What is a Distributed Identidfier (DID)

Knowledge Base

What is a Distributed Identidfier (DID)

A Distributed Identifier (DID) is a new type of identifier designed to enable individuals, organizations, and devices to have verifiable, self-controlled digital identities.

Unlike traditional identifiers (such as usernames or email addresses), a DID is decentralized—it does not rely on a central authority or registry. Instead, it is registered and resolved through decentralized networks like blockchains or distributed ledgers.


Key Characteristics

  • Globally Unique: Each DID uniquely identifies a subject (person, organization, object, etc.).
  • Self-Sovereign: The owner of the DID has full control over it, including the ability to create, update, and deactivate it.
  • Cryptographically Verifiable: A DID is associated with a DID Document that contains public keys and other metadata necessary for verification.
  • Interoperable: DIDs follow open standards (W3C) and can be used across different platforms and ecosystems.
  • Privacy-Respecting: Users can generate multiple DIDs for different contexts, limiting the possibility of unwanted tracking or correlation.

How It Works

  1. Creation: A user or system generates a DID along with its cryptographic keys.
  2. Publication: The DID (and optionally its associated DID Document) is published to a decentralized network.
  3. Resolution: Anyone can look up the DID to retrieve the DID Document, which includes the information necessary to verify the identity or establish a secure communication channel.
  4. Authentication and Authorization: The public keys in the DID Document allow others to verify that the holder of the DID is indeed the authorized party.

Example

A DID might look like this:

did:example:123456789abcdefghi

This string indicates:

  • The method used (example)
  • A unique identifier (123456789abcdefghi)

The method determines how the DID is created and resolved on a specific decentralized system.


Use Cases

  • Digital identity for individuals and organizations
  • Secure and verifiable logins without passwords
  • Device identities in IoT networks
  • Data sharing and access control
  • Verifiable Credentials and digital certifications

Related Concepts

  • DID Document: A JSON-LD file that describes how to use the DID, including public keys and endpoints.
  • Verifiable Credential (VC): A digital credential that can be linked to a DID and verified cryptographically.

Terms & Conditions Privacy - ObjectID is a service provided by SDV Consulting SRLS, VAT: IT 13168650961
We use cookies to personalise content and ads, to provide social media features and to analyse our traffic. We also share information about your use of our site with our social media, advertising and analytics partners. View more
Cookies settings
Accept
Privacy & Cookie policy
Privacy & Cookies policy
Cookie name Active

Comments

When visitors leave comments on the site we collect the data shown in the comments form, and also the visitor’s IP address and browser user agent string to help spam detection.

An anonymized string created from your email address (also called a hash) may be provided to the Gravatar service to see if you are using it. The Gravatar service privacy policy is available here: https://automattic.com/privacy/. After approval of your comment, your profile picture is visible to the public in the context of your comment.

Media

If you upload images to the website, you should avoid uploading images with embedded location data (EXIF GPS) included. Visitors to the website can download and extract any location data from images on the website.

Cookies

If you leave a comment on our site you may opt-in to saving your name, email address and website in cookies. These are for your convenience so that you do not have to fill in your details again when you leave another comment. These cookies will last for one year.

If you visit our login page, we will set a temporary cookie to determine if your browser accepts cookies. This cookie contains no personal data and is discarded when you close your browser.

When you log in, we will also set up several cookies to save your login information and your screen display choices. Login cookies last for two days, and screen options cookies last for a year. If you select "Remember Me", your login will persist for two weeks. If you log out of your account, the login cookies will be removed.

If you edit or publish an article, an additional cookie will be saved in your browser. This cookie includes no personal data and simply indicates the post ID of the article you just edited. It expires after 1 day.

Embedded content from other websites

Articles on this site may include embedded content (e.g. videos, images, articles, etc.). Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website.

These websites may collect data about you, use cookies, embed additional third-party tracking, and monitor your interaction with that embedded content, including tracking your interaction with the embedded content if you have an account and are logged in to that website.

Who we share your data with

If you request a password reset, your IP address will be included in the reset email.

How long we retain your data

If you leave a comment, the comment and its metadata are retained indefinitely. This is so we can recognize and approve any follow-up comments automatically instead of holding them in a moderation queue.

For users that register on our website (if any), we also store the personal information they provide in their user profile. All users can see, edit, or delete their personal information at any time (except they cannot change their username). Website administrators can also see and edit that information.

What rights you have over your data

If you have an account on this site, or have left comments, you can request to receive an exported file of the personal data we hold about you, including any data you have provided to us. You can also request that we erase any personal data we hold about you. This does not include any data we are obliged to keep for administrative, legal, or security purposes.

Where your data is sent

Visitor comments may be checked through an automated spam detection service.

Save settings
Cookies settings