Does not have to perform separate identification procedures through, for example, ID copies, video call, SMS and email, or store such information.
Can provide selective services in exchange for requesting and verifying the users’ verifiable credentials with the appropriate level of assurance.