eIDAS - Bring Your Own Identity

“Every time an App or website asks us to create a new digital identity or to easily log on via a big platform, we have no idea what happens to our data in reality.” (EU Commission Sept 2020).

Much like the concept of bring-your-own-device transformed the workplace over the last decade, the EU’s “bring-your-own-identity” requirements for Services Providers will transform the way in which businesses, public services, consumers and citizens interact online.

A decentralized Identity Wallet

IndyKite as a whitelabel

An eIDAS ready ID Wallet enables citizens and users with a way of leveraging their preferred eID towards any Service requiring identification, verification, and/or authentication credentials. It also offers an overview, as well as control over, their identity attributes, including how and where they are shared, accessed, and leveraged.

An Identity Broker

Safe, private access

The keys to providing secure, safe and private interoperability across multiple services providers in a diverse landscape means central governments, large corporates, and NGOs will need a way to ‘broker’ their services with potentially multiple different Electronic Identities (eIDs), across multiple different locational and regulatory contexts, for multiple different types of users.

Identity wallet workflow

Digital Twin

IndyKite as an Identity Broker

IndyKite’s Identity Relationship Graph (™) provides businesses and organisations alike with a means of managing this flow. Sitting ‘underneath’ the ID Wallet - or in fact used as a whitelabelled ID Wallet - IndyKite’s decentralized identity model allows for:

End users to 'broker' their eIDs across a multitude of different Trusted Services Providers (TSPs) and Qualified Trusted Services Providers (QTSPs), with the services they leverage everyday.

Creation of Digital Twins for deeper contextual understanding of their digital attributes and context. With rich contextual data linked to one or more Digital Twins, services providers can enrich their offerings, while solving for web3 use cases in ePrivacy & Consent.

Do you want to learn more?

Talk to an identity expert.
Juan Bojaca
Trusted Onboarding and Verification

Onboarding and authentication

Bring your own identity provider or use IndyKite Authentication to securely onboard your customers.

Digital wallet

Identity Knowledge Graph

Accurately reflect your landscape of users, applications, machines and data types.

Trusted Authentication

Knowledge-Based Access Control

Advanced authorization driven by knowledge

Decentralized identity for Web 3.0

The premise of decentralized identity management is giving ownership and control of identity data to individuals and devices in IOT. Likewise the premise of Web 3.0 is about moving away from...

Read more

Identity orchestration for Web 3.0

We are more online than ever before, and more of our lives are online than ever before. Our personal and identity data is collected by practically every service or product we engage with...

Read more


Orchestration: privacy and consent in Web 3.0

David Mahdi talks us through the challenging landscape to unpack the opportunities in privacy and consent, with Sutton Maxwell bringing IndyKite's perspective.

Read more