Technology - Decentralized Identifiers



A decentralized identity approach helps users and organizations with the resources they access transparently and securely, in an identity trust fabric. People control their own identity through wallet based credentials. We believe a standards-based Decentralized Identity platforms can unlock a new set of experiences that give users control over their data—and deliver a higher degree of trust and security for apps, devices, and service providers.

This also allows platforms to deliver services without the worry of centralized attack vectors that are extremely common today. AuthNull is actively adopting standards set members of the Decentralized Identity Foundation (DIF), the W3C Credentials Community Group, and the wider identity community.

W3C Decentralized Identifiers

Industry standard W3C decentralized id is used as a part of Authnull for Identity

W3C Verifaible Credentials

All credentials are W3C verifiable credentials

DID Sidetree / Ion

Identity.foundation's implementation of sidetree protocol Ion is used

DIF Presentation Exchange

Presentation exchange is used to exchange credentials

Why decentralized identity for implementing passwordless authentication?

Decentralized identity is the best option to implement passwordless authentication for the following reasons:

Contact us to get a demo

Two roots of trust

All authentication is done by two roots of trust, and using FIPS compliant public key cryptography on both sides. All credentials require cryptographic signatures of both the Issuer (organization) and holder (end user).

Credentials are issued by organization, and decentralized.

All credentials are issued by the organization, and sent to the user's wallet where the user signs with their private key and stores it in the wallet.

Standards Based

All credentials are issued as W3C verified credentials in compliance with NIST special publication 800-63-3.

No single, central attack surface

All credentials are completely decentralized. No local privileged accounts can be accessed without a decentralized credential.

Tamper evident credentials

All credentials and identities are tamper evident as identities and credential transaction hashes can be written to blockchain as merkle hashes. When modified, this alters the address on the blockchain indicating compromise. AuthNull comes with extensive logging and audit checking capabilities to prove tampering.

Get in touch

Fill this form to receive more information, a demo and a price request

Company Name

Speak with Sales & Get a Quote


Have a privileged security issue, or a new initiative to protect your infrastructure? We'd love to chat.


Get in touch

Looking to learn more?


Checkout our interesting collection of Resources including Videos, and much more.

Go to Resources

Go to our Trust Center

Help Documentation


AuthNull deliver M2M authentication - without passwords or secrets.


Go to Help Center

View API docs