...
- Confidence in the link of a digital identity credential to a real-world identity (Authenticity)
- Compliance with security objectives for integrity, confidentiality and non-repudiation of accountability of the communication
- Adherence to the privacy policy of the data controller
- Fulfillment of a defined service level (short- and long-term availability)
- User control over own data (like availability for export in an open format)
...