<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[IAM Thoughts]]></title><description><![CDATA[IAM Thoughts]]></description><link>https://blog.beansharp.net</link><generator>RSS for Node</generator><lastBuildDate>Wed, 08 Apr 2026 14:38:37 GMT</lastBuildDate><atom:link href="https://blog.beansharp.net/rss.xml" rel="self" type="application/rss+xml"/><language><![CDATA[en]]></language><ttl>60</ttl><item><title><![CDATA[Demystifying Decentralized Identity and Verifiable Credentials: A Beginner’s Guide]]></title><description><![CDATA[In today’s digital world, proving one's identity has become both more convenient and more vulnerable. Traditional identity management methods, such as passwords and scanned documents, expose individuals to privacy risks, data breaches, and unnecessar...]]></description><link>https://blog.beansharp.net/demystifying-decentralized-identity-and-verifiable-credentials-a-beginners-guide</link><guid isPermaLink="true">https://blog.beansharp.net/demystifying-decentralized-identity-and-verifiable-credentials-a-beginners-guide</guid><category><![CDATA[VerifiableCredentials]]></category><category><![CDATA[Entra Verified Id]]></category><category><![CDATA[DecentralizedIdentity]]></category><category><![CDATA[Entra ID]]></category><category><![CDATA[Microsoft]]></category><category><![CDATA[DIA]]></category><category><![CDATA[air new zealand ]]></category><category><![CDATA[DID]]></category><category><![CDATA[VC]]></category><dc:creator><![CDATA[Sooraj Payyoormana]]></dc:creator><pubDate>Tue, 22 Jul 2025 07:00:15 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1753165181872/d9a66dd9-94c5-424a-ae49-2cf7fb2fe5bb.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In today’s digital world, proving one's identity has become both more convenient and more vulnerable. Traditional identity management methods, such as passwords and scanned documents, expose individuals to privacy risks, data breaches, and unnecessary complications.</p>
<p>This is where <strong>Decentralized Identity (DID)</strong> and <strong>Verifiable Credentials (VCs)</strong> introduce a transformative model: one that empowers individuals to control their identity, minimises the over-sharing of personal data, and enhances digital experiences.</p>
<p>Whether you’re a tech professional, policymaker, or simply curious about the future of digital identity, this article will guide you through the fundamentals of DID and VCs with a straightforward, real-world example.</p>
<h2 id="heading-what-is-decentralized-identity">What is Decentralized Identity?</h2>
<p>At its core, <strong>Decentralized Identity</strong> is about returning control of personal data to individuals through a secure, digital identity framework.</p>
<p>In traditional systems, personal data (such as your name, date of birth, or other identifying attributes) is typically stored in centralised databases managed by companies or service providers. For instance, when you create an account on a website, that company holds your personal information, leaving you with limited control over how your data is stored and shared.</p>
<p><strong>Decentralized Identity</strong> changes this model by enabling individuals to store and manage their own digital identities securely. Using cryptographic methods and distributed technologies, your identity data becomes tamper-resistant and under your direct control. This approach allows you to selectively share only the necessary information with third parties, for example, providing age confirmation without disclosing your full birthdate when renting a car online.</p>
<h3 id="heading-core-components-of-decentralized-identity">Core Components of Decentralized Identity:</h3>
<ul>
<li><p><strong>Credentials:</strong> Verified information that uniquely identifies and describes an individual or entity.</p>
</li>
<li><p><strong>Digital Wallets:</strong> Secure applications where users store and manage their credentials and identifiers.</p>
</li>
<li><p><strong>Issuers:</strong> Trusted organisations (such as governments or businesses) that create and issue Verifiable Credentials to users.</p>
</li>
<li><p><strong>Verifiers:</strong> Entities that check the authenticity and validity of credentials presented by users.</p>
</li>
<li><p><strong>Decentralized Identifiers (DIDs):</strong> Unique, user-controlled identifiers designed for decentralized identity management.</p>
</li>
<li><p><strong>Verifiable Credentials (VCs):</strong> Digitally signed and cryptographically secure credentials that prove specific identity attributes.</p>
</li>
<li><p><strong>Blockchain or Distributed Ledger Technology:</strong> The decentralized infrastructure that ensures tamper-resistance and transparency for credential management.</p>
</li>
</ul>
<p>Similar to traditional Identity and Access Management (IAM) systems, these components collaborate to ensure secure access and verify user identities. However, the key distinction lies in the fact that users retain full control over their personal information at every stage of the process.</p>
<p><strong>Decentralized Identity</strong> shifts control of your digital identity from centralised systems (like a government database or a single company) to <strong>you</strong>. Instead of creating multiple accounts across services, you manage your identity directly using cryptographic technologies like <strong>Decentralized Identifiers (DIDs)</strong>.</p>
<p>This approach:</p>
<ul>
<li><p>Puts <strong>you in control</strong> of your identity and personal information.</p>
</li>
<li><p>Allows your identity to work <strong>across borders and services</strong>.</p>
</li>
<li><p>Reduces risks of identity theft and centralised data breaches.</p>
</li>
</ul>
<p>In short, you become the owner of your digital identity.</p>
<h2 id="heading-what-are-verifiable-credentials">What Are Verifiable Credentials?</h2>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1753220227806/908250ac-e327-45a1-98bd-3f2bc1c7459f.png" alt class="image--center mx-auto" /></p>
<p>In our everyday lives, we rely on physical IDs—like driver’s licenses to prove we can legally drive, diplomas to demonstrate educational qualifications, and passports to confirm our identity when travelling internationally. <strong>Verifiable Credentials (VCs)</strong> are designed to bring these kinds of real-world identity proofs into the digital realm, providing secure and privacy-respecting ways to share verified information online.</p>
<p>Verifiable Credentials are essentially digital statements issued by a trusted entity that verify specific information about an individual or organisation. These digital credentials include claims (such as name, date of birth, or license status) that are tied to both the issuer and the holder through Decentralized Identifiers (DIDs). The issuer signs the credential with its private key, creating cryptographic proof that the claims are authentic and unaltered.</p>
<p>For example, a government agency can issue a digital driver’s license as a Verifiable Credential. This credential can then be stored in a digital wallet and presented securely to any verifier who can instantly confirm its legitimacy without needing to contact the issuing agency directly.</p>
<p>The W3C’s Verifiable Credentials Data Model 1.0 provides the detailed technical specifications for these credentials, outlining how they can be issued, stored, presented, and verified. You can explore the full standard <a target="_blank" href="https://www.w3.org/TR/vc-overview/">here</a>.</p>
<h2 id="heading-how-does-decentralized-identity-work">How Does Decentralized Identity Work?</h2>
<p>To support a new generation of digital identity that offers self-ownership and privacy protection, Decentralized Identity systems integrate a set of foundational technologies. These systems use unique, user-owned identifiers, digital wallets to manage associated cryptographic keys, and encrypted datastores that remain under the user’s control.</p>
<p>This architecture shifts identity management from centralised authorities to individuals, making censorship and unauthorised control over identity data nearly impossible. Together, these innovations enable a secure, scalable, and privacy-centric model for managing identities in the digital world.</p>
<h2 id="heading-how-decentralized-identity-and-verifiable-credentials-work-together">How Decentralized Identity and Verifiable Credentials Work Together</h2>
<ul>
<li><p><strong>Decentralized Identity</strong> gives you a secure identifier that belongs to you.</p>
</li>
<li><p><strong>Verifiable Credentials</strong> are trusted digital documents issued to your identifier.</p>
</li>
<li><p>You store these credentials in a digital wallet and present them wherever required.</p>
</li>
</ul>
<p>Together, these form a secure, privacy-respecting framework for digital interactions across industries.</p>
<h2 id="heading-leading-solutions-in-the-market">Leading Solutions in the Market</h2>
<p>Several platforms offer Verifiable Credential solutions today. Some of them are:</p>
<ul>
<li><p><strong>Microsoft Entra Verified ID</strong></p>
</li>
<li><p><strong>MATTR</strong> (New Zealand-based VC and DID platform)</p>
</li>
<li><p><strong>Dock Labs</strong> (Blockchain-based VC infrastructure)</p>
</li>
<li><p><a target="_blank" href="http://walt.id"><strong>walt.id</strong></a> (Consumer-focused identity verification and VC issuance)</p>
</li>
</ul>
<p>All of these solutions follow open standards such as <strong>W3C Verifiable Credentials</strong> and <strong>Decentralized Identifiers (DIDs)</strong>, and each can be used to build Verifiable Credentials-based ecosystems depending on organisational needs and existing technology environments.</p>
<p>The example scenario presented in this blog uses <strong>Microsoft Entra Verified ID</strong> as an illustration of how Verifiable Credentials can be practically implemented, though similar architectures can be realised using any compliant solution.</p>
<h2 id="heading-example-solution-microsoft-entra-verified-id">Example Solution: Microsoft Entra Verified ID</h2>
<p>In Alex’s international travel scenario, <strong>Microsoft Entra Verified ID</strong> has been used as the example solution to demonstrate how Verifiable Credentials can be implemented in practice. Entra Verified ID, part of Microsoft’s Entra Identity suite, enables organisations to issue, manage, and verify Verifiable Credentials following open standards.</p>
<p>Key capabilities of Microsoft Entra Verified ID include:</p>
<ul>
<li><p><strong>Credential Issuance:</strong> Creating digitally signed, tamper-proof credentials.</p>
</li>
<li><p><strong>Digital Wallet Integration:</strong> Storing credentials within the Microsoft Authenticator app.</p>
</li>
<li><p><strong>Verification Processes:</strong> Allowing organisations to cryptographically verify credentials without contacting the issuer.</p>
</li>
<li><p><strong>Enterprise Integration:</strong> Leveraging existing Microsoft Entra ID environments.</p>
</li>
</ul>
<p>While Microsoft Entra Verified ID has been used to illustrate Alex’s journey, it’s important to note that <strong>similar solutions from other providers can also be used to implement Verifiable Credentials-based scenarios</strong>. Any platform adhering to open standards, such as W3C Verifiable Credentials, can support issuing and verifying digital credentials in the same way.</p>
<p>Organisations are encouraged to evaluate various solutions and select the one that best fits their operational environment and strategic goals.</p>
<h2 id="heading-alexs-user-journey-international-travel-using-verifiable-credentials">Alex’s User Journey: International Travel Using Verifiable Credentials</h2>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1753165936676/ba1aff34-6a45-4c46-b469-62fbd1a82928.jpeg" alt class="image--center mx-auto" /></p>
<h3 id="heading-step-1-alex-receives-his-digital-passport">📱 Step 1: Alex Receives his Digital Passport</h3>
<p>Alex is preparing for his upcoming trip to Singapore. To simplify the travel process, he decides to obtain New Zealand’s new <strong>Digital Passport</strong>, a Verifiable Credential securely stored in his smartphone.</p>
<p>He starts by registering with the <strong>Department of Internal Affairs (DIA NZ)</strong> through their Verifiable Credential issuance platform. This platform first leverages <strong>RealMe</strong>, New Zealand’s trusted identity provider, to verify Alex’s identity. Once RealMe confirms his identity, the DIA issuance platform strengthens the verification with an additional face recognition check using Alex’s smartphone camera. The system securely captures Alex’s live image and matches it against his official photograph stored in DIA NZ’s Passport system.</p>
<p>After completing these robust checks—RealMe verification, facial recognition, and passport document matching—DIA NZ issues Alex’s <strong>Digital Passport</strong> as a Verifiable Credential using <strong>Microsoft Entra Verified ID</strong>. Alex securely receives and stores this credential in the <strong>Microsoft Authenticator app</strong> on his smartphone.</p>
<p><strong>Outcome:</strong> Credential successfully issued and securely stored in Alex’s digital wallet.</p>
<h3 id="heading-step-2-alex-checks-in-with-air-new-zealand">✈️ Step 2: Alex Checks In with Air New Zealand</h3>
<p>On travel day, Alex arrives at Auckland Airport. At the Air New Zealand check-in counter, the airline requests Alex’s passport details.</p>
<p>Instead of providing a physical passport, Alex opens his <strong>Microsoft Authenticator app</strong>, selects his Digital Passport, and taps “Share Credential.” Before the credential is shared, the app initiates a <strong>Face Check</strong> using real-time facial matching to confirm that Alex is indeed the person sharing the credential. Upon successful verification, the credential sharing proceeds automatically. Air New Zealand’s check-in system securely receives the credential and instantly verifies it cryptographically to confirm:</p>
<ul>
<li><p>It was genuinely issued by DIA NZ.</p>
</li>
<li><p>It is authentic, valid, and unaltered.</p>
</li>
</ul>
<p>This verification is completed within moments, allowing Alex to quickly receive his boarding pass digitally and proceed smoothly to the boarding gate.</p>
<p>This process ensures that Alex’s identity is confirmed biometrically in real-time before his credential is shared, enhancing security and confidence in the verification process.</p>
<p><strong>Outcome:</strong> Alex enjoys a rapid and secure airline check-in experience.</p>
<h3 id="heading-step-3-alex-clears-immigration-at-auckland-international-airport">🌏 Step 3: Alex Clears Immigration at Auckland International Airport</h3>
<p>Before boarding his flight, Alex must clear immigration at Auckland International Airport, where new automated verification kiosks have been introduced to streamline passport control.</p>
<p>Alex approaches a kiosk, which prompts him to present his Digital Passport. He opens the <strong>Microsoft Authenticator app</strong>, selects the credential issued by <strong>DIA NZ</strong>, and taps “Share Credential.” Once the credential is shared, Alex is prompted to complete a <strong>Face Check</strong> using real-time facial matching to confirm that he is the rightful holder. After successful biometric verification, the credential is processed and shared securely with the kiosk.</p>
<p>The kiosk then cryptographically verifies the credential and confirms Alex’s identity, displaying a confirmation message that allows him to proceed directly to the departure gate.</p>
<p>This process ensures that Alex’s identity is confirmed biometrically in real-time before his credential is shared, enhancing security and confidence in the verification process.</p>
<p><strong>Outcome:</strong> Alex experiences smooth, efficient, and fully automated immigration verification.</p>
<h2 id="heading-final-thoughts-benefits-for-everyone">Final Thoughts: Benefits for Everyone</h2>
<p>Verifiable Credentials powered by Decentralized Identity bring benefits not just for individuals like Alex, but also for organisations across the travel ecosystem:</p>
<p><strong>For Travellers (Users):</strong> -</p>
<ul>
<li><p>Complete control over their identity.</p>
</li>
<li><p>Faster, hassle-free processes at check-in and immigration.</p>
</li>
<li><p>Enhanced privacy and data security.</p>
</li>
<li><p>No need to carry physical documents.</p>
</li>
<li><p>Increased trust and security through biometric verification using Face Check, ensuring credentials are only shared by the rightful owner.</p>
</li>
</ul>
<p><strong>For Department of Internal Affairs (Issuer):</strong> -</p>
<ul>
<li><p>Trusted issuance of fraud-resistant credentials.</p>
</li>
<li><p>Reduced reliance on manual document verification.</p>
</li>
<li><p>Strong assurance through RealMe, biometric checks, and document matching.</p>
</li>
</ul>
<p>**<br />For Air New Zealand (Verifier):** -</p>
<ul>
<li><p>Instant, automated verification of passenger credentials.</p>
</li>
<li><p>Streamlined check-in process.</p>
</li>
<li><p>Reduced overhead in manual document handling.</p>
</li>
<li><p>High-assurance verification using Face Check, ensuring the credential is presented by its rightful holder.</p>
</li>
</ul>
<p><strong>For Immigration and Border Authorities (Verifier):</strong></p>
<ul>
<li><p>Automated, tamper-proof verification of identity.</p>
</li>
<li><p>Faster clearance of passengers.</p>
</li>
<li><p>Enhanced border security with less operational strain.</p>
</li>
<li><p>An additional layer of assurance via biometric verification with Face Check.</p>
</li>
</ul>
<p><strong>For Airport Authorities:</strong> -</p>
<ul>
<li><p>Improved passenger flow and reduced bottlenecks.</p>
</li>
<li><p>Enhanced digital infrastructure supporting modern travel.Summary</p>
</li>
</ul>
<h2 id="heading-sumary">Sumary</h2>
<p>In today's digital landscape, Decentralized Identity and Verifiable Credentials are reshaping how personal information is managed and shared. By giving individuals control over their digital identities, these technologies help reduce privacy risks, improve user convenience, and enable secure, seamless interactions across industries.</p>
<p>This blog used an international travel example to demonstrate how Verifiable Credentials can streamline real-world processes, benefiting users, issuers, and verifiers alike. Solutions built on open standards, such as W3C Verifiable Credentials, make such scenarios achievable using various technology platforms. Microsoft Entra Verified ID was featured here as one example of how these concepts can be implemented practically using enterprise-grade tools.</p>
<p>Decentralized Identity and Verifiable Credentials represent a future where privacy, security, and user control intersect. Governments, airlines, and border control authorities globally can benefit from adopting such trusted identity frameworks.</p>
<p>In future posts, I’ll explore implementation architectures, adoption challenges, and real-world strategies for scaling Verifiable Credentials in production environments.</p>
<p>Stay connected to learn more about the evolving future of digital identity.</p>
<hr />
<p><strong>Disclaimer:</strong> All logos and brand names used in any associated diagrams or images belong to their respective organisations. They are used here purely for illustrative purposes without any intention of infringement or endorsement.</p>
]]></content:encoded></item><item><title><![CDATA[Starting My Blogging Journey: Reflections on Identity]]></title><description><![CDATA[After spending over three decades in technology, specialising in Identity and Access Management (IAM) for government and enterprise sectors, I’ve realised that some of the most powerful lessons come from real-world challenges rather than just framewo...]]></description><link>https://blog.beansharp.net/starting-my-blogging-journey-reflections-on-identity</link><guid isPermaLink="true">https://blog.beansharp.net/starting-my-blogging-journey-reflections-on-identity</guid><category><![CDATA[IAM]]></category><category><![CDATA[identity-management]]></category><category><![CDATA[Decentralised Identity]]></category><category><![CDATA[ciam]]></category><category><![CDATA[Security]]></category><category><![CDATA[Azure]]></category><category><![CDATA[Entra ID]]></category><dc:creator><![CDATA[Sooraj Payyoormana]]></dc:creator><pubDate>Wed, 02 Jul 2025 22:27:57 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1751495144431/12e490f1-7585-4994-a0d5-0d1de21f7885.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>After spending over three decades in technology, specialising in Identity and Access Management (IAM) for government and enterprise sectors, I’ve realised that some of the most powerful lessons come from real-world challenges rather than just frameworks and theories.</p>
<p>I started my career in software development and integration, and over the years, I’ve had the opportunity to lead the architecture, design, and implementation of complex IAM solutions for various organisations, including large-scale citizen identity platforms and sector-specific CIAM solutions. These experiences have shaped my belief that identity is not just about technology – it is about trust, usability, and security working seamlessly for people and organisations.</p>
<p>Today, I am launching this blog to share my thoughts, practical insights, and lessons learned in IAM. I plan to write regularly on topics including:</p>
<ul>
<li><p>The evolving landscape of IAM and CIAM</p>
</li>
<li><p>Practical approaches to designing scalable identity solutions</p>
</li>
<li><p>My perspectives on decentralised identity and verifiable credentials</p>
</li>
<li><p>Lessons from large IAM implementations and integrations</p>
</li>
<li><p>Emerging trends shaping the future of digital identity</p>
</li>
</ul>
<p>My upcoming post will focus on <strong>Decentralised Identity</strong>, where I will share how this paradigm shift could redefine the way individuals and organisations interact digitally, while addressing trust, privacy, and usability concerns.</p>
<p>If you are passionate about IAM, security architecture, or simply curious about how digital identity shapes the world around us, I invite you to follow along, share your thoughts, and engage in these conversations with me.</p>
<p>Thank you for reading, and see you in my next post.</p>
]]></content:encoded></item></channel></rss>