
The evolution from eIDAS 1to eIDAS 2 brings profound changes for the European digital trust ecosystem — notably, an emphasis on interoperability, user-centric identity, and cross-border service delivery. In the preamble to eIDAS 2 the term “harmonised digital identity” is used to define how identities should be used in a “safe, trustworthy, user-friendly, convenient, accessible and harmonised way, across the Union1”. These changes present strategic opportunities for qualified Trust Service Providers (TSPs) but also demand a re-evaluation of architectural approaches to ensure compliance, scalability, and market relevance.
The evolution from eIDAS 1 to eIDAS 2 marks a fundamental shift in Europe's digital identity and trust services landscape. At the heart of this transformation is a push for interoperability, user-centricity, and seamless cross-border service deliver. As the EU defines a "harmonised digital identity" experience, Trust Service Providers (TSPs) must reimagine their systems to remain compliant, competitive, and future-ready.
The first blog in a two-part series explores the strategic architectural implications of eIDAS 2 for TSPs.
The Role of Interoperability in eIDAS 2
TSPs have long played a foundational role in enabling secure digital interactions across Europe. Now, with eIDAS 2, the scope of trust services is expanding - along with regulatory expectations and user behaviors.
Three key drivers underpin eIDAS 2:
- Increased access to electronic identity for all EU citizens.
- Enhanced trust in the digital identity and signing ecosystem.
- Growth in usage and volume of qualified services, including signatures and seals.
TSPs are well-positioned to lead — but only if their architectures are designed for interoperability. Without this, services risk fragmentation, escalating cost, and long-term obsolescence.
The Cost of Non-Interoperable Architectures
Many first-generation eIDAS implementations have succeeded within national contexts, but they are now showing strain in broader, cross-broader scenarios. Common pitfalls include:
- Complex signature workflows - often with more than 40 steps.
- Delayed deployments due to bespoke integrations.
- High development and compliance costs for every new integration or protocol variation.
- Limited scalability and difficulty adapting to future IdPs or supporting services.
These challenges frequently stem from proprietary lock-in, poor architectural separation of concerns, and ad hoc standard adoption.
As regulatory and technological complexity grows, these legacy models become harder to maintain - and nearly impossible to scale.
Mastering eIDAS 2.0: Stay Compliant, Secure and Future-Ready
A Progressive Architecture for Qualified Signing
To future-proof trust services, TSPs must evolve from isolated, national architectures toward interoperable, pan-European models.
Baseline: National Remote Signing Model
Traditionally, remote signing infrastructures - such as Denmark's - rely on:
- A Signature Portal (aka Signature Creation Application)
- Two core interactions:
- Request to create a qualified signing credential (signing key + certificate)
- Request to create a qualified signature
- Two authorisations:
- Signing Credential Creation Data (SCCD) for signing credential generation
- Signature Activation Data (SAD) for signature generation
Depending on sector needs, these authorisation servers are placed in different parts of the architecture. Typical deployments include:
Example 1: Alongside a national IdP (common in public sector ecosystems)
Example 2: Alongside the signature portal (convenient for private sector implementation like banking, financial services and insurance but inflexible)
Example 3: Within the TSP environment (most suitable for extensibility)
Interoperable Model
The TSP-centric authorisation model aligns most closely with the vision of eIDAS 2. It supports:
- Standardised interfaces to external parties (IdPs, portals) via OIDC, SAML, eIDAS eID Profile, and CSC
- Flexible connectivity to multiple identity schemes and portals
- Proprietary complexity contained internally, e.g. authorisation mechanisms
This model allows TSPs to integrate efficiently while remaining agile, adaptable, and secure.
Scaling Across Member States
Assume a scenario where TSPs in Denmark, Belgium, and Italy each implement this interoperable model:
- All accept CSC-based signing credential and signature requests.
- All support identity via standard protocols (OIDC, SAML, eIDAS eID Profile).
- All host their own authorisation servers.
This setup enables any Signature Portal across the EU to interact with any TSP - supporting:
- Signing credential issuance
- Signature creation, and
- Potential signing key certification via cross-border CAs
Importantly, local variation in user authentication and authorisation mechanisms does not hinder interoperability — as long as standard interfaces are respected.
Crucially, the differences in local identity mechanisms don't prevent interoperability - as long as standard interfaces are respected.
eIDAS 2 challenges the status quo but creates massive opportunity. For TSPs, the mandate is clear: design for interoperability, scalability and regulatory alignment.
In part 2, we'll dive into the enabling technologies of eIDAS 2 - including EUDI Wallets, new trust service categories, and generalized signing models designed for maximum flexibility.
Stay tuned....
Register For Our French Webinar: