Interact with European Digital Identity Wallets
We enable the simple implementation of use cases for organisation with European Digital Identity Wallets in compliance with eIDAS 2.
What are European Digital Identity Wallets?
European Digital Identity Wallets
for natural persons:
European Digital Identity Wallets
for legal entities:
Functions of our EUDI-Wallet Connector
Electronic Attribute Attestations
Issue or request electronic attribute attestations such as certificates, or qualifications to and from mobile ID-Wallets.
Strong Customer Authentication
Enable high secure authentication without password such as payment approvals or multi-factor login.
Identification (KYC)
Request a government issued PID (eID) from an EUDI-Wallet to comply with Know-your-customer requirements.
Qualified Electronic Attribute Attestations
Issue and request regulated credentials with a high level of assurance together with an eIDAS trust service provider.
Discover the user flow of the Lissi Connector
Test our demo now without obligation
Test it with our demonstration
How can end users interact with public organsations and large enterprises?
Try Lissi DemoDemo for credential issuance into EU ID-Wallet
Simply issue one of the four proofs via QR code or e-mail directly into your own wallet.
Demo for credential verification into EU ID-Wallet
Have you already issued a certificate? Here you can simply request it by QR code or e-mail.
Lissi EUDI-Wallet pilot program
eIDAS 2 for digital identity
The European regulation introduces the European digital Identity Wallet “EUDI-Wallet” for identification, authentication and (qualified) electronic attribute attestations. We enable you to leverage this new potential and integrate use-cases with our API software.
Let's get in touch with Lissi
Test it with our demonstration
How can end users interact with public organsations and large enterprises?
Try Lissi DemoRequest access to our Pilot Program
Please fill out the form bellow
Frequently asked questions
The is a diverse interpretation of "digital identity" across different sectors like government, private sector, or advertisement companies. It underscores that the concept's meaning largely hinges on the context it's used in. The five mental models—Space-time, Presentation, Attribute, Relationship, and Capability— provide a framework for understanding digital identity in various digital environments. Identity cards, membership certificates, user names, biometric data, passwords and many other attributes draw the picture of your online identity. But it is not only individual features, but their relationship to each other that provides the necessary context.
In times of increasing digitalization, people must be able to reliably prove their identity information. However, we continue to rely on passwords to authenticate ourselves. At the same time, we have no reliable way to prove certain characteristics of ourselves, such as our university degree or address. Document forgery and identity fraud are common problems. To solve these immensely costly and cumbersome problems, Lissi enables the secure storage and management of identity information with optimised user experience and high privacy standards for all involved.
Verifiable credentials are a type of digital credential that can be verified by others. They are issued by a trusted entity and contain claims about an individual, which are cryptographically secured. The aim is to enable individuals to prove certain characteristics or attributes in a digital setting, thereby fostering trust and reducing fraud. They play a crucial role in decentralised identity systems, allowing individuals to share verified information about themselves without revealing unnecessary personal data.
- Trust: Since they are issued by trusted entities and can be cryptographically verified, they build trust among parties.
- Privacy: They allow individuals to share specific attributes without exposing unnecessary personal information.
- Reduced Fraud: The cryptographic verification of credentials can significantly reduce fraud.
- Efficiency: They streamline the verification process, saving time and resources.
- User Control: Individuals have more control over their personal data and who they share it with.
- Interoperability: They can be used across different systems and platforms, promoting a more seamless interaction in digital ecosystems.
The term self-sovereign identity (SSI) is used to describe a new concept of identity management. It not only puts the user in the center of all processes, but also gives the user more control over the distribution and management of his identity data.
With SSI users can receive certificates of identity information from issuers in their wallet and present them as they deem appropriate. The user decides which wallet to use, which certificates to accept and with whom to share them (or parts of them). The personal data is thus no longer primarily administered by companies or institutions, but is the user's data sovereignty. The data exchanged may be verified data as selective disclosure or full self-disclosure.