Verifiable Credential

Glossary Page

A verifiable credential includes subject identification, issuing authority, credential type, asserted attributes, derivation evidence, and constraints, mirroring physical credentials. Utilizing technologies like digital signatures, verifiable credentials surpass physical ones in security and tamper resistance. Credential holders can generate and share verifiable presentations to demonstrate specific characteristics. Both can be swiftly transmitted, enhancing remote trust establishment. The specification strives to harmonize the simplicity of expressing digital credentials with privacy considerations, tackling issues related to data persistence and correlation. The term "verifiable" pertains to a credential's verifiability by a verifier, without implying the truth of claims, empowering verifiers to assess based on provided evidence.

https://www.w3.org/TR/vc-data-model-2.0/#what-is-a-verifiable-credential external-link

Latest Webinars

Latest Articles

Blog Post Cover

Flex: Electronic Control Unit (ECU)

Flex partnered with T-Systems to migrate ECU data exchange to Catena-X, enabling secure, multiregional, real-time validation across global production sites. Using T-Systems’ Connect & Integrate solution, Flex achieved end-to-end integration, API and Cofinity-X interface testing, and a fully validated production setup. This scalable dataspace foundation now supports future use cases including Product Carbon Footprint, Certificate Management, Battery Pass, and global traceability, while maintaining full data sovereignty.

Read more

external-link
Author image

Andrea Garcia

Jan 16, 2026

Blog Post Cover

Sovereign connectivity: Automating access in dataspaces

Sovereign connectivity in dataspaces requires automating network access to ensure security, compliance, and operational scale. In the Data Intelligence Hub, we replace manual firewall updates with a declarative, Kubernetes-native model using Custom Resource Definitions (CRDs). Customers define their allowed IP ranges through a self-service portal, which generates an IpAccessPolicy object representing the desired state. A controller then reconciles this state with the underlying infrastructure, automatically updating Kubernetes Ingress configurations and preventing drift. This architecture ensures auditability, validates inputs before enforcement, and keeps network access aligned with the principles of data sovereignty across multi-tenant environments.

Read more

external-link
Author image

Mohamed Radwan

Jan 15, 2026

Blog Post Cover

Flex’s Catena-X strategy: Benefiting from “buy one, get one free” economics – Executive brief

Flex leverages Catena-X to build a reusable, standards-based automotive data ecosystem. By starting small and scaling through economies of scope, Flex delivers multiregional data solutions for ECU management, certificate compliance, and supply-chain traceability, enabling sovereign data sharing, faster innovation, and cost-efficient reuse across multiple OEMs and use cases.

Read more

external-link
Author image

Chris S. Langdon

Jan 12, 2026