We only use google analytics to monitor web performance, and improve the user experience. You can see our cookie policy, here.


Connector for a decentralized and self-managed Identity



for identity management



Less risks

of security


100% european

Challenge | Return control of identity to its rightful owners

Return control of the identity to its rightful owners, the citizens, organizations and entities they represent.

The migration from the current IdP-based identity system, which is dominated by large multinational technology companies, to a self-sovereign identity system will return control of identity to its rightful owners. The solution has the potential to transform the way we interact online, reduce risks and increase digital security, and promote more robust economic development and a more inclusive society.

It is proposed to create a connector that solves a central problem in the contemporary digital world: identity management in an increasingly decentralized and blockchain-oriented environment. Currently, digital identities are dispersed across numerous systems and platforms, leading to security risks, operational inefficiencies and barriers to innovation. The significance of solving this problem lies in creating a solid bridge between traditional identity systems and innovative decentralized blockchain solutions.

The project | Self-managed and decentralized Identity Solution

The objective of the project is to create a solution that integrates the concept of self-managed and decentralized identity with traditional identity management systems, in compliance with the regulatory framework of eIDAS Regulation, General Data Protection Regulation (GDPR) and UNE 71307-1..

The solution to be developed will be capable of both issuing and verifying verifiable credentials (VC) from the information obtained from a traditional Identity Management System. This will allow the migration to be non-disruptive, and both models can coexist at the same time, which is the main value of the proposal. VCs have multiple use cases due to their advantages in security, privacy and authentication:

Digital ID Verification

Enable users to have more granular control over their personal information and share it in a secure and verifiable way.

Secure Authentication

It can replace or complement traditional password-based login systems.

Digital Credentials

Digital credentials, such as university degrees, professional certificates or licenses, can be stored in a secure and certified manner, facilitating their verification.

Financial Services

Know Your Customer (KYC) and anti-money laundering (AML) processes can benefit from technology to verify the identity of customers.

Age Attestation

Verification of the age of users in applications for the sale of age-restricted products or content.

Digital Citizenship

Simplify online government services, such as applying for passports or voting online.

Health Id. Management

Information can be stored securely, allowing patients to control who has access and simplifying interoperability between healthcare providers.

Property and Physical Assets

It can be used to track and authenticate ownership of physical assets, such as automobiles, real estate and works of art, through digital certificates.

Privacy in RRSS

Gain greater control over their personal data on social networks, choosing what information they share with different platforms and advertisers.

About our client | Incibe

INCIBE, NATIONAL CYBERSECURITY INSTITUTE works to build digital trust, enhance cybersecurity and resilience, and contribute to the digital marketplace in a way that promotes the safe use of cyberspace in Spain.

Nologin has been awarded a contract for this project of Innovative Public Procurement (IPP) INCIBE in the framework of the Recovery, Transformation and Resilience Plan (PRTR) with the funding of the Next Generation EU.

PPI has established itself as an extremely useful tool for promoting innovation and competitiveness from the public authorities, using public demand for products, services and supplies as an instrument for implementing public policies and executing the mandates of purchasing entities.

Identity Services

Standardizes and controls access to infrastructure by increasing security and simplifying management.

Go to Identity

MEM. Module & Entity Management

Automates telecommunication services processes.

Go to MEM

Secure Passwordless Authentication

How to avoid security breaches due to loss of credentials.

Go to Secure Passwordless

Meet tomorrow's challenges with Nologin