Complete dictionary of EUDI Wallet and digital identity terminology. 136 terms covering everything from basic concepts to advanced technical specifications.
📚 Quick Navigation
Core Concepts7 terms
EUDI Wallet
European Digital Identity Wallet
A mobile app that allows EU citizens to store and share verified digital identity credentials across all 27 member states. Required by eIDAS 2.0 regulation, every EU country must provide at least one EUDI Wallet by December 2026.
Relying Party
Relying Party (Verifier)
Organization or service that accepts and verifies EUDI Wallet credentials. Examples: airlines for boarding, banks for account opening, hotels for check-in, government services for authentication.
PID
Person Identification Data
Core identity attributes in EUDI Wallet including name, birthdate, nationality, and unique identifier. PID is the foundational credential that other documents build upon.
eID Card
Electronic Identity Card
Physical identity card with embedded chip containing digital certificates. Used in many EU countries for activating EUDI Wallets and as basis for digital identity credentials.
Credential Issuer
Credential Issuer (Attester)
Authorized organization that creates and signs verifiable credentials for EUDI Wallets. Examples: government agencies (ID, driver license), universities (diplomas), employers (professional licenses).
Cross-Border Recognition
Cross-Border Credential Recognition
Fundamental eIDAS 2.0 principle: credentials issued by one EU member state must be recognized and accepted by all other member states. Enables EU-wide mobility with single digital wallet.
Attribute
Identity Attribute
Specific piece of information about a person (name, birthdate, address, nationality). EUDI Wallets store attributes as verifiable credentials and allow selective disclosure.
Technical Standards28 terms
ARF
Architecture Reference Framework
Technical specification (currently version 2.7.3) defining interoperability standards, security requirements, and common technical approaches for EUDI Wallet implementations across all EU member states.
Verifiable Credentials
W3C Verifiable Credentials
Cryptographically secure digital credentials that can be verified without contacting the issuer. Based on W3C standard. EUDI Wallets use verifiable credentials for storing identity documents, diplomas, licenses, and other official documents.
QEAA
Qualified Electronic Attestation of Attributes
Electronically signed statement about specific attributes issued by qualified trust service provider. Used in EUDI Wallets for official documents like diplomas, professional licenses, or healthcare credentials.
OpenID4VP
OpenID for Verifiable Presentations
Protocol standard used by EUDI Wallets to present credentials to relying parties. Enables interoperability across different wallet implementations and service providers.
OpenID4VCI
OpenID for Verifiable Credential Issuance
Protocol standard for issuing verifiable credentials to EUDI Wallets. Used by government agencies, universities, and other issuers to provide credentials to users.
mDOC
Mobile Document
ISO 18013-5 standard for mobile driving licenses, extended for EUDI Wallets. Defines secure storage and presentation of identity documents on mobile devices.
NFC
Near Field Communication
Short-range wireless technology used by EUDI Wallets to read eID cards during activation and to present credentials to readers. Enables tap-to-verify functionality.
DID
Decentralized Identifier
W3C standard for identifiers that don't require central registry. EUDI Wallets may use DIDs for privacy-preserving identification without revealing identity to third parties.
Attestation
Electronic Attestation
Digitally signed statement by authorized issuer confirming specific information is true. EUDI credentials are attestations about user attributes verified by government or qualified entities.
Wallet Instance
EUDI Wallet Instance
Single installation of EUDI Wallet on user device. A user may have multiple wallet instances (personal phone, work tablet) but typically uses one primary instance.
Local Storage
Local Device Storage
Storing EUDI Wallet credentials on user device rather than cloud. Provides offline access and enhanced privacy. Netherlands NL-wallet uses local-first architecture with optional cloud backup.
Cloud Storage
Cloud Credential Storage
Storing EUDI Wallet credentials in secure cloud infrastructure. Enables multi-device access and automatic backup. France Identité uses cloud-based architecture.
QR Code Verification
QR Code Credential Verification
Method for presenting EUDI credentials using QR code that relying party scans. Enables offline verification without internet connection. Used for driver license checks, age verification.
Offline Verification
Offline Credential Verification
Ability to verify EUDI credentials without internet connection. Important for scenarios like traffic stops, airport security, or areas with poor connectivity. Uses digital signatures and QR codes.
mDoc
Mobile Document
ISO 18013-5 standard for mobile driver licenses extended to other credentials. EUDI Wallets use mDoc format for driver licenses, national IDs, and other documents. Enables offline verification via NFC and Bluetooth.
ISO 18013-5
ISO/IEC 18013-5:2021
International standard for mobile driving licenses (mDL). Defines data model, security mechanisms, and presentation protocols. EUDI Wallets implement ISO 18013-5 for driver license credentials.
W3C Verifiable Credentials
World Wide Web Consortium Verifiable Credentials
W3C standard for cryptographically secure digital credentials. Defines data model for verifiable credentials and presentations. EUDI Wallets support W3C VC format alongside ISO mDoc.
JSON-LD
JavaScript Object Notation for Linked Data
W3C standard for encoding linked data using JSON. Used in W3C Verifiable Credentials to provide semantic interoperability. Enables credentials to be understood across different systems.
OAuth 2.0
Open Authorization 2.0
Authorization framework enabling third-party applications to obtain limited access to services. EUDI Wallets extend OAuth 2.0 with OpenID4VP for credential presentation.
OpenID Connect
OpenID Connect
Identity layer built on OAuth 2.0 enabling user authentication. Widely used for login and identity verification. EUDI Wallets extend OIDC with verifiable credential capabilities via OpenID4VP.
SAML
Security Assertion Markup Language
XML-based standard for exchanging authentication and authorization data. Used in enterprise single sign-on systems. EUDI Wallets can integrate with SAML-based systems for enterprise authentication.
JWT
JSON Web Token
Compact URL-safe token format for transmitting claims between parties. Used for authentication tokens and credential encoding. EUDI Wallets use JWT in various protocols.
SSO
Single Sign-On
Authentication allowing one login for multiple applications. Improves user experience and security. EUDI Wallets can provide SSO for government and enterprise services.
Backup and Recovery
Credential Backup and Recovery
Mechanisms for backing up and restoring wallet credentials. Critical for device loss or replacement. EUDI Wallets implement encrypted cloud backup.
Credential Schema
Verifiable Credential Schema
Definition of credential data structure and fields. Enables semantic interoperability. EUDI credentials follow standardized schemas.
JSON Schema
JSON Schema Validation
Vocabulary for annotating and validating JSON documents. Used for credential schema definitions. Ensures EUDI credential data integrity.
API Gateway
API Gateway Service
Entry point for API requests providing routing, authentication, rate limiting. Infrastructure component. EUDI Wallet backends use API gateways.
Microservices
Microservices Architecture
Architectural style structuring application as collection of small services. Enables scalability and resilience. Modern EUDI Wallet backends use microservices.
Regulations & Legal6 terms
eIDAS 2.0
Electronic Identification, Authentication and Trust Services Regulation 2.0
EU regulation (EU 2024/1183) establishing legal framework for digital identity in Europe. Requires all member states to provide EUDI Wallets by December 2026 and mandates acceptance by Very Large Online Platforms (VLOPs) by December 2027.
VLOP
Very Large Online Platform
Online platforms with over 45 million monthly active users in EU. VLOPs must accept EUDI Wallet credentials by December 2027 under eIDAS 2.0 regulation. Includes Amazon, Google, Facebook, Apple services.
GDPR
General Data Protection Regulation
EU data protection regulation (2016/679). All EUDI Wallet implementations must comply with GDPR including user consent, data minimization, and right to erasure.
PSD2
Payment Services Directive 2
EU regulation requiring strong customer authentication for online payments. EUDI Wallets provide PSD2-compliant authentication for banking and payment services.
Mandatory Acceptance
Mandatory Credential Acceptance
eIDAS 2.0 requirement: governments must accept EUDI Wallets by December 2026, VLOPs by December 2027, banks/financial services by December 2027. Non-compliance may result in penalties.
PSD2
Payment Services Directive 2
EU regulation for payment services requiring strong customer authentication. Impacts banking integrations. EUDI Wallets enable PSD2-compliant authentication.
Security41 terms
LoA
Level of Assurance
Measure of confidence in user authentication. eIDAS defines three levels: Low, Substantial, High. EUDI Wallets must provide High level of assurance for government and regulated services.
Biometric Authentication
Biometric Authentication
Authentication using biological characteristics like fingerprint, face recognition, or iris scan. EUDI Wallets support biometric authentication for secure access to credentials.
Backup and Recovery
Wallet Backup and Recovery
Mechanisms for restoring EUDI Wallet credentials if device is lost, stolen, or damaged. May use cloud backup (encrypted) or recovery codes. Implementation varies by country.
FIDO2
Fast Identity Online 2.0
Authentication standard using public key cryptography and biometrics. Enables passwordless authentication with security keys or device biometrics. EUDI Wallets may use FIDO2 for local device authentication.
WebAuthn
Web Authentication API
W3C standard for web-based authentication using public key cryptography. Part of FIDO2 specification. Enables passwordless login to websites using biometrics or security keys.
PKCE
Proof Key for Code Exchange
OAuth 2.0 security extension preventing authorization code interception attacks. Required for mobile and public client applications. EUDI Wallets use PKCE in OpenID4VCI flows.
PKI
Public Key Infrastructure
System for creating, managing, and revoking digital certificates and keys. Enables secure electronic transfer. EUDI Wallets rely on PKI for credential verification.
Certificate Authority
Certificate Authority
Trusted entity that issues digital certificates. Verifies identity before issuing certificates. EUDI ecosystem includes government CAs issuing credential certificates.
OCSP
Online Certificate Status Protocol
Protocol for checking certificate revocation status in real-time. Alternative to certificate revocation lists. Used in EUDI Wallet credential validity checking.
CRL
Certificate Revocation List
List of revoked certificates published by certificate authority. Downloaded periodically for offline revocation checking. Used alongside OCSP in EUDI Wallets.
TLS
Transport Layer Security
Cryptographic protocol for secure network communication. Successor to SSL. Used for all EUDI Wallet network communications.
mTLS
Mutual TLS
TLS with both client and server authentication. Provides stronger security than standard TLS. Used for EUDI Wallet backend communications.
HSTS
HTTP Strict Transport Security
Security policy forcing HTTPS connections. Prevents downgrade attacks and cookie hijacking. Required for EUDI Wallet web services.
CORS
Cross-Origin Resource Sharing
Security mechanism controlling cross-domain HTTP requests. Important for EUDI Wallet web applications. Must be configured correctly to prevent security issues.
CSP
Content Security Policy
Security standard preventing cross-site scripting and injection attacks. HTTP header defining allowed content sources. Required for EUDI Wallet web applications.
XSS
Cross-Site Scripting
Security vulnerability allowing attackers to inject malicious scripts. Major web application threat. EUDI Wallet applications must implement XSS prevention.
CSRF
Cross-Site Request Forgery
Attack forcing authenticated users to execute unwanted actions. Web application vulnerability. EUDI Wallet applications implement CSRF tokens for protection.
SQL Injection
SQL Injection Attack
Attack inserting malicious SQL code into queries. Common database security vulnerability. EUDI Wallet backend systems must use parameterized queries.
Rate Limiting
API Rate Limiting
Controlling API request frequency to prevent abuse. Security and performance measure. EUDI Wallet APIs implement rate limiting for credential issuance and verification.
DDoS
Distributed Denial of Service
Attack overwhelming systems with traffic from multiple sources. Availability threat. EUDI Wallet infrastructure implements DDoS protection.
Penetration Testing
Security Penetration Testing
Authorized simulated cyberattacks testing system security. Identifies vulnerabilities before attackers find them. EUDI Wallet implementations undergo regular penetration testing.
Vulnerability Assessment
Security Vulnerability Assessment
Systematic review identifying security weaknesses. Proactive security measure. EUDI Wallet systems undergo continuous vulnerability assessment.
Security Audit
Information Security Audit
Full evaluation of security controls and processes. Ensures compliance with security standards. EUDI Wallets require independent security audits.
SCA
Strong Customer Authentication
PSD2 requirement for two-factor authentication in payment transactions. Requires two of: knowledge, possession, inherence. EUDI Wallets provide SCA capabilities.
2FA
Two-Factor Authentication
Authentication using two different factors. More secure than password alone. EUDI Wallets use biometric plus PIN for 2FA.
MFA
Multi-Factor Authentication
Authentication requiring multiple verification factors. Includes 2FA and beyond. EUDI Wallets implement MFA for credential access.
Session Management
User Session Management
Controlling user sessions after authentication. Includes timeouts, renewal, and secure storage. Critical for EUDI Wallet security.
Session Timeout
Automatic Session Timeout
Automatically ending inactive user sessions. Security measure preventing unauthorized access. EUDI Wallets implement configurable session timeouts.
Secure Enclave
Secure Hardware Enclave
Hardware-isolated environment for cryptographic operations. Found in modern smartphones. EUDI Wallets store private keys in secure enclaves.
TEE
Trusted Execution Environment
Secure area in processor ensuring confidential code execution. Protects against software attacks. EUDI Wallets use TEE for credential operations.
HSM
Hardware Security Module
Physical device managing cryptographic keys and operations. Tamper-resistant hardware. EUDI credential issuers use HSMs for signing keys.
Key Rotation
Cryptographic Key Rotation
Periodically replacing cryptographic keys. Security best practice limiting key compromise impact. EUDI systems implement regular key rotation.
Device Binding
Credential Device Binding
Cryptographically binding credentials to specific device. Prevents credential theft and unauthorized transfer. EUDI Wallets use device-bound keys.
Key Attestation
Cryptographic Key Attestation
Proving cryptographic key properties and storage location. Verifies keys stored in secure hardware. Used in EUDI Wallet device binding.
Anti-Cloning
Credential Anti-Cloning Protection
Mechanisms preventing credential duplication across devices. Uses device binding and hardware attestation. Essential EUDI Wallet security feature.
Replay Attack
Credential Replay Attack
Attack reusing captured credentials for unauthorized access. Security threat. EUDI Wallets use nonces and timestamps for replay prevention.
Challenge-Response
Challenge-Response Authentication
Authentication protocol where server sends challenge and client provides cryptographic response. Proves key possession. Used in EUDI Wallet protocols.
Zero Trust
Zero Trust Security
Security model requiring verification for every access request regardless of location. Never trust, always verify. EUDI Wallet infrastructure implements zero trust.
Least Privilege
Principle of Least Privilege
Security principle granting minimum access necessary for function. Reduces attack surface. Applied throughout EUDI Wallet systems.
Defense in Depth
Defense in Depth Strategy
Security strategy using multiple layers of defense. If one layer fails, others still protect. EUDI Wallet security uses defense in depth.
Incident Response
Security Incident Response
Organized approach to handling security breaches and attacks. Includes detection, containment, recovery. EUDI Wallet operators maintain incident response plans.
Privacy14 terms
Selective Disclosure
Selective Attribute Disclosure
EUDI Wallet feature allowing users to share only specific attributes (like age or nationality) without revealing full identity document. For example, proving you are over 18 without showing your birthdate or full ID.
Data Minimization
Data Minimization Principle
GDPR principle requiring collection of only necessary data. EUDI Wallets implement data minimization through selective disclosure - sharing only required attributes, not full documents.
Consent Management
User Consent Management
System for managing user data sharing consent. GDPR requirement. EUDI Wallets provide explicit consent UI before credential sharing.
Data Minimization
Data Minimization Principle
GDPR principle limiting data collection to what is necessary. Core privacy concept. EUDI Wallets implement selective disclosure for data minimization.
Purpose Limitation
Purpose Limitation Principle
GDPR requirement that data collected for specific purposes not be reused for other purposes. Privacy protection. EUDI Wallet consent UI specifies data usage purpose.
Privacy by Design
Privacy by Design and Default
Approach integrating privacy throughout system design. GDPR requirement. EUDI Wallet architecture built with privacy by design principles.
DPIA
Data Protection Impact Assessment
GDPR requirement analyzing privacy risks of data processing. Required for high-risk processing. EUDI Wallet implementations must conduct DPIA.
DPO
Data Protection Officer
GDPR requirement for organizations processing sensitive data. Oversees data protection compliance. EUDI Wallet operators must appoint DPO.
Data Portability
Right to Data Portability
GDPR right to receive personal data in machine-readable format. Enables switching providers. EUDI Wallets support credential export.
Right to Erasure
Right to be Forgotten
GDPR right to have personal data deleted. Privacy protection. EUDI Wallets enable credential deletion and revocation.
Pseudonymization
Data Pseudonymization
Processing personal data so it cannot be attributed without additional information. GDPR security measure. EUDI Wallets use pseudonymous identifiers.
Anonymization
Data Anonymization
Irreversibly removing personal identifiers from data. Stronger than pseudonymization. Used in EUDI Wallet analytics and research.
Unlinkability
Transaction Unlinkability
Privacy property preventing correlation of user actions across different contexts. Prevents tracking. EUDI Wallets use unique identifiers per interaction.
Pairwise Identifier
Pairwise Pseudonymous Identifier
Unique identifier generated for each relying party relationship. Prevents cross-service tracking. EUDI Wallets generate pairwise DIDs.
National Systems7 terms
SPID
Sistema Pubblico di Identità Digitale
Italy national public digital identity system with 30+ million users. IT-Wallet integrates with SPID for authentication. Operational since 2016 with multiple certified identity providers.
DigiD
Digitale Identiteit
Netherlands digital authentication system operational since 2003. Over 13 million users. NL-wallet integrates with DigiD for identity verification and wallet activation.
FranceConnect
FranceConnect
France authentication system operational since 2016. France Identité EUDI Wallet builds on FranceConnect infrastructure providing smooth integration with existing government services.
Online-Ausweis
Online-Ausweis (eID)
Germany eID card online authentication function operational since 2010. Over 15 years of infrastructure experience. AusweisApp EUDI Wallet builds on this proven foundation.
itsme
itsme
Belgium widely-used digital identity app operated by Belgian Mobile ID consortium (banks and telecom companies). MyGov.be EUDI Wallet integrates with itsme for authentication.
mObywatel
mObywatel
Poland mobile citizen app. Version 2.0 currently live with millions of users (driver license, mDowód). Version 3.0 in development for full EUDI Wallet compliance by December 2026.
mDowód
mDowód
Poland mobile identity document integrated with mObywatel app. Digital equivalent to physical ID card with legal recognition for many use cases.
Organizations & Agencies4 terms
BSI
Bundesamt für Sicherheit in der Informationstechnik
German Federal Office for Information Security. Provides technical guidelines (TR-03127/128/130) for Germany AusweisApp EUDI Wallet implementation and security standards.
AGID
Agenzia per l'Italia Digitale
Italian Digital Agency responsible for IT-Wallet development. Successfully launched SPID (30M users), PagoPA payment platform, and App IO government services app.
ANSSI
Agence nationale de la sécurité des systèmes d'information
France national cybersecurity agency. Provides security oversight and standards for France Identité EUDI Wallet. French equivalent to Germany BSI.
Trust Service Provider
Qualified Trust Service Provider (QTSP)
Organization certified under eIDAS to provide trust services like qualified electronic signatures, seals, and timestamps. QTSPs can issue qualified attestations for EUDI Wallets.
Compliance5 terms
KYC
Know Your Customer
Regulatory requirement for businesses to verify customer identity. EUDI Wallets enable instant KYC compliance allowing 5-minute account opening instead of days of document verification.
ISO 27001
ISO/IEC 27001
International standard for information security management systems. Widely recognized certification. EUDI Wallet providers should achieve ISO 27001 certification.
ISMS
Information Security Management System
Systematic approach managing sensitive information security. Framework for policies, procedures, and controls. Required for ISO 27001 certification.
SOC 2
Service Organization Control 2
Audit report on security, availability, processing integrity, confidentiality, and privacy. US-based trust service criteria. Cloud providers hosting EUDI Wallet data should have SOC 2.
PCI DSS
Payment Card Industry Data Security Standard
Security standard for organizations handling credit cards. Mandatory for payment processors. Relevant when EUDI Wallets store payment credentials.
Cryptography13 terms
Zero-Knowledge Proof
Zero-Knowledge Proof
Cryptographic method allowing one party to prove statement is true without revealing information beyond the statement itself. Enables selective disclosure in EUDI Wallets.
JWS
JSON Web Signature
Standard for digitally signing JSON content. Provides integrity and authenticity verification. Used in EUDI Wallet credentials and tokens.
JWE
JSON Web Encryption
Standard for encrypting JSON content. Provides confidentiality for sensitive data. Used in EUDI Wallet secure communication.
JOSE
JavaScript Object Signing and Encryption
Family of standards for signing and encrypting JSON data. Includes JWT, JWS, JWE, JWK, JWA. Foundation for EUDI Wallet cryptographic operations.
JWK
JSON Web Key
JSON format for representing cryptographic keys. Enables key distribution and storage in JSON. Used in EUDI Wallet key management.
X.509
X.509 Certificate Standard
ITU-T standard for public key certificates. Widely used in TLS, email, code signing. EUDI Wallets use X.509 certificates for credential verification.
AES
Advanced Encryption Standard
Symmetric encryption algorithm adopted as US government standard. Used for encrypting data at rest and in transit. EUDI Wallets use AES-256 for credential encryption.
RSA
Rivest-Shamir-Adleman
Public key cryptosystem used for encryption and digital signatures. Widely deployed in TLS and digital certificates. Supported in EUDI Wallet cryptographic operations.
ECC
Elliptic Curve Cryptography
Public key cryptography using elliptic curves. Provides stronger security with smaller key sizes than RSA. Preferred for mobile devices and EUDI Wallets due to efficiency.
ECDSA
Elliptic Curve Digital Signature Algorithm
Digital signature algorithm using elliptic curve cryptography. More efficient than RSA signatures. Widely used in EUDI Wallet credential signing.
SHA-256
Secure Hash Algorithm 256-bit
Cryptographic hash function producing 256-bit digests. Used for data integrity verification and digital signatures. Standard hash algorithm in EUDI Wallets.
Hash Function
Cryptographic Hash Function
Mathematical function that converts data into fixed-size hash value. Used for integrity checking and digital signatures. SHA-256 commonly used in EUDI Wallets.
Nonce
Number Used Once
Random value used once in cryptographic protocols. Prevents replay attacks. EUDI Wallet presentations include nonces.
Deployment8 terms
Pilot Phase
EUDI Wallet Pilot Phase
Testing period where EUDI Wallet is available to limited user group before public launch. Allows countries to gather feedback and resolve issues. Example: Italy IT-Wallet active pilot.
Container
Application Container
Lightweight package containing application and dependencies. Enables consistent deployment. EUDI Wallet services deployed as containers.
Kubernetes
Kubernetes Container Orchestration
Platform for automating deployment, scaling, and management of containerized applications. Industry standard. EUDI Wallet infrastructure runs on Kubernetes.
Load Balancer
Application Load Balancer
Distributes network traffic across multiple servers. Provides high availability and scalability. EUDI Wallet services use load balancers.
CDN
Content Delivery Network
Distributed network of servers delivering content based on geographic location. Improves performance. EUDI Wallet web applications use CDN.
Disaster Recovery
Disaster Recovery Planning
Strategies for recovering IT infrastructure after disasters. Ensures business continuity. Critical for EUDI Wallet availability.
High Availability
High Availability Architecture
System design minimizing downtime through redundancy. Target of 99.9% or higher uptime. Required for EUDI Wallet services.
Failover
Automatic Failover
Automatically switching to backup system when primary fails. Ensures continuity. EUDI Wallet infrastructure implements automatic failover.
Need Help Understanding EUDI Wallets?
This glossary provides definitions for all key terms. For practical guides on using EUDI Wallets, check out our how-to section.