What Is Credential Presentation?

What Is Credential Presentation?

Credential presentation is the act of sharing a verifiable digital credential (or specific attributes from it) with a verifier who needs to confirm something about you. It is the moment when digital identity delivers its value: proving who you are, where you live, or what you're authorized to do.

How does presentation work?

When a verifier requests proof, whether at a TSA checkpoint, a bar, or an online service, your wallet displays the request and asks for your approval. Once you consent, the wallet generates a cryptographic proof containing only the requested information, which is signed to demonstrate the authenticity of the credential. The verifier checks this signature against the issuer's public key.

The holder's device never leaves their control. Presentation happens through short-range exchanges (NFC tap, QR code scan, Bluetooth) or remote channels (secure web connections). The verifier receives a signed data package but never gains access to the device itself.

Selective disclosure

Physical IDs require oversharing, proving you're over 21 means revealing your name, address, and exact birthdate to the bartender. Verifiable digital credentials enable selective disclosure, where you share only the specific attributes needed for the transaction.

For example, your wallet might generate a proof that says only "date of birth is before January 1, 2004" without revealing your actual birthdate, name, or address. The verifier can mathematically confirm that this proof is authentic, signed by your DMV, without seeing anything beyond what they need.

This is enabled by cryptographic techniques, which let a credential be signed once and then selectively revealed later without invalidating the original signature.

Attended vs. unattended presentation

Presentation scenarios fall into two categories. Attended presentations are in-person checks, such as showing your mDL at a TSA checkpoint or to law enforcement. These are standardized in ISO/IEC 18013-5.

Unattended presentations are remote interactions, such as submitting an mDL for online banking, job applications, or age verification on websites. These use cases are addressed by ISO/IEC 18013-7 for mDL-based online presentation. The verification happens digitally, without a human operator present.

User control and privacy

Well-designed wallets enforce several protections during presentation. They authenticate the verifier before any disclosure, allowing them to warn about suspicious requests. They display exactly what data is being requested and allow the user to approve or decline. They prevent device surrender by using contactless methods that keep the phone in the holder's hand.

night-sky-over-distant-mountains

Want to keep learning?

Subscribe to our blog.