CTOs and Technical Leaders

Lead your organization's technical transformation for the EU Digital Identity era

Why eIDAS 2.0 Matters for CTOs

eIDAS 2.0 is not a minor regulatory update. It is a structural shift in how digital identity works across the European Union. For CTOs and technical leaders, this regulation creates new technical obligations that reach deep into your authentication stack, your onboarding flows, and your data verification pipelines. The European Digital Identity Wallet (EUDIW) will become the primary way EU citizens prove their identity online, and organizations in mandatory acceptance categories, including banks, large online platforms, and public services, must integrate with it.

The regulation also redefines how trust is established between systems. Rather than relying solely on federated identity providers or username-password combinations, your infrastructure must support cryptographically verifiable credentials presented directly by users from their wallets. This shift from centralized to holder-centric identity changes the architecture of every service that verifies user identity.

Technical Requirements Overview

The EUDIW ecosystem is built on specific protocols and formats that your systems must support. The Architecture Reference Framework (ARF) mandates two credential formats: SD-JWT (Selective Disclosure JSON Web Token) for web-based interactions, and mdoc (ISO 18013-5) for proximity and offline verification. Presentation and issuance rely on the OpenID for Verifiable Credentials (OpenID4VC) protocol suite, including OpenID4VP for receiving credential presentations and OpenID4VCI for issuing credentials.

Your technical team must also implement selective disclosure verification, where users present only the specific attributes your service requires rather than full credentials. This means your verification logic must handle partial credential payloads, validate cryptographic proofs on individual claims, and enforce data minimization at the protocol level. Support for both same-device and cross-device flows (such as QR code scanning) is required for a complete integration.

Infrastructure Changes Needed

Wallet integration demands updates to your Public Key Infrastructure (PKI). Your systems must validate credentials against the EU Trusted Lists, which are machine-readable registries of Qualified Trust Service Providers. This requires implementing automated Trusted List retrieval, caching, and validation logic. You will also need to verify wallet attestations, cryptographic proofs that confirm the wallet software itself is genuine and certified by its issuing Member State.

On the device and backend side, consider how secure elements and trusted execution environments factor into your architecture. If your organization issues credentials, you must implement QTSP-grade security for signing operations. Key management, certificate lifecycle management, and revocation checking become critical components. Your identity platform must also support the registration process required for relying parties, including declaring which attributes you request and for what purpose.

Integration Roadmap

A phased approach is essential. In the first phase, conduct a technical gap analysis: map your current identity infrastructure against ARF requirements and identify every integration point where wallet-based identity will replace or supplement existing flows. In the second phase, build a sandbox environment and implement OpenID4VC protocol handling using reference implementations from the Large-Scale Pilots. Test against multiple wallet providers to ensure interoperability.

In the third phase, integrate SD-JWT and mdoc parsing into your production verification pipeline. Implement Trusted List validation and wallet attestation checking. In the final phase, deploy to production with monitoring, logging, and audit trails that satisfy both technical and regulatory requirements. Plan for iterative updates, as the ARF is a living document and implementing acts will continue to evolve through 2026 and 2027.

Security Considerations

The EUDIW introduces new attack surfaces that your security team must address. Wallet attestation verification prevents accepting credentials from cloned or tampered wallet applications. Replay protection through nonces and session binding is essential for all credential presentations. Your systems must also handle revocation checking for both credentials and the certificates backing them, using mechanisms defined in the ARF.

Data minimization is both a privacy requirement and a security best practice under eIDAS 2.0. Request only the attributes strictly necessary for your service, and ensure your systems do not store credential data beyond what is legally justified. Implement response encryption for sensitive attribute exchanges, and ensure your relying party registration accurately reflects your data processing activities. Cryptographic compliance with ETSI standards (particularly EN 319 401 and related specifications) is mandatory for organizations operating as trust service providers.

Key Responsibilities

Evaluate current identity infrastructure against EUDIW requirements
Plan wallet integration architecture across all customer-facing services
Implement OpenID4VC and mDL protocols for credential issuance and verification
Establish secure credential verification pipelines with Trusted List validation
Coordinate with QTSPs for trust service integration and credential issuance
Ensure cryptographic compliance with ETSI standards and ARF specifications
Build monitoring and audit systems for wallet-based identity transactions
Lead cross-functional coordination between engineering, security, and compliance teams

Compliance Action Plan

1

Conduct a technical gap analysis comparing current identity stack to ARF requirements

2

Set up a sandbox environment with EUDIW reference wallet implementations for testing

3

Implement SD-JWT and mdoc credential parsing and verification in your identity pipeline

4

Integrate Trusted List validation and wallet attestation checking into production systems

5

Register as a relying party with the relevant national supervisory body

6

Establish a continuous monitoring process for ARF updates and implementing act changes

Related roles

Related industries

See How eIDAS 2.0 Affects Your Organisation

Take our free readiness assessment to understand your compliance gaps and get actionable recommendations.

Free eIDAS 2.0 Readiness Assessment

Trusted by 2,000+ organisations
Take the Quick Check

Need help preparing for eIDAS 2.0?

eIDAS Readiness Help
Need help preparing for eIDAS 2.0? I can point you in the right direction.