Reference

Credential types compared: certificates, badges, licenses, and more

Certificates, badges, licenses, micro-credentials, blockchain-anchored credentials. When to use which, and how Credostar handles each.

May 23, 2026 9 min read By Credostar Team

“Digital credential” is an umbrella term that covers a lot of different artifacts: certificates of completion, professional badges, regulated licenses, blockchain-anchored proofs, signed transcripts. Each has a distinct shape, a distinct verification model, and a distinct set of trade-offs.

This article maps the territory.

The taxonomy

For practical purposes, here is how the credential types decompose:

TypeTypical issuerVerification modelFormat
Paper certificateAnyoneVisual inspection onlyPrinted paper or PDF
Hosted digital badgeBadging platformLookup against vendor’s siteProprietary JSON
OpenBadges 2.0 badgeEducational organizationHosted JSON documentOB 2.0 JSON-LD
W3C Verifiable CredentialAny issuerCryptographic, decentralizedW3C VC JSON-LD
OpenBadges 3.0 badgeEducational organizationCryptographic, decentralizedOB 3.0 = W3C VC profile
Blockchain-anchored credentialAny issuerCryptographic + chain timestampW3C VC + chain anchor
Regulated licenseGovernment or licensing bodyAuthority of the issuing bodyVaries by jurisdiction

The verification model column is the column that actually matters. It tells you whether the credential’s truth depends on the issuer’s infrastructure staying up, on a vendor staying agreeable, or on cryptography that does not need either.

Paper certificates and PDFs

The legacy form. A printed certificate or a PDF with a signature image.

Verification. Visual inspection. The recipient shows the certificate; whoever is looking at it decides whether they believe it. No mathematical proof.

Strengths. Universal in the sense that anyone can produce one and most people accept them at face value. Familiar to recipients.

Weaknesses. Trivially forged. A passable certificate can be produced in twenty minutes with a competent design tool. Cannot be transmitted electronically with any preserved proof of origin. Cannot be partially disclosed (you can show the whole certificate or none of it).

When to use. When the verification stakes are low and the audience is human. A workshop attendance certificate handed out at the end of a one-day event might be paper without much loss.

Hosted digital badges

The first wave of digital credentialing, exemplified by the proprietary formats used by major badging platforms.

Verification. Lookup against the vendor’s website. The badge URL is the proof.

Strengths. Visually appealing. Shareable to LinkedIn. Tracked at the platform level.

Weaknesses. Verification depends on the platform staying online and agreeable. The badge has no off-ramp: move to a different platform and the badge breaks. Recipients do not own the badge in any practical sense; the platform does.

When to use. When you are committed to a specific platform and the credential’s value is roughly contemporary (the badge has value while it is recent; it does not need to verify ten years from now).

OpenBadges 2.0

A proper open specification (1EdTech) with structured metadata, evidence, and alignment to learning frameworks.

Verification. Fetching a hosted JSON document from the issuer’s URL and checking that the issuer matches.

Strengths. Genuinely open. Multiple vendors can issue compatible 2.0 badges. Better metadata than proprietary badges.

Weaknesses. Verification still depends on the JSON document being hosted somewhere reachable. If the issuer’s hosting goes down, verification breaks.

When to use. Where 2.0 is required for ecosystem compatibility (some integrations only accept 2.0 today) but moving to 3.0 should be the default for new issuance.

W3C Verifiable Credentials and OpenBadges 3.0

The current standard. A credential is a structured JSON document with a cryptographic signature. The signature is the verification mechanism; the document does not need to be hosted by the issuer for verification to work.

OpenBadges 3.0 is a profile of W3C VCs for the badge use case. Issuing an OB 3.0 badge means issuing a VC.

Verification. Cryptographic. Any compliant verifier can check the signature against the issuer’s published public key.

Strengths. Recipient-owned, vendor-agnostic, verifiable indefinitely without any specific platform. Standards-compliant by design.

Weaknesses. Adoption is still catching up. Some legacy systems do not yet accept VCs and need a 2.0 or proprietary equivalent.

When to use. Default for all new credentialing programs. Anything you want to still be verifiable in five years should be a VC.

For deeper detail, read What are verifiable credentials? and OpenBadges 3.0 explained.

Blockchain-anchored credentials

A W3C VC where, in addition to the issuer’s cryptographic signature, a hash of the credential is recorded on a public blockchain at the time of issuance.

Verification. Standard VC verification, plus an additional check that the credential’s hash appears on the chain at or before the claimed issuance date.

Strengths. Adds protection against a specific failure mode: the issuer themselves later trying to rewrite history (claiming a credential was issued at a different time, or that a credential was never issued). The chain anchor is independent of the issuer.

Weaknesses. Adds cost (chain transaction fee) and operational complexity. Not necessary unless the use case actually has a threat model where the issuer might be adversarial against their own historical issuance.

When to use. High-stakes credentials where the issuance timestamp must be independently verifiable. Legal credentials, financial certifications, credentials that may be entered in evidence in a regulatory proceeding.

Credostar offers a Blockchain credential tier for this case.

Regulated licenses

Government-issued or licensing-body-issued credentials carrying legal authority. A medical license, an engineering registration, a real-estate license.

Verification. The authority of the issuing body, typically supported by a public registry the body maintains.

Strengths. Carry legal weight. Regulated by law.

Weaknesses. Format and verification mechanism vary widely by jurisdiction. Often paper or PDF, with no cryptographic proof, despite the high stakes.

When to use. When you are the licensing authority. Increasingly, licensing bodies are issuing their credentials as W3C VCs to add cryptographic verifiability on top of the regulatory authority.

Picking the right type

A simple decision tree:

  1. Will this credential matter in five years? If no, paper or hosted-badge is fine. If yes, use a W3C VC (OpenBadges 3.0 if it is a badge).
  2. Will an external party need to verify it independently of you? If yes, W3C VC. If no, almost any format works.
  3. Is the issuance timestamp itself adversarial? If yes (the issuer might later disavow the credential), use a blockchain-anchored VC. If no, standard cryptographic VC is sufficient.
  4. Does this credential carry legal authority? If yes, you are issuing as a licensing body and the credential’s authority comes from that, not from the format. But you should still use a W3C VC so the credential is independently verifiable.

For most modern credentialing use cases, the answer comes back to W3C Verifiable Credentials. Standard ones for typical use, blockchain-anchored for the high-stakes case.

Three credential cards: Standard with cryptographic signature, Premium with branded portal and custom-domain verifier, Blockchain with public-chain anchored issuance proof.

How Credostar handles each

Credostar issues every credential as a W3C VC by default. Three tiers are available:

  • Standard. W3C VC with cryptographic signature. Suitable for the vast majority of credentialing use cases.
  • Premium. Standard VC plus enhanced metadata, custom verification page, branded recipient portal.
  • Blockchain. Standard VC plus public-chain anchoring. For credentials where independent timestamp verification matters.

All three tiers verify as W3C VCs through any compliant verifier. The tier choice is about additional features, not about the format of the credential.

Where to go next

If you are still building intuition for what a VC is, start with What are verifiable credentials?. If you specifically issue badges, read OpenBadges 3.0 explained. If you are weighing the migration from paper, read Digital vs paper credentials.

Ready to issue credentials? Apply for early access to the Credostar Design Partner Program.

FAQ

Common questions

Is a digital certificate the same as a verifiable credential?
Not necessarily. A digital certificate can be a PDF with no verification properties at all. A verifiable credential is specifically the W3C VC format with cryptographic proof. Credostar issues digital certificates as VCs by default.
Do I need blockchain for high-stakes credentials?
Standard cryptographic signing is sufficient for almost every use case. Blockchain anchoring adds an external timestamp that protects against the issuer themselves later disavowing or rewriting history. For credentials where that scenario matters (high-value certifications, legal credentials), blockchain anchoring is a valuable additional layer.
Can a badge be a license?
Conceptually yes. The credential format does not determine the credential's legal status; the issuer and the regulatory context do. A government-issued professional license could be issued as a W3C VC, but its legal weight comes from the issuing authority, not from the credential format.
What is a micro-credential?
Micro-credential is a non-technical term for a small, narrowly-scoped credential. It usually attests to a single skill or short course. Technically, micro-credentials are typically OpenBadges 3.0 badges, but the term itself is about scope, not format.

Be one of our first design partners.

We're onboarding a small group of issuers ahead of our Q3 2026 launch. Help shape the product, get founder-level attention, and lock in launch-day pricing.

Apply for early access