Telecommunications

Modernize subscriber verification and unlock new identity services for telecom

Impact on Telecommunications Operators

Telecommunications operators occupy a unique position in the eIDAS 2.0 landscape. They are both regulated entities subject to subscriber identification requirements and potential infrastructure partners in the wallet ecosystem. Several EU Member States already require identity verification for SIM card registration, and this trend is strengthening under updated EU security frameworks. The EUDIW provides a standardized, high-assurance mechanism for subscriber identification that replaces the current patchwork of in-store document checks and video verification processes.

The POTENTIAL Large-Scale Pilot specifically includes SIM registration as a core use case, demonstrating the direct relevance of wallet-based identity to telecoms. Beyond subscriber registration, the wallet opens opportunities for telecom operators to participate in the identity ecosystem as attribute providers or trust service facilitators, leveraging their existing infrastructure and customer relationships.

SIM Registration and Subscriber Verification

SIM card registration is one of the highest-volume identity verification processes in the telecom sector. Whether performed in-store, online, or through self-service kiosks, the process currently requires customers to present a physical identity document that is manually or semi-automatically verified. This process is costly, prone to errors, and creates friction that affects customer acquisition metrics. With the EUDIW, SIM registration becomes a wallet-based identity presentation: the customer approves the release of their PID, and the operator receives verified identity data instantly.

For online SIM activation and eSIM provisioning, the wallet eliminates the need for document upload and video verification steps that currently create significant abandonment. The wallet-based flow works consistently across all EU Member States, simplifying the process for operators serving cross-border customers or operating in multiple markets. Telecom operators should plan to accept wallet-based identity for new subscriber registration and, where applicable, for re-verification of existing subscribers under updated regulatory requirements.

Age Verification for Content and Services

Telecom operators that provide content services, app stores, or act as content intermediaries face increasing age verification requirements. The Digital Services Act (DSA) and national regulations impose obligations on platforms to verify user age for access to age-restricted content. The wallet's selective disclosure capability is particularly powerful for age verification: rather than collecting and storing a customer's full identity data just to check their age, operators can request a simple over-18 (or over-16, or other threshold) attestation from the wallet.

This approach dramatically reduces the data protection burden associated with age verification. No date of birth needs to be collected, stored, or processed. The wallet provides a cryptographically verified yes-or-no answer to the age question, satisfying regulatory requirements while respecting user privacy. For parental control services, the wallet could also enable verified parent-child account linking through attestation-based relationship verification, without the operator needing to collect and cross-reference family identity documents.

Network Access Authentication

Beyond subscriber registration, the EUDIW has potential implications for network access authentication. Wi-Fi access in public spaces, corporate guest networks, and carrier Wi-Fi offload scenarios all currently rely on various authentication mechanisms, from simple captive portals to RADIUS-based enterprise authentication. Wallet-based identity could provide a standardized, privacy-preserving authentication mechanism for network access, where users present a minimal credential from their wallet to gain access.

For enterprise telecom services, the wallet enables verified identity for corporate account management, authorized representative verification, and SLA-related identity requirements. Machine-to-machine identity, while not directly addressed by the EUDIW (which focuses on natural and legal persons), will evolve in the context of the broader eIDAS 2.0 trust framework. Telecom operators should monitor how organizational wallets and electronic seals develop under eIDAS 2.0, as these may be relevant for IoT and M2M identity in future regulatory phases.

Telecom as Identity Ecosystem Participant

Telecom operators have a strategic opportunity to participate in the eIDAS 2.0 ecosystem beyond their role as relying parties. Operators already maintain verified subscriber identity data, extensive authentication infrastructure, and secure SIM-based credential storage capabilities. These assets position telecoms as potential attribute providers (issuing attestations about subscriber identity or account status), trust service facilitators (leveraging SIM-based secure elements for credential storage), or even Qualified Trust Service Providers.

Several European telecom operators have already entered the trust services market, offering qualified electronic signatures and authentication services. eIDAS 2.0 expands the market for these services by creating demand for qualified attestations and wallet-compatible credential issuance. Operators should evaluate the commercial opportunity of offering identity services alongside connectivity, transforming from pure infrastructure providers into identity ecosystem participants. This requires investment in QTSP certification, credential issuance infrastructure, and integration with the EUDIW architecture.

Regulatory Compliance and Implementation

Telecom operators must navigate the intersection of eIDAS 2.0 with sector-specific regulation, including the European Electronic Communications Code (EECC), national SIM registration laws, and the Digital Services Act. The compliance strategy should begin with a regulatory mapping exercise that identifies all identity verification obligations across these frameworks and determines which can be satisfied through wallet-based verification.

Implementation priorities for telecoms include: wallet-based SIM registration for new subscribers, age verification for content services, and authenticated account management. Technical integration follows the same OpenID4VC protocol stack required for all relying parties, with credential verification supporting both SD-JWT and mdoc formats. Telecom operators operating in multiple Member States benefit significantly from the wallet's cross-border standardization, which replaces the need to support different national identity verification requirements in each market. Early engagement with the POTENTIAL pilot results is recommended for practical implementation guidance.

Key Requirements

Accept EUDIW for subscriber identity verification in SIM registration and activation
Implement wallet-based age verification for age-restricted content and services
Support OpenID4VC credential presentation protocols for wallet-based identity flows
Register as a relying party and declare attribute requirements for subscriber verification
Ensure compliance with both eIDAS 2.0 and European Electronic Communications Code obligations
Evaluate opportunities to participate as an attribute provider or trust service provider
Maintain audit trails of wallet-based subscriber verification transactions

Use Cases

Wallet-based SIM card registration replacing document upload and in-store verification

Wallet-based SIM card registration replacing document upload and in-store verification

eSIM remote provisioning with instant wallet-based identity verification

eSIM remote provisioning with instant wallet-based identity verification

Privacy-preserving age verification for content services using selective disclosure

Privacy-preserving age verification for content services using selective disclosure

Cross-border subscriber verification for roaming and multi-market operations

Cross-border subscriber verification for roaming and multi-market operations

Enterprise customer identity verification for corporate telecom contracts

Enterprise customer identity verification for corporate telecom contracts

Wallet-based authentication for Wi-Fi access and carrier network services

Wallet-based authentication for Wi-Fi access and carrier network services

Related industries

Related roles

Assess Your Industry Readiness

Take our free eIDAS 2.0 readiness assessment to understand how the regulation impacts your sector.

Free eIDAS 2.0 Readiness Assessment

Trusted by 2,000+ organisations
Take the Quick Check

Need help preparing for eIDAS 2.0?

eIDAS Readiness Help
Need help preparing for eIDAS 2.0? I can point you in the right direction.