Web Authentication and Decentralized Identity: challenges for a new era of digital trust

30 March 2026 - Updated at 30 March 2026
Aurélie Cocherie Aurélie Cocherie

The login journey is a critical moment in the digital experience. As the first point of contact between the user and the service, it is also a potential entry point for cyberattacks and fraud. Yet traditional authentication methods, such as passwords or two-factor authentication, are now showing their limits. How can web authentication and decentralized identity improve security while simplifying user experience by eliminating passwords?

Did you know?

Friction caused by traditional authentication methods affects both user experience and trust in digital services.

To address these challenges, Europe is promoting a more innovative, user-centric approach:

Decentralized digital identity
Verifiable Credentials (VCs)

Supported by European regulation, notably eIDAS 2.0, and set to become mandatory for some use cases by the end of 2027, these technologies enable more secure and seamless authentication without compromising ease of use.

The aim of this article is to clarify the key concepts behind the login journey, explore the benefits of decentralized digital identity for both users and organizations, and explain in simple terms how this approach secures user journeys while preserving a smooth experience.

Overview of login journeys

Identification, authentication and authorization: clarifying the concepts

Three key steps define the login journey

ConceptDefinitionExampleAssociated question
IdentificationProcess of recognizing a user or a deviceEmail address, phone number, unique identifierWho are you?
AuthenticationVerification that the user is who they claim to bePassword, biometrics, OTP code, social loginProve that you are who you claim to be.
AuthorizationVerification of permissions to access specific resourcesDifferent access rights depending on roles (e.g. read-only vs. full access)What are you allowed to do?

The challenge is to provide:

  • Clear identification, with no ambiguity about the user’s identity.
  • Robust authentication, without making the journey heavier.
  • Appropriate authorization, to reduce risk while maintaining a smooth experience.

Les limites des méthodes d’authentification traditionnelles

Traditional authentication methods are now reaching their limits in the face of growing security and user experience requirements.

As highlighted in many reports, these methods no longer meet today’s expectations in terms of security and usability. It is time to consider more robust and seamless alternatives.

Summary of the main challenges encountered

MethodMain advantageLimitationsRisks
PasswordsEasy to implementComplex credential management for users, frequent forgetting
Lack of resistance to attacks
Increased vulnerability (phishing, brute force)
Password reuse (80% of data breaches are linked to compromised credentials)
Multi-factor authentication (MFA)Enhanced securityComplexity for users (SMS codes, authentication apps)
CNIL 2025: sending a code by email is no longer considered strong authentication
ANSSI: possible SMS interception
Additional costs (SMS delivery, token management)
Friction in the user experience
Social LoginEase of useData centralization (dependency on major web platforms)Exposure to data breaches (a compromised account can impact multiple services)

Decentralized Identity and the EUDI Wallet: a new approach that combines security and user experience

What is decentralized identity?

  • To address these limitations, decentralized identity, also known as Self-Sovereign Identity (SSI), is emerging as a promising alternative. Unlike traditional systems where a centralized provider manages identity, SSI is based on several key components.
  • Decentralized Identifiers (DIDs) are unique and tamper-proof identifiers.
  • Verifiable Credentials (VCs) are cryptographically secured digital attestations that allow information to be verified without relying on centralized databases, for example a digital driver’s license, an employee certificate or a company registration document.
    • Key benefits include reduced data sharing, portability of credentials, user control and decentralized verification.
  • Finally, an identity wallet allows users to securely store and share their credentials.

The European digital identity

Among the solutions based on decentralized identity are the European Digital Identity Wallet (EUDI Wallet) for citizens and the European Business Wallet for organizations. These key European Union initiatives aim to:

  • Enable every citizen and business to have a digital identity
  • Strengthen identity security through cryptographic authentication and high assurance levels at onboarding
  • Simplify digital journeys with passwordless login, KYC, KYS and KYE processes, and identity attribute verification
  • Protect privacy by giving users full control over the data they choose to share

By 2030, 80% of European citizens are expected to have a secure digital identity through the EUDI Wallet.

European Commission, 2023

The emergence and adoption of this approach are driven by the eIDAS 2 regulation. The acceptance of the EUDI Wallet in authentication journeys will become mandatory by the end of 2027 for large online platforms, certain public services and some private companies where strong authentication is required by law.

Current authentication systems, such as passwords, MFA or social login, will need to evolve to recognize and leverage identities provided through these wallets.

The added value of digital identity and its complementarity with existing solutions

Comparaison des solutions d’authentification

SolutionSecurityUser experienceInteroperabilityPortability
PasswordsLowMedium (friction due to forgotten credentials)LimitedNo
MFA (SMS or email)MediumMedium (complexity in the journey)MediumNo
Social LoginMediumExcellent (one-click login)HighYes (but dependent on third-party providers)
Decentralized identity (VC)Very highExcellent (user control)HighYes

Digital identity solutions offer at least three key benefits:

  1. Enhanced security: decentralized verification and digital credentials reduce data exposure, limit sensitive data exchanges and ensure the authenticity of interactions;
  2. Privacy and data control: users decide which information they share;
  3. Seamless user experience: fast, passwordless login without disrupting the user journey.

The European digital identity can coexist with existing solutions such as MFA and SSO:

  • Progressive integration: adding verification options without disrupting current user habits.
  • Complementary use cases: for example, a public service may request proof of age via a verifiable credential while still offering traditional authentication methods.
  • Objective: strengthen security without forcing abrupt changes in user behavior.

This approach enables more secure and seamless authentication, addressing today’s digital journey challenges.

Architecture and Reference Framework (ARF)

The common architecture of the European digital identity wallet ecosystem is defined in the ARF (Architecture and Reference Framework). It specifies the standards, protocols and data exchange formats between issuers, wallets and service providers (Providers, Relying Parties, etc.).

It provides a structured framework to describe the components and flows involved in:

Issuance: protocols (OpenID4VCI), exchange formats, authorities, and mechanisms such as VC revocation and validity periods;
Holding (wallet): storage, security, consent, and presentation mechanisms (OpenID4VP);
Verification of VCs: verification mechanisms and processes.

Among the key design principles are:

User-centricity and accessibility;
Interoperability (mandatory formats such as ISO/IEC 18013-5 (mDOC) / 23220-2, SD-JWT VC, and optional W3C VCDM 2.0, along with processes and certification);
Privacy by design (selective disclosure of attributes, user consent, minimal data sharing);
Security by design (Wallet Secure Cryptographic Device, Wallet Secure Cryptographic Application, keystore, trust framework).

Compliance with this architecture enables a secure, reliable and user-centric end-to-end journey.

European eIDAS 2.0 regulation: the three key challenges to address before its implementation

The European eIDAS 2.0 regulation requires critical sectors and large platforms to accept the European digital identity by the end of 2027. Until then, three major challenges must be addressed:

  1. Adoption and trust: raising awareness among users and organizations about the benefits and control over personal data.
  2. Interoperability: aligning standards such as VC and ARF across public and private stakeholders to ensure a seamless and secure experience, while continuing joint testing initiatives across Europe.
  3. Compliance: ensuring adherence to principles such as data minimization, explicit consent and data portability.

Decentralized identity and the EUDI Wallet represent a major step forward for web authentication, combining stronger security, ease of use and respect for privacy. They will not replace existing methods overnight, but will complement them, making them more robust and better aligned with user expectations.

The future of authentication no longer relies on passwords, but on verifiable identity credentials controlled by the user.

By adopting this approach, we collectively move toward safer and more reliable digital services.

And you, are you ready to embrace decentralized identity?

Aurélie Cocherie Aurélie Cocherie Product Manager Orange Business

After 13 years of experience in the banking sector, specializing in payment management and B2B digital challenges, I joined Orange Business to continue my commitment to the digital transformation of companies.

All posts from Aurélie Cocherie

Comments (0)

Your email address will not be published. Required fields are marked *

Your email address is only used by Business & Decision, the controller, to process your request and to send any Business & Decision communication related to your request only. Learn more about managing your data and your rights.

Discover also