Business Use Case
Access Management with Self-Sovereign Identity
- Conventional access management systems are problematic and pose security risks, and are also costly, time-consuming, and not user-friendly.
- Self-Sovereign Identity (SSI) can be used to link access rights with self-managed identities stored on a tamper-proof blockchain, reducing the risk of lost or stolen access rights, and simplifying access management.
- SSI-supported access management can also reduce redundancy, eliminate bureaucratic structures, and simplify the revocation of access rights.
Companies assign physical access and digital access rights through internal access management. However, conventional systems for accreditation are problematic. Typically, access to a building is gained using non-verified identities, creating a security risk. Digital access rights also pose a risk, as it remains unclear whether the user is really the person authorised to access the building. In addition to security concerns, administration as well as control are costly, time-consuming and not very user-friendly. Conventional access management is therefore no longer up to date and is increasingly being put to the test.
Security through blockchain technology and private wallet
of new interfaces
Secure and Contactless Room Access
1. Security through blockchain technology and private wallet
- In conventional access management, identities have to be legitimised and access authorisations issued in a time-consuming process. This procedure is gone through by new employees as well as external guests in order for them to receive access rights. Organizers of trade shows and events also follow this conventional and time- consuming approach to access management. However, the risk of access rights being passed on or lost exists at all times.
- This is where Self-Sovereign Identity comes in, making access management more efficient and secure by linking access rights with self-managed identities. Verification of personal information no longer takes place within the company or by the event organisers themselves. New employees, guests or visitors to events and trade fairs provide already legitimised certificates that are stored tamper-proof on a blockchain. Legitimation was carried out in advance by independent third parties such as banks or authorities. In the next step, the access rights can be linked to the digital identity so companies can be sure that the owner and the authorised person are identical.
2. Creation of new interfaces
Further arguments for implementing SSI in access management are the reduction of redundancy and the elimination of bureaucratic structures. Verification processes are lengthy and require significant human resources.
An SSI platform speeds up the assignment of authorisations, enables automatic processing and simplifies the revocation of access rights. The event industry in particular benefits from SSI-supported account management. Similar to the accreditation process for air travel, users can check in online themselves and submit the necessary data. Non- transferable tickets are thus assigned to a unique identity and disclosure is effectively prevented.
3. Secure and Contactless Room Access
Traditionally, hotels use keycards or physical keys for room access, which can be lost or stolen, leading to security concerns. With SSI and access management, hotels can implement secure and contactless room access that provides greater security and convenience for guests.
Using an SSI platform, guests can store their identity data, including personal information and access rights, on a decentralized platform. The guest can then use their smartphone or a wearable device to access their room, eliminating the need for a physical key or keycard.
Self-Sovereign Identity (SSI) provides efficient and secure access management by linking access rights with self-managed identities stored on a tamper-proof blockchain. This reduces the risk of lost or stolen access rights.
SSI-supported access management can reduce redundancy, eliminate bureaucratic structures, and simplify the revocation of access rights.