An architecture-first buyer's guide to reusable digital identity in 2026: W3C VCs, DIDs, mDL, EUDIW, and the relying-party readiness gap.
The reusable digital identity conversation has shifted in 2026. The architectural questions that dominated the prior decade (what credential standards, what trust frameworks, what cryptographic primitives) are largely settled. The pragmatic question now is whether the verification platforms relying parties depend on can actually consume reusable credentials at production scale.
This is the relying-party readiness gap. Member states across the EU are mandated to offer European Digital Identity Wallets to citizens by December 2026 under eIDAS 2.0. Mobile Driver's Licenses are operational in a meaningful number of US states and an expanding international set. W3C Verifiable Credentials are technically tractable and adopted in education, healthcare, and professional credentialing. But the verification platforms that banks, fintechs, real estate operators, travel companies, and other relying parties depend on were largely architected before any of this was operational. Many platforms cannot consume reusable credentials at all. Many that claim to can do so only through bolt-on modules separated from their core verification engine.
This guide walks the architecture, the standards, the relying-party readiness gap, and the three-tier evaluation framework that surfaces real differences between vendors entering the wallet era.
Suggested read: The UK Digital ID Consultation Closed Amid Industry Pushback. The Architecture Lesson Is for Everyone Else.
Reusable digital identity has three components: an issuer (the authority that creates verifiable credentials), a holder (the user, with a wallet on their device), and a relying party (the service that verifies the credentials).
The issuer signs credentials cryptographically. The holder stores the signed credentials in a wallet. The relying party, when it needs to verify identity, requests specific credentials from the wallet, validates the issuer's signature, and accepts or rejects based on its policy.
The architectural advantages over document-and-selfie verification are substantial. Selective disclosure means the holder can prove "over 18" without revealing the date of birth. Issuance happens once. Presentation happens many times. The relying party doesn't have to talk to the issuer for every verification. The cryptographic proof is sufficient.
Three credential standards dominate.
W3C Verifiable Credentials (W3C VCs) is the open standards stack maintained by the World Wide Web Consortium. Credentials are JSON-LD or JWT structures with cryptographic signatures. Decentralized Identifiers (DIDs) provide the issuer identity layer. The standards are mature. Adoption is concentrated in education (OpenBadges, OpenCerts), healthcare (HealthCerts), and professional credentialing.
Mobile Driver's License (mDL) under ISO/IEC 18013-5 specifies the data structure and presentation flow for digital driver's licenses, with proximity (NFC, Bluetooth, QR) and online presentation modes. ISO/IEC 18013-7 extends the spec for online presentation. Apple Wallet, Google Wallet, and a growing set of state-issued mDL apps support the standard.
European Digital Identity Wallet (EUDIW) is the EU-mandated wallet under eIDAS 2.0. The wallet supports W3C VCs and mDL credentials, with OpenID4VP for credential presentation and OpenID4VCI for credential issuance. Member states must offer EUDIWs to citizens by December 2026. The architecture is federated: data remains with issuing authorities, credentials live on user devices, presentation flows through OpenID4VP without revisiting the issuer.
The three standards are converging operationally. EUDIWs support W3C VCs and mDL. Apple and Google Wallets support mDL and progressively support W3C VCs. The relying-party stack that handles all three on a unified verification engine is the architectural target for 2026.
Most verification platforms in production today were architected before EUDIW, mDL, or W3C VC adoption was operational. The platforms fall into three rough categories.
Document-and-selfie-only stacks verify identity by capturing a government-issued document, performing a selfie liveness check, and running document forensics. The architecture has no native concept of a wallet credential. Adding wallet support requires either a separate product line or a third-party adapter, which fragments the audit trail and forces relying parties to integrate against two systems.
Bolt-on wallet adapters add wallet credential consumption as a separate module on top of an existing document-and-selfie engine. The verification result for a wallet credential is structurally different from the verification result for a document-based check, which complicates downstream policy enforcement and reporting.
Unified verification engines consume document-based, biometric, and wallet credentials on the same engine, with a structurally consistent verification result regardless of which credential type the user presents. The audit trail is unified. The downstream policy enforcement is consistent. The integration burden on the relying party is single, not multi.
The unified verification engine pattern is what relying parties operating in regulated financial services, multi-jurisdictional operations, and high-stakes verification flows need. The first two patterns work in the short term but accumulate technical debt as wallet adoption matures.
Suggested read: The 2026 Age Verification Architecture Guide: Inference, Document, Wallet, Token
When evaluating verification platforms for the wallet era, three architectural tiers separate the candidates.
The first tier is whether the platform supports the open credential standards or only proprietary formats. Real support means:
- W3C Verifiable Credentials with DIDs. The platform consumes JSON-LD and JWT credentials, validates issuer DIDs against published verification methods, and supports the credential schemas relevant to the buyer's use case (education, professional, healthcare, etc.).
- mDL under ISO/IEC 18013-5 and 18013-7. The platform consumes mDL credentials in both proximity and online presentation modes. Apple Wallet and Google Wallet integration is operational.
- EUDIW credentials via OpenID4VP. The platform handles the OpenID4VP presentation flow, validates issuer signatures against EU trust lists, and supports selective disclosure attribute selection.
Platforms that support only proprietary credential formats or single-vendor identity stacks fail Tier 1. The buyer is then locked into the vendor's ecosystem, which is the opposite of what reusable identity is designed to enable.
The second tier is whether the platform binds wallet credentials to biometric verification at presentation time. Wallet credentials are cryptographically signed by the issuer, but the signature only proves the credential is authentic. It does not prove that the person presenting the credential is the credential's subject.
Strong relying-party verification requires biometric binding: at presentation time, the platform performs a liveness selfie and matches the selfie to the photograph contained in the credential. The cryptographic verification confirms the credential. The biometric binding confirms the person.
Platforms that consume wallet credentials without biometric binding accept the credential at face value, which creates a presentation-attack vulnerability where a stolen wallet credential can be used by a non-subject. Platforms that bind biometrics at presentation time close the vulnerability.
The biometric binding requirement also drives the architectural advantage of the unified verification engine pattern. The same engine that handles document-based verification (with built-in liveness and biometric matching) handles wallet credential biometric binding through the same primitives. The bolt-on wallet adapter pattern typically lacks the biometric binding layer or implements it as a separate module.
The third tier is the integration model offered by the platform. Three patterns matter:
- API-only integration. The buyer's developers integrate against documented endpoints. This works for sophisticated relying parties with engineering capacity but adds friction for buyers without it.
- SDK-plus-hosted integration. The vendor provides a hosted UI that the buyer embeds in their flow. Faster time to integration. Less customization flexibility.
- Agent-native integration. The platform exposes verification as an MCP (Model Context Protocol) tool callable by AI agents. Verification can be invoked as part of an agentic workflow without a dedicated UI.
The platforms that support all three integration models give the buyer architectural optionality. The platforms that support only one (typically the SDK-plus-hosted pattern from the prior generation) constrain the buyer's downstream architectural choices.
deepidv supports all three integration models on the same verification engine. Document-based verification, mDL consumption, EUDIW credential consumption, and biometric binding all run through the same APIs and the same agent-native MCP interface. The integration model is decoupled from the credential type.
Five questions surface real differences between vendors during evaluation.
1. Demonstrate live consumption of an EUDIW test credential. Ask the vendor to consume a credential issued by an EUDIW emulator or test issuer, in real time. The demonstration should include credential validation against EU trust lists, selective disclosure attribute selection, and biometric binding to the credential subject.
2. Demonstrate live consumption of an mDL credential. Same as above, but with an mDL credential issued by a state-issued or test wallet under ISO/IEC 18013-5 and 18013-7.
3. Show the verification result structure. A document-based verification, a wallet credential verification, and a biometric verification should produce structurally consistent results that downstream policy can apply consistently. Vendors with bolt-on wallet adapters typically produce inconsistent result structures.
4. Walk the audit trail for a wallet credential verification. The cryptographic receipt should record the credential type, the issuer, the signature validation outcome, the biometric binding result, and the timestamp. The receipt should be cryptographically anchored and verifiable on demand.
5. Show the roadmap for emerging credential standards. The wallet ecosystem continues to evolve. SD-JWT, BBS+ signatures, ZKP-based selective disclosure, and the EUDIW Architecture Reference Framework version updates all matter. Vendors with active engagement in the standards bodies typically have credible roadmaps. Vendors without engagement typically lag.
deepidv runs document-based, biometric, mDL, EUDIW, and W3C VC verification on a single engine. The verification result is structurally consistent regardless of credential type. Biometric binding is built in: at presentation time, the platform validates the cryptographic credential and binds it to a liveness selfie. The cryptographic receipt for the verification is anchored on Base L2 (proof.deepidv.com), with the credential type, issuer, signature validation, biometric binding, and timestamp recorded together. Integration models are unified: API-first, SDK-plus-hosted, and agent-native MCP all available on the same platform.
Arc, the deepidv MCP-and-agent-native gateway, exposes verification primitives as tools callable by AI agents and orchestrators. For relying parties building agent-native workflows (the next architectural wave after wallet adoption), the integration is single, not separate.
W3C VCs is the open standards specification maintained by the W3C. EUDIW is the EU-mandated wallet implementation that supports W3C VCs alongside mDL credentials. W3C VCs is broader and more general. EUDIW is a specific deployment context with EU-specific trust frameworks and member-state requirements.
mDL refers specifically to credentials conforming to ISO/IEC 18013-5 (proximity) and 18013-7 (online), with cryptographic signatures from the issuing authority that allow third-party verification without revisiting the issuer. Generic digital driver's license apps may or may not conform to the standard. mDL conformance is what enables relying-party verification.
Member states are required to offer EUDIWs to citizens by December 2026 under eIDAS 2.0. Some member states are ahead of schedule with operational EUDIW pilots. Others are working toward the deadline. By Q1 2027, all 27 member states should have operational EUDIWs.
mDL credentials issued in supported jurisdictions can be presented in the EU, but the EU's preferred credential framework is EUDIW. Cross-acceptance between mDL and EUDIW continues to evolve through standards body work and bilateral arrangements. Verification platforms that support both formats natively are positioned for the cross-acceptance future.
Selective disclosure is the cryptographic capability for a credential to prove specific attributes (age over 18, country of residence, professional license held) without revealing other attributes (date of birth, full address, license number). Selective disclosure preserves privacy and enables data minimization, which matters for GDPR compliance, US state privacy laws, and consumer trust.
Ask the vendor to demonstrate end-to-end binding: present a wallet credential with a non-matching face to the system. The system should reject the verification with an explicit biometric mismatch error. Then present the credential with a matching face. The system should accept. Vendors that cannot demonstrate explicit rejection on biometric mismatch likely lack genuine binding.
The gap between credential issuance maturity (EUDIW, mDL, W3C VC issuance is operational) and relying-party verification readiness (most verification platforms cannot consume wallet credentials natively). The gap closes as verification platforms upgrade to consume wallet credentials, with the unified verification engine pattern as the architectural target.
Book a demo to see deepidv consume EUDIW, mDL, and W3C VC credentials on the same verification engine.