Trust in the EUDI Wallet Ecosystem¶
Introduction¶
Trust between participating parties is a fundamental prerequisite for a functioning EUDI Wallet ecosystem. This section provides a comprehensive overview of how trust is established, what distinguishes different attestation types, and how to determine which attestation type is appropriate for specific use cases.
The eIDAS 2.0 framework deliberately provides different levels of trust services to match different real-world needs. Understanding these trust models is essential for selecting the appropriate attestation type and avoiding unnecessary effort and costs.
Key principle
The appropriate attestation type is the lowest level that sufficiently meets the legal and practical requirements of the use case.
How Trust Is Established¶
Trust in the EUDI Wallet ecosystem is established through different mechanisms depending on the attestation type and the relationship between parties.
Uniform Issuer Identity Assurance¶
All issuers—whether issuing PID, EAA, QEAA, or PubEAA—are identified at the same cryptographic security level via Access Certificates issued by a Registrar.
Access Certificates:
- Bind the legal identity of the issuer
- Define the issuer's technical role in the ecosystem
- Enable secure interaction with Wallets and Relying Parties
Access Certificates do not define:
- Evidentiary value of the issued attestation
- Qualification status of the issuer
- Authorization to issue specific attributes
Authentication vs. Authorization
Identity assurance answers who an issuer is. Trust models answer whether a specific attestation should be relied upon.
Trust Models by Attestation Type¶
| Attestation Type | Primary Trust Anchor | Authorization Logic | Liability |
|---|---|---|---|
| PID | Member State certification | National law mandate | Member State |
| EAA | Accepted rulebook / scheme | Explicit via governance | Contractual / scheme-based |
| QEAA | QTSP qualification + EU Trusted List | Implicit via regulation | Statutory (QTSP) |
| PubEAA | Public mandate + certified attributes + EU Trusted List | Explicit via public law | Public authority |
Trust and Liability¶
Understanding liability allocation is crucial when choosing an attestation type:
EAA (Electronic Attestation of Attributes)¶
- Liability: Based on contractual arrangements, scheme rules, and general civil law
- Risk allocation: Shared between issuer and relying party according to scheme governance
- Recourse: Through contractual and civil law mechanisms
- Insurance: Not mandated, but may be required by scheme rules
QEAA (Qualified Electronic Attestation of Attributes)¶
- Liability: Statutory liability regime under eIDAS
- Risk allocation: QTSP assumes significant liability for damages caused by non-compliance
- Recourse: Direct statutory claims against the QTSP
- Insurance: Mandatory professional liability insurance required for QTSPs
PubEAA (Public Electronic Attestation of Attributes)¶
- Liability: Public law liability of the issuing authority
- Risk allocation: The public body responsible for the authentic source bears liability
- Recourse: Administrative and public law remedies
- Insurance: Government liability frameworks apply
PID (Personal Identification Data)¶
- Liability: Member State responsibility under eIDAS
- Risk allocation: The notifying Member State is liable for the proper functioning
- Recourse: Through national and EU legal mechanisms
- Insurance: Covered by state liability frameworks
Common Misconceptions¶
"Only QEAA are legally safe"¶
Incorrect. QEAA provide higher evidentiary value only where this is legally or practically required. EAAs are explicitly designed by eIDAS to cover the vast majority of use cases and are fully valid trust instruments.
"EAA issuers are not trustworthy because they are not on the EU Trusted List"¶
Incorrect. Access Certificates identify the entity with which the Wallet is interacting, but they do not sign credentials. For EAA, trust is established via accepted rulebooks that the Relying Party must accept to consume the attestation and gain trust in it. The difference between EAA and QEAA lies in the trust model, not in the cryptographic security or identity verification of the issuer.
"Qualification equals better security"¶
Incorrect. Technical security mechanisms (cryptography, key management, revocation) are similar across all attestation types. Qualification primarily adds conformity assessment, supervision, and statutory liability—not inherently stronger technical security.
"Public bodies should always use PubEAA"¶
Incorrect. Public bodies can issue EAAs for attributes that do not require document-equivalent evidentiary value. PubEAA is specifically for cases where the attestation should have the same legal effect as a paper original.
Choosing the Right Attestation Type¶
Quick Decision Guide¶
There are several key factors to consider when choosing an attestation type for a given use case:
| Question | Motivation |
|---|---|
| Who is the issuer of the credential? | certain rights and obligations for public bodies, responsible for an authentic source, e.g., to issue PubEAA and provide register information |
| Required evidentiary value of the credential? | for document-equivalent requirements, QEAA or PubEAA may be legally required |
| Existing trust / acceptance structure? | can be used for EAA verification, independent of eIDAS trust lists, e.g., credit scores |
| Cross-border scenario, unknown acceptance conditions? | central eIDAS trust mechanisms for QEAA / PubEAA may be used, e.g., language certificates from certified schools |
| Should issuance be under control of a public body? | other parties may issue credentials by verifying attributes against the authentic source (if on Minimum List of Attributes) |
The requirements for EAA, QEAA, and PubEAA can be compared concisely as follows:
| Requirement | EAA | QEAA | PubEAA | PID (for comparison) |
|---|---|---|---|---|
| Evidentual value | Trust structures of the issuer | Like written document | Like written document | Like notified eID-system |
| Issuer | All, regularly a trust service provider | Only a QTSP | Only authentic sources from a public authority or its representative | PID-Provider |
| Certification required? | No | Yes including re-certification | Yes, only initial | Yes, EUDI-Wallet certification (Art 5c eIDAS) |
| Issuing from not self administered sources possible? | Yes | Yes | No | Yes (can differ from national eID-operator) |
| Sector of issued attestations | Private and Public | Private and Public | Only Public | Only Public |
| Possibility of using a service provider to issue in its own name? | Yes | No | Yes | Yes |
| Issuance only in EUDIW compatible formats and protocols? | Yes | Yes | Yes | Yes |
| User identification required? | At the discretion of the issuer | Yes | Yes | Yes (level of assurance high) |
| Attribute verification and linking to the user required? | At the discretion of the issuer | Yes | Yes | Yes (level of assurance high) |
| Rules for the structure of the attestation? | At the discretion of the issuer | Yes, annex V eIDAS | Yes, annex VII eIDAS | Yes, via implementing act |
| Rules for ensuring integrity and authenticity of the attestation? | At the discretion of the issuer | Yes, qualified electronic signature/seal | Yes, qualified electronic signature/seal | Yes |
| Revocation required? | At the discretion of the issuer | Yes, (excluding short time attestations) at the user's request, if the proof becomes inaccurate or if there is a possibility of compromise | Yes, (excluding short time attestations) at the user's request, if the proof becomes inaccurate or if there is a possibility of compromise | Yes, at the user's request, if the proof becomes inaccurate or if there is a possibility of compromise |
| Obligation to fulfil attestation scheme? | At the discretion of the issuer | Yes | Yes | Yes (PID-Rulebook) |
| Functional separation of EAA service required? | No | Yes | No | No |
| Logical separation of the data and prohibition of combining EAA with other user data? | Yes | Yes | Yes | Yes |
| Supervision by an authority? | Yes ex-post, only if trust service provider | Yes, ex-ante | No | Yes, ex-ante by EUDI-Wallet supervisory authority |
| NIS2-obligation? | Yes as important entity, only if trust service provider | Yes as essential entity | No, except obligation from another category | Yes regurlarly as critical infrastructure |
| Obligation for accessibility? | Yes, only if trust service provider | Yes | Yes | Yes |
| Special obligation for incident reporting | Yes, only if trust service provider | Yes | No | Yes, via EUDI-Wallet mechanisms |
| General technical and organizational requirements for service operation? | Yes ex-post, only if trust service provider according to Art 19a eIDAS and implementing act (EU) 2025/2160 | Yes, according to Art 24 eIDAS and concretizing implementing acts | Yes, analogue to Art 24 eIDAS | Ja, specific requirements of Art 24 eIDAS |
| Special civil law liability for culpable breach of duty? | Yes, only if trust service provider | Yes, additionally culpable violation is presumed | No | Via EUDI-Wallet mechanisms according to Art 11 eIDAS |
| Attribute in attribute catalog of EU-Commission? | Only if based on an authentic source from a public authority | Only if based on an authentic source from a public authority | Yes | No, but EU trusted list for PID-Provider und PID-Rulebook |
| Attribute in catalog of attribute schemes of EU-Commission? | Yes, but only if relevant | Yes, regularly | Yes | No, but EU-trusted list for PID-Provider and PID-Rulebook |
| Sources for validation of the attestation | If applicable via catalog of attribute schemes, otherwise through information made available by the issuer | EU trusted list + if applicable. Catolog of attribute schemes | EU trusted list + EU trusted list for PubEAA issuers + catalog of attribute schemes | EU trusted list for PID-Provider + PID-Rulebook |
Detailed Decision Criteria¶
The differences and reasons for issuing EAA, QEAA, and PubEAA described in detail above provide the following decision-making aid for anyone who, as a potential issuer of attribute certificates, is wondering which of the three types they should issue.
Basic Rule EAA
- Especially if trust structures are already in place
- If the legal basis allows the EAA to provide the proof (e.g., mdl)
- Existing and accepted private and public law proofs are to be transferred to the EUDI wallet
- The proofs are to be issued in a cost-effective, flexible, and customizable manner
Exception: QEAA
- If, in exceptional cases, no adequate trust structure is available or can be established for the attestation to be issued
- If the attestation is intended for use abroad and the acceptance rules applicable there are unknown, and it is unclear whether the existing (national) trust structures will be sufficient there
- The relying parties expressly request QEAA for legal or risk-based reasons. Instead of issuing QEAA, an attempt can also be made to address these reasons and enable the issuance of EAA
Speciality for public sector authentic sources: PubEAA
- The requirements for issuing a QEAA are met
- In addition, the highest possible degree of decision-making autonomy should be exercised, and key decisions regarding the issuance should be made within the public administration
The following table helps through key questions to identify the most suitable credentials for specific use case:
| Key Question | EAA | QEAA | PubEAA |
|---|---|---|---|
| Existing acceptance relationship? | ✅ | — | — |
| Accepted today without originals? | ✅ | — | — |
| Previously required in original form? | — | ✅ | ✅ |
| Regulatory demand for document equivalence? | — | ✅ | ✅ |
| Cross-border use with unknown acceptance? | — | ✅ | ✅ |
| Issuer is authentic source? | ✅ | — | ✅ |
| Issued in issuer's own name? | ✅ | — | ✅ |
| Public body responsible for authentic source wants to keep most possible control? |
— | — | ✅ |
Principle of Proportionality
The existence of QEAA does not imply that EAA are insufficient. Choose the lowest attestation type that meets your requirements. Anything beyond that is voluntary over-compliance with additional cost and complexity.
Next Steps¶
Based on your use case, proceed to the detailed requirements for each attestation type:
- PID Trust Requirements — For Personal Identification Data
- EAA Trust Requirements — For Electronic Attestations of Attributes
- QEAA and PubEAA Trust Requirements — For qualified and public attestations
If you have decided to issue an EAA, see the design guidance:
- EAA Overview — What EAAs are, who can issue them, and credential formats
- Credential Anatomy — Common mechanisms: signatures, revocation, key binding
- Design Recommendations — Best practices for well-made EAAs
For technical details on trust validation mechanisms, see:
- Trust Validation Overview — Technical validation procedures
- Wallet-Relying Party Authentication — RP registration and authentication