Verifiable Credential
Glossary Page
A verifiable credential includes subject identification, issuing authority, credential type, asserted attributes, derivation evidence, and constraints, mirroring physical credentials. Utilizing technologies like digital signatures, verifiable credentials surpass physical ones in security and tamper resistance. Credential holders can generate and share verifiable presentations to demonstrate specific characteristics. Both can be swiftly transmitted, enhancing remote trust establishment. The specification strives to harmonize the simplicity of expressing digital credentials with privacy considerations, tackling issues related to data persistence and correlation. The term "verifiable" pertains to a credential's verifiability by a verifier, without implying the truth of claims, empowering verifiers to assess based on provided evidence.
https://www.w3.org/TR/vc-data-model-2.0/#what-is-a-verifiable-credential
Latest Webinars
Latest Articles
Flex: Electronic Control Unit (ECU)
Flex partnered with T-Systems to migrate ECU data exchange to Catena-X, enabling secure, multiregional, real-time validation across global production sites. Using T-Systems’ Connect & Integrate solution, Flex achieved end-to-end integration, API and Cofinity-X interface testing, and a fully validated production setup. This scalable dataspace foundation now supports future use cases including Product Carbon Footprint, Certificate Management, Battery Pass, and global traceability, while maintaining full data sovereignty.
Read more
Andrea Garcia
Jan 16, 2026
Sovereign connectivity: Automating access in dataspaces
Sovereign connectivity in dataspaces requires automating network access to ensure security, compliance, and operational scale. In the Data Intelligence Hub, we replace manual firewall updates with a declarative, Kubernetes-native model using Custom Resource Definitions (CRDs). Customers define their allowed IP ranges through a self-service portal, which generates an IpAccessPolicy object representing the desired state. A controller then reconciles this state with the underlying infrastructure, automatically updating Kubernetes Ingress configurations and preventing drift. This architecture ensures auditability, validates inputs before enforcement, and keeps network access aligned with the principles of data sovereignty across multi-tenant environments.
Read more
Mohamed Radwan
Jan 15, 2026
Flex’s Catena-X strategy: Benefiting from “buy one, get one free” economics – Executive brief
Flex leverages Catena-X to build a reusable, standards-based automotive data ecosystem. By starting small and scaling through economies of scope, Flex delivers multiregional data solutions for ECU management, certificate compliance, and supply-chain traceability, enabling sovereign data sharing, faster innovation, and cost-efficient reuse across multiple OEMs and use cases.
Read more
Chris S. Langdon
Jan 12, 2026