Menu

Menu

Menu

Insights

Insights

Why the intermediary is the way forward for trusted and compliant digital identity

Sep 12, 2025

Maïlys Mas

Digital identity is no longer a vision. It is here. Europe is leading with eIDAS 2.0, which will take effect in just a few months. From the European Digital Identity Wallet (EUDIW) to Aadhaar in India and mobile driver’s licenses (mDL) in the United States, billions of people are moving their identity into smartphones.

This shift promises instant access and convenience, and it is already underway:

  • India: more than 1.4 billion people use Aadhaar daily.

  • Europe: the EUDI Wallet rollout is mandated by eIDAS 2.0, with adoption expected to reach 80% by 2030.

  • United States: 143 million people projected to use mobile driver’s licenses by 2030.

  • Africa: countries like Nigeria and Kenya expanding national digital ID programs.

By 2029, more than 1.9 billion people worldwide will rely on digital identity every day (Goode Intelligence).

For businesses, the question is not if digital identity will arrive, but how to connect to it securely and compliantly. Today’s infrastructure is fragmented, costly, and prone to fraud. What’s missing is the equivalent of a grid for identity: a trusted layer that ensures each interaction is legitimate, secure, and compliant. That role is the intermediary.

Intermediaries: A proven concept in every industry

Intermediaries are not new. They exist wherever complexity must be managed and trust must be enforced. Finance, real estate, logistics, and travel all rely on them. Without intermediaries, these industries would collapse into inefficiency.


Industry

Intermediary Role

Core Functions

Strategic Value

Finance

Banks, stock exchanges

Match borrowers/lenders, manage liquidity

Efficient capital flow, stability

Real Estate

Agents, brokers

Property valuation, legal oversight

Trusted transactions, reduced risk

Supply Chain

Logistics hubs, distributors

Storage, distribution, order fulfillment

Cost/time efficiency, market reach

Travel

Booking platforms

Aggregation, payment, customer assurance

Accessibility, global scalability

Identity has reached the same point of maturity. It now requires its own intermediary role.

The digital identity ecosystem today, and what’s missing

The digital identity ecosystem has strong foundations:

  • Issuers: Governments and private bodies create eIDs

  • Wallets: Citizens hold and use their credentials

  • Relying parties: Businesses need to verify customers

  • IDV providers: Use traditional methods such as document checks and biometrics to verify identity

  • Brokers/aggregators: Connect issuers, wallets, and relying parties by relaying data, but don't guarantee the full chain

IDV providers and brokers have limits in the world of eIDs and wallets. IDVs rely on traditional methods like document checks and biometrics. Brokers act like pipes: passing information along without necessarily verifying and validating each step of the process. At a global scale it creates risks, engineering debts, and compliance failures.

Digital identity needs more than connection. It needs validation and assurance. That’s where intermediaries come in.

What is an intermediary in identity?

The eIDAS 2.0 Architecture and Reference Framework (ARF) defines intermediaries as a special class of relying party. They are neutral actors that request attributes from wallets on behalf of businesses, verify the authenticity and status of credentials, and immediately delete the data after use.


eIDAS 2.0 Architecture Reference Framework — 3.11 Relying Parties and intermediaries

In practice, this makes intermediaries the trust layer of digital identity. Unlike brokers or relays that only transmit, intermediaries validate every action in the chain: confirming issuers, verifying holders, and ensuring relying parties are authorized. Each interaction is signed, timestamped, and auditable.

Intermediaries are to identity what Visa and Mastercard are to payments

Banks issue cards, cardholders use them, and merchants accept them. But the system only works because a neutral network like Visa or Mastercard sits in the middle: verifying, routing, and securing each transaction without holding the funds themselves.

Intermediaries in identity play the same role:

  • Issuers create credentials

  • Holders present them

  • Relying Parties need to verify and accept them

  • Intermediaries are the neutral trust layer that validates every exchange, without storing the data

It’s what makes the whole system usable and secure at scale.

Why intermediaries matter for companies

For businesses, intermediaries are not a future luxury, they are a present necessity:

  • Every relying party request is verified

  • Every user action is cryptographically signed and timestamped

  • Data is returned both normalized for business use and as original credential data with evidence for audits

  • Compliance is enforced automatically through standards (e.g., ACR/AMR values to retrieve the Level of Assurance)

In short: intermediaries transform digital identity from isolated connections into a verifiable, compliant, and auditable framework. For companies in regulated industries, this means fewer risks, faster onboarding, and compliance readiness for the future.

Hopae Connect: The trusted intermediary for digital identity

Hopae Connect — following its partnership with INCERT GIE — is aiming to become a pioneer intermediary service in Europe. In other words Hopae Connect is becoming the identity grid of the digital economy. It doesn’t replace issuers, wallets, or relying parties, but it adds the missing assurance layer.

Every action, whether initiated by a relying party or approved by a holder, is validated. The relying party is checked, the user’s credentials is verified, their consent is cryptographically signed, and the exchange is timestamped. Nothing is stored, but everything is secured.

What enterprises gain with Hopae Connect

  • Global coverage: accept 100+ eIDs and wallets across Europe, the U.S., LATAM, and Asia

  • Data normalization: tones of eID formats unified into a single schema

  • Level of Assurance enforcement: compliance with eIDAS 2.0, AML, and GDPR built in

  • Credential validation: Hopae Connect decodes the credential response and verifies its status with the Trust Registry

  • Evidence integrity: Hopae returns both the normalized data (for business use) and the original credential data with evidence, so relying parties can trust and audit every exchange

Conclusion: The shift to intermediaries is inevitable

By 2029, billions will rely on digital identity every day. Without intermediaries, businesses face fragmented integrations, rising fraud risks, and compliance exposure.

Every other industry already relies on intermediaries to scale and build trust. Now, digital identity has one too.

Hopae Connect is that intermediary

Learn more about how it can secure and scale your eID integration!

Or request a demo today.