3 min read

Interoperability & Scalable Architecture Under eIDAS 2

Interoperability & Scalable Architecture Under eIDAS 2

The evolution from eIDAS 1to eIDAS 2 brings profound changes for the European digital trust ecosystem — notably, an emphasis on interoperability, user-centric identity, and cross-border service delivery. In the preamble to eIDAS 2 the term “harmonised digital identity” is used to define how identities should be used in a “safe, trustworthy, user-friendly, convenient, accessible and harmonised way, across the Union1”. These changes present strategic opportunities for qualified Trust Service Providers (TSPs) but also demand a re-evaluation of architectural approaches to ensure compliance, scalability, and market relevance. 

The evolution from eIDAS 1 to eIDAS 2 marks a fundamental shift in Europe's digital identity and trust services landscape. At the heart of this transformation is a push for interoperability, user-centricity, and seamless cross-border service deliver. As the EU defines a "harmonised digital identity" experience, Trust Service Providers (TSPs) must reimagine their systems to remain compliant, competitive, and future-ready. 

The first blog in a two-part series explores the strategic architectural implications of eIDAS 2 for TSPs.

The Role of Interoperability in eIDAS 2 

TSPs have long played a foundational role in enabling secure digital interactions across Europe. Now, with eIDAS 2, the scope of trust services is expanding - along with regulatory expectations and user behaviors.

Three key drivers underpin eIDAS 2:

  • Increased access to electronic identity for all EU citizens. 
  • Enhanced trust in the digital identity and signing ecosystem. 
  • Growth in usage and volume of qualified services, including signatures and seals. 

TSPs are well-positioned to lead  — but only if their architectures are designed for interoperability. Without this, services risk fragmentation, escalating cost, and long-term obsolescence. 

The Cost of Non-Interoperable Architectures 

Many first-generation eIDAS implementations have succeeded within national contexts, but they are now showing strain in broader, cross-broader scenarios. Common pitfalls include:

  • Complex signature workflows - often with more than 40 steps.
  • Delayed deployments due to bespoke integrations.
  • High development and compliance costs for every new integration or protocol variation. 
  • Limited scalability and difficulty adapting to future IdPs or supporting services. 

These challenges frequently stem from proprietary lock-in, poor architectural separation of concerns, and ad hoc standard adoption. 

As regulatory and technological complexity grows, these legacy models become harder to maintain - and nearly impossible to scale. 

Eidas Webinar CTA

Mastering eIDAS 2.0: Stay Compliant, Secure and Future-Ready

WATCH ON-DEMAND NOW

A Progressive Architecture for Qualified Signing 

To future-proof trust services, TSPs must evolve from isolated, national architectures toward interoperable, pan-European models.

Baseline: National Remote Signing Model 

Traditionally, remote signing infrastructures - such as Denmark's - rely on:

  • A Signature Portal (aka Signature Creation Application) 
  • Two core interactions: 
    • Request to create a qualified signing credential (signing key + certificate) 
    • Request to create a qualified signature 
  • Two authorisations: 
    • Signing Credential Creation Data (SCCD) for signing credential generation 
    • Signature Activation Data (SAD) for signature generation

Depending on sector needs, these authorisation servers are placed in different parts of the architecture. Typical deployments include:

Example 1: Alongside a national IdP (common in public sector ecosystems) 

 

Example 2: Alongside the signature portal (convenient for private sector implementation like banking, financial services and insurance but inflexible) 

 

 Example 3: Within the TSP environment (most suitable for extensibility) 

 

Interoperable Model 

The TSP-centric authorisation model aligns most closely with the vision of eIDAS 2. It supports:  

  • Standardised interfaces to external parties (IdPs, portals) via OIDC, SAML, eIDAS eID Profile, and CSC 
  • Flexible connectivity to multiple identity schemes and portals 
  • Proprietary complexity contained internally, e.g. authorisation mechanisms 

This model allows TSPs to integrate efficiently while remaining agile, adaptable, and secure.

Scaling Across Member States 

Assume a scenario where TSPs in Denmark, Belgium, and Italy each implement this interoperable model: 

  • All accept CSC-based signing credential and signature requests. 
  • All support identity via standard protocols (OIDC, SAML, eIDAS eID Profile). 
  • All host their own authorisation servers. 

This setup enables any Signature Portal across the EU to interact with any TSP - supporting: 

  • Signing credential issuance 
  • Signature creation, and
  • Potential signing key certification via cross-border CAs 

Importantly, local variation in user authentication and authorisation mechanisms does not hinder interoperability — as long as standard interfaces are respected.  

Crucially, the differences in local identity mechanisms don't prevent interoperability - as long as standard interfaces are respected. 

eIDAS 2 challenges the status quo but creates massive opportunity. For TSPs, the mandate is clear: design for interoperability, scalability and regulatory alignment.

In part 2, we'll dive into the enabling technologies of eIDAS 2 - including EUDI Wallets, new trust service categories, and generalized signing models designed for maximum flexibility. 

Stay tuned....


Register For Our French Webinar: