It acts as the Relying Party (RP) in the OpenID Connect flow.

  • Initiates the flow by sending a Presentation Request to the user's wallet.
  • This request is encoded in a Presentation Definition, specifying the required credential types and constraints.
  • After receiving the Verifiable Presentation, the verifier checks the cryptographic proofs and credential status.
03

The Wallet / Holder

The user-controlled software that stores credentials and interacts with Issuers and Verifiers. It is the central component for the Holder in the VC model.

  • Manages the user's Decentralized Identifiers (DIDs) and private keys.
  • Communicates with the Credential Issuer to fetch credentials via the Credential Endpoint.
  • Receives Presentation Requests from Verifiers and creates Verifiable Presentations by selectively disclosing credentials.
04

Authorization & Presentation Flow

OIDC4VC defines a specific interaction pattern, often using a QR code or deep link, that combines OAuth 2.0 authorization with credential exchange.

  1. Initiation: Verifier sends a Presentation Request (containing a client_id and redirect_uri) to the Wallet.
  2. Authorization: The Wallet authenticates the user with the Issuer (OP) to obtain an Access Token.
  3. Credential Fetch: The Wallet uses the token to request credentials from the Issuer's Credential Endpoint.
  4. Presentation: The Wallet submits the credentials as a Verifiable Presentation back to the Verifier's redirect_uri.
05

Key Technical Specifications

The protocol is built on several IETF and OpenID Foundation drafts that standardize the messages and endpoints.

  • OIDC4VCI (Issuance): Defines how a Wallet requests credentials from an Issuer using an Access Token.
  • OIDC4VP (Presentation): Defines how a Verifier requests credentials and how a Wallet presents them.
  • SIOPv2 (Self-Issued OP): Allows a Wallet to act as its own OpenID Provider, enabling DID-based authentication without a central OP.
  • Presentation Exchange: A common format for defining credential requirements, shared between OIDC4VP and other VP protocols.
06

Benefits Over Plain OIDC

OIDC4VC enhances traditional OpenID Connect by adding verifiable data and user control.

  • Cryptographic Assurance: Credentials are digitally signed, making them tamper-evident and verifiable offline.
  • Selective Disclosure: Users can prove specific claims (e.g., age > 21) without revealing the entire credential.
  • Interoperability: Leverages existing OAuth 2.0 infrastructure while enabling portable credentials that are not locked to a single issuer or verifier.
  • User-Centric Data Control: The Wallet model gives users a portable repository for their credentials, reducing reliance on siloed accounts.
PROTOCOL COMPARISON

OIDC4VC vs. Other Credential Protocols

A technical comparison of key architectural and functional characteristics across major verifiable credential exchange protocols.

Feature / CharacteristicOIDC4VC (OpenID Connect for Verifiable Credentials)W3C Verifiable PresentationsISO mDL (Mobile Driver's License)

Core Architectural Pattern

OAuth 2.0 / OpenID Connect flow

Direct, stateless presentation

ISO 18013-5 data retrieval

Primary Transport

HTTPS (REST API over TLS)

Any (commonly HTTPS, QR codes, Bluetooth)

NFC, Bluetooth, QR Code (BLE/GATT)

Credential Format Agnostic

Holder Binding / Proof Mechanism

DPoP, JWT, SD-JWT

Linked Data Proofs (e.g., EdDSA, EcdsaSecp256k1)

Device Engagement & mdoc session encryption

Selective Disclosure Support

Built-in Identity & Authentication Layer

Issuer-Holder Interaction Required

Typical Latency for Presentation

< 2 sec

< 1 sec

2-5 sec

use-cases
OIDC4VC

Primary Use Cases

OpenID for Verifiable Credentials (OIDC4VC) extends the OAuth 2.0 and OpenID Connect framework to enable the issuance and presentation of cryptographically verifiable credentials. Its primary use cases focus on creating interoperable, user-centric identity systems for the web.

01

Decentralized Identity & Self-Sovereign Identity (SSI)

OID4VC is a core protocol for implementing Self-Sovereign Identity (SSI). It allows users to store verifiable credentials in a personal digital wallet (e.g., a mobile app) and present them to relying parties without needing a centralized identity provider. This gives users control over their personal data and enables selective disclosure of attributes.

02

Passwordless & Phishing-Resistant Authentication

Enables strong, cryptographic login by presenting a verifiable presentation instead of a password. A user can authenticate to a website by scanning a QR code and approving a request from their wallet. This method is resistant to phishing, credential stuffing, and eliminates the need to manage passwords, moving towards FIDO2-like convenience with broader credential support.

03

Streamlined KYC/AML Compliance

Financial institutions and regulated services can request specific verified claims (e.g., proof of age, accredited investor status) from a user's wallet instead of collecting raw documents. This reduces friction for users, lowers processing costs for businesses, and enhances privacy through data minimization. The credentials are cryptographically signed by trusted issuers like governments or banks.

04

Portable Academic & Professional Credentials

Universities can issue verifiable diplomas and employers can issue verifiable employment records as OIDC4VC credentials. Individuals can then instantly and securely share these with other institutions, recruiters, or online platforms for verification, eliminating the need for manual transcript requests and paper certificates.

05

Interoperable Access Management (IAM)

Integrates verifiable credentials into existing enterprise and web Identity and Access Management (IAM) systems. It allows organizations to define access policies based on verified attributes (e.g., "employee of partner company X", "certified developer") rather than maintaining internal user directories, enabling seamless federated access across organizational boundaries.

06

Selective Disclosure & Minimal Data Exposure

A user can prove a specific claim (e.g., "I am over 21") without revealing their exact birth date or other identifying information. This is achieved through cryptographic techniques like BBS+ signatures specified in the protocol. This privacy-by-design principle is fundamental for compliance with regulations like GDPR.

benefits
OIDC4VC

Key Benefits and Advantages

OpenID Connect for Verifiable Credentials (OIDC4VC) bridges the gap between traditional web identity and decentralized identity, enabling verifiable, user-centric data exchange.

01

Developer Familiarity & Integration

Leverages the widely adopted OpenID Connect (OIDC) protocol, allowing developers to integrate verifiable credentials using familiar OAuth 2.0 flows and libraries. This drastically reduces the learning curve and enables interoperability with existing identity providers and relying parties.

02

User-Centric Data Control

Empowers users with selective disclosure and data minimization. Instead of sharing an entire credential (e.g., a driver's license), users can prove specific claims (e.g., age > 21) directly from their digital wallet. This enhances privacy and reduces data exposure.

03

Cryptographic Verifiability & Trust

Credentials are issued as W3C Verifiable Credentials (VCs) and presented as Verifiable Presentations (VPs), secured by digital signatures (e.g., using JSON Web Tokens - JWT). This provides cryptographic proof of the issuer's authenticity, credential integrity, and user possession, enabling trust without a central validator.

04

Protocol Agnostic & Interoperable

OIDC4VC is designed to be blockchain-agnostic. It can work with credentials anchored on any ledger (e.g., Ethereum, IOTA) or even be completely off-chain. Its core specifications promote interoperability between different wallet implementations and credential formats.

05

Enhanced Security Posture

Moves beyond vulnerable password-based authentication to cryptographically verifiable proofs. Mitigates risks like phishing and credential stuffing by binding credentials to the user's wallet. Supports holder binding to ensure the presenter is the legitimate credential owner.

06

Streamlined User Experience (UX)

Enables QR code-based or deep-link flows for credential issuance and presentation, similar to familiar social login experiences. Users can manage all their credentials in a single digital identity wallet, simplifying interactions across services.

OIDC4VC

Technical Deep Dive

OpenID Connect for Verifiable Credentials (OIDC4VC) is a suite of specifications that extends the widely adopted OAuth 2.0 and OpenID Connect protocols to enable the issuance, presentation, and verification of cryptographically secure digital credentials (W3C Verifiable Credentials) over standard web APIs.

OIDC4VC is a set of protocols that leverages the OAuth 2.0 and OpenID Connect framework to issue, hold, and verify W3C Verifiable Credentials (VCs). It works by extending the standard OAuth flow: instead of an ID Token containing user claims, the Authorization Server (acting as an Issuer) returns a Verifiable Credential. A Wallet holds this VC, and later presents it as a Verifiable Presentation (VP) to a Relying Party (Verifier) using a SIOPv2 (Self-Issued OpenID Provider) flow. This bridges the familiar, scalable web identity layer with the decentralized trust model of verifiable credentials.

ecosystem-usage
OIDC4VC

Ecosystem and Adoption

OpenID for Verifiable Credentials (OIDC4VC) is an emerging standard that bridges the worlds of traditional web identity (OpenID Connect) and decentralized, user-controlled credentials (W3C Verifiable Credentials). It enables secure, privacy-preserving authentication and authorization using digital wallets.

01

Core Protocol Flow

OIDC4VC defines a standardized flow for requesting and presenting Verifiable Credentials (VCs). The key steps are:

  • Credential Offer: An issuer (e.g., a university) sends a signed offer to a user's wallet.
  • Authorization Request: The user's wallet requests an Authorization Server (like an issuer's endpoint) to issue credentials.
  • Credential Response: The server returns a signed, cryptographically verifiable credential in a standardized format (e.g., JWT-VC or SD-JWT).
  • Presentation: The user can later present this credential to a Relying Party (e.g., a job site) for authentication, proving specific claims without revealing their entire identity.
02

Key Technical Components

The standard integrates several critical components:

  • OpenID Connect (OIDC): Leverages its established OAuth 2.0 framework and ID Token structure for authentication flows.
  • W3C Verifiable Credentials Data Model: Provides the foundational data model for the credentials themselves, ensuring interoperability.
  • Decentralized Identifiers (DIDs): Often used as the cryptographic identifiers for issuers, holders, and verifiers, enabling trust without centralized registries.
  • Selective Disclosure: Protocols like SD-JWT allow users to reveal only specific claims from a credential (e.g., proving they are over 21 without showing their birthdate).
03

Use Cases & Applications

OID4VC enables a wide range of real-world applications focused on user control and data minimization:

  • Know Your Customer (KYC): Users can obtain a reusable credential from a bank and present it to multiple crypto exchanges, avoiding repetitive document submission.
  • Academic & Professional Credentials: Universities can issue digital diplomas; employers can instantly verify them.
  • Age Verification: Proving age for age-restricted services without handing over a full driver's license copy.
  • Access Management: Logging into enterprise or government portals with verified attributes (e.g., employment status, citizenship).
04

Wallet & Issuer Ecosystem

Adoption relies on interoperable software components:

  • Digital Identity Wallets: User-held apps (e.g., Trinsic, Spruce ID, Microsoft Authenticator) that store VCs and manage OIDC4VC flows.
  • Credential Issuers: Entities (governments, corporations, universities) that operate Authorization Servers compliant with the standard to issue trusted VCs.
  • Verifiers/Relying Parties: Services that accept OIDC4VC presentations for login or authorization, integrating standard libraries from providers like Auth0 or Keycloak.
  • Trust Registries: Optional systems that maintain lists of trusted issuers and the types of credentials they are authorized to issue.
05

Advantages Over Traditional Systems

OIDC4VC offers significant improvements:

  • User Privacy & Control: Users hold credentials in their wallet and decide when and with whom to share them, enabling selective disclosure.
  • Reduced Liability for Relying Parties: Verifiers don't store sensitive PII; they only cryptographically verify claims.
  • Interoperability: Builds on widely adopted web standards (OIDC), easing integration for existing enterprises.
  • Portability: Credentials are not locked into a single vendor's ecosystem; they can be used across any compliant verifier.
  • Auditability: Cryptographic proofs create a verifiable chain of issuance and presentation.
06

Standards & Governing Bodies

OIDC4VC is not a single specification but a family of drafts and profiles developed within major standards organizations:

  • OpenID Foundation: The OpenID Connect Working Group develops the core specifications (e.g., OpenID for Verifiable Credential Issuance, OpenID for Verifiable Presentations).
  • ISO: Components are being standardized under ISO/IEC 18013-5 (mobile driver's licenses) and other working groups.
  • W3C: Provides the foundational Verifiable Credentials Data Model and Decentralized Identifiers (DIDs) specifications that OIDC4VC credentials are built upon.
  • IETF: Standards like SD-JWT (RFC 9561) and JWT-VC are developed here, providing the concrete cryptographic formats.
OIDC4VC

Frequently Asked Questions

OpenID Connect for Verifiable Credentials (OIDC4VC) is a set of specifications that bridges the worlds of federated identity and decentralized identity. These questions address its core concepts, mechanisms, and practical applications.

OIDC4VC (OpenID Connect for Verifiable Credentials) is a suite of protocols that enables the issuance, presentation, and verification of W3C Verifiable Credentials using the established OAuth 2.0 and OpenID Connect framework. It works by extending the standard OIDC flow: instead of an ID Token containing user claims, a Verifiable Presentation is returned. A Holder (user) requests a credential from an Issuer via an OIDC authorization request. The Issuer returns a Verifiable Credential in a secure, machine-readable format. Later, the Holder can present this credential to a Verifier (a relying party) using a similar OIDC flow, where the Verifier can cryptographically verify its authenticity and integrity without contacting the Issuer directly.

ENQUIRY

Get In Touch
today.

Our experts will offer a free quote and a 30min call to discuss your project.

NDA Protected
24h Response
Directly to Engineering Team
10+
Protocols Shipped
$20M+
TVL Overall
NDA Protected Directly to Engineering Team
OIDC4VC: OpenID for Verifiable Credentials Explained | ChainScore Glossary