Introduction
Most businesses today rely on federated identity — systems like SAML and OpenID Connect (built on the OAuth 2.0 authorization framework) where a trusted third party (Google, Microsoft, Okta) vouches for a user's identity. It works, but it comes with structural tradeoffs around data ownership, single points of failure, and vendor lock-in. Self-sovereign identity (SSI) offers a fundamentally different model.
How Federated Identity Works
In federated identity, an Identity Provider (IdP) sits at the center:
- A user authenticates with the IdP (e.g., "Sign in with Google")
- The IdP issues a token to the relying party (your application)
- Your application trusts the token because it trusts the IdP
This model has served the web well. It's standardized, widely supported, and eliminates the need for every application to manage its own credential store. But the architecture has inherent limitations.
The Problems with Federation
Centralized control
The IdP controls the identity relationship. If Google suspends an account, the user loses the ability to authenticate with every service that depends on "Sign in with Google." Existing sessions at individual services may persist temporarily, but new logins are blocked. The user has no recourse outside Google's appeals process.
Data aggregation
IdPs see every authentication event. The OpenID Connect specification itself acknowledges this in its privacy considerations — the provider can observe which relying parties a user visits, how often, and when. This metadata is valuable and creates privacy risks regardless of the IdP's stated policies.
Availability dependency
If the IdP goes down, authentication fails everywhere. A single provider outage can cascade across thousands of unrelated services.
Vendor lock-in
Migrating between identity providers is painful. User identifiers are provider-specific, and switching means re-establishing trust relationships across every integrated service.
How Self-Sovereign Identity Differs
SSI inverts the model. Instead of a centralized provider issuing and controlling identities, individuals hold their own credentials. The architecture rests on open standards from the W3C:
- DIDs (Decentralized Identifiers) — The user controls a globally unique identifier anchored to a decentralized network (e.g. Bitcoin blockchain, IPFS, DHT). No provider can revoke it.
- Verifiable Credentials — Trusted issuers (employers, universities, governments) issue cryptographically signed credentials directly to the user's wallet. VCs support selective disclosure — the user can present only the specific claims needed for a given interaction without revealing the full credential, using cryptographic techniques like BBS signatures (for unlinkable proofs) or SD-JWT (RFC 9901) (for simpler JWT-based disclosure).
- Digital Wallets — Software that manages the user's DIDs, keys, and credentials — acting as the holder's agent in the issuer-holder-verifier trust triangle.
The relying party verifies the credential's signature against the issuer's public DID — no real-time connection to the issuer is required for signature verification. However, verifiers may need to fetch a Bitstring Status List to check whether a credential has been revoked. This list can be served from a cache or CDN rather than the issuer directly, preserving the holder's privacy.
What This Means for Businesses
Reduced liability
If you never collect and store user identity data, you can't leak it. SSI-based verification means the user presents proof without you needing to maintain a user database of PII.
Simplified compliance
GDPR, CCPA, and similar regulations impose obligations on any organization that collects personal data — regardless of the delivery mechanism. Receiving personal data from a verifiable credential presentation still makes you a data controller under GDPR Article 4(7). However, selective disclosure and zero-knowledge proofs can dramatically reduce the personal data you need to collect in the first place. For example, proving a user is over 18 without receiving their birthdate. Less data collected means a smaller compliance surface — fewer storage obligations, lower breach risk, and simpler data subject access requests.
Resilience
No single provider can disrupt your authentication flow. DID resolution works as long as the underlying network (Bitcoin) is operational.
Interoperability
The W3C DID and Verifiable Credential standards — both full W3C Recommendations — are vendor-neutral. Credentials issued by one system can be verified by any compliant system without bilateral integration agreements.
The Transition Path
SSI doesn't require ripping out existing infrastructure overnight. Practical adoption looks like:
- Hybrid authentication — Accept both federated tokens and verifiable credential presentations during a transition period.
- Credential issuance — Start issuing verifiable credentials for your own users alongside existing identity flows.
- Verification first — Even before issuing credentials, you can begin accepting them from external issuers for specific use cases (age verification, professional certifications, KYC).
Conclusion
Federated identity solved real problems, but it created new ones around centralization, privacy, and control. Self-sovereign identity addresses these structural issues by putting individuals in control of their own credentials. For businesses, the shift can reduce liability, minimize the data you need to collect and protect, and eliminate single-provider dependencies. The tradeoff is added complexity — key management, credential lifecycle, revocation infrastructure, and a less mature ecosystem compared to established federation protocols. Both models will likely coexist for a long time, and hybrid approaches may be the most practical path forward for most organizations.
Further Reading
- W3C Decentralized Identifiers (DIDs) v1.0 — W3C Recommendation
- W3C Verifiable Credentials Data Model v2.0 — W3C Recommendation
- W3C Bitstring Status List v1.0 — W3C Recommendation for credential revocation
- OpenID Connect Core 1.0 — Including Section 17 on privacy considerations
- RFC 6749 — The OAuth 2.0 Authorization Framework
- RFC 9901 — Selective Disclosure for JWTs (SD-JWT)
- BBS Signatures (IRTF draft) — Unlinkable selective disclosure
- Christopher Allen — The Path to Self-Sovereign Identity — The original 10 principles of SSI
- NIST SP 800-63C — Federation and Assertions
