0% found this document useful (0 votes)
16 views

FINAL EBOOK 11 Ways Verifiable Credentials Can Transform Your Business

The document discusses 11 potential use cases for verifiable credentials from both a business-to-business and business-to-consumer perspective. It provides details on how verifiable credentials can enable fast remote onboarding, ensure privileged access to apps and resources, automate help desks, verify workplace connections on LinkedIn, manage training certifications, standardize credential requirements for jobs, enable skills certifications, manage student and alumni networks, implement loyalty programs, enable age verification, and authenticate digital tickets and event perks.

Uploaded by

zaenal Abidin
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views

FINAL EBOOK 11 Ways Verifiable Credentials Can Transform Your Business

The document discusses 11 potential use cases for verifiable credentials from both a business-to-business and business-to-consumer perspective. It provides details on how verifiable credentials can enable fast remote onboarding, ensure privileged access to apps and resources, automate help desks, verify workplace connections on LinkedIn, manage training certifications, standardize credential requirements for jobs, enable skills certifications, manage student and alumni networks, implement loyalty programs, enable age verification, and authenticate digital tickets and event perks.

Uploaded by

zaenal Abidin
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 33

E-book

11 ways verifiable
credentials can transform
your business
See how
Verified ID can
revolutionize your
business.
The purpose of this resource is to highlight
the most mature and impactful use cases
for open standards-based verifiable
credentials. We will examine 11 use cases in
this eBook, six from a B2B lens, five from a
B2C lens.

Microsoft Entra Verified ID is a managed


verifiable credentials service based on open
standards, and can accomplish all of these
use cases, and many more. In fact, some of
those discussed in this eBook have already
been implemented by Microsoft Entra
customers today.

Before we dive in, let’s review how verifiable


credentials work.

2
How do verifiable credentials work?
To understand verifiable credentials, it helps to relate them to the physical credentials people use to
confirm their identity—such as a driver’s license, social security card, diploma, and more.

Verifiable credentials are user-controlled instances of this type of data that can confirm identity
claims in a digital environment (against a decentralized data registry) through the use of an open
standards-based Trust System.

There are three entities in a verifiable credential ecosystem:

Issuer Holder Verifier


A trusted corporation or entity Receives and approves credential A trusted corporation or entity
confirms a user’s claims about their request from the issuer, stores and requests validation of a user’s
identity and grants a digitally signed manages credentials in a digital credential and, upon receipt, verifies
credential to them. An issuer could wallet, then presents credential to that claims in the credential satisfy
be an identity verification vendor, verifier. A user’s wallet is generally an requirements. A verifier could be
a government agency, a previous application that only that user has a prospective employer, an airline,
employer, a university, or any other access to via either a PIN number or a mortgage company, or any
organization that can provide proof biometric identifier. organization requesting proof of
of Erin’s credentials.   Erin’s credentials.

3
Table of Contents

B2B Use Cases


Use case 1 / page 6 / Use case 2 / page 8 / Use case 3 / page 11 /
Fast remote onboarding Ensuring privileged access Help desk automation
and registration to high value apps and and self-service account
resources recovery

Use case 4 / page 13 / Use case 5 / page 15 / Use case 6 / page 17 /


LinkedIn workplace Training certifications Standardizing
verification credential requirements
for union jobs

B2C Use Cases


Use case 7 / page 21 / Use case 8 / page 23 / Use case 9 / page 26 /
Skilling certifications Managing students, Partner loyalty and
applicants, and alumni rewards programs
networks

Use case 10 / page 29 / Use case 11 / page 31 /


Age proofing Digital ticket authenticity
and event perks

4
B2B scenarios
Let’s explore how verifiable
credentials can help reimagine
a variety of business-to-
business scenarios.

5
Use case 1

Fast remote
onboarding and
registration

Context
The rise of virtual work has led to a distinct documents (driver’s licenses, passports,
need for quicker, easier, and more secure social security cards, etc.). The user owns
remote onboarding practices. and holds this identity credential in a digital
wallet and presents it to their prospective
Today, companies that onboard employees, employer during the pre-hire process,
contractors, vendors, partners, and other validating their identity instantly so that
business guests are slowed down by manual they can get to work faster.
review processes, delayed approvals, and
constant back-and-forth communication Once the pre-hire process is complete, the
over email. employer issues the new worker a unique
employee ID, which the user can present
On the flip side, workers are held back in to company apps and resources on day
their new roles by a lack of permissioning one for immediate access rights. This is
and access to the correct company possible since user permissioning and
resources on day one, which hurts access privileges are pre-configured by the
their productivity and momentum as employer and encoded directly inside of
a new employee or business guest. All each employee ID.
of these factors contribute to slower
ramp-up periods, which can hurt This process can be customized to work for
business productivity. all types of business guests—from full-time
hires, to contractors, to agencies being
With verifiable credentials, new worker brought onboard for project-based work—
identities are digitally validated by trusted and everyone in between.
third party verification vendors, who issue
identity credentials to users that can prove
their identities through typical high-fidelity

6
Impact
With verifiable credentials, companies The best part, verifiable credential-based
can quickly onboard new remote workers onboarding makes all of these benefits
using trustworthy self-service enrollment possible while integrating seamlessly
flows and role-based permissioning on into zero trust and least privilege
day one. This gives each kind of user security initiatives.
(employees, contractors, vendors, partners,
and other business guests) access to all the
correct apps and systems they need to be
productive the day their new roles begin.

Organizations can streamline the tedious


pre-hire identity validation processes with
instant identity checks, and workers can
reuse their identity validation credentials
every time they are onboarded to a
new company, job, or project—which is
especially helpful for contractors, vendors,
and gig workers who begin new projects
and work engagements regularly.

Employers and
identity verification Workers Employers
vendors

Issuer Holder Verifier


a. Identity verification a. Workers (employees, a. Employers verify a worker’s
vendors issue identity contractors, vendors, identity credential.
validation credentials partners, and other business
to workers during the guests) hold their identity b. Employers verify a
pre-hire process. credentials and their worker’s employee ID to
employee ID credentials. provide the correct level
b. Employers issue workers of of access to company apps
all kinds employee IDs. and resources.
7
Use case 2

Ensuring privileged
access to high value apps
and resources

Context
Granting employees and business guests By presenting these two credentials to the
(contractors, partners, or third-party breached company, they will be issued
vendors) access to sensitive or confidential a third credential from the breached
company apps, resources, and data is a company—a temporary pass providing
nuanced exercise. Oftentimes, providing access to the specific portion of the
quick access is crucial, but granting the software code under investigation. These
exact level of permissions for the proper three verifiable credentials can be quickly
timeframe is quite difficult. presented every time the forensics specialist
logs into the codebase for instant and
Consider how a cybersecurity remediation highly secure access.
firm, tasked with helping companies
recover from cyber breaches, can quickly Impact
and securely gain access to a Fortune 500
tech company’s codebase using verifiable With Verified ID, access to highly secure
credentials—and how the breached environments can be provided quickly and
company can ensure access is revoked once with the appropriate level of granularity
the job is complete. The cyber forensic while automating permission revocation
specialist assigned to the project must controls so that access expires when
prove two things: current employment by no longer needed. Those who possess
the cyber remediation company, plus a specific, high assurance credentials receive
valid and current certification for computer immediate access and avoid manual and
forensics. To do so, they need two Verified time-consuming approval processes.
ID credentials, an employee credential
from their company and a certification If the cyber professional completes the
credential from the Computer Forensics project, loses his/her forensic certification,
governing body. or leaves their company, any of the project’s

8
three required Verified ID cards can be
revoked, minimizing instances of prolonged
or unauthorized access. Lastly, using
verifiable credentials simplifies guest access
across disparate workflows and tech stacks.

Cybersecurity
remediation Forensic specialist Breached company
company

Issuer Holder Verifier


a. Cybersecurity remediation a. Forensic specialist holds a. Breached company verifies
company issues an employee credential the employee ID is issued by
employee credential to the from cybersecurity the legitimate cybersecurity
forensics specialist assigned remediation company. remediation company.
to the project.
b. Forensic specialist holds b. Breached company verifies
b. Forensics certification certification credential the forensic specialist
body issues a certification from Computer Forensics certification is issued by
credential verifying governing body. the authentic Computer
certification status. Forensics governing body.
c. Forensic specialist
c. Breached company holds temporary source c. Breached company verifies
verifies credentials a.) and code analysis pass to the source code analysis
b.) then issues credential complete project. ID pass was issued by the
c.) to grant access to the breached company.
specific software code
requiring analysis. d. Breached company
sees that cybersecurity
professional resigns
from cyber remediation
company and immediately
revokes source code
analysis pass.
9
How it works

1 2 3

A cybersecurity professional with Only by presenting these The access package is unlocked
two Verified ID credentials: one two verified ID cards can the and a new verified ID card,
employee ID from their cyber cybersecurity professional unlock Source Code Analysis ID, is
remediation company, and one an access package containing a automatically issued to the
certification ID from the Computer third verified ID credential cybersecurity professional.
Forensics governing body.

4 5

The cybersecurity professional If the cyber professional


presents all three verified IDs cards completes the job, loses their
to the source code database for forensic certification, or leaves
immediate access to the section of their company, the Source Code
code under review Analysis ID is revoked.
10
Use case 3

Help desk automation


and self-service account
recovery

Context
Help desk operations require significant their digital wallet to the Contoso IT team’s
time and capital expenditures and have automated account lockout flow and b.)
significant user experience impacts. pass a live FaceCheck scan, which compares
Account lockouts comprise a significant the profile picture on their user credential
percentage of customer service calls at an against a live selfie scan from their mobile
average cost of $50 per call. Automating the phone. If successful, these two steps
process with a high level of authentication immediately authorize a trusted username
and a high degree of user satisfaction could and password reset without ever requiring
reduce costs, time, and user frustration. a customer support representative to assist.

Contoso Smart CRM, a customer The Contoso Smart CRM user credential
relationship management software with dramatically reduced the time taken
tens of thousands of business customers, to resolve account lockout issues by
identified that most of their Help desk calls requesting user credentials before support
stemmed from either account lockouts or tickets were filed, enabling the Help desk
product questions. better diagnose user issues based on
unique platform licenses.
To solve for this, Contoso issued every
licensed user on the Contoso platform Impact
a unique verified ID credential tied to
the user’s unique level of access and One of the key advantages of automating
permissions. This enabled self-service the Help desk through verifiable credentials
account recovery by allowing users who is avoiding a time-consuming information
forgot their passwords to quickly pass a gathering stage. Instead of providing
two-step recovery process: a.) present context over chat or phone, customers
their Contoso Smart CRM credential from simply share their verified Contoso CRM

11
credentials, which instantly provide context
on the user’s privileges, permissions, and
other metadata that can be used to help
resolve their claim. This helps resolve user
issues quicker, improves the productivity of
the support team so they can close tickets
faster, and ultimately helps save money
for Contoso.

When it comes to account lockouts, support


teams don’t even need to be involved in
the recovery process—users can use their
verified ID credentials to regain access
to their accounts through a completely
self-service process.

Contoso Smart CRM


Contoso Smart CRM Licensed users
helpdesk

Issuer Holder Verifier


a. Contoso Smart CRM issues a. Every licensed user a. Contoso Smart CRM
a verifiable credential to on the Contoso Smart helpdesk (account recovery
each licensed user on CRM platform. flow, customer support ticket
the platform. and live chat flow).
12
Use case 4

LinkedIn workplace
verification

Context
In the digital world, when you meet to their project on LinkedIn and see that
professional contacts for the first time they are authentic employees of First
online, you need additional trust signals Up Consultants.
to increase your confidence that they are
who they say they are. Without these trust To make this happen, First Up Consultants
signals, it is hard to know if the people we quickly created a workplace credential
are connecting with are credible and if their in the Entra Verified ID admin portal and
skills and qualifications are authentic. customized it to fit their company branding.
Their consultants were encouraged to verify
Previously, we had to rely on self-reported themselves on LinkedIn through an internal
data and reference-checking to verify an company announcement, and in just a few
individual’s employment history, but now minutes, each one was issued an employee
it is possible to verify a person’s place of ID after successfully logging in with their
work on LinkedIn through Microsoft Entra corporate credentials through LinkedIn’s
Verified ID. verification flow.

First Up Consultants, a consulting agency, After sharing this employee ID with


wanted to verify their entire workforce LinkedIn, a checkmark appears within
of consultants on LinkedIn for a few the “verifications” section of the LinkedIn
reasons: a.) to increase the legitimacy member’s profile, proving they presented
of their consultants as they prospect for a valid employee credential from First
new clients on LinkedIn b.) to help their Up Consultants.
in-house recruiter team establish trust as
they recruit new consultants to join the
company, and c.) so that clients can look
up the consultants that have been assigned

13
Impact
Microsoft Entra Verified ID allows Verifying their consultants online allowed
organizations to offer workplace First Up Consultants to not only bring
verification in a matter of minutes, which in more business, but also strengthen
individuals can use to validate their place of their company brand through offering
work on LinkedIn in just a few clicks. powerful trust signals to the entire LinkedIn
community.
After verifying their employees on LinkedIn,
First Up Consultants was able to a.) more
efficiently prospect for new clients since
their consultants were now quickly seen
as legitimate employees of a reputable
and verified company, b.) increase the
response rate of their recruiting team’s
LinkedIn outreach programs, and c.)
increase client confidence in their assigned
consultant, which helped elevate overall
project satisfaction.

Organizations Workers LinkedIn

Issuer Holder Verifier


a. Any organization can a. Employees, contractors, a. LinkedIn verifies that an
customize a workplace and workers for an individual’s workplace
credential that matches their organization hold their credential is authentic and
company branding, then workplace credentials inside issued by a legitimate,
issue it to their workforce. of their LinkedIn accounts. participating organization.
If valid, the individual will
receive a checkmark next
to their work experience
signifying that it is authentic
and matches the job title on
their workplace credential.
14
Use case 5

Training certifications

Context
Medical companies that help hospitals to technician and surgical assistant before they
operate various devices such as robotic enter the hospital, and before they begin to
surgical machines, heart monitors, etc., operate any equipment.
must demonstrate that their employees
have been trained on the latest techniques By automating scans, Woodgrove raises the
and methods for operating the equipment. bar for security and safety without requiring
any manual verification or supervision.
Companies can use verified credentials Best of all, notice is provided when a
to validate the completion of necessary certification expires or is set to expire soon,
trainings prior to granting physical site helping hospital staff avoid delays caused
access or access to the equipment. Let’s by slow or lost paperwork. By flagging
take a look at how Woodgrove Medical, a invalid or out-of-date credentials, hospitals
hospital supply company, can ensure their and medical companies are also able to
staff always have current employee IDs and proactively avoid any compliance violations
have completed any necessary training on that may arise.
new surgical equipment.

Impact
Before discovering Verified ID credentials,
our hospital supply company did not have a
consistent process for validating employee
IDs or safety and equipment training
certifications. Thanks to daily certification
scans, Woodgrove Medical now is able
to validate the qualifications for each

15
Contoso Equipment
Medical operators Hospitals
Manufacturer

Issuer Holder Verifier


a. Woodgrove Medical issues a. Medical technicians, a. Hospitals that oversee
employee IDs to equipment surgical assistants, certain medical equipment
technicians, surgical and surgeons who are must verify that on-site
assistants, and surgeons. employees of Woodgrove operators demonstrate
Medical and certified full compliance with
b. Contoso Equipment to operate surgical certifications to handle
Manufacturer (maker of equipment by Contoso the equipment.
heart monitors) issues Equipment Manufacturer.
training certifications
proving the completion
of in-person training
and testing.

16
Use case 6

Standardizing
credential requirements
for union jobs

Context
Millions of union members in the United licensing eligibility, which leads to
States receive work through union job disruptions in work, travel delays, and an
boards, but the pre-hire and onboarding increased risk for impersonation and fraud.
processes for companies that hire union It made sense to standardize the way union
members often differ drastically. This members verified their qualifications across
makes it time-consuming and redundant transportation bodies and organizations
for workers to switch between union so that professionals could start and rotate
jobs, something they do often, as they between jobs faster, minimize fraud, and
are asked to present the same forms of ensure licensing compliance and continuity.
verification to each new employer despite
already having proven their identity to their Verifiable credentials helped re-imagine the
existing employer. process at scale, giving the transportation
union staff a smoother, more compliant,
This led to delayed start times and service and more secure credential validation
disruptions for members of the Woodgrove experience—giving members everything
Transportation Coalition, one of the largest they need to be productive on day one.
transportation unions in the United States,
comprising tens of thousands of employees
Impact
with job titles like railroad conductor, airline
pilot, truck driver, and more. The union Using verifiable credentials, the
members work for hundreds of different transportation union was able to
companies, each with their own unique standardize identity and certification
identity verification processes. checks across transportation bodies
(railway, airway, and roadway), increasing
With certification requirements constantly hire-to-start timelines, boosting licensing
in flux, it is hard for members to maintain

17
compliance rates, and minimizing the risk of reliability. It also saved union members time
fraud and impersonation. by only requiring a single-time validation
of key identity documents, such as driver’s
Union member credentials were license and passport, as a part of the initial
successfully passported and shared across union member application process.
companies, jobs, and jurisdictions for a
much more cohesive and fluid onboarding Companies that go on to hire union
experience, significantly reducing the members with valid union members IDs
amount of time workers had to wait for can trust that holders have already proven
administrative licensing checks. This their identities by providing a valid driver’s
enabled transportation professionals license or passport, among other forms of
to provide a more smooth, secure, and identification, and don’t need to repeat this
punctual travel experience on behalf of redundant verification step (until the union
their employers—which not only helps cut member ID expires or is up for renewal) in
costs, but elevates brand reputation and order to hire them with confidence.

Woodgrove
Transportation Railway, airway, and
Transportation
professionals roadway companies
Coalition

Issuer Holder Verifier


a. Woodgrove Transportation a. Airway, roadway, and a. The hiring team for the
Coalition issues a.) each railway professionals hold various railroad, airline,
professional in the their Union Member IDs, and trucking companies
union a member ID and Certified Operator IDs, and verify the union member
b.) the legally required Employee IDs. IDs and operator IDs
qualification and operator for each transportation
IDs for conductors, professional for hiring and
pilots, and truck onboarding purposes.
drivers on behalf of the
certification bodies for each b. The on-site management
transportation category. and security team for the
various railway, airway, and
b. Employers from various roadway transfer stations,
railway, airway, and terminals, and checkpoints
roadway companies issue verify the credentials
employee IDs. (operator ID, employee ID) of
their conductors, pilots, and
drivers prior to every time
they board a new vehicle.
18
How it works

1 2 3

Woodgrove Transportation There is no standard form of The Woodgrove Transportation


Coalition is a union comprised verification used by all of the Coalition can issue Certified
of airway, roadway, and transportation companies in Operator ID cards to each
railway workers employed the union. They all have their of its members on behalf of
by hundreds of different own proprietary validation flows their respective transportation
transportation companies. and requirements. licensing bodies.

4 5 6

By presenting the necessary If a pilot changes companies, their Pilots can earn advanced flight
verified ID cards, a pilot can previous Employee ID is revoked licensing IDs through the union
quickly pass through physical and their current employer issues which can be presented to their
security checkpoints to operate a new one. employer for updated assignments
their machinery. and the ability board and operate
more specialized aircrafts. 19
B2C scenarios
Let’s explore how verifiable
credentials can help reimagine
a variety of business-to-
consumer scenarios.

20
Use case 7

Skilling certifications

Context
Online programming schools have helped recruiters, or anyone else who wants to
countless individuals learn to code and verify their authenticity and identify which
find employment in the tech industry. skills a candidate possesses.
Companies that take a chance on a self-
taught programmer, however, often have Impact
reservations about the completeness of the
candidate’s coding literacy. With verifiable course credentials,
students can prove they have passed
Live tests are a good way to vet some authentic programming courses and
critical thinking and programming skills, tests—assuring prospective employers
but are not extensive enough to measure their technical skillset is genuine. This
the full range of knowledge a coder will can accelerate the time-to-hire, inspire
need throughout employment. Online confidence in the hiring company, and
course and bootcamp certificates can help programmers stand out from the
demonstrate technical proficiency, but can ‘non-verified’ competition.
be easily fabricated.
Employers can validate knowledge beyond
Both new and established programmers the skills they are able to vet during
are now utilizing verifiable credentials to interviews. Additionally, since students can
demonstrate the skills they have attained easily store their skill credentials in a digital
through self-education, effectively solving wallet, they can quickly demonstrate the full
for this online skill-proofing dilemma. scope of their technical skills to anyone in a
Coding schools simply issue students a matter of seconds.
course completion certificate as a verifiable
credential which allows the students to By taking courses that offer verifiable
present the credentials to employers, credential-based course certificates,

21
students can demonstrate a diverse set
of trainings and showcase their technical
versatility to employers who can use this
information to make more educated
hiring decisions.

Coding courses,
bootcamps, and Individuals Hiring companies
schools

Issuer Holder Verifier


a. Coding courses, a. Individuals who take and a. Hiring companies who want
bootcamps, and schools. A complete a specific technical to validate an individual’s
unique course completion course are awarded a unique technical proficiency.
credential can be issued for course credential.
each particular technical b. Coding schools may require
skill or lesson, no matter a specific course credential
how small. in order to proceed with
more advanced lessons.
22
Use case 8

Managing students,
applicants, and alumni
networks

Context
Universities and academic institutions keep their applicants, actual students, and
have the difficult job of managing a large alumni digitally connected to the university
number of student relationships—student for life and to reduce the burden on the
applicants (potential future students), university staff.
existing students, and alumni. Universities
and colleges have an enormous number of Not only do the digital student credentials
identities that must be created to facilitate provide easier access to transcripts and
each student applicant even though most documents needed for graduate school
of the applicants either will not be accepted and future career opportunities, but
or will decide to attend a different school. they provide simpler for university staff
This creates an enormous churn for IT and to manage and revoke. They also offer
security teams who must constantly revoke additional benefits like access to discounts
user accounts that will never be used. at the campus library, cafes, and local
transportation lines on campus and online
In addition, responsibilities such as storing for a more rewarding academic and
and sharing transcripts across a student’s alumni experience.
lifetime are logistically taxing on university
staff and difficult for students to access, Finally, instead of waiting the typical 14 days
often requiring a campus visit, waiting for a student identification card to arrive in
weeks or months for certificates to be the mail, students can instantly create their
mailed, or paying a notary for assistance digital student credentials prior to the first
with paper copies. day of class to better facilitate their initial
days on campus or as an alumni.
Contoso University wanted to create a
convenient online student credentialing
and certificate distribution system to

23
Impact
Rolling out digital student and alumni of their individual privacy, and enjoy the
credentials is a game changing convenience of easy access to key academic
technological advancement for higher documents like transcripts and diplomas
education. These verified credentials help without the burden of in-person pickup
universities improve security and lower the and time delays. This enables faster sharing
overhead of engaging alumni while also of official academic documents with
saving a series of logistical and operational future employers, programs, and graduate
expenses such as physical transcript storage universities. It also allows the university
and the maintenance of contact lists even to maintain better contact with current
as alumni move and change addresses. and former students which can lead to
more successful fundraising, university
Students are delighted with digitally involvement, and networking, as well as a
native discounts for on-campus and online stronger reputation for the university.
services, appreciate the increased control

Academic Prospective, current, University partners


institutions and former students and services

Issuer Holder Verifier


a. Universities and academic a. Higher education a. Future employers,
institutions issue student ID applicants, active students, universities, scholarship
cards to applicants, and alumni. grants, and academic clubs.
active students, and alumni.
b. Contoso University’s
online degree,
certificate, and transcript
management portal.
c. Contoso University’s campus
services—such as libraries,
cafeterias, restaurants,
counseling services,
sporting events, buildings,
and classes.
d. Local transportation lines,
such as buses and trains.
24
How it works

1 2 3

Students must often visit campus, Physical student identification By issuing digital Verified
wait long periods of time, or cards typically take 14 days ID credentials, Contoso
pay a notary for assistance in to arrive by mail, preventing University gives students
order to access official academic access to key campus services instantaneous digital access to
documents like transcripts, like the registrar’s office, library, academic documents.
degrees, or certificates. or cafeteria.

4 5 6

Digital student ID cards enable Students can present their Student Students can then easily and
students to redeem academic IDs to the university portal for securely share these digital
affiliation perks such as discounts self-service access to digital academic documents and
at the campus library, local cafes, diplomas, transcripts, and other credentials with future employers,
or nearby transportation lines. key academic documents. schools, or programs.
25
Use case 9

Partner loyalty and


rewards programs

Context
One strategy that brands use to stand privacy respecting biometric FaceCheck, to
out from the competition and increase quickly verify their identity in real-time.
customer loyalty is to offer perks and
benefits to their users, which can be done Impact
effectively through building a robust
partner rewards network. After implementing their partner rewards
program, Northwind Airlines was able
Let’s see how Northwind Airlines is using a to dramatically improve their in-app
verifiable credentials mobile phone wallet engagement, percentage of return
SDK to rapidly grow their in-app partner fliers, and new customer referrals. Plus,
ecosystem while also reducing account Northwind was able to completely
takeovers and helpdesk costs. With just a modernize and automate a majority of their
few lines of code using an open standards- helpdesk functions.
based wallet library, Northwind’s existing
mobile application can be transformed into Now, the customer support system can
a digital wallet for verifiable credentials, pull a flier’s profile and trip information
with a custom loyalty card inside waiting for instantly, enabling customers to change
each user. their flight bookings through self-service
in less than a minute, without ever having
Customers can use the digital loyalty card to speak to a live representative, wait in a
anywhere, including partnering hotels, phone queue, or instant message chat with
rideshare companies, or restaurants around an employee. Building a reliable, self-service
the city for rewards like hotel points, free Help desk solution helped cut customer
rides, and discounted coffee. For higher service costs significantly.
fidelity actions, users can even be asked
to present their loyalty cards alongside a

26
Fliers with the
Northwind Airlines
Northwind Airlines Northwind Airlines
and partners
mobile app

Issuer Holder Verifier


a. Northwind Airlines issues a. Fliers and customers a. Northwind Airlines mobile
a Flier Loyalty ID card to of Northwind Airlines application and helpdesk.
every user that downloads or who have downloaded
updates to the latest version the Northwind Airlines b. Partners in the Northwind
of their mobile app. mobile app. Airlines reward network
such as hotels, rideshare
companies, and cafes or
restaurants around airports
that Northwind offers
flights from.

27
How it works

1 2 3

Any company, including App users can explore coupons, Users can easily redeem perks
Northwind Airlines, can use the discounts, and perks that they can from partners like Woodland
Verified ID Wallet SDK to issue redeem with loyalty card partners Coffee by scanning a QR
a loyalty card to their existing directly in the “Offers” tab. code (online or in person) and
mobile app users. sharing their loyalty card via the
mobile app.

4 5 6

In the Help Desk of the Northwind For high-fidelity authorizations Once the user has passed a
Airlines app, fliers can initiate self- requiring an extra layer of security, FaceCheck, they are authorized
service processes like changing users can be asked to perform to proceed with their
flight bookings. a FaceCheck as part of the booking change.
verification process.
28
Use case 10

Age proofing

Context
Digitally age-gating content, services, and legal age, individuals can use this card to
privileges is an important way to enforce digitally reserve a rental car remotely, sign
legislation while protecting minors and an apartment lease from across the country,
young adults online, but it can create open a bank account online, or download
friction and inconvenience for those who age-gated content and video games.
are age appropriate. Historically, it has
been difficult to prove one’s age on the The best part is that due to the privacy-
web in a way that couldn’t be spoofed focused principles of verifiable credentials,
or circumvented, but with verifiable citizens don’t need to divulge the specifics
credentials, government entities can now of their identity attributes, such as date of
issue secure digital IDs and passports to birth, to a service in order to prove that
their citizens. they are of acceptable age. The only data
that the verifying service reads is a “yes”
The Contoso Department of Homeland (citizen is of legal age) or a “no” (citizen is
Security decided to grant all of their not of legal age), which ensures that the
citizens a unique digital driver’s license citizen’s personally identifiable information
equivalent to make it easier for people to data remains encrypted.
share and validate key identity attributes
such as name, age, address, and more. Impact
Now, citizens can digitally present this
digital ID to any service or establishment in The ability for citizens to independently
order to access specific content, services, prove key identity attributes online opens
or privileges—and that service can in turn up an entirely new world of possibilities.
verify that this verified ID comes from an Digitally, individuals can now do a series of
authentic issuer, and that the information things that they would otherwise have had
held inside is legitimate. If they are of

29
to a.) do in person or b.) endure a much which helps protect minors and young
longer, more difficult process if done online. adults while helping the companies they do
business with stay legally compliant.
For example, a citizen can simply present
a digital driver’s license to open up a bank Lastly, digital age proofing using digital
account online, without having to wait on driver’s licenses helps protect user privacy,
any manual identity approvals. Previously, due to the anonymous nature of the data
they would have had to upload a copy of enclosed in their Verified ID credentials.
a driver’s license and one other form of This way, user’s can minimize the amount
government approved identification, like of personally identifiable information that
a social security card or birth certificate, in they share online—helping them operate
order to do so—a process that could take in a safer, more transparent, and more
days or weeks. empowered digital manner.

Citizens can now easily prove their age,


with a guarantee of authenticity backed by
a legitimate government entity, to bypass
age-gated services and material. This not
only removes user friction, but it makes it
harder for individuals to spoof their age,

Contoso Age-restricted
Department of Citizens of Contoso businesses and
Homeland Security services

Issuer Holder Verifier


a. Contoso Department of a. Each citizen of Contoso a. Services that require age-
Homeland Security issues holds a unique Citizen ID. verification such as car
each citizen a Citizen ID. rental businesses, property
management companies
for apartment leases,
banks for the opening of
new individual accounts,
or gaming and streaming
services for downloading
mature-rated content.
30
Use case 11

Digital ticket authenticity


and event perks

Context
Electronic event ticketing is a booming this goal, such as a local parking companies,
industry but not one without its fair share popular in-stadium restaurant franchises,
of challenges on both the side of the and the basketball league’s approved
consumer and the online ticketing vendor. apparel merchandiser.
For consumers, it can be next to impossible
to tell if a resale ticket is truly authentic. With a verifiable credentials-based ticket
For ticketers, fake tickets hurt their market, purchase, consumers can present their
their brand reputation, and their pockets. tickets via QR code for not only event
Money-back guarantees relieve some stress entry, but to various partnering companies
but can’t make up for a missed event, as for perks like free parking, a discounted
people often find out tickets are fake once daily food item, and the free themed
they arrive at a venue. bobblehead of the night.

With verifiable credential-based digital Impact


tickets, both consumers and online
ticket vendors can transact with absolute Adopting verifiable credential-based digital
certainty that their tickets are real. It also tickets is an effective way to combat ticket
becomes possible to bundle perks into fraud in the secondary reseller market,
the ticket purchasing experience, which negating the ability to sell a screenshot of
can help ticket vendors and event venues a ticket, or sell the same ticket more than
stand out from the competition and build a once. This protects consumers and gives
stronger, more differentiated offering. them peace of mind that their online ticket
purchases are legitimate. It also protects
For instance, a professional basketball ticket vendors from selling fakes, receiving
stadium wanting to sell more tickets can bad press, and losing time and money
partner with various entities to accomplish remediating ticket fraud.

31
Consumers can also redeem exclusive perks
from the events they attend quickly and
easily, just by scanning a QR code on their
phone and presenting the verified ticket in
their digital wallet. This provides a stronger
and more differentiated offer to not only
the stadium or event venue, but to the
partners who are brought more business,
exposure, and partnership opportunities.

Between less fraud, more perks, and a


smoother user experience, electronic
ticketing with verifiable credentials is a
win-win for both consumers and online
ticket vendors.

Online ticketing Stadium or event


Individual
company venue partners

Issuer Holder Verifier


a. The online ticketing a. The individual who a. Parking attendant at a lot
company who sells the purchases an electronic that has partnered with the
consumer their digital event event ticket receives a event venue.
ticket issues a verifiable single verifiable credential-
credential at the moment of based ticket with baked b. Stadium ticketing staff at
purchase. in rewards that can be the venue’s point of entry.
presented to stadium and c. Stadium restaurant
event venue partners for franchises that have
additional perks. partnered with the event
venue. The basketball
league’s approved online
apparel merchandiser.
32
Summary and
next steps
Today, we’ve explored a variety of ways principles of verifiable credentials will be
in which verifiable credentials can help the tools that help your business find the
transform and reimagine critical B2B and most impactful ways to begin its verifiable
B2C processes—from verifying workplaces credentials journey.
on LinkedIn, to ensuring compliant and
secure access to digital and physical You can design a personalized
workspaces, to enriching the experience of implementation of verifiable credentials
digital ticket holders—and beyond. for your business today with Microsoft
Entra Verified ID, Microsoft’s open
It is important to emphasize that these are standards-based, managed verifiable
not the only ways that verifiable credentials credentials service.
can be used to transform your business. In
reality, the potential use cases, industries,
and businesses that can derive value from
verifiable credentials are abundant. There Start your journey with verifiable
are thousands of strong, creative, and credentials by enabling Verified ID in
the Microsoft Entra admin center.
impactful use cases for this technology
waiting to be discovered and implemented
that we have not yet considered today.

Therefore, creativity, forward thinking, and Read the whitepaper on verifiable


a well-rounded understanding of the core credentials and decentralized identity.

Visit Microsoft Entra Verified ID’s


landing page

©2023 Microsoft Corporation. All rights reserved. This document is provided


“as-is.” Information and views expressed in this document, including URL and other
Internet website references, may change without notice. You bear the risk of using
it. This document does not provide you with any legal rights to any intellectual
property in any Microsoft product. You may copy and use this document for your
internal, reference purposes.

You might also like