Enterprise Stack Features

The complete feature list for Issuer, Verifier, and Wallet capabilities in the Enterprise Stack. Jump directly to a section using the links.


Issuer

Core

FeatureHighlightsDetails
Stateful API• Enterprise Issuer keeps issuance state
• Shared DB (e.g., MongoDB)
• Works in clustered deployments
• Tenancy-aware sessions
Enterprise Issuer is stateful (vs. Community Stack stateless), persisting offers, sessions, configs and status ops to a shared DB for reliability and horizontal scaling in multi-instance setups.
Event Webhooks / Callbacks• Subscribe to issuance state changes
• Deliver to your backend
• Retry/back-off
Optional webhooks notify external systems about offer creation, claim, issuance completion, and failures, enabling event-driven orchestration and audit pipelines.
Key Management (KMS-agnostic)• External KMS (AWS, Azure, Hashicorp, OCI, …)
• Asymmetric keys: ed25519, secp256r1/k1, RSA
• Rotation & versioning via KMS
• HSM boundary retained
Delegates signing to external KMS so private keys never leave HSMs; supports mainstream curves/RSA, rotation, versioning and provider auth patterns (IAM, API keys). Raw keys possible for dev/PoC.
DIDs & Identifiers• did:web hosting & registry
• did:key / did:jwk / did:ebsi support
• x509 certificates
• DID store service integration
Create/host issuer DIDs (incl. did:web) and resolve via DID services. Use appropriate methods per format and trust model; manage DID docs in-stack via enterprise DID store service.
Credential Templates / Types• Flexible data models (incl. custom types)
• No rigid “template” required
You can sign arbitrary JSON structures. Just register a credential type (name + optional display props) in issuer metadata; no rigid template DSL is required.
Credential Issuance Trigger• Issuer- or Wallet (coming soon)- initiatedInitiate issuance from your backend API (Issuer-initiated)/ Admin UI or let a user start the flow from their wallet.
Credential Delivery• QR code / deep link
• Digital Credentials API (coming soon)
The Issuer generates OID4VCI credential offers which can either be rendered as QR codes for the wallet to scan or be provided as embedded links.
User (Credential Receiver) Authentication• Pre-Auth (PIN optional)
• Auth Code via external IdP
Choose pre-auth (optionally with PIN) or, Auth Code against an external IdP and optionally map verified claims to credential fields at issuance time.
Issuance modes• Single credential issuance
• Batch or deferred (coming soon)
Issue one or many credentials in a single session (immediately or deferred), simplifying onboarding flows that need a “bundle” (e.g., ID + entitlements).

Standards

FeatureHighlightsDetails
Credentials: Support for all major credential standards• ISO 18013-5 mDL
• ISO/IEC 23220
• SD-JWT VC IETF
• W3C VC v1.1+/v2.0
• W3C VC v2.0(coming soon)
Issue standard compliant credentials based on popular formats (incl. custom attribute structures, types and schemas).
Protocols: Support for all major exchange protocols standards• OID4VCI Draft 11/13
• OID4VCI v1 (coming in Q4 25)
• Pre-Auth Code (PIN optional) flow
• Auth Code flow
OID4VCI flows supported for SD-JWT VC/W3C VC issuance; ISO-18013-7 for mDL/mdoc issuance. Auth Code (with custom OIDC compliant IdP).
Status: Support for various approaches to manage the lifecycle of credentials.• Bitstring Status List v1.0
• StatusList2021
• RevocationList2020
• TokenStatusList (only JWT format with draft 8)
Issue standard compliant status credentials based on popular formats for various purposes (incl. revocation, suspension or custom statuses).
Digital Credentials API (2026)• Standard browser/agent API for issuance
• Wraps OID4VCI/ISO-18013-7 flows under the hood
• Enables 1-click web integrations, native UX prompts
Provide a standardized browser interface for wallets/agents so web apps can request issuance with minimal glue code. Improves DX/UX while relying on existing protocols behind the scenes.

Data & Identity Sourcing

FeatureHighlightsDetails
Pre-offer data collection• Gather attributes from DB/CRM/registries before creating the credential offer
• Best when data is known/stable
• Can combine later with post-offer data functions (timestamps/IDs/webhooks)
Provide all credential and subject data upfront and pass it to the Issuer when creating the offer. This minimizes runtime lookups and user interaction. If needed, you can still enrich the credential later with post-offer data functions before signing.
Data functions for dynamic attributes• Run after offer creation, before signing
• Timestamps/UUIDs/DID injection - Webhooks to fetch external data
Inject time-sensitive or externally sourced values just-in-time (e.g., timestamps, subject DID, booking numbers) using built-in data functions and webhooks.
External IdP• Map IdP claims to credential fields via the Auth Code flowWith the OID4VCI Auth Code flow, authenticate users at your IdP and map verified claims into credential attributes in real time during issuance.

Lifecycle

FeatureHighlightsDetails
Revocation & suspension (via status lists) — Managed• Add status at issuance (new bitstring entry + hosted Status Credential)
• Auto-host to configured registry (S3, Azure Blob, GCS)
• One API to update/re-sign/publish (revoke/suspend).
Create a status entry at issuance and auto-host the Status Credential in your chosen registry. Use a single API to update, re-sign, and publish changes.
Expiration and validity controls• Valid-from / expiry
• Generated via data functions
Set explicit or dynamically generated validity windows to match real-world lifecycle (passes, IDs, tickets).

Integrations

FeatureHighlightsDetails
External KMS and diverse key types• Store private key material in external KMS provider (e.g. AWS, Azure, Hashicorp, Oracle)
• Use different key types (e.g. ed25519, secp256r1/k1, RSA)
Delegate signing to your KMS so private keys never leave the HSM boundary; supports multiple curves and RSA with key rotation/monitoring via the KMS provider.
Trust Registries• eIDAS2
• EBSI
Integrates with various trust registries of different ID ecosystems (e.g eIDAS2).
QTSPs (2026)• Create qualified signaturesIntegrations with various QTSPs for qualified signatures.

DID & Trust Anchors

FeatureHighlightsDetails
Host did:web documents• Serve did:web
• Automate doc updates
Publish/serve did:web documents for issuer identification using a DID.
DID Document Storage• Persist DID documents for later referencePersist DIDs and their documents via the Enterprise Stack DID store service.

Branding

FeatureHighlightsDetails
Issuer Metadata• Per-type styling - Colors, logo, description
• Wallets can fetch/cache display metadata
Define reusable branding per credential type so wallets render consistent visuals without embedding styling in each credential.
Embedded in Credential• Per-instance display data for fine-grained differentiationEmbed display attributes directly in a credential instance when variants of the same type need distinct visuals (e.g., ticket tiers).

ID Ecosystems

FeatureHighlightsDetails
EMEA• EU (eIDAS2, EBSI), Switzerland (SWIYU)Issuance aligned with (emerging) regional trust frameworks.
APAC• New Zealand (DISTF), Australia, Thailand, Japan, …Issuance aligned with (emerging) regional trust frameworks.
Americas• US, Canada, Brazil, …Issuance aligned with (emerging) regional trust frameworks.
Custom• Bring your own ID ecosystemThe issuer can be modified to comply with other ID ecosystems.

Auth & Permissions

FeatureHighlightsDetails
Protected APIs (AuthN/Z)• Fine-grained RBAC
• Scoped access tokens
• Tenant/service scoping
Enterprise Stack uses role-based access control and scoped identifiers to protect APIs at org/tenant/service boundaries.
Roles & Permissions (RBAC)• Roles per org/tenant/service
• Principle of least privilege
Assign granular roles for admins, integrators and operators;
API Keys (Server-to-Server)• For M2M access
• Assign roles for Fine-grained RBAC
Provision API credentials for backend integrations with scoping to services/tenants.
User Accounts• Admin GUI login
• Assign roles for Fine-grained RBAC
Operator accounts manage the Enterprise Stack via the GUI (e.g. service configs, check analytics, revoke credentials, …)

Logs & Analytics

FeatureHighlightsDetails
Metrics• Issuance KPIs
• Status updates
• Tenant/service breakdowns
Observe issuance volumes and success rates across tenants/services for ops and reporting.
Logs• Structured events / system logs
• Audit trails
• Export to SIEM
• Open Telemetry support
Emit structured logs/events for debugging and audit; export to external SIEM as needed.

Platform & Ops.

FeatureHighlightsDetails
Stateful API + Persistence• DB-backed sessions/configs
• Multi-instance safe
Persistence enables HA/scale-out; instances share state cleanly for reliable issuance at scale.
Clustering & horizontal scaling• Multi-instance behind LB
• Stateless exchange layer + stateful DB
Run multiple Issuer instances concurrently behind a load balancer for throughput and resilience.
Data persistence layer• MongoDB (document DB)
• Durable storage of configs/events
Durable storage for offers, configs and events; fits high-volume issuance patterns.
Encryption• DB level encryptionSetup encryption on the MongoDB database.
Enterprise CLI / Quickstart• CLI to explore features
• Docker-compose stack
Use the Enterprise Quickstart repo and CLI to bring the stack up locally (requires enterprise images).

Verifier

Core

FeatureHighlightsDetails
Stateful API• Enterprise Verifier keeps verification state
• Shared DB (e.g., MongoDB)
• Works in clustered deployments
• Tenancy-aware sessions
Enterprise Verifier is stateful (vs. Community Stack stateless), persisting authorization requests, sessions, configs and status ops to a shared DB for reliability and horizontal scale in multi-instance setups.
Event Webhooks / Callbacks• Subscribe to verification state changes
• Deliver to your backend
• Retry/back-off
Optional webhooks notify external systems about verification session states and success and failures, enabling event-driven orchestration and audit pipelines.

Request

FeatureHighlightsDetails
Delivery (QR codes & links)• QR code / deep link
• Digital Credentials API (coming soon)
The Verifier generates OID4VP authorization requests which can either be rendered as QR codes for the wallet to scan or be provided as embedded links.
Query• Simple type/format request
• Presentation Definition filters/constraints
• DCQL queries (in beta)
Define required credentials using simple params or Presentation Definition; the API generates an OID4VP authorization URL.
Bundles/Batch• Request multiple credentials
• Mixed standards/types (e.g., SD-JWT VC, W3C VC, mDL)
• Single session, unified validation
Request several credentials in a single flow; the Verifier can validate heterogeneous sets within one VP/session.

Verification & Policies

FeatureHighlightsDetails
Policy engine: static & parameterized• Pre-build: signatures, validity, schema, Presentation Definition match
• Parameterized: allow-issuer, webhook
• Webhook delegates checks externally
• Custom OPA/Rego policies
Apply predefined and parameterized policies—and optionally custom OPA/Rego rules—to enforce business logic. Webhooks can offload any check to external systems.

Lifecycle & Trust

FeatureHighlightsDetails
Lifecycle: expiration & revocation• Not-before/expiry checks
• Revocation/status checks
Enforce validity windows (e.g. valid until) and revocation/status based on various standards (e.g. Bitstring Status List v1.0) on presented credentials.
Trust chain validation• DID/key trust evaluation
• Certificate chain (IACA/DSC/VICAL)
• External trust sources supported (e.g. eIDAS2, EBSI)
Validate Issuer trust via DIDs/keys or via relevant PKI chains; keys/certs can be resolved dynamically or be based on trusted sources (e.g. eIDAS2 trusted lists)

Auth & Permissions

FeatureHighlightsDetails
Protected APIs (AuthN/Z)• Fine-grained RBAC
• Scoped access tokens
• Tenant/service scoping
Enterprise Stack uses role-based access control and scoped identifiers to protect APIs at org/tenant/service boundaries.
Roles & Permissions (RBAC)• Roles per org/tenant/service
• Principle of least privilege
Assign granular roles for admins, integrators and operators;
API Keys (Server-to-Server)• For M2M access
• Assign roles for Fine-grained RBAC
Provision API credentials for backend integrations with scoping to services/tenants.
User Accounts• Admin GUI login
• Assign roles for Fine-grained RBAC
Operator accounts manage the Enterprise Stack via the GUI (e.g. service configs, check analytics, revoke credentials, …)

Standards

FeatureHighlightsDetails
Credentials: Support for all major credential standards• ISO 18013-5 mDL
• ISO/IEC 23220
• SD-JWT VC IETF
• W3C VC v1.1+
• W3C VC v2.0 (coming soon)
Verify standard compliant credentials based on popular formats (incl. custom attribute structures, types and schemas).
Protocols: OID4VP flows and ISO-18013-7• OID4VP drafts 14/20
• OID4VP v1
Interoperable OID4VP exchange across supported drafts using Presentation Definition. DCQL request syntax with OID4VP v1.
Digital Credentials API (coming soon)• Standard browser/agent API for verification
• Wraps OID4VP/ISO-18013-7 flows under the hood
• Enables 1-click web integrations, native UX prompts
Provide a standardized browser interface for wallets/agents so web apps can request credentials from users with minimal glue code. Improves DX/UX while relying on existing protocols behind the scenes.

ID Ecosystems

FeatureHighlightsDetails
EMEA• EU (eIDAS2, EBSI), Switzerland (SWIYU)Issuance aligned with (emerging) regional trust frameworks.
APAC• New Zealand (DISTF), Australia, Thailand, Japan, …Issuance aligned with (emerging) regional trust frameworks.
Americas• US, Canada, Brazil, …Issuance aligned with (emerging) regional trust frameworks.
Custom• Bring your own ID ecosystemThe verifier can be modified to comply with other ID ecosystems.

Integrations

FeatureHighlightsDetails
Trust Registries• eIDAS2
• EBSI
Integrates with various trust registries of different ID ecosystems (e.g eIDAS2)
QTSPs (coming soon)• signature/seal validationIntegrate with external QTSPs for qualified signature/seal validation.

Admin UI

FeatureHighlightsDetails
Enterprise Console (Admin GUI)• Configure different tenants/sub-tenants
• View metrics
• Manage your team / API keys
Use the Enterprise GUI to spin up tenants ,sub-tenants (B2B, B2B2C setups), and services. Set configs and track metrics per tenant and service.
Enterprise Console (Verifier GUI)• Configure different verifier services
• Monitor sessions and verification results
Use the Enterprise GUI to spin up verifier services, set configs, track verifications and their results (success or failure).

Logs & Analytics

FeatureHighlightsDetails
Metrics• Verification KPIs
• Tenant/service breakdowns
Observe verification volumes and success rates across tenants/services for ops and reporting.
Logs• Structured events / system logs
• Audit trails
• Export to SIEM
• Open Telemetry support
Emit structured logs/events for debugging and audit; export to external SIEM as needed.

Platform & Ops.

FeatureHighlightsDetails
Stateful API & Persistence• DB-backed sessions/configs
• Multi-instance safe
Persistence enables HA/scale-out; instances share state cleanly for reliable verification at scale.
Clustering & horizontal scaling• Multi-instance behind LB
• Stateless exchange layer + stateful DB
Run multiple Verifier instances concurrently behind a load balancer for throughput and resilience.
Data persistence layer• MongoDB (document DB)
• Durable storage of configs/events
Durable storage for requests, configs and events; fits high-volume verification patterns.
Encryption• DB level encryptionSetup encryption on the MongoDB database.
Enterprise CLI / Quickstart• CLI to explore features
• Docker-compose stack
Use the Enterprise Quickstart repo and CLI to bring the stack up locally (requires enterprise images).

Tenant & Configuration Model

FeatureHighlightsDetails
Hierarchical Multi-Tenancy• Orgs → tenants → sub-tenants
• Per-tenant services & isolation
• RBAC per scope
Model B2B/B2G/B2B2C at scale; keep data/services virtually separated and permissioned under one roof.
Multi-Config Verifier Services• Many verifier instances per tenant
• Types, formats per service
Configure multiple verifier services with distinct capabilities and exposure; ideal for separating regulated profiles or customers.

Wallet

Core

FeatureHighlightsDetails
Automatic holder binding and proof-of-key• PoP during issuance & presentation (OID4VCI/VP)
• DID/key ownership checks
• Protocol-compliant signing of VP / holder-binding JWTs
• Works across supported credential formats
Wallet performs proof-of-possession and holder binding automatically during receive/present flows, signing the right artefacts per OID4VCI/VP so Issuers/Verifiers can trust key control.
One-user-multi-wallet model• Flexible user↔wallet relationships;
• Supports multi-party wallet access, enabling parent/child or organizational wallets.
• Works across B2C/B2B/B2B2C setups via multi-tenancy.
• App-level auth & fine-grained permissions (no built-in end-user auth).
In the Enterprise Stack, the wallet doesn’t enforce a fixed user-to-wallet mapping. Applications can let a single user run multiple wallets or share wallets (e.g., parent-child), governed by app-level authentication/permissions and multi-tenant controls, with an admin UI for management.
Key Management (KMS-agnostic)• External KMS (AWS, Azure, Hashicorp, OCI, …)
• Asymmetric keys: ed25519, secp256r1/k1, RSA
• Rotation & versioning via KMS
• HSM boundary retained
• For PoCs keys can also be stored locally in the Enterprise Stack DB.
Delegates signing to external KMS so private keys never leave HSMs; supports mainstream curves/RSA, rotation, versioning and provider auth patterns (IAM, API keys). Raw keys possible for dev/PoC.
DIDs & Identifiers• did:web hosting & registry
• did:key / did:jwk / did:ebsi support
• DID store service integration
Create/host user DIDs (incl. did:web) and resolve via DID services. Use appropriate methods per format and trust model; manage DID docs in-stack via enterprise DID store service.

Credential Exchange

FeatureHighlightsDetails
Receiving credentials• Supports pre-authorized code (with optional TX-PIN)
• Full authorization code flow
Receive credentials via pre-auth or full auth OID4VCI flows; Pre-auth TX-PIN is supported.
Presenting credentials• Parse Presentation Definition
• Match credentials to constraints
• DCQL support
Wallet parses Presentation Definition and DCQL requests, matches stored credentials, and signs presentations send via OID4VP.

Auth & Permissions

FeatureHighlightsDetails
Protected APIs (AuthN/Z)• Fine-grained RBAC
• Scoped access tokens
• Tenant/service scoping
Enterprise Stack uses role-based access control and scoped identifiers to protect APIs at org/tenant/service boundaries.
Roles & Permissions (RBAC)• Roles per org/tenant/service
• Principle of least privilege
Assign granular roles for admins, integrators and operators;
API Keys (Server-to-Server)• For M2M access
• Assign roles for Fine-grained RBAC
Provision API credentials for backend integrations with scoping to services/tenants.
User Accounts• Admin GUI login
• Assign roles for Fine-grained RBAC
Operator accounts manage the Enterprise Stack via the GUI (e.g. service configs, check analytics, revoke credentials, …)

Standards

FeatureHighlightsDetails
Credentials: Support for all major credential standards• ISO 18013-5 mDL
• ISO/IEC 23220
• SD-JWT VC IETF
• W3C VC v1.1+
• W3C VC v2.0(coming soon)
Receive & present standard compliant credentials based on popular formats (incl. custom attribute structures, types and schemas).
Protocols: Support for all major exchange protocols standards• OID4VP drafts 14/20
• OID4VP v1
• OID4VCI Draft 11/13
• OID4VCI v1 (coming in Q4 25)
• 18013-7
Interoperable OID4VCI/VP exchange across supported drafts using Presentation Definition. DCQL request syntax is coming soon with OID4VP v1 support

ID Ecosystems

FeatureHighlightsDetails
EMEA• EU (eIDAS2, EBSI), Switzerland (SWIYU)Wallets aligned with (emerging) regional trust frameworks.
APAC• New Zealand (DISTF), Australia, Thailand, Japan, …Wallets aligned with (emerging) regional trust frameworks.
Americas• US, Canada, Brazil, …Wallets aligned with (emerging) regional trust frameworks.
Custom• Bring your own ID ecosystemThe wallet can be modified to comply with other ID ecosystems.

Integrations

FeatureHighlightsDetails
External KMS and diverse key types• Store private key material in external KMS provider (e.g. AWS, Azure, Hashicorp, Oracle)
• Use different key types (e.g. ed25519, secp256r1/k1, RSA)
Use external KMS for key custody and signing where desired;
Trust Registries• eIDAS2
• EBSI
Integrates with various trust registries of different ID ecosystems (e.g eIDAS2)
QTSPs (coming soon)• signature/seal creationIntegrate with external QTSPs for qualified signature/seal creation.

DID & Trust Anchors

FeatureHighlightsDetails
Host did:web documents• Serve did:web
• Automate doc updates
Publish/serve did:web documents for holder identification using a DID.
DID Document Storage• Persist DID documents for later referencePersist DIDs and their documents via the Enterprise Stack DID store service.

Admin UI

FeatureHighlightsDetails
Enterprise Console (Admin GUI)• Configure different tenants/sub-tenants
• View metrics
• Manage your team / API keys
Use the Enterprise GUI to spin up tenants ,sub-tenants (B2B, B2B2C setups), and services. Set configs and track metrics per tenant and service.
Enterprise Console (Wallet GUI)• Configure different wallet services
• View wallet contents
Use the Enterprise GUI to spin up wallet services and set configs.

Logs & Analytics

FeatureHighlightsDetails
Logs• Structured events / system logs
• Audit trails
• Export to SIEM
• Open Telemetry support
Emit structured logs/events for debugging and audit; export to external SIEM as needed.

Platform & Ops.

FeatureHighlightsDetails
Stateful API + Persistence• DB-backed wallets
• Multi-instance safe
Persistence enables HA/scale-out; instances share state cleanly for reliable issuance at scale.
Clustering & horizontal scaling• Multi-instance behind LB
• Stateless exchange layer + stateful DB
Run multiple Wallet instances concurrently behind a load balancer for throughput and resilience.
Data persistence layer• MongoDB (document DB)
• Durable storage of configs/events
Durable storage for wallet contents, configs and events; fits high-volume wallet exchange patterns.
Encryption• DB level encryptionSetup encryption on the MongoDB database.
Enterprise CLI / Quickstart• CLI to explore features<br

Tenant & Configuration Model

FeatureHighlightsDetails
Hierarchical Multi-Tenancy• Orgs → tenants → sub-tenants
• Per-tenant services & isolation
• RBAC per scope
Model B2B/B2G/B2B2C at scale; keep data/services virtually separated and permissioned under one roof.
Last updated on November 4, 2025