Skip to main content

Access experience pattern

Access Overview

The Access experience pattern leverages digital credentials to simplify and secure the way users access services online or in-person. By utilizing digital credentials stored in a digital wallet, users can seamlessly prove their identity or attributes without relying on traditional usernames and passwords or physical IDs. This approach enhances user convenience and strengthens security across various digital interactions.

How it works Digital Trust Access enables users to securely and seamlessly access services online or in person using verifiable digital credentials. The process involves three key steps: Request, Verify, Access.

Request: The user initiates the process by navigating to the service website and scanning a QR code using their BC Wallet.

Verify: The service requests proof of identity or credentials, which the user reviews and shares through their BC Wallet.

Access: The service validates the credentials via the verifiable data registry and grants the user access to the digital service.

Shows steps through the access pattern

Technology Required:

  • BC Wallet: A secure digital wallet application for storing and managing digital credentials.
  • Digital credential(s): A cryptographically secure and verifiable proof of identity or attributes.
  • Your digital service: The service being accessed, which relies on digital credentials for authentication.

Benefits

Problem: Traditional access methods, such as usernames and passwords, present significant security vulnerabilities and are often cumbersome for people. These methods are prone to data breaches, phishing attacks, and require extensive management for password recovery and updates.

Benefits: Digital credentials address these issues by providing a more secure and user-friendly authentication method. They offer cryptographic assurance, reducing the risk of data breaches and identity theft. Additionally, digital credentials streamline the access process, improving the overall user experience and aligning with best practices in digital identity management.

Suitable use cases

The BC Government offers a variety of solutions for accessing services online or in person, with digital trust and credentials emerging as innovative methods to enhance and complement existing systems. Digital trust solutions provide flexible and secure access, making them suitable for a range of applications.

Consider Digital Trust If:

  • New or Existing Services: Digital trust is valuable for both new and existing services, providing secure access and extending into other experiences like signing, issuing, and messaging through BC Wallet app.
  • Leveraging Existing Credentials: There are existing digital credentials that can be integrated into your service. If your service requires the issuance of a new credential, that is also possible (see the Issue experience pattern.)
  • Team and Buy-in: Your organization has the appropriate team and buy-in to lead the adoption of digital trust, ideally agile teams with an appetite for experimentation and innovation.

For a detailed comparison of B.C.'s identity solutions, visit the Digital Trust website​​.

Technology stacks

There are different digital credential authentication solutions your digital service can leverage.

VC-AuthN & Pathfinder SSOTractionBC Wallet Verify feature
DescriptionVerifiable Credential Authentication via OpenID Connect (VC-AuthN) is ready made using a standardized systemTraction is a customizable digital wallet solution that can both issue, hold and verify digital credentialsMobile verifier is a feature within the BC Wallet app that can authenticate people in-person
DevicesUsed on web and mobileCan integrate with web and mobile applicationsUsed on mobile only
Implementation requirements
  • Quick to implement, integrates easily with current web standards.
  • May require manual management of user roles/permissions, especially if the proof request does not contain any identifiers for returning people
Requires more time and resources to set up as well as ongoing maintenance
  • Quick and easy to set up. No implementation required.
  • Requires manual human verification.
CustomizationLow - Can use existing and customize proof requestsHigh- Can customize flows to meet your needsLow - Can use existing and customize proof requests
Suitability
  • Your service already or easily supports OpenID Connect
  • Quicker turnaround
  • Your access requirements require only a single proof request
Your service needs to scale and integrate with different organizations and services
  • Quicker turnaround
  • Your access requirements require only a single proof request
CapabilitiesCan leverage existing proof requests and digital credentialsCan issue, holder, and verify digital credentials
  • In-person verification
  • No development resources needed

Examples

Below are examples illustrating the Access pattern through a sequence diagram and a real-world case study.

Traction Sequence Diagram Example

The following sequence diagram visualizes the Access pattern using digital credentials using Traction. It demonstrates the process of a person (Holder) accessing a service (Verifier) with a digital credential issued in their BC wallet.

Shows steps through the access pattern

VC-AuthN example - Access to Court Materials

A practical implementation of Access using VC-AuthN is showcased in the justice sector. Lawyers use a combination of digital credentials to access court materials securely, enhancing efficiency and privacy. Watch on YouTube

Get started

1. Align

Assess the suitability of digital trust for your service by considering security requirements, user needs, and the potential benefits. Assemble an agile team ready to innovate and experiment.

Complete the Align phase →

2. Discover

Research user needs and gather insights from stakeholders to understand how digital credentials can enhance user experience and address specific challenges.

Complete the Discover phase →

Proof request design best practices →

3. Trial

Implement and test the digital trust solution, conducting pilot trials to validate the approach and refine the implementation based on feedback.

Complete the Trial phase →

How to implement →

4. Scale

Launch the digital trust solution broadly, monitor its performance, and plan for scaling to cover additional services or a broader user base, ensuring continuous improvement.

Complete the Scale phase (TBD) →

Resources

Contact

For further assistance contact the Digital Trust Team.