FINAL EBOOK 11 Ways Verifiable Credentials Can Transform Your Business
FINAL EBOOK 11 Ways Verifiable Credentials Can Transform Your Business
11 ways verifiable
credentials can transform
your business
See how
Verified ID can
revolutionize your
business.
The purpose of this resource is to highlight
the most mature and impactful use cases
for open standards-based verifiable
credentials. We will examine 11 use cases in
this eBook, six from a B2B lens, five from a
B2C lens.
2
How do verifiable credentials work?
To understand verifiable credentials, it helps to relate them to the physical credentials people use to
confirm their identity—such as a driver’s license, social security card, diploma, and more.
Verifiable credentials are user-controlled instances of this type of data that can confirm identity
claims in a digital environment (against a decentralized data registry) through the use of an open
standards-based Trust System.
3
Table of Contents
4
B2B scenarios
Let’s explore how verifiable
credentials can help reimagine
a variety of business-to-
business scenarios.
5
Use case 1
Fast remote
onboarding and
registration
Context
The rise of virtual work has led to a distinct documents (driver’s licenses, passports,
need for quicker, easier, and more secure social security cards, etc.). The user owns
remote onboarding practices. and holds this identity credential in a digital
wallet and presents it to their prospective
Today, companies that onboard employees, employer during the pre-hire process,
contractors, vendors, partners, and other validating their identity instantly so that
business guests are slowed down by manual they can get to work faster.
review processes, delayed approvals, and
constant back-and-forth communication Once the pre-hire process is complete, the
over email. employer issues the new worker a unique
employee ID, which the user can present
On the flip side, workers are held back in to company apps and resources on day
their new roles by a lack of permissioning one for immediate access rights. This is
and access to the correct company possible since user permissioning and
resources on day one, which hurts access privileges are pre-configured by the
their productivity and momentum as employer and encoded directly inside of
a new employee or business guest. All each employee ID.
of these factors contribute to slower
ramp-up periods, which can hurt This process can be customized to work for
business productivity. all types of business guests—from full-time
hires, to contractors, to agencies being
With verifiable credentials, new worker brought onboard for project-based work—
identities are digitally validated by trusted and everyone in between.
third party verification vendors, who issue
identity credentials to users that can prove
their identities through typical high-fidelity
6
Impact
With verifiable credentials, companies The best part, verifiable credential-based
can quickly onboard new remote workers onboarding makes all of these benefits
using trustworthy self-service enrollment possible while integrating seamlessly
flows and role-based permissioning on into zero trust and least privilege
day one. This gives each kind of user security initiatives.
(employees, contractors, vendors, partners,
and other business guests) access to all the
correct apps and systems they need to be
productive the day their new roles begin.
Employers and
identity verification Workers Employers
vendors
Ensuring privileged
access to high value apps
and resources
Context
Granting employees and business guests By presenting these two credentials to the
(contractors, partners, or third-party breached company, they will be issued
vendors) access to sensitive or confidential a third credential from the breached
company apps, resources, and data is a company—a temporary pass providing
nuanced exercise. Oftentimes, providing access to the specific portion of the
quick access is crucial, but granting the software code under investigation. These
exact level of permissions for the proper three verifiable credentials can be quickly
timeframe is quite difficult. presented every time the forensics specialist
logs into the codebase for instant and
Consider how a cybersecurity remediation highly secure access.
firm, tasked with helping companies
recover from cyber breaches, can quickly Impact
and securely gain access to a Fortune 500
tech company’s codebase using verifiable With Verified ID, access to highly secure
credentials—and how the breached environments can be provided quickly and
company can ensure access is revoked once with the appropriate level of granularity
the job is complete. The cyber forensic while automating permission revocation
specialist assigned to the project must controls so that access expires when
prove two things: current employment by no longer needed. Those who possess
the cyber remediation company, plus a specific, high assurance credentials receive
valid and current certification for computer immediate access and avoid manual and
forensics. To do so, they need two Verified time-consuming approval processes.
ID credentials, an employee credential
from their company and a certification If the cyber professional completes the
credential from the Computer Forensics project, loses his/her forensic certification,
governing body. or leaves their company, any of the project’s
8
three required Verified ID cards can be
revoked, minimizing instances of prolonged
or unauthorized access. Lastly, using
verifiable credentials simplifies guest access
across disparate workflows and tech stacks.
Cybersecurity
remediation Forensic specialist Breached company
company
1 2 3
A cybersecurity professional with Only by presenting these The access package is unlocked
two Verified ID credentials: one two verified ID cards can the and a new verified ID card,
employee ID from their cyber cybersecurity professional unlock Source Code Analysis ID, is
remediation company, and one an access package containing a automatically issued to the
certification ID from the Computer third verified ID credential cybersecurity professional.
Forensics governing body.
4 5
Context
Help desk operations require significant their digital wallet to the Contoso IT team’s
time and capital expenditures and have automated account lockout flow and b.)
significant user experience impacts. pass a live FaceCheck scan, which compares
Account lockouts comprise a significant the profile picture on their user credential
percentage of customer service calls at an against a live selfie scan from their mobile
average cost of $50 per call. Automating the phone. If successful, these two steps
process with a high level of authentication immediately authorize a trusted username
and a high degree of user satisfaction could and password reset without ever requiring
reduce costs, time, and user frustration. a customer support representative to assist.
Contoso Smart CRM, a customer The Contoso Smart CRM user credential
relationship management software with dramatically reduced the time taken
tens of thousands of business customers, to resolve account lockout issues by
identified that most of their Help desk calls requesting user credentials before support
stemmed from either account lockouts or tickets were filed, enabling the Help desk
product questions. better diagnose user issues based on
unique platform licenses.
To solve for this, Contoso issued every
licensed user on the Contoso platform Impact
a unique verified ID credential tied to
the user’s unique level of access and One of the key advantages of automating
permissions. This enabled self-service the Help desk through verifiable credentials
account recovery by allowing users who is avoiding a time-consuming information
forgot their passwords to quickly pass a gathering stage. Instead of providing
two-step recovery process: a.) present context over chat or phone, customers
their Contoso Smart CRM credential from simply share their verified Contoso CRM
11
credentials, which instantly provide context
on the user’s privileges, permissions, and
other metadata that can be used to help
resolve their claim. This helps resolve user
issues quicker, improves the productivity of
the support team so they can close tickets
faster, and ultimately helps save money
for Contoso.
LinkedIn workplace
verification
Context
In the digital world, when you meet to their project on LinkedIn and see that
professional contacts for the first time they are authentic employees of First
online, you need additional trust signals Up Consultants.
to increase your confidence that they are
who they say they are. Without these trust To make this happen, First Up Consultants
signals, it is hard to know if the people we quickly created a workplace credential
are connecting with are credible and if their in the Entra Verified ID admin portal and
skills and qualifications are authentic. customized it to fit their company branding.
Their consultants were encouraged to verify
Previously, we had to rely on self-reported themselves on LinkedIn through an internal
data and reference-checking to verify an company announcement, and in just a few
individual’s employment history, but now minutes, each one was issued an employee
it is possible to verify a person’s place of ID after successfully logging in with their
work on LinkedIn through Microsoft Entra corporate credentials through LinkedIn’s
Verified ID. verification flow.
13
Impact
Microsoft Entra Verified ID allows Verifying their consultants online allowed
organizations to offer workplace First Up Consultants to not only bring
verification in a matter of minutes, which in more business, but also strengthen
individuals can use to validate their place of their company brand through offering
work on LinkedIn in just a few clicks. powerful trust signals to the entire LinkedIn
community.
After verifying their employees on LinkedIn,
First Up Consultants was able to a.) more
efficiently prospect for new clients since
their consultants were now quickly seen
as legitimate employees of a reputable
and verified company, b.) increase the
response rate of their recruiting team’s
LinkedIn outreach programs, and c.)
increase client confidence in their assigned
consultant, which helped elevate overall
project satisfaction.
Training certifications
Context
Medical companies that help hospitals to technician and surgical assistant before they
operate various devices such as robotic enter the hospital, and before they begin to
surgical machines, heart monitors, etc., operate any equipment.
must demonstrate that their employees
have been trained on the latest techniques By automating scans, Woodgrove raises the
and methods for operating the equipment. bar for security and safety without requiring
any manual verification or supervision.
Companies can use verified credentials Best of all, notice is provided when a
to validate the completion of necessary certification expires or is set to expire soon,
trainings prior to granting physical site helping hospital staff avoid delays caused
access or access to the equipment. Let’s by slow or lost paperwork. By flagging
take a look at how Woodgrove Medical, a invalid or out-of-date credentials, hospitals
hospital supply company, can ensure their and medical companies are also able to
staff always have current employee IDs and proactively avoid any compliance violations
have completed any necessary training on that may arise.
new surgical equipment.
Impact
Before discovering Verified ID credentials,
our hospital supply company did not have a
consistent process for validating employee
IDs or safety and equipment training
certifications. Thanks to daily certification
scans, Woodgrove Medical now is able
to validate the qualifications for each
15
Contoso Equipment
Medical operators Hospitals
Manufacturer
16
Use case 6
Standardizing
credential requirements
for union jobs
Context
Millions of union members in the United licensing eligibility, which leads to
States receive work through union job disruptions in work, travel delays, and an
boards, but the pre-hire and onboarding increased risk for impersonation and fraud.
processes for companies that hire union It made sense to standardize the way union
members often differ drastically. This members verified their qualifications across
makes it time-consuming and redundant transportation bodies and organizations
for workers to switch between union so that professionals could start and rotate
jobs, something they do often, as they between jobs faster, minimize fraud, and
are asked to present the same forms of ensure licensing compliance and continuity.
verification to each new employer despite
already having proven their identity to their Verifiable credentials helped re-imagine the
existing employer. process at scale, giving the transportation
union staff a smoother, more compliant,
This led to delayed start times and service and more secure credential validation
disruptions for members of the Woodgrove experience—giving members everything
Transportation Coalition, one of the largest they need to be productive on day one.
transportation unions in the United States,
comprising tens of thousands of employees
Impact
with job titles like railroad conductor, airline
pilot, truck driver, and more. The union Using verifiable credentials, the
members work for hundreds of different transportation union was able to
companies, each with their own unique standardize identity and certification
identity verification processes. checks across transportation bodies
(railway, airway, and roadway), increasing
With certification requirements constantly hire-to-start timelines, boosting licensing
in flux, it is hard for members to maintain
17
compliance rates, and minimizing the risk of reliability. It also saved union members time
fraud and impersonation. by only requiring a single-time validation
of key identity documents, such as driver’s
Union member credentials were license and passport, as a part of the initial
successfully passported and shared across union member application process.
companies, jobs, and jurisdictions for a
much more cohesive and fluid onboarding Companies that go on to hire union
experience, significantly reducing the members with valid union members IDs
amount of time workers had to wait for can trust that holders have already proven
administrative licensing checks. This their identities by providing a valid driver’s
enabled transportation professionals license or passport, among other forms of
to provide a more smooth, secure, and identification, and don’t need to repeat this
punctual travel experience on behalf of redundant verification step (until the union
their employers—which not only helps cut member ID expires or is up for renewal) in
costs, but elevates brand reputation and order to hire them with confidence.
Woodgrove
Transportation Railway, airway, and
Transportation
professionals roadway companies
Coalition
1 2 3
4 5 6
By presenting the necessary If a pilot changes companies, their Pilots can earn advanced flight
verified ID cards, a pilot can previous Employee ID is revoked licensing IDs through the union
quickly pass through physical and their current employer issues which can be presented to their
security checkpoints to operate a new one. employer for updated assignments
their machinery. and the ability board and operate
more specialized aircrafts. 19
B2C scenarios
Let’s explore how verifiable
credentials can help reimagine
a variety of business-to-
consumer scenarios.
20
Use case 7
Skilling certifications
Context
Online programming schools have helped recruiters, or anyone else who wants to
countless individuals learn to code and verify their authenticity and identify which
find employment in the tech industry. skills a candidate possesses.
Companies that take a chance on a self-
taught programmer, however, often have Impact
reservations about the completeness of the
candidate’s coding literacy. With verifiable course credentials,
students can prove they have passed
Live tests are a good way to vet some authentic programming courses and
critical thinking and programming skills, tests—assuring prospective employers
but are not extensive enough to measure their technical skillset is genuine. This
the full range of knowledge a coder will can accelerate the time-to-hire, inspire
need throughout employment. Online confidence in the hiring company, and
course and bootcamp certificates can help programmers stand out from the
demonstrate technical proficiency, but can ‘non-verified’ competition.
be easily fabricated.
Employers can validate knowledge beyond
Both new and established programmers the skills they are able to vet during
are now utilizing verifiable credentials to interviews. Additionally, since students can
demonstrate the skills they have attained easily store their skill credentials in a digital
through self-education, effectively solving wallet, they can quickly demonstrate the full
for this online skill-proofing dilemma. scope of their technical skills to anyone in a
Coding schools simply issue students a matter of seconds.
course completion certificate as a verifiable
credential which allows the students to By taking courses that offer verifiable
present the credentials to employers, credential-based course certificates,
21
students can demonstrate a diverse set
of trainings and showcase their technical
versatility to employers who can use this
information to make more educated
hiring decisions.
Coding courses,
bootcamps, and Individuals Hiring companies
schools
Managing students,
applicants, and alumni
networks
Context
Universities and academic institutions keep their applicants, actual students, and
have the difficult job of managing a large alumni digitally connected to the university
number of student relationships—student for life and to reduce the burden on the
applicants (potential future students), university staff.
existing students, and alumni. Universities
and colleges have an enormous number of Not only do the digital student credentials
identities that must be created to facilitate provide easier access to transcripts and
each student applicant even though most documents needed for graduate school
of the applicants either will not be accepted and future career opportunities, but
or will decide to attend a different school. they provide simpler for university staff
This creates an enormous churn for IT and to manage and revoke. They also offer
security teams who must constantly revoke additional benefits like access to discounts
user accounts that will never be used. at the campus library, cafes, and local
transportation lines on campus and online
In addition, responsibilities such as storing for a more rewarding academic and
and sharing transcripts across a student’s alumni experience.
lifetime are logistically taxing on university
staff and difficult for students to access, Finally, instead of waiting the typical 14 days
often requiring a campus visit, waiting for a student identification card to arrive in
weeks or months for certificates to be the mail, students can instantly create their
mailed, or paying a notary for assistance digital student credentials prior to the first
with paper copies. day of class to better facilitate their initial
days on campus or as an alumni.
Contoso University wanted to create a
convenient online student credentialing
and certificate distribution system to
23
Impact
Rolling out digital student and alumni of their individual privacy, and enjoy the
credentials is a game changing convenience of easy access to key academic
technological advancement for higher documents like transcripts and diplomas
education. These verified credentials help without the burden of in-person pickup
universities improve security and lower the and time delays. This enables faster sharing
overhead of engaging alumni while also of official academic documents with
saving a series of logistical and operational future employers, programs, and graduate
expenses such as physical transcript storage universities. It also allows the university
and the maintenance of contact lists even to maintain better contact with current
as alumni move and change addresses. and former students which can lead to
more successful fundraising, university
Students are delighted with digitally involvement, and networking, as well as a
native discounts for on-campus and online stronger reputation for the university.
services, appreciate the increased control
1 2 3
Students must often visit campus, Physical student identification By issuing digital Verified
wait long periods of time, or cards typically take 14 days ID credentials, Contoso
pay a notary for assistance in to arrive by mail, preventing University gives students
order to access official academic access to key campus services instantaneous digital access to
documents like transcripts, like the registrar’s office, library, academic documents.
degrees, or certificates. or cafeteria.
4 5 6
Digital student ID cards enable Students can present their Student Students can then easily and
students to redeem academic IDs to the university portal for securely share these digital
affiliation perks such as discounts self-service access to digital academic documents and
at the campus library, local cafes, diplomas, transcripts, and other credentials with future employers,
or nearby transportation lines. key academic documents. schools, or programs.
25
Use case 9
Context
One strategy that brands use to stand privacy respecting biometric FaceCheck, to
out from the competition and increase quickly verify their identity in real-time.
customer loyalty is to offer perks and
benefits to their users, which can be done Impact
effectively through building a robust
partner rewards network. After implementing their partner rewards
program, Northwind Airlines was able
Let’s see how Northwind Airlines is using a to dramatically improve their in-app
verifiable credentials mobile phone wallet engagement, percentage of return
SDK to rapidly grow their in-app partner fliers, and new customer referrals. Plus,
ecosystem while also reducing account Northwind was able to completely
takeovers and helpdesk costs. With just a modernize and automate a majority of their
few lines of code using an open standards- helpdesk functions.
based wallet library, Northwind’s existing
mobile application can be transformed into Now, the customer support system can
a digital wallet for verifiable credentials, pull a flier’s profile and trip information
with a custom loyalty card inside waiting for instantly, enabling customers to change
each user. their flight bookings through self-service
in less than a minute, without ever having
Customers can use the digital loyalty card to speak to a live representative, wait in a
anywhere, including partnering hotels, phone queue, or instant message chat with
rideshare companies, or restaurants around an employee. Building a reliable, self-service
the city for rewards like hotel points, free Help desk solution helped cut customer
rides, and discounted coffee. For higher service costs significantly.
fidelity actions, users can even be asked
to present their loyalty cards alongside a
26
Fliers with the
Northwind Airlines
Northwind Airlines Northwind Airlines
and partners
mobile app
27
How it works
1 2 3
Any company, including App users can explore coupons, Users can easily redeem perks
Northwind Airlines, can use the discounts, and perks that they can from partners like Woodland
Verified ID Wallet SDK to issue redeem with loyalty card partners Coffee by scanning a QR
a loyalty card to their existing directly in the “Offers” tab. code (online or in person) and
mobile app users. sharing their loyalty card via the
mobile app.
4 5 6
In the Help Desk of the Northwind For high-fidelity authorizations Once the user has passed a
Airlines app, fliers can initiate self- requiring an extra layer of security, FaceCheck, they are authorized
service processes like changing users can be asked to perform to proceed with their
flight bookings. a FaceCheck as part of the booking change.
verification process.
28
Use case 10
Age proofing
Context
Digitally age-gating content, services, and legal age, individuals can use this card to
privileges is an important way to enforce digitally reserve a rental car remotely, sign
legislation while protecting minors and an apartment lease from across the country,
young adults online, but it can create open a bank account online, or download
friction and inconvenience for those who age-gated content and video games.
are age appropriate. Historically, it has
been difficult to prove one’s age on the The best part is that due to the privacy-
web in a way that couldn’t be spoofed focused principles of verifiable credentials,
or circumvented, but with verifiable citizens don’t need to divulge the specifics
credentials, government entities can now of their identity attributes, such as date of
issue secure digital IDs and passports to birth, to a service in order to prove that
their citizens. they are of acceptable age. The only data
that the verifying service reads is a “yes”
The Contoso Department of Homeland (citizen is of legal age) or a “no” (citizen is
Security decided to grant all of their not of legal age), which ensures that the
citizens a unique digital driver’s license citizen’s personally identifiable information
equivalent to make it easier for people to data remains encrypted.
share and validate key identity attributes
such as name, age, address, and more. Impact
Now, citizens can digitally present this
digital ID to any service or establishment in The ability for citizens to independently
order to access specific content, services, prove key identity attributes online opens
or privileges—and that service can in turn up an entirely new world of possibilities.
verify that this verified ID comes from an Digitally, individuals can now do a series of
authentic issuer, and that the information things that they would otherwise have had
held inside is legitimate. If they are of
29
to a.) do in person or b.) endure a much which helps protect minors and young
longer, more difficult process if done online. adults while helping the companies they do
business with stay legally compliant.
For example, a citizen can simply present
a digital driver’s license to open up a bank Lastly, digital age proofing using digital
account online, without having to wait on driver’s licenses helps protect user privacy,
any manual identity approvals. Previously, due to the anonymous nature of the data
they would have had to upload a copy of enclosed in their Verified ID credentials.
a driver’s license and one other form of This way, user’s can minimize the amount
government approved identification, like of personally identifiable information that
a social security card or birth certificate, in they share online—helping them operate
order to do so—a process that could take in a safer, more transparent, and more
days or weeks. empowered digital manner.
Contoso Age-restricted
Department of Citizens of Contoso businesses and
Homeland Security services
Context
Electronic event ticketing is a booming this goal, such as a local parking companies,
industry but not one without its fair share popular in-stadium restaurant franchises,
of challenges on both the side of the and the basketball league’s approved
consumer and the online ticketing vendor. apparel merchandiser.
For consumers, it can be next to impossible
to tell if a resale ticket is truly authentic. With a verifiable credentials-based ticket
For ticketers, fake tickets hurt their market, purchase, consumers can present their
their brand reputation, and their pockets. tickets via QR code for not only event
Money-back guarantees relieve some stress entry, but to various partnering companies
but can’t make up for a missed event, as for perks like free parking, a discounted
people often find out tickets are fake once daily food item, and the free themed
they arrive at a venue. bobblehead of the night.
31
Consumers can also redeem exclusive perks
from the events they attend quickly and
easily, just by scanning a QR code on their
phone and presenting the verified ticket in
their digital wallet. This provides a stronger
and more differentiated offer to not only
the stadium or event venue, but to the
partners who are brought more business,
exposure, and partnership opportunities.