Telecommunications
Modernize subscriber verification and unlock new identity services for telecom
Impact on Telecommunications Operators
Telecommunications operators occupy a unique position in the eIDAS 2.0 landscape. They are both regulated entities subject to subscriber identification requirements and potential infrastructure partners in the wallet ecosystem. Several EU Member States already require identity verification for SIM card registration, and this trend is strengthening under updated EU security frameworks. The EUDIW provides a standardized, high-assurance mechanism for subscriber identification that replaces the current patchwork of in-store document checks and video verification processes.
The POTENTIAL Large-Scale Pilot specifically includes SIM registration as a core use case, demonstrating the direct relevance of wallet-based identity to telecoms. Beyond subscriber registration, the wallet opens opportunities for telecom operators to participate in the identity ecosystem as attribute providers or trust service facilitators, leveraging their existing infrastructure and customer relationships.
SIM Registration and Subscriber Verification
SIM card registration is one of the highest-volume identity verification processes in the telecom sector. Whether performed in-store, online, or through self-service kiosks, the process currently requires customers to present a physical identity document that is manually or semi-automatically verified. This process is costly, prone to errors, and creates friction that affects customer acquisition metrics. With the EUDIW, SIM registration becomes a wallet-based identity presentation: the customer approves the release of their PID, and the operator receives verified identity data instantly.
For online SIM activation and eSIM provisioning, the wallet eliminates the need for document upload and video verification steps that currently create significant abandonment. The wallet-based flow works consistently across all EU Member States, simplifying the process for operators serving cross-border customers or operating in multiple markets. Telecom operators should plan to accept wallet-based identity for new subscriber registration and, where applicable, for re-verification of existing subscribers under updated regulatory requirements.
Age Verification for Content and Services
Telecom operators that provide content services, app stores, or act as content intermediaries face increasing age verification requirements. The Digital Services Act (DSA) and national regulations impose obligations on platforms to verify user age for access to age-restricted content. The wallet's selective disclosure capability is particularly powerful for age verification: rather than collecting and storing a customer's full identity data just to check their age, operators can request a simple over-18 (or over-16, or other threshold) attestation from the wallet.
This approach dramatically reduces the data protection burden associated with age verification. No date of birth needs to be collected, stored, or processed. The wallet provides a cryptographically verified yes-or-no answer to the age question, satisfying regulatory requirements while respecting user privacy. For parental control services, the wallet could also enable verified parent-child account linking through attestation-based relationship verification, without the operator needing to collect and cross-reference family identity documents.
Network Access Authentication
Beyond subscriber registration, the EUDIW has potential implications for network access authentication. Wi-Fi access in public spaces, corporate guest networks, and carrier Wi-Fi offload scenarios all currently rely on various authentication mechanisms, from simple captive portals to RADIUS-based enterprise authentication. Wallet-based identity could provide a standardized, privacy-preserving authentication mechanism for network access, where users present a minimal credential from their wallet to gain access.
For enterprise telecom services, the wallet enables verified identity for corporate account management, authorized representative verification, and SLA-related identity requirements. Machine-to-machine identity, while not directly addressed by the EUDIW (which focuses on natural and legal persons), will evolve in the context of the broader eIDAS 2.0 trust framework. Telecom operators should monitor how organizational wallets and electronic seals develop under eIDAS 2.0, as these may be relevant for IoT and M2M identity in future regulatory phases.
Telecom as Identity Ecosystem Participant
Telecom operators have a strategic opportunity to participate in the eIDAS 2.0 ecosystem beyond their role as relying parties. Operators already maintain verified subscriber identity data, extensive authentication infrastructure, and secure SIM-based credential storage capabilities. These assets position telecoms as potential attribute providers (issuing attestations about subscriber identity or account status), trust service facilitators (leveraging SIM-based secure elements for credential storage), or even Qualified Trust Service Providers.
Several European telecom operators have already entered the trust services market, offering qualified electronic signatures and authentication services. eIDAS 2.0 expands the market for these services by creating demand for qualified attestations and wallet-compatible credential issuance. Operators should evaluate the commercial opportunity of offering identity services alongside connectivity, transforming from pure infrastructure providers into identity ecosystem participants. This requires investment in QTSP certification, credential issuance infrastructure, and integration with the EUDIW architecture.
Regulatory Compliance and Implementation
Telecom operators must navigate the intersection of eIDAS 2.0 with sector-specific regulation, including the European Electronic Communications Code (EECC), national SIM registration laws, and the Digital Services Act. The compliance strategy should begin with a regulatory mapping exercise that identifies all identity verification obligations across these frameworks and determines which can be satisfied through wallet-based verification.
Implementation priorities for telecoms include: wallet-based SIM registration for new subscribers, age verification for content services, and authenticated account management. Technical integration follows the same OpenID4VC protocol stack required for all relying parties, with credential verification supporting both SD-JWT and mdoc formats. Telecom operators operating in multiple Member States benefit significantly from the wallet's cross-border standardization, which replaces the need to support different national identity verification requirements in each market. Early engagement with the POTENTIAL pilot results is recommended for practical implementation guidance.
Key Requirements
Use Cases
Wallet-based SIM card registration replacing document upload and in-store verification
eSIM remote provisioning with instant wallet-based identity verification
Privacy-preserving age verification for content services using selective disclosure
Cross-border subscriber verification for roaming and multi-market operations
Enterprise customer identity verification for corporate telecom contracts
Wallet-based authentication for Wi-Fi access and carrier network services
Related industries
Financial Services
How eIDAS 2.0 and the European Digital Identity Wallet transform customer onboarding, authentication, and regulatory compliance for banks, payment providers, and fintechs.
Healthcare
How eIDAS 2.0 and the European Digital Identity Wallet impact patient identification, health attestations, cross-border healthcare access, and electronic health record management.
Government and Public Sector
How eIDAS 2.0 mandates wallet acceptance for public services, requiring government agencies to transform citizen authentication, cross-border service delivery, and digital government infrastructure.
E-commerce and Online Platforms
How eIDAS 2.0 impacts online platforms and marketplaces through age verification mandates, seller identity checks, consumer protection, and platform transparency requirements.
Travel and Transport
How eIDAS 2.0 transforms travel and transport through digital travel credentials, mobile driving licences, streamlined hotel check-in, car rental verification, and cross-border travel simplification.
Related roles
CTOs and Technical Leaders
How eIDAS 2.0 transforms the technical landscape for CTOs, VPs of Engineering, and technical architects responsible for identity infrastructure.
Compliance Officers
How eIDAS 2.0 creates new regulatory obligations for compliance officers managing identity verification, data protection, and relying party requirements.
Product Managers
How eIDAS 2.0 and the European Digital Identity Wallet create new product opportunities and require changes to user onboarding, verification, and authentication flows.
Legal Teams
How eIDAS 2.0 changes the legal landscape for organizations, including liability frameworks, data protection obligations, and contractual considerations for wallet integration.
Assess Your Industry Readiness
Take our free eIDAS 2.0 readiness assessment to understand how the regulation impacts your sector.