BAN444 Digital Identity Management: Technology and Applications
Spring 2026
Autumn 2025-
Topics
Effective identity management is crucial for secure organizational processes, yet many organizations fail to approach it strategically. Instead, they rely on usernames and passwords or social logins, which are often tedious and insecure. New technological solutions aim to address these issues, either by narrowly focusing on authentication (e.g., passkeys) or identification (e.g., national eIDs), or with a much broader scope (e.g., European digital identity wallets). In this course, we unpack the limitations of traditional digital identity management and discuss the opportunities and challenges of these emerging technological solutions, with a focus on national eIDs and digital identity wallets for individuals and organizations ("business wallets").
The purpose of this course is to introduce students to the key questions of digital identity management. It will begin with an introduction to the technical building blocks, including public key cryptography and digital signatures. We will then identify end-user and organizational requirements, and map traditional identity management solutions against those requirements. The second part of the course will then focus on European digital identity wallets. By extracting their key benefits and challenges, students will learn where and how they can create value. The course will answer questions such as:
- What is the feature scope of digital identity management solutions?
- What are the core technical building blocks of digital identity management solutions?
- What are the benefits and challenges of today’s digital identity management solutions?
- Where can digital identity wallets make a difference and how?
- What are zero-knowledge proofs, and how can they improve data protection in digital identity wallets?
-
Learning outcome
Upon successful completion of the course, the students:
Knowledge
- Understand the core features of digital identity management solutions
- Understand the role of public key cryptography and, in particular, digital signatures in modern digital identity management
- Understand the key requirements for digital identity management solutions in the private and public sector
- Understand the limitations of traditional digital identity management solutions
- Understand the economic potential of improved digital identity management solutions in general and of digital identity wallets in particular
- Understand deployment challenges for digital identity wallets
- Understand privacy requirements of modern digital identity solutions and how zero-knowledge proofs can address them
- Understand the relationship between digital identity management and other emerging technologies:
- Understand how artificial intelligence (AI) can benefit from digital identity management,
- Understand how digital identity wallets can contribute to combating (AI-generated) disinformation on social media platforms
- Understand the impact of digital identity management solutions on the Internet of Things (IoT)
- Understand the relationship between digital identity management and other emerging technologies such as artificial intelligence, blockchain, and quantum computing
Skills
- Can recognize misconceptions about technical, economic, and organizational aspects of digital identity management solutions
- Can identify use cases that can benefit from digital identity wallets
- Can identify the key opportunities and challenges associated with digital identity wallets
General competencies
- Understand the role of digital identity management for secure organizational processes
- Can map different identity management solutions to the specific requirements of different application contexts
-
Teaching
This course combines lectures and tutorials on the use of digital signatures and digital identity wallets. Students are encouraged to bring a laptop running Adobe Acrobat Reader and a mobile phone running Android or iOS.
-
Recommended prerequisites
Basic programming experience in one of the popular higher-level programming languages, such as Python, C/C++, Java, Kotlin, JavaScript, Go, and others.
-
Credit reduction due to overlap
None.
-
Compulsory Activity
Mandatory attendance in at least 60% of the lectures.
-
Assessment
Term paper (4000 words) within one month after the final lecture. Depending on the course size, these term papers may also be written in groups of two or three students, with corresponding length adjustments.
-
Grading Scale
Pass-Fail
-
Computer tools
Adobe Acrobat Reader.
-
Literature
- Anderson, Ross (2011). "Can we fix the security economics of federated authentication?"
In: Proceedings of the 19th International Workshop on Security Protocols, pp. 25-32.
https://www.doi.org/10.1007/978-3-642-25867-1_4 https://www.doi.org/10.1007/978-3-642-25867-1_4 - Feulner, Simon, Johannes Sedlmeir, Vincent Schlatt, and Nils Urbach (2022). Exploring the use of self-sovereign identity for event ticketing systems. Electronic Markets, 32(3), 1759-1777.
https://doi.org/10.1007/s12525-022-00573-9 https://doi.org/10.1007/s12525-022-00573-9 - Glöckler, Jana, Johannes Sedlmeir, Muriel Frank, and Gilbert Fridgen (2023). "A systematic review of identity and access management requirements in enterprises and potential contributions of self-sovereign identity". Business & Information Systems Engineering.
https://doi.org/10.1007/s12599-023-00830-x https://doi.org/10.1007/s12599-023-00830-x - Kudra, Andre, Alexander Rieger, Johannes Sedlmeir, Tamara Roth, Gilbert Fridgen, and Amber Young (2025). Digital identity wallets: A guide to the EU’s new identity model. Information Systems Journal.
https://doi.org/10.1111/isj.70009 https://doi.org/10.1111/isj.70009 - Lacity, Mary and Erran Carmel (2022). "Self-sovereign identity and verifiable credentials in your digital Wallet". In: MIS Quarterly Executive 21 (3).
https://doi.org/10.17705/2msqe.00068 https://doi.org/10.17705/2msqe.00068 - Lacity, Mary, Erran Carmel, Amber Grace Young, and Tamara Roth (2023). "The quiet corner of Web3 that means business". MIT Sloan Management Review 64 (3).
https://sloanreview.mit.edu/article/the-%20quiet-%20corner-%20of-%20web3-that-means-business/ https://sloanreview.mit.edu/article/the- quiet- corner- of- web3-that-means-business/ - Lassak, Leona, Elleen Pan, Blase Ur, and Maximilian Golla (2024). "Why aren’t we using Passkeys? Obstacles companies face deploying FIDO2 passwordless authentication". In: USENIX Security Symposium.
https://www.usenix.org/system/files/sec24summer-prepub-618-lassak.pdf https://www.usenix.org/system/files/sec24summer-prepub-618-lassak.pdf - Maler, Eve and Drummond Reed (2008). The venn of identity: Options and issues in federated identity management. IEEE Security & Privacy, 6(2), 16-23.
https://doi.org/10.1109/MSP.2008.50 https://doi.org/10.1109/MSP.2008.50 - McKinsey & Company (2020). Digital ID: The opportunities and the risks.
https://www.mckinsey.com/industries/financial-services/our-insights/banking-matters/digital-id-the-opportunities-and-the-risks https://www.mckinsey.com/industries/financial-services/our-insights/banking-matters/digital-id-the-opportunities-and-the-risks - Miebach, Michael (2023). "The crucial role of ID verification in the digital economy". Harvard Business Review.
https://hbr.org/2023/09/the-crucial-role-of-id-verification-in-the-digital-economy https://hbr.org/2023/09/the-crucial-role-of-id-verification-in-the-digital-economy - Podda, Emanuela, Pol Hölzmer, Alexandre Amard, Johannes Sedlmeir, and Gilbert Fridgen (2025). The impact of zero-knowledge proofs on data minimisation compliance of digital identity wallets. Internet Policy Review, 14(3).
https://doi.org/10.14763/2025.3.2019 https://doi.org/10.14763/2025.3.2019 - Preukschat, Alex, and Drummond Reed. (2021). Self-Sovereign Identity: Decentralized digital identity and verifiable credentials. Manning Publications Co.
- Rieger, Alexander, Tamara Roth, Johannes Sedlmeir, Gilbert Fridgen, Amber Young (2024). Organizational identity management policies. Journal of the Association for Information Systems, 25(3), 522-527.
https://doi.org/10.17705/1jais.00887 https://doi.org/10.17705/1jais.00887 - Schlatt, Vincent, Johannes Sedlmeir, Simon Feulner, and Nils Urbach (2022). "Designing a framework for digital KYC processes built on blockchain-based self-sovereign identity". Information & Management 59 (7).
https://doi.org/10.1016/j.im.2021.103553 https://doi.org/10.1016/j.im.2021.103553 - Sedlmeir, Johannes, Tom Barbereau, Jasmin Huber, Linda Weigl, and Tamara Roth (2022). Transition pathways towards design principles of self-sovereign identity. In: Proceedings of the 43rd International Conference on Information Systems.
https://aisel.aisnet.org/icis2022/is_implement/is_implement/4/ https://aisel.aisnet.org/icis2022/is_implement/is_implement/4/ - Sedlmeir, Johannes, Reilly Smethurst, Alexander Rieger, and Gilbert Fridgen (2021). Digital identities and verifiable credentials. Business & Information Systems Engineering, 63, 603-613.
https://doi.org/10.1007/s12599-021-00722-y https://doi.org/10.1007/s12599-021-00722-y - Sedlmeir, Johannes, Alexander Rieger, Tamara Roth, and Gilbert Fridgen (2023). Battling disinformation with cryptography. Nature Machine Intelligence 5, 1056-1057.
https://doi.org/10.1038/s42256-023-00733-2 https://doi.org/10.1038/s42256-023-00733-2
Overview
- ECTS Credits
- 2.5
- Teaching language
- English.
- Teaching Semester
Spring. Offered spring 2026 (first week of the semester).
Course responsible
Dr. Alexander Rieger, Sam M. Walton College of Business, University of Arkansas.
Dr. Johannes Sedlmeir, Acting Professor of Statistics, Security & Trust, University of Münster (Main course responsible).
Associate Professor Iver Bragelien, Department of Business and Management Science (contact person).