Survey questions & data
Full question text, aggregated response data in table form, and write-in responses. Use the summary report for charts and narrative.
Section 1: Platform Context & Role
Which best describes your platform's primary role?
Select all that apply
| Response | Count | % |
|---|---|---|
| Credential issuer | 35 | 81% |
| Credential wallet | 21 | 49% |
| Credential verifier | 17 | 40% |
| Credential repository | 16 | 37% |
| Talent / employer-facing platform | 15 | 35% |
| Learning platform (LMS, LXP, SIS) | 6 | 14% |
Write-in responses (5)
- "Ecosystem"
- "Working platform"
- "College and Career Readiness Platform"
- "Assessment platform"
- "Upskilling, End-to-end LER Ecosystem"
Section 1: Platform Context & Role
Which credential formats does your platform currently support?
Select all that apply
| Response | Count | % |
|---|---|---|
| Open Badges (v3.0) | 32 | 74% |
| Open Badges (v2.0) | 30 | 70% |
| PDF / document-based credentials | 20 | 47% |
| W3C Verifiable Credentials | 19 | 44% |
| Comprehensive Learner Record (CLR) Standard™ | 13 | 30% |
| Proprietary credential formats | 8 | 19% |
| European Digital Credentials for Learning (EDC) | 4 | 9% |
Write-in responses (4)
- "Blockcerts"
- "LER-RS"
- "https://docs.learncard.com/introduction/interoperability"
- "blockcerts"
Section 1: Platform Context & Role
Which sectors do you primarily serve?
Select all that apply
| Response | Count | % |
|---|---|---|
| Higher education | 35 | 81% |
| Workforce development | 31 | 72% |
| Corporate training / L&D | 22 | 51% |
| Employers | 22 | 51% |
| Learner-facing / consumer | 21 | 49% |
| K–12 | 19 | 44% |
| Talent management / HR tech | 17 | 40% |
| Government / licensing | 15 | 35% |
Write-in responses (3)
- "FURTHER EDUCATION"
- "General purpose W3C VC platform."
- "Current and Former Military Service Members"
Section 2: Credential Inbound APIs
How does your platform receive credentials from external systems?
Select all that apply
| Response | Count | % |
|---|---|---|
| File upload (JSON, PDF, ZIP, etc.) | 26 | 60% |
| API-based transfer | 23 | 53% |
| URL-based retrieval | 18 | 42% |
| Credential wallet connection | 16 | 37% |
| Manual entry | 14 | 33% |
| We do not ingest external credentials | 9 | 21% |
Write-in responses (5)
- "DID services"
- "https://docs.learncard.com/how-to-guides/connect-systems"
- "One-click Import"
- "Today Brightspace is more often the source or trigger of credentials, but we do have and expect the above selected methods."
- "Streamset, batch--whatever is happening in an IHE"
Section 2: Credential Inbound APIs
Which APIs or protocols do you currently use to ingest credentials?
Select all that apply
| Response | Count | % |
|---|---|---|
| Open Badges / CLR API | 20 | 47% |
| W3C Verifiable Credentials API (VC-API / VCALM) | 13 | 30% |
| Proprietary API (please describe in Other) | 11 | 26% |
| Credential Handler API (CHAPI) | 9 | 21% |
| OpenID for Verifiable Presentations (OID4VP) | 8 | 19% |
| OpenID for Verifiable Credential Issuance (OID4VCI) | 5 | 12% |
| W3C Digital Credentials API | 5 | 12% |
| DIDComm | 4 | 9% |
| Not sure | 4 | 9% |
Write-in responses (12)
- "We don't ingest credentials."
- "We don't ingest credentials currently"
- "DID services"
- "Velocity Networ API"
- "For DIDComm the ingestion side is handled by https://didcomm.org/issue-credential/3.0/ but you've combined the ingestion with presentation here. For presentation DIDComm uses https://didcomm.org/present-proof/3.0/ I'd have kept the two as different questions."
- "Our own API generator and that of our assessment vendor CTECS"
- "Interfacing credential document upload APIs"
- "NA"
- "SmartResume Credential Connect API"
- "We don't ingest credentials"
- "We do not ingest external credentials"
- "Partner-specific inbound payloads where they push credential state back into Brightspace."
Section 2: Credential Inbound APIs
If you use an open API or standard for inbound credentials, why did you choose it?
Select up to 3
| Response | Count | % |
|---|---|---|
| Alignment with existing standards (e.g., Open Badges, VC) | 30 | 70% |
| Market adoption / ecosystem support | 24 | 56% |
| Security and trust model | 17 | 40% |
| Developer familiarity / ease of implementation | 12 | 28% |
| Customer or partner requirement | 12 | 28% |
| Future extensibility | 11 | 26% |
| Regulatory or compliance reasons | 7 | 16% |
Section 2: Credential Inbound APIs
If you use a proprietary API for inbound credentials, what were the primary reasons?
Select all that apply
| Response | Count | % |
|---|---|---|
| No suitable open API met our requirements | 12 | 28% |
| Immature or incomplete standards | 11 | 26% |
| Customer-specific requirements | 10 | 23% |
| Speed to market | 10 | 23% |
| Legacy architecture | 5 | 12% |
| Performance or scalability concerns | 4 | 9% |
Section 3: Credential Outbound APIs
How does your platform enable credentials to be shared externally?
Select all that apply
| Response | Count | % |
|---|---|---|
| Downloadable files (JSON, PDF, SVG, PNG, etc.) | 36 | 84% |
| Shareable links / URLs | 34 | 79% |
| Social platforms (e.g., LinkedIn) | 29 | 67% |
| API-based transfer to another platform | 25 | 58% |
| Direct employer / ATS integration | 8 | 19% |
Write-in responses (3)
- "DID services"
- "we are just working on direct employer ATS consumption from a web wallet."
- "API-based transfer and Direct ATS integration are in the works"
Section 3: Credential Outbound APIs
Which APIs or protocols do you use for outbound credential sharing?
Select all that apply
| Response | Count | % |
|---|---|---|
| Open Badges API | 22 | 51% |
| Proprietary API | 18 | 42% |
| W3C Verifiable Credentials API (VC-API / VCALM) | 16 | 37% |
| Direct partner integrations (custom) | 12 | 28% |
| CHAPI | 10 | 23% |
| OpenID for Verifiable Credential Issuance (OID4VCI) | 7 | 16% |
| OpenID for Verifiable Presentations (OID4VP) | 5 | 12% |
Write-in responses (3)
- "DID services"
- "Surprised you didn't include DIDComm here as you did in #5, specifically, https://didcomm.org/present-proof/3.0/"
- "LER_RS"
Section 3: Credential Outbound APIs
Which downstream systems do you most commonly integrate with?
Select all that apply
| Response | Count | % |
|---|---|---|
| Learner wallets | 30 | 70% |
| Learning platforms | 22 | 51% |
| Employer platforms | 18 | 42% |
| Other credential platforms | 16 | 37% |
| ATS / HRIS systems | 15 | 35% |
| Government or licensing systems | 10 | 23% |
| Job boards | 8 | 19% |
Write-in responses (5)
- "Datawarehouses, CRMs, print orgs, ipass"
- "Unclear, want to share with ATS for higher ed and higher ed wallet systems, but not happening at scale yet"
- "Gaming systems"
- "General VC supporting Wallets"
- "SmartResume"
Section 4: API Decision Drivers & Tradeoffs
What factors most influence your API and transport decisions?
Ranked 1-8, with 1 = most influential
| Response | Avg rank | n |
|---|---|---|
| Market demand / customer requests | 2.9 | 43 |
| Interoperability with other platforms | 3.3 | 43 |
| Security and verification requirements | 3.7 | 43 |
| Alignment with existing standards (Open Badges, VC, CLR) | 4 | 43 |
| Ease of implementation | 4.8 | 43 |
| Maturity and stability of the specification | 5 | 43 |
| Employer or HR tech compatibility | 6.1 | 43 |
| Performance / scalability | 6.1 | 43 |
Section 4: API Decision Drivers & Tradeoffs
What are the biggest challenges you face when exchanging credentials?
Select all that apply
| Response | Count | % |
|---|---|---|
| Employer systems not ready to consume credentials | 31 | 72% |
| Inconsistent data models | 26 | 60% |
| Lack of agreed-upon APIs | 24 | 56% |
| Authentication / trust establishment | 14 | 33% |
| Metadata loss or mismatch | 14 | 33% |
| Versioning differences across standards | 11 | 26% |
| Legal or privacy constraints | 10 | 23% |
Write-in responses (4)
- "Limited scope and missing usecase support"
- "Too much optionality or choice without guidance for implementers. We need to simply choices with patterns based on use case 'families'."
- "Business need/competitive dynamics. Fundamentally don't understand how/why we get asked to implement other systems' APIs if the FILE/JSON itself contains all the information needed to share the credential"
- "Slight differences of approach in implementation that create blockers"
Section 4: API Decision Drivers & Tradeoffs
Where do you currently rely on workarounds instead of standards-based APIs?
Select all that apply
| Response | Count | % |
|---|---|---|
| Employer integrations | 16 | 37% |
| We do not rely on workarounds | 12 | 28% |
| Credential verification | 11 | 26% |
| Cross-vendor credential exchange | 11 | 26% |
| ATS / HRIS ingestion | 8 | 19% |
| Wallet-to-wallet transfer | 5 | 12% |
Write-in responses (8)
- "DID"
- "Everyone just does or doesn't do their own custom systems"
- "unsure"
- "Data normalization"
- "Different API versioning"
- "A propietary API is not a workaround. It's an enhancement over the existing solutions. So we don't workaround these issues - we solved for them."
- "SmartResume"
- "Issuance/delivery to wallets"
Section 5: Market Sufficiency & Gaps
Are existing credential transport APIs sufficient for today's real-world use cases?
| Response | Count | % |
|---|---|---|
| Yes, existing APIs are sufficient | 2 | 5% |
| Mostly sufficient, with minor gaps | 14 | 33% |
| Partially sufficient, significant gaps remain | 10 | 23% |
| No, current APIs do not meet market needs | 4 | 9% |
| Existing APIs may be sufficient, but market penetration is insufficient | 10 | 23% |
| Not sure | 3 | 7% |
Section 5: Market Sufficiency & Gaps
Which use cases are not well supported by existing APIs today?
Select all that apply
| Response | Count | % |
|---|---|---|
| Wallet-to-employer transfer | 19 | 44% |
| Platform-to-platform exchange | 17 | 40% |
| Employer verification workflows | 16 | 37% |
| Trust registry discovery | 15 | 35% |
| Wallet-to-wallet transfer | 13 | 30% |
| Issuer-to-wallet transfer | 13 | 30% |
| Learner-controlled sharing | 13 | 30% |
| Bulk credential exchange | 9 | 21% |
| Not applicable | 6 | 14% |
Section 5: Market Sufficiency & Gaps
If a new API were created or existing API modified, what should it prioritize?
Select up to 5
| Response | Count | % |
|---|---|---|
| Simplicity / ease of adoption | 31 | 72% |
| Alignment with Open Badges and CLR | 23 | 53% |
| Strong verification and trust signaling | 20 | 47% |
| Employer system compatibility | 19 | 44% |
| Backward compatibility with existing systems | 15 | 35% |
| Support for selective disclosure | 11 | 26% |
| Clear conformance profiles | 9 | 21% |
Write-in responses (10)
- "learner choice of identifier"
- "passkey"
- "Clear justification why a badge/CLR specific API is required. I feel the correct forums are elsewhere W3C, TrustOverIp, DIF,OpenID"
- "Adoption. Standards don't matter at all unless big players adopt which will cause little players to adopt."
- "New APIs should not exist"
- "I'd be very careful about yet another API or protocol and first emphasize where existing protocols/APIs might be extended to address new use cases or weaknesses in the current systems."
- "n/a"
- "But also why do you need another API?"
- "1) Seamless, positive, easy to use user experiences. 2) Alignment with Open Badges, CLR, and TCP (if TCP isn't a factor we won't use it) 3) Strong verificaton and trust signaling 4) Employer system compatability"
- "Don't create a new one--use VCALM or OpenID"
Section 5: Market Sufficiency & Gaps
Would your organization adopt a community-recommended standard for OB/CLR consistency?
| Response | Count | % |
|---|---|---|
| Yes, immediately | 10 | 23% |
| Yes, within 12-24 months | 1 | 2% |
| Possibly, depending on adoption | 18 | 42% |
| Unlikely | 2 | 5% |
| No | 1 | 2% |
| Yes, within 12–24 months | 11 | 26% |
Section 6: Forward-Looking Signals
Which emerging standards or approaches are you actively monitoring?
Select all that apply
| Response | Count | % |
|---|---|---|
| Open Badges 3.0 | 38 | 88% |
| W3C VC Data Model | 28 | 65% |
| W3C Verifiable Credentials API (VC-API / VCALM) | 22 | 51% |
| CLR 2.0 | 21 | 49% |
| Trust registries | 18 | 42% |
| OpenID for VC | 17 | 40% |
| Skills graph / competency frameworks | 16 | 37% |
| Open Badges API | 14 | 33% |
| OpenID for Verifiable Credential Issuance (OID4VCI) | 13 | 30% |
| OpenID for Verifiable Presentations (OID4VP) | 12 | 28% |
| AI-mediated credential interpretation | 11 | 26% |
| Proprietary API | 10 | 23% |
| Direct partner integrations (custom) | 8 | 19% |
| CHAPI | 8 | 19% |
Write-in responses (7)
- "passkey"
- "Edu API"
- "KERI ACDCs, KERI, Guardianship Credentials, First Person Credentials, MyTerms, SEDI, renderMethod, Digital Fiduciaries, Personhood Credentials, Privacy Obligation Documents (PODs)"
- "Trusted Career Profile, many "web3 protocols""
- "Trusted Career Profile"
- "European digital Credentials"
- "DC API"
Section 6: Forward-Looking Signals
What would make it easier for your platform to interoperate with employer systems?
Open response
Open responses (43)
- "At this time we are totally waiting for demand from our client institutions. Our CLR use case is being adopted by some of our client institutions and at least one is talking to employers. We will decide based on demand."
- "We deal with a lot of systems but not often with employer systems"
- "Greater standardization and clearer implementation guidance around credential exchange and verification would significantly improve interoperability with employer systems. In particular, it would help to have: Widely adopted, well-specified APIs and profiles for credential sharing, retrieval, and verification between issuer platforms, wallets, and employer systems. Clear, interoperable patterns for consent, authorization, and trust frameworks between institutions, learners, and employers. Better alignment on how different credential formats (e.g., Open Badges, Verifiable Credentials, CLRs) are packaged, transported, and consumed in real-world. More reference implementations, conformance testing tools, and real-world adoption by major HR platforms and employer-facing systems. Today, many employer systems still rely on custom integrations or manual processes. Reducing ambiguity in standards, improving developer tooling, and increasing adoption on the employer side would make end-to-end interoperability much easier to achieve at scale."
- "Implementation of OB/CLR API from their end"
- "We should seek interoperability across all systems. Open Badges 3.0 should work like W3C VCs with the only differences being the data properties specific to LER use cases. The further Open Badges and CLR stray from how W3C VCs work, the more challenging it will be to achieve adoption. More than APIs, we need more open source software and web browser based tools that can make it easier to verify and consume credentials. We also need testing and certification of technical providers that is more aligned with expected use of the credentials; that mimics actual use scenarios,"
- "`DID` centered architecture with passkey"
- "Standardised employer ingestion from credential verification systems."
- "Most government agencies and universities in Korea tend to require 1EdTech Open Badges certification when adopting badge systems. However, due to network and organizational constraints, they often operate Open Badges–based systems that are not actually open, which creates a somewhat ironic situation. While I am not fully aware of how other organizations handle this, this has been my personal experience so far. From our perspective as a company developing a badge system, we would like to see more flexible and interoperable network connections between these institutions than what currently exists, but realistically, achieving this does not seem easy."
- "a stanadard adopted by all the leading credential providers"
- "If employer platforms used more standards"
- "The up stream or platforms which are trying to centralize and track credentials need to adopt. Without this there is no point in platforms down stream trying to adopt or share data between themselves. All of your effort should be focused on getting their adoption."
- "Having employer systems adopt a standard and place for credentials - that is needed prior to integration ability with APIs"
- "clear alignment of trusted/verifiable data"
- "Assessment that leads to credential imbedded into the LMS or an integration to connect."
- "Employer adoption of both open standards for system-to-system transfer and internet-based open standards based on credential wallet APIs would be a huge benefit to the credential community."
- "The ease of data transfer"
- "Greater employer familiarity with credentials"
- "If employer systems could consume VCs in any way. Additionally -- parity on data receipt. System interoperability should be a 2 way exchange."
- "NOT SURE"
- "Employer systems ready to collaborate. I don't get the impression Employer systems are interested in collaborating."
- "Why does all of this need to be so complicated? Doesn't an OB 3.0 claim contain enough information within itself to be shared as a file? A learner can store, transfer, deliver this claim in a tamper-proof way as a file or a url to the file. Isn't this the ultimate simplicity? Where we have certain vendors asking each other and us to implement specific API connections, it seems to be too complicated and undermine the entire ecosystem. I really feel like less is more -- instead of focusing on new specs, can we just keep the spec simple and motivate/educate on the user of file-based transfter?"
- "Unified language and commitment. Agreement to move away from proprietary systems (bridges, not moats) to the benefit of the learner/earner."
- "Employer systems being present and adopting the technology we're implementing. This is what we've (as a community) have been chasing for years. It's good to see state-based initiatives looking to OB and CLR as requirements for their wallet implementations, but it still needs employers and the systems they use to come to the table."
- "・発行や検証機能は我々のプラットフォーム側で対応し、連携先のシステム側では表示のみを行えばいいようなAPI連携機能を実装している。"
- "VCALM"
- "Better interoperability requires moving past simple 'data portability' and toward actualised 'data utility.' For our platform, the primary catalyst for seamless integration would be the broad industry adoption of standardized, machine-readable schemas. This includes but is not limited to CLR and W3C VCs. By leveraging CLRs to provide a multi-faceted, competency-based view of a learner's achievements alongside real-time API webhooks (to manage events), we can bridge the gap between regional credentialing and global employer systems. The aim herev would be to replace manual verification with an automated, high-trust 'scaffold' that protects learner privacy while providing down-stream systems/services/employers/other with the data-dense insights required for modern planning."
- "I think we need a unified global protocol, just like the USB standard. It's not just about having the protocol; everyone needs to strictly adhere to the rules."
- "For us this is not a common requirement"
- "A standard issuer-to-wallet"
- "1) We need employer systems at the table to design these standards - that's noticeably missing other than in limited doses through HR Open's work. 2) Trusted Career Profile support. 3) Employer education on LER data value"
- "N/A"
- "n/a"
- "open source standards"
- "If they accepted badges."
- "Interoperability would be accelerated by standardized APIs and shared data schemas that allow verified credentials to flow directly into ATS and HRIS fields (skills, certifications, qualifications) without custom mapping. Clear employer-side verification workflow standards covering authentication, authorization, and response formats would ensure compatibility across systems like Workday, SAP, Oracle, Greenhouse, and Lever. Co-marketing and employer-funded pilot would significantly accelerate adoption, jointly introducing the platform to employers, running real-world pilots, and demonstrating measurable impact models around skills validation and hiring efficiency. Joint employer education backed by outcome data would help shift hiring practices toward verified, skills-based approaches by proving reductions in time-to-hire, improved quality-of-hire, and lower credential fraud. Stronger ecosystem collaboration through standards bodies like 1EdTech combined with introductions to employer innovation teams, would help align product roadmaps and scale interoperable implementations faster."
- "We do not generally interoperate with employer systems. Mostly we did not encounter this requirement with our current clients."
- "dont know"
- "compatibility with skills based credential metadata with employer needs"
- "A strong off-the-shelf solution for the employers so they can trust and transition from existing models."
- "Employer systems are still largely optimized around traditional HR data (job titles, requisitions, binary "degree / no degree" fields) rather than rich, machine-readable credentials. To interoperate more easily, we need: 1. Standard employer-facing profiles for credentials Widely adopted profiles that define how Open Badges 3.0, CLR 2.0, and W3C VC should look from an ATS/HRIS standpoint (core fields, skills, levels, expiry, revocation, verification endpoints) would reduce custom mappings for every integration. 2. Simple ingest APIs and reference implementations for major HR platforms Off‑the‑shelf connectors or conformance-tested APIs for Workday, Oracle, SAP, SuccessFactors, and leading ATS platforms would dramatically cut implementation time. Ideally, these would support both real‑time and batch ingestion of standardized credentials. 3. Clear trust and verification models that employers can operationalize Employers need straightforward answers to "Can I trust this?" and "Is it still valid?". Standardized trust registries, status lists, and verification endpoints—abstracted behind simple SDKs—would help HR teams adopt verifiable credentials without becoming crypto or PKI experts. 4. Skills and competency alignment to common taxonomies Credentials that map to widely used skills frameworks (e.g., ESCO, Lightcast, regional frameworks) are much easier for employers to consume. Shared guidance on how to embed and maintain these mappings within OB3/CLR/VC would improve match quality for hiring and internal mobility. 5. Implementation playbooks and governance templates Many employer teams are still at the exploratory stage. Practical playbooks—covering data privacy, consent, retention, AI usage, and bias considerations—would lower risk perceptions and make it easier for HR and legal teams to approve integrations. Brightspace's role is to ensure that learning data, outcomes, and credentials can flow out in these employer‑friendly formats via open standards and well-documented APIs, while allowing institutions and partners to choose the employer systems that work best for them."
- "Reduce the number of standards—there are too many standards, data models, and schemas"
- "If employer systems adopted a recommended wallet-to-verifier request and presentation protocol. The platforms that do this first will be the easiest to work with."
- "n/a"