Technical
12 min read

Step by Step: How to Integrate with the EUDI Wallet

A practical step-by-step methodology for organisations to plan, build, and roll out EUDI Wallet integration to meet eIDAS 2.0 compliance requirements by December 2027.
Published on
April 29, 2025

eIDAS 2.0 is a regulation with binding compliance mandates and specific technical requirements for organisations whose operations fall within its scope. Large online platforms, regulated financial institutions, and public sector bodies face legal obligations to accept and process EUDI Wallet credentials by December 2027. These requirements bring significant technical implementation challenges that most organisations haven't encountered before.

At Vidos, we help organisations navigate eIDAS 2.0 compliance through technical verification infrastructure, training and enablement workshops, and strategic guidance for digital identity transformation. Our platform provides the cryptographic verification capabilities needed to accept EUDI Wallet credentials, while our consulting approach helps enterprises plan and execute systematic integration programmes.

When we work with enterprises preparing for eIDAS 2.0 compliance, we follow a structured approach to EUDI Wallet integration. The process starts with regulatory discovery, moves through gap analysis, and ends with systematic rollout across systems.

Here's the methodology to get your organisation ready for the December 2027 compliance deadline.

Step 1: Map Your Regulatory Obligations

Before getting technical, establish exactly what eIDAS 2.0 requires from your organisation. The regulation affects different entities in different ways.

Large Online Platforms (45+ million EU users annually) must accept EUDI Wallet credentials for user authentication and identity verification.

Regulated Financial Institutions must integrate EUDI Wallet support for Strong Customer Authentication under PSD2.

Public Sector Bodies will need to work with their national EUDI Wallet as Member States roll them out from December 2026.

Document these requirements with specific reference to the regulation text. This becomes your compliance baseline and helps justify budget allocation for the integration project.

Step 2: Audit Current Identity Systems

Next, map your existing identity verification and identity and access management architecture. This reveals where EUDI Wallet integration points need to be built.

Examine:

  • User onboarding and KYC processes
  • Document verification and identity proofing workflows
  • Age verification systems for restricted content or services
  • Multi-factor authentication and Strong Customer Authentication (SCA) flows
  • Single sign-on (SSO) and customer authentication portals
  • Employee access control and authorisation systems
  • Cross-border user verification procedures
  • Third-party identity provider integrations
  • Audit and compliance reporting systems

The audit identifies which systems handle identity data, how that data flows through your organisation, and where regulatory compliance gaps exist. Most enterprises discover they have identity verification scattered across multiple applications and services, requiring coordination across several teams and technology domains.

Step 3: Identify Integration Points and Gaps

With your regulatory requirements and current systems mapped, identify specific gaps that need addressing:

Protocol Support: Most systems don't support OpenID4VP (OpenID for Verifiable Presentations), the core protocol for EUDI Wallet integration.

Credential Verification: Your applications likely can't verify cryptographic signatures from digital credentials.

Data Minimisation: Current systems often collect more personal data than eIDAS 2.0 permits, requiring changes to data collection and processing.

Cross-Border Support: Existing identity flows typically can't handle credentials from multiple Member States.

Quantify these gaps in terms of development effort, compliance risk, and business impact. This analysis becomes your prioritised roadmap for integration work and forms the business case for required investment.

Step 4: Define Your Technical Architecture Strategy

With gaps identified, make critical technical architecture decisions before beginning implementation work.

Buy vs Build Decision: Most organisations need to decide whether to build EUDI Wallet verification capabilities internally or integrate existing solutions. Building requires hiring cryptographic expertise, ongoing maintenance of security libraries, and dedicated resources to keep pace with evolving standards. Purchasing established verification infrastructure typically reduces implementation time and compliance risk while allowing internal teams to focus on core business systems.

Key Management Strategy: EUDI Wallet integration requires robust cryptographic key management for verifying credential signatures and managing trusted issuer lists. Define how your organisation will handle certificate storage, key rotation, and trusted list updates from Member States.

Integration Architecture: The approach depends on your existing systems architecture. Options include direct API integration, SDK embedding, or service mesh patterns. Evaluate factors like latency requirements, security boundaries, and operational complexity to determine the optimal approach.

Verification Infrastructure: Determine your verification architecture, including how many verifier, authorizer, validator services will be required and what the requirements are around security posture, compliance and audit capabilities.

Scalability and Performance Requirements: EUDI Wallet verification must handle your peak user volumes without degrading user experience. Model expected verification loads and design infrastructure that scales appropriately to avoid customer impact.

These architectural decisions shape your entire implementation approach and affect long-term operational costs and compliance risk.

Step 5: Select Your Proof of Concept Application

Rather than attempting organisation-wide integration immediately, start with a single application that offers the highest chance of success.

Ideal PoC candidates have:

  • Simple identity verification requirements
  • Manageable user volumes for testing
  • Clear success metrics
  • Limited integration complexity
  • Stakeholder support for experimentation

Common choices include employee access systems, customer portals, business processes that rely on traditional identity verification, or specific compliance workflows. The goal is proving the integration approach works before scaling it across your entire technology estate.

Step 6: Build the Proof of Concept

The PoC focuses on core EUDI Wallet integration capabilities:

OpenID4VP Implementation: Handle presentation requests and wallet responses for basic identity attributes.

Credential Verification: Verify cryptographic signatures and check issuer authenticity using trusted lists.

User Experience Design: Create wallet integration flows that work alongside existing authentication methods.

Data Processing Compliance: Implement GDPR-compliant handling of credential data with proper consent management.

Build these capabilities incrementally, testing each component as development progresses. This reduces risk and allows for course correction if issues arise.

Step 7: Test with Available Pilot Wallets

Several Member States already provide pilot EUDI Wallets for testing. Connect your PoC to environments that follow the latest version of the Architecture Reference Framework (ARF) to validate the integration:

Look for pilot wallets that implement current ARF specifications and standards. The EU Digital Identity Wallet Architecture Reference Framework provides the technical foundation that production wallets will follow.

If your requirements are heavily weighted towards one specific Member State (where most of your users are based), prioritise testing with that country's wallet implementation and development status.

Testing reveals integration issues early and helps refine your user experience before production launch.

Step 8: Measure and Learn

The PoC generates data about integration complexity, user adoption, and system performance. Measure:

  • Technical implementation effort versus initial estimates
  • User completion rates for wallet-based verification
  • System performance under realistic load conditions
  • Compliance coverage for your specific regulatory requirements

These metrics inform the broader rollout strategy and help secure additional resources if needed.

Step 9: Plan Systematic Rollout

With a successful PoC completed, develop a phased rollout plan for your remaining systems. This systematic approach reduces business risk while ensuring compliance deadlines are met:

Phase 1: Customer-facing applications with high identity verification volumes  
Phase 2: Internal systems and employee access controls  
Phase 3: Legacy applications and complex integration scenarios

Each phase builds on lessons learned from previous deployments, allowing you to refine processes and avoid repeating mistakes across your technology estate. Plan for 12-18 months total implementation time depending on system complexity and organisational size.

Step 10: Prepare for Production Launch

As Member States launch production EUDI Wallets in 2026, transition from pilot testing to live operations:

  • Update integrations to use production wallet endpoints
  • Implement monitoring and alerting for wallet verification failures
  • Train support teams on troubleshooting wallet-related issues
  • Develop fallback procedures if wallet verification is unavailable

Step 11: Maintain Compliance and Adapt

eIDAS 2.0 implementation will evolve as Member States refine their approaches. You should establish processes for:

  • Monitoring regulatory updates and technical specification changes
  • Testing new credential types as they become available
  • Updating integrations to support additional Member State wallets
  • Measuring compliance coverage and identifying gaps

Managing these ongoing compliance requirements requires dedicated expertise and continuous monitoring. Vidos handles these updates automatically, ensuring your integration stays current with evolving standards and regulatory changes without requiring ongoing engineering resources from your team.

Key Takeaways for Leadership

EUDI Wallet integration affects multiple systems across most organisations and requires coordination between compliance, security, and engineering teams. Starting with a focused proof of concept allows you to understand the technical challenges and resource requirements before committing to enterprise-wide rollout.

The December 2027 deadline gives organisations approximately two years to complete integration work. Given the complexity of enterprise systems and the need for thorough testing, starting regulatory discovery and technical planning in 2025 is essential for meeting compliance requirements.

Ready to begin your eIDAS 2.0 compliance planning?
Contact our team to schedule a regulatory requirements workshop and system audit.

Receive our newsletter
Sign up for our monthly round up of industry updates, regulatory developments across the EU & UK, and news from Vidos.

Want to learn more?
Download our guide:

The Evolution of Digital Identity

As we delve into the history, milestones, case studies, and future directions of digital identity, this guide aims to provide a comprehensive overview of its evolution. Through this exploration, we hope to shed light on the importance of digital identity in shaping our digital futures, preparing us for the next chapter in this ever-evolving narrative.
Dashboard mockup