EUDI Wallet Glossary

Last updated: 1/29/2026Reading time: 4 min

Complete dictionary of EUDI Wallet and digital identity terminology. 136 terms covering everything from basic concepts to advanced technical specifications.

Core Concepts7 terms

EUDI Wallet

European Digital Identity Wallet

A mobile app that allows EU citizens to store and share verified digital identity credentials across all 27 member states. Required by eIDAS 2.0 regulation, every EU country must provide at least one EUDI Wallet by December 2026.

Read full definition →

Relying Party

Relying Party (Verifier)

Organization or service that accepts and verifies EUDI Wallet credentials. Examples: airlines for boarding, banks for account opening, hotels for check-in, government services for authentication.

Read full definition →

PID

Person Identification Data

Core identity attributes in EUDI Wallet including name, birthdate, nationality, and unique identifier. PID is the foundational credential that other documents build upon.

Read full definition →

eID Card

Electronic Identity Card

Physical identity card with embedded chip containing digital certificates. Used in many EU countries for activating EUDI Wallets and as basis for digital identity credentials.

Read full definition →

Credential Issuer

Credential Issuer (Attester)

Authorized organization that creates and signs verifiable credentials for EUDI Wallets. Examples: government agencies (ID, driver license), universities (diplomas), employers (professional licenses).

Read full definition →

Cross-Border Recognition

Cross-Border Credential Recognition

Fundamental eIDAS 2.0 principle: credentials issued by one EU member state must be recognized and accepted by all other member states. Enables EU-wide mobility with single digital wallet.

Read full definition →

Attribute

Identity Attribute

Specific piece of information about a person (name, birthdate, address, nationality). EUDI Wallets store attributes as verifiable credentials and allow selective disclosure.

Read full definition →

Technical Standards28 terms

ARF

Architecture Reference Framework

Technical specification (currently version 2.7.3) defining interoperability standards, security requirements, and common technical approaches for EUDI Wallet implementations across all EU member states.

Read full definition →

Verifiable Credentials

W3C Verifiable Credentials

Cryptographically secure digital credentials that can be verified without contacting the issuer. Based on W3C standard. EUDI Wallets use verifiable credentials for storing identity documents, diplomas, licenses, and other official documents.

Read full definition →

QEAA

Qualified Electronic Attestation of Attributes

Electronically signed statement about specific attributes issued by qualified trust service provider. Used in EUDI Wallets for official documents like diplomas, professional licenses, or healthcare credentials.

Read full definition →

OpenID4VP

OpenID for Verifiable Presentations

Protocol standard used by EUDI Wallets to present credentials to relying parties. Enables interoperability across different wallet implementations and service providers.

Read full definition →

OpenID4VCI

OpenID for Verifiable Credential Issuance

Protocol standard for issuing verifiable credentials to EUDI Wallets. Used by government agencies, universities, and other issuers to provide credentials to users.

Read full definition →

mDOC

Mobile Document

ISO 18013-5 standard for mobile driving licenses, extended for EUDI Wallets. Defines secure storage and presentation of identity documents on mobile devices.

Read full definition →

NFC

Near Field Communication

Short-range wireless technology used by EUDI Wallets to read eID cards during activation and to present credentials to readers. Enables tap-to-verify functionality.

Read full definition →

DID

Decentralized Identifier

W3C standard for identifiers that don't require central registry. EUDI Wallets may use DIDs for privacy-preserving identification without revealing identity to third parties.

Read full definition →

Attestation

Electronic Attestation

Digitally signed statement by authorized issuer confirming specific information is true. EUDI credentials are attestations about user attributes verified by government or qualified entities.

Read full definition →

Wallet Instance

EUDI Wallet Instance

Single installation of EUDI Wallet on user device. A user may have multiple wallet instances (personal phone, work tablet) but typically uses one primary instance.

Read full definition →

Local Storage

Local Device Storage

Storing EUDI Wallet credentials on user device rather than cloud. Provides offline access and enhanced privacy. Netherlands NL-wallet uses local-first architecture with optional cloud backup.

Read full definition →

Cloud Storage

Cloud Credential Storage

Storing EUDI Wallet credentials in secure cloud infrastructure. Enables multi-device access and automatic backup. France Identité uses cloud-based architecture.

Read full definition →

QR Code Verification

QR Code Credential Verification

Method for presenting EUDI credentials using QR code that relying party scans. Enables offline verification without internet connection. Used for driver license checks, age verification.

Read full definition →

Offline Verification

Offline Credential Verification

Ability to verify EUDI credentials without internet connection. Important for scenarios like traffic stops, airport security, or areas with poor connectivity. Uses digital signatures and QR codes.

Read full definition →

mDoc

Mobile Document

ISO 18013-5 standard for mobile driver licenses extended to other credentials. EUDI Wallets use mDoc format for driver licenses, national IDs, and other documents. Enables offline verification via NFC and Bluetooth.

Read full definition →

ISO 18013-5

ISO/IEC 18013-5:2021

International standard for mobile driving licenses (mDL). Defines data model, security mechanisms, and presentation protocols. EUDI Wallets implement ISO 18013-5 for driver license credentials.

Read full definition →

W3C Verifiable Credentials

World Wide Web Consortium Verifiable Credentials

W3C standard for cryptographically secure digital credentials. Defines data model for verifiable credentials and presentations. EUDI Wallets support W3C VC format alongside ISO mDoc.

Read full definition →

JSON-LD

JavaScript Object Notation for Linked Data

W3C standard for encoding linked data using JSON. Used in W3C Verifiable Credentials to provide semantic interoperability. Enables credentials to be understood across different systems.

Read full definition →

OAuth 2.0

Open Authorization 2.0

Authorization framework enabling third-party applications to obtain limited access to services. EUDI Wallets extend OAuth 2.0 with OpenID4VP for credential presentation.

Read full definition →

OpenID Connect

OpenID Connect

Identity layer built on OAuth 2.0 enabling user authentication. Widely used for login and identity verification. EUDI Wallets extend OIDC with verifiable credential capabilities via OpenID4VP.

Read full definition →

SAML

Security Assertion Markup Language

XML-based standard for exchanging authentication and authorization data. Used in enterprise single sign-on systems. EUDI Wallets can integrate with SAML-based systems for enterprise authentication.

Read full definition →

JWT

JSON Web Token

Compact URL-safe token format for transmitting claims between parties. Used for authentication tokens and credential encoding. EUDI Wallets use JWT in various protocols.

Read full definition →

SSO

Single Sign-On

Authentication allowing one login for multiple applications. Improves user experience and security. EUDI Wallets can provide SSO for government and enterprise services.

Read full definition →

Backup and Recovery

Credential Backup and Recovery

Mechanisms for backing up and restoring wallet credentials. Critical for device loss or replacement. EUDI Wallets implement encrypted cloud backup.

Read full definition →

Credential Schema

Verifiable Credential Schema

Definition of credential data structure and fields. Enables semantic interoperability. EUDI credentials follow standardized schemas.

Read full definition →

JSON Schema

JSON Schema Validation

Vocabulary for annotating and validating JSON documents. Used for credential schema definitions. Ensures EUDI credential data integrity.

Read full definition →

API Gateway

API Gateway Service

Entry point for API requests providing routing, authentication, rate limiting. Infrastructure component. EUDI Wallet backends use API gateways.

Read full definition →

Microservices

Microservices Architecture

Architectural style structuring application as collection of small services. Enables scalability and resilience. Modern EUDI Wallet backends use microservices.

Read full definition →

Regulations & Legal6 terms

eIDAS 2.0

Electronic Identification, Authentication and Trust Services Regulation 2.0

EU regulation (EU 2024/1183) establishing legal framework for digital identity in Europe. Requires all member states to provide EUDI Wallets by December 2026 and mandates acceptance by Very Large Online Platforms (VLOPs) by December 2027.

Read full definition →

VLOP

Very Large Online Platform

Online platforms with over 45 million monthly active users in EU. VLOPs must accept EUDI Wallet credentials by December 2027 under eIDAS 2.0 regulation. Includes Amazon, Google, Facebook, Apple services.

Read full definition →

GDPR

General Data Protection Regulation

EU data protection regulation (2016/679). All EUDI Wallet implementations must comply with GDPR including user consent, data minimization, and right to erasure.

Read full definition →

PSD2

Payment Services Directive 2

EU regulation requiring strong customer authentication for online payments. EUDI Wallets provide PSD2-compliant authentication for banking and payment services.

Read full definition →

Mandatory Acceptance

Mandatory Credential Acceptance

eIDAS 2.0 requirement: governments must accept EUDI Wallets by December 2026, VLOPs by December 2027, banks/financial services by December 2027. Non-compliance may result in penalties.

Read full definition →

PSD2

Payment Services Directive 2

EU regulation for payment services requiring strong customer authentication. Impacts banking integrations. EUDI Wallets enable PSD2-compliant authentication.

Read full definition →

Security41 terms

LoA

Level of Assurance

Measure of confidence in user authentication. eIDAS defines three levels: Low, Substantial, High. EUDI Wallets must provide High level of assurance for government and regulated services.

Read full definition →

Biometric Authentication

Biometric Authentication

Authentication using biological characteristics like fingerprint, face recognition, or iris scan. EUDI Wallets support biometric authentication for secure access to credentials.

Read full definition →

Backup and Recovery

Wallet Backup and Recovery

Mechanisms for restoring EUDI Wallet credentials if device is lost, stolen, or damaged. May use cloud backup (encrypted) or recovery codes. Implementation varies by country.

Read full definition →

FIDO2

Fast Identity Online 2.0

Authentication standard using public key cryptography and biometrics. Enables passwordless authentication with security keys or device biometrics. EUDI Wallets may use FIDO2 for local device authentication.

Read full definition →

WebAuthn

Web Authentication API

W3C standard for web-based authentication using public key cryptography. Part of FIDO2 specification. Enables passwordless login to websites using biometrics or security keys.

Read full definition →

PKCE

Proof Key for Code Exchange

OAuth 2.0 security extension preventing authorization code interception attacks. Required for mobile and public client applications. EUDI Wallets use PKCE in OpenID4VCI flows.

Read full definition →

PKI

Public Key Infrastructure

System for creating, managing, and revoking digital certificates and keys. Enables secure electronic transfer. EUDI Wallets rely on PKI for credential verification.

Read full definition →

Certificate Authority

Certificate Authority

Trusted entity that issues digital certificates. Verifies identity before issuing certificates. EUDI ecosystem includes government CAs issuing credential certificates.

Read full definition →

OCSP

Online Certificate Status Protocol

Protocol for checking certificate revocation status in real-time. Alternative to certificate revocation lists. Used in EUDI Wallet credential validity checking.

Read full definition →

CRL

Certificate Revocation List

List of revoked certificates published by certificate authority. Downloaded periodically for offline revocation checking. Used alongside OCSP in EUDI Wallets.

Read full definition →

TLS

Transport Layer Security

Cryptographic protocol for secure network communication. Successor to SSL. Used for all EUDI Wallet network communications.

Read full definition →

mTLS

Mutual TLS

TLS with both client and server authentication. Provides stronger security than standard TLS. Used for EUDI Wallet backend communications.

Read full definition →

HSTS

HTTP Strict Transport Security

Security policy forcing HTTPS connections. Prevents downgrade attacks and cookie hijacking. Required for EUDI Wallet web services.

Read full definition →

CORS

Cross-Origin Resource Sharing

Security mechanism controlling cross-domain HTTP requests. Important for EUDI Wallet web applications. Must be configured correctly to prevent security issues.

Read full definition →

CSP

Content Security Policy

Security standard preventing cross-site scripting and injection attacks. HTTP header defining allowed content sources. Required for EUDI Wallet web applications.

Read full definition →

XSS

Cross-Site Scripting

Security vulnerability allowing attackers to inject malicious scripts. Major web application threat. EUDI Wallet applications must implement XSS prevention.

Read full definition →

CSRF

Cross-Site Request Forgery

Attack forcing authenticated users to execute unwanted actions. Web application vulnerability. EUDI Wallet applications implement CSRF tokens for protection.

Read full definition →

SQL Injection

SQL Injection Attack

Attack inserting malicious SQL code into queries. Common database security vulnerability. EUDI Wallet backend systems must use parameterized queries.

Read full definition →

Rate Limiting

API Rate Limiting

Controlling API request frequency to prevent abuse. Security and performance measure. EUDI Wallet APIs implement rate limiting for credential issuance and verification.

Read full definition →

DDoS

Distributed Denial of Service

Attack overwhelming systems with traffic from multiple sources. Availability threat. EUDI Wallet infrastructure implements DDoS protection.

Read full definition →

Penetration Testing

Security Penetration Testing

Authorized simulated cyberattacks testing system security. Identifies vulnerabilities before attackers find them. EUDI Wallet implementations undergo regular penetration testing.

Read full definition →

Vulnerability Assessment

Security Vulnerability Assessment

Systematic review identifying security weaknesses. Proactive security measure. EUDI Wallet systems undergo continuous vulnerability assessment.

Read full definition →

Security Audit

Information Security Audit

Full evaluation of security controls and processes. Ensures compliance with security standards. EUDI Wallets require independent security audits.

Read full definition →

SCA

Strong Customer Authentication

PSD2 requirement for two-factor authentication in payment transactions. Requires two of: knowledge, possession, inherence. EUDI Wallets provide SCA capabilities.

Read full definition →

2FA

Two-Factor Authentication

Authentication using two different factors. More secure than password alone. EUDI Wallets use biometric plus PIN for 2FA.

Read full definition →

MFA

Multi-Factor Authentication

Authentication requiring multiple verification factors. Includes 2FA and beyond. EUDI Wallets implement MFA for credential access.

Read full definition →

Session Management

User Session Management

Controlling user sessions after authentication. Includes timeouts, renewal, and secure storage. Critical for EUDI Wallet security.

Read full definition →

Session Timeout

Automatic Session Timeout

Automatically ending inactive user sessions. Security measure preventing unauthorized access. EUDI Wallets implement configurable session timeouts.

Read full definition →

Secure Enclave

Secure Hardware Enclave

Hardware-isolated environment for cryptographic operations. Found in modern smartphones. EUDI Wallets store private keys in secure enclaves.

Read full definition →

TEE

Trusted Execution Environment

Secure area in processor ensuring confidential code execution. Protects against software attacks. EUDI Wallets use TEE for credential operations.

Read full definition →

HSM

Hardware Security Module

Physical device managing cryptographic keys and operations. Tamper-resistant hardware. EUDI credential issuers use HSMs for signing keys.

Read full definition →

Key Rotation

Cryptographic Key Rotation

Periodically replacing cryptographic keys. Security best practice limiting key compromise impact. EUDI systems implement regular key rotation.

Read full definition →

Device Binding

Credential Device Binding

Cryptographically binding credentials to specific device. Prevents credential theft and unauthorized transfer. EUDI Wallets use device-bound keys.

Read full definition →

Key Attestation

Cryptographic Key Attestation

Proving cryptographic key properties and storage location. Verifies keys stored in secure hardware. Used in EUDI Wallet device binding.

Read full definition →

Anti-Cloning

Credential Anti-Cloning Protection

Mechanisms preventing credential duplication across devices. Uses device binding and hardware attestation. Essential EUDI Wallet security feature.

Read full definition →

Replay Attack

Credential Replay Attack

Attack reusing captured credentials for unauthorized access. Security threat. EUDI Wallets use nonces and timestamps for replay prevention.

Read full definition →

Challenge-Response

Challenge-Response Authentication

Authentication protocol where server sends challenge and client provides cryptographic response. Proves key possession. Used in EUDI Wallet protocols.

Read full definition →

Zero Trust

Zero Trust Security

Security model requiring verification for every access request regardless of location. Never trust, always verify. EUDI Wallet infrastructure implements zero trust.

Read full definition →

Least Privilege

Principle of Least Privilege

Security principle granting minimum access necessary for function. Reduces attack surface. Applied throughout EUDI Wallet systems.

Read full definition →

Defense in Depth

Defense in Depth Strategy

Security strategy using multiple layers of defense. If one layer fails, others still protect. EUDI Wallet security uses defense in depth.

Read full definition →

Incident Response

Security Incident Response

Organized approach to handling security breaches and attacks. Includes detection, containment, recovery. EUDI Wallet operators maintain incident response plans.

Read full definition →

Privacy14 terms

Selective Disclosure

Selective Attribute Disclosure

EUDI Wallet feature allowing users to share only specific attributes (like age or nationality) without revealing full identity document. For example, proving you are over 18 without showing your birthdate or full ID.

Read full definition →

Data Minimization

Data Minimization Principle

GDPR principle requiring collection of only necessary data. EUDI Wallets implement data minimization through selective disclosure - sharing only required attributes, not full documents.

Read full definition →

Consent Management

User Consent Management

System for managing user data sharing consent. GDPR requirement. EUDI Wallets provide explicit consent UI before credential sharing.

Read full definition →

Data Minimization

Data Minimization Principle

GDPR principle limiting data collection to what is necessary. Core privacy concept. EUDI Wallets implement selective disclosure for data minimization.

Read full definition →

Purpose Limitation

Purpose Limitation Principle

GDPR requirement that data collected for specific purposes not be reused for other purposes. Privacy protection. EUDI Wallet consent UI specifies data usage purpose.

Read full definition →

Privacy by Design

Privacy by Design and Default

Approach integrating privacy throughout system design. GDPR requirement. EUDI Wallet architecture built with privacy by design principles.

Read full definition →

DPIA

Data Protection Impact Assessment

GDPR requirement analyzing privacy risks of data processing. Required for high-risk processing. EUDI Wallet implementations must conduct DPIA.

Read full definition →

DPO

Data Protection Officer

GDPR requirement for organizations processing sensitive data. Oversees data protection compliance. EUDI Wallet operators must appoint DPO.

Read full definition →

Data Portability

Right to Data Portability

GDPR right to receive personal data in machine-readable format. Enables switching providers. EUDI Wallets support credential export.

Read full definition →

Right to Erasure

Right to be Forgotten

GDPR right to have personal data deleted. Privacy protection. EUDI Wallets enable credential deletion and revocation.

Read full definition →

Pseudonymization

Data Pseudonymization

Processing personal data so it cannot be attributed without additional information. GDPR security measure. EUDI Wallets use pseudonymous identifiers.

Read full definition →

Anonymization

Data Anonymization

Irreversibly removing personal identifiers from data. Stronger than pseudonymization. Used in EUDI Wallet analytics and research.

Read full definition →

Unlinkability

Transaction Unlinkability

Privacy property preventing correlation of user actions across different contexts. Prevents tracking. EUDI Wallets use unique identifiers per interaction.

Read full definition →

Pairwise Identifier

Pairwise Pseudonymous Identifier

Unique identifier generated for each relying party relationship. Prevents cross-service tracking. EUDI Wallets generate pairwise DIDs.

Read full definition →

National Systems7 terms

SPID

Sistema Pubblico di Identità Digitale

IT

Italy national public digital identity system with 30+ million users. IT-Wallet integrates with SPID for authentication. Operational since 2016 with multiple certified identity providers.

Read full definition →

DigiD

Digitale Identiteit

NL

Netherlands digital authentication system operational since 2003. Over 13 million users. NL-wallet integrates with DigiD for identity verification and wallet activation.

Read full definition →

FranceConnect

FranceConnect

FR

France authentication system operational since 2016. France Identité EUDI Wallet builds on FranceConnect infrastructure providing smooth integration with existing government services.

Read full definition →

Online-Ausweis

Online-Ausweis (eID)

DE

Germany eID card online authentication function operational since 2010. Over 15 years of infrastructure experience. AusweisApp EUDI Wallet builds on this proven foundation.

Read full definition →

itsme

itsme

BE

Belgium widely-used digital identity app operated by Belgian Mobile ID consortium (banks and telecom companies). MyGov.be EUDI Wallet integrates with itsme for authentication.

Read full definition →

mObywatel

mObywatel

PL

Poland mobile citizen app. Version 2.0 currently live with millions of users (driver license, mDowód). Version 3.0 in development for full EUDI Wallet compliance by December 2026.

Read full definition →

mDowód

mDowód

PL

Poland mobile identity document integrated with mObywatel app. Digital equivalent to physical ID card with legal recognition for many use cases.

Read full definition →

Cryptography13 terms

Zero-Knowledge Proof

Zero-Knowledge Proof

Cryptographic method allowing one party to prove statement is true without revealing information beyond the statement itself. Enables selective disclosure in EUDI Wallets.

Read full definition →

JWS

JSON Web Signature

Standard for digitally signing JSON content. Provides integrity and authenticity verification. Used in EUDI Wallet credentials and tokens.

Read full definition →

JWE

JSON Web Encryption

Standard for encrypting JSON content. Provides confidentiality for sensitive data. Used in EUDI Wallet secure communication.

Read full definition →

JOSE

JavaScript Object Signing and Encryption

Family of standards for signing and encrypting JSON data. Includes JWT, JWS, JWE, JWK, JWA. Foundation for EUDI Wallet cryptographic operations.

Read full definition →

JWK

JSON Web Key

JSON format for representing cryptographic keys. Enables key distribution and storage in JSON. Used in EUDI Wallet key management.

Read full definition →

X.509

X.509 Certificate Standard

ITU-T standard for public key certificates. Widely used in TLS, email, code signing. EUDI Wallets use X.509 certificates for credential verification.

Read full definition →

AES

Advanced Encryption Standard

Symmetric encryption algorithm adopted as US government standard. Used for encrypting data at rest and in transit. EUDI Wallets use AES-256 for credential encryption.

Read full definition →

RSA

Rivest-Shamir-Adleman

Public key cryptosystem used for encryption and digital signatures. Widely deployed in TLS and digital certificates. Supported in EUDI Wallet cryptographic operations.

Read full definition →

ECC

Elliptic Curve Cryptography

Public key cryptography using elliptic curves. Provides stronger security with smaller key sizes than RSA. Preferred for mobile devices and EUDI Wallets due to efficiency.

Read full definition →

ECDSA

Elliptic Curve Digital Signature Algorithm

Digital signature algorithm using elliptic curve cryptography. More efficient than RSA signatures. Widely used in EUDI Wallet credential signing.

Read full definition →

SHA-256

Secure Hash Algorithm 256-bit

Cryptographic hash function producing 256-bit digests. Used for data integrity verification and digital signatures. Standard hash algorithm in EUDI Wallets.

Read full definition →

Hash Function

Cryptographic Hash Function

Mathematical function that converts data into fixed-size hash value. Used for integrity checking and digital signatures. SHA-256 commonly used in EUDI Wallets.

Read full definition →

Nonce

Number Used Once

Random value used once in cryptographic protocols. Prevents replay attacks. EUDI Wallet presentations include nonces.

Read full definition →

Deployment8 terms

Pilot Phase

EUDI Wallet Pilot Phase

Testing period where EUDI Wallet is available to limited user group before public launch. Allows countries to gather feedback and resolve issues. Example: Italy IT-Wallet active pilot.

Read full definition →

Container

Application Container

Lightweight package containing application and dependencies. Enables consistent deployment. EUDI Wallet services deployed as containers.

Read full definition →

Kubernetes

Kubernetes Container Orchestration

Platform for automating deployment, scaling, and management of containerized applications. Industry standard. EUDI Wallet infrastructure runs on Kubernetes.

Read full definition →

Load Balancer

Application Load Balancer

Distributes network traffic across multiple servers. Provides high availability and scalability. EUDI Wallet services use load balancers.

Read full definition →

CDN

Content Delivery Network

Distributed network of servers delivering content based on geographic location. Improves performance. EUDI Wallet web applications use CDN.

Read full definition →

Disaster Recovery

Disaster Recovery Planning

Strategies for recovering IT infrastructure after disasters. Ensures business continuity. Critical for EUDI Wallet availability.

Read full definition →

High Availability

High Availability Architecture

System design minimizing downtime through redundancy. Target of 99.9% or higher uptime. Required for EUDI Wallet services.

Read full definition →

Failover

Automatic Failover

Automatically switching to backup system when primary fails. Ensures continuity. EUDI Wallet infrastructure implements automatic failover.

Read full definition →

Need Help Understanding EUDI Wallets?

This glossary provides definitions for all key terms. For practical guides on using EUDI Wallets, check out our how-to section.

Frequently Asked Questions

Verwandte Leitfäden

Quellen

Informationen anhand offizieller Quellen verifiziert (2/16/2026)

  1. [1]eIDAS 2.0 Regulation
  2. [2]Architecture Reference Framework
  3. [3]W3C Verifiable Credentials

⚠️ Independent Information

This website is NOT affiliated with the European Commission or any EU government. We provide independent, easy-to-understand information about EUDI.

For official information, visit: